1994 International Computer Symposium Conference Proceedings

Size: px
Start display at page:

Download "1994 International Computer Symposium Conference Proceedings"

Transcription

1 1994 International Computer Symposium Conference Proceedings Volume 2 of 2 December 12-15,1994 National Chiao Tung University Hsinchu, Taiwan, Republic of China UB/TIB Hannover

2 viii Session 2-3-E: Software Engineering (II) 1. HISROOT: A Hierarchical Software Reusability Driven System for Object- Oriented Analysis. 664 Jinn-Moon Yang, Wei T. Huang and Jonathan Lee 2. An Overview of the PIVOT Environment for Program Restructuring 677 Chyi-Ren Dow, Shi-Kuo Chang and Mary Lou Soffa 3. Delay Analysis in the Bristol Godel System 677 Jiwei Wang 4. Iterations on Elements of Collection Objects 683 Pei-Chi Wu and Feng-Jian Wang

3 Volume 2 Session 3-1-A: Parallel Processing (I) 1. Scheduling Parallel Tasks with Setup Time on Hypercube Systems 689 Jiann-Fu Lin, Win-Bin See and Sao-Jie Chen 2. A New Model for Dynamic Processor Allocation on Hypercube Multiprocessors 694 Huey-Ling Chen, Chung-Ta King and Yunn-Yen Chen 3. Mapping Concurrently-Communicating Subcubes in a Hypercube Multicomputer 700 Bing-rung Tsai and Kang G. Shin Session 3-1-B: Computer Networks (I) \.LLR Routing in VP-based ATMNetworks 707 Ren-Hung Hwang 2. Bandwidth Allocation and Enforcement Mechanisms for A TM Networks 713 Jin-Long Wang and Liang-Teh Lee 3. Bandwidth Allocation of Virtual Paths with Steps and Lower Bounds for ATM Networks 719 Li-Der Chou, Jean-Lien C. Wu and Shian-Jeng Tzeng 4. A Congestion Control Approach through Token Assignment and Buffer Management in ATM Networks 725 S. S. Chen and Y. C. Chen 5. A New Switching Architecture for ATM Networks 732 Tai-Kuo Woo Session 3-1-C: Computer Graphics (I) 1. Linking Bezier and Generalized Ball Curves 738 Tang Van To and Huynh Ngoc Phi en 2. Constructing the Planar Convex Hulls by Quadrilateral Devour Algorithm 744 Louis R. Chao, Hoo-Chen Liu, Ying-Feng Kou,Wen-Chin Hsieh and Wei-Chuan Lin 3. A Study on Planar Offset Curves Based on Interval Curves 750 Ji-Cherng Lin, Jenn-Hua Lee and Chii-Shiou Luo 4. A Local Geometric Constructive Methodfor Generating Curvature Continuous Shape Preserving Curves 756 Jenn-Hua Lee, Ji-Cherng Lin and Ber-Shiou Lin IX

4 5. New Formulations for Blending Parametric Surfaces. 762 Jung-Hong Chuang, Feng-Liang Lien, Wei-Chung Hwang and Chan-Dar Lin Session 3-1-D: Artificial Intelligence (III) 1. A Knowledge Acquisition Framework for an Industrial Expert System 768 Maria Lee and Kai Foong 2. Genetic-Based Search on Structural Matching 774 Yuan-Kai Wang, Kuo-Chin Fan and Jorng-Tzong Horng 3. Object-Oriented Fuzzy System Framework with Partial Inheritance 780 Shiuh-Chu Lee, Jye-Yuan Lee, Yau-Hwang Kuo and Ren-Dar Yang 4. A Framework for Organizing Semantic Relations in Frame-Structured Knowledge Bases 786 Yufeng F. Chen, Nazir A. Warsi and Larry M. Stephens Session 3-1-E: Databases (I) 1. Average Storage Utilization of a Bucket Method: A Long Derivation 792 Chuan-Heng Ang and Hanan Samet 2. An Operational Model of a B-tree Algorithm for Nested Transactions 797 John Lee 3. Data Sharing - A Pre-Integration Perspective 803 Eberhard Stickel, Jens Hunstock, Anke Ortmann and Jan Ortmann, 4. Clustering of Partitioned Signature File 811 Man-Kwan Shan and Suh-Yin Lee Session 3-2-A: Parallel Processing (II) 1. Efficient Embedding Hypercube on Arrangement Graphs 817 Shun-Shan Tsai and Shi-Jinn Horng 2. Optimal Embedding of Fibonacci Cubes in Hyper cubes with Two Faulty Nodes 823 Feng-Shr Jiang, Shi-Jinn Horng and Tzong-Wann Kao 3. Compact Embedding of Binary Trees into Hypercubes 829 Chui-Cheng Chen and Rong-Jaye Chen 4. Improved Mapping Algorithms for Multiprocessor based Simulation Application 835 Raja Neogi and Meghanad Wagh Session 3-2-B: Computer Networks (II) 1. Protocol Test Sequence Generation for EFSM-Specified Protocols 842 Chung-Ming Huang and Meng-Shu Chiang 2. The Fuzzy Time Communicating State Machine (FTCSMJfor Communication x

