In past two decade, with the mobile communication technology rises rapidly and as well as the pop... more In past two decade, with the mobile communication technology rises rapidly and as well as the popularity of smart phones, tablets and mobile devices. Human’s daily life and habits had a completely changed. Information comes from with many different ways as before. People read paper books or newspapers to get information in the past. Shift to reading from electronic text files or Internet information. Therefore, making the demand for electronic books greatly increased. In this situation, traditional publishers forced to face huge impact and challenges. How to manage the digital rights of e-books effectively has become a serious issue. In this paper, we propose some key issues of of e-book digital copyright management for interesting researchers.
It is useful to verify a legal user from a remote terminal through the Internet with the user aut... more It is useful to verify a legal user from a remote terminal through the Internet with the user authentication schemes based on the smart card. Usually, the remote user has to use his/her identification accompanying the password to access the system. This action is an important scheme to protect the user’s privacy and confidentiality. To achieve the robustness and the efficiency, Chang and Lee proposed a scheme that employs a smart card-based user authentication with the characters of implementation practically and easily. Also, Chang and Lee claim that the scheme could resist the replay attacks, the impersonation attacks, the identity disclosure attacks, and the perfect forward secrecy. However, this work shows that the scheme is in the risk with an on-line guessing identity and password attacks and denial of service attack. Hence, in this paper, it proposes an improved user authentication scheme that holds the capacity to withstand the vulnerability as that in Chang-Lee’s smart card...
Correct use of home appliances is intended to avoid property damage and life unsafety. Also, seri... more Correct use of home appliances is intended to avoid property damage and life unsafety. Also, serious fire accidents must affect the safety of one’s neighborhood. Therefore, this study uses the Internet of Things (IoT) platform to build an intelligent system that aims to measure the temperature rise of home appliances, which is employed to monitor the usage states of home appliances in real time. Hereby, the microcontroller, Node Micro Control Unit (NodeMCU-32S), is used to develop an IoT platform combined with sensors for measuring AC voltage, current, and ambient temperature so that the electrical power and temperature rise of load can be detected. Meanwhile, the smart measurement system is integrated with mobile devices to upload the detected datasets to the Google cloud database system. Thus, it can be used as samples for future calibration of system parameters with machine learning. Moreover, the verification of feasibility and soundness of a system model is performed by using P...
Journal of Corporate Governance, Insurance, and Risk Management
Online social support perceived by Facebook users and its effect on stress coping were examined i... more Online social support perceived by Facebook users and its effect on stress coping were examined in this study with a sample of 518 college students, who completed a conventional or online survey form, in which they responded to items regarding demographic information, Facebook use, social support from Facebook friends, resilience, and feeling of stress. Four important findings were found: First, the participants reported having received more information and appraisal support than emotional support. Second, Facebook users who frequently used embedded services (i.e., News Feed, Photos, Events, Groups, and Chat) reported having received greater levels of social support than those who occasionally or seldom used these services. Third, Facebook users’ perceived social support and resilience were positively correlated with each other, and were both negatively correlated with feeling of stress. Finally, Facebook social support significantly accounted for the variability of stress, after ta...
This paper describes a quasi-experiment that examined the effect of school-based adventure educat... more This paper describes a quasi-experiment that examined the effect of school-based adventure education on students' problem-solving skills. Two classes of 6th-grade students were randomly assigned to an experimental group (EG) or a control group (CG). While CG students were attending their regular curriculum of Integrated Activities and Learning, EG students participated in a 6-week school-based adventure education program composed by 18 activity units, each featuring a portable low-risk adventure activity. Prior to and after the experiment, both EG and CG were administered the New Edition of Problem-Solving Test (Chan & Wu, 2007), which yielded three mini-test scores (defining the cause, solving the problem, and preventing the problem) and two dimension scores (flexibility and effectiveness). In order to examine whether EG outperformed CG on the five measures of problem solving, the participants' performance on the problem-solving test at the end of the experiment was analyze...
Advances in Intelligent, Interactive Systems and Applications, 2019
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan... more In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the data in the portable reader. Their protocol based on serverless RFID system includes the design of a secure protocol to protect the data of the portable reader. Even if the portable reader is lost, the adversary still cannot obtain useful information from it. However, we will show that their protocol was not designed to resist denial of service, de-synchronization, and tracking in this paper.
Cooperative system is a tendency for the future communications because of its spatial diversity t... more Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing resource. It is not practical for the applications with a limited computing ability, such as IoT. According to Shannon theory of perfect secrecy, the security could be implemented on the physical layer. Based on the positive secrecy rate, the secure communication could be practical. This work concentrates on the theoretical solution to the secrecy rate in the AF mode cooperative communication system. Also, the numerical results are given. It shows the effects of eavesdropper could not affect the secure communication if the number of the eavesdropper is less than that of relays in the system. The appropriate relay assignment benefits the...
2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2021
Based on Shannon's Theory, positive secrecy capacity could support secure communication. The ... more Based on Shannon's Theory, positive secrecy capacity could support secure communication. The LEO satellite system is proposed for internet service. The issues of privacy and security become progressively important in internet applications. Conventionally, the security scheme is applied to the highernetwork layer. However, the fundamental ability of the physical layer to provide secure transmission. This work leads the encryption to code and to analyze the security rate in the LEO system. The coding scheme with memory aided could provide a positive secrecy capacity of the system.
ABSTRACT More and more people are entering the cryptocurrency market after Bitcoin (BTC) soared t... more ABSTRACT More and more people are entering the cryptocurrency market after Bitcoin (BTC) soared to nearly USD 20,000 in 2017. To promote the development of information technology and cryptocurrency marketing, various computerized systems integrating information technology with investment and financing are innovated continuously. In this study, the daily cryptocurrency prices were input to Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM); and the developing trend plots were drawn to predict and analyze the future cryptocurrency prices through deep learning. Finally, the business practices of cryptocurrency investment were modularized based on High-Level Fuzzy Petri Nets (HLFPNs) to make a better investment decision so that all investors can use this decision system to quickly understand the future cryptocurrency trend. The experimental results have shown that this decision system can provide effective investment information to achieve investors’ personal financial goals with the expectation of improving financial situations.
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013
In wireless networks, the cooperative relaying that provides a spatial diversity and improves the... more In wireless networks, the cooperative relaying that provides a spatial diversity and improves the performance of system is a tendency in the future communications. There are three strategies in the cooperative communications. One is Amplify-and-Forward (AF) mode. Another is Decode-and-Forward (DF) mode and the other is Compress and Forward (CF) mode. Comparing with these three kind modes, AF mode is with the low complexity to implement. Consider the Raleigh fading environment where there are one information source, M relay stations and N destinations. The downlink signal includes two parts. One is from the source and the other comes from the relay stations. In order to achieve the maximum throughput in the system, it should obtain the maximum mutual information between the source and the destination. Hence, how to select an optimal relay station is important in the cooperative communications. This project proposes a relay selection algorithm with Amplify-and-Forward mode employed. The optimal selection scheme is based on the exhaustive search method. It is easy to be realized with a high computational complexity. In order to reduce the computational complexity, the relay station selection scheme with a maximum mutual information finding is proposed. With different relay station selection schemes, the performances are given for comparison.
A linear iterative turbo equalizer (LITE) with code aided scheme is presented to be employed in a... more A linear iterative turbo equalizer (LITE) with code aided scheme is presented to be employed in a fading channels. A method is proposed for exploiting transmittal diversity within a parallel independent fading channel together with an iterative equalizing receiver. The structure of the equalizer combines LITE, encoding, decoding interleaving, and de-interleaving schemes. The code-aided LITE employs encoding and interleaving at the transmitter and passes a priori information on the transmitted symbols between decode outputs at the receiver. The performance of a code-aided LITE is evaluated by means of computer simulation. It shows the proposed code-aided equalizer functions benefits a better system performance in the fading channel.
In past two decade, with the mobile communication technology rises rapidly and as well as the pop... more In past two decade, with the mobile communication technology rises rapidly and as well as the popularity of smart phones, tablets and mobile devices. Human’s daily life and habits had a completely changed. Information comes from with many different ways as before. People read paper books or newspapers to get information in the past. Shift to reading from electronic text files or Internet information. Therefore, making the demand for electronic books greatly increased. In this situation, traditional publishers forced to face huge impact and challenges. How to manage the digital rights of e-books effectively has become a serious issue. In this paper, we propose some key issues of of e-book digital copyright management for interesting researchers.
It is useful to verify a legal user from a remote terminal through the Internet with the user aut... more It is useful to verify a legal user from a remote terminal through the Internet with the user authentication schemes based on the smart card. Usually, the remote user has to use his/her identification accompanying the password to access the system. This action is an important scheme to protect the user’s privacy and confidentiality. To achieve the robustness and the efficiency, Chang and Lee proposed a scheme that employs a smart card-based user authentication with the characters of implementation practically and easily. Also, Chang and Lee claim that the scheme could resist the replay attacks, the impersonation attacks, the identity disclosure attacks, and the perfect forward secrecy. However, this work shows that the scheme is in the risk with an on-line guessing identity and password attacks and denial of service attack. Hence, in this paper, it proposes an improved user authentication scheme that holds the capacity to withstand the vulnerability as that in Chang-Lee’s smart card...
Correct use of home appliances is intended to avoid property damage and life unsafety. Also, seri... more Correct use of home appliances is intended to avoid property damage and life unsafety. Also, serious fire accidents must affect the safety of one’s neighborhood. Therefore, this study uses the Internet of Things (IoT) platform to build an intelligent system that aims to measure the temperature rise of home appliances, which is employed to monitor the usage states of home appliances in real time. Hereby, the microcontroller, Node Micro Control Unit (NodeMCU-32S), is used to develop an IoT platform combined with sensors for measuring AC voltage, current, and ambient temperature so that the electrical power and temperature rise of load can be detected. Meanwhile, the smart measurement system is integrated with mobile devices to upload the detected datasets to the Google cloud database system. Thus, it can be used as samples for future calibration of system parameters with machine learning. Moreover, the verification of feasibility and soundness of a system model is performed by using P...
Journal of Corporate Governance, Insurance, and Risk Management
Online social support perceived by Facebook users and its effect on stress coping were examined i... more Online social support perceived by Facebook users and its effect on stress coping were examined in this study with a sample of 518 college students, who completed a conventional or online survey form, in which they responded to items regarding demographic information, Facebook use, social support from Facebook friends, resilience, and feeling of stress. Four important findings were found: First, the participants reported having received more information and appraisal support than emotional support. Second, Facebook users who frequently used embedded services (i.e., News Feed, Photos, Events, Groups, and Chat) reported having received greater levels of social support than those who occasionally or seldom used these services. Third, Facebook users’ perceived social support and resilience were positively correlated with each other, and were both negatively correlated with feeling of stress. Finally, Facebook social support significantly accounted for the variability of stress, after ta...
This paper describes a quasi-experiment that examined the effect of school-based adventure educat... more This paper describes a quasi-experiment that examined the effect of school-based adventure education on students' problem-solving skills. Two classes of 6th-grade students were randomly assigned to an experimental group (EG) or a control group (CG). While CG students were attending their regular curriculum of Integrated Activities and Learning, EG students participated in a 6-week school-based adventure education program composed by 18 activity units, each featuring a portable low-risk adventure activity. Prior to and after the experiment, both EG and CG were administered the New Edition of Problem-Solving Test (Chan & Wu, 2007), which yielded three mini-test scores (defining the cause, solving the problem, and preventing the problem) and two dimension scores (flexibility and effectiveness). In order to examine whether EG outperformed CG on the five measures of problem solving, the participants' performance on the problem-solving test at the end of the experiment was analyze...
Advances in Intelligent, Interactive Systems and Applications, 2019
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan... more In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the data in the portable reader. Their protocol based on serverless RFID system includes the design of a secure protocol to protect the data of the portable reader. Even if the portable reader is lost, the adversary still cannot obtain useful information from it. However, we will show that their protocol was not designed to resist denial of service, de-synchronization, and tracking in this paper.
Cooperative system is a tendency for the future communications because of its spatial diversity t... more Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing resource. It is not practical for the applications with a limited computing ability, such as IoT. According to Shannon theory of perfect secrecy, the security could be implemented on the physical layer. Based on the positive secrecy rate, the secure communication could be practical. This work concentrates on the theoretical solution to the secrecy rate in the AF mode cooperative communication system. Also, the numerical results are given. It shows the effects of eavesdropper could not affect the secure communication if the number of the eavesdropper is less than that of relays in the system. The appropriate relay assignment benefits the...
2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2021
Based on Shannon's Theory, positive secrecy capacity could support secure communication. The ... more Based on Shannon's Theory, positive secrecy capacity could support secure communication. The LEO satellite system is proposed for internet service. The issues of privacy and security become progressively important in internet applications. Conventionally, the security scheme is applied to the highernetwork layer. However, the fundamental ability of the physical layer to provide secure transmission. This work leads the encryption to code and to analyze the security rate in the LEO system. The coding scheme with memory aided could provide a positive secrecy capacity of the system.
ABSTRACT More and more people are entering the cryptocurrency market after Bitcoin (BTC) soared t... more ABSTRACT More and more people are entering the cryptocurrency market after Bitcoin (BTC) soared to nearly USD 20,000 in 2017. To promote the development of information technology and cryptocurrency marketing, various computerized systems integrating information technology with investment and financing are innovated continuously. In this study, the daily cryptocurrency prices were input to Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM); and the developing trend plots were drawn to predict and analyze the future cryptocurrency prices through deep learning. Finally, the business practices of cryptocurrency investment were modularized based on High-Level Fuzzy Petri Nets (HLFPNs) to make a better investment decision so that all investors can use this decision system to quickly understand the future cryptocurrency trend. The experimental results have shown that this decision system can provide effective investment information to achieve investors’ personal financial goals with the expectation of improving financial situations.
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013
In wireless networks, the cooperative relaying that provides a spatial diversity and improves the... more In wireless networks, the cooperative relaying that provides a spatial diversity and improves the performance of system is a tendency in the future communications. There are three strategies in the cooperative communications. One is Amplify-and-Forward (AF) mode. Another is Decode-and-Forward (DF) mode and the other is Compress and Forward (CF) mode. Comparing with these three kind modes, AF mode is with the low complexity to implement. Consider the Raleigh fading environment where there are one information source, M relay stations and N destinations. The downlink signal includes two parts. One is from the source and the other comes from the relay stations. In order to achieve the maximum throughput in the system, it should obtain the maximum mutual information between the source and the destination. Hence, how to select an optimal relay station is important in the cooperative communications. This project proposes a relay selection algorithm with Amplify-and-Forward mode employed. The optimal selection scheme is based on the exhaustive search method. It is easy to be realized with a high computational complexity. In order to reduce the computational complexity, the relay station selection scheme with a maximum mutual information finding is proposed. With different relay station selection schemes, the performances are given for comparison.
A linear iterative turbo equalizer (LITE) with code aided scheme is presented to be employed in a... more A linear iterative turbo equalizer (LITE) with code aided scheme is presented to be employed in a fading channels. A method is proposed for exploiting transmittal diversity within a parallel independent fading channel together with an iterative equalizing receiver. The structure of the equalizer combines LITE, encoding, decoding interleaving, and de-interleaving schemes. The code-aided LITE employs encoding and interleaving at the transmitter and passes a priori information on the transmitted symbols between decode outputs at the receiver. The performance of a code-aided LITE is evaluated by means of computer simulation. It shows the proposed code-aided equalizer functions benefits a better system performance in the fading channel.
Uploads