- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Advanced Steganography and Watermarking Techniques
- Cloud Data Security Solutions
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Hepatocellular Carcinoma Treatment and Prognosis
- Access Control and Trust
- Network Security and Intrusion Detection
- Advanced Chemical Sensor Technologies
- Coding theory and cryptography
- Advanced Malware Detection Techniques
- Colorectal Cancer Screening and Detection
- Traumatic Brain Injury Research
- Hearing Impairment and Communication
- User Authentication and Security Systems
- Stroke Rehabilitation and Recovery
- Advanced Data Compression Techniques
- Cerebral Palsy and Movement Disorders
- Ear Surgery and Otitis Media
- Dental Health and Care Utilization
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Olfactory and Sensory Function Studies
- Spatial Cognition and Navigation
Kaohsiung Medical University
2011-2024
Ministry of Health and Welfare
2012-2024
Kaohsiung Medical University Chung-Ho Memorial Hospital
2020-2022
Government of Western Australia Department of Health
2020
National Cheng Kung University
2008
National Yang Ming Chiao Tung University
2005-2006
Aroma and taste have long been considered important indicators of quality coffee. Specialty coffee, that is, coffee from a single estate, farm, or village in coffee-growing region, particular, has unique aroma reflects the coffee-producing region. In order to enable traceability origin, this study we developed an e-nose system discriminate freshly roasted different production regions. case study, employed experiment with various machine learning models for recognizing several collected beans...
Object The authors sought to analyze trends in hospital resource utilization and mortality rates a population of patients who had received traumatic brain injury (TBI) surgery. Methods This nationwide population-based cohort study retrospectively analyzed 18,286 surgical treatment for TBI between 1998 2010. multiple linear regression model Cox proportional hazards were used multivariate assessment outcome predictors. Results prevalence rate with gradually but significantly (p < 0.001)...
This study analyzed meteorological, clinical and economic factors in terms of their effects on monthly ED revenue visitor volume. Monthly data from January 1, 2005 to September 30, 2009 were analyzed. Spearman correlation cross‐correlation analyses performed identify the between each independent variable, revenue, Autoregressive integrated moving average (ARIMA) model was used quantify relationship The accuracies evaluated by comparing forecasts actual values with mean absolute percentage...
Due to users' network flow requirement and usage amount nowadays, TCP/IP networks may face various problems. For one, users of video services access simultaneously the same content, which leads host incurring extra costs. Second, although nearby nodes have file that a user wants access, cannot directly verify itself. This issue will lead connect remote rather than causes traffic greatly increase. Therefore, named data (NDN), is based on itself, was brought about deal with aforementioned In...
Herpes simplex virus type 1 (HSV-1) infection is the most common cause of sporadic, fatal encephalitis, but current understanding how interacts with cellular factors to regulate disease progression limited. Here, we show that HSV-1 induced expression transcription factor early growth response (Egr-1) in a human neuronal cell line. Egr-1 increased viral replication by activating promoters productive cycle genes through binding its corresponding sequences promoters. Mouse studies confirmed was...
Random numbers are very useful in simulation, chaos theory, game information pattern recognition, probability quantum mechanics, statistics, and statistical mechanics. The random especially helpful cryptography. In this work, the proposed number generators come from white noise of audio video (A/V) sources which extracted high-resolution IPCAM, WEBCAM, MPEG-1 files. generator applied on IPCAM WEBCAM with microphone would be true pseudorandom when file. addition, applying NIST SP 800-22...
Diabetes threatens population health, especially in rural areas. and periodontal diseases have a bidirectional relationship. A persistence of rural-urban disparities diabetes may indicate difference disease among patients with diabetes; however, the evidence is lacking. This retrospective study aimed to investigate discrepancies incidence treatment intensity who were newly diagnosed type 2 year 2010.The present was cohort design, two samples: those further disease. The data sources included...
DSA and ECDSA are two standard signatures, which have been fully discussed well accepted. However, they both lack functionality of proxy signature. On the other hand, most signature schemes, proposed prior to this date, seldom based on signatures. Consequently, schemes considered infeasible due obvious security weaknesses. In work, we propose a proxy-protected scheme satisfy basic properties partial delegation described by Mambo et al. as strong defined Lee Moreover, an example practical...
In this work, a qualified audio random number generator that could be used in voice communication is presented. The needs only microphone or common equipment such as cellular phone laptop, to generate sequences. When applying NIST SP 800-22rev1a (published April, 2010) 15 statistical tests on the generator, around 80% generating sequences will qualified. filter no matter generated from Crosstalk cartoon sources, rate against rise up 99%. Furthermore, an encryption application assure...
Cloud computing is increasingly popular today. services such as data-outsourcing provide a growing number of users access to cloud storage for large quantities data, and enterprises are turning cost-effective remote backup. In 2011, DEPSKY shows overcomes four limitations hinder the effectiveness storage: loss availability, corruption privacy, vendor lock-in. Unfortunately, lacks an error detection mechanism comes with heavy costs. Therefore, we propose new scheme overcoming not only...
Although digital medical imaging can improve diagnostic accuracy, efficient data man- agement and protection of patient privacy are major concerns. For example, an inadvertently modified image or a disordered series images such as successive beating heart may result in misdiagnosis. The optimal use should timely detection events while minimizing misdiagnoses pro- tecting privacy. Improved abnormal would also the safety care delivery models. We watermarking technique to embed im- portable...
This prospective longitudinal cohort study analyzed long-term changes in individual subscales of quality-of-life (QOL) measures and explored whether these were related to effective QOL predictors after hepatocellular carcinoma (HCC) surgery. All 520 HCC patients this had completed surveys before surgery at 6 months, 2 years, 5 years Generalized estimating equation models used compare the 5-year among three surgical procedures. The was significantly (p < 0.05) improved months but plateaued...
Asymmetric watermarking schemes have been widely discussed recently. Transformed-key asymmetric (TKAW) system is one of the schemes, which was proposed by Choi et al. This letter discusses weaknesses TKAW. In TKAW, inner product received signal and public key almost equals to zero. As a result, it cannot resist projection attack. To prove this point, we will demonstrate how find most relevant unwatermarked y/spl tilde/ for given watermark embedded y that /spl par/y-y/spl par//spl les/|/spl...
“Smart medical” applications refer to the fusion of technology and medicine that connects all linked sensor equipment with patients, including those measure physiological signals, such as blood pressure, pulse, ECG. In addition, these signal data are highly private should be safely protected. It takes much longer complete authentication processes in traditional way, either based on public key infrastructure or attribute-based encryption, which is a burden for IoT devices. Hence, basis we...
Random number generators play a very import role in modern cryptography, especially personal information security. For example, to generate random from white noise of webcam is new approach for device. Through our algorithms, 91% IPcam generating sequences pass at least four statistical tests, 87% all five ones has been approved. Compared with and video respectively, on the contrary, possibility both tests roughly 80%. The result implies improvement by algorithm devices such as laptop,...
Based on the clinic data, 69 % - 80 stroke patients in Taiwan have muscle weakness symptom of upper limb. Stroke are able to restore their independent living if they keep formal rehabilitation without interruption. However, due tedious and painful process, may pause or suspend therapy. Moreover, physiatrists hospitals must take care more than one patient at same time. This paper is motivated propose a motor assessment system for upper-limb rehabilitation. Our implementation integrated with...
Random number plays a central role in statistics sampling, probability, gambling, cryptography, and everything with unpredictability. In general, the random real numbers are generated from sequence of binary numbers. We will propose pseudo generator that generates random-like first then extracts specific bit every as value. The is produced by divergence scaling function wavelet theorem. This determined its coefficients very sensitive to these coefficients. Hence, it suitable practice cryptography.
Abstract Whether cervical spondylosis (CS) is a risk factor for sudden sensorineural hearing loss (SSNHL) remains unclear. This study used national population-based data to investigate the of SSNHL in patients with CS Taiwan different ages and sexes. covering 2 million people Taiwan, which were obtained from National Health Insurance Research Database. The that support findings this are available Database but restrictions apply availability these data, under license current study, so not...
Specialty coffee beans have a unique aroma and flavor. The aromas of in the world are affected by several issues, including growing area, climate, postharvest processing (such as dry wet methods), roasting treatment, etc. These issues significantly contribute to development coffee-bean aromas. Since humans limited ability recognize coffee, we need reliable system resolve method characterizing world's aroma. Therefore, this article, proposed an incremental learning for digitizing complexity...
Abstract Wang et al have found a family of collisions in MD5. They reported their method to find collision efficiently SHA, and also SHA-1 within 269 hash steps February 2005. In fact, we can still discover the decay phenomenon with application message schedule’s judgment proposed this work when inspection how generates schedule actually. Therefore, would like introduce two corrections enhance security SHA-1.
Realistic drawing ability is a fundamental human trait. However, the cognitive constituents of this are poorly understood. This study aims to evaluate contribution Two-dimensional (2D) positioning skills in performance realistic drawing. 2D refers an important observation technique employed by artists locate correct position object its representation on blank canvas. Two different types techniques considered: absolute (using canvas boundaries as reference) and relative already-drawn...