5 Protocols 848 Chung-Ming Huang, Shiun-Wei Lee and Jenq-Muh Hsu 3. Enhancing Protocol Modularity in Network Protocol Infrastructure with Configurable Protection Firewalls 854 Anthony H.S. Loong and W.H. Cheung 4. Some Experiences with X.25 DTE Conformance Testing 861 Ching-Sung Lu, San-Wei Sun and Weun-Jier Hwang 5. S/DQFB: A Seamless MAC Protocol for Multiple DQFB Buses Interconnection 867 Tein-Yaw David Chung and Ching-Chih Shih Session 3-2-C: Computer Graphics (II) 1. A New Contour Fill Algorithm for Outlined Character Image Generation 873 Lejun Shao and Hao Zhou 2. Efficient Algorithms for Volume Rendering 879 Chyi-Cheng Lin and Yu-Tai Ching 3. The Wavelet Curve Descriptor and Its Application to Cartoon Animation and Morphing 885 Chun-Hsiung Chuang and C.-C. Jay Kuo 4. Direct Shape Recovery from Texture Information. 891 Kyoung Mu Lee and C.-C.Jay Kuo 5. Non-Manifold Boundary Representation for Solid Modelling 897 Stefka Gueorguieva and David Marcheix Session 3-2-D: Artificial Intelligence (IV) 1. A Shift-First Strategy for Generalized LR Parsing 905 Yong-Seok Lee, Jun-ichi Aoe and Masao Fukeda 2. Word Segmentation for Chinese Phonetic Symbols. 911 Amelia Fong Lochovsky and Kim-hang Chung 3. Automatic Conversion of Romanized Chinese Sentences into Chinese Character Sentences 917 Youran Lan and Ming-Fang Lee 4. Speeding Up Contextual Postprocessing By Using A Dictionary With Compressed Two-Character Indices 923 Cheng-Huang Tung and Hsi-Jian Lee Session 3-2-E: Databases (II) 1. Data Allocation in Distributed Databases 929 William Y.S. Cheung and Victor O.K. Li 2. An Eulerian-Path-Like-Based Algorithm for Semijoins 935 Ye-In Chang and Bor-Miin Liu 3. Coupling of an Information Management System in a Framework for XI

6 Concurrent Product Data Handling 941 Stephen Sum and Anil Kumar Singh 4. Using Logic Programming in Developing Parallel Deductive Database 948 Vincenza Carchiolo, Michele Malgeri-Maurizio Papale 5. Load Balancing for Distributed Database Systems 955 Chengwen Liu and I-Ping Chu Session 3-3-A: Parallel Processing (III) 1. Knowledge-Based Data Dependence Testing on Loops 961 Wen-Chung Shih, Chao-Tung Yang and Shian-Shyong Tseng, 2. A Parallel Dynamic Load Balancing Algorithm for Solution-Adaptive Finite Element Meshes on 2D-Tori 967 Yeh-Ching Chung, Yaa-Jyun Yeh and J.-S Liu 3. An Approach to Mapping Blocks of Iterations in Nested Loops into VLSI Array Processors 973 Yeong-Sheng Chen and Sheng-De Wang 4. A Parametric Simulator for a Parallel Computer Using Address-Trace 9 79 Youichi Omori, Kazuki Joe, Akira Fukuda and Keijirou Araki Session 3-3-B: Computer Networks (III) 1. Optimal Design of a Polling System with General and Mixed Service 986 Lain-Chyr Hwang and Chung-Ju Chang 2. Routing of Calls in North American Intelligent Telephony Networks for Personalized Communications, and Multimedia 992 Hazem El-Gendy, Robert Probert and Linsheng Wei 3. An Efficient Algorithm for Reducing Channel Density by Over-the-Cell Routing 998 Shih-Chuan Hung 4. A Study of Real-Time Distributed Computation And Its Quality-of-Service Metrics For Future High-Speed Network 1004 I-Shyan Hwang Session 3-3-C: CAD 1. Effective Implementation of Self-Timed Systems with Feedback Paths Y.W. Pang, C.S. Choy and C.F. Chan 2. Modeling and Optimizing Design Variables in Computer Aided Switching Noise Simulation 1018 Howard H. Chen, Stanley E. Schuster, Gerard V. Kopcsay and Shen Lin 3. Formal Verification of VerilogDescriptions 1024 Claudionor N. Coelho, K.C. Chen and M. Fujita 4. Estimating Transition Densities for PLA Combinational Logic Circuits 1030 Tzong-Dar Her, Wei Kang Tsai, Fadi Kurdahi and Yulin Chen XII

7 5. Expressing Spatial Relationships in Geometric Modelling by Constraints 1036 Borut Zalik and Nikola Guid Session 4-1-A: Distributed System (I) 1. An Ordered and Reliabile Multicast Protocol for Distributed Systems 1042 Ye-In Chang and Ming-Hon Hwang 2. Fast Optimistic Rollback Recovery in Distributed Systems 1048 Tong-Ying Juang, Kun-Ming Yu and Chang-Shyh Peng 3. Atomic Multicast Mechanisms and Applications in Distributed Systems 1054 Xiaohua Jia 4. The Formalization and Hierarchy of Memory Consistency Models 1060 Alexander I-Chi Lai and Chin-Laung Lei 5. SRPC: A Simple and Fault-Tolerant Remote Procedure Call System 1067 Wanlei Zhou Session 4-1-B: Computer Networks (IV) 1. A New Packet Scheduling Algorithm For High-Speed Wide-Area Networks 1073 Jae-Chang Kwak 2. A Generic Communication Subsystem (GCS)for Client/Server Environments 1080 Chung-You P. Liu, Yuan-Yuan Liu, Thomas W. Christopher and C. Robert Carlson 3. A Common Message Distribution Interface Service (CMDIS) in Heterogeneous Environments 1086 Chung-You P. Liu and Thomas W. Christopher 4. Encoding and Decoding of Address Information in Multicast Messages 1092 Chi-Ming Chiang and Lionel M. Ni Session 4-1-C: Neural Networks (I) 1. Split Fault-Tolerant Training Algorithms 1098 Yen-Tseng Hsu, Chyun-Shin Cheng, and Chwan-Chia Wu 2. The Asymptotical Stability of Multi-Level Discrete Exponential Bidirectional Associative Memory 1104 Chua-Chin Wang, Shiou-Ming Hwang and Jyu-Ping Lee 3. Threshold Logic Based Neural Filters with Nonnegative Weights and Threshold Values - Their Classification and Retrieval Behaviors 1110 Pao-Ta Yu 4. Global Optimization in Neural Network Training 1116 Lucas Chi, Kwong Hui, Kwok-Yan Lam and Rudy Setiono Session 4-1-D: Signal Processing (I) 1. Extended Self-Similar Processes for Stochastic Signal Modeling 1122 Lance M.Kaplan and C.-C. Jay Kuo

8 2. Wavelet-Based Signal Extrapolation: Theory and Algorithms 1128 Li-Chien Lin and C.-C. Jay Kuo 3. Projection-Based Group Delay Scheme for Speech Recognition 1134 Shin-Lun Tung, I-Shine Lei and Yau-Tarag Juang 4. An Initial Study on Large-Vocabulary Continuous Mandarin Speech Recognition with Limited Training Data Based on Sub-syllabic Models 1140 Hsin-Min Wang, Renyuan Lyu, Jia-Lin Shen and Lin-Shan Lee Session 4-1-E: Databases (Ml) 1. Query Processing in Object-Oriented Databases 1146 Vilas Wuwongse, Suttawat Triwittayapoom and Natthawit Dejdumronge 2. Incorporating Behavioral Modeling into Object Oriented Database Design Model 1152 Gwo-Dong Chen, Baw-Jiung Liu, Yu-Min Yan and Ping-Kuen Chen 3. The Design and Implementation of An Easy to Use and Efficient Object-OrientedDatabase (EODB) 1158 Wen-Wei Pan and Wei-Pang Yang 4. Buffer Management for Object-Oriented Database Management Systems 1164 Kuen-Fang J. Jea, Shi-Ying Chen, and Yuan-Te Lee 5. Short Cuts for Trover sals in Object-Oriented Database Systems 1172 Wang-Chien Lee and Dik Lun Lee Session 4-2-A: Distributed System (II) 1. The Reliability Analysis of a General Consecutive-k-out-of-n:G System 1178 Min-Sheng Lin, Deng-Jyi Chen, Kuo-Lung Ku and Kuang-Chao Chang 2. An Algorithm for Load Balancing in Generally Configured Distributed Systems 1184 Jie Li and Hisao Kameda 3. The Design of a Distributed File Server Based on Distributed Shared Memory 1190 Shian-Hua Lin, Yueh-Min Huang and Chi-Nan Chen 4. A Cooperation Protocol for an Object-Sorting Task in a Multi-agent Robotic System 1197 Fang-Chang Lin and Jane Yung-Jen Hsu 5. Analytical Modeling on Object Invocations and Assignment Strategies in Message-Passing Systems 1203 Wen-Tsung Chang and Chien-Chao Tseng Session 4-2-B: Computer Networks (V) 1. Deregistration Strategies for PCS Networks 1209 Yi-Bing Lin and Shu-Yuen Hwang 2. Performance of Integrated Services Fiber Optic PLAYTHROUGH Rings 1215 LongBit Chai and Charles B. Silio, Jr. 3. A Knowledge-Based Approach that Supports Dependency Analysis of Network xiv

9 Management 1221 Deh-Min Wu 4. Multiple Fault Diagnostics for Communication Protocols Shiou-Jiun Chiou, Chuan-Yi Tang and Wen-Huei Chen Session 4-2-C: Neural Networks (II) 1. Neuro-Expert System by a Supervised-Learning Self-Organising Network 1234 Yuen-Tai So and Kwork-Ping Chan 2. Invariant Handwritten Chinese Character Recognition Using Fuzzy Neural Networks 1240 Hung-Pin Chiu and Din-Chang Tseng 3. Neural Network-Based Fuzzy Systems 1246 Mu-Chun Su, Chien-Jen Kao, Kai-Ming Liu, Chi-Yeh Liu and Chih-Ming Wu 4. A Unipolar Hamming Net Neural Network 1251 Chii-Maw Uang, Wei-Feng Lin and Guowen Lu Session 4-2-D: Signal Processing (II) 1. Parameters Estimation of a Fractal Signal Model and Its Distributed Parallel Algorithm Implementation 1256 Xiaokun Zhu, D M Titterington and Bing Cheng 2. The Post-Processing Stages of a Mandarin Waveform Synthesizer 1262 Pei-yih Ting, Chun-Yu Tsai, and Chi-Shi Liu 3. Suppression of Moire Patterns in Scanned Halftone Images by Double Scans with Moving Grids 1267 Ching-Yu Yang and Wen-Hsiang Tsai 4. On Using Fractals Features in Image Analysis 1273 Siu-Hang Or Session 4-2-E: Databases (IV) 1. Query-By-Class (QBC): An Expressive and User-Friendly Graphical User Interface for OODB 1279 Ming-Jer Tsai and Wei-Pang Yang 2. Multi-Priority Tree: An Index Structure for Spatial Data 1285 Ching-Der Tung, Wen-Chi Hou and Jiang-Hsing Chu 3. Logging Real-Time Main Memory Databases 1291 Jing Huang and Le Gruenwald 4. Managing Overlapping Features in Spatial Databse Applications 1297 Enrico Nardelli and Guido Proietti xv

10 Author Index 1304 Reviewer List 1309 xvi

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute Oral 011 Oral 016 Oral 017 Agile Project Management in MIS: A Case Study in A Research Institute Exploring Developing Countries Immigrants Intention to Use Information Communication Technology Partial

