Search Results - "Chin-Shiuh Shieh"
-
1
Using deep learning models to analyze the cerebral edema complication caused by radiotherapy in patients with intracranial tumor
Published in Scientific reports (28-01-2022)“…Using deep learning models to analyze patients with intracranial tumors, to study the image segmentation and standard results by clinical depiction…”
Get full text
Journal Article -
2
Detection of Unknown DDoS Attack Using Convolutional Neural Networks Featuring Geometrical Metric
Published in Mathematics (Basel) (01-05-2023)“…DDoS attacks remain a persistent cybersecurity threat, blocking services to legitimate users and causing significant damage to reputation, finances, and…”
Get full text
Journal Article -
3
A Parallel Compact Gannet Optimization Algorithm for Solving Engineering Optimization Problems
Published in Mathematics (Basel) (01-01-2023)“…The Gannet Optimization Algorithm (GOA) has good performance, but there is still room for improvement in memory consumption and convergence. In this paper, an…”
Get full text
Journal Article -
4
Surrogate-Assisted Hybrid Meta-Heuristic Algorithm with an Add-Point Strategy for a Wireless Sensor Network
Published in Entropy (Basel, Switzerland) (09-02-2023)“…Meta-heuristic algorithms are widely used in complex problems that cannot be solved by traditional computing methods due to their powerful optimization…”
Get full text
Journal Article -
5
Genetic watermarking based on transform-domain techniques
Published in Pattern recognition (01-03-2004)“…An innovative watermarking scheme based on genetic algorithms (GA) in the transform domain is proposed. It is robust against watermarking attacks, which are…”
Get full text
Journal Article -
6
Open-Set Recognition in Unknown DDoS Attacks Detection With Reciprocal Points Learning
Published in IEEE access (2024)“…The internet, a cornerstone of modern life, has profound implications across personal, business, and society. However, its widespread use has posed challenges,…”
Get full text
Journal Article -
7
A D2D Group Communication Scheme Using Bidirectional and InCremental A-Star Search to Configure Paths
Published in Mathematics (Basel) (01-09-2022)“…The Device-to-Device (D2D) communication introduced in 3GPP’s Release 12 is a promising option for the accommodation of increasing traffic demand and the…”
Get full text
Journal Article -
8
Detection of Unknown DDoS Attack Using Reconstruct Error and One-Class SVM Featuring Stochastic Gradient Descent
Published in Mathematics (Basel) (01-01-2023)“…The network system has become an indispensable component of modern infrastructure. DDoS attacks and their variants remain a potential and persistent…”
Get full text
Journal Article -
9
Task Scheduling With Multicore Edge Computing in Dense Small Cell Networks
Published in IEEE access (2021)“…As a reaction and complement to cloud computing, edge computing is a computing paradigm designed for low-latency computing. Edge servers, deployed at the…”
Get full text
Journal Article -
10
Modified Coral Reef Optimization Methods for Job Shop Scheduling Problems
Published in Applied sciences (01-10-2022)“…The job shop scheduling problem (JSSP) is a fundamental operational research topic with numerous applications in the real world. Since the JSSP is an NP-hard…”
Get full text
Journal Article -
11
Unlicensed Spectrum Allocation for LTE and Wi-Fi Coexistence with HAP
Published in Symmetry (Basel) (01-08-2022)“…In order to accommodate the ever-increasing traffic demands, numerous approaches have been developed to improve spectrum utilization. Among others, the…”
Get full text
Journal Article -
12
Detection of Adversarial DDoS Attacks Using Generative Adversarial Networks with Dual Discriminators
Published in Symmetry (Basel) (01-01-2022)“…DDoS (Distributed Denial of Service) has emerged as a serious and challenging threat to computer networks and information systems’ security and integrity…”
Get full text
Journal Article -
13
Plan Quality and Secondary Cancer Risk Assessment in Patients with Benign Intracranial Lesions after Radiosurgery using the CyberKnife M6 Robotic Radiosurgery System
Published in Scientific reports (09-07-2019)“…This study was performed to examine the quality of planning and treatment modality using a CyberKnife (CK) robotic radiosurgery system with multileaf…”
Get full text
Journal Article -
14
A Clustering-Based Energy Saving Scheme for Dense Small Cell Networks
Published in IEEE access (2019)“…The network traffic of mobile wireless communication grows exponentially in recent years. In order to serve intense traffic areas, such as train stations,…”
Get full text
Journal Article -
15
Periodic Behavioral Routine Discovery Based on Implicit Spatial Correlations for Smart Home
Published in Mathematics (Basel) (01-01-2023)“…As the degree of elders’ social activity and self-care ability depreciates, the potential risk for elderly people who live independently increases. The…”
Get full text
Journal Article -
16
Handover Management for D2D Communication in 5G Networks
Published in Applied sciences (01-06-2020)“…This study addresses the handover management issue for Device-to-Device communication in fifth-generation (5G) networks. The Third Generation Partnership…”
Get full text
Journal Article -
17
Improving handover performance by switching between unicast and multicast addressing
Published in IEEE transactions on wireless communications (01-03-2009)“…Efficient handover schemes are essential to the success of mobile networking. However, there are time-consuming procedures involved in the process, such as…”
Get full text
Journal Article -
18
Evaluating the Risk Factors of Post Inflammatory Hyperpigmentation Complications with Nd-YAG Laser Toning Using LASSO-Based Algorithm
Published in Applied sciences (01-03-2020)“…The neodymium-doped yttrium aluminum garnet (Nd-YAG) laser is used for removal of pigmented skin patches and rejuvenation of skin. However, complications such…”
Get full text
Journal Article -
19
Radiation-Induced Secondary Cancer Risk Assessment in Patients With Lung Cancer After Stereotactic Body Radiotherapy Using the CyberKnife M6 System With Lung-Optimized Treatment
Published in Frontiers in bioengineering and biotechnology (07-05-2020)“…To evaluate the lifetime secondary cancer risk (SCR) of stereotactic body radiotherapy (SBRT) using the CyberKnife (CK) M6 system with a lung-optimized…”
Get full text
Journal Article -
20
Improving Handover Performance by Switching Between Unicast and Anycast Addressing
Published in IEEE transactions on vehicular technology (01-05-2009)“…With increased popularity and pervasiveness, mobile networking has become a definite trend for future networks. Users strongly demand that the connectivity of…”
Get full text
Journal Article