Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Study on Cementing Displacement Efficiency of Highly Deviated Wells in Tarim Oilfield

    As an important measure to improve the productivity in Tarim Oilfield, the application scale of highly deviated wells has been expanding in recent years. Cementing of highly deviated wells is characterized by ...

    Ying-jie Li, Zhi-guo Wang, Kang-wei Ao in Proceedings of the International Field Exp… (2024)

  2. No Access

    Chapter and Conference Paper

    Methods for Combination Optimization of Flight Routes and Flight Altitude Considering Restrictions in Free Route Airspace

    In order to reduce the cost of aircraft flights and air pollution emissions when flying through Free Route Airspace (FRA), methods have been developed to jointly optimize flight paths and flight altitudes. Fir...

    Na Wang, Zhiqiang Wei, Luhuan Wei, Yi Hui in 2023 Asia-Pacific International Symposium … (2024)

  3. No Access

    Chapter and Conference Paper

    Comments on the Visual Binary QR Code

    Quick Response (QR) codes are popular and widespread in real-world applications, and appearance is an interesting and valuable issue. To improve the black and white checkered appearance of QR codes, many desig...

    Pei-Yu Lin, Yi-Hui Chen, Wen-Chuan Wu in 2021 International Conference on Security … (2023)

  4. No Access

    Chapter and Conference Paper

    Feasibility Analysis and Process Design of Viscosity Reduction and Plugging Removal by Enzyme in a Block of Shengli Oilfield

    Affected by factors such as deep burial, poor reservoir physical properties, thick oil and insufficient formation energy, No. 9 sand group of Es2 in the south of a block in Shengli Oilfield has low recovery de...

    Bo-yu Zhou, Wen-na Zhao, Yi-hui Guo in Proceedings of the International Field Exp… (2023)

  5. No Access

    Chapter and Conference Paper

    Study on Variation Law of Wellbore Pressure After Gas Invasion in Fractured Gas Reservoir

    Fractured formations are often encountered during drilling. Improper treatment of gas invasion will lead to blowout accidents. In this paper, the occurrence conditions and mechanism of gravity displacement gas...

    Yi-hui Guo, Bo-yu Zhou, Fang-zhu **, Wei Hou in Proceedings of the International Field Exp… (2023)

  6. No Access

    Chapter and Conference Paper

    Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification

    Congenital heart diseases (CHD) can be detected through ultrasound imaging. Although ultrasound can be used for immediate diagnosis, doctors require considerable time to read dynamic clips; typically, physicia...

    Shih-Hsin Chen, I-Hsin Tai, Yi-Hui Chen in Pattern Recognition. ICPR International Wo… (2021)

  7. No Access

    Chapter and Conference Paper

    An Effective Target Recovery Method from a Source Location in Geo-Indistinguishable Surroundings

    Location-based services have become increasingly more pervasive in the context of Internet of Vehicles. Nowadays, vehicles can transfer their locations to the server for route planning, attractions searching, ...

    Chun-I. Fan, Hsin-Nan Kuo, Jheng-Jia Huang in Security with Intelligent Computing and Bi… (2020)

  8. No Access

    Chapter and Conference Paper

    Research on Remote Frequency Scan and Display Device Based on Wireless WIFI

    The paper aims to research a simple remote frequency swee** device based on wireless WiFi. The article describes the software and hardware design in details. Microprocessor uses port and integrated AD to col...

    Yan Fei Liu, Yi Hui Wang, Peng Yao in Recent Trends in Decision Science and Mana… (2020)

  9. No Access

    Chapter and Conference Paper

    Technical Evaluation and Impact Analysis of Libra

    Since the emergence of the concept of blockchain, it has always attracted the attention of the society and many enterprises. Some international giants have developed their own blockchain platforms to seize the...

    Su-de Qing, Yi-hui Zhang, Hong-nan Liu, Tao He, Bai-xue Yang, Kai Wei in Smart Blockchain (2019)

  10. No Access

    Chapter and Conference Paper

    A Study on the Application of EDA Technology in the Design of Virtual Digital Electronic Experiment

    Along with the rapid development of computer technology and electronic technology, the traditional digital electronic technology for experiment teaching can hardly meet the development requirements of the time...

    **long Liu, Zhendong Yin, Zhilu Wu in e-Learning, e-Education, and Online Traini… (2019)

  11. No Access

    Chapter and Conference Paper

    Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids

    Recently, lots of works on power consumption data aggregation have been proposed for the privacy-preservation of users against the operation center in smart grids. This is the user-based data aggregation, which a...

    Chun-I Fan, Yi-Fan Tseng, Yi-Hui Lin in Security with Intelligent Computing and Bi… (2018)

  12. No Access

    Chapter and Conference Paper

    A Content-Based Image Retrieval Method Based on the Google Cloud Vision API and WordNet

    Content-Based Image Retrieval (CBIR) method analyzes the content of an image and extracts the features to describe images, also called the image annotations (or called image labels). A machine learning (ML) al...

    Shih-Hsin Chen, Yi-Hui Chen in Intelligent Information and Database Systems (2017)

  13. No Access

    Chapter and Conference Paper

    Constructing Performance Measurement Indicators in the Government’ Information Unit in Taiwan: Using Balanced Scorecard and Fuzzy Analytic Hierarchy Process

    The purpose of the study is to establish balanced scorecard (BSC) in performance measurement of Government’ MIS Department. We take a broader definition of Government’ MIS Department as “an assembly which brin...

    Yi-Hui Liang in The 19th International Conference on Indus… (2013)

  14. No Access

    Chapter and Conference Paper

    A Two-Layer Steganography Scheme Using Sudoku for Digital Images

    Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bi...

    Yi-Hui Chen, Ci-Wei Lan, Zhi-Hui Wang in Ubiquitous Intelligence and Computing (2011)

  15. No Access

    Chapter and Conference Paper

    Distance Teaching in the Technology Course in Senior High School

    In the general outline of the technology course in senior high school in Taiwan, several topics are included. These curricula emphasize inspiring the students’ capacity for creative design, and develo** thei...

    Shi-Jer Lou, Tzai-Hung Huang, Chia-Hung Yen in Proceedings of the European Computing Conf… (2009)

  16. No Access

    Chapter and Conference Paper

    Mechanical Properties and Design of Lattice Composites and Structures

    Recently, lattice materials have been attractive for use as cores in light-weight sandwich panels, for energy-absorption and packaging applications, or as heat transfer devices. Lattice structure is a kind of ...

    Dai-Ning Fang, **ao-Dong Cui, Yi-Hui Zhang in IUTAM Symposium on Mechanical Properties o… (2009)

  17. No Access

    Chapter and Conference Paper

    Dynamic Modeling and Control of Rigid-Flexible Constrained Robot with Three Links

    In order to study the dynamic phenomenon of flexible robot, a physical model of a rigid-flexible constrained robot with three links is presented. The front link is flexible, and two back links are rigid. Some ...

    Yi-hui Cui, Chao Yun, Yuan-yuan Wang, Kun Sun in Intelligent Robotics and Applications (2008)

  18. No Access

    Chapter and Conference Paper

    Reversible Data Embedding Technique for Palette Images Using De-clustering

    In this paper, a reversible data embedding method for color images is proposed. The technique of data embedding is used to hide the secret data into multimedia such as text content, audio, video, and images. I...

    Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou in Multimedia Content Analysis and Mining (2007)

  19. No Access

    Chapter and Conference Paper

    Optimal Design Using Clonal Selection Algorithm

    In this paper, the Clonal Selection Algorithm (CSA) is employed by the natural immune system to define the basic features of an immune response to an antigenic stimulus. This paper synthesizes the advantages o...

    Yi-Hui Su, Wen-Jye Shyr, Te-Jen Su in Knowledge-Based Intelligent Information an… (2005)

  20. No Access

    Chapter and Conference Paper

    Hybrid Particle Swarm Optimization for Flow Shop Scheduling with Stochastic Processing Time

    The stochastic flow shop scheduling with uncertain processing time is a typical NP-hard combinatorial optimization problem and represents an important area in production scheduling, which is difficult because ...

    Bo Liu, Ling Wang, Yi-hui ** in Computational Intelligence and Security (2005)