Search For:

Displaying 1-50 out of 82 total
An Efficient Method to Improve the Quality of Watermarked Cover Image
Found in: Distributed Computing Systems Workshops, International Conference on
By Wen-Shyong Hsieh, Chuan-Fu Wu, Jen-Yi Huang, Jyh-Long Lin, Buh-Yun Sher
Issue Date:July 2002
pp. 267
In this paper, a general concept called n+k/n method is introduced. In n+k/n method, a special mapping function is defined to map an intermediate set with n+k bits into n bits information set. In the embedding process, the intermediate set is embedded into...
Applying Fuzzy Model on the Evaluation of Library Service Quality
Found in: Hybrid Intelligent Systems, International Conference on
By Tien-Tsai Huang, Su-Yi Huang, Yi-Hui Chen
Issue Date:August 2009
pp. 73-77
In recent years, the existing universities of Taiwan face crucial competition due to the multiple impact of the decreasing rate of birth, widespread establishment of new universities, and the opening of branch divisions of foreign universities in Taiwan. I...
ID-Based PPM for IP Traceback
Found in: Innovative Computing ,Information and Control, International Conference on
By Yu-Kuo Tseng, You-Yi Lu, Jen-Yi Huang, Wen-Shyong Hsieh, Bao-Rong Chang, Yu-Chang Chen, Shi-Huang Chen
Issue Date:September 2006
pp. 262-265
A modified scheme in probabilistic packet marking (PPM) for IP traceback against distributed denial-ofservice attack is presented. This method, ID-based PPM, is proposed to improve the original PPM?s complexity of fragments combination through clustering t...
A New Localization Algorithm of Mobile Phone for Outdoor Emergency Rescue
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Xin Ma,Quan-Yi Huang,Xue-Ming Shu
Issue Date:January 2013
pp. 124-127
In outdoor emergency rescue, it is of utmost importance to acquire the location of trapped people, the more quickly and precisely the location can be determined, the more chance can be saved for the victims. Taking a mobile phone of trapped people as a loc...
A probabilistic analysis method for functional qualification under Mutation Analysis
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Hsiu-Yi Lin, Chun-Yao Wang, Shih-Chieh Chang, Yung-Chih Chen, Hsuan-Ming Chou, Ching-Yi Huang, Yen-Chi Yang, Chun-Chien Shen
Issue Date:March 2012
pp. 147-152
Mutation Analysis (MA) is a fault-based simulation technique that is used to measure the quality of testbenches in error (mutant) detection. Although MA effectively reports the living mutants to designers, it suffers from the high simulation cost. This pap...
On rewiring and simplification for canonicity in threshold logic circuits
Found in: Computer-Aided Design, International Conference on
By Pin-Yi Kuo,Chun-Yao Wang,Ching-Yi Huang
Issue Date:November 2011
pp. 396-403
Rewiring is a well developed and widely used technique in the synthesis and optimization of traditional Boolean logic designs. The threshold logic is a new alternative logic representation to Boolean logic which poses a compactness characteristic of repres...
A Multiple LID Routing Scheme for Fat-Tree-Based InfiniBand Networks
Found in: Parallel and Distributed Processing Symposium, International
By Xuan-Yi Lin, Yeh-Ching Chung, Tai-Yi Huang
Issue Date:April 2004
pp. 11a
In a cluster system, performance of the interconnection network greatly affects the computation power generated together from all interconnected processing nodes. The network architecture, the interconnection topology, and the routing scheme are three key ...
Adaptive-Acceleration Data Center TCP
Found in: IEEE Transactions on Computers
By Tao Zhang,Jianxin Wang,Jiawei Huang,Yi Huang,Jianer Chen,Yi Pan
Issue Date:August 2014
pp. 1
Providing deadline-sensitive services is a challenge in data centers. Because of the conservativeness in additive increase congestion avoidance, current transmission control protocols are inefficient in utilizing the super high bandwidth of data centers. T...
Hierarchy-Regularized Latent Semantic Indexing
Found in: Data Mining, IEEE International Conference on
By Yi Huang, Kai Yu, Matthias Schubert, Shipeng Yu, Volker Tresp, Hans-Peter Kriegel
Issue Date:November 2005
pp. 178-185
Organizing textual documents into a hierarchical taxonomy is a common practice in knowledge management. Beside textual features, the hierarchical structure of directories reflect additional and important knowledge annotated by experts. It is generally desi...
