Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Jan-Ming Ho
  • Taipei, T'ai-pei, Taiwan

Jan-Ming Ho

In induction heating applications, the heating coils may have different types for different loads. A suitable control method is often needed to let the power electronic circuit working in most fittable condition to supply power to the... more
In induction heating applications, the heating coils may have different types for different loads. A suitable control method is often needed to let the power electronic circuit working in most fittable condition to supply power to the load. In this paper, a simple novel control strategy for induction heating is described. The most outstanding advantage of this method is a
In many digital archive programs that store content, like Buddhist documents or Chinese ancient books, that contain Hanzi characters, the missing character problem is always a serious issue. Although certain solutions have been proposed... more
In many digital archive programs that store content, like Buddhist documents or Chinese ancient books, that contain Hanzi characters, the missing character problem is always a serious issue. Although certain solutions have been proposed to solve this problem, when it comes to Web publishing, these solutions do not comprehensively address this issue. This paper focuses on the technical approaches to display, input and search using missing charac- ters on Web interface and use the Intelligent Character System as a example. Using these approaches, we have successfully created a system that solves the missing character problem. The interchangeability and standardization of the diverse approaches to glyph expression is beyond the scope of this paper.
Research Interests:
ABSTRACT The purpose of this paper is to develop a method to recommend products to customer via mobile devices. Collaborative recommendation is known as an effective way to recommend products. In this paper, we use the concept of... more
ABSTRACT The purpose of this paper is to develop a method to recommend products to customer via mobile devices. Collaborative recommendation is known as an effective way to recommend products. In this paper, we use the concept of collaborative recommendation to develop Mobile-Oriented Catalog (MOC). The proposed method is made from aggregating similar purchasing records to optimize combination of goods on mobile devices. This paper illustrates how to design attractive and collaborative catalog to recommend items by using Latent Dirichlet Allocation (LDA) based self-adaptive genetic algorithm (LDA-SAGA). LDA-SAGA is consisted of topic modeling concept and self-adaptive genetic algorithm. We use LDA as our topic modeling algorithm to construct MOC as a result that it is the simplest topic model. Our experimental evaluation on synthetic and real data shows that using preference as topic concept is effective. LDA-SAGA is especially outstanding with large number of customers and products. Finally, we compare the MOC which is used on mobile application (APP) of Amazon with the one used on Taobao and discuss the characteristics of their design. Different design of user interface on APP can lead to different scope of fitness value which is capable of explaining different market strategies of Taobao and Amazon.
ABSTRACT
In this paper, we present our design and implementation of ASIS multimedia digital library. Besides bibliographic information, our service includes an archive of digital audio and video streams, CD titles, and WWW contents. This system... more
In this paper, we present our design and implementation of ASIS multimedia digital library. Besides bibliographic information, our service includes an archive of digital audio and video streams, CD titles, and WWW contents. This system not only aims at end customer supports, e.g., searching, streaming, and browsing operations, but it also facilitates admission control, content production, distribution processes, and license
The video content for on-demand services is generally stored and streamed in a compressed format. The compressed video is naturally with the VBR (variable-bit-rate) property and the stream traffic is highly burst. Subject to the... more
The video content for on-demand services is generally stored and streamed in a compressed format. The compressed video is naturally with the VBR (variable-bit-rate) property and the stream traffic is highly burst. Subject to the QoS-guaranteed playback, the WAN bandwidth needs to allocate the video's peak bit rate if there is no client buffer for regulating the video delivery (7)(8)(9)(10)(11).
This study proposes an emotion detection engine for real time Internet chatting applications. We adopt a Web scale text mining approach that automates the categorization of affection state of daily events. We first accumulated a huge... more
This study proposes an emotion detection engine for real time Internet chatting applications. We adopt a Web scale text mining approach that automates the categorization of affection state of daily events. We first accumulated a huge collection of real-life entities from Web that would participate in events with a user in the chatting room. Based on the common actions between
... Page 2. skw clod tree(ZST) if its skew is zero. Now, we define the clock net routing problem as follows: Given a clock net N, construct a zero skew clock tree T(N) with minimal cost. 3. Preliminaries 3.1. Models 3.1.1. Circuit Model... more
... Page 2. skw clod tree(ZST) if its skew is zero. Now, we define the clock net routing problem as follows: Given a clock net N, construct a zero skew clock tree T(N) with minimal cost. 3. Preliminaries 3.1. Models 3.1.1. Circuit Model Let e (v,, vj ) be an edge of clock tree T(N). If ...
ABSTRACT This paper presents an efficient algorithm for finding the optimal k-cuts of a nondecreasing array of size n that produces the maximum area under the points. The naïve approach uses a dynamic programming algorithm which requires... more
ABSTRACT This paper presents an efficient algorithm for finding the optimal k-cuts of a nondecreasing array of size n that produces the maximum area under the points. The naïve approach uses a dynamic programming algorithm which requires O(kn2) time, where n is the size of the array. This algorithm is time consuming for large n or k and thus inappropriate. We design faster algorithms by discovering and proving some nice properties of the nondecreasing arrays, finding convex hull, and by continuous-to-discrete transformation. We believe that an O(kn) time algorithm exists and show a heuristic algorithm.
Given a set of n points on the plane, the Rectilinear Steiner Tree (RST) problem is to find the rectilinear tree in the plane, of minimum total wire length, which connects the given set of points. The total wire length of a RST is... more
Given a set of n points on the plane, the Rectilinear Steiner Tree (RST) problem is to find the rectilinear tree in the plane, of minimum total wire length, which connects the given set of points. The total wire length of a RST is referred to as the cost of the RST. Rectilinear ...
Computer-Supported Collaborative Learning (CSCL) is a new learning method that is receiving an increasing amount of attention in Taiwan. With the rapid growth in learning resources available over the Internet, it has become more difficult... more
