Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation

    This article proposes a detection method to solve the problem of determining whether the audio data has been tampered with or not. In many situations, we need to authenticate audio data as an original or some ...

    Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao in Soft Computing as Transdisciplinary Scienc… (2005)

  2. No Access

    Chapter and Conference Paper

    A New Binary Classifier: Clustering-Launched Classification

    One of the powerful classifiers is Support Vector Machine (SVM), which has been successfully applied to many fields. Despite its remarkable achievement, SVM is time-consuming in many situations where the data ...

    Tung-Shou Chen, Chih-Chiang Lin, Yung-Hsing Chiu in Computational Intelligence (2006)

  3. No Access

    Chapter and Conference Paper

    A Study Using Genetic Algorithm and Support Vector Machine to Find Out How the Attitude of Training Personnel Affects the Performance of the Introduction of Taiwan TrainQuali System in an Enterprise

    After entering knowledge economy era, human resource has become one of the most important manufacturing elements of an enterprise, hence, human resource incubation has become one of the important jobs of enter...

    Tung-Shou Chen, Yih-Yeong Lin, Jeanne Chen in Information and Business Intelligence (2012)

  4. No Access

    Chapter and Conference Paper

    Using Sequential Pattern Mining to Analyze the Behavior on the WELS

    Sequential pattern mining is an important data-mining method for determining time-related behavior in sequence database. This study used the methods of Sequential Pattern Mining to design a system, which was t...

    Yi-Lin Wang, Ling-Yu Melody Wen, Tung-Shou Chen in Information and Business Intelligence (2012)

  5. No Access

    Chapter and Conference Paper

    Exploring Teachers’ Involvement by Using Fuzzy Theory

    With the improvement of the Internet bandwidth and techniques, e-learning environments have been more convenient than ever; they are beyond the limits of time and space, accessible at anytime and anywhere. Eve...

    Yi-Lin Wang, Ling-Yu Melody Wen, Rong-Chang Chen in Information and Business Intelligence (2012)

  6. No Access

    Chapter and Conference Paper

    Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flip**

    In this paper, we propose a reversible data hiding technique to improve Zhang and Hong et al.’s methods on cartoon images. Zhang and Hong et al. exploit the block complexity for data extraction and image recov...

    Wien Hong, Tung-Shou Chen, Jeanne Chen, Yu-Hsin Kao in Advances in Swarm Intelligence (2013)

  7. No Access

    Article

    Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness

    Although k-anonymity is a good way of publishing microdata for research purposes, it cannot resist several common attacks, such as attribute disclosure and the similarity attack. To resist these attacks, many ref...

    Rong Wang, Yan Zhu, Tung-Shou Chen in Journal of Computer Science and Technology (2018)

  8. No Access

    Chapter and Conference Paper

    An Egg Sorting System Combining Egg Recognition Model and Smart Egg Tray

    Modern agriculture is at the forefront of technological transformation. Smart agricultural technology and mechanical automation are bringing unprecedented opportunities and challenges to the field. This study ...

    Jung-An Liu, Wei-Ling Lin, Wei-Cheng Hong in Technologies and Applications of Artificia… (2024)