National Chengchi University

www.nccu.edu.tw
Taipei, Taiwan

National Chengchi University is a public university located in Taipei City, Republic of China. Colloquially, NCCU is known by the Chinese as "ChengDà" . The school was founded by the Nationalist government of Nanjing in 1927 as an incubator for senior civil service in China. It has been considered one of the most important institutions of the Republic of China with Whampoa Military Academy, which is a prestigious incubator for commanders. Today, NCCU has been elected as the "Aim for the Top University Project" sponsored school of the Ministry of Education.NCCU specializes in Arts & Humanities, Social science, Management, Politics, and International Affairs programs. A great number of graduate students work in government departments.Today, NCCU has established an education system for students from pre-school to higher education, including a kindergarten, an elementary school, a high school, 9 colleges, and several graduate institutes. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Lane T.,National Chengchi University
Phenomenology and the Cognitive Sciences | Year: 2012

Philosophical and scientific investigations of the proprietary aspects of self-mineness or mental ownership-often presuppose that searching for unique constituents is a productive strategy. But there seem not to be any unique constituents. Here, it is argued that the "self-specificity" paradigm, which emphasizes subjective perspective, fails. Previously, it was argued that mode of access also fails to explain mineness. Fortunately, these failures, when leavened by other findings (those that exhibit varieties and vagaries of mineness), intimate an approach better suited to searching for an explanation. Having an alternative in hand, one that shows promise of achieving explanatory adequacy, provides an additional reason to suspend the search for unique constituents. In short, a negative and a positive thesis are developed: we should cease looking for unique constituents and should seek to explain mineness in accord with the model developed here. This model rejects attempts to explain the phenomenon in terms of either a narrative or a minimal sense of self; it seeks to explain at a "molecular" level, one that appeals to multiple, interacting dimensions. The molecular-level model allows for the possibility that subjective perspective is distinct from a stark perspective (one that does not imply mineness). It proposes that the confounding of tacit expectations plays an important role in explaining mental ownership and its complement, disownership. But the confounding of tacit expectations is not sufficient. Because we are able to be aware of the existence of mental states that do not belong to self, we require a mechanism for determining degree of self-relatedness. One such mechanism is proposed here, and it is shown how this mechanism can be integrated into a general model of mental ownership. In the spirit of suggesting how this model might be able to help resolve outstanding problems, the question as to whether inserted thoughts belong to the patient who reports them is also considered. © 2012 Springer Science+Business Media B.V.


Wang L.,Eurecom | Kuo G.-S.G.S.,National Chengchi University
IEEE Communications Surveys and Tutorials | Year: 2013

In heterogeneous wireless networks, an important task for mobile terminals is to select the best network for various communications at any time anywhere, usually called network selection. In recent years, this topic has been widely studied by using various mathematical theories. The employed theory decides the objective of optimization, complexity and performance, so it is a must to understand the potential mathematical theories and choose the appropriate one for obtaining the best result. Therefore, this paper systematically studies the most important mathematical theories used for modeling the network selection problem in the literature. With a carefully designed unified scenario, we compare the schemes of various mathematical theories and discuss the ways to benefit from combining multiple of them together. Furthermore, an integrated scheme using multiple attribute decision making as the core of the selection procedure is proposed. © 1998-2012 IEEE.


Chen C.-M.,National Chengchi University
Expert Systems with Applications | Year: 2011

Many countries have already become aging societies, as evidenced by annually decreasing fertility rates. Elderly individuals often live independently because their families cannot look after them. Therefore, computer-assisted nursing has received increasing attention in modern society, explaining why intelligent systems with physiology signal monitoring for e-health care is an emerging area of development, owing to the urgent needs of homecare for elderly people suffering chronic or sudden diseases at home. Importantly, a physiology signal monitoring system can help medical staff to monitor and analyze physiology signal effectively, such that they can not only monitor the patients' physiology states immediately, but also reduce medical cost and avoid having to visit doctors in hospital. Therefore, this study adopts system on chip (SOC) techniques to develop an embedded human pulse monitoring system with intelligent data analysis mechanism for disease detection and long-term health care. The proposed system can be applied to monitor and analyze pulse signal in daily life. The proposed system also has a friendly web-based interface for medical staff to observe immediate pulse signals for remote treatment. Hence, the proposed system provides aids long-distance medical treatment, exploring trends of potential chronic diseases, and urgent situations informing for sudden diseases. Moreover, this study also presents an intelligent data analysis scheme based on the modified cosine similarity measure to diagnose abnormal pulses for exploring potential chronic diseases. © 2010 Elsevier Ltd. All rights reserved.


Chao D.Y.,National Chengchi University
IET Control Theory and Applications | Year: 2011

Deadlocks halt a system completely causing a significant financial loss to a company. To resolve this problem, deadlock prevention (by adding monitors to problematic siphons) has been quite a popular research. Uzam and Zhou applied region analysis to a well-known S3PR to achieve a near-maximum permissive control policy. However, they do not list the lost states, which is essential to improve the control model. The lost states can be obtained by reachability analysis, which is a rather tedious process. Without theory, one could waste much time failing to reach more states and there is no effective solution so far in the literature. Thus, it is important to find out the condition where more states can be reached. If no more states can be reached, one should simply stop and remain satisfied with the suboptimal model obtained or employ weighted control arcs to reach more states. It is desirable to compute the gain of states without the costly reachability analysis when an alternative control policy is employed. It is interesting to explore which live states are lost in the first-met bad marking (FBM) method, which has not yet been available in the literature. This study presents the very first method to compute all lost states based on invariant without reachability analysis. © 2011 The Institution of Engineering and Technology.


