Search all articles

+ Advanced search
Search articles within:
112491 articles

Multi-Layer Allocated Learning Based Neural Network for Resource Allocation Optimization

Po-Chang Ko, Ping-Chen Lin, Jan-An You, Yu-Jen Tien
The investor’s asset allocation choice deeply depends on the trade-off between risk and return. The well-known mean variance method requires predetermined risk and expected return to calculate optimal investment weights of portfolio. The artificial neural network (ANN) with nonlinear capability is proven...

The Process of the Effective Pricing Strategy Using PRISM

Katsutoshi Yada, Kosuke Ohno
The purpose of this paper is to propose a system and process for maximizing store profits to discover the optimal price pattern among various items based on a purchase prediction models. This system, called PRISM, involves the use of data mining techniques to handle a large amount of customer purchase...

An Architecture and Programming Framework for Dynamic Reconfigurable Computing Systems

Qiang Wu, Wei Xie, Wei Wang
Dynamic reconfigurable computing (DRC) system is becoming increasingly attractive with its potential to combine high performance and rich functionality. But problems exist in practical application of DRC, such as that designers need to know the architectural and physical details of reconfigurable device....

On the Two-Equal-Disjoint Path Cover Problem of Crossed Cubes

Pao-Lien Lai, Hong-Chun Hsu
Embedding of paths have attracted much attention in the parallel processing. Many-to-many communication is one of the most central issues in various interconnection networks. A graph $G$ is globally two-equal-disjoint path coverable if for any two distinct pairs of vertices $(u, v)$ and $(w, x)$ of $G$,...

Adaptive Error Control for Scalable Video Streaming over Wireless Internet

Jen-Wen Ding, Wei-Jen Chen, Chu-Fu Wang
With the wide deployment of broadband wireless networks around the world, there is a growing interest in wireless personalized video streaming. However, the bit error rate (BER) of wireless networks is much higher than that of wired networks. The high BER, unfortunately, will significantly degrade the...

A Database Watermarking Technique for Temper Detection

Meng-Hsiun Tsai, Hsiao-Yun Tseng, Chen-Ying Lai
People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn’t concern customer’s secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important...

An Efficient Object Tracking Algorithm in Wireless Sensor Networks

Cheng-Ta Lee, Frank Yeong-Sung Lin, Yean-Fu Wen
In this paper, we develop a heuristic algorithm to construct an efficient object tracking in wireless sensor networks (WSNs). Such wireless sensor network has to be designed to achieve efficient object tracking for given arbitrary topology of wireless sensor networks. We consider the two-way object moving...

A High-Efficient Line-Based Architecture for 2-D Lifting-Based DWT Using 9/7 Wavelet Filters

Tze-Yun Sung
In this paper, a high-efficient lined-based architecture for the 9/7 discrete wavelet transform (DWT) based on lifting scheme is proposed. The proposed parallel and pipelined architecture consists of a horizontal filter (HF) and a vertical filter (VF). The critical path of the proposed architecture is...

Discovering Hidden Blue Ocean Strategy with KeyGraph Machine

Fang-Cheng Hsu, Han_Yuan Lee, Tzong-Heng Chi
Researchers usually focused on using unstructured documents as input documents of KeyGraph. But the unstructured documents might results in unclear keywords and meaningless keywords. Although traditional document preprocessing could dismiss some of the problems, generating complex and unreadable KeyGraph...

The maximum interval graphs on distance hereditary graphs

Sheng-Lung Peng, Ton Kloks, Chuan-Min Lee
In this paper we propose a linear-time algorithm to solve the problem of finding an induced interval graph with a maximum number of vertices in a distance hereditary graph.

The Globally Bi-3*-Connected Property of the Brother Trees

Tung-Yang Ho, Po-Chun Kuo, Lih-Hsing Hsu
Assume that n is any positive integer. The brother tree BT(n)is an interesting family of 3-regular planar bipartite graphs recently proposed by Kao and Hsu. In any BT(n), we prove that there exist three internally-disjoint spanning paths joining x and y whenever x and y belong to different partite sets....

