Search For:

Displaying 1-50 out of 77 total
A Development and Construction of Parallel Robot with Embedded System
Found in: International Conference on Robot, Vision and Signal Processing
By Hui-Hung Lin,Chih-Chin Wen,Shi-Wei Lin,Cheng-Chung Chang,Kuan-Chih Liu,Chorng-Tyan Lin
Issue Date:November 2011
pp. 102-105
The parallel robots have attracted many researchers¡¦ attention for its great potential in high speed pick-and-place operation. In this paper, a short description about the development and construction of parallel robot in Metal Industries Research and D...
Design and Implement Augmented Reality for Supporting Driving Visual Guidance
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Jyh-Horng Lin,Cheng-Min Lin,Chyi-Ren Dow,Cheng-Qian Wang
Issue Date:December 2011
pp. 316-319
It is an important issue that let drivers obtain driving information easily. There are many advanced electronic devices used for driving safety assistance. During driving a car, the driver receives the information passed by these systems. But with more fun...
A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java Processor
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang, Ting-Wei Hou
Issue Date:September 2009
pp. 998-1001
This research tries to improve the portability of Java AWT(Abstract Window Toolkit) for embedded systems. We want to have a new graphic library which is easier to port than current AWT and to shorten the porting time. The proposed graphic library consists ...
Content-Aware Video Retargeting Using Object-Preserving Warping
Found in: IEEE Transactions on Visualization and Computer Graphics
By Shih-Syun Lin, Chao-Hung Lin, I-Cheng Yeh, Shu-Huai Chang, Chih-Kuo Yeh, Tong-Yee Lee
Issue Date:October 2013
pp. 1677-1686
A novel content-aware warping approach is introduced for video retargeting. The key to this technique is adapting videos to fit displays with various aspect ratios and sizes while preserving both visually salient content and temporal coherence. Most previo...
A memory yield improvement scheme combining built-in self-repair and error correction codes
Found in: 2012 IEEE International Test Conference (ITC)
By Tze-Hsin Wu,Po-Yuan Chen,Mincent Lee,Bin-Yen Lin,Cheng-Wen Wu,Chen-Hung Tien,Hung-Chih Lin,Hao Chen,Ching-Nen Peng,Min-Jer Wang
Issue Date:November 2012
pp. 1-9
Error correction code (ECC) and built-in self-repair (BISR) schemes have been wildly used for improving the yield and reliability of memories. Many built-in redundancy-analysis (BIRA) algorithms and ECC schemes have been reported before. However, most of t...
Construction of Application-Layer Multicast Trees for Message Distribution
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Hwa-Chun Lin, Tsung-Ming Lin, Cheng-Feng Wu, Hsiu-Ming Yang
Issue Date:September 2010
pp. 109-114
This paper considers the problem of constructing minimum-delay multicast trees for message dissemination in overlay networks in which nodal delays for processing messages are taken into account in addition to communication delays. The objective is to find ...
Cognition Map of Experiential Marketing Strategy for Hot Spring Hotels in Taiwan Using the DEMATEL Method
Found in: International Conference on Natural Computation
By Kuo-ming Lin, Cheng-wei Lin
Issue Date:October 2008
pp. 438-442
The experiential outcomes of guests’ hotel stay have been increasing recognized as important for planning and managing leisure services as well as for understanding guests’ leisure behavior. Hence, understanding experiential outcomes for developing practic...
An Effective Data Embedding for Error Concealment
Found in: Innovative Computing ,Information and Control, International Conference on
By Shinfeng D. Lin, Cheng-Wei Tsai
Issue Date:June 2008
pp. 28
In recent years, image and video are widely used in many applications on the Internet. Because of the unreliable transmission channels and the malicious tampering, error concealment and tamper recovery algorithms have been proposed respectively, and the da...
A Multiple Layered Audiovisual Streaming System Using the Two-Phase Synchronization and FGS/BSAC Techniques
Found in: Advanced Information Networking and Applications, International Conference on
By Chung-Ming Huang, Chung-Wei Lin, Cheng-Yen Chuang
Issue Date:March 2008
pp. 174-180
For a ubiquitous multimedia streaming, an adaptive multimedia streaming scheme with multiple layered audiovisual (AV) coding is required over heterogeneous networks. This paper proposes a multiple layered audiovisual streaming scheme denoted ML-AVSS to del...
Fast Surface Registration Based on Feature Area Detection
Found in: Computer, Consumer and Control, International Symposium on
By Chia-Hsiang Wu,Cheng-Min Ni,Sheng-Che Lin,Cheng-Chien Chang
Issue Date:June 2012
pp. 467-470
Surface scanning is able to capture the 3D geometry of patients for follow-up evaluation of surgery. In general, we can use a laser scanner to obtain the 3D image of the surface of the body. Since the surface invisible from the scanner is unable to be capt...
Particle Swarm Optimization with Extremal Optimization for the Prediction of CpG Islands in the Mammal Genome
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Li-Yeh Chuang,Ming-Cheng Lin,Cheng-Hong Yang
Issue Date:October 2011
pp. 189-194
Regions with abundant GC nucleotides in a genome, which are often referred to as CpG islands, have been used in methylation analysis and the prediction of promoter regions. In this study, we propose PSOEO (Particle Swarm Optimization with Extremal Optimiza...
Optimization of Regional Coverage Reconnaissance Satellite Constellation by Improved NSGA-II Algorithm
Found in: Intelligent Computation Technology and Automation, International Conference on
By Si-wei Cheng, Hui Zhang, Lin-cheng Shen, Jing Chen
Issue Date:October 2008
pp. 660-664
The paper presents a new method to design regional coverage satellite constellation, the non-dominated sorting genetic algorithm II(NSGA-II) based on Pareto optimal is improved and applied it to the optimization of regional coverage satellite constellation...
DFM/DFY practices during physical designs for timing, signal integrity, and power
Found in: Asia and South Pacific Design Automation Conference
By Shi-Hao Chen, Ke-Cheng Chu, Jiing-Yuan Lin, Cheng-Hong Tsai
Issue Date:January 2007
pp. 232-237
We present our experience of DFM (design for manufacturability) and DFY (design for yield) considerations on physical designs at 0.13 mum and below technology nodes. The impact of some DFM approaches on timing and signal integrity are addressed. We also pr...
In this paper, an approach for deaf-people
Found in: Pattern Recognition, International Conference on
By Zhi-Wei Chen, Yu-Cheng Lin, Cheng-Chin Chiang
Issue Date:August 2006
pp. 104-107
This paper presents the design and implementation of a fingertip writing interface which recognizes the moving trajectory of the user's fingertip into alphabets and numerals. The processes are divided into tracking and recognition. For the fingertip tracki...
Full body human attribute detection in indoor surveillance environment using color-depth information
Found in: 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
By Hao-Jen Wang,Yen-Liang Lin,Cheng-Yu Huang,Yu-Lin Hou,Winston Hsu
Issue Date:August 2013
pp. 383-388
With the advent of depth enabled sensors and increasing needs in surveillance systems, we propose a novel framework to detect fine-grained human attributes (e.g., having backpack, talking on cell phone, wearing glasses) in the surveillance environments. Tr...
Image Encryption Based on Fuzzy Synchronization of Chaos Systems
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Chao-Lin Kuo,Lung-Chuan Huang,Shun-Jih Wang,Jui-Sheng Lin,Cheng-Chi Wang,Jun-Juh Yan
Issue Date:July 2013
pp. 153-154
This paper considers the problem of chaos synchronization based on fuzzy sliding mode control and its applications to image encryption. We applied the fuzzy sliding mode controller to achieve chaos synchronization. Then, the Duffing-Holmes chaos states are...
High-Precision RSSI-based Indoor Localization Using a Transmission Power Adjustment Strategy for Wireless Sensor Networks
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Jiing-Yi Wang,Chia-Pang Chen,Tzu-Shiang Lin,Cheng-Long Chuang,Tzu-Yun Lai,Joe-Air Jiang
Issue Date:June 2012
pp. 1634-1638
Indoor localization is an important issue in wireless sensor network (WSN) studies. Sensed data may become meaningless, if the locations of sensors are not known. Traditional localization techniques do not meet the requirements of low-cost and energy-conse...
The Construct and Evaluation of High School Physics Online Remedial Teaching System
Found in: Research Challenges in Computer Science, International Conference on
By Lien-Fa Lin, Cheng-Yong Huang, Chen Hsieh-Chih
Issue Date:December 2009
pp. 214-217
This paper illustrates the online remedial instruction system designed for the physics instruction in Senior High School. The system provides a complete tracking mechanism to record the entire leaning process of online remedial instruction participants. It...
Dynamic Multiway Segment Tree for IP Lookups and the Fast Pipelined Search Engine
Found in: IEEE Transactions on Computers
By Yeim-Kuan Chang, Yung-Chieh Lin, Cheng-Chien Su
Issue Date:April 2010
pp. 492-506
A dynamic multiway segment tree (DMST) is proposed for IP lookups in this paper. DMST is designed for dynamic routing tables that can dynamically insert and delete prefixes. DMST is implemented as a B-tree that has all distinct end points of ranges as its ...
A High Capacity 3D Steganography Algorithm
Found in: IEEE Transactions on Visualization and Computer Graphics
By Min-Wen Chao, Chao-hung Lin, Cheng-Wei Yu, Tong-Yee Lee
Issue Date:March 2009
pp. 274-284
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multi-layered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show...
Component-Oriented Radars with Probabilistic Timing Guarantees
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chin-Fu Kuo, Ya-Shu Chen, Tei-Wei Kuo, Phone Lin, Cheng Chang
Issue Date:July 2006
pp. 723-735
<p><b>Abstract</b>—In recent years, many modern phased-array radars are built with commercial off-the-shelf components, and the functions of many hardware components are also reimplemented by software modules. In such systems, radar tasks...
Efficient and Economical Test Equipment Setup Using Procorrelation
Found in: IEEE Design and Test of Computers
By Bin-Hong Lin, Cheng-Wen Wu, Hwei-Tsu Ann Luh
Issue Date:January 2004
pp. 34-43
<p>The Procorrelation System (PCS) obtains a high-quality correlation between die failures on a premanufactured recorded correlation wafer and the test equipment setup for the current wafer lot. PCS greatly reduces analysis time and test cost, compar...
3D Sub-query Expansion for Improving Sketch-Based Multi-view Image Retrieval
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Yen-Liang Lin,Cheng-Yu Huang,Hao-Jeng Wang,Winston Hsu
Issue Date:December 2013
pp. 3495-3502
We propose a 3D sub-query expansion approach for boosting sketch-based multi-view image retrieval. The core idea of our method is to automatically convert two (guided) 2D sketches into an approximated 3D sketch model, and then generate multi-view sketches ...
Reliability Assessment at Day-Ahead Operating Stage in Power Systems with Wind Generation
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Le Xie,Lin Cheng,Yingzhong Gu
Issue Date:January 2013
pp. 2245-2251
This paper proposes to evaluate reliability performances at operating stage for power systems with variable wind generation. This is a first step towards recognizing the stronger coupling of power system decision making across different time-scales. In the...
A self sustainable air quality monitoring system using WSN
Found in: 2012 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA)
By Chien-Hao Wang, Yu-Kai Huang, Xiang-Yao Zheng, Tzu-Shiang Lin, Cheng-Long Chuang, Joe-Air Jiang
Issue Date:December 2012
pp. 1-6
In recent years, urban air quality monitoring is increasingly important. To monitor air quality in urban areas, wireless sensor networks (WSNs) might be a great tool, because they can automatically collect air-quality data. WSNs are able to provide data wi...
Encryption Domain Text Retrieval
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Tzi-cker Chiueh,Dilip N Simha,Alankar Saxena,Saurabh Bhola,Ping-Hung Lin,Cheng-En Pang
Issue Date:December 2012
pp. 107-112
This paper proposes efficient indexing and querying services on encrypted user documents stored in the cloud. We develop few sophisticated techniques to ensure that any network intruder or even the cloud service provider itself is oblivious to both user da...
Battery Component Control System Design for PHEV Based on ECE Cycle
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Lin Cheng,Zhou Fengjun,Cao Wanke,Wang Gang,Zhang Xiaohua
Issue Date:November 2012
pp. 409-412
As the key technology of electric vehicles(EV) ", "control systems is always the research hotspot of EV field. When the battery component of HEV operates at charge sustaining (CS) mode, the most important problem is how to split the whole vehicle...
UAS Cloud Surveillance System
Found in: 2012 41st International Conference on Parallel Processing Workshops (ICPPW)
By Chin E. Lin,Cheng-Ru Li,Ya-Hsien Lai
Issue Date:September 2012
pp. 173-178
On UAV missions, flight information should be prompt for use to all participating team members. Supporting from 3G mobile communications, UAV flight data can be uplink onto Internet and share with all users at different locations. Using an Android smart ph...
Thermal Characteristic Analysis of Power Lithium-ion Battery System for Electric Vehicle
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Wang Wenwei,Lin Cheng,Tang Peng,Zhou Chengjun
Issue Date:July 2012
pp. 967-971
With the electric vehicles used lithium manganese lithium-ion power battery (LiMn2O4 power battery) as the research object, the paper researched on the parameter identification of battery cell, has built the finite element model of single cell and complete...
Automatic Prediction of Enzyme Functions from Domain Compositions Using Enzyme Reaction Prediction Scheme
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Chuan-Ching Huang,Chun-Yuan Lin,Cheng-Wen Chang,Chuan Yi Tang
Issue Date:May 2012
pp. 82-85
Proteins perform most important biochemical reactions in organisms, such as the catalysis, signal transduction, and transport of nutrients. The urgent need of automatic annotation is due to the advent of high-throughput sequencing techniques in the post-ge...
A Hybrid Scheduling Mechanism for IEEE 802.16j Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Hong Wang,Wei-Chih Lin,Cheng-Hung Tsai,Guo-Rui Huang
Issue Date:March 2012
pp. 448-453
Quality of service (QoS) is an important issue in the deployment IEEE 802.16 networks with real-time and non-real-time traffic integration. IEEE 802.16j is an extension of IEEE 802.16 to support relay transmission. In this paper, we propose a dynamic hybri...
The Proactive Member-Centric Routing Protocol Using the Several Strategy (PMCS) for the Fleet Scenario in the Hybrid VANET
Found in: Advanced Information Networking and Applications, International Conference on
By Chung-Ming Huang,Tzu-Hua Lin,Cheng-Hsiu Chang
Issue Date:March 2012
pp. 97-104
In this paper, we proposed a Proactive Member-Centric routing protocol using the Several strategy (PMCS) for having bandwidth aggregation in the hybrid VANET environment such that a better collaborate video streaming service in the
Emotion Care Services with Facebook Wall Messages
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Hui-Huang Hsu,Yu-Fan Chen,Chi-Yi Lin,Cheng-Wei Hsieh,Timothy K. Shih
Issue Date:March 2012
pp. 875-880
With the popularity of Web 2.0, social networks have become an important channel for people to keep in contact. It is common to have hundreds of friends for a user on Face book. Thus it is quite difficult for the user to keep track on all friends¡¦ emoti...
A Routing Protocol Based on Power-Controlled Sleep Scheduling for Wireless Sensor Networks
Found in: Intelligent Networking and Collaborative Systems, International Conference on
By Ying-Hong Wang,Yu-Chu Lin,Cheng-Hung Tsai
Issue Date:December 2011
pp. 136-140
Wireless Sensor Networks is dispersed by a group composed of sensors and Base Stations. It can be used in various applications of remote monitoring system. Sensor nodes route the collected data to the Base Station via multi-hop wireless links. These sensor...
Toward Cognitive Vehicles
Found in: IEEE Intelligent Systems
By Ding Wen, Gongjun Yan, Nan-Ning Zheng, Lin-Cheng Shen, Li Li
Issue Date:May 2011
pp. 76-80
<p>As a result of more cars on the road, traffic becomes more congested and streets become more risky. In addition, new communication and entertainment applications make drivers ever-more over-burdened and distracted. To relieve the continually incre...
Real-Time Reliability Optimization of CAN Control Network Based on RMA for Independent Drive Electric Vehicle's Powertrain
Found in: Optoelectronics and Image Processing, International Conference on
By Cao Wanke, Lin Cheng, Peng Chunlei, Meng Xiang
Issue Date:November 2010
pp. 157-160
According to work principle of controller area network (CAN) protocol, the use of CAN in time-critical and safety-critical control applications such as independent drived electric vehicle’s powertrains presented designers with new special problems on the d...
Constructing Storage Capacity Migration Policies for Information Lifecycle Management System
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Min-Feng Wang, Wei-Tsun Lin, Cheng-Hsien Tang, Meng-Feng Tsai
Issue Date:September 2010
pp. 503-508
To maintain very large amount of increasing dataset, it is critical to enforce the data migration policies across different levels of storage devices. The challenge is to achieve both low storage cost and response efficiency. In this paper, we will investi...
Identification of Boiling Two-phase Flow Patterns in Water Wall Tube Based on BP Neural Network
Found in: Electrical and Control Engineering, International Conference on
By Lei Guo, Shusheng Zhang, Yaqun Chen, Lin Cheng
Issue Date:June 2010
pp. 1150-1153
In this paper, the boiling phenomena of steam boiler under atmospheric pressure are simulated by using the UDF program of CFD software. Characteristics including pressure, temperature and vapor fraction respectively for bubble, slug and annular flow patter...
Torque Behavior of Electric Vehicle Change Mode Drive System
Found in: Computing, Control and Industrial Engineering, International Conference on
By Zhang Lipeng, Qi Bingnan, Lin Cheng
Issue Date:June 2010
pp. 87-90
In order to make full use of the advantages of existing vehicle electric drive systems and avoid their shortcomings, a two-motor drive system with the function of change modes between single motor drive, two motors joint drive and independent wheel drive w...
