default search action
Shyr-Shen Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Yung-Kuan Chan, Chuen-Horng Lin, Yuan-Rong Ben, Ching-Lin Wang, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu:
Dog nose-print recognition based on the shape and spatial features of scales. Expert Syst. Appl. 240: 122308 (2024) - [j27]Yung-Kuan Chan, Chuen-Horng Lin, Ching-Lin Wang, Keng-Chang Tu, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu:
Dog identification based on textural features and spatial relation of noseprint. Pattern Recognit. 151: 110353 (2024) - 2023
- [j26]Yung-Kuan Chan, You-Cian Lin, Wei-Jyun Wang, Wan-Ting Hu, Chuen-Horng Lin, Shyr-Shen Yu:
Identifying the occlusion of left subclavian artery with stent based on chest MRI images. Multim. Tools Appl. 82(7): 10617-10639 (2023) - [c9]Cheng-Hui Chen, Yen-Shiuan Lin, Yung-Kuan Chan, Shyr-Shen Yu:
Cluster-Based Optimization Method for Delivery Networks. SGIoT 2023: 101-112 - 2022
- [j25]Ching-Lin Wang, Yung-Kuan Chan, Shao Wei Chu, Shyr-Shen Yu:
r-Reference points based k-means algorithm. Inf. Sci. 610: 204-214 (2022) - 2021
- [j24]Ching-Lin Wang, Chi-Shiang Chan, Wei-Jyun Wang, Yung-Kuan Chan, Meng-Hsiun Tsai, Chia-Yi Chuang, Wen-Yu Cheng, Shyr-Shen Yu:
Automatic Brain Cancer Segmentation on PET Image. Int. J. Pattern Recognit. Artif. Intell. 35(3): 2150008:1-2150008:22 (2021) - [c8]Cheng-Hui Chen, Huai-Che Hong, Yu-Shiang Hong, Hsiao Yu Wang, Shyr-Shen Yu:
Pipeline Manager: A Flexible Semi-automatic Dataflow Analysis Framework. SNPD 2021: 174-176
2010 – 2019
- 2018
- [j23]Shyr-Shen Yu, Shao Wei Chu, Chuin-Mu Wang, Yung-Kuan Chan, Ting-Cheng Chang:
Two improved k-means algorithms. Appl. Soft Comput. 68: 747-755 (2018) - [j22]Chun-Fu Hong, Ying-Chen Chen, Wei-Chun Chen, Keng-Chang Tu, Meng-Hsiun Tsai, Yung-Kuan Chan, Shyr-Shen Yu:
Construction of diagnosis system and gene regulatory networks based on microarray analysis. J. Biomed. Informatics 81: 61-73 (2018) - 2016
- [j21]Meng-Fong Tsai, Shyr-Shen Yu:
Distance Metric Based Oversampling Method for Bioinformatics and Performance Evaluation. J. Medical Syst. 40(7): 159:1-159:9 (2016) - 2015
- [j20]Chun-Chu Jen, Shyr-Shen Yu:
Automatic detection of abnormal mammograms in mammographic images. Expert Syst. Appl. 42(6): 3048-3055 (2015) - [j19]Meng-Hsiun Tsai, Shyr-Shen Yu, Yung-Kuan Chan, Chun-Chu Jen:
Blood Smear Image Based Malaria Parasite and Infected-Erythrocyte Detection and Segmentation. J. Medical Syst. 39(10): 118:1-118:14 (2015) - [c7]Chen-Chung Liu, Hsin-Lei Lin, Shyr-Shen Yu:
Multi-focus image fusion using local structure features with dynamic windows. FSKD 2015: 1711-1715 - [c6]Chun-Chu Jen, Shyr-Shen Yu, Yung-Kuan Chan:
A Concise Method for Locating the Nipple Position on Mammogram Images. ICSSE 2015: 103-114 - 2014
- [j18]Chun-Yuan Yu, Chen-Chung Liu, Shyr-Shen Yu:
A Fovea Localization Scheme Using Vessel Origin-Based Parabolic Model. Algorithms 7(3): 456-470 (2014) - [j17]Chien-Te Wu, Shun-Chung Liu, Chao-Fang Chu, Yen-Ping Chu, Shyr-Shen Yu:
A Study of Open Data for Tourism Service. Int. J. Electron. Bus. Manag. 12(3) (2014) - [j16]Po-Ying Chen, Chi-Chang Chen, Wen-Kuan Yeh, Yukan Chang, Der-Chen Huang, Shyr-Shen Yu, Chwei-Shyong Tsai, Yu-Jung Huang, Wei-Cheng Lin, Shao-I Chu, Chung-Long Pan, Tsung-Hung Lin, Shyh-Chang Liu:
Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface. J. Sensors 2014: 238350:1-238350:7 (2014) - [c5]Chen-Chung Liu, Shao Wei Chu, Yung-Kuan Chan, Shyr-Shen Yu:
