Yu-Fang Chung

Tunghai University, 臺中市, Taiwan, Taiwan

Are you Yu-Fang Chung?

Claim your profile

Publications (50)37.38 Total impact

  • Applied Mathematics & Information Sciences 11/2014; 8(6):3027-3032. · 1.23 Impact Factor
  • Journal of Applied Mathematics 01/2014; 2014:1-11. · 0.72 Impact Factor
  • Source
    Yu-Fang Chung, Chia-Hui Liu
    [Show abstract] [Hide abstract]
    ABSTRACT: The problem of an ageing population has become serious in the past few years as the degeneration of various physiological functions has resulted in distinct chronic diseases in the elderly. Most elderly are not willing to leave home for healthcare centers, but caring for patients at home eats up caregiver resources, and can overwhelm patients' families. Besides, a lot of chronic disease symptoms cause the elderly to visit hospitals frequently. Repeated examinations not only exhaust medical resources, but also waste patients' time and effort. To make matters worse, this healthcare system does not actually appear to be effective as expected. In response to these problems, a wireless remote home care system is designed in this study, where ZigBee is used to set up a wireless network for the users to take measurements anytime and anywhere. Using suitable measuring devices, users' physiological signals are measured, and their daily conditions are monitored by various sensors. Being transferred through ZigBee network, vital signs are analyzed in computers which deliver distinct alerts to remind the users and the family of possible emergencies. The system could be further combined with electric appliances to remotely control the users' environmental conditions. The environmental monitoring function can be activated to transmit in real time dynamic images of the cared to medical personnel through the video function when emergencies occur. Meanwhile, in consideration of privacy, the video camera would be turned on only when it is necessary. The caregiver could adjust the angle of camera to a proper position and observe the current situation of the cared when a sensor on the cared or the environmental monitoring system detects exceptions. All physiological data are stored in the database for family enquiries or accurate diagnoses by medical personnel.
    Sensors 12/2013; 13(12):17156-75. · 2.05 Impact Factor
  • Yu-Fang Chung
    [Show abstract] [Hide abstract]
    ABSTRACT: In regard to the communication security of open networks, authenticated key management agreements are able to provide confidentiality, integrity, and verification so as to establish a more secure and fair digital rights management mechanism. For this reason, this paper, aiming at authentication key management agreements, tends to provide a security study on the application of authentication key management agreements, covering the establishment, analysis, design, security study, and performance optimization in various environments. Based on present public key schemes, such as public key cryptography, identity-recognized cryptography, and undocumented cryptography, it aims to establish an authenticated key management agreement suitable for various application environments. Using the one-way transmission in identity-recognized cryptography or undocumented cryptography for formulating practical and effective security models, it tends to establish the one-way authentication key agreement for both parties. Based on the design of single authentication key, an authentication key agreement for the undocumented public key cryptography is proposed to design a security model for the secure and high-efficiency undocumented two-party authentication key agreement. Under random oracle model and standard model, the security of the undocumented two-party authentication key agreement is authenticated. Furthermore, aiming at the computational efficiency, communication efficiency, and key exchange frequency of group key management agreements, this paper aims to propose a method for dynamic membership. Besides, regarding the secure communication environment in different application backgrounds, such as the network applications of Grid, P2P, and ad-hoc, it would propose practical group key agreements for networks and multi-node communications to promote the security of group key management and to facilitate the computation of agreements and the optimization of communications. Copyright © 2013 John Wiley & Sons, Ltd.
    Security and Communication Networks 11/2013; · 0.43 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the development of information technology and medical technology, developed countries have been establish organization to set standard for electronic medical records in response to new generation and information on the application, they gradually develop emerging medical information exchange mode, Personal Health Records (PHR). PHR can integrate different kind of personal health records. With the Internet or portable device, PHR offers the integrity and accuracy personal health and medical records. Through electronic medical records, we can evaluate the quality of medical care, provide continued care to patients, promote the medical efficiency and increase the accuracy of medical diagnosis. To implement PHR system in Cloud computing environment, we can decrease the cost of managing the infrastructure, and speed up dynamic resource adjustment based on the situation of the changes in client's demand and other advantages. However, it also brings new challenges. It is important to users to assure information security in Cloud environment, so this paper provides efficient and safe access management mechanism to solve PHR implement on Cloud environment's security problem. The information security being threatened in the Cloud may lead to the collapse of medical care, loss of personal data or other serious consequence. Finally, this paper provides new PHR access control mechanism built in Cloud environment with Bilinear Pairing. It provides users with a safe and efficient dynamically access PHR information mechanism. As a result from reserach, through access control scheme, it can withstand equation attack, external attack reverse attack perfectly in Cloud computing environment.
