Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dong-Her Shih is active.

Publication


Featured researches published by Dong-Her Shih.


Computer Communications | 2006

Short survey: Taxonomy and survey of RFID anti-collision protocols

Dong-Her Shih; Po-Ling Sun; David C. Yen; Shi-Ming Huang

Due to the limitless possibilities and low cost, Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at the same time. The tags can collide and cancel each other out, leading to retransmission of tag IDs that results in wastage of bandwidth and an increase in the total delay. Besides, readers physically located near one another may interfere with one anothers operation. Such reader collision must be minimized to ensure the current operation of the RFID system. The main focus of this paper is to survey the collision resolution protocols for multi-access communication and the algorithms that calculate how to minimize reader-to-reader interference. A comparative view of surveyed protocol was concluded for the collision problem in RFID systems.


Journal of Global Information Management | 2008

An Empirical Study of Factors Affecting RFID's Adoption in Taiwan

Dong-Her Shih; Yuh-Wen Chiu; She-I Chang; David C. Yen

RFID technologies represent a common standard for data storage and retrieval that could improve collaboration and data sharing between non-competing organizations. With the advent of RFID (radio frequency identification), organizations have the opportunity to rethink how their organization will be. Unlike companies in the United States and Europe which are mandated by large retailers or government departments, most Taiwan companies are investing in RFID without pressure. The article explores the factor affecting radio frequency identification adoption applications in Taiwan. Its objective is to summarize the ways in which organizations are thinking about their possible uses in a wide variety of companies and industries. An empirical investigation (n=134) found seven factors affecting RFID adoption within Taiwan. They are operation efficiency, manufacturing efficiency and supply chain efficiency, organization context, investment cost, market environment, and technology characteristic. By providing insight into these important factors, this article can help further understanding of their role in the adoption and use of RFID. The theoretical and practical implications of these results are discussed.


Computer Standards & Interfaces | 2004

Bluetooth technology: an exploratory study of the analysis and implementation frameworks

Andrew Dursch; David C. Yen; Dong-Her Shih

Abstract Bluetooth is still a relatively new technology to the wireless world. It is designed for wireless communication between a wide variety of different Bluetooth enabled devices; from computers and PDAs to GPS systems and heart monitoring devices. There are a growing number of companies continually adopting this technology. As Bluetooth becomes a standard feature in many products that we use everyday, it seems that the use of the technology will grow even faster in the future. This paper provides an analysis of the technologys features and how companies should go about deciding if they should adopt Bluetooth or another wireless alternative. First, the paper talks about what Bluetooth is and how it compares with other wireless standards. It then goes into an analysis of how feasible integrating Bluetooth into a business would be, and how some industries are already using the technology. These case studies are followed by a look at what steps need to be taken through the implementation cycle, and deciding what technology makes a better fit for a business. The paper ends with a look at the pros and cons of Bluetooth, as well as a look into what the future may hold for this technology.


Computer Standards & Interfaces | 2005

A new reverse auction agent system for m-commerce using mobile agents

Dong-Her Shih; Shin-Yi Huang; David C. Yen

In order to get the goods, a buyer must search for the items through several auction sites in Internet. When the auction starts, the buyer needs to connect to these auction sites frequently so that he can monitor the bid states and re-bid. In this paper, we propose an automated negotiation model between two participants, for m-commerce, using collaborative mobile agents called mobile reverse auction agent system (MoRAAS), which mediates between the buyer and the sellers and executes bidding asynchronously and autonomously. This reduces the network load and offers more intelligent bidding. A new double encryption key chain technique and a new RVAP protocol are proposed to achieve unconditional bid privacy. Every losing bidder can control the privacy of their own bids while no trust is needed. Computational cost of our RVAP protocol is reduced by avoiding the costly verifiable encryption technique.


Information Sciences | 2005

Classification methods in the detection of new malicious emails

Dong-Her Shih; Hsiu-Sen Chiang; C. David Yen

A serious security threat today is malicious emails, especially new, unseen Internet worms and viruses often arriving as email attachments. These new malicious emails are created at the rate of thousands every year. Current anti-virus systems attempt to detect these new malicious email viruses with signatures generated by hand but it is often times costly. In this paper, we present some classification methods that detect new, unseen malicious emails accurately and automatically. The classification method found discrepancy behaviors in data set and use these behaviors to detect new malicious email viruses. Comparison results show the accuracy in the detection of new malicious emails. In order to improve the detection accuracy, the prototype of the bagged classifier is utilized in the implementation of our malicious email detection system.


Information Sciences | 2006

A secure reverse Vickrey auction scheme with bid privacy

Dong-Her Shih; Hsin-Yi Huang; David C. Yen

In recent years auctions have become more and more important in the field of multi-agent systems as useful mechanisms for resource allocations, task assignments and electronic commerce. In this paper, we concentrate on the use of the reverse Vickrey auction for task assignment scenarios and propose a novel RVP auction protocol as a method to solve problems to bid privacy in reverse Vickrey auctions. A verifiable technique of encryption key chain is used to find the second lowest bid without revealing the losing bid and unnecessary information. Through analysis, it is verified that our new scheme is robust against cheating bidders.


International Journal of Human-computer Interaction | 2012

Exploring the Individual's Behavior on Self-Disclosure Online

Dong-Her Shih; Sheng-Fei Hsu; David C. Yen; Chia-Chia Lin

Even though the ubiquity of technology can make many aspects of life more convenient, it may simultaneously raise some concerns about the privacy issues related to personal information. This research focused on the individuals behavior toward self-disclosure online and his or her cognition on personal privacy that was affected by not only the personal psychological factors but also the individuals computer knowledge and associated skills. To study how technological and psychological factors can simultaneously affect ones privacy concern and restrain behavior on disclosure, this study applied both perceived privacy and privacy concern to assess such factors as personal subjective attitude, computer self-efficacy, and perceived behavioral control to investigate the technological influence. A hypothesized model was proposed to describe the relationships among these constructs. After structural equation modeling is utilized to analyze the proposed hypotheses, the research findings showed that, although the perceived behavioral control had a negative effect on self-disclosure online, all the other hypotheses indicated a positive casual effect.


Expert Systems With Applications | 2011

An implementation and evaluation of recommender systems for traveling abroad

Dong-Her Shih; David C. Yen; Ho-Cheng Lin; Ming-Hung Shih

The improvement of information technology makes storage no longer a problem. In addition, the birth of the Internet makes information transfer faster than ever. It brings us convenient life. However, more and more information result in a new problem, which is information overload. Today, many more people are traveling abroad since they no longer have to work on weekends. Traveling abroad has become a kind of trend. There are more than a hundred countries in the world worth to travel, and there is so much information available that it makes a travelers decision extremely difficult to make. In our research, we try to implement the most common three kinds of recommender system techniques in order to recommend to customers which countries are the best traveling locations for them. Thus, we can save travelers a lot of time when deciding where to go. From our experiment and evaluation, we find that a hybrid recommender system is a better technique in recommendation according to our abroad database, and it conquers the shortcomings of content-based filtering and collaborative filtering approaches.


Computers & Security | 2011

A secure multi-item e-auction mechanism with bid privacy

Dong-Her Shih; David C. Yen; Chih-Hung Cheng; Ming-Hung Shih

The recent focus within the auction field has been multi-item auctions where bidders are not restricted to buying only one item of the merchandise. It has been of practical importance in Internet auction sites and has been widely executed by them. In this paper, we concentrate on the use of the multi-item auction for task assignment scenarios and propose a novel PUPA auction protocol to solve the problem of bid privacy in multi-item auctions. A verifiable technique of shared key chain is proposed to find the winners without revealing the losing bid and bidders privacy. It can be shown that our new scheme is robust against cheating bidders.


Cartography and Geographic Information Science | 2016

Personal mobility pattern mining and anomaly detection in the GPS era

Dong-Her Shih; Ming-Hung Shih; David C. Yen; Jia-Hung Hsu

Abstract Suffering from Alzheimer’s disease has become one of the critical health issues today. If an abnormal time–space pattern of such patients can be detected earlier, it will help the families to prevent some dangerous situations in advance. We have proposed a method in this study to uncover personal mobility patterns and detect abnormal behavior patterns from mobility data obtained with global position system (GPS). Experimental results showed that our proposed method is far better than other alternatives available. This proposed approach may thus render great assistance in identifying abnormal behavior, thus providing critical remedy actions in advance in this GPS era.

Collaboration


Dive into the Dong-Her Shih's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ming-Hung Shih

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Hsiu-Sen Chiang

National Taichung University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Shi-Ming Huang

National Chung Cheng University

View shared research outputs
Top Co-Authors

Avatar

Che-Lun Chang

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Chih-Hung Cheng

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Ho-Cheng Lin

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hsiang-Yuan Hsueh

National Chung Cheng University

View shared research outputs
Top Co-Authors

Avatar

Hsin-Yi Huang

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jia-Hung Hsu

National Yunlin University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge