Search all articles

+ Advanced search
Search articles within:
114476 articles

Pricing-Enabled QoS for UMTS/WLAN Network

Hung-Chin Jang, Bohan Lu
In this paper we propose a pricing-enabled QoS for the hybrid UMTS/WLAN network. The proposed methodology is an integration of usage-based, non usage-based, static, and dynamic pricing schemes and DiffServ (Differentiated Services). We propose the utility function and cost function for our needs, and...

A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages

Tzu-Chuen Lu, Chin-Chen Chang
This paper proposes a novel lossless information-hiding scheme that hides information in locally adaptive compressed codes. The scheme is abbreviated as IHLAC for wider the efficiency of the compressed codes. IHLAC is designed for two objectives; one is to compress a text file; the other is to hide secret...

A Measure Method for Indiscernibility in Imperfect Information System

Jiye Liang, Jifang Pang
Traditionally, the information system is assumed to be perfect, i.e. attribute values are not missing and supposed to be precise. In fact, imperfect information system is always existent. In this paper, based on imperfect information system (include missing data and imprecise data), the concepts of indiscernibility...

feature-preserving interpolative vector quantization

Wu-Ja Lin, Wei-Yu Han, Lee Yen-Po, Wu Kuang-Shyr
In this paper, a feature-preserving interpolative vector quantization method is proposed to compress images. The proposed method preserves the average color and color contrast on generating the approximation image and preserves mean, variance, and average radius on quantizing the residual image which...

image approximation by preserving color features

Wu-Ja Lin, Wei-Yu Han, Kuang-Shyr Wu, Yen-Po Lee
In this paper, an image approximation method is proposed. The method approximates the given image by preserving image's average color and color contrast. The experimental results show that the proposed method usually yields satisfactory results.

A Website Model-Supported Focused Crawler for Search Agents

Sheng-Yuan Yang
This paper advocates the use of ontology-supported website models to provide a semantic level solution for a search agent so that it can provide fast, precise, and stable search results. We have based on the technique to develop a focused crawler, which can benefit both user requests and domain semantics....

Comparing Gaussian Processes and Artificial Neural Networks for Forecasting

Colin Fyfe, Tzai Der Wang, Shang Jen Chuang
We compare the use of artificial neural networks and Gaussian processes for forecasting. We show that Artificial Neural Networks have the advantage of being utilisable with greater volumes of data but Gaussian processes can more easily be utilised to deal with non-stationarity.

Genetic Programming Decision Tree for Bankruptcy Prediction

Wo-Chiang Lee
In this paper, we apply the CART ,C5.0 , GP decision tree classifiers and compares with logic model and ANN model for Taiwan listed electronic companies bankruptcy prediction. Results reveal that the GP decision tree can outperform all the classifiers either in overall percentage of correct or k-fold...

Achieving Efficient Pathname LOOKUP in File Server Group

Feng-jung Liu, Chu-sing Yang, Yao-kuei Lee
With the increasing growth of Internet users and the Web contents, it has led to much attention on scalability and availability of file system. Hence the ways to improve the reliability and availability of system, to achieve the expected reduction in operational expenses and to reduce the operations...

Pruning Support Vectors in the SVM Framework and Its Application to Face Detection

Pei-Yi Hao
This paper presents the pruning algorithms to the support vector machine for sample classification and function regression. When constructing support vector machine network we occasionally obtain redundant support vectors which do not significantly affect the final classification and function approximation...

Adaptive snake model with automatic force rectification

Din-Yuen Chan, Cheng-Li Chiu, Wei-Ta Chien
Most applications of snake model are domain-specific, while specifying fixed snake coefficients to an image in problem. In this paper, we propose content-triggered adaptive snake model (CASM) to lead all the parameters of snake model to be automatically adapted for various images in the noisy environment....

Motion-based Adaptive GOP Algorithms for Efficient H.264/AVC Compression

Jun-Ren Ding, Jar-Ferr Yang, Ji-Kun Lin
H.264/AVC provides several advanced features such as improved coding efficiency and error robustness for video storage and transmission. In this paper, to further improve the coding quality for encoding possible scene changes and fast variation sequences, we propose a new adaptive GOP scheme that uses...

Scaffolding Supervision and Behavior Understanding

Yung-Hui Chen, Lawrence Deng
This paper contributes a meaningful framework and approach to the understanding of the fundamental of e-learning and explains why it is proliferating throughout a rapidly evolving learning society. This is the important comprehensive and coherent framework to guide our understanding of e-learning in...

Low-Cost RFID Identification Variation

Yao-Yuan Liu, Koong Lin, Tzu-Chang Yeh, Chad Lin
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because...

A Simplified LED Converter Design and Implement

Yi-Hua Fan, Cheng-Ju Wu, Cheng-Chao Fan, Kou-Wei Chih, Lun-De Liao
High power LED converter combined with switching power supply and current adjustment device for is presented. The switching power supply provides one stabilized voltage source, and the current adjustment device controls the output currents with a desired constant current and the over-load protection....

The High Benefits Internet Marketing Framework through Customer Experience

Kuo Nai-Wen, Liu An-Yi
This paper is intended to integrate Internet Marketing, Customer Experience, E-brand and Integrated Marketing Communications to develop a high benefits Internet Marketing Framework. This framework not only can combine marketing resources effectively, let enterprises obtain the greatest benefits; it also...

Bisection Algorithms for Solving lambda-Fuzzy Measures

Ting-Yu Chen, Jih-Chang Wang
The theory of fuzzy measures has a great potential for real world applications, but limited by the lack of suitable identifying methods. This research proposes a bisection algorithm based on Sugeno measures. The proposed method is simple enough to suit the practical applications for the required data...

Reducing Positive Leniency in Fuzzy Measure Ratings

Ting-Yu Chen, Jih-Chang Wang
Fuzzy measures have been widely used to determine the degrees of subjective importance of evaluation items. However, the leniency error may exist when most attributes are assigned unduly high ratings. Because respondents often assign similarly complimentary scores, errors of positive leniency make it...

A Simple Approach to Stereo Matching and Its Application in Developing a Travel Aid for the Blind

Mu-Chun Su, Yi-Zeng Hsieh, Yu-Xiang Zhao
In this paper, we present an idea of using stereo matching to develop a travel aid for the blind. In this approach, images are segmented into several non-overlapping homogeneous regions using a color segmentation algorithm. For each homogeneous region, a rectangular window, which is large enough to cover...

A Novel, Efficient Architecture for the 1D, Lifting-Based DWT with Folded and Pipelined Schemes

Chin-Fa Hsieh, Tsung-Han Tsai, Neng-Jye Hsu, Chih-Hung Lai
In this paper, we propose a novel, efficient VLSI architecture for the implementation of one-dimension, lifting-based discrete wavelet transform (DWT). Both of the folded and the pipelined schemes are applied in the proposed architecture; the former scheme supports higher hardware utilization and the...

A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region

Bo Qin, Chuangde Zhang, Zhenghua Fang, Wei Li
Background subtraction is a common way of real-time motion detection. Owing to lacking the right approach to update the background, it was confined in certain aspects. In this paper, we will present a quick self-adaptive background updating algorithm based on moving region, and use label method to de-noise...

Image Restoration Using RO Learning Approach

Chunshien Li, Chan-Hung Yeh, Jye Lee
In this paper, a machine-leaning-based adaptive approach is proposed to restore image from Gaussian corruption. The well-known Random-Optimization (RO) learning method is used for training of the adaptive filter. With the merit of model-free computation of RO, the derivative information is not required....

A String Comparison Approach to Process Logic Differences between Business Process Models

Yeh-Chun Juan
Analyzing process logic differences between company’s process and best practice process can assist project team in discovering process improvement opportunities. Process logic comparison has been mentioned in some literature, but research in this area still lacks effectively and efficiently analytical...

A Remote Parallel Computation System for Biomedical Data Visualization on the Grid

Chih-Han Lin, Ming-Shi Wang, Chun-Cheng Wei, Lai-Yi Chu
In this paper, a collaborative system for visualizing biomedical dataset on a Grid environment was proposed. Globus Toolkit was used for the integration of computational resources in the Grid environment, and the Visualization Toolkit (VTK) is used as the tool for processing the biomedical dataset. The...

A DSAS-Based Minimum Makespan Model for Multi-location Investment Using Fractional Programming

Cheng-Chang Chang, Yan-Kwang Chen, Wen-Chieh Hsu
This study focuses on an enterprise that wants to expand its business to multiple cities in global and to be one of well-known multinational enterprises (MNEs). Suppose the enterprise utilizes the wholly owned market entry strategy, as well as the decentralized synchronized (market) advancement strategy...