More information

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems PROCEEDINGS Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems Copyright 1996 by National Sun Yat-Sen University All rights reserved. Abstracting

More information

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features Room B1 Title June 10 08:30-10:00 53 Proximity Comparison Modes for Logo Design 75 Flood Tracking in Severe Weather 138 Detection of Bus Route Number via Motion and YCbCr Features Chen-I Huang, Shing-Sheng

More information

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648 Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern

More information

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七 104 年 03 月通過學術審查 年 級 :96 學年度入學, 博七 著作列表 Journal Papers 1. Cheng-Yen Lin, Chung-Wen Huang, Chi-Bang Kuan, Shi-Yu Huang, and Jenq-Kuen Lee, The Design and Experiments of A SID-Based Power-Aware Simulator

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

(Proceedings of the 2002 International Computer Symposium

(Proceedings of the 2002 International Computer Symposium (Proceedings of the 2002 International Computer Symposium Edited by Arbee L.P. Chen and Ruay-Shiung Chang Sponsored by Ministry of Education, R.O.C. National Science Council, R.O.C. National Dong Hwa University,

More information

Curriculum Vitae. Biography of Kuang-Hui Chi (February 2018)

Curriculum Vitae. Biography of Kuang-Hui Chi (February 2018) Curriculum Vitae Biography of Kuang-Hui Chi (February 2018) Kuang-Hui Chi was Assistant Professor (2003 2009), Associate Professor (2009 2018), and is Professor (elevation effective since August 2017)

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 3 of 4 TECHNISCHE INFORMATIO.NSBIBLIOTHEK UNIVERS1TATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

Clock Skew Based Client Device Identification in Cloud Environments

Clock Skew Based Client Device Identification in Cloud Environments Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech. 1 Wei-Chung Teng on behalf of Assoc.

More information

Opening Speech First Lecture Room Prof. Jenq-Neng Hwang

Opening Speech First Lecture Room Prof. Jenq-Neng Hwang Time Dec. 16 (Thur.) 08:30 Registration 09:00 Opening Ceremony 09:30 Opening Speech Prof. Jenq-Neng Hwang 10:20 Coffee Break Parallel Session 1 Digital Content, Digital Life, Information Security (I) E-learning,

More information

2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan November IEEE Catalog Number: ISBN:

2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan November IEEE Catalog Number: ISBN: 2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan 16 18 November 2012 IEEE Catalog Number: ISBN: CFP1224L-PRT 978-1-4673-4976-5 2012 Conference on Technologies

More information

Symposium (ICS 2010) 2010 International Computer. Pages Tainan, Taiwan December IE EC IEEE Catalog Number: CFP1029K-PRT

Symposium (ICS 2010) 2010 International Computer. Pages Tainan, Taiwan December IE EC IEEE Catalog Number: CFP1029K-PRT 2010 International Computer Symposium (ICS 2010) Tainan, Taiwan - 16 18 December 2010 Pages 524-1054 IE EC IEEE Catalog Number: CFP1029K-PRT IEEE ISBN: 978-1-4244-7639-8 2/2 Parallel Session 7 Friday,

More information

Program at a glance. Wednesday, 23 August Session 1. Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ~ ID 26 ID 20 ID 28 15:00

Program at a glance. Wednesday, 23 August Session 1. Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ~ ID 26 ID 20 ID 28 15:00 Program at a glance Wednesday, 23 August Session 1 (Room:Y201) Session 2 (Room:Y202) Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ID 26 ID 20 ID 28 15:00 ID 36 ID 38 ID 9 ID 48 ID 51

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 1 of 4 TECHNISCHE INFORMATIONSBIBLiOTHEK UNIVERSITATSBiBLIOTHEK HANNOVCR November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

Symposium (ICS 2010) IEEE International Computer. Pages Tainan, Taiwan December 2010 CFP1029K-PRT /2

Symposium (ICS 2010) IEEE International Computer. Pages Tainan, Taiwan December 2010 CFP1029K-PRT /2 2010 International Computer Symposium (ICS 2010) Tainan, Taiwan 16-18 December 2010 Pages 1-523 IEEE IEEE Catalog Number: ISBN: CFP1029K-PRT 978-1-4244-7639-8 1/2 Parallel Session 1 Thursday, Dec. 16,

More information

xiv Contents An Ontology-Based Herb Therapy Recommendation for Respiration System Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ti

xiv Contents An Ontology-Based Herb Therapy Recommendation for Respiration System Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ti Contents Multimedia Security and Its Applications A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification... 3 Chin-Feng Lee, Jau-Ji Shen, and Yu-Hua Lai Steganographic

More information

Comparative Analysis of Smart Card Authentication Schemes

Comparative Analysis of Smart Card Authentication Schemes IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

Curriculum Vitae Rong-Hao Liang

Curriculum Vitae Rong-Hao Liang Curriculum Vitae Rong-Hao Liang Address: 3F., No.10, Aly. 3, Ln. 423, Zhuangjing Rd., Xinyi Dist., Taipei City 110, Taiwan Mobile: +31-6-27264425 (NL)/ +886-911-451827 (TW) Website: http://ronghaoliang.me

More information

Qingdao, , China. China. Keywords: Deep sea Ultrahigh pressure, Water sound acquisition, LabVIEW, NI PXle hardware.

