Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Basket Booster for Prototype-based Contrastive Learning in Next Basket Recommendation

    Next basket recommendation seeks to model the correlation of items and mine users’ interests hidden in basket sequences, and tries to infer a set of items that tend to be adopted in the next session with the m...

    Ting-Ting Su, Zhen-Yu He, Man-Sheng Chen in Machine Learning and Knowledge Discovery i… (2023)

  2. No Access

    Chapter and Conference Paper

    Module Architecture of Docker Image and Container Security

    The security of Docker images has attracted a lot of attention recently, and the lack of content security checks on Docker images has led users to deploy vulnerable systems. In addition, malicious attackers ma...

    Guan-Yu Wang, Hung-Jui Ko, Min-Yi Tsai in New Trends in Computer Technologies and Ap… (2022)

  3. No Access

    Chapter and Conference Paper

    Improving Self-diet Management of Chronic Kidney Disease Patients Through Chatbots

    The purpose of this study is to focus on patients with chronic kidney disease mainly. Through technological services and education, the LINE APP platform is used to build a chatbot for intervention so that pat...

    Wang-Chin Tsai, Wen-Yi Li, Jen-Yu Tsai in Human Aspects of IT for the Aged Populatio… (2022)

  4. No Access

    Chapter and Conference Paper

    Research on Network Security Authentication Method Based on Data Mining Technology

    In order to solve the problems of low authentication accuracy, long authentication time and poor authentication security in traditional network security authentication methods, this paper uses data mining tech...

    **ao-gang Ma, Huan-yu Wang in IoT and Big Data Technologies for Health Care (2022)

  5. No Access

    Chapter and Conference Paper

    Automatic Summarization of Critical Threat Intelligence Using Transfer Learning

    The advancement of hacking techniques has extended the sophistication of cyberattacks. Facing evolving cyberattacks, security officers need to acquire information about cyberattacks to gain visibility into the...

    Chia-Mei Chen, Yu-Xuan Wang, Zheng- Xun Cai in New Trends in Computer Technologies and Ap… (2022)

  6. No Access

    Chapter and Conference Paper

    Data Transmission Reliability Detection of Hybrid Information System Based on Smart Contract

    There is a large amount of data in the information system, but the calculation process of the data transmission reliability detection method of the previous manual detection system is complex, and it is diffic...

    Huan-yu Wang, **ao-gang Ma in IoT and Big Data Technologies for Health Care (2022)

  7. No Access

    Chapter and Conference Paper

    Difficulty-Aware Mixup for Replay-based Continual Learning

    Deep neural networks suffer from the issue of catastrophic forgetting in the scenario of continual learning, causing a sudden deterioration in performance when training on new tasks. Replay-based methods, whic...

    Yu-Kai Ling, Ren Chieh Yang, Sheng-De Wang in New Trends in Computer Technologies and Ap… (2022)

  8. No Access

    Chapter and Conference Paper

    Spatial-Temporal Graph Neural Network Framework with Multi-source Local and Global Information Fusion for Traffic Flow Forecasting

    As the increasing population is causing a large amount of traffic congestion nowadays, accurate traffic flow forecasting (TFF) has become increasingly significant for smart cities. While some recurrent neural ...

    Yue-**n Li, Jian-Yu Li, Zi-Jia Wang in Computer Supported Cooperative Work and So… (2022)

  9. No Access

    Chapter and Conference Paper

    Leveraging Auxiliary Information from EMR for Weakly Supervised Pulmonary Nodule Detection

    Pulmonary nodule detection from lung computed tomography (CT) scans has been an active clinical research direction, benefiting the early diagnosis of lung cancer related disease. However, state-of-the-art deep...

    Hao-Hsiang Yang, Fu-En Wang, Cheng Sun in Medical Image Computing and Computer Assis… (2021)

  10. No Access

    Chapter and Conference Paper

    Multi-hop Learning Promote Cooperation in Multi-agent Systems

    The behavior of individuals maximizing their own benefits in some systems leads to decline of system performance. A challenge remains to promote and maintain cooperation between selfish individuals in multi-ag...

    **ngyu Liu, Runyu Guan, Tao Wang, Le Han in Knowledge Science, Engineering and Managem… (2021)

  11. No Access

    Chapter and Conference Paper

    Research into Performance Evaluation with the Application of DEA–A Case Study of Automobile Dealer

    The Data Envelopment Analysis, DEA was adopted in this study to explore the relative operational efficiency of the 17 automobile dealers in Kaoshuing. In terms of factor selection criteria, the four input fact...

    Jui-Chan Huang, Tzu-Jung Wu, Yan-Yu Wang in International Conference on Applications a… (2020)

  12. No Access

    Chapter and Conference Paper

    Indoor Navigation Based on a Gait Recognition and Counting Scheme

    GPS satellite positioning is currently a system used by people for navigation. As urban buildings become larger and their internal usages more diverse, the internal structure of the buildings turns into comple...

    Tin Chang, Tzu-Hsuan Chung, En-Wei Lin in New Trends in Computer Technologies and Ap… (2019)

  13. No Access

    Chapter and Conference Paper

    Micro Physiological Vibration Detection for Human Heartbeats

    The purpose of this investigation is to verify the accuracy and stability of a novel detection scheme based on pulsation micro-vibration signals. Different from traditional heart rate measurement, this scheme ...

    Wen-Fong Wang, Ying-Peng Huang in Recent Advances in Intelligent Information… (2019)

  14. No Access

    Chapter and Conference Paper

    Two-Dimensional TRUS Image and Three-Dimensional MRI Prostate Image Fusion System

    In the diagnosis of prostate disease, urologists examine the presence of fibrosis or tumors in the prostate tissue of patients by magnetic resonance imaging (MRI) and transrectal ultrasonography (TRUS). In gen...

    Chuan-Yu Chang, Chih-An Wang, Yuh-Shyan Tsai in New Trends in Computer Technologies and Ap… (2019)

  15. No Access

    Chapter and Conference Paper

    The Impact of the Observation Period for Detecting P2P Botnets on the Real Traffic Using BotCluster

    In recent years, many studies on peer-to-peer (P2P) botnet detection have exhibited the excellent detection precision on synthetic logs collected from the testbed. However, most of them do not evaluate their ...

    Chun-Yu Wang, Jia-Hong Yap, Kuan-Chung Chen in New Trends in Computer Technologies and Ap… (2019)

  16. No Access

    Chapter and Conference Paper

    A Secure User Authenticated Scheme in Intelligent Manufacturing System

    In recently years, intelligent manufacturing system is getting gr...

    Ming-Te Chen, Hao-Yu Liu, Chien-Hung Lai in New Trends in Computer Technologies and Ap… (2019)

  17. No Access

    Chapter and Conference Paper

    Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data

    With the development of information technology, the amount of data generated by people are increasing and accumulating at an unprecedented rate. For huge amounts of data and complex data structures, there are...

    Yan-Yu Duan, Xu An Wang, Fang Li in Complex, Intelligent, and Software Intensi… (2019)

  18. No Access

    Chapter and Conference Paper

    Investigating the 3D Local Myocytes Arrangement in the Human LV Mid-Wall with the Transverse Angle

    Myolaminar Layer Arrangement plays an essential role in cardiac biomechanics. In this preliminary study, we investigate the local 3D arrangement of the myocytes inside the sheets (layers) in three LV human he...

    Shunli Wang, Iulia Mirea, François Varray in Functional Imaging and Modeling of the Hea… (2019)

  19. No Access

    Chapter and Conference Paper

    Recognition and Counting of Motorcycles by Fusing Support Vector Machine and Deep Learning

    In recent years, rapid growth of motorcycles enables a large number of traffic accidents. Hence, how to manage the traffic flow has been a hot topic. In this paper, we propose a method for recognizing and coun...

    Tzung-Pei Hong, Yu-Chiao Yang, Ja-Hwung Su in New Trends in Computer Technologies and Ap… (2019)

  20. No Access

    Chapter and Conference Paper

    Exploration on the Design of Sport Prescription and the Behavior of College Students

    The results of this study show the college students’ personal test records, which the average index of college students’ cardiorespiratory strength (3 min) is 29.32, the average index of muscle fitness (1 min ...

    Li Yu-Chiang, Jun-Yi Lin, Wen-Fong Wang in New Trends in Computer Technologies and Ap… (2019)

previous disabled Page of 3