Search results for: Chih-Chung Chang
331 Cryptanalysis of Chang-Chang-s EC-PAKA Protocol for Wireless Mobile Networks
Authors: Hae-Soon Ahn, Eun-Jun Yoon
Abstract:
With the rapid development of wireless mobile communication, applications for mobile devices must focus on network security. In 2008, Chang-Chang proposed security improvements on the Lu et al.-s elliptic curve authentication key agreement protocol for wireless mobile networks. However, this paper shows that Chang- Chang-s improved protocol is still vulnerable to off-line password guessing attacks unlike their claims.
Keywords: Authentication, key agreement, wireless mobile networks, elliptic curve, password guessing attacks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511330 Fuzzy Controller Design for Ball and Beam System with an Improved Ant Colony Optimization
Authors: Yeong-Hwa Chang, Chia-Wen Chang, Hung-Wei Lin, C.W. Tao
Abstract:
In this paper, an improved ant colony optimization (ACO) algorithm is proposed to enhance the performance of global optimum search. The strategy of the proposed algorithm has the capability of fuzzy pheromone updating, adaptive parameter tuning, and mechanism resetting. The proposed method is utilized to tune the parameters of the fuzzy controller for a real beam and ball system. Simulation and experimental results indicate that better performance can be achieved compared to the conventional ACO algorithms in the aspect of convergence speed and accuracy.Keywords: Ant colony algorithm, Fuzzy control, ball and beamsystem
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2196329 Dynamics and Control of a Chaotic Electromagnetic System
Authors: Shun-Chang Chang
Abstract:
In this paper, different nonlinear dynamics analysis techniques are employed to unveil the rich nonlinear phenomena of the electromagnetic system. In particular, bifurcation diagrams, time responses, phase portraits, Poincare maps, power spectrum analysis, and the construction of basins of attraction are all powerful and effective tools for nonlinear dynamics problems. We also employ the method of Lyapunov exponents to show the occurrence of chaotic motion and to verify those numerical simulation results. Finally, two cases of a chaotic electromagnetic system being effectively controlled by a reference signal or being synchronized to another nonlinear electromagnetic system are presented.
Keywords: bifurcation, Poincare map, Lyapunov exponent, chaotic motion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1599328 Effect of Uneven Surface on Magnetic Properties of Fe-Based Amorphous Transformer
Authors: Yeong-Hwa Chang, Chang-Hung Hsu, Huei-Lung Chu, Chia-Wen Chang, Wei-Shou Chan, Chun-Yao Lee; Chia-Shiang Yao, Yan-Lou He
Abstract:
This study reports the preparation of soft magnetic ribbons of Fe-based amorphous alloys using the single-roller melt-spinning technique. Ribbon width varied from 142 mm to 213 mm and, with a thickness of approximately 22 μm 2 μm. The microstructure and magnetic properties of the ribbons were characterized by differential scanning calorimeter (DSC), X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and electrical resistivity measurements (ERM). The amorphous material properties dependence of the cooling rate and nozzle pressure have uneven surface in ribbon thicknesses are investigated. Magnetic measurement results indicate that some region of the ribbon exhibits good magnetic properties, higher saturation induction and lower coercivity. However, due to the uneven surface of 213 mm wide ribbon, the magnetic responses are not uniformly distributed. To understand the transformer magnetic performances, this study analyzes the measurements of a three-phase 2 MVA amorphous-cored transformer. Experimental results confirm that the transformer with a ribbon width of 142 mm has better magnetic properties in terms of lower core loss, exciting power, and audible noise.
Keywords: Amorphous ribbon, uneven surface, magnetic properties, and rapid solidification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2183327 Design of Variable Fractional-Delay FIR Differentiators
Authors: Jong-Jy Shyu, Soo-Chang Pei, Min-Han Chang
Abstract:
In this paper, the least-squares design of variable fractional-delay (VFD) finite impulse response (FIR) digital differentiators is proposed. The used transfer function is formulated so that Farrow structure can be applied to realize the designed system. Also, the symmetric characteristics of filter coefficients are derived, which leads to the complexity reduction by saving almost a half of the number of coefficients. Moreover, all the elements of related vectors or matrices for the optimal process can be represented in closed forms, which make the design easier. Design example is also presented to illustrate the effectiveness of the proposed method.