Qingdao, , China. China. Keywords: Deep sea Ultrahigh pressure, Water sound acquisition, LabVIEW, NI PXle hardware. 2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 Research and Design on Water Sound Acquisition System of Deep Sea Ultrahigh Pressure Environment Gang TONG 1,

More information

2016 International Computer Symposium (ICS 2016)

2016 International Computer Symposium (ICS 2016) 2016 International Computer Symposium (ICS 2016) Chiayi, Taiwan 15-17 December 2016 IEEE Catalog Number: ISBN: CFP1629K-POD 978-1-5090-3439-0 Copyright 2016 by the Institute of Electrical and Electronics

More information

The University of Hong Kong Department of Electrical and Electronic Engineering CE/EComE/EE/InfoE Technical Project Presentation Time-table 2010/11

The University of Hong Kong Department of Electrical and Electronic Engineering CE/EComE/EE/InfoE Technical Project Presentation Time-table 2010/11 To: All EEE & CS Teaching Staff From Dr. W. H. Lam (EEE) The University of Hong Kong Department of Electrical and Electronic Engineering CE/EComE/EE/InfoE Technical Project Presentation Time-table 2010/11

More information

Zhi-Quan Luo Electrical and Computer Engineering

Zhi-Quan Luo Electrical and Computer Engineering Sun, Ruoyu, and Zhi-Quan Luo. 2015. Interference alignment using finite and dependent channel extensions: The single beam case. IEEE Transactions on Information Theory 61 (1) (JAN 01): 239-55. Baligh,

More information

4>IEEE. Computer, Consumer and Control (IS3C 2012) 2012 International Symposium on. Taichung, Taiwan. 4-6 June 2012

4>IEEE. Computer, Consumer and Control (IS3C 2012) 2012 International Symposium on. Taichung, Taiwan. 4-6 June 2012 2012 International Symposium on Computer, Consumer and Control (IS3C 2012) Taichung, Taiwan 4-6 June 2012 4>IEEE IEEE Catalog Number: CFP1222S-PRT ISBN: 978-1-4673-0767-3 2012 International Symposium on

More information

Contents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under

More information

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 [30] Dong J., Lou j. and Yu L. (3), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 Algorithm for Implementation of nine Intra Prediction Modes in MATLAB and

More information

Metamorphic Animation of Plant-like Fractal Images Based on a Family of Transitional IFS Code Sets Approach

Metamorphic Animation of Plant-like Fractal Images Based on a Family of Transitional IFS Code Sets Approach Metamorphic Animation of Plant-like Fractal Images Based on a Family of Transitional IFS Code Sets Approach Tedjo Darmanto STMIK AMIK Bandung tedjodarmanto@gmail.com Iping Supriana Suwardi STEI ITB iping@informatika.org

More information

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Arbee L.P. Chen ( 陳良弼 )

Arbee L.P. Chen ( 陳良弼 ) Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of

More information

Curriculum Vitae Rong-Hao Liang

Curriculum Vitae Rong-Hao Liang Curriculum Vitae Rong-Hao Liang Address: Hartelstein 37, 5655AJ, Eindhoven, North Brabant, The Netherlands Mobile: +31-6-27264425 (NL) Website: http://ronghaoliang.me Email: r.liang@tue.nl Dr. Rong-Hao

More information

2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China July IEEE Catalog Number: ISBN:

2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China July IEEE Catalog Number: ISBN: 2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China 12-15 July 2009 IEEE Catalog Number: ISBN: CFP0919C-PRT 978-1-4244-3728-3 Copyright 2009 by the Institute

More information

Proceedings of 2005 International Conference On Machine Learning and Cybernetics. Volume 9 of 9

Proceedings of 2005 International Conference On Machine Learning and Cybernetics. Volume 9 of 9 t»f JT A If I Otemational Viz I iversify in Girminy Proceedings of 2005 International Conference On Machine Learning and Cybernetics Volume 9 of 9 August 18-21, 2005 Ramada Hotel Guangzhou, China IEEE

More information

2015 International Conference on Fuzzy Theory and Its Applications (ifuzzy 2015)

2015 International Conference on Fuzzy Theory and Its Applications (ifuzzy 2015) International Conference on Fuzzy Theory and Its Applications ( ) Yilan, Taiwan 18-20 November IEEE Catalog Number: ISBN: CFP1522T-POD 978-1-4673-6571-0 Copyright by the Institute of Electrical and Electronic

More information

資訊科學研究所. 王大為 (Wang, Da-Wei)

資訊科學研究所. 王大為 (Wang, Da-Wei) 資訊科學研究所 王大為 (Wang, Da-Wei) Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen "Value versus damage of information release: A data privacy perspective," in International Journal of Approximate

More information

In the City Part 6 MANDARIN. ENGLISH Ni hao wo jiao zhou zhou. Hello. My name is Jojo Ni hao lu lu. Hello Lulu. Ni hao zhou zhou. Ni hao ma?

In the City Part 6 MANDARIN. ENGLISH Ni hao wo jiao zhou zhou. Hello. My name is Jojo Ni hao lu lu. Hello Lulu. Ni hao zhou zhou. Ni hao ma? Ni hao wo jiao zhou zhou. _ Hello. My name is Jojo Ni hao lu lu. _ Hello Lulu. Ni hao zhou zhou. Ni hao ma? _ Hello Jojo. How are you? Wo lei le. _ I'm tired. Wo men xiao shui yi xia ba. _ Let's take a

More information

ifuzzy 2016 Program Schedule

ifuzzy 2016 Program Schedule ifuzzy 2016 Program Schedule Session Name: Best Student Paper Competition (I) Time:08:45-10:15 Nov.9, 2016 WEA01 #1007 A Research on Improved PDFF Controller for the Permanent Magnet Synchronous Motor

More information

An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards

An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards Chun-Ta Li 1 and Min-Shiang Hwang 2 1 Department of Information Management, Tainan University of Technology, 529 Jhong

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Fish4Knowledge Deliverable D4.1. Video and RDF Store, plus access

