Skip to main content

    Shyan-ming Yuan

    Besides of normal face-to-face learning, learners can use electrical resources to perform digital learning in educational area. Learners can use communication tools such as real-time communication tools, online conferencing tools, and... more
    Besides of normal face-to-face learning, learners can use electrical resources to perform digital learning in educational area. Learners can use communication tools such as real-time communication tools, online conferencing tools, and collaborative learning web-sites to perform synchronous learning. This paper proposed a browser-based plugin free online tutoring system. By applying browser-based technologies to perform media data transmission, users could use the proposed system without the need of installing client applications. The system integrates services for account management, digital whiteboard, collaborative editing for online document and data synchronization to make the server-side more effective. Users are able to use the system to find online class participants and perform synchronous online learning.
    ... The proposed method is composed of the following four steps: automatic extraction of facial regions using AdaBoost, illumination normalization using local information, estimation of eye candidates by the eye filter based on texture... more
    ... The proposed method is composed of the following four steps: automatic extraction of facial regions using AdaBoost, illumination normalization using local information, estimation of eye candidates by the eye filter based on texture information, and detection of eye locations ...
    Data backup is the foundation of data protection, and improved continually on the aspects of backup performance, restore performance, redundancy of backup data and use efficiency of media space. But all existing backup method usually can... more
    Data backup is the foundation of data protection, and improved continually on the aspects of backup performance, restore performance, redundancy of backup data and use efficiency of media space. But all existing backup method usually can not harmonize these aspects mentioned above. This paper presents a novel backup method: a backup method based on a cross-version integration mechanism. It explores
    Workflow scheduling is the way to schedule the complex scientific workflow. In a cloud platform, the resources can be utilized more effectively and efficiently by scheduling the workflow properly. In this paper, an agent-based workflow... more
    Workflow scheduling is the way to schedule the complex scientific workflow. In a cloud platform, the resources can be utilized more effectively and efficiently by scheduling the workflow properly. In this paper, an agent-based workflow scheduling mechanism on cloud environment is proposed. We implement a set of agents that can federate multiple clouds and automatically monitor the entire system, and manage the job if it's a workflow job. We also implement a dynamic job dispatching algorithm to reduce the VM usage amount and improve the resource utilization.
    This paper presents a detailed description of the design and implementation of a multi-threaded Object Request Broker (ORB) on CORBA. The ORB was implemented on top of Windows NT and the underlying TCP protocol. The system's... more
    This paper presents a detailed description of the design and implementation of a multi-threaded Object Request Broker (ORB) on CORBA. The ORB was implemented on top of Windows NT and the underlying TCP protocol. The system's performance in both one-way and two-way requests is compared with that of a well-known commercial product, the IONA Orbix
    The extension of the transaction concept to the distributed environment has introduced problems not present in centralized systems. Some of these new problems are due to the communication network, which has become the major speed... more
    The extension of the transaction concept to the distributed environment has introduced problems not present in centralized systems. Some of these new problems are due to the communication network, which has become the major speed limitation factor. This suggests that minimizing communication in distributed transactions is as crucial as minimizing disk access for centralized systems. A system for distributed transaction processing that reflects this concern is presented. A novel construct called 'execute' is used that allows the initiation and execution of a group of remote operations with one command.<<ETX>>
    Stock prediction has garnered considerable attention among investors, with a recent focus on the application of machine learning techniques to enhance predictive accuracy. Prior research has established the effectiveness of machine... more
    Stock prediction has garnered considerable attention among investors, with a recent focus on the application of machine learning techniques to enhance predictive accuracy. Prior research has established the effectiveness of machine learning in forecasting stock market trends, irrespective of the analytical approach employed, be it technical, fundamental, or sentiment analysis. In the context of fiscal year-end selection, the decision may initially seem straightforward, with December 31 being the apparent choice, as discussed by B. Kamp in 2002. The primary argument for a uniform fiscal year-end centers around comparability. When assessing the financial performance of two firms with differing fiscal year-ends, substantial shifts in the business environment during non-overlapping periods can impede meaningful comparisons. Moreover, when two firms merge, the need to synchronize their annual reporting often results in shorter or longer fiscal years, complicating time series analysis. In...
    Automated testing is critical for the complex products development and manufacture. In generally, connecting multiple test environments in geographical distributed environment to share resources is a way to reduce cost. However, it... more
    Automated testing is critical for the complex products development and manufacture. In generally, connecting multiple test environments in geographical distributed environment to share resources is a way to reduce cost. However, it conflicts with the principle of “keep test environment clean”. Moreover, high latency between geographical different networks may impact origin automated test activities in reality. In this paper, we propose an automated testing framework for geographical distributed testing environment to solve the problems of sharing resources. In the proposed framework, improved Test Harness (TH) and integrated Test as a Service (TaaS) are proposed to assure automated testing flow and guarantee test integrity. The proposed framework may not impact origin automated test activities, which could reduce the cost of test activities in really. In addition, a basic implementation of Test Harness and TaaS Console in the proposed framework are presented in this paper.
    This paper presents a efficient digit-serial GF(\( 2^{m} \)) multiplier. The proposed architecture using digit-serial of concept to combine the principle of Karatsuba multiplier which can reduce circuit space complexity, also it is... more
