首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, we shall propose a method to hide a halftone secret image into two other camouflaged halftone images. In our method, we adjust the gray-level image pixel value to fit the pixel values of the secret image and two camouflaged images. Then, we use the halftone technique to transform the secret image into a secret halftone image. After that, we make two camouflaged halftone images at the same time out of the two camouflaged images and the secret halftone image. After overlaying the two camouflaged halftone images, the secret halftone image can be revealed by using our eyes. The experimental results included in this paper show that our method is very practicable. The text was submitted by the authors in English. Wei-Liang Tai received his BS degree in Computer Science in 2002 from Tamkang University, Tamsui, Taiwan, and his MS degree in Computer Science and Information Engineering in 2004 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding, digital watermarking, and image compression. Chi-Shiang Chan received his BS degree in Computer Science in 1999 from National Cheng Chi University, Taipei, Taiwan, and his MS degree in Computer Science and Information Engineering in 2001 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding and image compression. Chin-Chen Chang received his BS degree in Applied Mathematics in 1977 and his MS degree in Computer and Decision Sciences in 1979, both from National Tsing Hua University, Hsinchu, Taiwan. He received his PhD in Computer Engineering in 1982 from National Chiao Tung University, Hsinchu, Taiwan. During the academic years of 1980–1983, he was on the faculty of the Department of Computer Engineering at National Chiao Tung University. From 1983–1989, he was on the faculty of the Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan. From 1989 to 2004, he has worked as a professor in the Institute of Computer Science and Information Engineering at National Chung Cheng University, Chiayi, Taiwan. Since 2005, he has worked as a professor in the Department of Information Engineering and Computer Science at Feng Chia University, Taichung, Taiwan. Dr. Chang is a fellow of the IEEE, a fellow of the IEE, and a member of the Chinese Language Computer Society, the Chinese Institute of Engineers of the Republic of China, and the Phi Tau Phi Society of the Republic of China. His research interests include computer cryptography, data engineering, and image compression.  相似文献   

2.
Data mining can dig out valuable information from databases to assist a business in approaching knowledge discovery and improving business intelligence. Database stores large structured data. The amount of data increases due to the advanced database technology and extensive use of information systems. Despite the price drop of storage devices, it is still important to develop efficient techniques for database compression. This paper develops a database compression method by eliminating redundant data, which often exist in transaction database. The proposed approach uses a data mining structure to extract association rules from a database. Redundant data will then be replaced by means of compression rules. A heuristic method is designed to resolve the conflicts of the compression rules. To prove its efficiency and effectiveness, the proposed approach is compared with two other database compression methods. Chin-Feng Lee is an associate professor with the Department of Information Management at Chaoyang University of Technology, Taiwan, R.O.C. She received her M.S. and Ph.D. degrees in 1994 and 1998, respectively, from the Department of Computer Science and Information Engineering at National Chung Cheng University. Her current research interests include database design, image processing and data mining techniques. S. Wesley Changchien is a professor with the Institute of Electronic Commerce at National Chung-Hsing University, Taiwan, R.O.C. He received a BS degree in Mechanical Engineering (1989) and completed his MS (1993) and Ph.D. (1996) degrees in Industrial Engineering at State University of New York at Buffalo, USA. His current research interests include electronic commerce, internet/database marketing, knowledge management, data mining, and decision support systems. Jau-Ji Shen received his Ph.D. degree in Information Engineering and Computer Science from National Taiwan University at Taipei, Taiwan in 1988. From 1988 to 1994, he was the leader of the software group in Institute of Aeronautic, Chung-Sung Institute of Science and Technology. He is currently an associate professor of information management department in the National Chung Hsing University at Taichung. His research areas focus on the digital multimedia, database and information security. His current research areas focus on data engineering, database techniques and information security. Wei-Tse Wang received the B.A. (2001) and M.B.A (2003) degrees in Information Management at Chaoyang University of Technology, Taiwan, R.O.C. His research interests include data mining, XML, and database compression.  相似文献   

3.
This paper presents an edge detection method based on mathematical morphology. The proposed scheme consists of four steps: preprocessing, edge extraction, edge decision, and postprocessing. In the preprocessing step, a morphological central transformation is applied to remove noise. In the edge extraction and decision steps, a morphological edge extractor is designed to estimate the edge information of an image, and an edge decision criterion is followed to determine whether a pixel is an edge or not. In the postprocessing step, the morphological hit-or-miss transformation is utilized to improve the correctness of the detected edges. It is proved theoretically for the correctness and effectiveness for detecting ideal edges. Experimental results show that the proposed method works well on both artificial and real images. The text was submitted by the authors in English. Chin-Pan Huang was born in 1959 in Taiwan, Republic of China. He received the B.S. and M.S. degrees in electrical engineering from Chung Cheng Institute of Technology, Taiwan, in 1981 and in 1985, respectively. In 1996, he received the Ph.D. degree in electrical engineering from the University of Pittsburgh in the United States. From 1996 to 2002, he was an associate scientist of the Electronic System Division in Chung Shan Institute of Science and Technology. He then joined the Department of Computer and Communication Engineering at Ming Chuan University in August 2002 and is currently an assistant professor there. His recent research interests include data compression, computer vision, digital image processing, and pattern recognition. Ran-Zan Wang was born in 1972 in Fukien, Republic of China. He received his B.S. degree in computer engineering and science in 1994 and M.S. degree in electrical engineering and computer science in 1996, both from Yuan-Ze University. In 2001, he received his Ph.D. degree in computer and information science from National Chiao Tung University. In 2001–2002, he was an assistant professor at the Department of Computer Engineering at the Van Nung Institute of Technology. He joined the Department of Computer and Communication Engineering at Ming Chuan University in August 2002 and is currently an assistant professor there. His recent research interests include data hiding and digital watermarking, image processing, and pattern recognition. Dr. Wang is a member of the Phi Tau Phi Scholastic Honor Society.  相似文献   

