- Technology Adoption and User Behaviour
- Distributed Sensor Networks and Detection Algorithms
- Online and Blended Learning
- Digital Marketing and Social Media
- Knowledge Management and Sharing
- Innovation and Knowledge Management
- Complex Network Analysis Techniques
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Rough Sets and Fuzzy Logic
- Opinion Dynamics and Social Influence
- Advanced Statistical Process Monitoring
- Data Mining Algorithms and Applications
- Sentiment Analysis and Opinion Mining
- Privacy-Preserving Technologies in Data
- Stochastic Gradient Optimization Techniques
- Radar Systems and Signal Processing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos control and synchronization
- Advanced Database Systems and Queries
- Space Satellite Systems and Control
- Information Technology Governance and Strategy
- Topic Modeling
- Sparse and Compressive Sensing Techniques
- Speech and dialogue systems
Qingdao University of Science and Technology
2025
Qingdao University of Technology
2024-2025
National Penghu University of Science and Technology
2024
National Taitung University
2012-2024
Harbin Institute of Technology
2014-2023
National Kaohsiung University of Science and Technology
2020-2022
Lehigh University
2017-2022
META Health
2022
University of Science and Technology
2022
National Central University
2010-2020
Given a social graph, the problem of influence maximization is to determine set nodes that maximizes spread influences. While some recent research has studied maximization, these works are generally too time consuming for practical use in large-scale network. In this article, we develop new framework, community-based (CIM), tackle with an emphasis on efficiency issue. Our proposed CIM, comprises three phases: (i) community detection, (ii) candidate generation, and (iii) seed selection....
In our view, the most important characteristic of a fuzzy rule-based system is its readability, which seriously affected by, among other things, number features used to design rule base. Hence, for high-dimensional data, dimensionality reduction through feature selection (not extraction) very important. Our objective, here, not find an optimal base classification but select set useful that may solve problem. For this, we present integrated mechanism simultaneous extraction rules and...
Sequential pattern mining is an important subfield in data mining. Recently, applications using time interval-based event have attracted considerable efforts discovering patterns from events that persist for some duration. Since the relationship between two intervals intrinsically complex, how to effectively and efficiently mine sequences a challenging issue. In this paper, novel representations, endpoint representation endtime representation, are proposed simplify processing of complex...
We numerically investigated the chaos time delay signature (TDS) suppression and bandwidth enhancement by electrical heterodyning. Chaos signals generated with a semiconductor laser subject to optical feedback typically have distinct loop frequency peaks in their power spectra corresponding reciprocals of delays, which deteriorates performance applications including radar/lidar fast random bit generation. By electrically heterodyning signal single local oscillator, we show that spectrum can...
Features that have good predictive power for classes or output variables are useful features and hence most feature selection methods try to find them. However, since there may be high correlation nonlinear dependence between such features, we obtain a comparable performance even when use only few of those features. Thus, method should select with controlled redundancy. In this paper, propose novel learning imposes penalty on the dependent/correlated during system identification along...
Molecular orbital (MO) is one of the most fundamental concepts for molecules, relating to all branches chemistry, while scanning tunneling microscopy (STM) has been widely recognized its potential measure spatial distribution MOs. However, precise characterization MO with high resolution in real space a long-standing challenge owing inevitable interference high-angular-momentum contributions from functionalized tips STM. Here, leveraging advances artificial intelligence image recognition, we...
Connected autonomous vehicles (CAVs) face constraints from multiple traffic elements, such as the vehicle, road, and environmental factors. Accurately quantifying vehicle’s operational status driving risk level in complex scenarios is crucial for enhancing efficiency safety of connected driving. To continuously dynamically quantify risks faced by CAVs road environment—arising front, rear, lateral directions—this study focused s on self-driving particle characteristics that enable to perceive...
Most studies on sequential pattern mining are mainly focused time point-based event data. Few research efforts have elaborated patterns from interval-based However, in many real applications, usually persists for an interval of time. Since the relationships among intervals intrinsically complex, large database is really a challenging problem. In this paper, novel approach, named as incision strategy and new representation, called coincidence representation proposed to simplify processing...
A very large number of communications are typically required to solve distributed learning tasks, and this critically limits scalability convergence speed in wireless applications. In paper, we devise a <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">G</b> radient xmlns:xlink="http://www.w3.org/1999/xlink">D</b> escent method with xmlns:xlink="http://www.w3.org/1999/xlink">S</b> parsification xmlns:xlink="http://www.w3.org/1999/xlink">E</b>...
Based upon the expectation-confirmation theory (ECT), this study propose a theoretical model that examines impacts of critical antecedents on college student English learning satisfaction and continuance intention to stick with blended e-learning environment. The was validated using questionnaire survey 313 students. researchers applied partial least squares (PLS) method validate measurement properties proposed hypotheses research model. findings indicate that, in general, students are...
Multiple-input–multiple-output (MIMO) radar has received much attention in recent years for its great ability imaging. However, the essence of MIMO not been fully implemented due to lack proper transmission waveforms. In radar, waveform each channel be uncorrelated with one another avoid cross-interference between channels. To achieve this, we investigate generation multichannel chaos using electrical heterodyning (MIMO CRADAR) application. By electrically a seed source multiple...
The mining of closed sequential patterns has attracted researchers for its capability using compact results to preserve the same expressive power as conventional mining. However, existing studies only focus on time point-based data. Few research efforts have elaborated discovering from interval-based data, where each data persists a period time. Mining patterns, also called temporal is an arduous problem since pair wise relationships between two events are intrinsically complex. In this...
The semantic intimacy of relations in many real-world networks (e.g., social, biological, and communication networks) can be modeled by weighted edges which the more semantically intimate between nodes translate to smaller edge weights. Recently, problem community search that aims find cohesive groups containing a given set query has attracted great deal attention. However, bulk literature on assumes simple unweighted input graph, ignoring how have retrieved communities. discovered...
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, energy-efficient and small size cryptography algorithm implementation is critical problem. Hardware implementations advanced encryption standard (AES) for authentication are presented. An energy consumption variable derived to evaluate low-power design strategies battery-powered devices. It proves that compact AES architectures fail optimize hardware energy, whereas reducing...