Search For:

Displaying 1-50 out of 153 total
Optimizing Adaptive Linear Array Antenna Pattern Under Intensive Interference Environment Using Genetic Algorithm
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wang Jiancheng,Qiu Hui,Chen Jianming,Qiu Hui,Chen Jianming
Issue Date:March 2011
pp. 185-187
Battlefield electromagnetic environment has become more and more complex under the background of information war. Strong interfering signals have seriously affected the quality of communication and reliability of information. To weaken or even eliminate th...
 
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes
Found in: Computational Intelligence and Natural Computing, International Conference on
By Chin-Chen Chang, Yi-Hui Chen, Zhi-Hui Wang, Ming-Chu Li
Issue Date:June 2009
pp. 303-306
Data embedding is one of the important issues for securely conveying secrets from senders to receivers without arousing any notices to attackers. Wet paper coding (WPC) is one of the data embedding schemes which embeds secrets into a subset of pixels of an...
 
A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-Based Images
Found in: Intelligent Ubiquitous Computing and Education, International Symposium on
By Chin-Chen Chang, Zhi-Hui Wang, Yi-Hui Chen, Ming-Chu Li
Issue Date:May 2009
pp. 569-572
This paper presents a reversible data embedding scheme with prediction and dissimilar techniques for palette-based images. Two embedding rules are imported in the proposed method, and no extra bit map is required to indicate which rules are applied in whic...
 
Computationally Efficient Method in the Meter-Wave Radar Low-Elevation Height-Finding Applications
Found in: Image and Signal Processing, Congress on
By Xiao-qin Hu, Jian-wen Chen, Hui Chen, Yong-liang Wang, Hui Chen
Issue Date:May 2008
pp. 459-463
Multipath reflection has great influence on the meter-wave radar low-elevation height-finding. In this paper, a computationally efficient method is presented fully using the information included in the received data covariance matrix. This method is propos...
 
New Control Strategy of Series-Parallel Resonant X-Ray Machine
Found in: Intelligent System Design and Engineering Application, International Conference on
By Hai-hui Chen, Xiao-Ming Huang
Issue Date:October 2010
pp. 989-992
X-ray tube's cathode space charge effect is the main interference for real-time control of x-ray tube current. Those factors making filament current drift are unpredictable, which affects the dynamic response performance of the tube current. In order to qu...
 
Interplay between Network Growing and Benefit Competition
Found in: Computer Science and Software Engineering, International Conference on
By Li-Xin Zhong, Bi-Hui Chen, Cai-Feng Liu, Li Liang
Issue Date:December 2008
pp. 717-720
In a competitive environment, the formation of network structures is not only related to the preferential linking but also the multiple state of interacting agents. With an adjustable parameter controlling the growth of networks, we study the correlations ...
 
The Best Learning Order Inference Based on Blue-Red Trees of Rule-Space Model for Social Network -- Case in ITE Course
Found in: Intelligent Networking and Collaborative Systems, International Conference on
By Yung-Hui Chen,Lawrence Y. Deng,Ku-Chen Huang
Issue Date:December 2011
pp. 466-471
Network Learning is becoming increasingly popular today. It is getting important to develop adaptive learning by social network that can be applied in intelligent e-learning systems, and provide learners with efficient learning paths and learning orders fo...
 
Progressive Hash-Merge Join Algorithm
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Gang Chen, Guohui Li, Bing Yang, Xianghong Tang, Hui Chen
Issue Date:December 2008
pp. 117-121
In data streams or web scenario at highly variable and unpredictable rates, most fast join algorithms to date rely upon shifting to external join stage as soon as possible when blocked in order to enhance efficiency. But they have trouble with the followin...
 
Fine-Grained Progressive Algorithm Based on HMJ
Found in: Computer Science and Software Engineering, International Conference on
By Gang Chen,Guohui Li,Bing Yang,Xianghong Tang,Hui Chen
Issue Date:December 2008
pp. 589-592
Wide-area distribution raises significant performance problems for traditional query processing techniques as data access becomes less predictable due to link congestion, load imbalances, and temporary outages. Non-blocking joining query execution is a pro...
 
Predictive Queries Algorithm Based on Probability Model over Data Streams
Found in: International Conference on Natural Computation
By Guohui Li, Hui Chen, Bing Yang, Gang Chen, Jun Xiang
Issue Date:August 2007
pp. 256-260
Mining the evolving trends of an online data stream and forecasting the data values in the future can provide important support for the decision-making in many time-sensitive applications. This paper models an online data stream as a continuous state trans...
 
Analysis and Architecture Design of JPEG2000
Found in: Multimedia and Expo, IEEE International Conference on
By Liang-Gee Chen, Chung-Jr Lian, Kuan-Fu Chen, Hong-Hui Chen
Issue Date:August 2001
pp. 54
Analysis and architecture design of the key modules in JPEG2000 are presented in this paper. For Discrete Wavelet Transform (DWT), a lifting based DWT core for the default 5-3 and 9-7 filters in part I of JPEG2000 is proposed. Folded architecture is adopte...
 
A New Model of Minimum Variance Hedge Ratio: EGARCH-Copula-EWMA
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Yang Jian-Hui,Chen Ying-Ying
Issue Date:December 2013
pp. 812-816
This paper proposes a new model to calculate minimum variance hedge ratio based on EGARCH-Copula-EWMA model. Based on Minimum variance hedging model, the new model calculates Futures yield rate by EGARCH model and Spot yield rate by EWMA model respectively...
 
Anole: A Case for Energy-Aware Mobile Application Design
Found in: 2012 41st International Conference on Parallel Processing Workshops (ICPPW)
By Hui Chen,Bing Luo,Weisong Shi
Issue Date:September 2012
pp. 232-238
Battery lifetime, which is one of the most significant user experiences for mobile devices, strongly restricts the functional design of hardware architecture and applications. Among all the aspects of energy saving for mobile devices, energy-aware applicat...
 
One-to-One Complementary Collaborative Learning Based on Blue-Red Trees and Performance Analysis for Social Network
Found in: International Conference on Ubi-Media Computing
By Yung-Hui Chen, Lawrence Y. Deng, Shwu-Huey Yen, Wu-Hsiao Hsu, Bruce C. Kao, Yu-Che Haieh
Issue Date:July 2011
pp. 83-88
In this paper, we used the Rule-Space Model to infer reasonable learning effects represented as Blue-Red trees and their definitions by analyzing all learning objects of courses within a system. We can derive nine learning groups of social network grouping...
 
Petri Net Modeling of the Reconfigurable Protocol Stack for Cloud Computing Control Systems
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Hui Chen, Chunjie Zhou, Yuanqing Qin, Art Vandenberg, Athanasios V. Vasilakos, Naixue Xiong
Issue Date:December 2010
pp. 393-400
The Industrial Ethernet is promising for the implementation of a Cloud Computing based control system. However, numerous standard organizations and vendors have developed various Industrial Ethernets to satisfy the real-time requirements of field devices. ...
 
Design of Multi-parameter Fusion Coulometer Based on Self-feedback BP Network
Found in: Electrical and Control Engineering, International Conference on
By Huaping Zhou, Hui Chen, Jingzhao Li
Issue Date:June 2010
pp. 767-770
BP network has a memory function of historical data due to adding local self-feedback on some nodes of it. The improved local self-feedback BP network can solve dynamic mapping and process historical data. The multi-information fusion algorithm can be achi...
 
Development of Effective Quality Management Driven by Visualization and Automation Support
Found in: International Conference on E-Business and E-Government
By Wu Yina,Ma Hui,Chen Xiangcui
Issue Date:May 2010
pp. 2684-2687
Visualization and Automation decision support is significant to the quality management. This paper discusses the ever increasingly important role of Visualization and Automation decision support in the development of quality management and points out that ...
 
The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era
Found in: Electronic Commerce and Security, International Symposium
By Hui Chen, Zheng Li
Issue Date:August 2008
pp. 86-90
Based on 327 data from three universities and five virtual communities in China, this study investigated factors affecting customer satisfaction of Chinese online shoppers in Web2.0 era. A SEM model was used. 8 hypotheses among the total 11 hypotheses in S...
 
Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE Devices
Found in: Future Generation Communication and Networking
By Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen, Xi Cheng
Issue Date:December 2007
pp. 447-452
In this paper we study the feasibility of providing automotive users the Internet access using C2C communication with help of roadside infrastructure and the novel Vehicular Communication Gateways (VCG), which is developed in the MYCAREVENT project. A tech...
 
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks
Found in: Systems and Networks Communication, International Conference on
By Li Hui, Chen Kefei, Zheng Yanfei, Wen Mi
Issue Date:November 2006
pp. 29
In this paper, we present an efficient key management scheme for resource limited sensor networks. Motivated by the fact that group key distribution from remote base station is costly in term of communication, we introduce the scheme of locally group key m...
 
Secret Hiding Mechanism Using QR Barcode
Found in: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
By Pei-Yu Lin,Yi-Hui Chen,Eric Jui-Lin Lu,Ping-Jung Chen
Issue Date:December 2013
pp. 22-25
QR code is the commonly used two-dimensional (2D) barcode recently with the advantages of larger QR content and error correction capability. Based on the error correction property of QR code, we designed a secret hiding technique for QR barcode. The propos...
 
Research on a Comprehensive Evaluation System for Thin Clients Used in Desktop Cloud
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Jiayin Wu,Hongfei Qiu,Chunguang Huang,Xianxu Li,Wenwu Zheng,Zhiqin Huang,Yong Chen,Zhiyun Li,Hui Chen
Issue Date:June 2013
pp. 1687-1689
The paper reveals a trend of substituting PC with thin clients. Features and application demand of thin clients are investigated. A comprehensive evaluation system is established, which takes factors including hardware, remote concentrated management syste...
 
Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks
Found in: IEEE Transactions on Mobile Computing
By Yang Xiao,Hui Chen,Mohsen Guizani,Hsiao-Hwa Chen
Issue Date:September 2012
pp. 1532-1544
We study load balancing of paging schemes for multitier hierarchical cellular networks, in which different tiers of cells overlay each other to provide multiple coverage in cellular service areas. Each mobile terminal (MT) can be paged in any tier of a mul...
 
Data Hiding Scheme Based on Features of Chinese Text
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chia-Chen Lin,Li-Cheng Yang,Yi-Hui Chen
Issue Date:October 2011
pp. 161-164
Text data hiding is a steganographic technique different from the secrets hiding in multimedia, such as images, audio and video. Sun et al. proposed a text data hiding scheme to divide the Chinese character into left and right parts for enhancing the capac...
 
Improving temporal error concealment by GRNN in video communication
Found in: Multimedia and Expo, IEEE International Conference on
By Jun-Horng Chen, Shih-Chun Shao, Wen-Hui Chen
Issue Date:July 2011
pp. 1-4
This work aims to improve the temporal error concealment for the corrupted macroblocks whose motions are not locally-smooth. It is demonstrated that the recovered quality by the oft-used motion estimation approaches is not visually satisfied for those MBs ...
 
Application and Research of Monitor Pro7 Applied to Zhu Jiang Yuan Center for Performing Arts
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Xiaolin Feng, Haijie Mao, Ruozhu Chen, Hui Chen
Issue Date:January 2011
pp. 508-511
With the background of practical automatic control project of stage mechanical equipment in Qujing, Yunnan, P.R.China, high levels configuration software of Schneider Electric named Monitor Pro7 is introduced to accomplish the task of monitoring and contro...
 
A Smart Kitchen for Nutrition-Aware Cooking
Found in: IEEE Pervasive Computing
By Jen-Hao Chen, Peggy Pei-Yu Chi, Hao-Hua Chu, Cheryl Chia-Hui Chen, Polly Huang
Issue Date:October 2010
pp. 58-65
Healthy home cooking is essential for maintaining long-term health. Although most family cooks are willing to learn healthy cooking, they often have difficulty applying this knowledge. A smart kitchen with pervasive computing technology provides nutritiona...
 
A Novel Reversible Semi-Fragile Watermarking Algorithm of MPEG-4 Video for Content Authentication
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Hui Chen, Zhenyong Chen, Xiao Zeng, Wei Fan, Zhang Xiong
Issue Date:December 2008
pp. 37-41
This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV video to MPEG-4 format. One watermark ...
 
Detection of the Cardiovascular Diseases by Using a Linearly Modeling System with the PSO-Based Classification Scheme
Found in: Intelligent Systems Design and Applications, International Conference on
By Meng-Cheng Shen, Heng-Chou Chen, Chih-Hui Chen
Issue Date:November 2008
pp. 531-536
In general, the detection of cardiovascular disease is performed by ECG, Electrocardiogram, to dynamically monitor and analyze the disease status. Additionally, ECG is also used to diagnose the latent disease to proceed with a further treatment. Therefore,...
 
Estimation DOAs of the Coherent Sources Based on Toeplitz Decorrelation
Found in: Image and Signal Processing, Congress on
By Xiao-qin Hu, Jian-wen Chen, Hui Chen, Yong-liang Wang
Issue Date:May 2008
pp. 54-58
In this paper, a novel method based on Toeplitz decorrelation is proposed to estimate DOAs (direction of arrivals) of the coherent sources. Using the eigenvector corresponding to the largest eigenvalue obtained from the received data covariance matrix, the...
 
Enhancing Reusability of Learning Objects with Object-Oriented Inheritance Relationships
Found in: Parallel Processing Workshops, International Conference on
By Yung-Hui Chen, Chun-Chia Wang, Lawrence Y. Deng, Mei-Chung Chen, Timothy K. Shih
Issue Date:September 2007
pp. 26
This paper points out relevant issues of object inheritance in the context of SCORM/CORDRA research communities. We propose a mechanism, as well as an implemented prototype system, that can be used to support searching and reusing of learning objects forme...
 
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
Issue Date:April 2007
pp. 1210-1215
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic?s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo demonstrated that Yang-Chang-Hwang?s scheme is vulnerable to a stolen-verifier at...
 
Improved SMVQ Scheme with Edge-Directed Prediction
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li
Issue Date:December 2006
pp. 541-544
The side-match vector quantization (SMVQ) technique has been widely used in various image compression and hiding techniques. It effectively decreases the bit rates of image with a great compressed quality. However, the prediction is not precise while the v...
 
Across-Platform Computing of Groundwater and Adaptive Grid
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Chia-Chen Kuo, Zhou-Jin Wu, Whey-Fone Tsai, Shung-Hui Chen, Ruey-Shyang Wu
Issue Date:May 2000
pp. 1064
In this study, we provide a Web-based interface for numerical data representation based on WAN Wide Area Networking. Furthermore, we intend to give facilities to communicate with each module and make the package developing and maintaining easy. The system ...
 
Research on Anti-Control of Missile Electro-Hydraulic Actuator Using Active Disturbance Rejection Control Method
Found in: Innovative Computing ,Information and Control, International Conference on
By Hui Chen, Xiaoye Qi, Juan Chen, Yongling Fu
Issue Date:December 2009
pp. 1443-1446
Nowadays, the electro-hydraulic actuator plays an important role in some modern tactical missiles. High power, great robustness and high tracking precision are the most significant demands for the missile actuator. Therefore an advanced method of active di...
 
Camera Networks for Healthcare, Teleimmersion, and Surveillance
Found in: Computer
By Ching-Hui Chen,Julien Favre,Gregorij Kurillo,Thomas P. Andriacchi,Ruzena Bajcsy,Rama Chellappa
Issue Date:May 2014
pp. 26-36
Markerless technology is a game changer for motion-capture applications, such as the monitoring of patients outside the hospital, realistic face-to-face communication across continents, and observation across large spaces.
 
The Impact of Social Diversity and Dynamic Influence Propagation for Identifying Influencers in Social Networks
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Pei-Ying Huang,Hsin-Yu Liu,Chin-Hui Chen,Pu-Jen Cheng
Issue Date:November 2013
pp. 410-416
There has been significant recent interest in using the aggregate information from social media sites (e.g., Twitter) to identify influencers. To investigate this issue, one dynamic diversity-dependent algorithm is proposed for detecting the influencers by...
 
Non-Oscillatory Central Difference Schemes for Hamilton-Jacobi Equations
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Wei Xu,Ling-Hui Chen
Issue Date:June 2013
pp. 920-922
C. T Lin and E. Tadmor developed the staggered version of the LxF schemes for reducing the excessive numerical viscosity. A class of non-staggered and non-oscillatory central difference schemes are constructed based on their schemes. Finally, several typic...
 
Numerical Simulation Study on Chemical Kinetics Mechanism of Biodiesel Combustion
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Haozhong Huang,Ruiqing Zhao,Hui Chen,Fengzhu Lu,Yuanfei Liang
Issue Date:January 2013
pp. 1015-1018
A numerical simulation study on chemical kinetics of engine combustion fueled with biodiesel was performed by using zero dimension single-zone model coupled with a detailed kinetic model. The main pathway of biodiesel combustion was obtained by analyzing k...
 
Multi-gigahertz arbitrary timing generator and data pattern serializer/formatter
Found in: 2012 IEEE International Test Conference (ITC)
By David C. Keezer,Te-Hui Chen,Carl E. Gray,Hyun Woo Choi,Sungyeol Kim,Seongkwan Lee,Hosun Yoo
Issue Date:November 2012
pp. 1-11
A multi-GHz arbitrary timing generator (ATG) design is described and demonstrated in a hardware prototype. The objective of the ATG is to realize ATE hardware that nearly matches the unlimited timing flexibility of software simulation tools. The ATG allows...
 