4.
In this paper, we propose an image authentication scheme in which image features are embedded for copyright protection and content-tampering detection. The features are based on the invariance of the relationship among SVD coefficients. The proposed method is sensitive to malicious manipulations and robust to lossy compressions or regular image operations, such as brightening, shifting, averaging, rotation, and so on. Several experiments demonstrated that the proposed scheme could efficiently detect locations which have been tampered with and effectively resist several types of attacks. Moreover, stego images based on our proposed method have high visual quality. The text was submitted by the authors in English. Tzu-Chuen Lu received the B.M. degree (1999) and MSIM degree (2001) in information management from Chaoyang University of Technology, Taiwan. She received her Ph.D. degree (2006) in computer engineering from National Chung Cheng University. Her current title is an Assistant Professor in Departament of Information Management from Chaoyang University of Technology. Her current research interests include data mining, image retrieval, image authentication, information hiding, and knowledge management. Chin-Chen Chang received his B.S. degree in applied mathematics in 1977 and the M.S. degree in computer and decision sciences in 1979, both from the National Tsing Hua University, Hsinchu, Taiwan. He received his Ph.D. in computer engineering in 1982 from the National Chiao Tung University, Hsinchu, Taiwan. From August 1995 to October 1997, he was the provost at the National Chung Cheng University. From September 1996 to October 1997, Dr. Chang was the Acting President at the Nationa Chung Cheng University. From July 1998 to June 2000, he was a director of the Ministry of Education of China. In addition, he has served as a consultant to several research institutes and government departments. His current research interests include database design, computer cryptography, image compression and data structures. Yi-Long Liu received the B.S. degree (2002) in the Department of Mathematics (Applied Mathematics Section) from the College of Science and Engineering at Fu-Jen Catholic University, Taiwan. Liu is now a Master student in National Chung Cheng University and is studying in the domain of image processing. His current research interests include data hiding, data compression, and progressive image transmission.  相似文献   

5.
The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, sensible information such as private information or patterns may be inferred from non-sensible information or unclassified data. There have been two types of privacy concerning data mining. Output privacy tries to hide the mining results by minimally altering the data. Input privacy tries to manipulate the data so that the mining result is not affected or minimally affected. For output privacy in hiding association rules, current approaches require hidden rules or patterns to be given in advance [10, 18–21, 24, 27]. This selection of rules would require data mining process to be executed first. Based on the discovered rules and privacy requirements, hidden rules or patterns are then selected manually. However, for some applications, we are interested in hiding certain constrained classes of association rules such as collaborative recommendation association rules [15, 22]. To hide such rules, the pre-process of finding these hidden rules can be integrated into the hiding process as long as the recommended items are given. In this work, we propose two algorithms, DCIS (Decrease Confidence by Increase Support) and DCDS (Decrease Confidence by Decrease Support), to automatically hiding collaborative recommendation association rules without pre-mining and selection of hidden rules. Examples illustrating the proposed algorithms are given. Numerical simulations are performed to show the various effects of the algorithms. Recommendations of appropriate usage of the proposed algorithms based on the characteristics of databases are reported. Leon Wang received his Ph.D. in Applied Mathematics from State University of New York at Stony Brook in 1984. From 1984 to 1987, he was an assistant professor in mathematics at University of New Haven, Connecticut, USA. From 1987 to 1994, he joined New York Institute of Technology as a research associate in the Electromagnetic Lab and assistant/associate professor in the Department of Computer Science. From 1994 to 2001, he joined I-Shou University in Taiwan as associate professor in the Department of Information Management. In 1996, he was the Director of Computing Center. From 1997 to 2000, he was the Chairman of Department of Information Management. In 2001, he was Professor and director of Library, all in I-Shou University. In 2002, he was Associate Professor and Chairman in Information Management at National University of Kaohsiung, Taiwan. In 2003, he rejoined New York Institute of Technology. Dr.Wang has published 33 journal papers, 102 conference papers, and 5 book chapters, in the areas of data mining, machine learning, expert systems, and fuzzy databases, etc. Dr. Wang is a member of IEEE, Chinese Fuzzy System Association Taiwan, Chinese Computer Association, and Chinese Information Management Association. Ayat Jafari received the Ph.D. degree from City University of New York. He has conducted considerable research in the areas of Computer Communication Networks, Local Area Networks, and Computer Network Security, and published many technical articles. His interests and expertise are in the area of Computer Networks, Signal Processing, and Digital Communications. He is currently the Chairman of the Computer Science and Electrical Engineering Department of New York Institute of Technology. Tzung-Pei Hong received his B.S. degree in chemical engineering from National Taiwan University in 1985, and his Ph.D. degree in computer science and information engineering from National Chiao-Tung University in 1992. He was a faculty at the Department of Computer Science in Chung-Hua Polytechnic Institute from 1992 to 1994, and at the Department of Information Management in I-Shou University from 1994 to 2001. He was in charge of the whole computerization and library planning for National University of Kaohsiung in Preparation from 1997 to 2000, and served as the first director of the library and computer center in National University of Kaohsiung from 2000 to 2001 and as the Dean of Academic Affairs from 2003 to 2006. He is currently a professor at the Department of Electrical Engineering and at the Department of Computer Science and Information Engineering. His current research interests include machine learning, data mining, soft computing, management information systems, and www applications. Springer  相似文献   

