Yung-Ching Lin

  • Citations Per Year
Learn More
Data mining is used widely by enterprises to mine hidden knowledge from databases. However, mined data containing sensitive trade secret could jeopardize the enterprise's competitive edge. In this paper, we proposed an anti-data mining concept to allow readable mined data that only contained unimportant information. The proposed shaking random sampling(More)
Facial model reconstruction and surgical simulation are essential to plastic surgery in today's medicine. Both can help surgeons to design appropriate repair plans and procedures prior to actual surgery. In this paper, we exploit a metamorphosis technique in our new design. First, using metamorphosis and vision techniques, we can establish 3D facial models(More)
Weaving computing technologies into a living environment without interfering with natural interactions is nontrivial. In this paper, we have proposed utilizing ambient-intelligence compliant object (AICO) to facilitate context-aware service provision in a smart home; furthermore, a hybrid weaving strategy, called Hide and Not Easy to Seek, is proposed for(More)
OBJECTIVES An Austrian boarding school reported a cluster of gastroenteritis on January 10, 2014. Environmental swabs from the school cafeteria and a nearby kebab restaurant tested positive for norovirus. The outbreak was investigated to identify its source(s). METHODS An outbreak case was defined as a student or staff member with diarrhoea or vomiting(More)
INTRODUCTION Papua New Guinea (PNG) implemented hepatitis B birth dose (BD) vaccination in 2005 yet since that time coverage has remained low, allowing mother-to-child transmission to occur. We conducted a field assessment of the BD vaccination program to develop strategies for improving the BD coverage. METHODS We selected five provinces with higher(More)
  • 1