Keywords: Differentiator, variable fractional-delay filter, FIR filter, least-squares method, Farrow structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1416326 Frequency-Domain Design of Fractional-Order FIR Differentiators
Authors: Wei-Der Chang, Dai-Ming Chang, Eri-Wei Chiang, Chia-Hung Lin, Jian-Liung Chen
Abstract:
In this paper, a fractional-order FIR differentiator design method using the differential evolution (DE) algorithm is presented. In the proposed method, the FIR digital filter is designed to meet the frequency response of a desired fractal-order differentiator, which is evaluated in the frequency domain. To verify the design performance, another design method considered in the time-domain is also provided. Simulation results reveal the efficiency of the proposed method.Keywords: Fractional-order differentiator, FIR digital filter, Differential evolution algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2251325 Effect of Uneven Surface on Magnetic Properties of Fe-based Amorphous Power Transformer
Authors: Chang-Hung Hsu, Yeong-Hwa Chang, Chun-Yao Lee, Chia-Shiang Yao, Yan-Lou He, Huei-Lung Chu, Chia-Wen Chang, Wei-Shou Chan
Abstract:
This study reports the preparation of soft magnetic ribbons of Fe-based amorphous alloys using the single-roller melt-spinning technique. Ribbon width varied from 142 mm to 213 mm and, with a thickness of approximately 22 μm ± 2 μm. The microstructure and magnetic properties of the ribbons were characterized by differential scanning calorimeter (DSC), X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and electrical resistivity measurements (ERM). The amorphous material properties dependence of the cooling rate and nozzle pressure have uneven surface in ribbon thicknesses are investigated. Magnetic measurement results indicate that some region of the ribbon exhibits good magnetic properties, higher saturation induction and lower coercivity. However, due to the uneven surface of 213 mm wide ribbon, the magnetic responses are not uniformly distributed. To understand the transformer magnetic performances, this study analyzes the measurements of a three-phase 2 MVA amorphous-cored transformer. Experimental results confirm that the transformer with a ribbon width of 142 mm has better magnetic properties in terms of lower core loss, exciting power, and audible noise.Keywords: Amorphous ribbon, uneven surface, magnetic properties, and rapid solidification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2010324 Study on Hydrophilicity of Anodic Aluminum Oxide Templates with TiO2-NTs
Authors: Yu-Wei Chang, Hsuan-Yu Ku, Jo-Shan Chiu, Shao-Fu Chang, Chien-Chon Chen
Abstract:
This paper aims to discuss the hydrophilicity about the anodic aluminum oxide (AAO) template with titania nanotubes (NTs). The AAO templates with pore size diameters of 20-250 nm were generated by anodizing 6061 aluminum alloy substrates in acid solution of sulfuric acid (H2SO4), oxalic acid (COOH)2, and phosphoric acid (H3PO4), respectively. TiO2-NTs were grown on AAO templates by the sol-gel deposition process successfully. The water contact angle on AAO/TiO2-NTs surface was lower compared to the water contact angle on AAO surface. So, the characteristic of hydrophilicity was significantly associated with the AAO pore size and what kinds of materials were immersed variables.Keywords: Anodic aluminum oxide, nanotube, anodization, Sol-Gel, hydrophilicity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1085323 Performance Variation of the TEES According to the Changes in Cold-Side Storage Temperature
Authors: Young-Jin Baik, Minsung Kim, Junhyun Cho, Ho-Sang Ra, Young-Soo Lee, Ki-Chang Chang
Abstract:
Surplus electricity can be converted into potential energy via pumped hydroelectric storage for future usage. Similarly, thermo-electric energy storage (TEES) uses heat pumps equipped with thermal storage to convert electrical energy into thermal energy; the stored energy is then converted back into electrical energy when necessary using a heat engine. The greatest advantage of this method is that, unlike pumped hydroelectric storage and compressed air energy storage, TEES is not restricted by geographical constraints. In this study, performance variation of the TEES according to the changes in cold-side storage temperature was investigated by simulation method.
Keywords: Energy Storage System, Heat Pump.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1851322 Color Image Enhancement Using Multiscale Retinex and Image Fusion Techniques
Authors: Chang-Hsing Lee, Cheng-Chang Lien, Chin-Chuan Han
Abstract:
In this paper, an edge-strength guided multiscale retinex (EGMSR) approach will be proposed for color image contrast enhancement. In EGMSR, the pixel-dependent weight associated with each pixel in the single scale retinex output image is computed according to the edge strength around this pixel in order to prevent from over-enhancing the noises contained in the smooth dark/bright regions. Further, by fusing together the enhanced results of EGMSR and adaptive multiscale retinex (AMSR), we can get a natural fused image having high contrast and proper tonal rendition. Experimental results on several low-contrast images have shown that our proposed approach can produce natural and appealing enhanced images.
Keywords: Image Enhancement, Multiscale Retinex, Image Fusion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2738321 A Dynamic Hybrid Option Pricing Model by Genetic Algorithm and Black- Scholes Model
Authors: Yi-Chang Chen, Shan-Lin Chang, Chia-Chun Wu
Abstract:
Unlike this study focused extensively on trading behavior of option market, those researches were just taken their attention to model-driven option pricing. For example, Black-Scholes (B-S) model is one of the most famous option pricing models. However, the arguments of B-S model are previously mentioned by some pricing models reviewing. This paper following suggests the importance of the dynamic character for option pricing, which is also the reason why using the genetic algorithm (GA). Because of its natural selection and species evolution, this study proposed a hybrid model, the Genetic-BS model which combining GA and B-S to estimate the price more accurate. As for the final experiments, the result shows that the output estimated price with lower MAE value than the calculated price by either B-S model or its enhanced one, Gram-Charlier garch (G-C garch) model. Finally, this work would conclude that the Genetic-BS pricing model is exactly practical.Keywords: genetic algorithm, Genetic-BS, option pricing model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2245320 Monitoring and Analysis of Bridge Crossing Ground Fissures
Authors: Zhiqing Zhang, Xiangong Zhou, Zihan Zhou
Abstract:
Ground fissures can be seen in some cities all over the world. As a special urban geological disaster, ground fissures in Xi'an have caused great harm to infrastructure. Chang'an Road Interchange in Xi'an City is a bridge across ground fissures. The damage to Chang'an Road interchange is the most serious and typical. To study the influence of ground fissures on the bridge, we established a bridge monitoring system. The main monitoring items include elevation monitoring, structural displacement monitoring, etc. The monitoring results show that the typical failure is mainly reflected in the bridge deck damage caused by horizontal tension and vertical dislocation. For the construction of urban interchange spanning ground fissures, the interchange should be divided reasonably, a simple support structure with less restriction should be adopted, and the monitoring of supports should be strengthened to prevent the occurrence of beam falling.
Keywords: Bridge monitoring, ground fissures, typical disease, structural displacement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 649319 Post-Compression Consideration in Video Watermarking for Wireless Communication
Authors: Chuen-Ching Wang, Yao-Tang Chang, Yu-Chang Hsu
Abstract:
A simple but effective digital watermarking scheme utilizing a context adaptive variable length coding (CAVLC) method is presented for wireless communication system. In the proposed approach, the watermark bits are embedded in the final non-zero quantized coefficient of each DCT block, thereby yielding a potential reduction in the length of the coded block. As a result, the watermarking scheme not only provides the means to check the authenticity and integrity of the video stream, but also improves the compression ratio and therefore reduces both the transmission time and the storage space requirements of the coded video sequence. The results confirm that the proposed scheme enables the detection of malicious tampering attacks and reduces the size of the coded H.264 file. Therefore, the current study is feasible to apply in the video applications of wireless communication such as 3G systemKeywords: 3G, wireless communication, CAVLC, digitalwatermarking, motion compensation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1871318 A Novel 14 nm Extended Body FinFET for Reduced Corner Effect, Self-Heating Effect, and Increased Drain Current
Authors: Cheng-Hsien Chang, Jyi-Tsong Lin, Po-Hsieh Lin, Hung-Pei Hsu, Chan-Hsiang Chang, Ming-Tsung Shih, Shih-Chuan Tseng, Min-Yan Lin
Abstract:
In this paper, we have proposed a novel FinFET with extended body under the poly gate, which is called EB-FinFET, and its characteristic is demonstrated by using three-dimensional (3-D) numerical simulation. We have analyzed and compared it with conventional FinFET. The extended body height dependence on the drain induced barrier lowering (DIBL) and subthreshold swing (S.S) have been also investigated. According to the 3-D numerical simulation, the proposed structure has a firm structure, an acceptable short channel effect (SCE), a reduced series resistance, an increased on state drain current (I on) and a large normalized I DS. Furthermore, the structure can also improve corner effect and reduce self-heating effect due to the extended body. Our results show that the EBFinFET is excellent for nanoscale device.Keywords: SOI, FinFET, tri-gate, self-heating effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2802317 Characterization of the LMOS with Different Channel Structure
Authors: Hung-Pei Hsu, Jyi-Tsong Lin, Po-Hsieh Lin, Cheng-Hsien Chang, Ming-Tsung Shih, Chan-Hsiang Chang, Shih-Chuan Tseng, Min-Yan Lin, Shih-Wen Hsu
Abstract:
In this paper, we propose a novel metal oxide semiconductor field effect transistor with L-shaped channel structure (LMOS), and several type of L-shaped structures are also designed, studied and compared with the conventional MOSFET device for the same average gate length (Lavg). The proposed device electrical characteristics are analyzed and evaluated by three dimension (3-D) ISE-TCAD simulator. It can be confirmed that the LMOS devices have higher on-state drain current and both lower drain-induced barrier lowering (DIBL) and subthreshold swing (S.S.) than its conventional counterpart has. In addition, the transconductance and voltage gain properties of the LMOS are also improved.Keywords: Average gate length (Lavg), drain-induced barrier lowering (DIBL), L-shaped channel MOSFET (LMOS), subthreshold swing (S.S.).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1413316 Comparison of Neural Network and Logistic Regression Methods to Predict Xerostomia after Radiotherapy
Authors: Hui-Min Ting, Tsair-Fwu Lee, Ming-Yuan Cho, Pei-Ju Chao, Chun-Ming Chang, Long-Chang Chen, Fu-Min Fang
Abstract:
To evaluate the ability to predict xerostomia after radiotherapy, we constructed and compared neural network and logistic regression models. In this study, 61 patients who completed a questionnaire about their quality of life (QoL) before and after a full course of radiation therapy were included. Based on this questionnaire, some statistical data about the condition of the patients’ salivary glands were obtained, and these subjects were included as the inputs of the neural network and logistic regression models in order to predict the probability of xerostomia. Seven variables were then selected from the statistical data according to Cramer’s V and point-biserial correlation values and were trained by each model to obtain the respective outputs which were 0.88 and 0.89 for AUC, 9.20 and 7.65 for SSE, and 13.7% and 19.0% for MAPE, respectively. These parameters demonstrate that both neural network and logistic regression methods are effective for predicting conditions of parotid glands.
Keywords: NPC, ANN, logistic regression, xerostomia.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1637315 Computational Evaluation of a C-A Heat Pump
Authors: Young-Jin Baik, Minsung Kim, Young-Soo Lee, Ki-Chang Chang, Seong-Ryong Park
Abstract:
The compression-absorption heat pump (C-A HP), one of the promising heat recovery equipments that make process hot water using low temperature heat of wastewater, was evaluated by computer simulation. A simulation program was developed based on the continuity and the first and second laws of thermodynamics. Both the absorber and desorber were modeled using UA-LMTD method. In order to prevent an unfeasible temperature profile and to reduce calculation errors from the curved temperature profile of a mixture, heat loads were divided into lots of segments. A single-stage compressor was considered. A compressor cooling load was also taken into account. An isentropic efficiency was computed from the map data. Simulation conditions were given based on the system consisting of ordinarily designed components. The simulation results show that most of the total entropy generation occurs during the compression and cooling process, thus suggesting the possibility that system performance can be enhanced if a rectifier is introduced.Keywords: Waste heat recovery, Heat Pump.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1720314 Investigation of Shear Thickening Liquid Protection Fibrous Material
Authors: Po-Yun Chen, Jui-Liang Yen, Chang-Ping Chang, Wen-Hua Hu, Yu-Liang Chen, Yih-Ming Liu, Chin-Yi Chou, Ming-Der Ger
Abstract:
The stab resistance performance of newly developed fabric composites composed of hexagonal paper honeycombs, filled with shear thickening fluid (STF), and woven Kevlar® fabric or UHMPE was investigated in this study. The STF was prepared by dispersing submicron SiO2 particles into polyethylene glycol (PEG). Our results indicate that the STF-Kevlar composite possessed lower penetration depth than that of neat Kevlar. In other words, the STF-Kevlar composite can attain the same energy level in stab-resistance test with fewer layers of Kevlar fabrics than that of the neat Kevlar fabrics. It also indicates that STF can be used for the fabrication of flexible body armors and can provide improved protection against stab threats. We found that the stab resistance of the STF-Kevlar composite increases with the increase of SiO2 concentration in STF. Moreover, the silica particles functionalized with silane coupling agent can further improve the stab resistance.Keywords: shear thickening fluid, SiO2, Kevlar, stab
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3294313 Application of Smart Temperature Information Material for The Evaluation of Heat Storage Capacity and Insulation Capacity of Exterior Walls
Authors: Chih-Yuan Chang, Jin-Chiuan Chang, San-Shan Hung, Cheng-Jui Hsu
Abstract:
The heat storage capacity of concrete in building shells is a major reason for excessively large electricity consumption induced by indoor air conditioning. In this research, the previously developed Smart Temperature Information Material (STIM) is embedded in two groups of exterior wall specimens (the control group contains reinforced concrete exterior walls and the experimental group consists of tiled exterior walls). Long term temperature measurements within the concrete are taken by the embedded STIM. Temperature differences between the control group and the experimental group in walls facing the four cardinal directions (east, west, south, and north) are evaluated. This study aims to provide a basic reference for the design of exterior walls and the selection of heat insulation materials.