    Parallel Processing (ICPP), 2013 42nd International Conference on; 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the rapid development of the Internet, many users start to take action putting personal or company information on it, and share with everyone. The Internet is public as it were, if we do not control its limit of authority to assure security, it's possible that those attackers do illegal access of important information and destroy them. Not only personal privacy is invaded, but the mass property damage. Therefore, effective access control system has been more and more emphasized these days. To fight against these network attacks, it is necessary to establish an effective and safe access control system; here we proposed a scheme, a key management which called Lagrange interpolation mainly takes access control model as framework, and use Elliptic Curve Cryptography system to enhance security. The fact we choose Lagrange interpolation is the key we use is randomized, no relationship between each key, so is relatively hard. As Elliptic Curve Cryptography system, we want attackers to encounter Elliptic Curve Discrete Logarithm Problem. Once the prime number is big enough, attackers will have trouble deciphering the key. Access control is so comprehensive, such as electronic documents, online television system sand wireless networks and so on, from previous literature; mobile agent technology applied in access control and key management would waste space and do exist some flaws in security, also we still have a lot of works to do on medical application. Hence, we propose these schemes in mobile agent in order to reach improvement, and then analyze of security and try to simulate what attackers will do. We conclude four common attacks: External Collective Attack, Internal Attack, Collusion Attacks and Equation Breaking Attack. As results, attackers are hard to decipher the key because of no relationship between each key and will face Elliptic Curve Discrete Logarithm Problem. We confirm that the proposed schemes can be more efficiently and safety to protect mobile ag- nt.
    TENCON 2013 - 2013 IEEE Region 10 Conference (31194); 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Class imbalanced classifications are important issues in machine learning since class imbalanced problems usually happen in real applications such as intrusion detection, medical diagnostic/monitoring, oil-spill detection, and credit card fraud detection. It is hard to identify rare events correctly if a learning algorithm is just established based on optimal accuracy, as all samples will be classified into the major group. Many algorithms were proposed to deal with class imbalance problems. In this paper, we focus on MICE algorithm proposed by [15] and improve the algorithm by choosing the optimal threshold based on the posterior probabilities. In addition, we illustrate the reason why the logistic transformation works in MICE. The empirical results show that choosing the optimal threshold vis posterior probabilities can improve the performance of the MICE algorithm.
    Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on; 01/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Flexibility testing is one of the most important fitness assessments. It is generally evaluated by measuring the range of motion (RoM) of body segments around a joint center. This study presents a novel assessment of flexibility in the microcirculatory aspect. Eighteen college students were recruited for the flexibility assessment. The flexibility of the leg was defined according to the angle of active ankle dorsiflexion measured by goniometry. Six legs were excluded, and the remaining thirty legs were categorized into two groups, group H (n = 15 with higher flexibility) and group L (n = 15 with lower flexibility), according to their RoM. The microcirculatory signals of the gastrocnemius muscle on the belly were monitored by using Laser-Doppler Flowmetry (LDF) with a noninvasive skin probe. Three indices of nonpulsatile component (DC), pulsatile component (AC) and perfusion pulsatility (PP) were defined from the LDF signals after signal processing. The results revealed that both the DC and AC values of the group H that demonstrated higher stability underwent muscle stretching. In contrast, these indices of group L had interferences and became unstable during muscle stretching. The PP value of group H was a little higher than that of group L. These primary findings help us to understand the microcirculatory physiology of flexibility, and warrant further investigations for use of non-invasive LDF techniques in the assessment of flexibility.
