Yu CHENG


Sandbank and Oyster Farm Monitoring with Multi-Temporal Polarimetric SAR Data Using Four-Component Scattering Power Decomposition
Tzu-Yu CHENG Yoshio YAMAGUCHI Kun-Shan CHEN Jong-Sen LEE Yi CUI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/10/01
Vol. E96-B  No. 10  pp. 2573-2579
Type of Manuscript:  Special Section PAPER (Special Section on Recent Progress in Antennas and Propagation in Conjunction with Main Topics of ISAP2012)
Category: Sensing
Keyword: 
four-component decompositionpolarimetric synthetic aperture radar (Pol-SAR)radar polarimetrycoherency matrix
 Summary | Full Text:PDF(4.4MB)

Development and Evaluation of a Wide Range Impulse Current Generator for Surge Arrester Testing
Kuo-Hsiung TSENG Ching-Lin HUANG Pei-Yu CHENG Zih-Ciao WEI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3  pp. 713-720
Type of Manuscript:  PAPER
Category: Measurement Technology
Keyword: 
metal oxide varistormaximum continuous operation voltageclamping voltageresidual voltage
 Summary | Full Text:PDF(2.7MB)

Identification of Quasi-ARX Neurofuzzy Model with an SVR and GA Approach
Yu CHENG Lan WANG Jinglu HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/05/01
Vol. E95-A  No. 5  pp. 876-883
Type of Manuscript:  PAPER
Category: Systems and Control
Keyword: 
quasi-ARX neurofuzzy networkssupport vector regressiongenetic algorithminput selection
 Summary | Full Text:PDF(1.1MB)

Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection
Yu CHENG Anguo MA Minxuan ZHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1  pp. 56-66
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Trust
Keyword: 
architectural vulnerability factor (AVF)AVF modeling and predictionAVF-aware protectioncost-efficientL2 cache
 Summary | Full Text:PDF(1.1MB)