Fish4Knowledge Deliverable D4.1. Video and RDF Store, plus access Fish4Knowledge Video and RDF Store, plus access Principal Author: H.M Chou Contributors: NARL Dissemination: PU Abstract: WP4.1 has two key objectives: to maintain a sustainable data capturing system which

More information

International Symposium on Parallel and Distributed Processing with Applications ISPA Table of Contents

International Symposium on Parallel and Distributed Processing with Applications ISPA Table of Contents International Symposium on Parallel and Distributed Processing with Applications ISPA 2010 Table of Contents Message from General Chair...xiii Organizing Committee...xv Program Committee...xvi Cluster,

More information

Development of a Rapid Design System for Aerial Work Truck Subframe with UG Secondary Development Framework

Development of a Rapid Design System for Aerial Work Truck Subframe with UG Secondary Development Framework Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2961 2965 Advanced in Control Engineering and Information Science Development of a Rapid Design System for Aerial Work Truck Subframe

More information

林嘉文著作目錄. Journal Special Issues Edited: Refereed Journal Papers: Published/Accepted:

林嘉文著作目錄. Journal Special Issues Edited: Refereed Journal Papers: Published/Accepted: Journal Special Issues Edited: 林嘉文著作目錄 [S1] Luming Zhang *, Zhigang Ma, Yahong Han, Luca Marchesotti, and Chia-Wen Lin, Special Issue on Aesthetically-Aware Image and Video Analysis, EURASIP Signal processing:

More information

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

Hao-Hua (Hao) Chu. Computer Science, National Taiwan University, Taipei, Taiwan Associate Professor

Hao-Hua (Hao) Chu. Computer Science, National Taiwan University, Taipei, Taiwan Associate Professor Hao-Hua (Hao) Chu Room 518 Dept of Computer Science & Information Engineering National Taiwan University #1 Roosevelt Road, Section 4, Taipei, Taiwan, 106 EDUCATION University of Illinois at Urbana Champaign,

More information

A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM

A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM International Journal of Foundations of Computer Science Vol. 20, No. 2 (2009) 351 359 c World Scientific Publishing Company NEW CONVERTIBLE UTHENTICTED ENCRYPTION SCHEME BSED ON THE ELGML CRYPTOSYSTEM

More information

Reclaim wafer defect classification using Large-scale BPNs with. TensorFlow

Reclaim wafer defect classification using Large-scale BPNs with. TensorFlow Reclaim wafer defect classification using Large-scale BPNs with TensorFlow Fang-Chih Tien Department of Industrial Engineering & Management National Taipei University of Technology (Taipei Tech), Taipei,

More information

Study on Digitized Measuring Technique of Thrust Line for Rocket Nozzle

Study on Digitized Measuring Technique of Thrust Line for Rocket Nozzle Study on Digitized Measuring Technique of Thrust Line for Rocket Nozzle Lijuan Li *, Jiaojiao Ren, Xin Yang, Yundong Zhu College of Opto-Electronic Engineering, Changchun University of Science and Technology,

More information

Routability-Driven Bump Assignment for Chip-Package Co-Design

Routability-Driven Bump Assignment for Chip-Package Co-Design 1 Routability-Driven Bump Assignment for Chip-Package Co-Design Presenter: Hung-Ming Chen Outline 2 Introduction Motivation Previous works Our contributions Preliminary Problem formulation Bump assignment

More information

ISSCC 2006 / SESSION 22 / LOW POWER MULTIMEDIA / 22.1

ISSCC 2006 / SESSION 22 / LOW POWER MULTIMEDIA / 22.1 ISSCC 26 / SESSION 22 / LOW POWER MULTIMEDIA / 22.1 22.1 A 125µW, Fully Scalable MPEG-2 and H.264/AVC Video Decoder for Mobile Applications Tsu-Ming Liu 1, Ting-An Lin 2, Sheng-Zen Wang 2, Wen-Ping Lee

More information

An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c

An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1,

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 4 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 4 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 4 of 4 TECHNISCHE INFORMAT1ONSBIDLIGTHEK UNIVERSITATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Blind Signature Scheme Based on Elliptic Curve Cryptography

Blind Signature Scheme Based on Elliptic Curve Cryptography Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,

More information

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,* 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 The

More information

Research Issues and Challenges for Multiple Digital Signatures

Research Issues and Challenges for Multiple Digital Signatures INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey

More information

資訊科學研究所 王大為 (WANG, DA-WEI) 王柏堯 (WANG, BOW-YAW) 王新民 (WANG, HSIN-MIN) 學術會議 ( 研討會 ) 論文

資訊科學研究所 王大為 (WANG, DA-WEI) 王柏堯 (WANG, BOW-YAW) 王新民 (WANG, HSIN-MIN) 學術會議 ( 研討會 ) 論文 資訊科學研究所 王大為 (WANG, DA-WEI) K. Chen, T.-s. Hsu, W.K. Huang, C.J. Liau and D.W. Wang, 2012, Towards a scripting language for automating secure multiparty computation, paper presented at 2012 Asia-Pacific

More information

A Feasible Power Saving Scheduling Approach in WiMAX e Networks

A Feasible Power Saving Scheduling Approach in WiMAX e Networks A Feasible Power Saving Scheduling Approach in WiMAX 802.16e Networks WEN-CHUAN HUANG Department of Computer Science and Information Engineering Tamkang University No.151, Yingzhuan Rd., Tamsui District,

More information

The University of Hong Kong Department of Electrical and Electronic Engineering EComE/EE/InfoE Technical Project Presentation Time-table 2009/10

The University of Hong Kong Department of Electrical and Electronic Engineering EComE/EE/InfoE Technical Project Presentation Time-table 2009/10 The University of Hong Kong Department of Electrical and Electronic Engineering /EE/InfoE Technical Project Presentation Time-table 2009/10 To: All EEE & CS Teaching Staff From Dr. W. H. Lam (EEE) (N.

