Match!
Wei-Ho Chung
National Tsing Hua University
Communication channelMIMOComputer networkComputer scienceReal-time computing
178Publications
19H-index
1,299Citations
What is this?
Publications 179
Newest
Abstract The Kelly criterion can be used to maximize returns in a game with win rate p and odds b; however, optimization theoretically requires wagering over an infinite number of time steps. Despite the fact that Kelly's theory has been extended to most of the trading strategies used in financial markets, there is still a large gap between the theoretical determination of optimal bidding fractions and practical application of these methods. In this paper, we illustrate the difference between th...
Source
Last. Yeong-Luh UengH-Index: 13
view all 4 authors...
Source
#1Wei-Ho Chung (NTHU: National Tsing Hua University)H-Index: 19
#2Mu-En Wu (NTUT: National Taipei University of Technology)H-Index: 8
Last. Yu-Hsuan Su (CIT: Center for Information Technology)
view all 4 authors...
Abstract Verifying a seal imprint to authenticate the identity is a general and important task in financial industries. The seal imprint attached to a document is often used as a form of authenticity. Therefore, in financial applications, it is often necessary to recognize whether a seal is genuine or forged. In order to simplify the verification, we propose an effective method based on regression analysis to approximate the imprint borders, and use the geometric transformation to adjust the per...
Source
#2Yeong-Luh UengH-Index: 13
Last. Wei-Ho ChungH-Index: 19
view all 3 authors...
In Asian countries, seals are widely used for authenticating the identity of a person or an organization. Therefore, the ability to efficiently verify whether a seal is either genuine or forged is important. Both rectangular and circular seal imprints are considered in this work. Geometric transformation is performed to align the perspective of the detected imprint image with the reference imprint. After the edge-differences between the reference image and the detected image are computed, a dist...
1 CitationsSource
Sep 1, 2019 in VTC (Vehicular Technology Conference)
#1Chia-Hung Lin (NCTU: National Chiao Tung University)H-Index: 1
#2Yu-Chien Lin (NCTU: National Chiao Tung University)
Last. Heikki HuttunenH-Index: 15
view all 6 authors...
The well-known cell-averaging constant false alarm rate (CA-CFAR) scheme and its variants suffer from masking effect in multi-target scenarios. Although order-statistic CFAR (OS-CFAR) scheme performs well in such scenarios, it is compromised with high computational complexity. To handle masking effects with a lower computational cost, in this paper, we propose a deep-learning based CFAR (DL- CFAR) scheme. DL-CFAR is the first attempt to improve the noise estimation process in CFAR based on deep ...
Source
#1Te-Chuan Chiu (NTU: National Taiwan University)H-Index: 6
#2Ai-Chun Pang (NTU: National Taiwan University)H-Index: 23
Last. Junshan Zhang (ASU: Arizona State University)H-Index: 1
view all 4 authors...
Fog computing, evolves from the cloud and migrates the computing to the edge, is a promising solution to meet the increasing demand for ultra-low latency services in wireless networks. Via the forward-looking perspective, we advocate a {Fog\, Radio\, Access}ogRadioAccess {Network\, (F\hbox{-}RAN)}etwork(F-RAN) model, which leverages the existing infrastructure such as small cells with limited computing power, to achieve the ultra-low latency by joint edge computing and near-range communica...
Source
#1Hwei-Ming Chung (SUTD: Singapore University of Technology and Design)H-Index: 2
#2Wen-Tai Li (SUTD: Singapore University of Technology and Design)H-Index: 6
Last. Chao-Kai Wen (NSYSU: National Sun Yat-sen University)H-Index: 23
view all 6 authors...
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not rectified in a timely manner. These attacks, which are traditionally classified into physical and cyber attacks , can be avoided by using the latest advanced detection mechanisms. However, a new threat called cyber-physical attacks jointly targets both the physical and cyber layers of the system to interfere with the operations of the power grid is more malicious than traditional attacks. In this ...
3 CitationsSource
May 1, 2019 in ICASSP (International Conference on Acoustics, Speech, and Signal Processing)
#1Yu-Chen Su (NTHU: National Tsing Hua University)
#2Yeong-Luh Ueng (NTHU: National Tsing Hua University)H-Index: 13
Last. Wei-Ho Chung (NTHU: National Tsing Hua University)H-Index: 19
view all 3 authors...
In Asian countries, seals are widely used for authenticating the identity of a person or organization. Therefore, the ability to efficiently verify whether a seal is either genuine or forged is important. We propose an effective method of verification based on Hough transformation to approximate the imprint borders and the four vertexes, and use geometric transformation to align the perspective of the detected imprint image with the genuine imprint. After the edge-difference images between the o...
Source
#1Yu-Fei Lin (NTHU: National Tsing Hua University)
#2Yeong-Luh Ueng (NTHU: National Tsing Hua University)H-Index: 13
Last. Tzu-Ming Huang (NTHU: National Tsing Hua University)
view all 4 authors...
By knowing the future price range, which is the difference between the closing price and the opening price, we can calculate the long or short positions in advance. This paper presents a Recurrent Neural Network (RNN) based approach to forecast the price range. Compared to other methods based on machine learning, our method puts greater focus on the characteristics of the stock data, such as the zero-crossing rate (ZCR), which represents the ratio where the sign of the data changes within a time...
Source
#1Mu-En Wu (NTUT: National Taipei University of Technology)H-Index: 8
#2Wei-Ho Chung (NTHU: National Tsing Hua University)H-Index: 19
Last. Chia-Jung Lee (Soochow University (Taiwan))H-Index: 2
view all 3 authors...
We analyze the return of a game for a gambler after bidding \( T \) time steps. Consider a gamble with known odds and win rate, the optimal solution is to use Kelly criterion which determines the optimal fraction in each bidding step. In this paper we show that the logarithm of return when bidding optimal fraction is \( {\text{KL}}\left( {{\text{R}}||{\text{P}}(b)} \right) - {\text{KL}}\left( {{\text{R}}||{\text{P}}} \right) \), where \( {\text{R}} \) is the proportion of winning\losing outcome ...
Source
12345678910