Tsai H.-H.,National Chengchi University
Expert Systems with Applications | Year: 2012

Using a bibliometric approach, this paper analyzes research trends and forecasts of data mining from 1989 to 2009 by locating heading "data mining" in topic in the SSCI database. The bibliometric analytical technique was used to examine the topic in SSCI journals from 1989 to 2009, we found 1181 articles with data mining. This paper implemented and classified data mining articles using the following eight categories - publication year, citation, country/territory, document type, institute name, language, source title and subject area - for different distribution status in order to explore the differences and how data mining technologies have developed in this period and to analyze technology tendencies and forecasts of data mining under the above results. Also, the paper performs the K-S test to check whether the analysis follows Lotka's law. Besides, the analysis also reviews the historical literatures to come out technology diffusions of data mining. The paper provides a roadmap for future research, abstracts technology trends and forecasts, and facilitates knowledge accumulation so that data mining researchers can save some time since core knowledge will be concentrated in core categories. This implies that the phenomenon "success breeds success" is more common in higher quality publications. © 2012 Elsevier Ltd. All rights reserved.


Yang C.-K.,National Chengchi University
Computer Physics Communications | Year: 2011

We study the interaction between boron nitride nanotubes (BNNTs) and a variety of biological molecules using density functional theory. Some amino acids and nitrogenous bases that are parts of nucleotides are inserted inside the cavity of the BNNT and the overall electronic structure calculated. We conclude that there is no bonding or chemical adsorption between the wide band-gap BNNT and the biological molecules considered. This suggests that BNNTs can be used as a smooth nanoscale channel for transporting biological molecules. © 2010 Elsevier B.V. All rights reserved.


Yeh Y.-C.,National Chengchi University
Computers and Education | Year: 2012

Both critical thinking (CT) and knowledge management (KM) skills are necessary elements for a university student's success. Therefore, this study developed a co-creation blended KM model to cultivate university students' CT skills and to explore the underlying mechanisms for achieving success. Thirty-one university students participated in this study. Findings from the 17-week training program suggest that scaffolding university students through knowledge sharing, internalization, and co-creation processes in a blended KM environment can effectively enhance their CT skills. Moreover, the attribute-treatment interaction (ATI) analysis suggests that judicial thinking style which relates to a deep learning approach may facilitate KM and help improve CT skills. Notably, the complex underlying mechanisms and paths of influence found in this study attest to the highly dynamic nature of the proposed KM processes. © 2012 Elsevier Ltd. All rights reserved.


There are few comprehensive studies and categorization schemes to discuss the characteristics for both data mining and customer relationship management (CRM) although they have already become more important recently. Using a bibliometric approach, this paper analyzes data mining and CRM research trends from 1989 to 2009 by locating headings "data mining" and "customer relationship management" or "CRM" in topics in the SSCI database. The bibliometric analytical technique was used to examine these two topics in SSCI journals from 1989 to 2009, we found 1181 articles with data mining and 1145 articles with CRM. This paper implemented and classified data mining and CRM articles using the following eight categories-publication year, citation, country/territory, document type, institute name, language, source title and subject area-for different distribution status in order to explore the differences and how data mining and CRM technologies have developed in this period and to analyze data mining and CRM technology tendencies under the above result. Also, the paper performs the K-S test to check whether the analysis follows Lotka's law. The research findings can be extended to investigate author productivity by analyzing variables such as chronological and academic age, number and frequency of previous publications, access to research grants, job status, etc. In such a way characteristics of high, medium and low publishing activity of authors can be identified. Besides, these findings will also help to judge scientific research trends and understand the scale of development of research in data mining and CRM through comparing the increases of the article author. Based on the above information, governments and enterprises may infer collective tendencies and demands for scientific researcher in data mining and CRM to formulate appropriate training strategies and policies in the future. This analysis provides a roadmap for future research, abstracts technology trends and facilitates knowledge accumulations so that data mining and CRM researchers can save some time since core knowledge will be concentrated in core categories. This implies that the phenomenon "success breeds success" is more common in higher quality publications. © 2011 Akadémiai Kiadó, Budapest, Hungary.


Yang C.-K.,National Chengchi University
Carbon | Year: 2010

Graphane has a large band gap around 3.5 eV. In the situation of a vacant hydrogen atom, defect states appear in the energy gap, according to density functional calculation, and a local magnetic moment of 1 Bohr magneton is generated. Furthermore, if the vacancy is occupied by an atom from the transition-metals, not only do impurity levels make their presence in and out of the gap region but larger moment can also occur as a result. The calculation also shows that the doped structures are robust and the choice of dopant can change the electrical conduction and magnetism greatly. © 2010 Elsevier Ltd. All rights reserved.


Chao D.Y.,National Chengchi University
IEEE Transactions on Automation Science and Engineering | Year: 2011

Siphon-based deadlock control of Flexible Manufacturing System (FMS) runs faster by avoiding reachability analysis, but reaches fewer states than an optimal. First-met bad marking (FBM) method requires more monitors, but reaches more states by refining some monitors with smaller (hence less disturbed) controller regions. However, the same refinement leads to more monitors for other siphons, which can be combined without losing states. This paper develops the formal theory to uncover the secret behind the above discrepancy. It improves the siphon-based approach to reach more states while using fewer monitors. © 2010 IEEE.

Loading National Chengchi University collaborators
Loading National Chengchi University collaborators