


default search action
Der-Chen Huang
2020 – today
- 2024
- [j23]Chin-Ling Chen
, Wanbing Zhan, Woei-Jiunn Tsaur
, Der-Chen Huang, Ling-Chun Liu:
Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability. IEEE Access 12: 36924-36941 (2024) - [j22]Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen, Kuang-Wei Zeng:
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS. Clust. Comput. 27(5): 6953-6983 (2024) - [j21]Chin-Ling Chen
, Qing-Yang Huang, Ming Zhou, Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng:
Quantified emotion analysis based on design principles of color feature recognition in pictures. Multim. Tools Appl. 83(19): 57243-57267 (2024) - [c13]Chin-Ling Chen, Yong-Yuan Deng, Yao-Yuan Hsu, Hsing-Chung Chen, Der-Chen Huang, Ling-Chun Liu:
A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform. AINA (6) 2024: 207-216 - [c12]Chin-Ling Chen, Hsing-Chung Chen, Yong-Yuan Deng, Der-Chen Huang, Ling-Chun Liu:
Blockchain Technology in Healthcare: A Review of Integrated Medical Service Applications and Security Considerations. INCoS 2024: 370-374 - 2023
- [j20]Chin-Ling Chen
, Ying-Ming Zheng, Der-Chen Huang, Ling-Chun Liu, Hsing-Chung Chen:
A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System. Sensors 23(23): 9577 (2023) - [j19]Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen
:
An Artwork Rental System Based on Blockchain Technology. Symmetry 15(2): 341 (2023) - 2022
- [j18]Der-Chen Huang, Chun-Fang Hsiao, Tin-Wei Chang, Ying-Yi Chu:
A security method of hardware Trojan detection using path tracking algorithm. EURASIP J. Wirel. Commun. Netw. 2022(1): 81 (2022) - [j17]Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen
:
A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms. Symmetry 14(10): 2167 (2022) - 2020
- [c11]Chien-Hua Huang, Chun-Fu Lin, Ching-An Chen, Chi-Huang Hwang, Der-Chen Huang:
Real-time rehabilitation exercise performance evaluation system using deep learning and thermal image. I2MTC 2020: 1-6
2010 – 2019
- 2015
- [j16]Jyun-Fan Ke, Wen-Ju Chen, Der-Chen Huang:
A Life Extend Approach Based on Priority Queue N Strategy for Wireless Sensor Network. EAI Endorsed Trans. Cogn. Commun. 1(3): e2 (2015) - [c10]Jyun-Fan Ke, Wen-Ju Chen, Der-Chen Huang:
Life extend approach based on priority Queue N strategy for wireless sensor network. QSHINE 2015: 272-279 - 2014
- [j15]I-Ching Hsu, Jang Yang Lee, Der-Chen Huang, Kuan-Yang Lai:
Integrating Semantic Web technologies with XML Schema using role-mapping annotations. Electron. Libr. 32(2): 147-169 (2014) - [j14]Po-Ying Chen, Chi-Chang Chen, Wen-Kuan Yeh, Yukan Chang, Der-Chen Huang, Shyr-Shen Yu
, Chwei-Shyong Tsai, Yu-Jung Huang, Wei-Cheng Lin, Shao-I Chu, Chung-Long Pan, Tsung-Hung Lin, Shyh-Chang Liu:
Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface. J. Sensors 2014: 238350:1-238350:7 (2014) - [j13]Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai:
The design of conditional access mechanism for ubiquitous video on demand services. Secur. Commun. Networks 7(12): 2587-2595 (2014) - 2013
- [j12]Der-Chen Huang, Yi-Wei Lee, Hsiang-Wei Wu:
An efficient GTS allocation scheme for IEEE 802.15.4 MAC layer. Comput. Sci. Inf. Syst. 10(2): 651-665 (2013) - [j11]Der-Chen Huang, Jong-Hyouk Lee:
A dynamic N threshold prolong lifetime method for wireless sensor nodes. Math. Comput. Model. 57(11-12): 2731-2741 (2013) - [j10]Yu-Shiang Wong, Yang-Sheng Chen, Der-Jiunn Deng, Der-Chen Huang:
Nonpreemptive priority scheme for the S-MAC protocol in multimedia mobile sensor networks. Telecommun. Syst. 52(4): 2533-2540 (2013) - 2012
- [j9]Der-Chen Huang, Hsing-Chien Tseng, Der-Jiunn Deng, Han-Chieh Chao
:
A queue-based prolong lifetime methods for wireless sensor node. Comput. Commun. 35(9): 1098-1106 (2012) - [j8]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang
, Chu-Hsing Lin, Kuo-Hsiung Wang:
Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models. Int. J. Commun. Syst. 25(5): 652-671 (2012) - [j7]Yu-Yi Chen, Jinn-ke Jan, Meng-Lin Tsai, Chun Ching Ku, Der-Chen Huang:
On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management. KSII Trans. Internet Inf. Syst. 6(2): 515-528 (2012) - [j6]Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-ke Jan:
A Design of Tamper Resistant Prescription RFID Access Control System. J. Medical Syst. 36(5): 2795-2801 (2012) - [j5]Der-Chen Huang, Kun-Ding Hung, Yung-Kuan Chan
:
A computer assisted method for leukocyte nucleus segmentation and recognition in blood smear images. J. Syst. Softw. 85(9): 2104-2118 (2012) - [j4]Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang
:
Dual paths node-disjoint routing for data salvation in mobile ad hoc. J. Supercomput. 59(1): 268-296 (2012) - [j3]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang
, Fang-Yie Leu:
Lifetime elongation for wireless sensor network using queue-based approaches. J. Supercomput. 59(3): 1312-1335 (2012) - [c9]Ping-Liang Lai, Der-Chen Huang:
Online self-checking and correction for crosstalk-induced timing errors on VLSI interconnects. DDECS 2012: 294-299 - [c8]Der-Chen Huang, Hsiang-Wei Wu, Yi-Wei Lee:
A Cluster-Tree-Based GTS Allocation Scheme for IEEE 802.15.4 MAC Layer. IMIS 2012: 524-528 - [c7]Der-Chen Huang, Kun-Ding Hung, Yung-Kuan Chan
:
An adaptive leukocyte nucleus segmentation using genetic algorithm. ISPACS 2012: 559-563 - [c6]Der-Chen Huang, Yung-Kuan Chan
, Tsung-Ho Wu:
An image-based Entamoeba automatic detecting system. ISPACS 2012: 579-583 - [c5]I-Ching Hsu, Hsu-Yang Lin, Jang Yang Lee, Der-Chen Huang:
Using Linked Data for intelligent information retrieval. SCIS&ISIS 2012: 2172-2177 - 2011
- [j2]Chuen-Horng Lin, Der-Chen Huang, Yung-Kuan Chan
, Kai-Hung Chen, Yen-Jen Chang:
Fast color-spatial feature based image retrieval methods. Expert Syst. Appl. 38(9): 11412-11420 (2011) - [c4]Der-Chen Huang, Ren-Feng Sun, Der-Jiunn Deng:
A low cost transparent traversal method for NAT. IWCMC 2011: 671-676 - [c3]Jen-Wen Ding, Hong-Chen Li, Yo-Hsuan Chuang, Chun-Kai Chang, Der-Chen Huang:
An AP-Assisted Fast Handoff Scheme using IP address passing for vehicular ad-hoc networks. IWCMC 2011: 677-682 - 2010
- [j1]Yung-Kuan Chan
, Meng-Hsiun Tsai, Der-Chen Huang, Zong-Han Zheng, Kun-Ding Hung:
Leukocyte Nucleus Segmentation and Nucleus Lobe Counting. BMC Bioinform. 11: 558 (2010) - [c2]Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin:
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques. BWCCA 2010: 469-474
2000 – 2009
- 2009
- [c1]Fuu-Cheng Jiang, Der-Chen Huang, Kuo-Hsiung Wang:
Design approaches for optimizing power consumption of sensor node with N-policy M/G/1 queuing model. QTNA 2009: 3:1-3:8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 01:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
