Vehicle leasing credit risk assessment modeling by applying extended logistic regression
Chang, Yung-Chia, Chang, Kuei-Hu, Chen, Wei-Ting
Published in Journal of intelligent & fuzzy systems (04.10.2023)
Published in Journal of intelligent & fuzzy systems (04.10.2023)
Get full text
Journal Article
An ant colony optimization heuristic for an integrated production and distribution scheduling problem
Chang, Yung-Chia, Li, Vincent C., Chiang, Chia-Ju
Published in Engineering optimization (03.04.2014)
Published in Engineering optimization (03.04.2014)
Get full text
Journal Article
Establishing decision tree-based short-term default credit risk assessment models
Chang, Yung-Chia, Chang, Kuei-Hu, Chu, Heng-Hsuan, Tong, Lee-Ing
Published in Communications in statistics. Theory and methods (01.12.2016)
Published in Communications in statistics. Theory and methods (01.12.2016)
Get full text
Journal Article
Time series forecasting with missing values
Shin-Fu Wu, Chia-Yung Chang, Shie-Jue Lee
Published in 2015 1st International Conference on Industrial Networks and Intelligent Systems (INISCom) (01.11.2015)
Published in 2015 1st International Conference on Industrial Networks and Intelligent Systems (INISCom) (01.11.2015)
Get full text
Conference Proceeding
Journal Article
A Novel AHP-Based Benefit Evaluation Model of Military Simulation Training Systems
Chang, Kuei-Hu, Chung, Hsiang-Yu, Chang, Yung-Chia
Published in Mathematical problems in engineering (01.01.2015)
Published in Mathematical problems in engineering (01.01.2015)
Get full text
Journal Article
Applying the concept of exponential approach to enhance the assessment capability of FMEA
Chang, Kuei-Hu, Chang, Yung-Chia, Lai, Pei-Ting
Published in Journal of intelligent manufacturing (01.12.2014)
Published in Journal of intelligent manufacturing (01.12.2014)
Get full text
Journal Article
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Tsai, Ying-Ti, Wang, Chung-Ho, Chang, Yung-Chia, Tong, Lee-Ing
Published in IET information security (25.07.2024)
Published in IET information security (25.07.2024)
Get full text
Journal Article