


default search action
Chin-Lun Lai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c14]Chin-Lun Lai
:
A Simulation Learning in Communication Technique Skill by Virtual Reality - Certification of Telecommunication Line Plant. ICITL 2021: 74-84 - 2020
- [c13]Chin-Lun Lai
, Yu-Mei Chang:
A Testing Case of Simulation Learning in Nursing by Virtual Reality - Subcutaneous Injection Training. ICITL 2020: 109-118
2010 – 2019
- 2019
- [c12]Chin-Lun Lai:
An Augmented Reality based Strategy for Base Station Maintenance. ICDTE 2019: 57-61 - 2018
- [c11]Chin-Lun Lai
, Yu-Mei Chang:
Improving the Skills Training by Mixed Reality Simulation Learning - A Pilot Case Study of Nasogastric Tube Care. ICITL 2018: 18-27 - 2016
- [j6]Chin-Lun Lai
, ChiuYuan Tai:
A Smart Spoofing Face Detector by Display Features Analysis. Sensors 16(7): 1136 (2016) - [c10]Chin-Lun Lai
, YuFang Chu:
Increasing the Learning Performance via Augmented Reality Technology - A Case Study of Digital Image Processing Course. SETE@ICWL 2016: 58-64 - 2013
- [j5]Jie-Ci Yang, Chin-Lun Lai
, Hsin-Teng Sheu, Jiann-Jone Chen:
An Intelligent Automated Door Control System Based on a Smart Camera. Sensors 13(5): 5923-5936 (2013) - [c9]Jun-Horng Chen, Chin-Lun Lai
, Chih-Hong Chu, Jing-Ying Hsu:
Improving accuracy of facial recognition systems for distant targets. GCCE 2013: 92-93 - [c8]Chin-Lun Lai
, Jun-Horng Chen, Jing-Ying Hsu, Chih-Hong Chu:
Spoofing face detection based on spatial and temporal features analysis. GCCE 2013: 301-302 - 2012
- [c7]Teng-Hui Tseng, Chin-Lun Lai
, Sheng-Ta Hsieh, Jun-Horng Chen:
An Intelligent Accessing Control System Based on Human Intention Analysis. UIC/ATC 2012: 337-341 - [c6]Sheng-Ta Hsieh, Chih-Dao Chen, Jun-Horng Chen, Chin-Lun Lai
, Yu-Long Syu:
An Expert System Application for Respiratory Infection Diagnostic. UIC/ATC 2012: 673-678 - [c5]Jun-Horng Chen, Teng-Hui Tseng, Chin-Lun Lai
, Sheng-Ta Hsieh:
An Intelligent Virtual Fence Security System for the Detection of People Invading. UIC/ATC 2012: 786-791
2000 – 2009
- 2009
- [c4]Chin-Lun Lai
, Shu-Wen Chang:
An Image Processing Based Visual Compensation System for Vision Defects. IIH-MSP 2009: 559-562 - 2008
- [c3]Chin-Lun Lai
, Jie-Ci Yang:
Advanced real time fire detection in video surveillance system. ISCAS 2008: 3542-3545 - 2007
- [c2]Chin-Lun Lai
, Jie-Ci Yang:
An intelligent disaster warning surveillance system based on video contents analysis. ISSPA 2007: 1-4 - 2006
- [c1]Chin-Lun Lai:
Dynamic Perceptual Quality Control Strategy for Mobile Multimedia Transmission Via Watermarking Index. PSIVT 2006: 712-721 - 2001
- [j4]Soo-Chang Pei, Chin-Lun Lai
:
A morphological approach of target detection on perspective plane. Signal Process. 81(9): 1975-1984 (2001)
1990 – 1999
- 1998
- [j3]Soo-Chang Pei, Chin-Lun Lai
:
Very low bit-rate coding algorithm for stereo video with spatiotemporal HVS model and binary correlation disparity estimator. IEEE J. Sel. Areas Commun. 16(1): 98-107 (1998) - [j2]Soo-Chang Pei, Chin-Lun Lai
, Frank Y. Shih:
A morphological approach to shortest path planning for rotating objects. Pattern Recognit. 31(8): 1127-1138 (1998) - 1997
- [j1]Soo-Chang Pei, Chin-Lun Lai
, Frank Y. Shih:
An Efficient Class of Alternating Sequential Filters in Morphology. CVGIP Graph. Model. Image Process. 59(2): 109-116 (1997)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint