Search For:

Displaying 1-50 out of 482 total
Digital Instrumentation and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor
Found in: Dependability of Computer Systems, International Conference on
By Hui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Chun-Yu Chen, Wan-Tsz Tu, Swu Yih, Chang Tzeng, Cherng-Tsong Kuo, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Chun-Yu Chen, Wan-Tsz Tu
Issue Date:May 2006
pp. 327-334
This research adopted Personal Computer Transient Analyzer- Advanced Boiling Water Reactor version (PCTran-ABWR) simulation computer code to analyze the software safety issue for a generic ABWR. A number of postulated instrumentation and control (I&C) ...
 
A Wireless Human Motion Capturing System for Home Rehabilitation
Found in: Mobile Data Management, IEEE International Conference on
By Yu-Chee Tseng, Chin-Hao Wu, Fang-Jing Wu, Chi-Fu Huang, Chung-Ta King, Chun-Yu Lin, Jang-Ping Sheu, Chun-Yu Chen, Chi-Yuan Lo, Chien-Wen Yang, Chi-Wen Deng
Issue Date:May 2009
pp. 359-360
Following the trend of miniature intelligent sensing, wearing small, integrated wireless sensor nodes, such as one with accelerometers and compasses, to capture human body motions may have many applications in medical care and computer animation. In this p...
 
Filtering of Shrew DDoS Attacks in Frequency Domain
Found in: Local Computer Networks, Annual IEEE Conference on
By Yu Chen, Kai Hwang, Yu-Kwong Kwok
Issue Date:November 2005
pp. 786-793
<p>The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks...
 
Automatic Test Wrapper Synthesis for a Wireless ATE Platform
Found in: IEEE Design and Test of Computers
By Chun-Yu Yang, Ying-Yen Chen, Sung-Yu Chen, Jing-Jia Liou
Issue Date:May 2010
pp. 31-41
<p>To ensure reliable test data communication in a wireless test system, information can be encapsulated in packets equipped with error correction and retransmission capability. Systems employing such an approach require a complex test interface (tes...
 
Protection of Database Security via Collaborative Inference Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yu Chen, Wesley W. Chu
Issue Date:August 2008
pp. 1013-1027
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation detection system to protect sensitive data content. Based on data dependency, ...
 
Effective Skew Handling for Parallel Sorting in Multiprocessor Database Systems
Found in: Parallel and Distributed Systems, International Conference on
By Yu-lung Lo, Yu-chen Huang
Issue Date:December 2002
pp. 151
A consensus on parallel architecture for very large database management has emerged. This architecture is based on a shared-nothing hardware organization. The computation model is very sensitive to skew in tuple distribution, however. Sorting operation is ...
 
Real-Time Depth Image based Rendering Hardware Accelerator for Advanced Three Dimensional Television System
Found in: Multimedia and Expo, IEEE International Conference on
By Wan-yu Chen, Yu-lin Chang, Hsu-kuang Chiu, Shao-yi Chien, Liang-gee Chen
Issue Date:July 2006
pp. 2069-2072
3D TV will become a prominent technology in the next generation. In this paper, a depth image based rendering system is proposed from algorithm level to hardware architecture level. We propose a novel depth image based rendering algorithm with edge-depende...
 
Efficient Depth Image Based Rendering with Edge Dependent Depth Filter and Interpolation
Found in: Multimedia and Expo, IEEE International Conference on
By Wan-Yu Chen, Yu-Lin Chang, Shyh-Feng Lin, Li-Fu Ding, Liang-Gee Chen
Issue Date:July 2005
pp. 1314-1317
An efficient depth image based rendering with edge dependent depth filter and interpolation is proposed. The proposed method can solve the hole-filling problem in DIBR system efficiently with high quality. The PSNR of the proposed method is better than the...
 
A Green Context-Aware Platform for Smart Living
Found in: 2013 IEEE 6th International Conference on Service-Oriented Computing and Applications (SOCA)
By Chun-Yu Chen,Yu-Jen Ku,Chih-Wei Ho,Yan-Ze Lin,Chung-Ting Chou
Issue Date:December 2013
pp. 275-281
Smart living has always been considered as a killer application when new technologies emerged. It is envisioned that smart living will enable a healthier, safer and more comfortable life while reducing resource consumption. Unfortunately, adoption of smart...
 
Baculovirus-Mediated Gene Delivery for Bone Engineering
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yu-Chen Hu,Chin-Yu Lin
Issue Date:May 2012
pp. 976-977
Baculovirus has emerged to be a promising gene delivery vector and adipose-derived stem cells have captured interests for bone regeneration. Massive segmental defects arising from trauma or tumor resection remain a challenging clinical problem. To heal mas...
 
The Sustained Exhilarating Cardiac Responses after Listening to the Very Fast and Complex Rhythm
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Chung-Hung Hong,Wei-Ta Hsiao,Hui-Min Wang,Sheng-Chieh Huang,Kai-Yu Shao,Shi-Han Luo,Wei-Chun Chiu,Yung-Pin Lee,Mark C. Hou,Shih-Chun Chao,Cheng-Lung Tseng,Wei-Yu Chen
Issue Date:December 2011
pp. 53-56
In recent years, there has been a dramatic proliferation of research concerned with heart rate variability (HRV) analysis. Heart rate variability (HRV) analysis is a largely used method for accessing cardiac autonomic control. Based on HRV, the standard de...
 
What's Happening to Our Body after Drinking Coke? The Characteristic of the Blood Pressure Wave in Radial Artery
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Sheng-Chieh Huang,Yung-Pin Lee,Min-Hua Hsieh,Hui-Min Wang,Mark C. Hou,Shih-Chun Chao,Cheng-Lung Tseng,Wei-Ta Hsiao,Chung-Hung Hong,Kai-Yu Shao,Shi-Han Luo,Wei-Chun Chiu,Wei-Yu Chen
Issue Date:December 2011
pp. 41-44
Previous literature has suggested that psychological state may be changed via drinking coke, however, studies empirically documenting the link between coke and blood pressure wave (BPW) are scant. Therefore, the current article attempts to explore how coke...
 
Camera-Based Cosmetic Platform to Measure Microcirculation and Skin Condition of Faces
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Kai-Yu Shao,Shi-Han Luo,Wei-Chun Chiu,Sheng-Chieh Huang,Yung-Pin Lee,Hui-Min Wang,Mark C. Hou,Shih-Chun Chao,Cheng-Lung Tseng,Wei-Ta Hsiao,Chung-Hung Hong,Wei-Yu Chen
Issue Date:December 2011
pp. 45-48
A novel cosmetic chip is proposed to meet the need of the cosmetology market and the progress of the medical industry. To measure the quality of deep skin, we have to try some non-traditional way, the vascular under our skin is a complicated microcirculati...
 
Removement of the Three Minutes Irritating Music Produced No Incremental Relaxation
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Wei-Ta Hsiao,Chung-Hung Hong,Hui-Min Wang,Sheng-Chieh Huang,Kai-Yu Shao,Shi-Han Luo,Wei-Chun Chiu,Yung-Pin Lee,Mark C. Hou,Shih-Chun Chao,Cheng-Lung Tseng,Wei-Yu Chen
Issue Date:December 2011
pp. 57-60
This paper studies how the incentive bass drum sound, or a simple fast rhythm affect the performance of HRV (Heart rate variability), which is a measurement of variations in the heart rate. We expect to find a relationship of music and human cardiovascular...
 
Radar Management Model and Its Application in Enterprise Transformation and Upgrading
Found in: Services, IEEE Congress on
By Liang-Jie Zhang,Sheng-Ping Wu,Xiang Gao,Yu-Hui Liu,Ming-Yu Chen
Issue Date:July 2011
pp. 33-40
Enterprise management is improving its capacities, with its practice being advanced. However, it is facing greater challenge of transformation and upgrading, as the result of fiercer competition and accelerated globalization driven by global economic chang...
 
Frequency-Tuned Nighttime Brake-Light Detection
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Duan-Yu Chen, Yu-Hao Lin
Issue Date:October 2010
pp. 619-622
Advanced safety vehicle (ASV) is a critical issue in recent years for automobiles, especially when the number of vehicles is growing rapidly world wide. The cost down of general cameras makes it feasible to having an intelligent system of visual-based even...
 
Rapid and Accurate Timing Modeling for SRAM Compiler
Found in: Memory Technology, Design and Testin, IEEE International Workshop on
By Yen-Yu Chen, Shi-Yu Huang, Yi-Chung Chang
Issue Date:September 2009
pp. 73-76
Static random access memory is usually used in the ASIC design. The performances of memory always play major role in the overall circuit. In this paper, we propose an efficient extrapolation-based timing modeling method for SRAM complier. We build the timi...
 
Tamper Detection of Relational Database Based on SVR Predictive Difference
Found in: Intelligent Systems Design and Applications, International Conference on
By Hsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen
Issue Date:November 2008
pp. 403-408
Database authentication verifies valuable content from illicit copying, illegal redistribution and maliciously tamper while it is to be sold or be outsourced to un-trusted parties. This paper exploits the digital watermarking technology for guaranteeing th...
 
Fault Tolerant Non-trivial Repeating Pattern Discovering for Music Data
Found in: Computer and Information Science, 5th IEEE/ACIS International Conference on
By Yu-lung Lo, Chun-yu Chen
Issue Date:July 2006
pp. 130-135
A non-trivial repeating pattern is commonly used in analyzing the repeated part of a music object and looking for the theme. Non-trivial repeating patterns exclude those patterns included in other longer patterns such that they can reduce the redundancy an...
 
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
Found in: Distributed Computing Systems Workshops, International Conference on
By Yu Chen, Yu-Kwong Kwok, Kai Hwang
Issue Date:June 2005
pp. 123-129
In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legiti...
 
Collaborative Internet Worm Containment
Found in: IEEE Security and Privacy
By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen
Issue Date:May 2005
pp. 25-33
Large-scale worm outbreaks that lead to distributed denial-of-service (DDoS) attacks pose a major threat to the Internet infrastructure?s security. Fast containment is crucial for minimizing damage and preventing flooding attacks against network hosts. To ...
 
Automating the Determination of Open Reading Frames in Genomic Sequences Using the Web Service Techniques -- A Case Study using SARS Coronavirus
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Paul Hsueh-Min Chang, Von-Wun Soo, Tai-Yu Chen, Wei-Shen Lai, Shiun-Cheng Su, Yu-Ling Huang
Issue Date:May 2004
pp. 451
As more and more new genome sequences were reported nowadays, analyzing the functions of a new genome sequence becomes more and more desirable and compelling. However, the determination of the functions of a genomic sequence is not an easy task. Even with ...
 
Design and Implementation of a PC-based Video-On-Demand System
Found in: Information Networking, International Conference on
By Hung-Yu Kao, Yu-Chen Kuo, Shing-Tsaan Huang, Biing-Feng Wang
Issue Date:January 1998
pp. 0042
Abstract: In the recent years, VOD (Video-On-Demand) systems have been extensively proposed, researched, and developed because of their great marketable value. In this paper, we propose a total solution to construct and implement a practical PC-based VOD s...
 
Theory and practice: A discourse-based translation strategy of Chinese Medicine
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Yuanfang Chen,Yu Chen,Tao Yu,Zhaohui Liang,Song Wei
Issue Date:October 2012
pp. 307-309
Objective: To explore the principles and strategies of Chinese-English (Ch-En) translation of Traditional Chinese Medicine (TCM). Method: after a review of existing principles and strategies, the discourse differences of the TCM texts and their English tra...
 