    This paper presents a efficient digit-serial GF(\( 2^{m} \)) multiplier. The proposed architecture using digit-serial of concept to combine the principle of Karatsuba multiplier which can reduce circuit space complexity, also it is suitable for Elliptic Curve Cryptography (ECC) technology. We knows that the password system’s operation core is a multiplier, however that password system’s multiplier is very big, so it is necessary for reduce the area and time’s complexity. This paper is implement three smaller multiplier and digit-serial in FPGA to reduce time and area complexity. This method uses \( \frac{3dm}{2} \) AND gate, 6 m + n+ \( \frac{3dm}{2} + \frac{m}{2} \) +d-7 XORs and 3 m-3 registers. The paper using Altera FPGA Quartus II to simulate four different multipliers, 36 × 36, 84 × 84, 126 × 126 and 204 × 204, and implemented on Cyclone II EP2C70F896C8 experimental platform. The experimental results show that the proposed multipliers have lower time complexity than the existing digit-serial structures. The proposed architecture can reduce the time × space complexity decreasing when the bit-size of multiplier is increasing.
    ... 2. Christoph Borst , Thomas Wimböck , Florian Schmidt , Matthias Fuchs , Bernhard Brunner , Franziska Zacharias , Paolo Robuffo Giordano , Rainer Konietschke , Wolfgang Sepp , Stefan Fuchs , Christian Rink , Alin Albu-Schäffer , Gerd... more
    ... 2. Christoph Borst , Thomas Wimböck , Florian Schmidt , Matthias Fuchs , Bernhard Brunner , Franziska Zacharias , Paolo Robuffo Giordano , Rainer Konietschke , Wolfgang Sepp , Stefan Fuchs , Christian Rink , Alin Albu-Schäffer , Gerd Hirzinger, Rollin' Justin: mobile platform ...
    Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data... more
    Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data privacy and the regular interaction among students and universities. In this paper, a design for a blockchain-based system, namely UniChain, for managing Electronic Academic Records (EARs) is proposed. UniChain is designed to improve the current management systems as it provides interoperable, secure, and effective access to EARs by students, universities, and other third parties, while keeping the students’ privacy. UniChain employs timed-based smart contracts for governing transactions and controlling access to EARs. It adopts advanced encryption techniques for providing further security. This work proposes a new incentive mechanism that leverages the degree of universities regarding their efforts on maintaining academic records and creating new blocks...
    The growing number of online open-access journals promotes academic exchanges, but the prevalence of predatory journals is undermining the scholarly reporting process. Data collection, feature extraction, and model prediction are common... more
    The growing number of online open-access journals promotes academic exchanges, but the prevalence of predatory journals is undermining the scholarly reporting process. Data collection, feature extraction, and model prediction are common steps in tools designed to distinguish between legitimate and predatory academic journals and publisher websites. The authors include them in their proposed academic journal predatory checking (AJPC) system based on machine learning methods. The AJPC data collection process extracts 833 blacklists and 1213 whitelists information from websites to be used for identifying words and phrases that might indicate the presence of predatory journals. Feature extraction is used to identify words and terms that help detect predatory websites, and the system’s prediction stage uses eight classification algorithms to distinguish between potentially predatory and legitimate journals. We found that enhancing the classification efficiency of the bag of words model a...
    To improve data transmission efficiency, image compression is a commonly used method with the disadvantage of accompanying image distortion. There are many image restoration (IR) algorithms, and one of the most advanced algorithms is the... more
    To improve data transmission efficiency, image compression is a commonly used method with the disadvantage of accompanying image distortion. There are many image restoration (IR) algorithms, and one of the most advanced algorithms is the generative adversarial network (GAN)-based method with a high correlation to the human visual system (HVS). To evaluate the performance of GAN-based IR algorithms, we proposed an ensemble image quality assessment (IQA) called ATDIQA (Auxiliary Transformer with DISTS IQA) to give weights on multiscale features global self-attention transformers and local features of convolutional neural network (CNN) IQA of DISTS. The result not only performed better on the perceptual image processing algorithms (PIPAL) dataset with images by GAN IR algorithms but also has good model generalization over LIVE and TID2013 as traditional distorted image datasets. The ATDIQA ensemble successfully demonstrates its performance with a high correlation with the human judgmen...
    Due to the progress of computer technology, the detecting accuracy and speed of pattern recognition are promoted. Additionally, according to research advances in embedded systems, the applications of digital cameras, such as internet... more
    Due to the progress of computer technology, the detecting accuracy and speed of pattern recognition are promoted. Additionally, according to research advances in embedded systems, the applications of digital cameras, such as internet cameras, smart phones and smart TV, are widely used in nowadays. Therefore, we propose a set of real-time human-eye recognition and tracking systems with human-computer interaction mechanism. It can be adopted to help the smart TV users or any device which have camera and computing power to improve their using experience. The proposed system is demonstrated on OMAP4430 for embedded applications, and experimental results show that the proposed architecture is capable of effective and real-time eye position tracking. The proposed system can also detect the status of eye blink. Even for the case of uneven lighting, the proposed system can successfully recognize the human eyes with high accuracy.
    ABSTRACT With the evolution of computer science technology the concept of clouds are kept booming. The management of a large number of computer and peripheral equipment becomes an important issue. For centrally managing such a large... more
    ABSTRACT With the evolution of computer science technology the concept of clouds are kept booming. The management of a large number of computer and peripheral equipment becomes an important issue. For centrally managing such a large number of computers and peripheral equipment scattered in many long-distance locations, the IP-based peripheral equipment is presented in the market today. The smart automatic management which includes automatically handling the common equipment status and controlling the number of running computer is neglected. In addition, managers will usually want a semantic way to think about how to control these devices. This paper presents a user-configurable semantic control system which allows users define their own automation control processes. The prediction of computer status is used for energy control, and the intelligent home language SHPL is also adopted to describe the semantics of the process. The system achieves the cross-device automatic management using device status and the power-saving functionality is also provided.

    And 300 more