Tsung‐Chih Hsiao

ORCID: 0000-0003-1859-2860
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Teaching and Learning Programming
  • Human Pose and Action Recognition
  • Chaos-based Image/Signal Encryption
  • Virtual Reality Applications and Impacts
  • Video Surveillance and Tracking Methods
  • Digital Media and Visual Art
  • Cloud Data Security Solutions
  • Innovative Educational Techniques
  • Advanced Steganography and Watermarking Techniques
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Advanced Authentication Protocols Security
  • Anomaly Detection Techniques and Applications
  • Simulation and Modeling Applications
  • Educational Research and Pedagogy
  • Cryptography and Residue Arithmetic
  • Hand Gesture Recognition Systems
  • Conservation Techniques and Studies
  • Neural Networks and Applications
  • Blockchain Technology Applications and Security
  • Risk and Safety Analysis
  • Digital Rights Management and Security
  • RFID technology advancements
  • Access Control and Trust

Huaqiao University
2014-2023

Southeast University
2018-2023

Health First
2022

National Chung Hsing University
2011-2012

National Cheng Kung University
2007

Dayeh University
2004

Promoting learning passion for students in higher education is a vital and challenging issue. Due to the swift changes society technology development, many convenient interesting technologies increasingly interfere with students’ performances reduce motivation attending classes. For example, mobile games social networking have led lose their learning. MAPS (Mind Mapping, Asking Questions, Presentation, Scaffolding Instruction) flipped teaching model which has been proved as an effective...

10.3390/su12114489 article EN Sustainability 2020-06-01

Modern education attaches great importance to interdisciplinary skills, among which computational thinking is a core element, and heralds new era. IT application has shaped in the 21st century. Computational provided further impetus for building an all-encompassing social network fostering DIY culture enabled by digital technologies. One empirical study used four apps test children's development fluency. The article will help students overcome their fears of coding. Peer reviews provide with...

10.3389/fpsyg.2022.911417 article EN cc-by Frontiers in Psychology 2022-09-13

In this paper, we propose an integrated action classification and regression learning framework for the fine-grained human quality assessment of RGB videos. On basis 2D skeleton data obtained per frame video sequences, present effective representation joint trajectories to train classifiers a class-specific model actions. To manage challenge view changes due camera motion, develop self-similarity feature descriptor extracted from displacement sequence represent dynamic patterns movement...

10.3390/electronics9040568 article EN Electronics 2020-03-28

For the low efficiency of traditional visual inspection and diagnosis method for cassava leaf disease detection by agricultural experts, this paper proposes an image classification based on residual network (ResNet). Based model, idea attention mechanism is applied to which makes feature extraction area focus disease.

10.1109/ecbios51820.2021.9510414 article EN 2021-05-28

This paper offers a hybrid technique combined by artificial neural networks (ANN) and self-organizing map (SOM) as way to explore factor knowledge. ANN SOM are two kinds of pattern classification techniques based on supervised unsupervised mechanisms, respectively. proposes new aspect combine NNSOM process in order delve into knowledge other than classification. The experimental material is conducted the investigation street night market Taiwan. can yield results about knowledge: first,...

10.1155/2015/412418 article EN International Journal of Distributed Sensor Networks 2015-01-01

The risk of insufficient petroleum resources has forced human beings to emphasize the acquisition and storage energy. To avoid such situation, this study tends explore effective management lead-acid batteries for utilization conforming industrial requirements.

10.1155/2014/910820 article EN cc-by Mathematical Problems in Engineering 2014-01-01

Liben Building, constructed in 1822 AD, is located Xinnan Village, Hukeng Town, Yongding District, Longyan City, Fujian Province, China. This square earthen building covers an area of about 2100 metres. In 1931 the was sacked and burned down by bandits during a war, leaving behind only remnants walls main building. meta-universe environment, firstly, this study adopted blockchain DAO technology to conduct on digital collection, storage, processing, display dissemination revealing problems...

10.1049/tje2.12213 article EN cc-by-nc-nd The Journal of Engineering 2022-11-16

The mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that host sent members of a large system. This article proposes use function defined by Lagrange polynomial compute decryption key. Each will be given key access confidential document inputting secret into interpolation which generated from interpolation. Since tasks are done agent, whole process performed within short period because there no physical connection between end...

10.1177/1550147718790892 article EN cc-by International Journal of Distributed Sensor Networks 2018-07-01

The majority of methods for recognizing human actions are based on single-view video or multi-camera data. In this paper, we propose a novel multi-surface analysis strategy. can be expressed as three-surface motion feature (3SMF) and spatio-temporal interest feature. 3SMF is extracted from the history image in three different surfaces: horizontal-vertical, horizontal- vertical-time surface. contrast to several previous studies, prior probability estimated by rather than using uniform...