Hiding Secret Data into an AMBTC-Compressed Image Using Genetic Algorithm
Found in: Future Generation Communication and Networking Symposia, International Conference on
By Chin-Chen Chang, Yuan-Hui Yu, Yu-Chen Hu
Issue Date:December 2008
pp. 154-157
In this paper, we present an image-hiding scheme based on genetic algorithm. The secret messages are embedded into a compressed image of AMBTC. Genetic algorithm is developed to find the best substitution of AMBTC bitmap. The proposed scheme provides high ...
 
Improving Opportunistic Data Dissemination via Known Vector
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivakant Mishra, Ling-Jyh Chen
Issue Date:May 2009
pp. 838-843
An opportunistic network is a network where each node only has connectiviy with other nodes opportunistically. To disseminate data in this kind of network is a challenging task and had drawn lots of research effort. When two nodes have connectivity with ea...
 
Empirical Analysis on the Cities' GDP and the Main Economic Indicators of High-Tech Industrial Parks
Found in: Business Intelligence and Financial Engineering, International Conference on
By Yu-Chen Song,Sha Zhen
Issue Date:October 2011
pp. 126-129
In this paper, the national 54 high-tech industrial parks' main economic indicators and their cities' GDP are analyzed respectively with clustering analysis. It is found that there is a certain degree of correlation between them. To reveal the inner relati...
 
A New Collision Attack on MD5
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Wang Yu, Chen Jianhua, He Debiao
Issue Date:April 2009
pp. 767-770
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differenti...
 
Negotiation of the Multi-underwater Glider System
Found in: Innovative Computing ,Information and Control, International Conference on
By Ren Shaoxuan, Zhang Yu, Chen Changzheng
Issue Date:September 2006
pp. 138-141
This paper presents the theoretical development of the negotiation of a multi-underwater glider problem, where glider is called agent. Negotiation is a key point in multi-agent (multi-underwater glider) system, which aims to accomplish cooperation and coor...
 
Robust Feature Matching with Alternate Hough and Inverted Hough Transforms
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Hsin-Yi Chen,Yen-Yu Lin,Bing-Yu Chen
Issue Date:June 2013
pp. 2762-2769
We present an algorithm that carries out alternate Hough transform and inverted Hough transform to establish feature correspondences, and enhances the quality of matching in both precision and recall. Inspired by the fact that nearby features on the same o...
 
The Analysis of Several Common Easily Confused Basic Concepts in Unary Function Calculus
Found in: Wearable Computing Systems, Asia-Pacific Conference on
By Zhao Chen Xia, Yu Ying, Xiao Cui Yu, Chen Wei Li
Issue Date:April 2010
pp. 291-294
In this paper, some counter-examples are given to analyze deeply several common easily confused basic concepts and theories in unary function calculus. Through the examples, it can seen that we must truly understand the basic concepts of advanced mathemati...
 
Scaffolding m-learning approach of automotive practice courses in senior vocational high school
Found in: Frontiers in Education, Annual
By Hsiu-Yi Lin, Chun-Yu Chen, Wen-Chin Chen
Issue Date:October 2008
pp. F1H-12-F1H-17
In accordance with government policy, certain changes from new learning technologies would promote the economy and continuous progress. The technological and vocational engineering education must be modified and adjusted over time, especially the innovativ...
 
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
Found in: Networking, Architecture, and Storage, International Conference on
By Hao Chen, Yu Chen
Issue Date:June 2008
pp. 365-372
As one type of stealthy and hard-to-detect attack, low-rate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noticed. The Power Spectral Density (PSD) analysis in frequency domain can detect t...
 
Key Problems Research For E-commerce Databases Integration System
Found in: Convergence Information Technology, International Conference on
By Chen Hong-ping,Fu Yu-chen,Zhong Xin,Cui Zhi-ming,Liu Quan
Issue Date:November 2007
pp. 1578-1583
With the rapid development of IT technology, more and more E-commerce databases are available in the Internet. These databases are web-accessible through form-based search interfaces. In order to get useful information, users need to send their request to ...
 
