Search all articles

+ Advanced search
Search articles within:
76471 articles
Yao-Yuan Liu, Koong Lin, Tzu-Chang Yeh, Chad Lin
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because...
Chunshien Li, Chan-Hung Yeh, Jye Lee
In this paper, a machine-leaning-based adaptive approach is proposed to restore image from Gaussian corruption. The well-known Random-Optimization (RO) learning method is used for training of the adaptive filter. With the merit of model-free computation of RO, the derivative information is not required....
Shang-Chih Hsu, Wei Yen
Some applications of the sensor network require precise time synchronization among local clocks of the sensors. Due to the limited resource in the sensor network, it is not trivial to maintain the said synchronization. In this paper, we propose a novel method, referred to as the state-based synchronization...
Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a statistical method to match feature points from stereo pairs of images. The proposed method is evaluated in terms of effectiveness, robustness and computational speed. The evaluation was performed on several pairs of real stereo images of natural scenes taken onboard an unmanned...
SuHoun Liu, Hsiu-Li Liao, Chou-Chih Hsieh
There were many researches about applying various data mining or text mining tools to patent analysis, and there were many scholars and experts have verified the accuracy and the feasibility of those tools. However, since mining tools always tried to analyze the content using some mathematic methodology,...
Yang-Sheng Lin, Jun-Yao Wang, Wen-Shyang Hwang
For the overheads of 802.11 WLAN, several frame aggregation mechanisms had been proposed to deal with this shortcoming. Since the rare consideration of QoS in these proposals, we took advantage of 802.11e queueing model to enhance the priority scheduling. This paper approaches to eliminate the decomposition...
Shan Huo Chen, Chien-Chung Wang
Fuzzy distance is applied on data analysis, classification, and production positioning analysis widely. In this paper, We introduction a fuzzy distance by using graded mean integration representation of generalized fuzzy number and the span of fuzzy number, We also discuss the distance of the linguistic...
Shao-Shin Hung, Damon Shing-Min Liu
Knowledge management (KM) is suggested as a method to manage and apply knowledge for business management. In this paper, we suggest a framework based on OPF (Open Process Framework) meta model for the knowledge-based decision-making. Based on the modeling method of OPF, we can translate partial and implicit...
Longbing Cao, Chao Luo, Jiarui Ni, Dan Luo, Chengqi Zhang
Stock data mining such as financial pairs mining is useful for trading supports and market surveillance. Financial pairs mining targets mining pair relationships between financial entities such as stocks and markets. This paper introduces a fuzzy genetic algorithm framework and strategies for discovering...
Cheng-Hong Yang, Chung-Jui Tu, Jun-Yang Chang, Hsiou-Hsiang Liu, Po-Chang Ko
The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable classification accuracy. In this paper, we propose a combination of genetic...
Ming-Yuan Li
In this paper we adopt the Markov-switching specification to establish the hybrid model with time-varying loading on each of chartist and fundamentalist techniques. The US dollar exchange rates of four Asian tiger countries’ currencies serve as the representative examples in this paper. Our empirical...
Tzung-Pei Hong, Ming-Wen Tsai, Tung-Kuan Liu
In this paper, we propose a new genetic algorithm based on the two-dimensional encoding method. Appropriate two-dimensional crossover and mutation operations are designed based on the two-dimensional representation to generate the next generations. A two-dimensional repairing mechanism is also proposed...
Yang-Cheng Lu, Yaw-Chu Chen
The purpose of this paper is to provide an algorithm for commercial banks in Taiwan to evaluate the credibility of their potential debtors from the default probability viewpoint under fuzzy environment. The fundamental concepts we have adopted include the eigenvector method, fuzzy Delphi method, fuzzy...
Kin Keung Lai, Lean YU, Shouyang Wang, Chengxiong Zhou
In the financial time series forecasting field, the problem that we often encountered is how to increase the predict accuracy as possible using the noisy financial data. In this study, we discuss the use of supervised neural networks as the metamodeling technique to design a financial time series forecasting...
Hokky Situngkir, Deni Khanafiah
The aim of this paper is to gain the broad explanation of corruption using simple computational model. We elaborated further the model of corruption described previously in [4], with some additions in model’s properties. We performed hundreds of experiments computationally using Swarm and constructed...
Pao-Lien Lai, Hong-Chun Hsu
Embedding of paths have attracted much attention in the parallel processing. Many-to-many communication is one of the most central issues in various interconnection networks. A graph $G$ is globally two-equal-disjoint path coverable if for any two distinct pairs of vertices $(u, v)$ and $(w, x)$ of $G$,...
Meng-Hsiun Tsai, Hsiao-Yun Tseng, Chen-Ying Lai
People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn’t concern customer’s secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important...
Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu
Image hiding is hiding a secret image embedding to a cover image. This paper intends to propose an image hiding method. First, a secret image is compressed by BST. Meanwhile, dividing the compressed data into different ranks depends on the significance. Then, the cover image is transformed into frequency...
Chun-I Fan, Wei-Zhe Sun
In this thesis, we have proposed an anonymous electronic voting scheme with uncoercibility, and we make use of two especial mechanisms called multiple receipts and dual randomization instead of the previous receipt-freeness to achieve the uncoercibility property. Moreover, we also adopt blind signatures...
Tein-Yaw Chung, Huai-Lei Fu, Chih-Chen Wang, Yung-Mu Chen
Overlay network had received great attention in recent years. Overlay network usually used the peer-to-peer(P2P) networking paradigm for enabling end systems to share their resources. Recent researches had proposed many interesting applications on overlay network such as files sharing and multimedia...
Wen-Yang Lin, Chin-Ang Wu, Chuan-Chun Wu
This paper proposed an object relational data warehouse modeling for complex data. This model can be viewed as an extension of relational star schema that incorporates the features of object-oriented data model. In this model, non-additive complex data such as video, audio, graphics and text can be shown...
Yih-Chih Chiou, Cheng-Yu Lin, Yu-Teng Liang
Mammogram registration is a critical step in automatic detection of breast cancer. Much research has been devoted to registering mammograms using either feature-matching or similarity measure. However, few studies have been done on combining these two methods. In this research, a hybrid mammogram registration...
Tze-Yun Sung
This paper investigates the system of LCD monitor and TV signal processor. It is shown that the processor provides scalar, brightness and contrast adjuster, Gamma correction and dithering. The algorithms are discussed and implemented by Verilog hardware description language. The key hard codes are displayed....
Xiaoyi Feng, Baohua Lv, Zhen Li, Jiling Zhang
In this work, a novel facial feature extraction method is proposed for automatic facial expressions recognition, which detecting local texture information, global texture information and shape information of the face automatically to form the facial features. First, Active Appearance Model (AAM) is used...