Chien-Hua Huang

Learn More
This paper proposes an effective technique, which can detect malicious manipulations under video lossy compressing data (e.g. H.263) and still-image lossy compressing data (e.g. JPEG). A block-classification strategy is used to divide DCT-blocks into the flat-blocks and the normal-blocks. Simple features of the both blocks are embedded invisibly. For later(More)
Predicting the prognosis for cardiac arrest is still challenging. Combining biomarkers from diverse pathophysiological pathways may provide reliable indicators for the severity of injury and predictors of long-term outcomes. We investigated the feasibility of using a multimarker strategy with key independent biomarkers to improve the prediction of outcomes(More)
BACKGROUND We intended to analyse the associations between blood glucose (BG) level and clinical outcomes of in-hospital cardiac arrest (IHCA). METHODS We conducted a retrospective observational study in a single medical centre and evaluated patients who experienced IHCA between 2006 and 2014. We used multivariable logistic regression analysis to study(More)
INTRODUCTION Serum lactate level may correlate with no-flow and low-flow status during cardiac arrest. Current guidelines have no recommended durations for cardiopulmonary resuscitation (CPR) before transition to the next strategy. We hypothesized that the lactate level measured during CPR could be associated with the survival probability and accordingly be(More)
Keywords: Market profile Technical analysis Neural network TAIEX futures a b s t r a c t This research applies a market profile to establish an indicator to classify the correlation between the variation in price and value with the stock trends. The indicator and technical index are neural network architecture parameters that assist to extrapolate the(More)
—By using a lot of request packets or garbage packets Distributed Denial of Service attacks occupy network bandwidth and consume performance of the target host. If the attack goal is a commercial website, Distributed Denial of Service attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double(More)
  • 1