A Modified K-Means Algorithm - Two-Layer K-Means Algorithm. IIH-MSP 2014: 447-450 - [c4]Shyr-Shen Yu, Ching-Hua Chiu, Chia-Chi Liu, Yung-Kuan Chan, Meng-Hsiun Tsai:
Exercise prescription formulating scheme based on a two-layer K-means classifier. ISIC 2014: 116-121 - 2013
- [c3]Chun-Yuan Yu, Chen-Chung Liu, Jiunn-Lin Wu, Shyr-Shen Yu, Jing-Yu Huang:
A Study of Vessel Origin Detection on Retinal Images. IEA/AIE 2013: 620-625 - 2012
- [j15]Chen-Chung Liu, Chung-Yen Tsai, Jui Liu, Chun-Yuan Yu, Shyr-Shen Yu:
A pectoral muscle segmentation algorithm for digital mammograms using Otsu thresholding and multiple regression analysis. Comput. Math. Appl. 64(5): 1100-1107 (2012) - [j14]Chen-Chung Liu, Chung-Yen Tsai, Ta-Shan Tsui, Shyr-Shen Yu:
An improved GVF snake based breast region extrapolation scheme for digital mammograms. Expert Syst. Appl. 39(4): 4505-4510 (2012) - [j13]Hung-Kuei Hsiao, Chen-Chung Liu, Chun-Yuan Yu, Shiau-Wei Kuo, Shyr-Shen Yu:
A novel optic disc detection scheme on retinal images. Expert Syst. Appl. 39(12): 10600-10606 (2012) - [j12]Hsiu-Hsia Lin, San-Ging Shu, Yueh-Huang Lin, Shyr-Shen Yu:
Bone age cluster assessment and feature clustering analysis based on phalangeal image rough segmentation. Pattern Recognit. 45(1): 322-332 (2012) - 2011
- [j11]Meng-Hsiun Tsai, Ching-Hao Lai, Shyr-Shen Yu:
A statistical and learning based oncogene detection and classification scheme using human cDNA expressions for ovarian carcinoma. Expert Syst. Appl. 38(8): 10066-10074 (2011) - [j10]Yu-Chi Liu, Hsien-Chu Wu, Shyr-Shen Yu:
Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multim. Tools Appl. 52(2-3): 263-276 (2011) - [c2]Guan-Nan Hu, Chen-Chung Liu, Kai-Wen Chuang, Shyr-Shen Yu, Ta-Shan Tsui:
General Regression Neural Network utilized for color transformation between images on RGB color space. ICMLC 2011: 1793-1799 - 2010
- [j9]Ching-Hao Lai, Shyr-Shen Yu, Hsiao-Yun Tseng, Meng-Hsiun Tsai:
A protozoan parasite extraction scheme for digital microscopic images. Comput. Medical Imaging Graph. 34(2): 122-130 (2010)
2000 – 2009
- 2009
- [j8]Yung-Kuan Chan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. J. Syst. Softw. 82(3): 411-421 (2009) - 2008
- [j7]Chen-Ming Fan, Cheng-Chih Huang, Shyr-Shen Yu:
On n-power prefix languages. Int. J. Comput. Math. 85(5): 703-715 (2008) - 2000
- [c1]Neng-Huang Pan, Wen-Tsai Jen, Shyr-Shen Yu, Ming-Shing Yu, Shyh-Yang Hwang, Ming-Jer Wu:
Prosody Model in a Mandarin Text-to-Speech System based on a Hierarchical Approach. IEEE International Conference on Multimedia and Expo (I) 2000: 448-451
1990 – 1999
- 1999
- [j6]Huei-Jan Shyr, Shyr-Shen Yu:
Some Properties of Left Non-Cancellative Languages. J. Autom. Lang. Comb. 4(4): 351-360 (1999) - 1998
- [j5]Huei-Jan Shyr, Shyr-Shen Yu:
Bi-Catenation and Shuffle Product of Languages. Acta Informatica 35(8): 689-707 (1998) - [j4]Chen-Ming Fan, Huei-Jan Shyr, Shyr-Shen Yu:
d-Words and d-Languages. Acta Informatica 35(8): 709-727 (1998) - [j3]Huei-Jan Shyr, Shyr-Shen Yu:
The Single Loop Representations of Regular Languages. Discret. Appl. Math. 82(1-3): 219-229 (1998) - [j2]Huei-Jan Shyr, Shyr-Shen Yu:
Local languages. Int. J. Comput. Math. 66(3-4): 199-216 (1998) - [j1]Huei-Jan Shyr, Shyr-Shen Yu:
A note on the free submonoids of the monoid of prefix codes. Int. J. Comput. Math. 68(3-4): 243-249 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint