Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meng-Yen Hsieh is active.

Publication


Featured researches published by Meng-Yen Hsieh.


Telecommunication Systems | 2015

Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments

Hua-Yi Lin; Meng-Yen Hsieh; Kuan-Ching Li

Nowadays, cloud computing becomes a popular technology which combines resources of numerous physical computers and servers to perform distributed computing. The main benefit of cloud computing is that this technology decreases computing costs and infrastructures, allowing much more efficient computing. Through a portal, users submit working tasks and receive the results without assigning to specific servers. Nevertheless, the computers of users and enterprises are located in cloud, and arbitrary clients can randomly log on and take private data away. Thus, the cloud security becomes a significant subject. In this paper, we exploit the threshold crypto sharing (Desmedt and Frankel in Advances in cryptology—CRYPTO’89, 1990) with group signature mechanism to secure transmitted data. During map and reduce phases, this mechanism can protect the divided and merged messages from being tampered with. Additionally, this study exploits a virtual machine platform to simulate cloud computing environments and then perform security operations. Experimental results show that the mechanism presented has lower cost comparing to other existing ones and very promising its application in cloud environments.


autonomic and trusted computing | 2012

A Mobile Application Framework for Rapid Integration of Ubiquitous Web Services

Meng-Yen Hsieh; Hua-Yi Lin; Ching-Hung Yeh; Kuan-Ching Li; Bo-Shiung Wu

This paper describes a mobile application framework with multimodal dialogues to integrate ubiquitous web services. We implement a tourism widget based on Android platform with dynamic HTTP-based REST service on Internet by following the proposed framework. Generally, to obtain linked data or resource from external HTTP-based service could be as simple as the establishment of remote services with an internal data repository supervised by producers. We discuss the complexity and usability of integration between the widget and internal or external web services in the framework. The widget provides not only the tour-based inquiry services by web services but also the maintenance of individual tour schemes with a number of dialogue interfaces. Three categories of components are constructed to process user inquiry, then to obtain responses through the usability of web services or from local backup dataset. As experience results, data exchange with different formats between the widget and server-side web services are emulated.


Archive | 2012

Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme

Hua-Yi Lin; Che-Yu Yang; Meng-Yen Hsieh

With the fast development of the internet network, combining the structure of distributing operation is paid attention to gradually. Especially on Internet, numerous personal computers share their resources such as CPU, memory, disk and network with each other. Cloud computing exploits this advantage of integrating with many operational resources over Internet to reach borderless services. Additionally, cloud computing owns strong arithmetic capacity. Through login, users perform any program [1, 2] and carry out the expected operation result. However, personal computers are exposed to open environments, and arbitrarily accept anonymous users to sign in and take personal information away. Therefore, the security issue of cloud computing becomes an important challenge. At present, most of cloud computing exploit Map and Reduce functions to perform divide and merge message respectively that lack information protection mechanisms. This study proposes a secure Map Reduce mechanism using a threshold secret sharing scheme to enhance the security of transmitted data.


Eurasip Journal on Wireless Communications and Networking | 2011

Secure protocols for data propagation and group communication in vehicular networks

Meng-Yen Hsieh; Hua-Yi Lin; Chin-Feng Lai; Kuan-Ching Li

Vehicular networks are organized with high-mobility vehicles, which are a challenge to key agreement and secured communication among vehicles; hence, efficient cryptography schemes for lightweight ciphers are essential. Many security schemes for vehicular networks particularly take the secure propagation of traffic-related information into account. Group communication is desirable in vehicular networks, while groups of friends drive the vehicles to travel together. In this study, it is applied an asymmetric key mechanism and a group-based Elliptic Curve cryptograph to authenticate data propagation as also to individually secure group communication. The data propagation includes a flooding delay mechanism, where each vehicle participant in the propagation calculates an individual delay for propagation. As groups of vehicles move on the roadway toward same destinations, two alternative schemes of group key agreement in vehicle-to-vehicle and vehicle-to-infrastructure modes are proposed to secure group communication among the vehicles. Security analysis results present that the proposed schemes can effectively prevent malicious vehicle from participating in vehicular communications. Evaluation results show that the propagation delay mechanism can effectively reduce broadcast collision, and the delay results of the group key agreement schemes are acceptable.


Multimedia Tools and Applications | 2017

Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop

Meng-Yen Hsieh; Wen-Kuang Chou; Kuan-Ching Li

Movie recommendation systems are important tools that suggest films with respect to users’ choices through item-based collaborative filter algorithms, and have shown positive effect on the provider’s revenue. Given that mobile Apps are rapidly growing, the recommender is implemented to support web services in frontend Apps. Among those films recommended, users can give ratings and feedback, collecting film information from linked data concurrently. In order to solve cold-start problems, Cluster-based Matrix Factorization is adopted to model user implicit ratings related to Apps usage. Knowing that user rating data processing is a large-scale problem in producing high quality recommendations, MapReduce and NoSQL environments are employed in performing efficient similarity measurement algorithms whilst maintaining rating and film datasets. In this investigation, the system analyzes user feedbacks to evaluate the recommendation accuracy through metrics of precision, recall and F-score rates, while cold-start users make use the system with two MovieLens datasets as main rating reference in the recommendation system.


MUSIC | 2014

Toward a Mobile Application for Social Sharing Context

Meng-Yen Hsieh; Ching-Hung Yeh; Yin-Te Tsai; Kuan-Ching Li

Due to wireless and sensing technologies powerful in smartphone, a number of smartphone applications, a.k.a APPs. have combined social sharing mechanisms. This paper defines social sharing contexts on a social framework suitable to APPs. A tourism APP based on the sharing mechanisms is implemented to include social behavior for data sharing, while smartphone have supported various wireless technologies. Besides, smartphone as a hand-held device is hold by users so that various gestures with user hands are adaptive to handle the key features of sharing data between smartphones.


international symposium on intelligent signal processing and communication systems | 2012

Interactive design using non-touch technologies for group trip

Meng-Yen Hsieh; Tin-Yu Wu; Yin-Te Tsai; Chi-Hua Shih; Kuan-Ching Li

With the explosion of smartphone popularity in recent years, people are familiar with mobile tourism guides. Users often spend much time to look for travel information on the Internet without user interaction on relevant websites. Generally, the tour guides lead tourists to interact with travel attractions in a group trip. This study applies an interactive model to traveling while tourists join a travel group with a tour guide. The two mobile APPs with non-touch techniques are implemented based on the model in order to enhance the interactive behavior between tourists, the tour guide and travel sight visited. Applications include the following features: (i) scanning QR codes through a camera to obtain the information of travel attractions; (ii) sensing NFC tags to obtain travel information; (iii) sharing social data between tourists using NFC technology; and finally (iv) gathering rapidly the comments from a large number of tourists using NFC technology. Consequently, the model would not only reduce any upcoming difficulties and the time to gather tour information for tourists, but also improves peoples social behavior during traveling. Using such applications, the travel information that users have obtained is automatically stored in the local repository of smartphones, so that users can access the same information anytime in the future even without access to the Internet. In addition, two proposed applications are implemented for tourist and the tour guide on Android platform based on interactive model.


Archive | 2013

A Certificate Enhanced Group Key Framework for Vehicular Ad Hoc Networks

Ching-Hung Yeh; Meng-Yen Hsieh; Kuan-Ching Li

Vehicular ad-hoc networks (VANETs) have emerged new prospects in a wide range of researches. Information exchange in VANETs relies on the transmission of packets between vehicles and road-side units. The messages are easily stolen by the malicious users due to the nature of wireless broadcast, and therefore, VANETs need security mechanisms to protect data privacy. Vehicles can be organized into different groups, and members of a vehicular group share a group key to encrypt their messages; even so, they are still exposed to malicious attacks. In this paper, we propose a group key framework with certificate authority in VANETs, where each group has a group leader responsible for the management of members and keys to enhance certificate operations secures the group communication. According to our security analysis and efficiency evaluation, the proposed mechanisms have lightweight overheads in terms of computational and communication requirements, as also to provide better secure vehicular communication than other similar researches in this field.


Archive | 2008

Wireless Sensor Networks and Applications

Yueh-Min Huang; Meng-Yen Hsieh; Frode Eika Sandnes

Wireless sensor networks are collections of highly distributed, small, and lightweight wireless sensor nodes that monitor the environment or systems through physical measurement. Once the Zigbee and the IEEE 802.11 standards are approved and embraced, wireless sensor nodes will be capable of supporting interoperability among a wide range of mobile and fixed devices from different manufacturers. This paper reviews some of the fundamental mechanisms of wireless sensor networks including their architecture, topology, data integration, routing techniques, and applications. Sensor network applications include both military and civilian monitoring in both rural and urban environments. Wireless sensor networks hold great potential for improving control, conservation, convenience, efficiency, reliability flexibility, and safety in network environments.


Telecommunication Systems | 2015

Dynamic scheduling with energy-efficient transmissions in hierarchical wireless sensor networks

Meng-Yen Hsieh; Jen-Wen Ding

This study proposes a number of scheduling schedules for data transmission in cluster-based wireless sensor networks in order to make energy-saving improvements to sensor nodes. The four states are defined in each network cycle so that sensor nodes can report the events happened in the network. A clustering mechanism creates appropriate network topologies to distribute energy consumption among energy-sufficient sensor nodes. Nodes can adjust the duty cycles for data collection during network lifetime. The scheduling schemes reduce the probabilities of communication collision and duplicate transmission using a broadcast delay. We examine the storage, communication, and computation requirements for the proposed scheduling scheme. All the overheads are sensible, given the current state of device technology of sensor nodes. The experimental results show that nodes work in high efficiency cluster-based networks by the proposed schemes.

Collaboration


Dive into the Meng-Yen Hsieh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hua-Yi Lin

China University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jiann-Gwo Doong

China University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yu-Bin Chiu

China University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge