http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A value-added analysis of trade in Taiwan and Korea’s ICT industries
Hsing-Chun Lin,Shih-Hsun Hsu,Ruey-Wan Liou,Ching-Cheng Chang 한국무역학회 2016 Journal of Korea trade Vol.20 No.1
Purpose – The purpose of this paper is to extricate value-added exports in information and communications technology (ICT) industry earned by Taiwan and Korea. Additionally, the authors decompose Taiwan and Korea’s gross exports into various meaningful components. Design/methodology/approach – The authors use the inter-country input-output (ICIO) table which endows with cost structures of industries as well as trade information, facilitating in keeping track of the flow of products and value-added. The ICIO table used in this paper comes from the World Input-Output Database. The authors also use the way Wang et al. (2013) decomposed the intermediate goods exports into various components to provide further insights. Findings – The empirical results indicate that Taiwan and Korea’s ICT export to the world shrink by 47.8 and 40.9 percent when the trades are measured in value-added terms. Taiwan and Korea’s ICT export will also decrease by 75.1 and 57.8 percent. From the viewpoint of value added in trade, the share of value added embodied in Taiwan and Korea’s gross ICT exports continued to decrease and reached 24.9 and 42.2 percent in 2011, while the components of pure double counted terms kept growing in recent years. Originality/value – With global value chains flourishing in recent years, conventional trade statistics not only fails to highlight the vertical specialization among different countries, but also distorts the measurement of a country’s competitiveness. This paper extricates value-added exports in ICT industry earned by Taiwan and Korea and bring into focus the importance of trade in value added.
A Robust Watermark Scheme for Copyright Protection
Jung-Chun Liu,Chu-Hsing Lin,Wei-Shen Lai,Yan-Wei Lee 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
In this paper, we propose a robust watermark technology to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intellectual property even after serious attacks on the watermarked image. In the proposed watermarking, we embed watermarks by Singular Value Decomposition and Distributed Discrete Wavelet Transformation techniques. Regarding our method, Singular Value Decomposition provides the robustness to protect the image from most attacks except cropping, while Distributed Discrete Wavelet Transformation disperses watermarks all over the image to resist cropping attacks. The robustness of our proposed watermark scheme has been verified experimentally against main kinds of watermark attacks such as geometric and signal processing attacks.
Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems
Chu-Hsing Lin,Jung-Chun Liu,Chia-Han Ho,Jui-Ling Yu,Wei-Shen Lai 보안공학연구지원센터 2009 International Journal of Hybrid Information Techno Vol.2 No.1
The route guidance system, which provides driving advice based on traffic information about an origin and a destination, has become very popular along with the advancement of handheld devices and the global position system. Since the accuracy and efficiency of route guidance depend on the accuracy of the traffic conditions, the route guidance system needs to include more variables in calculation, such as real time traffic flows and allowable vehicle speeds. As variables considered by the route guidance system increase, the cost to compute multiplies. Since handheld devices have limited resources, it is not feasible to use them to compute the exact optimal solutions in real time systems by some well-known algorithm, such as the Dijkstra’s algorithm, which is usually used to find the shortest path with a map of reasonable numbers of vertices. To solve this problem, we propose to use the genetic algorithm to alleviate the rising computational cost. We use the genetic algorithm to find the shortest time in driving with diverse scenarios of real traffic conditions and varying vehicle speeds. The effectiveness of the genetic algorithm is clearly demonstrated when applied on a real map of modern city with very large vertex numbers.
Anomaly Detection Using LibSVM Training Tools
Jung-Chun Liu,Chu-Hsing Lin,Jui-Ling Yu,Wei-Shen Lai,Chia-Han Ho 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.4
Intrusion detection is the means to identify the intrusive behaviors and provide useful information to intruded systems to respond fast and to avoid or reduce damages. In recent years, learning machine technology is often used as a detection method in anomaly detection. In this research, we use support vector machine as a learning method for anomaly detection, and use LibSVM as the support vector machine tool. By using this tool, we get rid of numerous and complex operations and do not have to use external tools for finding parameters as needed by using other algorithms such as the genetic algorithm. Experimental results show that high average detection rates and low average false positive rates in anomaly detection are achieved by our proposed approach.
Relationship between the FRAX® score and falls in community-dwelling middle-aged and elderly people
Ling-Chun Ou,Yin-Fan Chang,Chin-Sung Chang,Ting-Hsing Chao,Ruey-Mo Lin,Zih-Jie Sun,Chih-Hsing Wu 대한골다공증학회 2016 Osteoporosis and Sarcopenia Vol.2 No.4
Objectives: Falls is a risk factor for fracture. The FRAX® predicts fractures. Whether the FRAX® is associated with fall in both gender is inconclusive. The aim of our study is to evaluate the association between FRAX scores and falls. Methods: The cross-sectional study set from 2009 to 2010 included 1200 community-dwelling people who were systematically sampled in central Taiwan. The 1200 participants (men: 524; women: 676; ?40 years old) completed questionnaires about socioeconomic status; lifestyle; medical and fall history were completed. FRAX scores with and without bone mineral density (BMD) were calculated by using the Taiwan calculator. Results: A total of 19.8% participants fell down. Binary regression models showed that diabetes mellitus history (OR: 1.61; 95% CI: 1.03e2.52), the FRAX without BMD in a continuous major score (OR: 1.06; 95% CI: 1.03e1.09), continuous hip score (OR: 1.11; 95% CI: 1.05e1.16), categorical major score ? 10% (OR: 1.81; 95% CI: 1.25e2.61), and categorical hip score ? 3% (OR: 1.80; 95% CI: 1.30e2.50) were independent risk factors for falls. FRAX with BMD in a continuous major score (OR: 1.04; 95% CI: 1.02e1.06), continuous hip score (OR: 1.06; 95% CI: 1.02e1.09), categorical major score ? 10% (OR: 1.52; 95% CI: 1.09e2.12), and categorical hip score ? 3% (OR: 1.53; 95% CI: 1.13e2.09) were also independent risk factors. Conclusions: We concluded that FRAX® scores with and without BMD were unanimously correlated with falls in community-dwelling middleaged and elderly males and females.
( Ming Nan Lin ),( Chen Chi Tsai ),( Tsung Hsing Hung ),( Chih Chun Tsai ) The Editorial Office of Gut and Liver 2012 Gut and Liver Vol.6 No.4
Background/Aims: Cellulitis is a common infectious disease. However, the risk of cellulitis in cirrhotic patients is not well established, and whether liver cirrhosis is a risk factor for cellulitis remains unknown. This study evaluated the relationship between cellulitis and liver cirrhosis. Methods: The National Health Insurance Database, which was derived from the Taiwan National Health Insurance program, was used to identify patients. The study group consisted of 39,966 patients with liver cirrhosis, and the comparison group consisted of 39,701 randomly selected age- and sex-matched patients. Results: During the 3-year follow-up period, 2,674 (6.7%) patients with liver cirrhosis developed cellulitis, and 1,587 (4.0%) patients without liver cirrhosis developed cellulitis (p<0.001). Following a Cox`s regression analysis adjusted for age, sex, and underlying medical disorders, the cirrhotic patients demonstrated a greater risk for the occurrence of cellulitis than the non-cirrhotic patients during the 3-year period (hazard ratio [HR], 1.66; 95% confidence interval [CI], 1.55 to 1.77; p<0.001). Additionally, cirrhotic patients with complications also had a greater risk for the occurrence of cellulitis than those patients without complications (HR, 1.23; 95% CI, 1.14 to 1.33; p<0.001). Conclusions: We conclude that cirrhotic patients have a greater risk of cellulitis than non-cirrhotic patients. (Gut Liver 2012;6:482-485)
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Wei-Shen Lai,Chu-Hsing Lin,Jung-Chun Liu,Hsun-Chi Huang,Tsung-Che Yang 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service attacks, we can limit the malicious user by controlling the traffic flow. In the paper, we propose to monitor the traffic pattern in order to alleviate distributed denial of service attacks. A bandwidth allocation policy will be adopted to assign normal users to a high priority queue and suspected attackers to a low priority queue. Simulations conducted in network simulator of our proposed priority queue-based scheme shows its effectiveness in blocking attacking traffic while maintaining constant flows for legitimate traffic.