Application of Data Mining on HPLC Fingerprints of Szechwan Lovage Rhizome Analysis
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Chun-Yi Huang,Sheng-Feng Shi,Zhen Liu,Wei-Ping Huang
Issue Date:December 2013
pp. 560-564
Based on the integration of Java language and open-source R software environment, the article was developed a Traditional Chinese Medicine fingerprints analysis and visualization system and taken Szechwan Lovage Rhizome HPLC fingerprints as the study objec...
Using "Learning Video Portfolio" to Enhance Students' Metacognition in Authentic Learning
Found in: 2012 IEEE 12th International Conference on Advanced Learning Technologies (ICALT)
By Ching-Yi Huang,Chi-Wen Huang,Chia-Jung Wu,Gwo-Dong Chen,Kuang-Hung Chiang
Issue Date:July 2012
pp. 613-617
This study used learning video portfolio to improve student's metacognition through actual learning. LVP lets students have the opportunity to review and self-assess: learning through imitation, self-monitoring, teacher assessment, expert reference system,...
Scalable and Reliable Live Streaming Service through Coordinating CDN and P2P
Found in: Parallel and Distributed Systems, International Conference on
By Zhi Hui Lu,Xiao Hong Gao,Si Jia Huang,Yi Huang
Issue Date:December 2011
pp. 581-588
In order to fully utilize CDN network edge nearby transmission capability and P2P scalable end-to-end transmission capability, while overcoming CDN's limited service capacity and P2P's dynamics, we need to combine the CDN and P2P technologies together. In ...
Analysis of the Life Cycle Cost of the Power Plants Based on Analytic Hierarchy Process Method
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Huang Yi, Huang Wen-jie
Issue Date:December 2009
pp. 639-642
China has experienced fascinating economic growth trajectory with huge energy consumption resulting therefrom over the past two decades. Meanwhile, the environmental problem and sustainable development view has been increasingly attracting emphasis by the ...
SCALLOP: A Scalable and Load-Balanced Peer-to-Peer Lookup Protocol
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jerry C.-Y. Chou, Tai-Yi Huang, Kuang-Li Huang, Tsung-Yen Chen
Issue Date:May 2006
pp. 419-433
<p><b>Abstract</b>—A number of structured peer-to-peer (P2P) lookup protocols have been proposed recently. A P2P lookup protocol routes a lookup request to its target node in a P2P distributed system. Existing protocols achieve balanced r...
LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems
Found in: Parallel and Distributed Processing Symposium, International
By Kuang-Li Huang, Tai-Yi Huang, Jerry C. Y. Chou
Issue Date:April 2004
pp. 82b
The technique of replicating frequently-accessed files to other nodes has been widely used in a high-performance distributed system to reduce the load of the nodes hosting these files. Traditional file replication algorithms rely on the analysis of client-...
Sign language recognition using 3-D Hopfield neural network
Found in: Image Processing, International Conference on
By Chung-Lin Huang, Wen-Yi Huang, Cheng-Chang Lien
Issue Date:October 1995
pp. 2611
This paper presents a sign language recognition system which consists of three modules: model-based hand tracking, feature extraction, and gesture recognition using a 3-D Hopfield neural network. In the experiments, we illustrate that this system can recog...
A Method for the Fast Security Evaluation of Surface Drinking Water Sources in Western Mountain Areas
Found in: 2013 International Conference on Information Technology and Applications (ITA)
By Yang Li,Yi Huang,Dinggui Luo
Issue Date:November 2013
pp. 134-137
Due to the nonpoint pollution of drinking water sources in western mountain areas and the lack of relevant monitoring data, four security indexes (water quality risk, water supply and demand ratio, water and soil erosion and flood control) are used to desc...
Routability optimization for crossbar-switch structured ASIC design
Found in: ACM Transactions on Design Automation of Electronic Systems (TODAES)
By Hung-Yi Li, Mei-Hsiang Tsai, Po-Yang Hsu, Yi-Huang Hung, Yi-Yu Liu
Issue Date:July 2013
pp. 1-28
In the routing architecture of a structured application-specific integrated circuit (ASIC), the crossbar is one of the most area-efficient switch blocks. Nevertheless, a dangling wire occurs when there is a routing bend in a crossbar switch. Dangling wires...
Research of Dynamic Characteristics of Shafts for Hybrid Power System
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Deng Yi,Huang Zhonghua,Liu Zhi
Issue Date:January 2013
pp. 1116-1119
Hybrid power excavator technology is the frontier of the excavator technological innovation currently. The shafting analysis of power system is one of the most important research contents of Hybrid power excavator technology. A simulation has been made of ...
Using Partially Overlapping Channels to Improve Throughput in Wireless Mesh Networks
Found in: IEEE Transactions on Mobile Computing
By Yong Ding,Yi Huang,Guokai Zeng,Li Xiao
Issue Date:November 2012
pp. 1720-1733
Wireless mesh networks have attracted great interest in the research community recently. Much effort has been devoted to maximizing the network performance using limited channel resources in a multichannel multiradio wireless mesh network. It is believed t...
Design and Implementation of Instantly Deployable Localization System in Remote Areas
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Xin Ma,Quan-Yi Huang,Xue-Ming Shu,Shuang-Hua Yang
Issue Date:November 2012
pp. 265-268
One of the most important information in outdoor emergency rescue is the location of the trapped people. The more quickly and precisely the location can be determined, the more chance the victims can be saved. In this paper, an instantly deployable localiz...
A time synchronization mechanism based on Software Defined Radio of general-purpose processor
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Hongliang Duan, Dengshan Huang, Yi Huang, Yiqing Zhou, Jinglin Shi
Issue Date:August 2012
pp. 772-777
In recent years, Software Defined Radio (SDR) has become one of the major research concerns in mobile communications for the advantages of flexibility and versatility. Most of the air-interface processes such as signal processing and data multiplexing are ...
E-commerce Entrepreneurship Education Research of College Students Majoring in Ceramics Art Design
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Fubao He,Yilai Zhang,Yi Huang
Issue Date:August 2012
pp. 758-760
With the rapid development of E-commerce, in order to carry out entrepreneurship education for college students majoring in ceramics art design better, we attempt to integrate ceramics customization function on the basis of the existing ceramics e-commerce...
Phosphorus Leaching from a Gley Meadow Soil in Relation to Soil Fertility Level and Fertilizer Application
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Fei Lu,Zhao Muqiu,Chen Xin,Shi Yi,Huang Bin
Issue Date:March 2012
pp. 493-496
The influence of fertilizer application on leaching of phosphorus in a gley meadow soil at low-, medium and high fertility levels was studied using unsaturated intact soil columns. The soil column at each fertility level received three fertilization treatm...
New Reverse Converter Design of Moduli Set {2n, 2n+1-1, 2n-1}
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Yuan-Chingkuo, Ming-Hwasheu,Siang-Min Siao,Cheng-Yi Huang,Tzu-Hsiung Chen
Issue Date:December 2011
pp. 253-256
An efficient design of the reverse converter for the three-moduli set {2n, 2n+1-1, 2n-1} is presented in this paper. The reverse converter  is structured by an adder based on New Chinese Remainder Theorem II (New CRT-II) conversion such that it can impro...
Sample Assignment for Ensuring Sensing Quality and Balancing Energy in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Edward T.-H. Chu, Hsin-Ju Lee, Tai-Yi Huang, Chung-Ta King
Issue Date:September 2011
pp. 1578-1584
The quality of an environmental monitoring application can often be measured by the number of samples collected per unit time. This is to guarantee the reconstruction of the monitored signal. For applications that use wireless sensors for untethered monito...
Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics
Found in: IEEE Intelligent Systems
By Davide Barbieri,Daniele Braga,Stefano Ceri,Emanuele Della Valle,Yi Huang,Volker Tresp,Achim Rettinger,Hendrik Wermser
Issue Date:November 2010
pp. 32-41
A combined approach of deductive and inductive reasoning can leverage the clear separation between the evolving (streaming) and static parts of online knowledge at conceptual and technological levels.
Research on Conception Model of Information Naval Gun Weapon System Using Systematic Method
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By De-hu Wang, Xu-wen Sun, Jiang Bai, Song-tao Sun, Yi Huang
Issue Date:November 2010
pp. 168-170
Lining along systematic method, aiming at systematic, whole, accuracy description and definition of the conception system, following the steps of synthesis—analysis—synthesis, this article establishes the conception model of information naval gun weapon sy...
Research on Structural Model of Information Naval Gun Weapon System
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Xu-wen Sun, Hong-yan Shan, Chuan-fu Guo, Yi Huang
Issue Date:November 2010
pp. 164-167
Studying on the new type of weapon system— information naval gun weapon system, according to weapon system engineering, using systematic theory and method, by means of ISM, the structure of information naval weapon system is analyzed, and finally the struc...
Design, Investigation and Optimization of a Compact UWB Antenna
Found in: Wireless and Mobile Communications, International Conference on
By Eng Gee Lim, Jianwei Hang, Zhao Wang, Yi Huang
Issue Date:September 2010
pp. 97-101
In this paper, a simple, low-profile, and wideband planar antenna with a pure rectangular radiator fed by a simple 50Ω microstrip line for multiple applications is designed. By investigating the feeding position and ground plane size, the antenna is proper...
