Shumin Chuang - Academia.edu (original) (raw)
Papers by Shumin Chuang
Hepatology (Baltimore, Md.), 2015
Historically, clinical trials of regimens to treat chronic infection with hepatitis C virus (HCV)... more Historically, clinical trials of regimens to treat chronic infection with hepatitis C virus (HCV) have used, as their primary efficacy endpoint, a sustained virological response (SVR)-defined as HCV RNA levels below a designated threshold of quantification-24 weeks after the end of treatment (SVR24). More recently, regulatory authorities have begun to accept SVR at 12 weeks post-treatment (SVR12) as a valid efficacy endpoint because of its high rate of concordance with SVR24. However, the concordance between SVR12 and SVR24 has not been systematically assessed with new regimens of recently approved direct-acting antiviral agents. The aim of this study was to assess the concordance between SVR at various post-treatment time points in phase III clinical trials of sofosbuvir (SOF)-containing regimens. We conducted a retrospective analysis of five trials enrolling 863 patients infected with HCV genotypes 1-6. The concordance between SVR at 4 weeks post-treatment (SVR4) and SVR12, and be...
Software: Practice and Experience, 2017
With the rapid development of technology, digital multimedia has been widely utilized. Access of ... more With the rapid development of technology, digital multimedia has been widely utilized. Access of multimedia contents has become a daily routine. Although multimedia brings ease and convenience for content sharing, it also makes piracy more feasible. For example, it is easy to upload a copyrighted video to YouTube without the owners' permission. Authors and merchants are very much in need of protecting their intellectual property and commercial profits. Digital right management (DRM) systems are provided to fulfill this desire. DRM is a collection of techniques used to control access to copyrighted materials. Because current enterprise DRM solutions are not allowed for customized modification, they cannot fit in our considered scenario perfectly. As a result, we propose a secure DRM system with a design based on user demands, where a consumer can access contents only on authenticated devices until the authorization expires. Our DRM scheme involves a series of robust cryptosystems including AES, SHA-256, and RSA. Applications as DRM agents are implemented on Windows, Mac OS, Android, and iOS platforms. Moreover, we modularized the DRM components for easy extension and integration. For better performance on low-end devices, parameters of encryption are introduced, namely, the key size and the encryption density. We addressed the mask shift problem caused by random access and implemented the device identifier acquirement. The DRM system also proved to have high security and good performance in our analysis. Copyright
2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
ABSTRACT The total initial cost of enterprise learning management system is very high on the infr... more ABSTRACT The total initial cost of enterprise learning management system is very high on the infrastructure and software applications, so that enterprises start to adopt cloud computing to reduce expenditure on infrastructure, software and IT human resource. The paper provides a cost effective structure of hybrid cloud architecture that has been implemented the multi-tenant model for enterprise to support customization sharing among different virtualized applications in a tenant area. The schema-sharing and multi-tenant data storage architecture also supports the learning content delivery. The important basis for the design method of software development shall embed with the cost effective structure, such as using multithreads to compute background processing and unzip the content files to reduce brand width usage. Even the file sizes of learning content shall be zipped to the less small size and duplicate to different servers for cutting down the traffic flow of brand width. The detailed calculation of the all I/O computer processing and brand width become the crucial implementation way.
2012 IEEE International Conference on Imaging Systems and Techniques Proceedings, 2012
In recent years, intelligent traffic system (ITS) and telematics system have become a popular iss... more In recent years, intelligent traffic system (ITS) and telematics system have become a popular issue for traffic safety, convenience and efficiency. The real-time and historical traffic and other roadside information is very helpful information and can be analyzed to give good telematics services and traffic controlling, such as navigation, traffic flow, weather, traffic prediction and so on. This paper proposes an efficient real-time image recognition scheme to recognize roadside signs, such as traffic signs and common commercial marks, to collect real-time roadside traffic and other information by smart phones in mobile probing cars. The proposed scheme contains two stages. The first stage is used to detect regions of interest (ROI) which contain interesting object target, and the second stage is to recognize the detected regions. The recognition results can be collected in a cloud-based database to be further analyzed and applied in traffic information service. The experiment performs the proposed sign recognition method using traffic speed limitation signs to show its performance. The average speed is 0.085 seconds for a video frame and the average accuracy can achieve about 98%. Hence, the proposed scheme can keep lower computing complexity, however it still can obtain a well accuracy.
Hepatology (Baltimore, Md.), 2015
Historically, clinical trials of regimens to treat chronic infection with hepatitis C virus (HCV)... more Historically, clinical trials of regimens to treat chronic infection with hepatitis C virus (HCV) have used, as their primary efficacy endpoint, a sustained virological response (SVR)-defined as HCV RNA levels below a designated threshold of quantification-24 weeks after the end of treatment (SVR24). More recently, regulatory authorities have begun to accept SVR at 12 weeks post-treatment (SVR12) as a valid efficacy endpoint because of its high rate of concordance with SVR24. However, the concordance between SVR12 and SVR24 has not been systematically assessed with new regimens of recently approved direct-acting antiviral agents. The aim of this study was to assess the concordance between SVR at various post-treatment time points in phase III clinical trials of sofosbuvir (SOF)-containing regimens. We conducted a retrospective analysis of five trials enrolling 863 patients infected with HCV genotypes 1-6. The concordance between SVR at 4 weeks post-treatment (SVR4) and SVR12, and be...
Software: Practice and Experience, 2017
With the rapid development of technology, digital multimedia has been widely utilized. Access of ... more With the rapid development of technology, digital multimedia has been widely utilized. Access of multimedia contents has become a daily routine. Although multimedia brings ease and convenience for content sharing, it also makes piracy more feasible. For example, it is easy to upload a copyrighted video to YouTube without the owners' permission. Authors and merchants are very much in need of protecting their intellectual property and commercial profits. Digital right management (DRM) systems are provided to fulfill this desire. DRM is a collection of techniques used to control access to copyrighted materials. Because current enterprise DRM solutions are not allowed for customized modification, they cannot fit in our considered scenario perfectly. As a result, we propose a secure DRM system with a design based on user demands, where a consumer can access contents only on authenticated devices until the authorization expires. Our DRM scheme involves a series of robust cryptosystems including AES, SHA-256, and RSA. Applications as DRM agents are implemented on Windows, Mac OS, Android, and iOS platforms. Moreover, we modularized the DRM components for easy extension and integration. For better performance on low-end devices, parameters of encryption are introduced, namely, the key size and the encryption density. We addressed the mask shift problem caused by random access and implemented the device identifier acquirement. The DRM system also proved to have high security and good performance in our analysis. Copyright
2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
ABSTRACT The total initial cost of enterprise learning management system is very high on the infr... more ABSTRACT The total initial cost of enterprise learning management system is very high on the infrastructure and software applications, so that enterprises start to adopt cloud computing to reduce expenditure on infrastructure, software and IT human resource. The paper provides a cost effective structure of hybrid cloud architecture that has been implemented the multi-tenant model for enterprise to support customization sharing among different virtualized applications in a tenant area. The schema-sharing and multi-tenant data storage architecture also supports the learning content delivery. The important basis for the design method of software development shall embed with the cost effective structure, such as using multithreads to compute background processing and unzip the content files to reduce brand width usage. Even the file sizes of learning content shall be zipped to the less small size and duplicate to different servers for cutting down the traffic flow of brand width. The detailed calculation of the all I/O computer processing and brand width become the crucial implementation way.
2012 IEEE International Conference on Imaging Systems and Techniques Proceedings, 2012
In recent years, intelligent traffic system (ITS) and telematics system have become a popular iss... more In recent years, intelligent traffic system (ITS) and telematics system have become a popular issue for traffic safety, convenience and efficiency. The real-time and historical traffic and other roadside information is very helpful information and can be analyzed to give good telematics services and traffic controlling, such as navigation, traffic flow, weather, traffic prediction and so on. This paper proposes an efficient real-time image recognition scheme to recognize roadside signs, such as traffic signs and common commercial marks, to collect real-time roadside traffic and other information by smart phones in mobile probing cars. The proposed scheme contains two stages. The first stage is used to detect regions of interest (ROI) which contain interesting object target, and the second stage is to recognize the detected regions. The recognition results can be collected in a cloud-based database to be further analyzed and applied in traffic information service. The experiment performs the proposed sign recognition method using traffic speed limitation signs to show its performance. The average speed is 0.085 seconds for a video frame and the average accuracy can achieve about 98%. Hence, the proposed scheme can keep lower computing complexity, however it still can obtain a well accuracy.