Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Hung-Jui Ko"'
Autor:
Hsiao-Chin Shen, Jhong-Ru Huang, Chuan-Yen Sun, Ying-Ting Liao, Hung-Jui Ko, Chih-Jung Chang, Jia-Yih Feng, Yuh-Min Chen, Wei-Chih Chen, Kuang-Yao Yang
Publikováno v:
European Journal of Medical Research, Vol 29, Iss 1, Pp 1-11 (2024)
Abstract Background Despite vaccines’ effectiveness in reducing COVID-19 infection rates and disease severity, their impact on critical patients presenting with acute respiratory failure is elusive. The aim of this study was to further investigate
Externí odkaz:
https://doaj.org/article/63be35f345df48b78f336b648a42f506
Autor:
Ying-Ting Liao, Hsiao-Chin Shen, Jhong-Ru Huang, Chuan-Yen Sun, Hung-Jui Ko, Chih-Jung Chang, Yuh-Min Chen, Jia-Yih Feng, Wei-Chih Chen, Kuang-Yao Yang
Publikováno v:
BMC Pulmonary Medicine, Vol 24, Iss 1, Pp 1-11 (2024)
Abstract Background Coronavirus disease 2019 (COVID-19) has affected individuals worldwide, and patients with cancer are particularly vulnerable to COVID-19-related severe illness, respiratory failure, and mortality. The relationship between COVID-19
Externí odkaz:
https://doaj.org/article/f3a093a3c1144827a082d957f1731a4a
Autor:
Chuan-Yen Sun, Jhong-Ru Huang, Hsiao-Chin Shen, Ying-Ting Liao, Hung-Jui Ko, Chih-Jung Chang, Yuh-Min Chen, Jia-Yih Feng, Wei-Chih Chen, Kuang-Yao Yang
Publikováno v:
Therapeutic Advances in Respiratory Disease, Vol 17 (2023)
Background: Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) causes coronavirus disease 2019 (COVID-19), a pandemic that has resulted in millions of deaths worldwide. Critically ill COVID-19 patients who require intubation and develop nos
Externí odkaz:
https://doaj.org/article/f9270d149b334a18af4336c734e05fc5
Publikováno v:
IEEE Access, Vol 10, Pp 67686-67693 (2022)
Information hiding techniques are used to hide confidential data in digital carriers. It is difficult for malicious users to detect the existence of confidential data within the digital carriers. Audios, images, or videos can call be digital carriers
Externí odkaz:
https://doaj.org/article/51556ea494ba401dab1eddf6567a23f2
Publikováno v:
In PEC Innovation December 2022 1
Publikováno v:
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications ISBN: 9783031054907
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::290bc9d5a14251a4af2d83ed63dde4d0
https://doi.org/10.1007/978-3-031-05491-4_4
https://doi.org/10.1007/978-3-031-05491-4_4
Publikováno v:
Information Sciences. 517:128-147
This study presents a robust and transparent watermarking method that exploits block-based discrete cosine transform (DCT) coefficient modification. The difference in the DCT coefficients of two blocks is calculated and modified based on the watermar
Publikováno v:
The Journal of Supercomputing. 77:77-94
The increasing usage of mobile cloud computing leads the cloud to become a hotbed of crime. Cloud storage is different from previous data storage in digital forensics. In this paper, we concentrate on gathering evidence from mobile iOS devices and th
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811995811
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3ae55d8ea2f553c576d9a5f631561d5c
https://doi.org/10.1007/978-981-19-9582-8_58
https://doi.org/10.1007/978-981-19-9582-8_58
Publikováno v:
2020 International Conference on Pervasive Artificial Intelligence (ICPAI).
EDoS (Economic Denial of Sustainability) attack is always a major threat to the cloud platform. Many researchers have developed countermeasure mechanisms against EDoS attack. The EDoS-ADS is proposed by Shawahna et al. in 2018, this mechanism can ide