Search all articles

+ Advanced search
Search articles within:
97366 articles
Hung-Chin Jang, Bohan Lu
In this paper we propose a pricing-enabled QoS for the hybrid UMTS/WLAN network. The proposed methodology is an integration of usage-based, non usage-based, static, and dynamic pricing schemes and DiffServ (Differentiated Services). We propose the utility function and cost function for our needs,...
Wu-Ja Lin, Wei-Yu Han, Lee Yen-Po, Wu Kuang-Shyr
In this paper, a feature-preserving interpolative vector quantization method is proposed to compress images. The proposed method preserves the average color and color contrast on generating the approximation image and preserves mean, variance, and average radius on quantizing the residual image...
Wu-Ja Lin, Wei-Yu Han, Kuang-Shyr Wu, Yen-Po Lee
In this paper, an image approximation method is proposed. The method approximates the given image by preserving image's average color and color contrast. The experimental results show that the proposed method usually yields satisfactory results.
Sheng-Yuan Yang
This paper advocates the use of ontology-supported website models to provide a semantic level solution for a search agent so that it can provide fast, precise, and stable search results. We have based on the technique to develop a focused crawler, which can benefit both user requests and domain semantics....
Wo-Chiang Lee
In this paper, we apply the CART ,C5.0 , GP decision tree classifiers and compares with logic model and ANN model for Taiwan listed electronic companies bankruptcy prediction. Results reveal that the GP decision tree can outperform all the classifiers either in overall percentage of correct or k-fold...
Feng-jung Liu, Chu-sing Yang, Yao-kuei Lee
With the increasing growth of Internet users and the Web contents, it has led to much attention on scalability and availability of file system. Hence the ways to improve the reliability and availability of system, to achieve the expected reduction in operational expenses and to reduce the operations...
Din-Yuen Chan, Cheng-Li Chiu, Wei-Ta Chien
Most applications of snake model are domain-specific, while specifying fixed snake coefficients to an image in problem. In this paper, we propose content-triggered adaptive snake model (CASM) to lead all the parameters of snake model to be automatically adapted for various images in the noisy environment....
Yung-Hui Chen, Lawrence Deng
This paper contributes a meaningful framework and approach to the understanding of the fundamental of e-learning and explains why it is proliferating throughout a rapidly evolving learning society. This is the important comprehensive and coherent framework to guide our understanding of e-learning in...
Yao-Yuan Liu, Koong Lin, Tzu-Chang Yeh, Chad Lin
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because...
Yi-Hua Fan, Cheng-Ju Wu, Cheng-Chao Fan, Kou-Wei Chih, Lun-De Liao
High power LED converter combined with switching power supply and current adjustment device for is presented. The switching power supply provides one stabilized voltage source, and the current adjustment device controls the output currents with a desired constant current and the over-load protection....
Ting-Yu Chen, Jih-Chang Wang
The theory of fuzzy measures has a great potential for real world applications, but limited by the lack of suitable identifying methods. This research proposes a bisection algorithm based on Sugeno measures. The proposed method is simple enough to suit the practical applications for the required data...
Ting-Yu Chen, Jih-Chang Wang
Fuzzy measures have been widely used to determine the degrees of subjective importance of evaluation items. However, the leniency error may exist when most attributes are assigned unduly high ratings. Because respondents often assign similarly complimentary scores, errors of positive leniency make it...
Chunshien Li, Chan-Hung Yeh, Jye Lee
In this paper, a machine-leaning-based adaptive approach is proposed to restore image from Gaussian corruption. The well-known Random-Optimization (RO) learning method is used for training of the adaptive filter. With the merit of model-free computation of RO, the derivative information is not required....
Chuan-Neng Lin, Pei-Chen Tseng, Wen-Shyang Hwang
IPv6 as IP next generation is the successor to IPv4. IPv6 not only solves the shortcomings problem of IPv4 address, but also benefits the QoS especially during network congestion. Flow label field in IPv6 packet header provides an efficient way for packet marking, flow identification, and flow state...
Ching-Hung Lin, Wey Shou-Jen, Tsai Tsung-Lin, Wang Jun-Yao, Hwang Wen-Shyang
This paper sets forth “Snapshot Lifecycle Management”, an innovative way to manage snapshot data rather than using Information Lifecycle Management. There are two major problems occurs in snapshot management by ILM: “inappropriate migration” and “redundancy”. SLM manages snapshot data elaborately according...
Chieh-Yow ChiangLin
Academic researchers and practitioners have proposed various stock-screening models that always contain more than one stock selecting rule and corresponding parameters. However, the criteria in traditional screening models employ crisp norms, which are unreasonable in reality. This paper proposes the...
Yasufumi Takama, Yuta Seo, Yoshihiro Iwase
A bulletin board system (BBS) equipped with Key-Graph is proposed for supporting online chance dis-covery process. While conventional meeting for chance discovery with KeyGraph requires participants to meet in a meeting room, the paper aims to expand the discussion space over the Internet. In order to...
Shang-Chih Hsu, Wei Yen
Some applications of the sensor network require precise time synchronization among local clocks of the sensors. Due to the limited resource in the sensor network, it is not trivial to maintain the said synchronization. In this paper, we propose a novel method, referred to as the state-based synchronization...
Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a statistical method to match feature points from stereo pairs of images. The proposed method is evaluated in terms of effectiveness, robustness and computational speed. The evaluation was performed on several pairs of real stereo images of natural scenes taken onboard an unmanned...
Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a fast method to evaluate the accuracy of a calibration method of a stereovision rig built with commercially available cameras. The method allows by retro projection to quantify very precisely errors in terms of depth reconstruction. The proposed method has been evaluated on the...
Sivaraman Sriram, Chandan Nadadur
“The innocent are always the first to suffer”. This is an often used proverb. In our quest to make them strong we have devised a total hack proof system for the communication process. In our mission the hackers are not the hunters but the prey. So we introduce a new security system called the bio scanning...
Chien-Chang Hsu, Ye-Hong Huang
Case-based reasoning systems usually use prior experiences and examples to solve problems. The successfulness of the systems depends on the completeness of case library. It may generate contradictory solutions or increase adaptation cost if the case library contains irrelevant and disordered cases....