6.
Summary This paper proposes a self-stabilizing protocol which circulates a token on a connected network in nondeterministic depth-first-search order, rooted at a special node. Starting with any initial state in which the network may have no token at all or more than one token, the protocol eventually makes the system stabilize in states having exactly one circulating token. With a slight modification to the protocol —by removing nondeterminism in the search — a depth-first-search tree on the network can be constructed. The proposed protocol runs on systems that allow parallel operations. Shing-Tsaan Huang was born in Taiwan on September 4, 1949. He got his Ph.D. degree in 1985 from Department of Computer Science, University of Maryland at College Park. Before he pursued his Ph.D. degree, he had worked several years in the computer industry in Taiwan. Professor Huang is currently the chairman of the Department of Computer Science, Tsing Hua University, Taiwan, Republic of China. His research interests include interconnection networks, operating systems and distributed computing. He is a senior member of the IEEE Computer Society and a member of the Association for Computing Machinery. Nian-Shing Chen was born in Taiwan on October 21, 1961. He received his Ph.D. degree in computer science from National Tsing Hua University in 1990. Dr. Chen is currently an associate professor with the Department of Information Management at Sun Yat-Sen University of Taiwan. His research interests include distributed systems, computer networks, computer viruses and expert systems. He is a member of IEEE and Phi Tau Phi honorary society.This research is supported by National Science Council of the Republic of China under the contract NSC81-0408-E-007-05 and NSC82-0408-E-007-027  相似文献   

7.
In this paper, we present a new method for fuzzy risk analysis based on the ranking of generalized trapezoidal fuzzy numbers. The proposed method considers the centroid points and the standard deviations of generalized trapezoidal fuzzy numbers for ranking generalized trapezoidal fuzzy numbers. We also use an example to compare the ranking results of the proposed method with the existing centroid-index ranking methods. The proposed ranking method can overcome the drawbacks of the existing centroid-index ranking methods. Based on the proposed ranking method, we also present an algorithm to deal with fuzzy risk analysis problems. The proposed fuzzy risk analysis algorithm can overcome the drawbacks of the one we presented in [7]. Shi-Jay Chen was born in 1972, in Taipei, Taiwan, Republic of China. He received the B.S. degree in information management from the Kaohsiung Polytechnic Institute, Kaohsiung, Taiwan, and the M.S. degree in information management from the Chaoyang University of Technology, Taichung, Taiwan, in 1997 and 1999, respectively. He received the Ph.D. degree at the Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan, in October 2004. His research interests include fuzzy systems, multicriteria fuzzy decisionmaking, and artificial intelligence. Shyi-Ming Chen was born on January 16, 1960, in Taipei, Taiwan, Republic of China. He received the Ph.D. degree in Electrical Engineering from National Taiwan University, Taipei, Taiwan, in June 1991. From August 1987 to July 1989 and from August 1990 to July 1991, he was with the Department of Electronic Engineering, Fu-Jen University, Taipei, Taiwan. From August 1991 to July 1996, he was an Associate Professor in the Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan. From August 1996 to July 1998, he was a Professor in the Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan. From August 1998 to July 2001, he was a Professor in the Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan. Since August 2001, he has been a Professor in the Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan. He was a Visiting Scholar in the Department of Electrical Engineering and Computer Science, University of California, Berkeley, in 1999. He was a Visiting Scholar in the Institute of Information Science, Academia Sinica, Republic of China, in 2003. He has published more than 250 papers in referred journals, conference proceedings and book chapters. His research interests include fuzzy systems, information retrieval, knowledge-based systems, artificial intelligence, neural networks, data mining, and genetic algorithms. Dr. Chen has received several honors and awards, including the 1994 Outstanding Paper Award o f the Journal of Information and Education, the 1995 Outstanding Paper Award of the Computer Society of the Republic of China, the 1995 and 1996 Acer Dragon Thesis Awards for Outstanding M.S. Thesis Supervision, the 1995 Xerox Foundation Award for Outstanding M.S. Thesis Supervision, the 1996 Chinese Institute of Electrical Engineering Award for Outstanding M.S. Thesis Supervision, the 1997 National Science Council Award, Republic of China, for Outstanding Undergraduate Student's Project Supervision, the 1997 Outstanding Youth Electrical Engineer Award of the Chinese Institute of Electrical Engineering, Republic of China, the Best Paper Award of the 1999 National Computer Symposium, Republic of China, the 1999 Outstanding Paper Award of the Computer Society of the Republic of China, the 2001 Institute of Information and Computing Machinery Thesis Award for Outstanding M.S. Thesis Supervision, the 2001 Outstanding Talented Person Award, Republic of China, for the contributions in Information Technology, the 2002 Institute of information and Computing Machinery Thesis Award for Outstanding M.S. Thesis Supervision, the Outstanding Electrical Engineering Professor Award granted by the Chinese Institute of Electrical Engineering (CIEE), Republic of China, the 2002 Chinese Fuzzy Systems Association Best Thesis Award for Outstanding M.S. Thesis Supervision, the 2003 Outstanding Paper Award of the Technological and Vocational Education Society, Republic of China, the 2003 Acer Dragon Thesis Award for Outstanding Ph.D. Dissertation Supervision, the 2005 “Operations Research Society of Taiwan” Award for Outstanding M.S. Thesis Supervision, the 2005 Acer Dragon Thesis Award for Outstanding Ph.D. Dissertation Supervision, the 2005 Taiwan Fuzzy Systems Association Award for Outstanding Ph.D. Dissertation Supervision, and the 2006 “Operations Research Society of Taiwan” Award for Outstanding M.S. Thesis Supervision. Dr. Chen is currently the President of the Taiwanese Association for Artificial Intelligence (TAAI). He is a Senior Member of the IEEE, a member of the ACM, the International Fuzzy Systems Association (IFSA), and the Phi Tau Phi Scholastic Honor Society. He was an administrative committee member of the Chinese Fuzzy Systems Association (CFSA) from 1998 to 2004. He is an Associate Editor of the IEEE Transactions on Systems, Man, and Cybernetics - Part C, an Associate Editor of the IEEE Computational Intelligence Magazine, an Associate Editor of the Journal of Intelligent & Fuzzy Systems, an Editorial Board Member of the International Journal of Applied Intelligence, an Editor of the New Mathematics and Natural Computation Journal, an Associate Editor of the International Journal of Fuzzy Systems, an Editorial Board Member of the International Journal of Information and Communication Technology, an Editorial Board Member of the WSEAS Transactions on Systems, an Editor of the Journal of Advanced Computational Intelligence and Intelligent Informatics, an Associate Editor of the WSEAS Transactions on Computers, an Editorial Board Member of the International Journal of Computational Intelligence and Applications, an Editorial Board Member of the Advances in Fuzzy Sets and Systems Journal, an Editor of the International Journal of Soft Computing, an Editor of the Asian Journal of Information Technology, an Editorial Board Member of the International Journal of Intelligence Systems Technologies and Applications, an Editor of the Asian Journal of Information Management, an Associate Editor of the International Journal of Innovative Computing, Information and Control, and an Editorial Board Member of the International Journal of Computer Applications in Technology. He was an Editor of the Journal of the Chinese Grey System Association from 1998 to 2003. He is listed in International Who's Who of Professionals, Marquis Who's Who in the World, and Marquis Who's Who in Science and Engineering.  相似文献   