A Behavioral Fuzzy Model for Analysis of Overreaction and Underreaction in the Brazilian Stock Market

Renato Aguiar, Roberto Moura Sales, Lucy Sousa
In this paper empirical tests for the overreaction and underreaction hypothesis in the Brazilian stock market are presented. For these tests, due to the complexity of these phenomena, a new model based on the fuzzy set theory is proposed. It is shown that such model is strongly connected with two heuristics...

A Modification to the Copula Approach for Pricing Correlation-Dependent Credit Derivatives

Chih-Wei Lee, Cheng-Kun Kuo
This paper proposes a modified copula approach to defining correlation dependence used for pricing credit derivatives. For both single-name and multiname products, how default correlations react to common shocks should be appropriately measured. The copula approach is an effective method for this purpose....

End-to-End QoS Provisioning by Flow Label in IPv6

Chuan-Neng Lin, Pei-Chen Tseng, Wen-Shyang Hwang
IPv6 as IP next generation is the successor to IPv4. IPv6 not only solves the shortcomings problem of IPv4 address, but also benefits the QoS especially during network congestion. Flow label field in IPv6 packet header provides an efficient way for packet marking, flow identification, and flow state...

Annuity Planning and Consumption-Investment Choices in Retirement Planning

Zhisheng Li, Aparna Gupta
Annuities can be effective tools in managing longevity risk in retirement planning. This paper develops a framework that merges annuity purchase decisions with consumption-investment selections in retirement planning. After introducing a pricing model and a benefit payment model for an annuity, we construct...

SBT-QL: A Stock Time Series Query Language based on Specialized Binary Tree Representation

Tak-chung Fu, Fu-lai Chung, Robert Luk, Man-yee Au, Chak-man Ng
Stock time series query is one of the fundamental components in technical analysis. Technical analysts would like to query either a whole time series or a segment of a time series in different resolutions for long-term or short-term investigations. Moreover, unnecessary data points should be filtered...

A Personal Financial Planning Model Based on Fuzzy Multiple Goal Programming Method

Chieh-Yow ChiangLin
Traditional financial planning procedures began from taking into account the planner’s initial financial situation, his/her financial goals, and expectations for the future, etc. and then calculating the future cash flows for different time periods under variant scenarios. If the planning result cannot...

Snapshot Lifecycle Management

Ching-Hung Lin, Wey Shou-Jen, Tsai Tsung-Lin, Wang Jun-Yao, Hwang Wen-Shyang
This paper sets forth “Snapshot Lifecycle Management”, an innovative way to manage snapshot data rather than using Information Lifecycle Management. There are two major problems occurs in snapshot management by ILM: “inappropriate migration” and “redundancy”. SLM manages snapshot data elaborately according...

Comparison between Crisp and Fuzzy Stock-Screening Models

Chieh-Yow ChiangLin
Academic researchers and practitioners have proposed various stock-screening models that always contain more than one stock selecting rule and corresponding parameters. However, the criteria in traditional screening models employ crisp norms, which are unreasonable in reality. This paper proposes the...

An Ontology-based Methodology for Communicating Negotiation Agents over Internet

Azucena Montes, Maricela Bravo, José Velázquez
In this article we describe a new methodology to facilitate communications between heterogeneous negotiation agents; in particular we present an ontology solution which allows the publication and sharing of communication primitives over Internet. Traditional negotiation systems exchange messages based...

An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data

Pei-Fang Tsai, Ming-Shi Wang
Visual cryptography is one kind of image encrypting. It is different from traditional cryptography, because it does not need complex computation to decrypt. In current technology, most of visual cryptography are embedded a secret using two shares is limited. This paper proposes a new approach of (3,...

A Greedy Approach for Multi-Symbol SMS Message Segmentation

Liang-Chyau Sheu, Heng Ma
In this paper, we propose an algorithm to split a lengthy message to several shorter messages to accomodate the specification adopted by most telecommunication companities. We also open an issue that there may exist better algorithms to solve this problem.

Using Ant Colony Optimization to Solve Train Timetabling Problem of Mass Rapid Transit

Jen-yu Huang
The purpose of this research is to using ant colony optimization (ACO) to develop a heuristic algorithm to solve the train timetabling problem. This algorithm takes into consideration the trains scheduling in the transit period between peak period and off-peak period, the conflict resolving and the balance...

Design of Bulletin Board System for Online Chance Discovery Process

Yasufumi Takama, Yuta Seo, Yoshihiro Iwase
A bulletin board system (BBS) equipped with Key-Graph is proposed for supporting online chance dis-covery process. While conventional meeting for chance discovery with KeyGraph requires participants to meet in a meeting room, the paper aims to expand the discussion space over the Internet. In order to...

Blind Wavelet-based Image Watermarking Based on HVS and Neural Networks

Hung-Hsu Tsai, Chi-Chih Liu, Kuo-Chun Wang
This work proposes a Blind Wavelet-based Image Watermarking (BWIW) technique, based on the human visible system (HVS) model and neural networks, for image copyright protection. A characteristic of the HVS, the Just Noticeable Difference (JND) profile, is employed in the watermark embedding so that the...

State-Based Synchronization Protocol in Sensor Networks

Shang-Chih Hsu, Wei Yen
Some applications of the sensor network require precise time synchronization among local clocks of the sensors. Due to the limited resource in the sensor network, it is not trivial to maintain the said synchronization. In this paper, we propose a novel method, referred to as the state-based synchronization...

A Heterogeneous Dependency Graph as Intermediate Representation for Instruction Set Customization

Kang Zhao, Bian Jinian, Dong Sheqin
A heterogeneous dependency graph (HDG) defined as the intermediate representation for instruction set automated customization is presented in this paper. The main motivation of this model is to constructs a unified internal specification that bridges the gap from the application benchmarks to the instruction...

A Hybrid Mining Approach for Optimizing Returns Policies in e Retailing

Chien-Chih Yu, Cheng-Su Wang
This paper aims at proposing a hybrid mining approach for e-retailers to analyze returns patterns from both the customer and product perspectives, classify customers and products by returns ratios, and then adopt proper returns policies and marketing strategies to the identified classes for reducing...

Orientation filtering : a Novel Matching Method

Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a statistical method to match feature points from stereo pairs of images. The proposed method is evaluated in terms of effectiveness, robustness and computational speed. The evaluation was performed on several pairs of real stereo images of natural scenes taken onboard an unmanned...

Calibration Method Accuracy Evaluation via depth reconstruction

Lucile Martin, Christophe Leroux, Edwige Pissaloux
This paper presents a fast method to evaluate the accuracy of a calibration method of a stereovision rig built with commercially available cameras. The method allows by retro projection to quantify very precisely errors in terms of depth reconstruction. The proposed method has been evaluated on the depth...

A Realistic Personnel Selection Tool Based on Fuzzy Data Mining Method

Wei-Shen Tai, Chung-Chian Hsu
Recruitment is an important issue of human resource management (HRM). The main purpose of recruitment is to obtain talent from internal and external of organization. However, excellent talent maybe will be missed at the pre-screening process under lack of complete information for managers to judge. In...

PRATYUG-"The total security system"

Sivaraman Sriram, Chandan Nadadur
“The innocent are always the first to suffer”. This is an often used proverb. In our quest to make them strong we have devised a total hack proof system for the communication process. In our mission the hackers are not the hunters but the prey. So we introduce a new security system called the bio scanning...

Information Asymmetry at Merge and Acquisition - An Investigation on Firms in the Electric Industry

Chi-Yun Hua, Wen-Chih LEE, Yao Min-Li, Chin Wei-Ming
The prior studies are focus on the association between merge and acquisition (M&A) announcement and stockholders’ wealth. There are few studies examining the change in the level of information asymmetry at M&A announcement. Our study, therefore, goes to fill out the aspect. This paper empirically investigates...

Query-Based Learning Decision Tree and its Applications in Data Mining

Rayi Chang, Chia-Yen Lo, Wen-De Su, Jen-Chieh Wang
Decision tree is one of the most significant classification methods applied in data mining. By its graphic output, users could have an easy way to interpret the decision flow and the mining outcome. However, decision tree is known to be time consuming. It will spend a high computation cost when mining...

Case Mining from Raw Data for Case Library Construction

Chien-Chang Hsu, Ye-Hong Huang
Case-based reasoning systems usually use prior experiences and examples to solve problems. The successfulness of the systems depends on the completeness of case library. It may generate contradictory solutions or increase adaptation cost if the case library contains irrelevant and disordered cases. This...