Computer-Supported Collaborative Learning (CSCL) is a new learning method that is receiving an increasing amount of attention in Taiwan. With the rapid growth in learning resources available over the Internet, it has become more difficult for teachers to find useful resources. Although several local service providers (25 counties) in Taiwan are trying to organize their existing resources, each provider only
ABSTRACT Financial derivative valuation is the key of the adoption of the International Financial Reporting Standards (IFRS), which are based on fair value accounting. When the derivatives do not have an active market, the inputs and... more
ABSTRACT Financial derivative valuation is the key of the adoption of the International Financial Reporting Standards (IFRS), which are based on fair value accounting. When the derivatives do not have an active market, the inputs and methods for estimating their fair value will be more subjective and, the derivative valuation will be less reliable. The goal of this research is to design a derivative valuation service to aid the accounting professionals to meet the reliability requirement of the IFRS which, in the derivative setting, requires derivative valuation be objective and free from errors. First, we incorporate the various valuation models and their risk factors into the service as the basis for providing an objective valuation result. Second, we provide a user interface to simplified management of parameters and provisions of term sheets of derivatives to avoid users' errors in parsing the term sheets. Third, when the users hold a large number of derivatives, the derivative valuation meets real-time constraints in financial reporting. We thus developed the service in parallel computing environment to reduce computational time of the valuation process. Experiment cal results of derivative valuation are also presented.
The National Digital Archives Program (NDAP), Taiwan has developed advanced technologies for managing digital video archives. The technologies enable us to build indexing systems for fast retrieval of digital video contents, and add... more
The National Digital Archives Program (NDAP), Taiwan has developed advanced technologies for managing digital video archives. The technologies enable us to build indexing systems for fast retrieval of digital video contents, and add values to the contents. This paper takes the Digital Museum of Taiwan’s Social and Humanities Video Archive project as a case study to demonstrate the role of
ABSTRACT Asian barrier options are barrier options whose trigger is based on an average underlying price. They provide the advantages of both Asian options and barrier options. This paper introduces the first quadratic-time lattice... more
ABSTRACT Asian barrier options are barrier options whose trigger is based on an average underlying price. They provide the advantages of both Asian options and barrier options. This paper introduces the first quadratic-time lattice algorithm to price European-style Asian barrier options. It is by far the most efficient lattice algorithm with convergence guarantees. The algorithm relies on the Lagrange multipliers to optimally distribute the number of states for each node of the multinomial lattice. We also show experiment results to demonstrate effectiveness and efficiency of our algorithm by comparing with Monte Carlo simulations.
Background. The emergence of next-generation sequencing platform gives rise to a new generation of assembly algorithms. Compared with the Sanger sequencing data, the next-generation sequence data present shorter reads, higher coverage... more
Background. The emergence of next-generation sequencing platform gives rise to a new generation of assembly algorithms. Compared with the Sanger sequencing data, the next-generation sequence data present shorter reads, higher coverage depth, and different error profiles. These features bring new challenging issues for de novo transcriptome assembly. Methodology. To explore the influence of these features on assembly algorithms, we studied the relationship between read overlap size, coverage depth, and error rate using simulated data. According to the relationship, we propose a de novo transcriptome assembly procedure, called Euler-mix, and demonstrate its performance on a real transcriptome dataset of mice. The simulation tool and evaluation tool are freely available as open source. Significance. Euler-mix is a straightforward pipeline; it focuses on dealing with the variation of coverage depth of short reads dataset. The experiment result showed that Euler-mix improves the performance of de novo transcriptome assembly.
ABSTRACT The Chinese financial news titles has only few words so that it is hard for measuring the similarity between titles if compare all their keywords only. In this study, we proposed a method of semantic similarity measurement for... more
ABSTRACT The Chinese financial news titles has only few words so that it is hard for measuring the similarity between titles if compare all their keywords only. In this study, we proposed a method of semantic similarity measurement for Chinese financial news titles based on constructing the event frame structure as the template of a Chinese financial news title. It concerns the relation between the basic meanings of two news titles for similarity measurement. In addition, a semantic similarity function is used to integrate both the relation of event frames of the financial news titles and the relation between the keywords of these titles. In this matter, the proposed method can differentiate the Chinese financial news that mention the same event from all other Chinese financial news by the event frame, since it concerns the relation between the basic meanings of two news titles and reduces the comparing time. The result of this approach shows that the event frame extracting has high precision and the provided semantic similarity measurement can emphasize the relation between the connotations of two news titles
ABSTRACT Thanks to fast technology advancement of micro-electronics, wired/wireless networks and computer computations in past few years, the development of intelligent, versatile and complicated video-based surveillance systems has been... more
ABSTRACT Thanks to fast technology advancement of micro-electronics, wired/wireless networks and computer computations in past few years, the development of intelligent, versatile and complicated video-based surveillance systems has been very active in both research and industry to effectively enhance safety and security. In this chapter, the authors first introduce the generations of video surveillance systems and their applications in potential risk and crime detection. For effectively supporting early warning system of potential risk and crime (which is load-heavy and time-critical), both collaborative video surveillance and distributed visual data mining are necessary. Moreover, as the surveillance video and data for safety and security are very important for all kinds of risk and crime detection, the system is required not only to data protection of the message transmission over Internet, but also to further provide reliable transmission to preserve the visual quality-of-service (QoS). As cloud computing, users do not need to own the physical infrastructure, platform, or software. They consume resources as a service, where Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and pay only for resources that they use. Therefore, the design and implementation of an effective communication model is very important to this application system.

And 179 more