Publications by authors named "Tzu-Chiang Chiang"

Many research works have attempted to introduce passive RFID technology into medical systems to reduce medical errors. However, most of these proposed works focused on identifying patients and objects. If an RFID based medical system is only good for identifying patients and medical objects but not capable of halting any medical process immediately, then it is not possible to prevent medical errors from happening.

View Article and Find Full Text PDF

In the present society, most families are double-income families, and as the long-term care is seriously short of manpower, it contributes to the rapid development of tele-homecare equipment, and the smart home care system gradually emerges, which assists the elderly or patients with chronic diseases in daily life. This study aims at interaction between persons under care and the system in various living spaces, as based on motion-sensing interaction, and the context-aware smart home care system is proposed. The system stores the required contexts in knowledge ontology, including the physiological information and environmental information of the person under care, as the database of decision.

View Article and Find Full Text PDF

Digital signature is an important cryptography technology to be used to provide integrity and non-repudiation in electronic medical record systems (EMRS) and it is required by law. However, digital signatures normally appear in forms unrecognizable to medical staff, this may reduce the trust from medical staff that is used to the handwritten signatures or seals. Therefore, in this paper we propose a dual function seal to extend user trust from a traditional seal to a digital signature.

View Article and Find Full Text PDF

An Institute of Medicine Report stated there are 98,000 people annually who die due to medication related errors in the United States, and hospitals and other medical institutions are thus being pressed to use technologies to reduce such errors. One approach is to provide a suitable protocol that can cooperate with low cost RFID tags in order to identify patients. However, existing low cost RFID tags lack computational power and it is almost impossible to equip them with security functions, such as keyed hash function.

View Article and Find Full Text PDF