8.
The paper proposes a progressive viewing method useful in sharing a sensitive image. As in visual cryptography, this method characterizes its ability to recover the image by stacking transparencies without any computation. However, the method balances the sensitivity and the daily-processing convenience of the image. The text was submitted by the authors in English. Wen-Pinn Fang was born in 1971 in Taiwan, Republic of China. He received his BS degree in mechanical engineering from National Sun-Yet-Sans University in 1994, and MS degree in mechanical engineering from National Chiao Tung University in 1998. In 2006 he received his PhD in Computer Science Department of National Chiao Tung University. His recent research interests include image sharing and image processing. Ja-Chen Lin was born in 1955 in Taiwan, Republic of China. He received his BS degree in computer science in 1977 and MS degree in applied mathematics in 1979, both from National Chiao Tung University, Taiwan. In 1988 he received his PhD in mathematics from Purdue University, United States. In 1981–1982, he was an instructor at National Chiao Tung University. From 1984 to 1988, he was a graduate instructor at Purdue University. He joined the Department of Computer and Information Science at National Chiao Tung University in August 1988 and is currently a professor there. His recent research interests include pattern recognition and image processing. Dr. Lin is a member of the Phi-Tau-Phi Scholastic Honor Society.  相似文献   

9.
Polygonal approximation is an important technique in image representation which directly impacts on the accuracy and efficacy of the subsequent image analysis tasks. This paper presents a new polygonal approximation approach based on particle swarm optimization (PSO). The original PSO is customized to continuous function value optimization. To facilitate the applicability of PSO to combinatorial optimization involving the problem in question, genetic reproduction mechanisms, namely crossover and mutation, are incorporated into PSO. We also propose a hybrid strategy embedding a segment-adjusting-and-merging optimizer into the genetic PSO evolutionary iterations to enhance its performance. The experimental results show that the proposed genetic PSO significantly improves the search efficacy of PSO for the polygonal approximation problem, and the hybrid strategy can accelerate the convergence speed but still with good-quality results. The performance of the proposed method is compared to existing approaches on both synthesized and real image curves. It is shown that the proposed hybrid genetic PSO outperforms the polygonal approximation approaches based on genetic algorithms and ant colony algorithms. The text was submitted by the author in English. Peng-Yeng Yin was born in 1966 and received his B.S., M.S. and Ph.D. degrees in Computer Science from National Chiao Tung University, Hsinchu, Taiwan, in 1989, 1991 and 1994, respectively. From 1993 to 1994, he was a visiting scholar at the Department of Electrical Engineering, University of Maryland, and the Department of Radiology, Georgetown University. In 2000, he was a visiting Associate Professor in the Visualization and Intelligent Systems Lab (VISLab) at the Department of Electrical Engineering, University of California, Riverside (UCR). He is currently a Professor at the Department of Information Management, National Chi Nan University, Nantou, Taiwan. His current research interests include image processing, pattern recognition, machine learning, computational biology, and evolutionary computation. He has published more than 70 articles in refereed journals and conferences. Dr. Yin received the Overseas Research Fellowship from the Ministry of Education in 1993 and Overseas Research Fellowship from the National Science Council in 2000. He is a member of the Phi Tau Phi Scholastic Honor Society and listed in Who’s Who in the World.  相似文献   

10.
Web image indexing by using associated texts   总被引:1,自引:0,他引:1  
In order to index Web images, the whole associated texts are partitioned into a sequence of text blocks, then the local relevance of a term to the corresponding image is calculated with respect to both its local occurrence in the block and the distance of the block to the image. Thus, the overall relevance of a term is determined as the sum of all its local weight values multiplied by the corresponding distance factors of the text blocks. In the present approach, the associated text of a Web image is firstly partitioned into three parts, including a page-oriented text (TM), a link-oriented text (LT), and a caption-oriented text (BT). Since the big size and semantic divergence, the caption-oriented text is further partitioned into finer blocks based on the tree structure of the tag elements within the BT text. During the processing, all heading nodes are pulled up in order to correlate with their semantic scopes, and a collapse algorithm is also exploited to remove the empty blocks. In our system, the relevant factors of the text blocks are determined by using a greedy Two-Way-Merging algorithm. Zhiguo Gong is an associate Professor in the Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macao, China. He received his BS, MS, and PhD from the Hebei Normal University, Peking University, and the Chinese Academy of Science in 1983, 1988, and 1998, respectively. His research interests include Distributed Database, Multimedia Database, Digital Library, Web Information Retrieval, and Web Mining. Leong Hou U is currently a Master Candidate in the Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macao, China. He received his BS from National Chi Nan University, Taiwan in 2003. His research interests include Web Information Retrieval and Web Mining. Chan Wa Cheang is currently a Master Candidate in the Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macao, China. He received his BS from the National Taiwan University, Taiwan in 2003. His research interests include Web Information Retrieval and Web Mining.  相似文献   

11.
In instance-based learning, the ‘nearness’ between two instances—used for pattern classification—is generally determined by some similarity functions, such as the Euclidean or Value Difference Metric (VDM). However, Euclidean-like similarity functions are normally only suitable for domains with numeric attributes. The VDM metrics are mainly applicable to domains with symbolic attributes, and their complexity increases with the number of classes in a specific application domain. This paper proposes an instance-based learning approach to alleviate these shortcomings. Grey relational analysis is used to precisely describe the entire relational structure of all instances in a specific domain. By using the grey relational structure, new instances can be classified with high accuracy. Moreover, the total number of classes in a specific domain does not affect the complexity of the proposed approach. Forty classification problems are used for performance comparison. Experimental results show that the proposed approach yields higher performance over other methods that adopt one of the above similarity functions or both. Meanwhile, the proposed method can yield higher performance, compared to some other classification algorithms. Chi-Chun Huang is currently Assistant Professor in the Department of Information Management at National Kaohsiung Marine University, Kaohsiung, Taiwan. He received the Ph.D. degree from the Department of Electronic Engineering at National Taiwan University of Science and Technology in 2003. His research includes intelligent Internet systems, grey theory, machine learning, neural networks and pattern recognition. Hahn-Ming Lee is currently Professor in the Department of Computer Science and Information Engineering at National Taiwan University of Science and Technology, Taipei, Taiwan. He received the B.S. degree and Ph.D. degree from the Department of Computer Science and Information Engineering at National Taiwan University in 1984 and 1991, respectively. His research interests include, intelligent Internet systems, fuzzy computing, neural networks and machine learning. He is a member of IEEE, TAAI, CFSA and IICM.  相似文献   

12.
Adaptive support vector regression (ASVR) applied to the forecast of complex time series is superior to the other traditional prediction methods. However, the effect of volatility clustering occurred in time-series actually deteriorates ASVR prediction accuracy. Therefore, incorporating nonlinear generalized autoregressive conditional heteroscedasticity (NGARCH) model into ASVR is employed for dealing with the problem of volatility clustering to best fit the forecast’s system. Interestingly, quantum-based minimization algorithm is proposed in this study to tune the resulting coefficients between ASVR and NGARCH, in such a way that the ASVR/NGARCH composite model can achieve the best accuracy of prediction. Quantum optimization here tackles so-called NP-completeness problem and outperforms the real-coded genetic algorithm on the same problem because it accomplishes better approach to the optimal or near-optimal coefficient-found. It follows that the proposed method definitely obtains the satisfactory results because of highly balancing generalization and localization for composite model and thus improving forecast accuracy. Bao Rong Chang is currently an Associate Professor in the Department of Computer Science and Information Engineering at National Taitung University in Taitung, Taiwan. He completed his BS degree from the Department of Electronic Engineering, Tam Kang University, Taiwan. In 1990, he earned his ME degree from the Department of Electrical Engineering, University of Missouri-Columbia, USA, and his Ph.D. in 1994 at the same University. His current research interests include Intelligent Computations, Applied Computer Network, and Financial Engineering. Hsiu-Fen Tsai is currently a Senior Lecturer in the Department of International Business at Shu Te University in Kaohsiung, Taiwan. She completed her BA degree from the Department of International Business, National Taiwan University, Taiwan. In 1995, she earned her MBA degree from the Department of Business Administration, National Taiwan University, Taiwan. At present, she is a Ph. D. Candidate in Department of International Business since 2004 at the same University. Her current research interests include Intelligent Analysis of Business Models and Applications of Strategy Management.  相似文献   

13.
Timing constraints for radar tasks are usually specified in terms of the minimum and maximum temporal distance between successive radar dwells. We utilize the idea of feasible intervals for dealing with the temporal distance constraints. In order to increase the freedom that the scheduler can offer a high-level resource manager, we introduce a technique for nesting and interleaving dwells online while accounting for the energy constraint that radar systems need to satisfy. Further, in radar systems, the task set changes frequently and we advocate the use of finite horizon scheduling in order to avoid the pessimism inherent in schedulers that assume a task will execute forever. The combination of feasible intervals and online dwell packing allows modular schedule updates whereby portions of a schedule can be altered without affecting the entire schedule, hence reducing the complexity of the scheduler. Through extensive simulations we validate our claims of providing greater scheduling flexibility without compromising on performance when compared with earlier work based on templates constructed offline. We also evaluate the impact of two parameters in our scheduling approach: the template length (or the extent of dwell nesting and interleaving) and the length of the finite horizon. Sathish Gopalakrishnan is a visting scholar in the Department of Computer Science, University of Illinois at Urbana-Champaign, where he defended his Ph.D. thesis in December 2005. He received an M.S. in Applied Mathematics from the University of Illinois in 2004 and a B.E. in Computer Science and Engineering from the University of Madras in 1999. Sathish’s research interests concern real-time and embedded systems, and the design of large-scale reliable systems. He received the best student paper award for his work on radar dwell scheduling at the Real-Time Systems Symposium 2004. Marco Caccamo graduated in computer engineering from the University of Pisa in 1997 and received the Ph.D. degree in computer engineering from the Scuola Superiore S. Anna in 2002. He is an Assistant Professor of the Department of Computer Science at the University of Illinois. His research interests include real-time operating systems, real-time scheduling and resource management, wireless sensor networks, and quality of service control in next generation digital infrastructures. He is recipient of the NSF CAREER Award (2003). He is a member of ACM and IEEE. Chi-Sheng Shih is currently an assistant professor at the Graduate Institute of Networking and Multimedia and Department of Computer Science and Information Engineering at National Taiwan University since February 2004. He received the B.S. in Engineering Science and M.S. in Computer Science from National Cheng Kung University in 1993 and 1995, respectively. In 2003, he received his Ph.D. in Computer Science from the University of Illinois at Urbana-Champaign. His main research interests are embedded systems, hardware/software codesign, real-time systems, and database systems. Specifically, his main research interests focus on real-time operating systems, real-time scheduling theory, embedded software, and software/hardware co-design for system-on-a-chip. Chang-Gun Lee received the B.S., M.S. and Ph.D. degrees in computer engineering from Seoul National University, Korea, in 1991, 1993 and 1998, respectively. He is currently an Assistant Professor in the Department of Electrical Engineering, Ohio State University, Columbus. Previously, he was a Research Scientist in the Department of Computer Science, University of Illinois at Urbana-Champaign from March 2000 to July 2002 and a Research Engineer in the Advanced Telecomm. Research Lab., LG Information & Communications, Ltd. from March 1998 to February 2000. His current research interests include real-time systems, complex embedded systems, QoS management, and wireless ad-hoc networks. Chang-Gun Lee is a member of the IEEE Computer Society. Lui Sha graduated with the Ph.D. degree from Carnegie-Mellon University in 1985. He was a Member and then a Senior Member of Technical Staff at Software Engineering Institute (SEI) from 1986 to 1998. Since Fall 1998, he has been a Professor of Computer Science at the University of Illinois at Urbana Champaign, and a Visiting Scientist of the SEI. He was the Chair of IEEE Real Time Systems Technical Committee from 1999 to 2000, and has served on its Executive Committee since 2001. He was a member of National Academy of Science’s study group on Software Dependability and Certification from 2004 to 2005, and is an IEEE Distinguished Visitor (2005 to 2007). Lui Sha is a Fellow of the IEEE and the ACM.  相似文献   

14.
Information service plays a key role in grid system, handles resource discovery and management process. Employing existing information service architectures suffers from poor scalability, long search response time, and large traffic overhead. In this paper, we propose a service club mechanism, called S-Club, for efficient service discovery. In S-Club, an overlay based on existing Grid Information Service (GIS) mesh network of CROWN is built, so that GISs are organized as service clubs. Each club serves for a certain type of service while each GIS may join one or more clubs. S-Club is adopted in our CROWN Grid and the performance of S-Club is evaluated by comprehensive simulations. The results show that S-Club scheme significantly improves search performance and outperforms existing approaches. Chunming Hu is a research staff in the Institute of Advanced Computing Technology at the School of Computer Science and Engineering, Beihang University, Beijing, China. He received his B.E. and M.E. in Department of Computer Science and Engineering in Beihang University. He received the Ph.D. degree in School of Computer Science and Engineering of Beihang University, Beijing, China, 2005. His research interests include peer-to-peer and grid computing; distributed systems and software architectures. Yanmin Zhu is a Ph.D. candidate in the Department of Computer Science, Hong Kong University of Science and Technology. He received his B.S. degree in computer science from Xi’an Jiaotong University, Xi’an, China, in 2002. His research interests include grid computing, peer-to-peer networking, pervasive computing and sensor networks. He is a member of the IEEE and the IEEE Computer Society. Jinpeng Huai is a Professor and Vice President of Beihang University. He serves on the Steering Committee for Advanced Computing Technology Subject, the National High-Tech Program (863) as Chief Scientist. He is a member of the Consulting Committee of the Central Government’s Information Office, and Chairman of the Expert Committee in both the National e-Government Engineering Taskforce and the National e-Government Standard office. Dr. Huai and his colleagues are leading the key projects in e-Science of the National Science Foundation of China (NSFC) and Sino-UK. He has authored over 100 papers. His research interests include middleware, peer-to-peer (P2P), grid computing, trustworthiness and security. Yunhao Liu received his B.S. degree in Automation Department from Tsinghua University, China, in 1995, and an M.A. degree in Beijing Foreign Studies University, China, in 1997, and an M.S. and a Ph.D. degree in computer science and engineering at Michigan State University in 2003 and 2004, respectively. He is now an assistant professor in the Department of Computer Science and Engineering at Hong Kong University of Science and Technology. His research interests include peer-to-peer computing, pervasive computing, distributed systems, network security, grid computing, and high-speed networking. He is a senior member of the IEEE Computer Society. Lionel M. Ni is chair professor and head of the Computer Science and Engineering Department at Hong Kong University of Science and Technology. Lionel M. Ni received the Ph.D. degree in electrical and computer engineering from Purdue University, West Lafayette, Indiana, in 1980. He was a professor of computer science and engineering at Michigan State University from 1981 to 2003, where he received the Distinguished Faculty Award in 1994. His research interests include parallel architectures, distributed systems, high-speed networks, and pervasive computing. A fellow of the IEEE and the IEEE Computer Society, he has chaired many professional conferences and has received a number of awards for authoring outstanding papers.  相似文献   

15.
We propose a recognition method of character-string images captured by portable digital cameras. A challenging task in character-string recognition is the segmentation of characters. In the proposed method, a hypothesis graph is used for recognition-based segmentation of the character-string images. The hypothesis graph is constructed by the subspace method, using eigenvectors as conditionally elastic templates. To obtain these templates, a generation-based approach is introduced in the training stage. Various templates are generated to cope with low-resolution. We have experimentally proved that the proposed scheme achieves high recognition performance even for low-resolution character-string images. The text was submitted by the authors in English. Hiroyuki Ishida. Received his B.S. and M.S. degrees from the Department of Information Engineering and from the Graduate School of Information Science, respectively, at Nagoya University. He is currently pursuing a Ph.D. in Information Science at Nagoya University. Ichiro Ide. Received his B.S. degree from the Department of Electronic Engineering, his M.S. degree from the Department of Information Engineering, and his Ph.D. from the Department of Electrical Engineering at the University of Tokyo. He is currently an Associate Professor in the Graduate School of Information Science at Nagoya University. Tomokazu Takahashi. Received his B.S. degree from the Department of Information Engineering at Ibaraki University, and his M.S. and Ph.D. from the Graduate School of Science and Engineering at Ibaraki University. His research interests include computer graphics and image recognition. Hiroshi Murase. Received his B.S., M.S., and Ph.D. degrees from the Graduate School of Electrical Engineering at Nagoya University. He is currently a Professor in the Graduate School of Information Science at Nagoya University. He received the Ministry Award from the Ministry of Education, Culture, Sports, Science and Technology in Japan in 2003. He is a Fellow of the IEEE.  相似文献   

16.
Fingerprint recognition is based on minutiae matching. The matching correctness of the fingerprints is due to the effect of the accuracy of the minutiae. Fingerprint enhancement and postprocessing are used to reduce the false minutiae. In this paper, we propose methods on fingerprint enhancement and postprocessing, based on the directional fields of a fingerprint. We directly enhance the fingerprint on a gray-scale image and reduce most false minutiae in the postprocessing step. The achieved results are compared with other methods, and the reduction of false minutiae and the recovery of dropped minutiae are improved. The text was submitted by the authors in English. Gwo-Cheng Chao was born in Dasi, Taoyuan, Taiwan, in 1978. He received MS degrees in computer science and information engineering from Taiwan University of Science and Technology, Taiwan, in 2004. He is currently pursuing a PhD degree in networking and multimedia at National Taiwan University, Taipei, Taiwan. His research interests include pattern recognition, image processing, computer vision, biometrics, computer graphics, and multimedia systems. Shung-Shing Lee received BS and MS degrees in electronic engineering and a PhD degree in electrical engineering in 1980, 1987, and 1996, respectively, all from National Taiwan Institute of Technology, Taipei, Taiwan. Currently, he is an associate professor in the Department of Electrical Engineering, Ching Yun University, Jung-Li, Taiwan. His research interests include image processing, biometrics, embedded system design, SOPC, parallel computing, and parallel algorithms. Hung-Chuan Lai received his MS degree in computer science and information engineering from Chung-Hua University, Hsinchu, Taiwan, in 2002. He is currently pursuing a PhD degree at National Taiwan University of Science and Technology, Taipei, Taiwan. His research interests include image processing, VLSI, fault tolerance architecture, embedded system design, data compression, computer architecture and organization, and biometrics.  相似文献   

17.
Processors arrays with reconfigurable bus systems (abbreviated to PARBS) have been received a lot of attention in the last decade, and many undirected graph algorithms with constant time complexity have been proposed on PARBS. However, for a directed graph, it will be proved that connecting PARBS in the way proposed for undirected graphs generates paths which do not exist in the directed graph. This result may lead to incorrect solution for directed graph problems. Therefore, in this paper, a model named D-PARBS (Directional PARBS) is proposed for eliminating the non-existent paths. This model can be used to correctly identifying redundant arcs on directed graphs in constant time. Furthermore, by modifying the D-PARBS architecture, constant time algorithms with O(n 3) processors are developed to solve topological sort, transitive closure, cyclic graph checking, and strongly connected component problems on directed graphs. Chi-Jung Kuo: He is currently an operation officer of the Information Processing Department in the Taipei Branch of Bangkok Bank. His research interests include parallel processing and graph theory. He received his B.S. and M.S. degree in Information Management from National Taiwan University of Science and Technology in 1993 and 1995, respectively. He was a teacher in the Chin Min Junior College from 1995 to 1996. Chiun-Chieh Hsu, Ph.D.: He is currently a full professor of Information Management Department at National Taiwan University of Science and Technology. His current research interests include fault-tolerant computing, parallel and distributed processing, networks, and graph theory. He received his B.E., M.E., and Ph.D. degrees all in Electrical Engineering from National Taiwan University in 1983, 1987, and 1990, respectively. He worked as a software and firmware design engineer of Research and Development in Acer Computer Company from 1983 to 1985. Wei-Chen Fang: He received the BS degree in MIS from Tamkang University and the MS degree in Information Management from National Taiwan University of Science and Technology. Currently, he is a Ph.d student and works as an assistant researcher with the Advanced Technology research group for Chunghwa Telecommunication Laboratory. His research interests include multi-processor architecture, fault-tolerant computing, and parallel and distributed processing.  相似文献   