Volume-based Magnetic Resonance Brain Image Classification
Found in: Genetic and Evolutionary Computing, International Conference on
By Yaw-Jiunn Chiou, Jyh-Wen Chai, Clayton Chi-Chang Chen, Shih-Yu Chen, Hsian-Min Chen, Yen-Chieh Ouyang, Wu-Chung Su, Ching Tsorng Tsai, Ching-Wen Yang, San-Kan Lee, Chein-I Chang
Issue Date:December 2010
pp. 739-742
This paper develops a volume-based technique, called Volume Sphering Analysis (VSA) which can process all acquired Magnetic Resonance (MR) image slices formed image cube using only one set of training samples obtained from an image slice. So, several signi...
 
Techniques for Automatic Magnetic Resonance Image Classification
Found in: Genetic and Evolutionary Computing, International Conference on
By Hsian-Min Chen, Shih-Yu Chen, Jyh Wen Chai, Clayton Chi-Chang Chen, Chao-Cheng Wu, Yen-Chieh Ouyang, Ching Tsorng Tsai, Ching-Wen Yang, San-Kan Lee, Chein-I Chang
Issue Date:December 2010
pp. 735-738
Designing and developing automatic techniques for magnetic resonance images (MR) for data analysis is very challenging. One popular and public available method, FAST (FMRIB Automatic Segmentation Tool) has been widely used for automatic brain tissue segmen...
 
A Study on Lhasa Tibetan Prosodic Model Corpus Establishment
Found in: Intelligent Computation Technology and Automation, International Conference on
By Qi Chen, Hongzhi Yu, Chen Chen, Jing Shi
Issue Date:May 2010
pp. 365-368
Prosodic model makes the speech synthesis system has a rhythm of the simulation and emulation capabilities, and it plays a crucial role to enhance the naturalness of synthesized speech. The paper studies Tibetan rhythmic structure based on the characterist...
 
A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chao-Yu Chen, Chao-Ho (Thou-Ho) Chen, Yi-Li Kuo, Chin-Hsing Chen
Issue Date:September 2009
pp. 5-8
No summary available.
 
Vehicle Retrieval Using Eigen Color and Multiple Instance Learning
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Shin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, Yung-Sheng Chen
Issue Date:September 2009
pp. 657-660
With the Internet crime growing, such as phishing, money mules, personal data stealing and trafficking, DDoS (Distributed Denial of Service), and other cases often heard by people from time to time. DDoS mostly uses botnet as source of attack, and distribu...
 
Job Schedule Model Based on Grid Environment
Found in: Networked Computing and Advanced Information Management, International Conference on
By Wuu-Yee Chen, Tsang-Yean Lee, Nai-Wen Kuo, Yuan-Hwa Mei, Shan-Kai Chen, Yu-Chen Yan
Issue Date:August 2009
pp. 538-543
Grid computing architecture was defined to be a complete physical layer. The functions of information systems based on grid architecture are resources sharing, collaborative processing, etc. System performance is calculated from resource usages of all grid...
 
Maximizing Unavailability Interval for Energy Saving in IEEE 802.16e Wireless MANs
Found in: IEEE Transactions on Mobile Computing
By Tuan-Che Chen, Jyh-Cheng Chen, Ying-Yu Chen
Issue Date:April 2009
pp. 475-487
This paper presents an energy conservation scheme, Maximum Unavailability Interval (MUI), to improve the energy efficiency for the Power Saving Class of Type II in IEEE 802.16e. By applying the Chinese Remainder Theorem, the proposed MUI is guaranteed to f...
 
An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted Images
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Thou-Ho Chen, Chao-Yu Chen, Chin-Hsing Chen
Issue Date:November 2007
pp. 523-526
In this paper, we propose a novel random-valued impulse-noise reduction method by adaptive edge- preserved median filtering, called AEPMF, with adaptive threshold and noise-ratio estimation. Generally, a pixel is always very similar to its horizontal and v...
 
A Real-Time Video Noise Reduction Algorithm in the Dusk Environment
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Thou-Ho Chen, Chao-Yu Chen, Shi-Feng Huang, Chin-Hsing Chen
Issue Date:November 2007
pp. 531-534
This paper is dedicated to achieving real-time video noise reduction in the dusk environment. For coping with the inherent problem of blur moving object, the basic idea behind the proposed method is to use different filtering strategies for background and ...
 
Feature Selection for Iris Recognition with AdaBoost
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Kan-Ru Chen, Chia-Te Chou, Sheng-Wen Shih, Wen-Shiung Chen, Duan-Yu Chen
Issue Date:November 2007
pp. 411-414
In this paper, we proposed a method for selecting edge- type features for iris recognition. The AdaBoost algorithm is used to select a filter bank from a pile of filter candi- dates. The decisions of the weak classifiers associated with the filter bank are...
 
An Impulse Noise Reduction Method By Adaptive Pixel-Correlation
Found in: Innovative Computing ,Information and Control, International Conference on
By Thou-Ho (Chao-Ho) Chen, Chao-Yu Chen, Tsong-Yi Chen
Issue Date:September 2006
pp. 257-260
In this paper, we propose an adaptive decisionbased median filtering algorithm, called adaptive pixel-correlation filter (APCF), with an adaptive threshold for removal of impulse noise. By exploiting the correlations between a pixel and its neighbors, an a...
 
Fast Handoff in Mobile Virtual Private Networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Jyh-Cheng Chen, Jui-Chi Liang, Siao-Ting Wang, Shin-Ying Pan, Yin-Shin Chen, Ying-Yu Chen
Issue Date:June 2006
pp. 548-552
This paper presents the dynamic external Home Agent (x-HA) assignment, fast authentication, and preauthentication in mobile Virtual Private Networks (VPNs). The proposed architecture is based on the mobile VPN proposed by the IETF, which adopts Mobile IP a...
 
Using Demographic Migration Theory to Explore Why People Switch Between Online Games
Found in: Hawaii International Conference on System Sciences
By Avus C. Y. Hou, Ching-Chin Chern, Houn-Gee Chen, Yu-Chen Chen
Issue Date:January 2009
pp. 1-9
Online gaming has become a popular leisure-time activity in resent years. In this study, we adopted the Push-Pull-Mooring Model, which analyzes human migration behavior based on the Demographic Migration Theory, to explain why players switch from an existi...
   
Geometrically Consistent Stereoscopic Image Editing using Patch-based Synthesis
Found in: IEEE Transactions on Visualization and Computer Graphics
By Sheng-Jie Luo,Ying-Tse Sun,I-Chao Shen,Bing-Yu Chen,Yung-Yu Chuang
Issue Date:June 2014
pp. 1
This paper presents a patch-based synthesis framework for stereoscopic image editing. The core of the proposed method builds upon a patch-based optimization framework with two key contributions: First, we introduce a depth-dependent patch-pair similarity m...
 
A Novel and Low-Cost Cosmetic Chip Using 4x4 Array Photoplethysmography
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Yung-Pin Lee,Sheng-Chieh Huang,Kai-Yu Shao,Shi-Han Luo,Wei-Chun Chiu,Hui-Min Wang,Mark C. Hou,Shih-Chun Chao,Cheng-Lung Tseng,Wei-Ta Hsiao,Chung-Hung Hong,Wei-Yu Chen
Issue Date:December 2011
pp. 61-64
Microcirculatory dysfunction plays a key role in the patho-physiology of various disease states. The microcirculation in the skin is in a rather complicated. With technical advances, microcirculatory monitoring nowadays becomes more and more available for ...
 
Design and Research on Vision System of Apple Harvesting Robot
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Jidong Lv,De-an Zhao,Wei Ji,Yu Chen,Huiliang Shen
Issue Date:August 2011
pp. 177-180
The vision system of apple harvesting robot was researched and designed to make it possible for realizing automatic harvesting of apple. The vision system model is studied. The vision system of apple harvesting robot was designed by two aspects, including ...
 
 1  2 Next >>