10.1186/s40064-016-2876-z article EN SpringerPlus 2016-08-02

At present, the Sudoku matrix, turtle shell and octagonal matrix have been put forward according to magic matrix-based data hiding methods. Moreover, matrices be designed depend on size of embedding capacity. In addition, by determining classification points pixel pairs after applying a traversal area, average peak signal-to-noise ratio (PSNR) can improved. Therefore, this topic intends propose method based 16 × using extending it double-layer matrix. Low-cost methods are also studied, in...

10.3390/sym13030387 article EN Symmetry 2021-02-27

The deeper the combination of art and technology, more extensive cooperation between artists technologists. In many cases, creation New Media Art requires However, since is an emerging form, process cocreating two at exploration stage. Especially in areas with underdeveloped there exist problems two, such as a lack complete understanding factors involved reasonable planning for process. Therefore, this study analyzes that affect collaboration creating Art. Common are collected from...

10.3390/su12198049 article EN Sustainability 2020-09-29

Scenic vistas of Quanzhou are displayed in a 720° perspective as an immersive live 3D display to provide real digitalized virtual reality experience.In this paper, we report our research on simulating and exploring the extensive scenery Maritime Silk Route support cultural tourism.Users can access "Maritime Route" applet their mobile phone by approaching sensor or scanning QR code.

10.18494/sam.2021.3049 article EN cc-by Sensors and Materials 2021-02-25

By participating in IELTS teaching practice, it is found that limited vocabulary the main cause of English learning disabilities. Students often overlook importance word memory and lack proper ways to memorize words their practical learning. Also, many current memorizing software are interest. referring experiments on various apps, articles documents relevant Ebbinghaus curve, this study combines traditional method with complemented by games. Try overcome difficulties produce game optimizing...

10.1109/icasi.2016.7539762 article EN 2016-05-01

Globalization of the Internet has boosted electronic information exchange on both personal and business levels. The popularity turned communication secure transactions, which require verification digital signatures identities, into a hot issue. Most existing signature schemes are based public key system RSA ElGamal. Security thus depends solving factorization discrete logarithm. However, encryption-decryption is too large authentication ElGamal takes long, making this method unsuitable for...

10.1109/tencon.2004.1414519 article EN 2004-01-01

In this paper, we propose a new mechanism to improve the disadvantage of security proposed by scholar and then fulfill demands Internet Things (IoT) go through decentralized environment access control functions.We also date-constrained hierarchical key management scheme for mobile agents.With elliptic curve cryptosystems (ECCs) discrete logarithms, is flexible.Moreover, duration each class restricted with certain authorized time period.We demonstrate mathematical derivation arguments our...

10.18494/sam.2019.2085 article EN cc-by Sensors and Materials 2019-02-07

The study builds a cloud platform of smart home power management using the Internet Things (IoTs) sensor technology. Taking advantage IoTs technology and convenience mobile phone, this can facilitate users to manage household related electric appliances services provide better suggestion for settings based on users' behaviors habits.

10.1109/ecbios.2019.8807872 article EN 2019-05-01

In recent years, the average life expectancy of people is extended and total fertility rate dropped, bring our country into an aged society. Due to this phenomenon, how provide patients with chronic diseases a suitable environment health care has become critical issue currently. Therefore, we propose new scheme that applies within wireless sensor networks in which nodes can measure vital signs patients. The for blood pressure, pulsation, body temperature measured by would be transmitted...

10.1109/waina.2012.205 article EN 2012-03-01

With the growth of Virtual Reality (VR) and Augmented (AR) in technologies such as artificial intelligence, wireless, 5G, big data, massive compute, industrial 4.0 virtual stores. An improved secure mechanism which was previously still existed some shortcomings, presented this paper. Another new regards to achieve decentralized environment access control is introduced attain needs non-specific internet. Furthermore, it very important look attentively administrative previleges VR/AR clouds....

10.1109/iceta.2018.8572099 article EN 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA) 2018-11-01

Virtual reality and augmented technologies have been applied to scientific research for many years the achievements are remarkable. Although application area of mixed is relatively narrow comparing first two applications, we initially seen results. However, in fact, these can be film television creation far more than that. I then illustrate some other aspects which realistic contents also future influence on industry.

10.1109/ecbios50299.2020.9203607 article EN 2020-05-01
Coming Soon ...