18.
Generally, a database system containing null value attributes will not operate properly. This study proposes an efficient and systematic approach for estimating null values in a relational database which utilizes clustering algorithms to cluster data, and a regression coefficient to determine the degree of influence between different attributes. Two databases are used to verify the proposed method: (1) Human resource database; and (2) Waugh's database. Furthermore, the mean of absolute error rate (MAER) and average error are used as evaluation criteria to compare the proposed method with other methods. It demonstrates that the proposed method is superior to existing methods for estimating null values in relational database systems. Jia-Wen Wang was born on September 5, 1978, in Taipei, Taiwan, Republic of China. She received the M.S. degree in information management from the National Yunlin University of Science and Technology, Yunlin, Taiwan, in 2003. Since 2003, she has been a PhD degree student in Information Management Department at the National Yunlin University of Science and Technology. Her current research interests include fuzzy systems, database systems, and artificial intelligence. Ching-Hsue Cheng received the B.S. degree in mathematics from Chinese Military Academy, Taiwan, in 1982, the M.S. degree in applied mathematics from the Chung Yuan Christian University, Taiwan, in 1988, and the Ph.D. degree in system engineering and management from National Defence University, Taiwan, in 1994. Currently, he is a professor of the Department of Information Management, National YunLin University of Technology & Science. His research interests are in decision science, soft computing, software reliability, performance evaluation, and fuzzy time series. He has published more than 120 refereed papers in these areas. He has been a principal investigator and project leader in a number of projects with government, and other research-sponsoring agencies.  相似文献   

19.
A range query finds the aggregated values over all selected cells of an online analytical processing (OLAP) data cube where the selection is specified by the ranges of contiguous values for each dimension. An important issue in reality is how to preserve the confidential information in individual data cells while still providing an accurate estimation of the original aggregated values for range queries. In this paper, we propose an effective solution, called the zero-sum method, to this problem. We derive theoretical formulas to analyse the performance of our method. Empirical experiments are also carried out by using analytical processing benchmark (APB) dataset from the OLAP Council. Various parameters, such as the privacy factor and the accuracy factor, have been considered and tested in the experiments. Finally, our experimental results show that there is a trade-off between privacy preservation and range query accuracy, and the zero-sum method has fulfilled three design goals: security, accuracy, and accessibility. Sam Y. Sung is an Associate Professor in the Department of Computer Science, School of Computing, National University of Singapore. He received a B.Sc. from the National Taiwan University in 1973, the M.Sc. and Ph.D. in computer science from the University of Minnesota in 1977 and 1983, respectively. He was with the University of Oklahoma and University of Memphis in the United States before joining the National University of Singapore. His research interests include information retrieval, data mining, pictorial databases and mobile computing. He has published more than 80 papers in various conferences and journals, including IEEE Transaction on Software Engineering, IEEE Transaction on Knowledge & Data Engineering, etc. Yao Liu received the B.E. degree in computer science and technology from Peking University in 1996 and the MS. degree from the Software Institute of the Chinese Science Academy in 1999. Currently, she is a Ph.D. candidate in the Department of Computer Science at the National University of Singapore. Her research interests include data warehousing, database security, data mining and high-speed networking. Hui Xiong received the B.E. degree in Automation from the University of Science and Technology of China, Hefei, China, in 1995, the M.S. degree in Computer Science from the National University of Singapore, Singapore, in 2000, and the Ph.D. degree in Computer Science from the University of Minnesota, Minneapolis, MN, USA, in 2005. He is currently an Assistant Professor of Computer Information Systems in the Management Science & Information Systems Department at Rutgers University, NJ, USA. His research interests include data mining, databases, and statistical computing with applications in bioinformatics, database security, and self-managing systems. He is a member of the IEEE Computer Society and the ACM. Peter A. Ng is currently the Chairperson and Professor of Computer Science at the University of Texas—Pan American. He received his Ph.D. from the University of Texas–Austin in 1974. Previously, he had served as the Vice President at the Fudan International Institute for Information Science and Technology, Shanghai, China, from 1999 to 2002, and the Executive Director for the Global e-Learning Project at the University of Nebraska at Omaha, 2000–2003. He was appointed as an Advisory Professor of Computer Science at Fudan University, Shanghai, China in 1999. His recent research focuses on document and information-based processing, retrieval and management. He has published many journal and conference articles in this area. He had served as the Editor-in-Chief for the Journal on Systems Integration (1991–2001) and as Advisory Editor for the Data and Knowledge Engineering Journal since 1989.  相似文献   

20.
Summary In this paper we construct a formal specification of the problem of synchronizing asynchronous processes under strong fairness. We prove that strong interaction fairness is impossible for binary (and hence for multiway) interactions and strong process fairness is impossible for multiway interactions. Yih-Kuen Tsay received his B.S. degree form National Taiwan University in 1984 and his M.S. degree from UCLA in 1989. He is currently a Ph.D. candidate in the UCLA Computer Science Department. His research interests include distributed algorithms, fault-tolerant systems, and specification and verification of concurrent programs. Rajive L. Bagrodia received the B. Tech. degree in Electrical Engineering from the Indian Institute of Technology, Bombay in 1981 and the M.A. and Ph.D. degrees in Computer Science from the University of Texas at Austin in 1983 and 1987 respectively. He is currently an Assistant Professor in the Computer Science Department at UCLA. His research interests include parallel languages, distributed algorithms, parallel simulation and software design methodologies. He was selected as a 1991 Presidential Young Investigator by NSF.This research was partially supported by NSF PYI Award number ASC9157610 and by ONR under grant N00014-91-J1605  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号