- Antenna Design and Analysis
- Advanced MEMS and NEMS Technologies
- Network Packet Processing and Optimization
- Algorithms and Data Compression
- Microwave Engineering and Waveguides
- Human Pose and Action Recognition
- Network Security and Intrusion Detection
- Bluetooth and Wireless Communication Technologies
- Energy Harvesting in Wireless Networks
- Anomaly Detection Techniques and Applications
- Adaptive Control of Nonlinear Systems
- Advanced Antenna and Metasurface Technologies
- Antenna Design and Optimization
- Advanced Neural Network Applications
- Innovative Energy Harvesting Technologies
- Vehicle License Plate Recognition
- Robotics and Sensor-Based Localization
- Guidance and Control Systems
- Parallel Computing and Optimization Techniques
- Advanced Sensor and Energy Harvesting Materials
- Advanced Image and Video Retrieval Techniques
- Wireless Body Area Networks
- Advanced Fiber Optic Sensors
- Electromagnetic Compatibility and Noise Suppression
- Video Surveillance and Tracking Methods
National Taiwan University
2008-2025
National Taiwan Normal University
2015-2024
National Taipei University of Technology
2008-2021
National Taipei University
2021
National Chung Hsing University
2021
Chung Hua University
2011-2018
National Taiwan University of Science and Technology
2018
National Taiwan Ocean University
2007-2015
Yuan Ze University
2015
Fu Jen Catholic University
2015
Graphics processing units (GPUs) have attracted a lot of attention due to their cost-effective and enormous power for massive data parallel computing. In this paper, we propose novel algorithm exact pattern matching on GPUs. A traditional matches multiple patterns simultaneously by traversing special state machine called an Aho-Corasick machine. Considering the particular architecture GPUs, in first efficient which perform very algorithms. Also, several techniques are introduced do...
In recent years, license plate recognition system has become a crucial role in the development of smart cities for vehicle management, investigation stolen vehicles, and traffic monitoring control. License three stages, including localization, character segmentation, recognition. Although been successfully applied to environment-controlled parking system, it still faces many challenging surveillance such as congested with multiple plates, ambiguous signs advertisements, tilting well obscure...
A double-HZO (HfZrO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> ) FeFET (ferroelectric FET) with nonidentical ferroelectric thicknesses is experimentally demonstrated as low |V xmlns:xlink="http://www.w3.org/1999/xlink">P/E</sub> | = 5 V, 2-bit endurance > 10 <sup xmlns:xlink="http://www.w3.org/1999/xlink">5</sup> cycles and retention xmlns:xlink="http://www.w3.org/1999/xlink">4</sup> s. Inserting an insulator to separate the layers...
Network Intrusion Detection System has been widely used to protect computer systems from network attacks. Due the ever-increasing number of attacks and complexity, traditional software approaches on uni-processors have become inadequate for current high-speed network. In this paper, we propose a novel parallel algorithm speedup string matching performed GPUs. We also innovate new state machine matching, which is more suitable be GPU. described several techniques considering special...
The interplay among heat, spin, and charge is the central focus in spin caloritronic research. While longitudinal heat-to-spin conversion via Seebeck effect has been intensively studied, transverse Nernst (SNE) not equally explored. One major challenge minuscule signals generated by SNE, which are often mixed with background noises. In this work, we overcome difficulty studying thin films of Ni70Cu30 alloy only a sizable Hall angle but also large coefficient. We observe an estimated ranging...
In the past few years, license plate recognition systems have been widely used in parking lots. order to identify plates easily, traditional lot a fixed light source and shooting angle. For particularly tilting angles, such as images taken with super wide-angle lenses or fisheye lenses, deformation of can be severe, resulting poor systems. this paper, we propose three-stage system based on Mask R-CNN that for various angles more oblique images. Experimental results show proposed architecture...
In recent years, the use of license plate recognition technology in traffic monitor has attracted a lot attention because it can be used smart city to do criminal investigation and detection. License been widely parking management systems which fixed shooting angle lighting environments. The will encounter difficulties character due factors such as angle, vehicle speed environment light shadow. Aiming at blurred skewed images caused by above factors, this paper presents hierarchical...
Network intrusion detection system is used to inspect packet contents against thousands of predefined malicious or suspicious patterns. Because traditional software alone pattern matching approaches can no longer meet the high throughput today's networking, many hardware are proposed accelerate matching. Among approaches, memory-based architecture has attracted a lot attention because its easy reconfigurability and scalability. In order accommodate increasing number attack patterns...
Augmented reality has been widely used in many applications because of its ability to offer an amazing way overlay computer-generated images over the user's real-world view, creating a composite view rooted real and virtual worlds. Reality is realistic, direct or indirect physical environment whose elements are "enhanced" through sensory input such as sound, video, graphics, tactile, GPS data. In this paper, we present novel campus navigation APP that uses augmented provide users with new...
Multiple string matching has a wide range of applications such as network intrusion detection systems, spam filters, information retrieval and bioinformatics. To accelerate multiple matching, many hardware approaches are proposed to matching. Among the approaches, memory architectures have been widely adopted because their flexibility scalability. A conventional architecture compiles patterns into state machine performs by traversing corresponding transition table. Due ever-increasing number...
After 10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">11</sup> high endurance cycles with memory window (MW) =0.9 V is achieved for the 3D gate-all-around (GAA) nanosheet (NS) ferroelectric field-effect transistor (FeFET) based on double-HZO; aim to homogenize corner field and mitigate dead zones. The interlayer Al <inf xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> O xmlns:xlink="http://www.w3.org/1999/xlink">3</inf> or TiN in double-HZO...
Due to the conciseness and flexibility, regular expressions have been widely adopted in Network Intrusion Detection Systems represent network attack patterns. However, expressive power of accompanies intensive computation memory consumption which leads severe performance degradation. Recently, graphics processing units accelerate exact string pattern due their cost-effective enormous for massive data parallel computing. Nevertheless, so far as authors are aware, no previous work can deal...
Robotic arms have been widely used in various industries and the advantages of cost savings, high productivity, efficiency. Although robotic are good at increasing efficiency repetitive tasks, they still need to be re-programmed optimized when new tasks deployed, resulting detrimental downtime cost. It is therefore objective this paper present a learning from demonstration (LfD) system provide more intuitive way for robots efficiently perform through human on basis two major components:...
Memory architectures have been widely adopted in network intrusion detection system for inspecting malicious packets due to their flexibility and scalability. match input streams against thousands of attack patterns by traversing the corresponding state transition table stored commodity memories. With increasing number patterns, reducing memory requirement has become critical architectures. In this paper, we propose a novel architecture using perfect hashing condense tables without hash...
This paper presents a high power density converter using an active-clamp flyback converter. The voltage spike in the conventional can be eliminated to reduce electromagnetic interference and stresses on switches by active-clamped circuit. relationship between zero-voltage-switching condition of frequency magnetizing inductance leakage is analyzed discussed. GaN devices are used both as primary secondary volume switching losses, achieve density. planar transformer design reduces conduction...
On the streets of Taiwan, many roadside tollers are often seen riding motorcycles in one hand, and other hand holding mobile devices to issue payment notices for cars parked on roadsides. The work is very dangerous. First, they must first park their next motorcycles. They then use eyes confirm license plate number, enter number into device, finally place bill car’s windows or attach Our idea implement an automated recognition system increase efficiency reduce time road. Recently, systems...
Since deep neural networks may classify out-of-distribution image data into in-distribution classes with high confidence scores, this problem cause serious or even fatal hazards in certain applications, such as autonomous vehicles and medical diagnosis. Therefore, detection (also called anomaly outlier detection) of classification has become a critical issue for the successful development networks. In other words, network needs to be able distinguish anomalous that is significantly different...
Human motion tracking is widely applied to rehabilitation tasks, and inertial measurement unit (IMU) sensors are a well-known approach for recording behavior. IMU can provide accurate information regarding three-dimensional (3D) human motion. However, must be attached the body, which inconvenient or uncomfortable users. To alleviate this issue, visual-based system from two-dimensional (2D) RGB images has been studied extensively in recent years proven have suitable performance tracking. 2D...
Although many speech enhancement (SE) algorithms have been proposed to promote perception in hearing-impaired patients, the conventional SE approaches that perform well under quiet and/or stationary noises fail nonstationary when speaker is at a considerable distance. Therefore, objective of this study overcome limitations approaches.This proposes speaker-closed deep learning-based method together with an optical microphone acquire and enhance target speaker.The evaluation scores achieved by...
In this paper, we propose a novel on-glass multi-band antenna with planar inverter F structure for the GPS and WLAN wireless communication. A prototype of proposed compact size 6mm×25mm is experimented in mobile handset design. The shows operating bandwidths (referenced Return loss-6dB) covering 1.575GHz 2.45GHz. present design mainly focuses on current trends development low profile handset. For reducing dimension area device, placed inner surface glass display. Moreover, can be against to...
Multi-string matching has been widely used in network intrusion detection systems to detect attacks and malicious packets by packet contents with thousands of attack patterns. Due the rapid increase speeds, multi-string faces higher performance throughput challenges. In order improve matching, this paper presents a hierarchical parallelism that accelerates on multiple GPUs. The consists three layers parallelism. From top bottom, first layer is data GPUs, second task single GPU, last...
In this paper, facilities of antenna measurement have recently commissioned a spherical far-field system. The low profile scan system provides significant advantages over the older testing including elimination problem simple theta (θ) and phi (ø) rotary axis with indoor range testing, complete characterization antenna, improved accuracy. mobile phone under test has been plan at Cellular Telecommunications & Internet Association (CTIA) [1] certification program requirements for performing...
Human action recognition plays an important role in video surveillance, human-computer interaction, understanding, and virtual reality. Different from two-dimensional object recognition, human is a dynamic with time series relationship, it faces many challenges complex environments, such as color shift, light shadow changes, sampling angles. In order to improve the accuracy of studies have proposed skeleton-based methods that are not affected by background, but current framework does much...
In this paper, a novel parallel indirect visual odometry (VO) system is proposed based on newly designed map management method, key-frame selection, and camera pose correction model, where the speeded-up robust features (SURF) algorithm used to extract from an image, linear exhaustive search (LES) introduced match features. To minimize computation time, selection mechanism distinguish key frames among input images. Moreover, filter out unstable landmarks add for reliable estimation of...
Due to the need detect and track stolen criminal vehicles traffic monitoring, development of license plate recognition systems on intersection monitors system is very urgent for smart cities. Unlike traditional technology applied parking lots identify a single in lane, must multiple plates lanes. In addition, faces many challenges, including too small picture, unstable light sources, different shooting angles, blurred characters moving vehicles, complex road conditions, advertising signs,...