New Method for Suppliers Selection under Uncertain Environment of the Supply Chain
Found in: International Conference on E-Business and E-Government
By Zhengqing Luo,Lin Cheng,Hongqing Xiao
Issue Date:May 2010
pp. 4192-4195
Existing suppliers selection methods are mostly for certain environment. However, this environment is usually uncertain in practice. Therefore, the study of the suppliers selection under the uncertain environment has an important theoretical and practical ...
Research of Flow Boiling Bubble Dynamics in Vertical Rectangular Mini-channel
Found in: Power Electronics and Design, Asia-Pacific Conference on
By Lei Guo, Shusheng Zhang, Yaqun Chen, Lin Cheng
Issue Date:May 2010
pp. 16-19
Flow boiling in vertical rectangular mini-channel with width of 2mm and length of 390mm is studied in this paper. In single-side heating situation, the narrow channel is divided into three zones, bubbles generating zone, growth zone and annihilation zone. ...
A High-Speed and Memory Efficient Pipeline Architecture for Packet Classification
Found in: Field-Programmable Custom Computing Machines, Annual IEEE Symposium on
By Yeim-Kuan Chang, Yi-Shang Lin, Cheng-Chien Su
Issue Date:May 2010
pp. 215-218
Multi-field Packet classification is the main function in high-performance routers. The current router design goal of achieving a throughput higher than 40 Gbps and supporting large rule sets simultaneously is difficult to be fulfilled by software approach...
A Pair-wise Key Establishment for Wireless Sensor Networks
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hung-Min Sun, Yue-Hsun Lin, Cheng-Ta Yang, Mu-En Wu
Issue Date:September 2009
pp. 1152-1155
Random key pre-distribution scheme is a flexible key management scheme for wireless sensor networks. Recently, numerous related studies have been proposed. However, most of them have weaknesses. First of all, sensors require large storage to store keys in ...
The Kansei Research for MMFs Pattern of Product
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Li Lin, Cheng-Qi Xue
Issue Date:August 2009
pp. 164-167
For the problem of perceptual cognition about current products modeling features singly, this paper proposes a layered general deconstruction method to obtain all multi-dimensional modeling features (MMFs) by deconstructing the product’s components as huma...
An Improved Medical Image Registration Framework Based on Mutual Information
Found in: Intelligent Systems, WRI Global Congress on
By Anrong Yang, Caixing Lin, Cheng Wang, Hongqiang Li
Issue Date:May 2009
pp. 588-592
This paper presents an improved framework for medical images registration. Comparing with the previous registration framework, this framework uses the Mutual Information (MI) as main measure method and is more precise in image registration. Aside the input...
Study on Intelligent Control Strategy of Battery -- Electric Bus Based on the Fuzzy Comprehensive Evaluation Method
Found in: Intelligent Systems, WRI Global Congress on
By Lin Cheng, Zhou Hui, Sun Fengchun, Nan Jinrui
Issue Date:May 2009
pp. 328-332
How to use the lithium-ion power battery effectively, how to improve the discharging efficiency and the cycle-life of the power battery is a hotspot of research in battery-electric vehicle(BEV) field. The fuzzy comprehensive evaluation method is used to ev...
Computer Simulation of 3D Mask Image Based on Self-Adaptive Model in VLSI Lithography
Found in: Computer Science and Information Engineering, World Congress on
By Peng fei Cao, Lin Cheng, Xiao ping Zhang
Issue Date:April 2009
pp. 484-487
Because the defects of the scalar quantity method for calculating 3D mask under off-axis illumination and the rigorous electromagnetic simulation method, basing on the vector Hopkins formula inferred past work, a model of adaptive Gaussian filter with scal...
The Interaction between Land Market and Real Estate Market
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Zhang Hongli, Lin Cheng
Issue Date:December 2008
pp. 273-278
Land market and real estate market, housing price and land demand are closely related to each other. The price elasticity of land supply, floor area ratio and fee rate are the important variables that influence the land market and real estate market. By em...
A Chaos Based Unequal Encryption Mechanism in Mobile Medicine System
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chin-Feng Lin, Cheng-Hsing Chung, Zhi-Lu Chen, Chang-Jin Song, Zhi-Xiang Wang
Issue Date:November 2007
pp. 233-236
In this paper, we propose a chaos base unequal encryption mechanism for which can apply in mobile medicine system. A main idea for using chaos sequence is to increase the un- predication compared with other kind of random sequences. In addition, an essenti...
The Input-Interface of Webcam Applied in the Digital Content Interaction
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Huey-Min Sun, Wen-Lin Cheng
Issue Date:November 2007
pp. 31-34
Our research explores a virtual reality application based on Web camera (Webcam). The interface can replace with mouse by the frame difference method. We divide a frame into nine grids from Webcam and make use of the back- ground registration to compute mo...
 1  2 Next >>