Rung-Ching Chen (陳榮靜); R.C. Chen
Rung-Ching Chen (陳榮靜); R.C. Chen
Chaoyang University of Technology
Email yang diverifikasi di - Beranda
Dikutip oleh
Dikutip oleh
Web page classification based on a support vector machine using a weighted vote schema
RC Chen, CH Hsieh
Expert Systems with Applications 31 (2), 427-435, 2006
A recommendation system based on domain ontology and SWRL for anti-diabetic drugs selection
RC Chen, YH Huang, CT Bau, SM Chen
Expert Systems with Applications 39 (4), 3995-4006, 2012
A novel passenger flow prediction model using deep learning methods
L Liu, RC Chen
Transportation Research Part C: Emerging Technologies 84, 74-91, 2017
Using rough set and support vector machine for network intrusion detection
RC Chen, KF Cheng, CF Hsieh
arXiv preprint arXiv:1004.0567, 2010
Segmenting handwritten Chinese characters based on heuristic merging of stroke bounding boxes and dynamic programming
LY Tseng, RC Chen
Pattern Recognition Letters 19 (10), 963-973, 1998
Merging domain ontologies based on the WordNet system and fuzzy formal concept analysis techniques
RC Chen, CT Bau, CJ Yeh
Applied Soft Computing 11 (2), 1908-1923, 2011
Partial and complete tear of the anterior cruciate ligament: Direct and indirect MR signs
WT Chen, TTF Shih, HY Tu, RC Chen, WY Shau
Acta Radiologica 43 (5), 511-516, 2002
Using rough set and support vector machine for network intrusion detection system
RC Chen, KF Cheng, YH Chen, CF Hsieh
2009 First Asian Conference on Intelligent Information and Database Systems …, 2009
A secure fragile watermarking scheme based on chaos-and-hamming code
CC Chang, KN Chen, CF Lee, LJ Liu
Journal of Systems and Software 84 (9), 1462-1470, 2011
Automatic License Plate Recognition via sliding-window darknet-YOLO deep learning
RC Chen
Image and Vision Computing 87, 47-56, 2019
An artificial bee colony algorithm for data collection path planning in sparse wireless sensor networks
WL Chang, D Zeng, RC Chen, S Guo
International Journal of Machine Learning and Cybernetics 6 (3), 375-383, 2015
Using recursive ART network to construction domain ontology based on term frequency and inverse document frequency
RC Chen, JY Liang, RH Pan
Expert systems with Applications 34 (1), 488-501, 2008
On the design of a key-lock-pair mechanism in information protection systems
CC Chang
BIT Numerical Mathematics 26 (4), 410-417, 1986
A fast algorithm for mining share-frequent itemsets
YC Li, JS Yeh, CC Chang
Asia-Pacific Web Conference, 417-428, 2005
Both color and gray scale secret images hiding in a color image
MH Lin, YC Hu, CC Chang
International Journal of Pattern Recognition and Artificial Intelligence 16 …, 2002
A high payload data embedding scheme using dual stego-images with reversibility
CC Chang, TC Lu, G Horng, YH Huang, YM Hsu
2013 9th International Conference on Information, Communications & Signal …, 2013
Hiding secret data adaptively in vector quantisation index tables
CC Chang, WC Wu
IEE Proceedings-Vision, Image and Signal Processing 153 (5), 589-597, 2006
An efficient multi-server password authenticated key agreement scheme using smart cards with access control
CC Chang, JY Kuo
19th International Conference on Advanced Information Networking and …, 2005
Efficient anonymous auction protocols with freewheeling bids
CC Chang, YF Chang
Computers & Security 22 (8), 728-734, 2003
Using set partitioning in hierarchical trees to authenticate digital images
P Tsai, YC Hu, CC Chang
Signal processing: Image communication 18 (9), 813-822, 2003
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20