More information

A Hierarchical Bin-Based Legalizer for Standard-Cell Designs with Minimal Disturbance

A Hierarchical Bin-Based Legalizer for Standard-Cell Designs with Minimal Disturbance A Hierarchical Bin-Based Legalizer for Standard- Designs with Minimal Disturbance Yu-Min Lee, Tsung-You Wu, and Po-Yi Chiang Department of Electrical Engineering National Chiao Tung University ASPDAC,

More information

Design of a Lattice-based Access Control Scheme

Design of a Lattice-based Access Control Scheme Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Design of a Lattice-based Access Control Scheme Chia-Chu Chiang 1, Coskun Bayrak

More information

Computer, Consumer and Control

Computer, Consumer and Control 2014 International Symposium on Computer, Consumer and Control (IS3C 2014) Taichung, Taiwan - 10 12 June 2014 Pages 1-649 IEEE Catalog Number: CFP1422S-POD ISBN: 978-1-4799-5278-6 1/2 2014 International

More information

Legal Entity: AMET Education Street Address: 6F - 5, No 17, Sec 1, Chengde Road., Datong District Taipei 103. Agents in Taiwan 1

Legal Entity: AMET Education Street Address: 6F - 5, No 17, Sec 1, Chengde Road., Datong District Taipei 103. Agents in Taiwan 1 TAIWAN Academic Asia Taiwan - Taipei Office Website: www.aat96.com.tw Email: aat96@ms6.hinet.net Principal Agent: Carol Hung Contact Name: Carol Hung/Sandy Tung Phone Number: + 886 2 2777 4188 Legal Entity:

More information

Virtualization Techniques for ARM Processors (NSC)

Virtualization Techniques for ARM Processors (NSC) Yeh-Ching Chung, Professor School of Science and Engineering, Chinese University of Hong Kong in Shenzhen Shenzhen, Guangdong, China +86-185-7673-9791 ychung@cuhk.edu.cn Research Interests Cloud-Fog Computing:

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

Non-Rectangular Shaping and Sizing of Soft Modules for Floorplan Design Improvement

Non-Rectangular Shaping and Sizing of Soft Modules for Floorplan Design Improvement Non-Rectangular Shaping and Sizing of Soft Modules for Floorplan Design Improvement Chris C.N. Chu and Evangeline F.Y. Young Abstract Many previous works on floorplanning with non-rectangular modules [,,,,,,,,,,,

More information

A parallel algorithm for generating chain code of objects in binary images

A parallel algorithm for generating chain code of objects in binary images Information Sciences 149 (2003) 219 234 www.elsevier.com/locate/ins A parallel algorithm for generating chain code of objects in binary images Tsorng-Lin Chia a, *, Kuang-Bor Wang a, Lay-Rong Chen b, Zen

More information

Adopting Data Mining Techniques on the Recommendations of Library Collections

Adopting Data Mining Techniques on the Recommendations of Library Collections Adopting Data Mining Techniques on the Recommendations of Library Collections Shu-Meng Huang a, Lu Wang b and Wan-Chih Wang c a Department of Information Management, Hsing Wu College, Taiwan (simon@mail.hwc.edu.tw)

More information

2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing

2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2014) Kitakyushu, Japan 27-29 August 2014 IEEE Catalog Number: ISBN: CFP14IIH-POD 978-1-4799-5391-2

More information

Defect Inspection of Liquid-Crystal-Display (LCD) Panels in Repetitive Pattern Images Using 2D Fourier Image Reconstruction

Defect Inspection of Liquid-Crystal-Display (LCD) Panels in Repetitive Pattern Images Using 2D Fourier Image Reconstruction Defect Inspection of Liquid-Crystal-Display (LCD) Panels in Repetitive Pattern Images Using D Fourier Image Reconstruction Du-Ming Tsai, and Yan-Hsin Tseng Department of Industrial Engineering and Management

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

Research on the Knowledge Representation Method of Instance Based on Functional Surface

Research on the Knowledge Representation Method of Instance Based on Functional Surface 5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing

More information

Performance-Preserved Analog Routing Methodology via Wire Load Reduction

Performance-Preserved Analog Routing Methodology via Wire Load Reduction Electronic Design Automation Laboratory (EDA LAB) Performance-Preserved Analog Routing Methodology via Wire Load Reduction Hao-Yu Chi, Hwa-Yi Tseng, Chien-Nan Jimmy Liu, Hung-Ming Chen 2 Dept. of Electrical

More information

Jyun-Yu Jiang. Room 3551, Boelter Hall, Department of Computer Science. University of California, Los Angeles, California, United States

Jyun-Yu Jiang. Room 3551, Boelter Hall, Department of Computer Science. University of California, Los Angeles, California, United States Jyun-Yu Jiang 姜俊宇 Room 3551, Boelter Hall, Department of Computer Science University of California Los Angeles, CA 90095, United States jyunyu@cs.ucla.edu http://jyunyu.csie.org/ +1-213-378-3894 (mobile)

More information

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

EEE LAB SAFETY REPRESENTATIVE (LSR)

EEE LAB SAFETY REPRESENTATIVE (LSR) Cluster C2 LIM Siew Peng Tel: 6790-5476 Email: esplim@ntu.edu.sg SEOW Yong Hing, William Tel: 6790-6511 Email: eyhseow@ntu.edu.sg TAY Boo Thong Tel: 6790-5464 Email: ebttay@ntu.edu.sg QUEK-GAN Siew Kim

More information

LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES

LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES Bo-ren Bai 1, Berlin Chen 2, Hsin-min Wang 2, Lee-feng Chien 2, and Lin-shan Lee 1,2 1 Department of Electrical

More information

Optimization of HMM by the Tabu Search Algorithm

Optimization of HMM by the Tabu Search Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 949-957 (2004) Optimization of HMM by the Tabu Search Algorithm TSONG-YI CHEN, XIAO-DAN MEI *, JENG-SHYANG PAN AND SHENG-HE SUN * Department of Electronic

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

An Efficient and Secure Multi-server Smart Card based Authentication Scheme

An Efficient and Secure Multi-server Smart Card based Authentication Scheme An Efficient Secure Multi-server Smart Card based Authentication Scheme Toshi Jain Department of r Science Engineering Oriental Institute of Science & Technology Bhopal, India Seep Pratap Singh Department

More information

Case3:09-cr SI Document948-1 Filed09/11/12 Page29 of 199. Exhibit B

Case3:09-cr SI Document948-1 Filed09/11/12 Page29 of 199. Exhibit B Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page29 of 199 Exhibit B Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page30 of 199 Case3:09-cr-00110-SI Document948-1 Filed09/11/12 Page31 of 199 Case3:09-cr-00110-SI

More information

Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones

Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones Sensors and Materials, Vol. 29, No. 7 (2017) 989 995 MYU Tokyo 989 S & M 1390 Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones Yu-Hao Chang, Chieh-Jung Lu,

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

Baseball Game Highlight & Event Detection

Baseball Game Highlight & Event Detection Baseball Game Highlight & Event Detection Student: Harry Chao Course Adviser: Winston Hu 1 Outline 1. Goal 2. Previous methods 3. My flowchart 4. My methods 5. Experimental result 6. Conclusion & Future

More information

Thu-I-R1 (Auditorium II) Session: Intelligent Systems I Session Chair(s) Chih-Min Lin / Hung-Ching Lu Paper ID Paper Title Authors

Thu-I-R1 (Auditorium II) Session: Intelligent Systems I Session Chair(s) Chih-Min Lin / Hung-Ching Lu Paper ID Paper Title Authors Wed-I-R1 (Auditorium II) Session: Systems Modeling, Tools and Simulation Session Chair(s) Bor-Tsuen Wang / Vai Kuong Sin 4 Enhanced Converged IP Client System Design by Using Theory of Inventive Problem

More information

Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams

Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Int J Adv Manuf Technol (1999) 15:182 187 1999 Springer-Verlag London Limited Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Jaehun Jeong and Kwangsoo Kim Department

More information

Research Proposal: Computational Geometry with Applications on Medical Images

Research Proposal: Computational Geometry with Applications on Medical Images Research Proposal: Computational Geometry with Applications on Medical Images MEI-HENG YUEH yueh@nctu.edu.tw National Chiao Tung University 1 Introduction My research mainly focuses on the issues of computational

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Searching and Card Production in CJK350 and CJK Plus Systems

Searching and Card Production in CJK350 and CJK Plus Systems Journal of East Asian Libraries Volume 1993 Number 98 Article 6 2-1-1993 Searching and Card Production in CJK350 and CJK Plus Systems Hsi-chu Bolick Follow this and additional works at: https://scholarsarchive.byu.edu/jeal

More information

Partial. Name of Bankrupt(s) & Firms. Identity Number

Partial. Name of Bankrupt(s) & Firms. Identity Number NOTICE TO CREDITORS BY TRUSTEE UNDER SECTION 30A(5) OF THE BANKRUPTCY ORDINANCE (CHAPTER 6) IN THE HIGH COURT OF THE HONG KONG SPECIAL ADMINISTRATIVE REGION COURT OF FIRST INSTANCE IN BANKRUPTCY PROCEEDINGS

More information

An Introduction to Pattern Recognition

An Introduction to Pattern Recognition An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included

More information

SPATIAL BIAS CORRECTION BASED ON GAUSSIAN KERNEL FUZZY C MEANS IN CLUSTERING

SPATIAL BIAS CORRECTION BASED ON GAUSSIAN KERNEL FUZZY C MEANS IN CLUSTERING SPATIAL BIAS CORRECTION BASED ON GAUSSIAN KERNEL FUZZY C MEANS IN CLUSTERING D.Vanisri Department of Computer Technology Kongu Engineering College, Perundurai, Tamilnadu, India vanisridd@gmail.com Abstract

More information

Quality Enhancement of Compressed Video via CNNs

Quality Enhancement of Compressed Video via CNNs Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 Quality Enhancement of Compressed Video via CNNs Jingxuan

More information

Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming

Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming Chao-Lieh Chen 1, Jeng-Wei Lee 2, Jia-Ming Yang 2, and Yau-Hwang Kuo 2 1 Department of Electronic Engineering,

More information

USING AN IR SENSOR MODULE TO REDUCE THE STANDBY POWER CONSUMPTION OF A PC MONITOR

USING AN IR SENSOR MODULE TO REDUCE THE STANDBY POWER CONSUMPTION OF A PC MONITOR 6th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE) USING AN IR SENSOR MODULE TO REDE THE STANDBY POWER CONSUMPTION OF A PC MONITOR Cheng-Hung Tsai*, Ying-Wen Bai**, Yen-Wen Lin**,

More information

B. System Model A (homogeneous multiprocessor system is composed

B. System Model A (homogeneous multiprocessor system is composed A Module Scheduling for Multiprocessor System Based on Memetic Algorithms Surinder Kumar Department of Mathematics, S.G.G.S College, Sec-26, Chandigarh, India Abstract: - In multiprocessor systems, an

More information

An Efficient Tree-based Fuzzy Data Mining Approach

An Efficient Tree-based Fuzzy Data Mining Approach 150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms

More information