Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fuu-Cheng Jiang is active.

Publication


Featured researches published by Fuu-Cheng Jiang.


The Journal of Supercomputing | 2012

Lifetime elongation for wireless sensor network using queue-based approaches

Fuu-Cheng Jiang; Der-Chen Huang; Chao-Tung Yang; Fang-Yie Leu

A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as an energy hole problem (EHP). From open literatures, most research works have focused on how to optimally increase the probability of sleeping states using various wake-up strategies. In this article, we propose a novel power-saving scheme to alleviate the EHP based on the N-policy M/M/1 queuing theory. With little or no extra management cost, the proposed queue-based power-saving technique can be applied to prolong the lifetime of the WSN economically and effectively. A mathematical analysis on the optimal control parameter has been made in detail. Focusing on many-to-one WSN, numerical and network simulation results validate that the proposed approach indeed provides a feasibly cost-effective approach for lifetime elongation of WSN.


Future Generation Computer Systems | 2015

Accessing medical image file with co-allocation HDFS in cloud

Chao-Tung Yang; Wen-Chung Shih; Lung-Teng Chen; Cheng-Ta Kuo; Fuu-Cheng Jiang; Fang-Yie Leu

Patient privacy has recently become the most important issue in the World Health Organization (WHO) and the United States and Europe. However, inter-hospital medical information is currently shared using paper-based operations, and this is an important research issue for the complete and immediate exchange of electronic medical records to avoid duplicate prescriptions or procedures. An electronic medical record (EMR) is a computerized medical record created by a care-giving organization, such as a hospital and doctors surgery. Using electronic medical records can improve patients privacy and health care efficiency. Although there are many advantages to electronic medical records, the problem of exchanging and sharing medical images remains to be solved. The motivation of this paper is to attempt to resolve the problems of storing and sharing electronic medical records and medical images between different hospitals. Cloud Computing is enabled by the existing parallel and distributed technology, which provides computing, storage and software services to users. Specifically, this study develops a Medical Image File Accessing System (MIFAS) based on HDFS of Hadoop in cloud. The proposed system can improve medical imaging storage, transmission stability, and reliability while providing an easy-to-operate management interface. This paper focuses on the cloud storage virtualization technology to achieve high-availability services. We have designed and implemented a medical imaging system with a distributed file system. The experimental results show that the high reliability data storage clustering and fault tolerance capabilities can be achieved. The motivation of this paper is to attempt to resolve the problems of storing and sharing electronic medical records and medical images between different hospitals.Specifically, this study develops a Medical Image File Accessing System (MIFAS) based on HDFS of Hadoop in cloud.The proposed system can improve medical imaging storage, transmission stability, and reliability while providing an easy-to-operate management interface.This paper focuses on the cloud storage virtualization technology to achieve high-availability services.The experimental results show that the high reliability data storage clustering and fault tolerance capabilities can be achieved.


Future Generation Computer Systems | 2014

A method for managing green power of a virtual machine cluster in cloud

Chao-Tung Yang; Jung-Chun Liu; Kuan-Lung Huang; Fuu-Cheng Jiang

Abstract A green power management scheme is proposed to determine how many physical machines should be run or turned off based on the gross occupied resource weight ratio of the virtual machine cluster. The gross occupied resource weight ratio is defined as the ratio of the sum of resource weights of all virtual machines over the sum of available resource weights of all running physical machines. When the gross occupied resource weight ratio is greater than the maximum tolerant occupied resource weight ratio, preset to ensure quality of service, a standby physical machine in the non-running physical machines is selected and wakened up to join as one of the running physical machines. On the other hand, when the gross occupied resource weight ratio is less than the minimum critical occupied resource weight ratio, preset to trigger energy saving algorithms, one of the running physical machines, selected as a migration physical machine with the virtual machines therein removed after live migration, is moved from other running physical machines, and then turned off. As a result, a resource allocation process is realized to distribute loads of the running physical machines such that the total number of the running physical machines can be flexibly dispatched to achieve the objective of green power management.


ad hoc networks | 2014

Lifetime elongation of ad hoc networks under flooding attack using power-saving technique

Fuu-Cheng Jiang; Chu-Hsing Lin; Hsiang-Wei Wu

Without the management of centralized unit, mobile ad hoc networks (MANETs) are vulnerable to security threats from flooding attacks launched through compromised nodes or intruders. When a source node needs a data session with a destination node, it disseminates a route request (RREQ) message to its neighbors in a hop-by-hop manner. One crucial type of flooding attacks called RREQ flooding appears to be inevitably proliferated in wireless networks. In the RREQ flooding attack, attackers would launch massive RREQ packets with out-of-domain IP address as its destination node. The forwarding services conducted by all intermediate nodes exhaust their energy and processing resources. The proposed approach can suppress redundant RREQ packets using the co-operation of destination node and neighbor nodes within one-hop range of the attacking node. A Petri Net design was developed to model the proposed approach and configure all relevant system aspects in a concise fashion for qualitative analysis. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator. The experimental result reveals that the proposed power-saving technique can be applied to economically and effectively elongate the operational lifetime of MANETs under flooding attack.


Future Generation Computer Systems | 2010

Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies

Fang-Yie Leu; Chao-Tung Yang; Fuu-Cheng Jiang

In this work, we propose a Grid-based intrusion detection platform, named Enhanced Dynamic Grid Intrusion Detection Environment (E-DGIDE), which is an extension of our previous system, DGIDE. The DGIDE exploits a Grids dynamic and abundant computing resources to detect intrusion packets. The E-DGIDE is a fault-tolerant platform that provides three types of standby mechanisms to prevent itself from crashing. The first two types are hot standby in which the standby subsystem performs the same task as its working subsystem. When the working subsystem fails, the standby takes over the current task immediately with less delay and without information passing. The other is cold standby. When the working subsystem cannot work properly, the E-DGIDE notifies the standby subsystem to take over. With these mechanisms, the reliability of an ordinary security system can be improved.


international conference on queueing theory and network applications | 2009

Design approaches for optimizing power consumption of sensor node with N-policy M/G/1 queuing model

Fuu-Cheng Jiang; Der-Chen Huang; Kuo-Hsiung Wang

Energy saving is an important issue in wireless sensor networks for majority of sensor nodes equipped with non-rechargeable batteries. For increasing the lifetime of sensor networks, each node must conserve energy as much as possible. To prolong the lifetime of sensor nodes, most research works have focused on how to optimally increase the probability of sleeping states using multifarious wake-up strategies. Making things different, in this article, we propose a novel optimization framework for power consumption of sensor node with the N-policy M/G/1 queuing approach. There is a heavy overhead for packet collisions and channel contention resulting from restarting the process of medium contention. Based on the theory of N-policy M/G/1 queuing system with general startup time, our framework can be incorporated with most of existing MAC protocols to improve power consumption by alleviating total number of medium-contention throughout the lifetime of a generic sensor node. To meet the mission requirements in sensor networks, the proposed approach can also provide a design guideline for the sensor administrator to optimize relevant system parameters including power consumption and latency delay.


parallel and distributed computing applications and technologies | 2013

Implementation of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack

Chao-Tung Yang; Yu-Tso Liu; Jung-Chun Liu; Chih-Liang Chuang; Fuu-Cheng Jiang

In this work, we particularly focus on the use of free open-source software, so that end users do not need to spend a huge amount of software license fees. For cloud computing, virtualization technology delivers numerous benefits in addition to being one of the basic roles to build a cloud environment. By virtualization, enterprises can maximize working efficiency without the need to install more facilities in the computer room. In this study, we implemented a virtualization environment and performed experiments on it. The main subject of it is how to use the Open Stack open-source software to build a cloud infrastructure with high availability and a dynamic resource allocation mechanism. It provides a private cloud solution for business and organizations. It belongs to Infrastructure as a Service (IaaS), one of the three service models in the cloud. For the part of the user interface, a web interface was used to reduce the complexity of access to cloud resources for users. We measured the performance of live migration of virtual machines with different specifications and analyzed the data. Also according to live migration modes, we wrote an algorithm to solve the traditional migration problem that needs manually determining whether the machine load is too heavy or not, as a result, the virtual machine load level is automatically detected, and the purpose of automatic dynamic migration to balance resources of servers is achieved.


intelligent information hiding and multimedia signal processing | 2008

An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks

Chu-Hsing Lin; Jung-Chun Liu; Fuu-Cheng Jiang; Chien-Ting Kuo

A Distributed Denial-of-Service attack affects the bandwidth or resources of a targeted system. By flooding networks and disrupting access to services, it may cause damage on multimedia network services and Internet Service Providers. In the paper, we propose to analyze the behavior of packet flows and adopt a priority queue-based algorithm that assign packets from normal users to a high priority queue and packets from suspected attackers to a low priority queue. Simulations in network simulator, NS2, prove our proposed priority queue-based scheme is effective in blocking attacking traffic while maintaining constant flows for legitimate users.


Computing | 2016

On construction of a distributed data storage system in cloud

Chao-Tung Yang; Wen-Chung Shih; Chih-Lin Huang; Fuu-Cheng Jiang; William C. Chu

In the past, people have focused on cluster computing and grid computing. Now, however, this focus has shifted to cloud computing. Irrespective of what techniques are used, there are always storage requirements. The challenge people face in this area is the huge amount of data to be stored, and its complexity. People are now using many cloud applications. As a result, service providers must serve increasingly more people, causing more and more connections involving substantially more data. These problems could have been solved in the past, but in the age of cloud computing, they have become more complex. This paper focuses on cloud computing infrastructure, and especially data services. The goal of this paper is to implement a high performance and load balancing, and able-to-be-replicated system that provides data storage for private cloud users through a virtualization system. This system extends and enhances the functionality of the Hadoop distributed system. The proposed approach also implements a resource monitor of machine status factors such as CPU, memory, and network usage to help optimize the virtualization system and data storage system. To prove and extend the usability of this design, a synchronize app was also developed running on Android based on our distributed data storage.


broadband and wireless computing, communication and applications | 2010

Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques

Fuu-Cheng Jiang; Hsiang-Wei Wu; Der-Chen Huang; Chu-Hsing Lin

A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as an energy hole problem (EHP). The EHP is an embedded risk and would compromise the lifetime security of WSN. From open literatures, most research works have focused on how to optimally increase the probability of sleeping states using various wake-up strategies to prolong the lifetime of WSN. In this article, we propose a novel power-saving scheme to alleviate the EHP based on the N-policy queuing theory. With little or no extra management cost, the proposed queue-based power-saving technique can be applied to prolong the lifetime of the WSN economically and effectively. A mathematical analysis on the optimal control parameter has been made. Numerical and network simulation results validate that the proposed approach indeed provides a feasibly cost-effective scheme for improving the lifetime security of WSN.

Collaboration


Dive into the Fuu-Cheng Jiang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Der-Chen Huang

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Hsiang-Wei Wu

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kuo-Hsiung Wang

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi-Ju Chiang

National Chung Hsing University

View shared research outputs
Researchain Logo
Decentralizing Knowledge