DICOM Communication Mechanism and Engineering Project Integration Based on ESB
Found in: Information Engineering, International Conference on
By Chongwen Wang, Yi Huang
Issue Date:August 2010
pp. 119-122
Through mastering DICOM standard of communication, a communication mechanism is developed, which accords with the DICOM standard communication mechanism above ESB structure. It certified to insert the heterogeneous application in accordance with the DICOM ...
A Security Model Based on Database System
Found in: Electrical and Control Engineering, International Conference on
By Yi Huang, Xinqiang Ma
Issue Date:June 2010
pp. 4954-4957
This paper proposed a formalize method of mandatory access control (MAC) model for multilevel secure DBMS and discussed the problems of labeling object in tuples, and security label, and covert channels. Mandatory access control (MAC) model requires that a...
A Security Model Based on Lattice
Found in: Electrical and Control Engineering, International Conference on
By Xinqiang Ma, Yi Huang, Danning Li
Issue Date:June 2010
pp. 4958-4961
In order to protect confidentiality and integrity of information in the computer information systems, in general, we need to follow some security polices to access and handle information. The BLP model only to resolve the confidentiality problem, and the B...
Design of CAN Bus Data Processing System
Found in: Electrical and Control Engineering, International Conference on
By Zhiwei Du, Yi Huang
Issue Date:June 2010
pp. 5127-5129
Data processing is one of the most important sectors in CAN bus system. The paper design a universal CAN Bus data processing system. Describing block diagram, building processing method library with flexible way, it also design Data Processing procedure. U...
Research on Network of Relationship in the Large Software Research and Development Team Based on Complex Network Theory
Found in: Information and Computing Science, International Conference on
By Yao Yi, Huang Song, Hu Bin, Liu Xiao-ming
Issue Date:June 2010
pp. 285-288
The size of present software research and development enterprises becomes bigger and bigger. Such relationships of members of software research and development team constitute of the network which can be studied by applying the correlation theories, the me...
Electronic Business Technology and its Security Problems
Found in: International Conference on E-Business and E-Government
By Yi Huang,Xinqiang Ma
Issue Date:May 2010
pp. 30-33
This paper discusses two main ideas, Electronic Business Technology and its Security Problems. E-Business relies upon a wide range of technologies. Here we examine the more vital technologies for electronic Business. Included Networks, E-mail, The Word Wid...
A time-to-digital converter using multi-phase-sampling and time amplifier for all digital phase-locked loop
Found in: Design and Diagnostics of Electronic Circuits and Systems
By Kuo-Hsing Cheng, Chang-Chien Hu, Jen-Chieh Liu, Hong-Yi Huang
Issue Date:April 2010
pp. 285-288
This work presents a high timing resolution and wide measured timing range time-to-digital converter (TDC) for all digital phase-locked loop (ADPLL). The multi-phase outputs of digital controlled oscillator (DCO) utilize to sample the timing difference and...
Perturbation Modelling of a Corner Deleted Circular Polarised Microstrip Antenna with Offset Feed
Found in: Communications and Mobile Computing, International Conference on
By Eng Gee Lim, Yi Huang, Vui Kien Liau
Issue Date:April 2010
pp. 127-129
A perturbation model with a single-offset microstrip feed is used in the design of a corner-deleted square patch microstrip antenna. It is shown that the use of the offset-feed significantly increases the size of the deleted segments and thus relaxing the ...
A Mobile Agent and Snort Based Distributed Intrusion Detection System
Found in: Software Engineering, World Congress on
By Xiao-Ling Ye, Ying-Chao Zhang, Chao-Long Zhang, Chao Chen, Xin-Yi Huang
Issue Date:May 2009
pp. 281-285
Nowadays with the growing scale of computer network as well as the number of nodes, the traditional method of mobile agent based distributed intrusion detection system may cause severe problem of network congestion and time delay, for the data processing o...
0.5V 160-MHz 260uW all digital phase-locked loop
Found in: Design and Diagnostics of Electronic Circuits and Systems
By Jen-Chieh Liu, Hong-Yi Huang, Wei-Bin Yang, Kuo-Hsing Cheng
Issue Date:April 2009
pp. 186-193
A low power all-digital phase locked-loop (ADPLL) in a 0.13um CMOS process is presented. The pulse-based digitally controlled oscillator (PB-DCO) performs a high resolution and wide range. The locking time of ADPLL is less then 32 reference clock cycles. T...
Analysis and optimization of ring oscillator using sub-feedback scheme
Found in: Design and Diagnostics of Electronic Circuits and Systems
By Hong-Yi Huang, Fu-Chien Tsai
Issue Date:April 2009
pp. 28-29
This work proposes a topology using a ring oscillator with sub-feedback loops to generate multiple phases. It is composed of an N-stage main ring (arbitrary N larger than 3) and k-stage sub-feedback loops, where k is not the common divisor of N, N output p...
Message from APESER organization committee
Found in: Parallel and Distributed Systems, International Conference on
By Shiao-Li Tsao, Tai-Yi Huang, John Kar-kin Zao, Jogesh K. Muppala, Chi-Sheng Shih
Issue Date:December 2007
pp. 1
No summary available.
An Efficient Real-Time Disk-Scheduling Framework with Adaptive Quality Guarantee
Found in: IEEE Transactions on Computers
By Cheng-Han Tsai, Tai-Yi Huang, Edward Chu, Chun-Hang Wei, Yu-Che Tsai
Issue Date:May 2008
pp. 634-657
A multimedia server requires a real-time disk-scheduling algorithm to deliver isochronous data for real-time streams. Traditional disk-scheduling algorithms focus on providing good quality in a best-effort manner. In this paper, we propose a novel real-tim...
Mixture Experiment Design Using Artificial Neural Networks and Electromagnetism-like Mechanism Algorithm
Found in: Innovative Computing ,Information and Control, International Conference on
By Hsu-Hwa Chang, Teng-Yi Huang
Issue Date:September 2007
pp. 397
A mixture experiment treats a product that is formed of several ingredients together (e.g. gasoline, detergents, and cookies). A mixture experiment is a special type of parameter in which the factors are the ingredients or components of a mixture. Although...
RBF Neural Network Based on Genetic Algorithm Used in Line Loss Calculation for Distribution Network
Found in: International Conference on Natural Computation
By Huilan Jiang, Yunzhou Yuan, Yi Huang, Guixin Li
Issue Date:August 2007
pp. 338-342
In this paper, RBF neural network (RBFNN) based on Genetic Algorithm (GA) optimization is presented to deal with line losses calculation for power distribution networks. The centers and widths of hidden layer and the weights of the output layer are coded i...
Discovering Conversations in Web Services Using Semantic Correlation Analysis
Found in: Web Services, IEEE International Conference on
By Wim De Pauw, Robert Hoch, Yi Huang
Issue Date:July 2007
pp. 639-646
<p>Composite business applications typically combine characteristics of workflow and transactional applications. In order to handle multiple concurrent sessions and conversations across different nodes and over an extended time period, these applicat...
LA-TinyOS: a locality-aware operating system for wireless sensor networks
Found in: Proceedings of the 2007 ACM symposium on Applied computing (SAC '07)
By Chung-Ta King, Edward T.-H. Chu, Huang-Yi Yu, Kai-Yuan Hou, Tai-Yi Huang
Issue Date:March 2007
pp. 1151-1158
A number of WSN (wireless sensor networks) applications have been deployed to monitor the environment periodically and identify anomalous events. Anomalous events occur rarely. However, when an anomaly event occurs, it often carries temporal and spatial lo...
A Near-optimal Solution for the Heterogeneous Multi-processor Single-level Voltage Setup Problem
Found in: Parallel and Distributed Processing Symposium, International
By Tai-Yi Huang, Yu-Che Tsai, Edward T.-H. Chu
Issue Date:March 2007
pp. 57
A heterogeneous multi-processor (HeMP) system consists of several heterogeneous processors, each of which is specially designed to deliver the best energy-saving performance for a particular category of applications. A low-power real-time scheduling algori...
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Zheng-Yi Huang, Sheng-De Wang
Issue Date:December 2006
pp. 221-229
A fundamental problem in peer-to-peer streaming is how to select peers with desired media data so that the best possible streaming quality can be maintained. In this paper, we propose an outbound bandwidth based streaming model in which peers are layered a...
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
Found in: Grid Computing, IEEE/ACM International Workshop on
By Shrideep Pallickara, Marlon Pierce, Harshawardhan Gadgil, Geoffrey Fox, Yan Yan, Yi Huang
Issue Date:September 2006
pp. 215-222
In this paper, we present a framework for the secure end-to-end delivery of messages in distributed messaging infrastructures based on the publish/subscribe paradigm. The framework enables authorized publishing and consumption of messages. Brokers, which c...
 1  2 Next >>