Keywords: building envelope, sensor, energy, thermal insulation, reinforced concrete
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1596312 Emotion Classification by Incremental Association Language Features
Authors: Jheng-Long Wu, Pei-Chann Chang, Shih-Ling Chang, Liang-Chih Yu, Jui-Feng Yeh, Chin-Sheng Yang
Abstract:
The Major Depressive Disorder has been a burden of medical expense in Taiwan as well as the situation around the world. Major Depressive Disorder can be defined into different categories by previous human activities. According to machine learning, we can classify emotion in correct textual language in advance. It can help medical diagnosis to recognize the variance in Major Depressive Disorder automatically. Association language incremental is the characteristic and relationship that can discovery words in sentence. There is an overlapping-category problem for classification. In this paper, we would like to improve the performance in classification in principle of no overlapping-category problems. We present an approach that to discovery words in sentence and it can find in high frequency in the same time and can-t overlap in each category, called Association Language Features by its Category (ALFC). Experimental results show that ALFC distinguish well in Major Depressive Disorder and have better performance. We also compare the approach with baseline and mutual information that use single words alone or correlation measure.Keywords: Association language features, Emotion Classification, Overlap-Category Feature, Nature Language Processing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1897311 Multi-VSS Scheme by Shifting Random Grids
Authors: Joy Jo-Yi Chang, Justie Su-Tzu Juan
Abstract:
Visual secret sharing (VSS) was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can’t obtain any information about the secret image. When superimposes the shares, it can restore the secret by human vision. Due to the traditional VSS have some problems like pixel expansion and the cost of sophisticated. And this method only can encode one secret image. The schemes of encrypting more secret images by random grids into two shares were proposed by Chen et al. in 2008. But when those restored secret images have much distortion, those schemes are almost limited in decoding. In the other words, if there is too much distortion, we can’t encrypt too much information. So, if we can adjust distortion to very small, we can encrypt more secret images. In this paper, four new algorithms which based on Chang et al.’s scheme be held in 2010 are proposed. First algorithm can adjust distortion to very small. Second algorithm distributes the distortion into two restored secret images. Third algorithm achieves no distortion for special secret images. Fourth algorithm encrypts three secret images, which not only retain the advantage of VSS but also improve on the problems of decoding.
Keywords: Visual cryptography, visual secret sharing, random grids, multiple, secret image sharing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1526310 Blind Image Deconvolution by Neural Recursive Function Approximation
Authors: Jiann-Ming Wu, Hsiao-Chang Chen, Chun-Chang Wu, Pei-Hsun Hsu
Abstract:
This work explores blind image deconvolution by recursive function approximation based on supervised learning of neural networks, under the assumption that a degraded image is linear convolution of an original source image through a linear shift-invariant (LSI) blurring matrix. Supervised learning of neural networks of radial basis functions (RBF) is employed to construct an embedded recursive function within a blurring image, try to extract non-deterministic component of an original source image, and use them to estimate hyper parameters of a linear image degradation model. Based on the estimated blurring matrix, reconstruction of an original source image from a blurred image is further resolved by an annealed Hopfield neural network. By numerical simulations, the proposed novel method is shown effective for faithful estimation of an unknown blurring matrix and restoration of an original source image.
Keywords: Blind image deconvolution, linear shift-invariant(LSI), linear image degradation model, radial basis functions (rbf), recursive function, annealed Hopfield neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2061309 The Spanning Laceability of k-ary n-cubes when k is Even
Authors: Yuan-Kang Shih, Shu-Li Chang, Shin-Shin Kao
Abstract:
Qk n has been shown as an alternative to the hypercube family. For any even integer k ≥ 4 and any integer n ≥ 2, Qk n is a bipartite graph. In this paper, we will prove that given any pair of vertices, w and b, from different partite sets of Qk n, there exist 2n internally disjoint paths between w and b, denoted by {Pi | 0 ≤ i ≤ 2n-1}, such that 2n-1 i=0 Pi covers all vertices of Qk n. The result is optimal since each vertex of Qk n has exactly 2n neighbors.Keywords: container, Hamiltonian, k-ary n-cube, m*-connected.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1538308 Evaluation of Chiller Power Consumption Using Grey Prediction
Authors: Tien-Shun Chan, Yung-Chung Chang, Cheng-Yu Chu, Wen-Hui Chen, Yuan-Lin Chen, Shun-Chong Wang, Chang-Chun Wang
Abstract:
98% of the energy needed in Taiwan has been imported. The prices of petroleum and electricity have been increasing. In addition, facility capacity, amount of electricity generation, amount of electricity consumption and number of Taiwan Power Company customers have continued to increase. For these reasons energy conservation has become an important topic. In the past linear regression was used to establish the power consumption models for chillers. In this study, grey prediction is used to evaluate the power consumption of a chiller so as to lower the total power consumption at peak-load (so that the relevant power providers do not need to keep on increasing their power generation capacity and facility capacity). In grey prediction, only several numerical values (at least four numerical values) are needed to establish the power consumption models for chillers. If PLR, the temperatures of supply chilled-water and return chilled-water, and the temperatures of supply cooling-water and return cooling-water are taken into consideration, quite accurate results (with the accuracy close to 99% for short-term predictions) may be obtained. Through such methods, we can predict whether the power consumption at peak-load will exceed the contract power capacity signed by the corresponding entity and Taiwan Power Company. If the power consumption at peak-load exceeds the power demand, the temperature of the supply chilled-water may be adjusted so as to reduce the PLR and hence lower the power consumption.Keywords: Gery system theory, grey prediction, chller.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2580307 Augmented Reality on Android
Authors: Chunghan Li, Chang-Shyh Peng, Daisy F. Sang
Abstract:
Augmented Reality is an application which combines a live view of real-world environment and computer-generated images. This paper studies and demonstrates an efficient Augmented Reality development in the mobile Android environment with the native Java language and Android SDK. Major components include Barcode Reader, File Loader, Marker Detector, Transform Matrix Generator, and a cloud database.
