Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Progressive Image Transmission Scheme Based on Block Truncation Coding

    In this paper, a new progressive image transmission (PIT) method is presented. The proposed method is derived from block truncation coding (BTC), which is a simple and fast image compression method in the spatial...

    Chin-Chen Chang, Hsien-Chu Hsia in The Human Society and the Internet Interne… (2001)

  2. No Access

    Chapter and Conference Paper

    A New Improvement of JPEG Progressive Image Transmission Using Weight Table of Quantized DCT Coefficient Bits

    Traditional JPEG progressive transmission transmits quantized DCT coefficients one by one, and does not consider the importance among the bits in each transmission stage. Thus the reconstructed image quality a...

    Tung-Shou Chen, Chen-Yi Lin in Advances in Multimedia Information Processing — PCM 2002 (2002)

  3. No Access

    Chapter and Conference Paper

    A Research to Increase Users’ Satisfaction and Loyalty Based on the Customer Satisfaction Index: A Case Study on the National Taichung Institute of Technology’s Library

    A good library can make significant contributions to library users. These users are likely to return to the library again and again where service is excellent and materials are accessible easily. The research ...

    Tung-Shou Chen, Rong-Chang Chen in Digital Libraries: International Collabora… (2005)

  4. No Access

    Chapter and Conference Paper

    A Study Using Genetic Algorithm and Support Vector Machine to Find Out How the Attitude of Training Personnel Affects the Performance of the Introduction of Taiwan TrainQuali System in an Enterprise

    After entering knowledge economy era, human resource has become one of the most important manufacturing elements of an enterprise, hence, human resource incubation has become one of the important jobs of enter...

    Tung-Shou Chen, Yih-Yeong Lin, Jeanne Chen in Information and Business Intelligence (2012)

  5. No Access

    Chapter and Conference Paper

    Using Sequential Pattern Mining to Analyze the Behavior on the WELS

    Sequential pattern mining is an important data-mining method for determining time-related behavior in sequence database. This study used the methods of Sequential Pattern Mining to design a system, which was t...

    Yi-Lin Wang, Ling-Yu Melody Wen, Tung-Shou Chen in Information and Business Intelligence (2012)

  6. No Access

    Chapter and Conference Paper

    Exploring Teachers’ Involvement by Using Fuzzy Theory

    With the improvement of the Internet bandwidth and techniques, e-learning environments have been more convenient than ever; they are beyond the limits of time and space, accessible at anytime and anywhere. Eve...

    Yi-Lin Wang, Ling-Yu Melody Wen, Rong-Chang Chen in Information and Business Intelligence (2012)

  7. No Access

    Chapter and Conference Paper

    Reversible Data Hiding in Partially-Encrypted Images

    This paper presents a novel reversible data hiding method for medical images with privacy protection in only partial of the image areas. Specifically, only those areas with privacy protection requirement are e...

    Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen in Cloud Computing and Security (2018)

  8. No Access

    Article

    Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness

    Although k-anonymity is a good way of publishing microdata for research purposes, it cannot resist several common attacks, such as attribute disclosure and the similarity attack. To resist these attacks, many ref...

    Rong Wang, Yan Zhu, Tung-Shou Chen in Journal of Computer Science and Technology (2018)