A Computation-Aware Scheme for Motion Estimation in H.264

Jin-Jang Leou, Fu-Chieh Chuang
In this study, a computation-aware scheme for motion estimation (ME) in H.264 is proposed. The objective of the proposed scheme is to properly distribute the available ME computations of the H.264 encoder. Here, the temporal motion vector prediction technique is used to get the predicted motion vector...

Stochastic Local Search Using the Search Space Smoothing Meta-Heuristic:A Case Study

Sheqin Dong, Fan Guo, Jun Yuan, Rensheng Wang, Xianlong Hong
In this paper, two smoothing effects are firstly pointed out by analysis and by experiment on Traveling Salesman Problem(TSP) instances. We design a novel algorithm which runs stochastic local search under the SSS framework. The function determining the accepting probability of uphill moves is designed...

A Novel Tour Construction Heuristic for Traveling Salesman Problem Using LFF Principle

Sheqin Dong, Fan Guo, Jun Yuan, Rensheng Wang, Xianlong Hong
Less Flexibility First(LFF) principle is inspired and developed by enhancing some rule-of-thumb guidelines resulting from the generation-long work experience of human professionals in ancient days. In this paper, we generalize this principle to the classical Traveling Salesman Problem and propose a tour...

Floorplanning by A Revised 3-D Corner Block List with sub-C+-tree

Sheqin Dong, Rensheng Wang, Fan Guo, Jun Yuan, Xianlong Hong
In this paper we present a 3-D floorplan representation based on the methodologies of Corner Block List (CBL). Our model is an extension and generalization of the original 2-D CBL and inherits its most crucial advantages including: linear time operations and evaluations, relatively small solution space...

The Connected p-Center Problem with Extension

William Chung-Kung Yen, Chien-Tsai Chen
Let G(V, E, W) be a graph n vertices and m edges, where each edge e is associated with a positive distance W(e). The traditional p-Center problem is to locate some kind of facilities at p vertices of G to minimize the maximum distance between any vertex and its nearest facility. This paper proposes a...

By Adjusting Keyword Frequency and Separating Keyword into Different Layers to Improve Readability of KeyGraph in Decision Making

Fang-Cheng Hsu, Yen-Chih Wang
Providing qualified documents are expected helpful for KeyGraph to translate the documents an appropriate and easy read KeyGraph diagram. And further, to discover worthy chances for decision making. We proposed 2 preprocessing strategies for assuring appropriate quality of documents, especially for decision...

Adaptive P2P caching for video broadcasting over wireless Ad Hoc network

You-sheng Liu, Yueh-Min Huang, Meng-Yen Hsieh
With the advance of science and technology, wireless networks are becoming a significant part of today’s access networks. Ad hoc networks are wireless mobile networks without an infrastructure. Recently more and more multimedia services are applied to ad hoc networks. Because of the problem of the mobility,...

A secure and efficient scheme for authenticating remote users using smart card

Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang
In 2002, Chien, Jan, and Tseng proposed an e±cient and practical solution to remote authentication using smart card. However, in 2004, Hsu pointed out Chien, Jan, Tseng's scheme has a secure flaw that is vulnerable to parallel session attack. Therefore, in this paper, we improve Chien, Jan, Tseng's scheme...

Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys

Yafen Chang, Chin-Chen Chang
In 2004, Abe et al. proposed a novel threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme. They claimed that their scheme allows the base signature schemes to be based on sigma-protocols, including Schnorr’s signature scheme,...

An Effective Prefetching Technique for Location-Based Services with PPM

Chih-Cheng Lien, Chien-Chih Wang
Location-Based Services (LBS) are available on hand-held devices and become a field of active research since the recent advances in wireless communication and mobile environment. Due to the constraints of bandwidth of network, space of storage and energy of battery in the mobile client, slow information...

Oncogenes and Subtypes of Diffuse Large B-Cell Lymphoma Discoveries from Microarray Database

Ching-Hao Lai, Jun-Dong Chang, Meng-Hsiun Tsai
This paper presents an effective analysis scheme for Diffuse Large B-Cell Lymphoma (DLBCL) microarray datasets. Analysis of variable (ANOVA) is a well known statistics tools. It is useful to get the oncogenes to distinguish the normal and cancerous tissues. But, it can not further obtain the sub-types...

A DCT-based Recoverable Image Authentication

Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu
In this paper, a scheme that has tamper proofing and recovery abilities is proposed. With the specific DCT frequency coefficients taken as the characteristic values, which are embedded into the least significant bits of the image pixels, it is used to provide proof of image integrity. If the image is...

Reversible Palette Image Steganography Based on De-clustering and Predictive Coding

Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang
Steganographic technology acts as the important role which defends information security in the network. The information could be hidden in multimedia object. Even if transmitted in an unsafe channel, the information is invisible by human visual system to maintain security. This paper presents a reversible...

Robust image hiding method

Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu
Image hiding is hiding a secret image embedding to a cover image. This paper intends to propose an image hiding method. First, a secret image is compressed by BST. Meanwhile, dividing the compressed data into different ranks depends on the significance. Then, the cover image is transformed into frequency...

Reliable Transmission of Multimedia Streaming In Cluster-Based Ad Hoc Networks

Meng-Yen Hsieh, Yueh-Min Huang, You-Sheng Liu
Cluster-based routes help data transmission in ad hoc networks. Mobile users are organized into a cluster for requiring common multimedia service. However, node mobility does not guarantee multimedia transmission. This study presents a measure of cluster-based route’s stability based on a prediction...

Uncoercible Anonymous Electronic Voting

Chun-I Fan, Wei-Zhe Sun
In this thesis, we have proposed an anonymous electronic voting scheme with uncoercibility, and we make use of two especial mechanisms called multiple receipts and dual randomization instead of the previous receipt-freeness to achieve the uncoercibility property. Moreover, we also adopt blind signatures...

Distributed Algorithms to Solve the FOP Issues on the Weighted Convex-Split Networks

Shin-Jer Yang, Tzu-Chi Guo
This paper discusses the Flow-Orientation Problem (FOP), which assigns orientations of all links of an undirected network to obtain a directed network for meeting some flow optimization measurements. First, we describe the background and define three related FOP issues: MDFOP, MDSFOP, and MDDFOP. We...

An ILP Approach to the Simultaneous Application of Operation Scheduling and Power Management

Shih-Hsu Huang, Chun-Hua Cheng, Chung-Hsin Chiang, Chia-Ming Chang
At the behavioral level, large power saving is possible by shutting down unused operations, which is commonly referred to as power management. However, on the other hand, operation scheduling has a significant impact on the potential for power saving via power management. In this paper, we present an...

An Efficient CORDIC-Based Vector Interpolator in Power-Aware 3-D Graphics Rendering

Tze-Yun Sung
High performance architectures for the data intensive and latency restrained applications can be achieved by maximizing both parallelism and pipelining. In this paper, the CORDIC based hardware primitives of 3-D rotation with high throughput 3-D vector interpolation are presented. The proposed architecture...

Fuzzy Collaborative Filtering for Web Page Prediction

Chein-Shung Hwang, Yu-Pin Chen
Web page prediction is a popular personalized service on the Web and has attracted much research attention. One of the most successful and widely used approaches is collaborative filtering. Traditional collaborative filtering requires explicit user participation for providing his/her interest to the...

Semantic entailment of attribute-dependency formulas and their non-redundant bases

Radim Belohlavek, Vilem Vychodil
AD-formulas are simple formulas representing particular dependencies in data tables. We study AD-formulas from the logical point of view. In particular, we present results regarding the relationship of AD-formulas to attribute implications, models and entailment of AD-formulas, non-redundant bases, and...

Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem

Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves...

Unconditionally secure cryptosystem based on quantum cryptography

Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer Shyong Chen
Most cryptographic works these days have employed mathematical concepts to design cryptosystems and algorithms. Therefore, mathematical concepts have become critical in the designing of cryptosystems, and are generally used to analyze cryptosystems and protocols, supporting the allegation that the intended...

An Elegant Deadline Calculation for SCED

Lain-Chyr Hwang, Chia-Hsu Kuo, San-Yuan Wang
The future multimedia Internet needs mechanisms to provide QoS (Quality of Service) for users. Service curve (SC) is an effective description of QoS and SCED (service curve based earliest deadline first policy) is an efficient scheduling algorithm to guarantee SCs specified by users. Deadline calculation...

A study of some easily parallellizable automata

Sylvie Hamel
A vector algorithm is an algorithm that applies a bounded number of vector operations to an input vector, regardless of the length of the input. The allowable operations are usually restricted to bit-wise operations available in processors, including shifts and binary addition with carry. This paper...

Multiple Dynamic Quality Systems Using Hybrid Neuro-Ants Technique

Hsu-Hwa Chang, Chih-Hsien Chen, Ching-Shih Tsou
Robust parameter design has been successfully applied to a variety of engineering problems for enhancing the robustness of the system; however, it cannot deal with multiple dynamic quality systems. Although several other approaches have been presented to resolve this problem, they are unable to efficiently...

OSSP: Overlay Streaming Service Platform

Tein-Yaw Chung, Huai-Lei Fu, Chih-Chen Wang, Yung-Mu Chen
Overlay network had received great attention in recent years. Overlay network usually used the peer-to-peer(P2P) networking paradigm for enabling end systems to share their resources. Recent researches had proposed many interesting applications on overlay network such as files sharing and multimedia...

Optimal Energy Consumption for Wireless Sensor Networks

Hung-Chin Jang, Hon-Chung Lee, Jun-Xiang Huang
Due to congenital restriction of sensors, it is always a crucial issue on how to utilize limited energy effectively. We first put forward a network topology construction method, based on energy saving, including the way of forming a cluster and selecting middle heads and cluster heads. We then employed...

A Conceptual Framework for Collaboration Systems

Chao-Chin Yeh, Huei-Huang Chen
Due to the high complication of collaboration system, this thesis proposes a conceptual framework for collaboration system as a reference architecture for the collaboration systems. In the mean time, this thesis illustrates the functionalities of a collaboration system, the problems it resolved, and...

Computational Experiments on Algorithms for Haplotype Inference Problems by Pure Parsimony

I-Lin Wang, Hui-E Yang
To analyze the function of DNA, researchers have to obtain each haplotype, the genetic constitution of an individual chromosome, of an individual for analysis. Due to the significant efforts required in collecting haplotypes, genotypes, which are the descriptions of one conflated pair of haplotypes,...

Probabilistic Financial Decision Support Framework

Chiu-Che Tseng
The challenge of the business decision support domain is that a large amount of diverse information can be potentially relevant to a decision, and that, frequently, the decisions have to be made in a timely manner. This presents the potential for better decision support, but poses the challenge of building...

How to design optimistic operations for peer-to-peer replication

Hyun-Gul Roh, Jin-Soo Kim, Joon-Won Lee
As collaboration over the Internet becomes an everyday affair, it is increasingly important to provide high quality of interactivity. Distributed applications can replicate collaborative objects at every site for the purpose of achieving high interactivity. Replication, however, has a fatal weakness...

USIS: A Unified Framework for Secured Information System Lifecycle

Bei-Tseng Chu, Huiming Yu, Audrey Dance
Information security ≠ information system + security features such as access control and intrusion detection. Security considerations must be an integral part of the entire lifecycle of the information system. This paper presents a framework to systematically classify all security considerations throughout...

Service Oriented Federated Identity System Framework

Min Wu, Xiaoqiang Liu, Yongsheng Ding, Jiaxun Chen
The rapid evolution of network and distributed computing, such as Service Oriented Architecture (SOA), is increasing the challenge of securely controlling access to enterprise IT resources. As gaining access to distributed resources becomes increasingly vital, the ability to make sure that the right...

A comparative study of matrix inversion by recursive algorithms through single and double bordering

Bhavanam Rami Reddy, Ramabhadra Prof. I. Ramabhadra Sarma
In this paper we have derived single and double bordering methods for computation of the inverse of a matrix. The performance of these methods is compared with some existing methods . We conclude the following: For a general nonsingular matrix, both single and double bordering methods are superior to...

Protein-Protein Interaction Document Mining

Shing Doong, Shu-Fen Hong
Protein-protein interactions (PPI) are very important to the understanding of metabolic pathway. Many digital publications are available today; some of them discuss PPI and some of them do not. If machine learning techniques can be used to detect those PPI documents automatically, it would save researchers...