Keywords: Augmented Reality, Android.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2979306 IPO Price Performance and Signaling
Authors: Chih-Hsiang Chang, I-Fan Ho
Abstract:
This study examines the credibility of the signaling as explanation for IPO initial underpricing. Findings reveal the initial underpricing and the long-term underperformance of IPOs in Taiwan. However, we only find weak support for signaling as explanation of IPO underpricing.
Keywords: Signaling, IPO initial underpricing, IPO long-term underperformance, Taiwan’s stock market.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2475305 Maximum Induced Subgraph of an Augmented Cube
Authors: Meng-Jou Chien, Jheng-Cheng Chen, Chang-Hsiung Tsai
Abstract:
Let maxζG(m) denote the maximum number of edges in a subgraph of graph G induced by m nodes. The n-dimensional augmented cube, denoted as AQn, a variation of the hypercube, possesses some properties superior to those of the hypercube. We study the cases when G is the augmented cube AQn.
Keywords: Interconnection network, Augmented cube, Induced subgraph, Bisection width.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546304 The Microstructure of Aging ZnO, AZO, and GZO Films
Authors: Z. C. Chang, S. C. Liang
Abstract:
RF magnetron sputtering is used on the ceramic targets, each of which contains zinc oxide (ZnO), zinc oxide doped with aluminum (AZO) and zinc oxide doped with gallium (GZO). The electric conduction mechanism of the AZO and GZO films came mainly from the Al and Ga, the oxygen vacancies, Zn interstitial atoms, and Al and/or Ga interstitial atoms. AZO and GZO films achieved higher conduction than did ZnO film, it being ion vacant and nonstoichiometric. The XRD analysis showed a preferred orientation along the (002) plane for ZnO, AZO, and GZO films.
Keywords: ZnO, AZO, GZO, Doped, Sputtering
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2760303 The Effect of Aging of ZnO, AZO, and GZO Films on the Microstructure and Photoelectric Property
Authors: Zue Chin Chang
Abstract:
RF magnetron sputtering is used on the ceramic targets, each of which contains zinc oxide (ZnO), zinc oxide doped with aluminum (AZO) and zinc oxide doped with gallium (GZO). The XRD analysis showed a preferred orientation along the (002) plane for ZnO, AZO, and GZO films. The AZO film had the best electrical properties; it had the lowest resistivity of 6.6 × 10-4 cm, the best sheet resistance of 2.2 × 10-1 Ω/square, and the highest carrier concentration of 4.3 × 1020 cm-3, as compared to the ZnO and GZO films.Keywords: Aging, films, Microstructure, Photoelectric Property.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2014302 Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
Authors: Song Han, Wanquan Liu, Elizabeth Chang
Abstract:
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol. Besides the security properties shared with previous authentication protocols, the proposed protocol provides the same level of security with smaller public key sizes.Keywords: Deniable Authentication, Man-in-the-middleAttack, Cryptography, Elliptic Curves.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1616