Search For:

Displaying 1-50 out of 184 total
A breathing game with capacitive textile sensors
Found in: International Games Innovation Conference
By Chang-Ming Yang, Tsu-lin Yang, Chih-chung Wu,Narisa N. Y. Chu
Issue Date:November 2011
pp. 134-136
Computer games are developed to encourage practice of thoracic or abdominal breathing for physiological and pathological treatment. It is demonstrated by using an exercise shirt embedded with two sets of dual sensors controlled by LM555 and PIC24FJ256 micr...
A study on the data privacy and operation performance for cloud collaborative editing systems
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Sheng-Cheng Yeh,Wu-Hsiao Hsu,Ming-Yang Su,Chun-Yuen Lin
Issue Date:December 2012
pp. 591-596
This paper deals with the problem of collaboratively secure document editing in cloud environment. Using cloud document editing service, several users can create and edit a document collaboratively. However, as the cloud service provider is not trusted to ...
Dancing game by digital textile sensor, accelerometer and gyroscope
Found in: International Games Innovation Conference
By Chang-Ming Yang, Jwu-Sheng Hu, Ching-Wen Yang, Chih-Chung Wu, Narisa Chu
Issue Date:November 2011
pp. 121-123
A novel dancing game, comprised of pressure sensors on socks with accelerometer and gyroscope to detect the movement of the player, is presented. The firmware in microcontroller can judge the movement of the player with enough accuracy such that the player...
The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sheng-Cheng Yeh, Chia-Hui Wang, Wu-Hsiao Hsu, Ming-Yang Su
Issue Date:March 2011
pp. 77-80
The major part of the outdoor locating systems can be categorized into the following two approaches. One is based on the global positioning system (GPS), the other is based on the cellular network system. Although the approaches of these two major systems ...
An Efficient Algorithm for Detecting Closed Frequent Subgraphs in Biological Networks
Found in: BioMedical Engineering and Informatics, International Conference on
By Jia-yang Peng, Lu-ming Yang, Jian-xin Wang, Zheng Liu, Ming Li
Issue Date:May 2008
pp. 677-681
In this paper, aimed at the problem of detecting closed frequent subgraphs in biological networks, an improved FP-growth algorithm MaxFP is presented, which is based on the simplification model appropriate to biological networks. The defects of the algorit...
Construction of Application-Layer Multicast Trees for Message Distribution
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Hwa-Chun Lin, Tsung-Ming Lin, Cheng-Feng Wu, Hsiu-Ming Yang
Issue Date:September 2010
pp. 109-114
This paper considers the problem of constructing minimum-delay multicast trees for message dissemination in overlay networks in which nodal delays for processing messages are taken into account in addition to communication delays. The objective is to find ...
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Samuel Ieong, Ming-Yang Kao, Tak-Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Issue Date:March 2001
pp. 183
In this paper we investigate the computational problem of predicting RNA secondary structures that allow any kinds of pseudoknots. The general belief is that allowing pseudoknots makes the problem very difficult. Existing polynomial-time algorithms, which ...
Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Ming-Yang Su, Sheng-Cheng Yeh, Chun-Yuen Lin, Chen-Han Tsai
Issue Date:September 2010
pp. 582-587
This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association...
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao
Issue Date:September 2010
pp. 162-167
In this paper, IDS (Intrusion Detection System) nodes are deployed in MANETs in order to mitigate black hole attacks. The IDS nodes must be set in sniff mode in order to perform the so-called ABM (Anti-Blackhole Mechanism) function, which is mainly used to...
Establishment and Discussion of Traffic Accounting Matrix
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xiao-ming He, Ming Yang, Rong Lu
Issue Date:October 2008
pp. 364-367
The accounting matrix approach has been widely used in national accounting and development economics (social accounting matrix, SAM), it still never application of transportation. This paper introduced the characteristics of the communication and transport...
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ming-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei
Issue Date:March 2008
pp. 50-55
In the paper, we propose a fast algorithm to generate fuzzy association rules by incremental mining approach, for which the transactions or data records are online instantly collected from live packets. That is, as one data record is collected online, the ...
An Efficient and Secured Internet Key Exchange Protocol Design
Found in: Communication Networks and Services Research, Annual Conference on
By Ming-Yang Su, Jia-Feng Chang
Issue Date:May 2007
pp. 184-192
IPSec provides encryption and authentication on data packets protecting them from being eavesdropped or falsified. Prior to performing IPSec functions, shared session keys must be safely and secretly established between the two communication parties, usual...
Background Subtraction under Single Varying Illumination in Different Background Luminance
Found in: Future Networks, International Conference on
By Ming Yang Yang, Yang Bo, Men Ai Dong, Guo Yun Long
Issue Date:January 2010
pp. 24-28
Background subtraction is widely used in detecting moving objects in a static scene, which requires a fixed camera, and a static background. Most background subtract algorithms require the illumination changing slowly, so can be tracked and updated. If the...
Background Subtraction under Multiple Varying Illuminations in Different Background Luminance
Found in: Computer Modeling and Simulation, International Conference on
By Ming Yang Yang, Yang Bo, Men Ai Dong, Guo Yun Long
Issue Date:January 2010
pp. 189-193
Background subtraction is widely used in detecting moving objects in a static scene, which requires a fixed camera, and a static background. Most background subtract algorithms require the illumination changing slowly, so can be tracked and updated. If the...
Design and Simulation of Stepless-Speed Thermal Power and Propelling System Based on Variable-Fuel-Pump
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Zhao Kuan-Ming,Yang Cheng-Shi,Qian Zhi-Bo
Issue Date:January 2013
pp. 427-430
The Step less-Speed for operating performance of thermal propulsion system is a key technology to increase range of torpedo and increase probability of hitting. The paper presents the mathematical model of main parts', through analytic study of thermal tor...
Verification of Human Decision Models in Military Simulations
Found in: Asia International Conference on Modelling & Simulation
By Fei Liu, Ming Yang, Guobing Sun
Issue Date:March 2007
pp. 363-368
Human decision models, often represented as rules or predicates, are key components in most military simulations. Although there exist some verification techniques for rule bases, they are not enough to assure the correctness of human decision models. Base...
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms
Found in: Web Services, IEEE International Conference on
By Shi-Jinn Horng, Ming-Yang Su, Chao-Yi Wu
Issue Date:July 2005
pp. 783-784
Two main goals of our e-mail client system are filtering out junk e-mails and blocking e-mail sent out by malicious code. The famous Ling-Spam Corpus was experimented to show the good performance of our system. Moreover, our system can prevent malicious co...
Learning Mobile Security with Labware
Found in: IEEE Security & Privacy
By Prabir Bhattacharya,Li Yang,Minzhe Guo,Kai Qian,Ming Yang
Issue Date:January 2014
pp. 69-72
As smart mobile devices become increasingly popular, so do the incentives for attackers. Mobile devices' prevalence and mobile threats' rapid growth have resulted in a shortage of mobile-security personnel. We need educational activities to promote mobile-...
Work in progress: Real world relevant security labware for mobile threat analysis and protection experience
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Minzhe Guo,Prabir Bhattacharya,Ming Yang,Kai Qian,Li Yang
Issue Date:October 2012
pp. 1-2
To address the need for innovative mobile security learning materials and for promoting mobile security education, this paper presents our work-in-progress effort on developing a real-world relevant security labware to provide students with mobile threat a...
The Integration and Application of Machine Vision by Using Ultra-low Alignment Stage
Found in: International Conference on Robot, Vision and Signal Processing
By Chih-Chin Wen,Hui-Hung Lin,Shi-Wei Lin,Chorng-Tyan Lin,Chun-Ming Yang,Jwu-Jiun Yang
Issue Date:November 2011
pp. 98-101
Integrating machine vision and motion control method into a double layers alignment system is a popular issue in flat panel display and semiconductor industry. An ultra-low stage is considered to compensate the posture between the upper and nether misalign...
A Novel Algorithm Based on Conditional Entropy Established by Clustering for Feature Selection
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Ping Yang, Ming Yang
Issue Date:August 2009
pp. 410-415
Feature selection is an important issue in machine learning. Rough set theory is one of the important methods for feature selection. In rough set theory, feature selection has already been separately studied in algebra view and information view. Unfortunat...
MIC_FS : A novel model for feature selection by mutual information guided by clustering
Found in: Cognitive Informatics, IEEE International Conference on
By Ming Yang,Ping Yang
Issue Date:June 2009
pp. 390-398
Feature selection is an important problem for pattern classification systems. There are many methods for feature selection available, in which the feature selection method based on mutual information proposed by authors of Ref.[13] is one of the more effec...
Hypothesis-margin Model Incorporating Structure Information for Feature Selection
Found in: Electronic Commerce and Security, International Symposium
By Ming Yang, Ping Yang
Issue Date:May 2009
pp. 634-639
Iterative search margin based algorithm (Simba) has been proven effective for feature selection. However, the previously proposed model does not effectively utilize the structure information hidden in data which may have a great impact on the generalizatio...
Adaptive Control Scheme for a Process with Incorrect Adjustment
Found in: Intelligent Information and Database Systems, Asian Conference on
By Chung-Ming Yang, Su-Fen Yang
Issue Date:April 2009
pp. 404-409
This article considers an adaptive process control scheme for a process with incorrect adjustment. Incorrect adjustment of a process may result in shifts in both the process mean and variance,ultimately affecting the quality of products. We construct contr...
A Novel Approach of Rough Set-Based Attribute Reduction Using Fuzzy Discernibility Matrix
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Ming Yang, Songcan Chen, Xubing Yang
Issue Date:August 2007
pp. 96-101
Rough set approach is one of effective attribute reduction (also called a feature selection) methods that can preserve the meaning of the attributes(features). However, most of existing algorithms mainly aim at information systems or decision tables with d...
Semantic-Aware Co-indexing for Image Retrieval
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Shiliang Zhang,Ming Yang,Xiaoyu Wang,Yuanqing Lin,Qi Tian
Issue Date:December 2013
pp. 1673-1680
Inverted indexes in image retrieval not only allow fast access to database images but also summarize all knowledge about the database, so that their discriminative capacity largely determines the retrieval performance. In this paper, for vocabulary tree ba...
Regionlets for Generic Object Detection
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Xiaoyu Wang,Ming Yang,Shenghuo Zhu,Yuanqing Lin
Issue Date:December 2013
pp. 17-24
Generic object detection is confronted by dealing with different degrees of variations in distinct object classes with tractable computations, which demands for descriptive and flexible object representations that are also efficient to evaluate for many lo...
Collaborative Active Learning of a Kernel Machine Ensemble for Recognition
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Gang Hua,Chengjiang Long,Ming Yang,Yan Gao
Issue Date:December 2013
pp. 1209-1216
Active learning is an effective way of engaging users to interactively train models for visual recognition. The vast majority of previous works, if not all of them, focused on active learning with a single human oracle. The problem of active learning with ...
Bayesian Multi-Task Relationship Learning with Link Structure
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Yingming Li,Ming Yang,Zhongang Qi,Zhongfei Mark Zhang
Issue Date:December 2013
pp. 1115-1120
In this paper, we study the multi-task learning problem with a new perspective of considering the link structure of data and task relationship modeling simultaneously. In particular, we first introduce the Matrix Generalized Inverse Gaussian (MGIG) distrib...
The Methods for Solving Influence Diagrams: A Review
Found in: 2013 International Conference on Information Technology and Applications (ITA)
By Ming Yang,Lihua Zhou,Huifeng Ruan
Issue Date:November 2013
pp. 427-431
Influence diagrams (IDs) are one of the most commonly used graphical decision models for reasoning under uncertainty. Solving an ID means determining the optimal strategy for the decision maker and the value or certain equivalent of the decision situation ...
Research and Application of XMPP-Based Modules in B/S Architecture
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Yongqing Wang,Yan Chen,Ming Yang
Issue Date:June 2013
pp. 1562-1565
Enterprise Instant Message System (EIMS) has gradually replaced the traditional communication way in daily office work by instantly and effectively delivering all types of messages between the internal users. In order to realize real-time collaboration, re...
Sonic Millip3De: A massively parallel 3D-stacked accelerator for 3D ultrasound
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Richard Sampson,Ming Yang,Siyuan Wei,Chaitali Chakrabarti,Thomas F. Wenisch
Issue Date:February 2013
pp. 318-329
Three-dimensional (3D) ultrasound is becoming common for non-invasive medical imaging because of its high accuracy, safety, and ease of use. Unlike other modalities, ultrasound transducers require little power, which makes hand-held imaging platforms possi...
3D Convolutional Neural Networks for Human Action Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Shuiwang Ji, Wei Xu, Ming Yang, Kai Yu
Issue Date:January 2013
pp. 221-231
We consider the automated recognition of human actions in surveillance videos. Most current methods build classifiers based on complex handcrafted features computed from the raw inputs. Convolutional neural networks (CNNs) are a type of deep model that can...
Knowledge-Based Simulation Experiment Data Integrative Analysis Technology
Found in: 2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation (PADS)
By Song Jiao,Wei Li,Ping Ma,Ming Yang
Issue Date:July 2012
pp. 165-167
The knowledge-based simulation experiment data integrative analysis tool that utilizes the knowledge model of sample data extraction and the database of analysis project is designed to implement the integrative analysis operation including simulation exper...
0-1 Mixed Integer Programming for a Newly Merged Metropolis to Develop MSW Management Systems
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Edward Ming-Yang Wu,Li-De Shie
Issue Date:May 2012
pp. 1140-1143
Kaohsiung City and County, had been merged into one administrative entity on 25, Dec. 2010. A New plan for managing the municipal solid wastes (MSW) has to be implemented in time in order to provide services of equal quality to all residents without delay....
The Effect of VHS Specific siRNA on Herpes Simplex Virus-1 Replication
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Liyuan Sun,Limei Liu,Yundong Zhao,Ming Yang
Issue Date:May 2012
pp. 1109-1112
Objective-- To explore the effects of siRNA targeting to Virion host shutoff protein (VHS) on HSV-1 replication in vero cell. Methods--Three kinds of siRNAs were Tran scripted in vitro using T7RNA polymerase according to the principle of siRNA design. The ...
Complexity-rate-distortion evaluation of video encoding for cloud media computing
Found in: Networks, IEEE International Conference on
By Ming Yang, Jianfei Cai, Yonggang Wen, Chuan Heng Foh
Issue Date:December 2011
pp. 25-29
Cloud computing provides a promising solution to cope with the increased complexity in new video compression standards and the increased data volume in video source. It not only saves the cost of too frequent equipment upgrading but also gives individual u...
Contextual weighting for vocabulary tree based image retrieval
Found in: Computer Vision, IEEE International Conference on
By Xiaoyu Wang, Ming Yang,Timothee Cour,Shenghuo Zhu, Kai Yu,Tony X. Han
Issue Date:November 2011
pp. 209-216
In this paper we address the problem of image retrieval from millions of database images. We improve the vocabulary tree based approach by introducing contextual weighting of local features in both descriptor and spatial domains. Specifically, we propose t...
An efficient SVM-based method for multi-class network traffic classification
Found in: IEEE International Performance Computing and Communications Conference
By Ning Jing,Ming Yang,Shaoyin Cheng,Qunfeng Dong,Hui Xiong
Issue Date:November 2011
pp. 1-8
Multi-class network traffic classification is a fundamental function for network services and management. Support vector machine (SVM) based network traffic classification has recently attracted increasing interest, for its high accuracy and low training s...
The Web Information Extraction for Update Summarization Based on Shallow Parsing
Found in: P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on
By Min Peng,Xiaoxiao Ma,Ye Tian,Ming Yang,Hua Long,Quanchen Lin,Xiaojun Xia
Issue Date:October 2011
pp. 109-114
Traditional text information extraction methods mainly act on static documents and are difficult to reflect the dynamic evolvement of information update on the web. To address this challenge, this work proposes a new method based on shallow parsing with ru...
A GA-Based Approach to Resource Scheduling Supporting Flexible Quality Management of Ubiquitous Services
Found in: Computational Intelligence and Communication Networks, International Conference on
By Mong-Fong Horng,Yen-Ching Chan,Yau-Hwang Kuo,Chia-Ming Yang,Jang-Pong Hsu
Issue Date:October 2011
pp. 27-31
In ubiquitous services, concurrent requests from various services for limited service resources such as network bandwidth, easily lead to a problem of resource insufficiency. The resource scheduling for ubiquitous services is the key to improve the tradeof...
Optimization of the Titania Humidity Sensor Equivalent Circuit Model Based on Genetic Algorithms
Found in: Digital Manufacturing and Automation, International Conference on
By Gang Liu,Xingcheng Wang,Kai Zheng,Ming Yang
Issue Date:August 2011
pp. 821-825
Taking the parameters of the Titania humidity sensor equivalent cirCuit model as an optimizing object, this paper proposes an optimization model to improve equivalent cirCuits based on genetic algorithms. ELitist strategy is added into the selection option...
DC-MAC: A data-centric multi-hop MAC protocol for underwater acoustic sensor networks
Found in: Computers and Communications, IEEE Symposium on
By Ming Yang, Mingsheng Gao, Chuan Heng Foh, Jianfei Cai,P. Chatzimisios
Issue Date:July 2011
pp. 491-496
Due to the unique characteristics of long signal propagation, high error rate and low bandwidth in the underwater environment, the design of the medium access control (MAC) protocol for underwater acoustic networks poses significant challenges. The previou...
Large-scale image classification: Fast feature extraction and SVM training
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Yuanqing Lin, Fengjun Lv, Shenghuo Zhu, Ming Yang,T. Cour, Kai Yu, Liangliang Cao,T. Huang
Issue Date:June 2011
pp. 1689-1696
Most research efforts on image classification so far have been focused on medium-scale datasets, which are often defined as datasets that can fit into the memory of a desktop (typically 4G~48G). There are two main reasons for the limited effort on large-sc...
Correspondence driven adaptation for human profile recognition
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Ming Yang, Shenghuo Zhu, Fengjun Lv, Kai Yu
Issue Date:June 2011
pp. 505-512
Visual recognition systems for videos using statistical learning models often show degraded performance when being deployed to a real-world environment, primarily due to the fact that training data can hardly cover sufficient variations in reality. To alle...
Mining discriminative co-occurrence patterns for visual recognition
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Junsong Yuan, Ming Yang, Ying Wu
Issue Date:June 2011
pp. 2777-2784
The co-occurrence pattern, a combination of binary or local features, is more discriminative than individual features and has shown its advantages in object, scene, and action recognition. We discuss two types of co-occurrence patterns that are complementa...
An Enhanced Power Control Transmission Scheme Based on CVIA
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ming-Yang Chen, Ya-Chun Li, Tin-Yu Wu, Wei-Tsong Lee
Issue Date:March 2011
pp. 826-829
This paper designs a new scheme based on Controlled Vehicular Internet Access (CVIA), a protocol that divides a straight road into several segments. To avoid hidden nodes and reduce unnecessary CTS/RTS, vehicles send the packet to the RSU segment by segmen...
Approximation and Heuristic Algorithms for End-System Based Application-Layer Multicast for Voice Conferences
Found in: Advanced Information Networking and Applications, International Conference on
By Hwa-Chun Lin, Hsiu-Ming Yang
Issue Date:March 2011
pp. 517-525
This paper studies the problem of constructing application-layer multicast trees for end-system based voice conferences in which voice mixing and replication are performed at end systems. This problem is formulated as a degree-constrained node-weighted Ste...
A Technology Based Benefit Analysis on Reuse of Vector Register for SIMD Vectorization Optimization
Found in: Information Science and Engieering, International Symposium on
By Ming Yang, Yuan Yao, Shuai Wei, Yuanyuan Zhang, Lei Huang
Issue Date:December 2010
pp. 101-104
The reuse-rate of vector register is one of the most important aspects that influence the SIMD performance. However, the reuse of vector register probably can lead ton on-continuous memory access and non-hit of cache. Based on register reuse analysis, we e...
MT3-DA: Multicast Optimization Mechanism Based on Transmission Time and Interference Minimization in WMNs
Found in: Grid and Cloud Computing, International Conference on
By Wei Wang, Junzhou Luo, Ming Yang, Wenjia Wu
Issue Date:November 2010
pp. 344-349
Multicast support is critical and a desirable feature of multi-radio wireless mesh networks. However, the nature of wireless network, i.e. broadcasting and interference, makes it a challenge to efficiently support multicast services. In this paper, we stud...
 1  2 Next >>