    Sensors 01/2013; 14(1):478-491. · 2.05 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: A lot of manufacturers tend to enhance the management efficacy and reduce the management costs by investing large resources in the research and development of RFID. For petrochemical industry, an effective, reliable, and secure patrol management system is primary. Nevertheless, traditional patrol management focuses on labor patrol that the field staff master in the corrosion, leakage, and pipe aging of production equipment. Although equipment inspection and patrol items are scheduled every day, some problems still need to be overcome. After completing traditional patrol tasks, extra time and manpower are required for organizing the patrol records and filling them into electronic document. In the process, it is likely to key in wrong data because of the numerous patrol items. Apparently, without systematic management, supervisors and shift leaders can hardly find out data errors and analyze the abundant data for complete risk evaluation and process security improvement. An RFID-based patrol management system suitable for petrochemical industry is proposed in this study. The system corresponds to the field environment requirements and regulations for petrochemical plants, integrates operation procedure and information procedure, and evaluates and includes various dimensions and variables through interviews and technological analyses to enhance the process security. Active processing equipment monitoring could enhance the preventive maintenance efficiency and promote the production capacity and industrial competitiveness.
    TENCON 2013 - 2013 IEEE Region 10 Conference (31194); 01/2013
  • Yu-Fang Chung, Zhen-Yu Wu
    [Show abstract] [Hide abstract]
    ABSTRACT: Under the presupposition of security, privacy and transparency, electronic voting is regarded as the next prospective development in of electoral evolution, yet it fails to command people's trust for the unsolved problems of bribery and coercion. Coercers and bribers can utilize various verification behaviors to determine their voter manipulation by confirming whether or not a voter complied with their instructions, which is making all voting systems vulnerable. Existing published methods have been inadequate because either those emphasizing practicality have not been able to achieve effective protection due to their overtly simple protection method, or others that emphasize on theories have been difficult to put into practice due to the complicated protection method devised. In this study, we propose an efficient and secure e-voting scheme that employs the password property to form a trapdoor for protecting ballot secrecy and hence withstand verification behaviors. The designed scheme could enhance the overall volition of participating in voting, as it corresponds to the three elements of information security and integrates with the required security for electronic voting, such as verifying the identity of voters and the anonymity of voting to prevent voters from being coerced and bribed, the volition of not being controlled by external factors and the scheme being able to be operated on different computers, portable devices or different platforms.
    The Computer Journal 10/2012; 55(10):1169-1179. · 0.89 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Protocols of user authentication are able to ensure the security of data transmission and users' communication over insecure networks. Among various authenticated mechanisms run currently, the password-based user authentication, because of its efficiency, is the most widely employed in different areas, such as computer networks, wireless networks, remote login, operation systems, and database management systems. Even as password is endowed with the property of simple and human memorable, for which causes such an attack of brute force, for example, the previous works often suffer off-line password guessing attack. Therefore, an ameliorative password-based authentication scheme is proposed in this paper, achieving to resist off-line password guessing attacks, replay attacks, on-line password guessing attacks, and ID-theft attacks. In light of security, the proposed scheme is provided with good practicability, even over insecure network.
    Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on; 01/2012
  • [Show abstract] [Hide abstract]
    ABSTRACT: The rapid rise and development of the internet has made digitization of our everyday life common. E-medicine, including electronic prescription records, electronic prescriptions, diagnosis information systems, and others are now being regarded as future trends. As development on the structure and format of electronic patient records and prescriptions matures, the implementation of a comprehensive medical information system is imperative, one which is constructed from integrating the various electronic information systems that is being developed. It is important to allow the implementation of such a system applicable to the present medical environment, which facilitates the integration of electronic patient record from all levels of medical centers and clinics, secures the transmission of these integrated patient records between them, enables the combined use of electronic prescriptions with patients' medications, and permits anonymous or confidential transmission of patients' private data. To put the ideas into practice, in this study, we would like to propose an Integrated Medical Information System.
    Journal of Medical Systems 11/2011; 36(5):3103-13. · 1.37 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Rapid development of the Internet and the extensive use of mobile phones have increased demand for mobile devices in Internet auctions. This trend is acting as an incentive to develop an auction model for mobile-based environment. Recently, Kuo-Hsuan Huang proposed a mobile auction agent model (MoAAM), which allows the bidders to participate in online auctions through a mobile agent. He used modular exponentiation operations in his method. As a result, the processing time for key generation, bidding, and verification were long. Thus, we propose to add the concept of Elliptic Curve Cryptosystem (ECC) onto MoAAM, because ECC has low computation amount and small key size, both of which will aid to increase the speed in generating keys, bidding, and verification. In terms of reduction of computation load on mobile devices and auction-manager server, the proposed method will make online auction system more efficient as well as more convenient to use. This paper mainly uses the English auction protocol as the key auction protocol. The protocol consists of four entities: Registration Manager (RM), Agent House (AH), Auction House (AUH), and Bidders (B). The Registration Manager registers and verifies Bidder identity. The Agent House manages the agents and assigns public transaction keys to Bidders. The Auction House provides a place for auction and maintains all necessary operations for a smooth online auction. Bidders are buyers who are interested in purchasing items at the auction. Our proposed method conforms to the requirements of an online auction protocol in terms of anonymity, traceability, no framing, unforgetability, non-repudiation, fairness, public verifiability, unlinkability among various auction rounds, linkability within a single auction round, efficiency of bidding, one-time registration, and easy revocation.
    Expert Systems with Applications 08/2011; 38:9900-9907. · 1.97 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Different patient-related information in medical organizations is the primary reference for medical personnel diagnosing, treating, and caring patients. With the rapid development of information technology, paper-based medical records have gradually been changed to electronic forms. However, different medical organizations present individual system specifications and data-saving formats so that the medical information of the same patient cannot be exchanged, shared, and securely accessed. In order not to largely change the present medical information systems as well as not to increase abundant costs, Virtual Integrated Medical-information Systems (VIMS) is proposed to assist various hospitals in information exchange. Furthermore, with Mobile Agent, the dispersed medical information can be securely integrated. It presents confidentiality, non-repudiation, source authentication, and integrity in network transmission. Virtual Integrated Medical-information Systems (VIMS) is a virtual electronic integration system combined with Mobile Agent technology. With the features of independence, adaptability, mobility, objectives, and autonomy, Mobile Agent is applied to overcome the problems from heterogeneous systems. With the features, the over-dispersed medical records can be integrated. Moreover, Mobile Agent can ensure the instantaneity and usability of medical records from which doctors can make the most appropriate evaluation and diagnoses. It will avoid the waste of medical resources, such as repetition medication, as well as become the reference of further consultation or health check. Not only can it improve the medical care quality, but it can be provided for medical research.
    Journal of Medical Systems 06/2011; 36(5):2731-41. · 1.37 Impact Factor
  • Source
    Tzer-Long Chen, Yu-Fang Chung, Frank Y S Lin
    [Show abstract] [Hide abstract]
    ABSTRACT: Changes in global population and demography, and advances in medicine have led to elderly population growth, creating aging societies from which elderly medical care has evolved. In addition, with the elderly susceptible to chronic diseases, this together with the changing lifestyles of young adults have not only pushed up patient numbers of chronic diseases, but also effected into younger patients. These problems have become the major focus for the health care industry. In response to patient demand and the huge shortage of medical resources, we propose remote healthcare medical information systems that combine patient physiological data acquisition equipment with real-time health care analyses. Since remote health care systems are structured around the Internet, in addition to considering the numerous public systems spread across insecure heterogeneous networks, compatibility among heterogeneous networks will also be another concern. To address the aforementioned issues, mobile agents are adopted. With a mobile agent's characteristics of easy adaptability to heterogeneity and autonomy, the problem of heterogeneous network environments can be tackled. To construct a hierarchical safe access control mechanism for monitoring and control of patient data in order to provide the most appropriate medical treatment, we also propose to use the Chinese Remainder Theorem and discrete logarithm to classify different levels of monitoring staff and hence, to grant permission and access according to their authorized levels. We expect the methods proposed can improve medical care quality and reduce medical resource wastage, while ensuring patient privacy. Finally, security analysis of the system is conducted by simulating a variety of typical attacks, from which it can be concluded that the constructed remote healthcare information system be secure.
    Journal of Medical Systems 04/2011; 36(4):2493-503. · 1.37 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Wireless sensor nodes are congenitally limited by insufficient hardware resources, such as memory size and battery life. These factors influence the lifespan of wireless sensor networks and pose numerous challenges regarding the addition of security mechanisms to protect sensor nodes. As the number of applications using wireless sensor networks increases, protecting sensor nodes from malicious attacks becomes ever more important. In this paper, we propose a new intrusion detection system called the Markovian IDS, to protect sensor nodes from malicious attacks. The Markovian IDS incorporates game theory with anomaly and misuse detection to determine the best defense strategies. It also employs Markov decision processes with an attack-pattern-mining algorithm to predict future attack patterns and implement appropriate measures. Experimental results show that the proposed Markovian IDS has a higher defense success rate than game theory or Markov decision processes alone.
    Information Sciences 01/2011; · 3.89 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The core competencies of a mobile agent includes its ability to roam freely in different Internet environments, its ability to adapt itself to various types of online servers depending on the characteristics of said server, and its ability to detect its environment and automatic adaptation to said environment while executing the tasks that are assigned by the users. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as Internet business, wireless communication, and information security technologies. Akl and Taylor (1983) suggested the concept of superkey to resolve the key management issues faced by the mobile agent. Later, Volker and Mehrdad (1998) proposed a tree base mobile agent model for access control. The proposed scheme is based upon the studies of public key and a hierarchical mobile agent model with addition of Elliptic Curve Cryptosystem (ECC). ECC enhances the operational ability of mobile agent model, because of shorter key length and higher efficiency on encryption and decryption. In addition, after a period of time, due to error or change in the user’s rights, said user will be forced to log out of the system. At the same time, to prevent a user from continuing to use the old key, the system must keep modifying the key so as to change the original access rights of the key, this action could cause unnecessary error and risks, in addition to the large amount of computations that the system needs to perform. Hence, this paper proposes date-constraint key management scheme, where a date is attached to the key, so as to give a validity period to the key. Thus, key management can be more efficient.
    Expert Systems with Applications 12/2010; 37:7721-7728. · 1.97 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
    Journal of Medical Systems 11/2010; 36(3):1673-88. · 1.37 Impact Factor
  • Source
    Tzer-Long Chen, Yu-Fang Chung, Frank Y S Lin
    [Show abstract] [Hide abstract]
    ABSTRACT: Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients' personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.
    Journal of Medical Systems 09/2010; 36(3):1345-57. · 1.37 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Electronic anamnesis is to transform ordinary paper trails to digitally formatted health records, which include the patient's general information, health status, and follow-ups on chronic diseases. Its main purpose is to let the records could be stored for a longer period of time and could be shared easily across departments and hospitals. Which means hospital management could use less resource on maintaining ever-growing database and reduce redundancy, so less money would be spent for managing the health records. In the foreseeable future, building up a comprehensive and integrated medical information system is a must, because it is critical to hospital resource integration and quality improvement. If mobile agent technology is adopted in the electronic anamnesis system, it would help the hospitals to make the medical practices more efficiently and conveniently. Nonetheless, most of the hospitals today are still using paper-based health records to manage the medical information. The reason why the institutions continue using traditional practices to manage the records is because there is no well-trusted and reliable electronic anamnesis system existing and accepted by both institutions and patients. The threat of privacy invasion is one of the biggest concerns when the topic of electronic anamnesis is brought up, because the security threats drag us back from using such a system. So, the medical service quality is difficult to be improved substantially. In this case, we have come up a theory to remove such security threats and make electronic anamnesis more appealing for use. Our theory is to integrate the mobile agent technology with the backbone of electronic anamnesis to construct a hierarchical access control system to retrieve the corresponding information based upon the permission classes. The system would create a classification for permission among the users inside the medical institution. Under this framework, permission control center would distribute an access key to each user, so they would only allow using the key to access information correspondingly. In order to verify the reliability of the proposed system framework, we have also conducted a security analysis to list all the possible security threats that may harm the system and to prove the system is reliable and safe. If the system is adopted, the doctors would be able to quickly access the information while performing medical examinations. Hence, the efficiency and quality of healthcare service would be greatly improved.
    Journal of Medical Systems 07/2010; 36(3):1009-20. · 1.37 Impact Factor

Publication Stats

184 Citations
37.38 Total Impact Points


  • 2002–2013
    • Tunghai University
      臺中市, Taiwan, Taiwan
  • 2004–2011
    • National Taiwan University
      • • Department of Information Management
      • • Department of Electrical Engineering
      Taipei, Taipei, Taiwan
  • 2009
    • Chaoyang University of Technology
  • 2003
    • Da-Yeh University
      • Department of Computer Science and Information Engineering
      Chang-hua Pei-pu, Taiwan, Taiwan