Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Distributed Multicast Protocol with Location-Aware for Mobile Ad-Hoc Networks

    Mobile ad-hoc networks mean a group of mobile devices which communicate to each other without infrastructure assistant in wireless networks. Since the nodes are mobile, the network topology may change rapidly ...

    Tzu-Chiang Chiang, Jia-Lin Chang in Advances in Multimedia, Software Engineeri… (2012)

  2. No Access

    Chapter and Conference Paper

    Application and Design of Artificial Neural Network for Multi-cavity Injection Molding Process Conditions

    In this study, an artificial neural network (ANN) with a predictive model for the warpage of multi-cavity plastic injection molding parts. The developed method in this paper indicate that the minimum and the m...

    Wen-Jong Chen, Jia-Ru Lin in Advances in Future Computer and Control Systems (2012)

  3. No Access

    Chapter and Conference Paper

    Mining High Utility Itemsets Based on the Pre-large Concept

    In this paper, an incremental mining algorithm is proposed for efficiently maintaining the discovered high utility itemsets based on the pre-large concept. It first partitions itemsets into nine cases accordin...

    Chun-Wei Lin, Tzung-Pei Hong, Guo-Cheng Lan in Advances in Intelligent Systems and Applic… (2013)

  4. No Access

    Chapter and Conference Paper

    A High Energy Efficiency Approach Based on Fuzzy Clustering Topology for Long Lifetime in Wireless Sensor Networks

    Fuzzy logic has been successfully applied in various fields of daily life. Fuzzy logic is based on non-crisp set. The characteristic function of non-crisp set is permitted to have to range value between 0 and ...

    Quynh-Trang Lam, Mong-Fong Horng in Advanced Methods for Computational Collect… (2013)

  5. No Access

    Chapter and Conference Paper

    Design and Implementation of an IPv4/IPv6 Dual-Stack Automatic Service Discovery Mechanism for an Access Control System

    With the development of the Internet network technologies, a vast number of things are connecting to the Internet. The available IPv4 addresses are used up almost. IPv6 and IPv4 will coexist for many years. Th...

    Hui-Kai Su, Chih-Hsueh Lin, Jia-Long Hu in Advances in Intelligent Information Hiding… (2017)

  6. No Access

    Chapter and Conference Paper

    Advanced Center-Folding based Reversible Hiding Scheme with Pixel Value Ordering

    Dual image techniques have been broadly applied to reversible information hiding in recent years. Center folding strategy proposed by Lu et al. in 2015 compresses the secret symbol and then utilizes averaging ...

    Tzu-Chuen Lu, Chi-Quan Lin, Jia-Wei Liu in Advances in Intelligent Information Hiding… (2017)

  7. No Access

    Chapter and Conference Paper

    The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students

    Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...

    Chun-Hsiung Tseng, Jyi-Shane Liu, Yung-Hui Chen, Lin Hui in Frontier Computing (2018)

  8. No Access

    Chapter and Conference Paper

    Application of Fuzzy Comprehensive Evaluation Model in Mentality Adaptive Research of College Freshmen

    This paper study the mentality adaption of college freshmen. Based on analysis and exception handling on the mentality adaption index data of freshmen from Guangdong province, fuzzy comprehensive evaluation (F...

    Yu-bin Zhong, Yue-peng Liu, Ming-shuo Xu in Fuzzy Information and Engineering and Deci… (2018)

  9. No Access

    Chapter and Conference Paper

    The Speed Calculated Hand Activity Level (HAL) Matches Observer Estimates Better Than the Frequency Calculated HAL

    Hand Activity Level (HAL) can be estimated from observations (HALO), calculated from exertion frequency, F and duty cycle D (HALF) or from speed, S and D (HALS). Data collected by prospective cohort studies were...

    Oguz Akkas, Stephen Bao in Proceedings of the 20th Congress of the In… (2019)

  10. No Access

    Chapter and Conference Paper

    On an Improved K-Best Algorithm with High Performance and Low Complexity for MIMO Systems

    Multiple-input multiple-output (MIMO) techniques are significantly advanced in contemporary high-rate wireless communications. The computational complexity and bit-error-rate (BER) performance are main issues...

    Jia-lin Yang in Smart Innovations in Communication and Computational Sciences (2019)

  11. No Access

    Chapter and Conference Paper

    Automated Video Lifting Posture Classification Using Bounding Box Dimensions

    A method is introduced for automatically classifying lifting postures using simple features obtained through drawing a rectangular bounding box tightly around the body on the sagittal plane in video recordings...

    Runyu Greene, Yu Hen Hu, Nicholas Difranco in Proceedings of the 20th Congress of the In… (2019)

  12. No Access

    Chapter and Conference Paper

    Privacy Mining from IoT-Based Smart Homes

    Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially fo...

    Ming-Chang Lee, Jia-Chun Lin, Olaf Owe in Advances on Broadband and Wireless Computi… (2019)

  13. No Access

    Chapter and Conference Paper

    Dynamic Facial Features in Positive-Emotional Speech for Identification of Depressive Tendencies

    Depressive symptoms in young people may persist into adulthood and develop into depression. Early screening of depressive tendencies in university students helps to reduce the number and intensity of their dep...

    Jia-Qing Liu, Yue Huang, **n-Yin Huang in Innovation in Medicine and Healthcare (2020)

  14. No Access

    Chapter and Conference Paper

    RePAD: Real-Time Proactive Anomaly Detection for Time Series

    During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of d...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applic… (2020)

  15. No Access

    Chapter and Conference Paper

    Character Localization Based on Support Vector Machine

    The purpose of character localization is to detect and locate a certain character from the picture, which can be used in automatic testing task. In this paper, we propose a new virtual keyboard character local...

    **-Hui Li, Ming-Ming Shi, **ang-Bo Lin, Jia-Jun Zeng in Advances in Computer Vision (2020)

  16. No Access

    Chapter and Conference Paper

    DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction

    Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detec...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applications (2020)

  17. No Access

    Chapter and Conference Paper

    Study on the Factors Affecting Sharing Behavior of Social Media Platform Users

    User’s behavior on social media platform becomes so complicate that only linear approach is hard to examine the structural issue. Therefore, the back propagation neural network is employed in this study since ...

    Hsiu-Ching Chang, Ming-Yueh Wang, Ci-Jhan He in Security with Intelligent Computing and Bi… (2020)

  18. No Access

    Chapter and Conference Paper

    An NMT-Based Approach to Translate Natural Language Questions to SPARQL Queries

    SPARQL is a powerful query language which has already been widely used in various natural language question answering (QA) systems. As the advances of deep neural networks, Neural Machine Translation (NMT) mod...

    Jia-Huei Lin, Eric Jui-Lin Lu in IT Convergence and Security (2021)

  19. No Access

    Chapter and Conference Paper

    How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?

    Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion det...

    Ming-Chang Lee, Jia-Chun Lin in Advanced Information Networking and Applic… (2021)

  20. No Access

    Chapter and Conference Paper

    Feedback Vocal Rehabilitation Software Applied to Mobile Devices for Maximum Phonation Time

    The key to the maximum phonation time (MPT) is how much lung capacity you have. If the MPT is too short, one cannot cut the sentences inappropriate time and lead to communication difficulties. However, there i...

    Jia-Yi Lin, Yu-Chi Huang, Gwo-Jiun Horng in Advanced Machine Learning Technologies and… (2021)

previous disabled Page of 2