A High Accurate Difference Scheme for Hamilton-Jacobi Equations
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Wei Xu,Ling-Hui Chen
Issue Date:October 2012
pp. 493-496
Based on the reconstruction by using least squares fitting method and corresponding limiter correction, a class of high accuracy schemes are constructed for solving Hamilton-Jacobi equations. Several typical numerical tests demonstrate the desired low comp...
 
Impulse-Based Rendering Methods for Haptic Simulation of Bone-Burring
Found in: IEEE Transactions on Haptics
By Qiong Wang,Hui Chen,Wen Wu,Jing Qin,Pheng Ann Heng
Issue Date:September 2012
pp. 344-355
Bone-burring is a common procedure in orthopedic, dental, and otologic surgeries. Virtual reality (VR)-based surgical simulations with both visual and haptic feedbacks provide novice surgeons with a feasible and safe way to practice their burring skill. Ho...
 
A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Yi-Hui Chen,Ci-Wei Lan
Issue Date:September 2012
pp. 1006-1008
Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images....
 
A cyber-physical integrated system for application performance and energy management in data centers
Found in: 2012 International Green Computing Conference (IGCC)
By Hui Chen,PengCheng Xiong,Karsten Schwan,Ada Gavrilovska,ChengZhong Xu
Issue Date:June 2012
pp. 1-10
Both performance and energy cost are important concerns for current data center operators. Traditionally, however, IT and mechanical engineers have separately optimized the cyber vs. physical aspects of data center operations. In contrast, the work present...
 
A Preliminary Study on Importing an Assessment Model for Open-Air Space Design Pattern of Coordinating Agents
Found in: Computer, Consumer and Control, International Symposium on
By Chiung-Hui Chen
Issue Date:June 2012
pp. 123-127
Coordination refers to agents that coordinate their own behavior in an environment of finite resources to conform to individual benefits or group goals. Dependent agents use effective information connections for coordinating and adjusting resource distribu...
 
Implementation of Low-Cost Vision-Based Gesture Recognition Systems Based on FPGA Approach
Found in: Computer, Consumer and Control, International Symposium on
By Po-Chuan Cho,Chao-Tang Li,Wen-Hui Chen
Issue Date:June 2012
pp. 329-332
With rapid advancement in technology, numerous applications are required, such as for face and gesture recognition. However, various methods previous researchers have developed and presented suffer from limitations. Therefore, this study proposes an FPGA-b...
 
Preference Sorting Based on User's Relevance Feedback
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Lawrence Y. Deng,Yung-Hui Chen,Yi-Jen Liu
Issue Date:March 2012
pp. 1337-1342
Reference feedback contains the positive and negative feedback ranks. User¡¦s relevance feedback rank can derivate as the User¡¦s preference. In this paper, we addressed the user¡¦s relevance feedback technology to reflect the degree of user¡¦s pre...
 
A virtual surgical simulator for mandibular angle reduction based on patient specific data
Found in: Virtual Reality Conference, IEEE
By Qiong Wang,Hui Chen,Wen Wu,Hai Yang Jin,Pheng Ann Heng
Issue Date:March 2012
pp. 85-86
In our work, a virtual reality-based surgical simulator for the mandibular angle reduction was designed and implemented on CUDA-based platform. High-fidelity visual and haptic feedbacks between the surgical instruments and the bone material are provided to...
 
Efficient Color-Ingredient Particle Filter for Video Object Tracking
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Jian-Hui Chen,Wen-Kai Tsai,Ming-Hwa Sheu,Kai-Min Lin,And Ho-En Liao*
Issue Date:December 2011
pp. 49-52
This paper proposes a new object model and a similarity measure method for particle filter. Based on cluster color histogram concept and similarity measure method, we analyze color ingredient and measure similarity using Euclidean distance, such that our a...
 
Multimedia Privacy Protection System for Mobil Environments
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chih-Yang Lin,Chao-Chin Chang,Yi-Hui Chen,Panyaporn Prangjarote
Issue Date:October 2011
pp. 133-136
In recent years, mobile phones have become very popular due to technology advances. However, unprotected personal photos and videos can easily be leaked when the phone falls into the hands of a malicious user. In this paper, we propose a multimedia privacy...
 
 1  2 Next >>