Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    DC Voltage Detection Based on Combined Sinc and Kalman Filter

    Relay test equipment are key equipment for rail transit to ensure safe operation of rail transit

    Gu-hua Lin, Chen Li, Jia-ning Zhu, Lei ** in Proceedings of 3rd 2023 International Conf… (2024)

  2. No Access

    Chapter and Conference Paper

    Finite-Iteration Consensus Tracking Control of Nonlinear Multi-agent Systems with Input Sharing

    In this paper, the distributed iterative learning control (DILC) based on control input sharing is constructed for nonlinear multi-agent system to achieve finite-iteration tracking. The strategy of input shari...

    Jia-**n Wang, Cheng-Lin Liu in Proceedings of 2023 7th Chinese Conference… (2024)

  3. No Access

    Chapter and Conference Paper

    Intrusion Detection System Using Semi-supervised Learning with Hybrid Labeling Techniques

    With the continuous development of the Internet and a substantial increase in interconnected devices, devices have become more vulnerable to cybersecurity attacks. Deploying Network-based Intrusion Detection S...

    Ren-Hung Hwang, Tzu-Hao Tsai, Jia-You Lin in Advances in Information and Communication … (2023)

  4. No Access

    Chapter and Conference Paper

    The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC

    Today, information technology (IT) and operational technology (OT) accelerate the development of Intelligence of Things (IoT) systems, which consist of modular integrated circuits (ICs). However, the existing ...

    Hsing-Chung Chen, Yao-Hsien Liang in Innovative Mobile and Internet Services in… (2023)

  5. No Access

    Chapter and Conference Paper

    Iterative Learning Consensus Tracking Control for Multi-agent Systems with Neighboring Agents’ Average Control Inputs

    The iterative learning consensus tracking issue is addressed for homogeneous linear multi-agent systems in this paper. The neighboring agents’ previous knowledge is used to design a novel consensus control pro...

    Jia-**n Wang, Cheng-Lin Liu, Liang Shan in Proceedings of 2021 5th Chinese Conference… (2023)

  6. No Access

    Chapter and Conference Paper

    Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS)

    According to many studies, product diversification will benefit companies and motivate companies to carry out business diversification, including improving market competitiveness, spreading business risks and ...

    Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen in Innovative Mobile and Internet Services in… (2022)

  7. No Access

    Chapter and Conference Paper

    An NMT-Based Approach to Translate Natural Language Questions to SPARQL Queries

    SPARQL is a powerful query language which has already been widely used in various natural language question answering (QA) systems. As the advances of deep neural networks, Neural Machine Translation (NMT) mod...

    Jia-Huei Lin, Eric Jui-Lin Lu in IT Convergence and Security (2021)

  8. No Access

    Chapter and Conference Paper

    How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?

    Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion det...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applic… (2021)

  9. No Access

    Chapter and Conference Paper

    Feedback Vocal Rehabilitation Software Applied to Mobile Devices for Maximum Phonation Time

    The key to the maximum phonation time (MPT) is how much lung capacity you have. If the MPT is too short, one cannot cut the sentences inappropriate time and lead to communication difficulties. However, there i...

    Jia-Yi Lin, Yu-Chi Huang, Gwo-Jiun Horng in Advanced Machine Learning Technologies and… (2021)

  10. No Access

    Chapter and Conference Paper

    Study of the Intelligent Algorithm of Hilbert-Huang Transform in Advanced Power System

    With the rapid increase in population and electricity consumption, power grid has long formed a large-scale interconnection of systems. The power system is a complex multi-dimensional dynamic system, the tradi...

    Cheng Zhang, Jia-**g Liu, Kuo-Chi Chang in Proceedings of the International Conferenc… (2021)

  11. No Access

    Chapter and Conference Paper

    Dynamic Facial Features in Positive-Emotional Speech for Identification of Depressive Tendencies

    Depressive symptoms in young people may persist into adulthood and develop into depression. Early screening of depressive tendencies in university students helps to reduce the number and intensity of their dep...

    Jia-Qing Liu, Yue Huang, **n-Yin Huang in Innovation in Medicine and Healthcare (2020)

  12. No Access

    Chapter and Conference Paper

    RePAD: Real-Time Proactive Anomaly Detection for Time Series

    During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of d...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applic… (2020)

  13. No Access

    Chapter and Conference Paper

    Character Localization Based on Support Vector Machine

    The purpose of character localization is to detect and locate a certain character from the picture, which can be used in automatic testing task. In this paper, we propose a new virtual keyboard character local...

    **-Hui Li, Ming-Ming Shi, **ang-Bo Lin, Jia-Jun Zeng in Advances in Computer Vision (2020)

  14. No Access

    Chapter and Conference Paper

    DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction

    Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detec...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applications (2020)

  15. No Access

    Chapter and Conference Paper

    Study on the Factors Affecting Sharing Behavior of Social Media Platform Users

    User’s behavior on social media platform becomes so complicate that only linear approach is hard to examine the structural issue. Therefore, the back propagation neural network is employed in this study since ...

    Hsiu-Ching Chang, Ming-Yueh Wang, Ci-Jhan He in Security with Intelligent Computing and Bi… (2020)

  16. No Access

    Chapter and Conference Paper

    The Speed Calculated Hand Activity Level (HAL) Matches Observer Estimates Better Than the Frequency Calculated HAL

    Hand Activity Level (HAL) can be estimated from observations (HALO), calculated from exertion frequency, F and duty cycle D (HALF) or from speed, S and D (HALS). Data collected by prospective cohort studies were...

    Oguz Akkas, Stephen Bao in Proceedings of the 20th Congress of the In… (2019)

  17. No Access

    Chapter and Conference Paper

    On an Improved K-Best Algorithm with High Performance and Low Complexity for MIMO Systems

    Multiple-input multiple-output (MIMO) techniques are significantly advanced in contemporary high-rate wireless communications. The computational complexity and bit-error-rate (BER) performance are main issues...

    Jia-lin Yang in Smart Innovations in Communication and Computational Sciences (2019)

  18. No Access

    Chapter and Conference Paper

    Automated Video Lifting Posture Classification Using Bounding Box Dimensions

    A method is introduced for automatically classifying lifting postures using simple features obtained through drawing a rectangular bounding box tightly around the body on the sagittal plane in video recordings...

    Runyu Greene, Yu Hen Hu, Nicholas Difranco in Proceedings of the 20th Congress of the In… (2019)

  19. No Access

    Chapter and Conference Paper

    Privacy Mining from IoT-Based Smart Homes

    Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially fo...

    Ming-Chang Lee, Jia-Chun Lin, Olaf Owe in Advances on Broadband and Wireless Computi… (2019)

  20. No Access

    Chapter and Conference Paper

    The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students

    Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...

    Chun-Hsiung Tseng, Jyi-Shane Liu, Yung-Hui Chen, Lin Hui in Frontier Computing (2018)

previous disabled Page of 2