Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tsang-Yean Lee is active.

Publication


Featured researches published by Tsang-Yean Lee.


international conference on knowledge based and intelligent information and engineering systems | 2006

A process schedule analyzing model based on grid environment

Huey-Ming Lee; Tsang-Yean Lee

Grid computing architecture was defined to be a complete physical layer. The functions of information systems based on grid architecture are resources sharing, collaborative processing, etc. Resources are used by processes. System performance is calculated from resources usages. Process scheduling is more important when jobs are not uniformly distributed in all grid nodes. In this paper, we proposed a process schedule analyzing model based on grid computing architecture. This model can make all grid nodes be loading-balance. When the load of the node is heavy, it can select the other grid nodes to execute its job by the verification of supervisor grid node and then the job is transferred. Via implementing this model, we can have the best system performance.


networked computing and advanced information management | 2009

Job Schedule Model Based on Grid Environment

Wuu-Yee Chen; Tsang-Yean Lee; Nai-Wen Kuo; Yuan-Hwa Mei; Shan-Kai Chen; Yu-Chen Yan

Grid computing architecture was defined to be a complete physical layer. The functions of information systems based on grid architecture are resources sharing, collaborative processing, etc. System performance is calculated from resource usages of all grid nodes. If we have load-balancing in all grid nodes, we will have good performance in the system. All the grid nodes are divided to supervisor, supervisor backup and execute grid nodes. Each grid node has computing cost level to charge each running job. Transfer jobs from high CPU utilization grid nodes to low utilization grid nodes through supervisor scheduling, the system performance will be better. In this paper, we propose a job schedule model (JSM) base on grid environment. By this model, we can make all grid nodes be loading balance. When the load of the node is high, it sends the request to the supervisor and it selects the most suitable node to execute. Via implementing this model, we can improve the performance of grid environment efficiently.


international conference on information systems | 2009

From the bricks to the clicks: knowledge management in e-government

Hau-Dong Tsui; Chong-Yen Lee; Tsang-Yean Lee

Today the expression of electronic government (e-government) is a synonym for a modern and efficient administration, and goes well beyond providing constituents with government information and services by leveraging information and communication technologies (ICT). The desired goal is that of convergence characterized by ubiquitous access to government information and services and total transparency of government functioning. Over the past several years, there has been unprecedented change in the way that volumes of data, information and knowledge is created, stored, disseminated and used. Over this period, there have been significant steps forward in governments information management, and there are plenty of examples of good progress in specific areas. These show improvements can be made with effective leadership and management, and they provide experience that can be used more widely. Knowledge management (KM) is a distinct contribution of the private sector as a competitive advantage and knowledge capital hold the sway. It is only recently that KM has started making entry to public sector. One of the reasons for this development has been the emergence of ICT and knowledge worker in the knowledge economy. To deliver more innovative services to demanding public, governments must be involved in the deployment of such new services as e-government and e-commerce. The challenge for e-government is to find a successful way of re-engineering and distributing the administrations knowledge and active management of their knowledge assets is mandatory for success. This paper discusses the KM for e-government development in significance and role, and addresses the KM key issues, activities and questions whether the KM approach that has proven to be successful in business environment is applicable to the provision of public sector services.


international conference on computer sciences and convergence information technology | 2009

Security of File Backup Method in Computer System

Nai-Wen Kuo; Tsang-Yean Lee; Wuu-Yee Chen; Yann-Jong Hwang; Kai-Tsung Jheng; Hong Bin Li

In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed, we create it from these backup files. For security, we have method to encrypt files before stored. These operations of backup method make more secure and better performance.


international conference on computer sciences and convergence information technology | 2009

Security of Message Passing Based on Grid Environment

Heng-Sheng Chen; Tsang-Yean Lee; Huey-Ming Lee

Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher text to get original message. This key code is kept in both sides. When these algorithms install in all grid nodes, we can keep message process be secure in the system.


networked computing and advanced information management | 2009

Secure Site Authentication and Message Transmission Based on Grid Environment

Chong-Yen Lee; Tsang-Yean Lee; Homer Wu; Hau-Dong Tsui; Heng Sheng Chen

Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid nodes in safety as well. Message processing can be kept in secure for all systems when these algorithms are installed in all nodes.


international conference on information systems | 2009

Collect and broadcast news in security

Heng-Sheng Chen; Tsang-Yean Lee; Huey-Ming Lee

The data must keep security in the computer system. We collect all data (news) and broadcast them to all users. We avoid the data to be modified by attacker and broadcast the wrong message. We propose the method to collect the news and store them in computer system in security. We encrypt the news and store the encrypted news in the encrypted news database. We set encryption data table and use it to encrypt the news file to encrypted news data. The news has different location code in the news information database. We use location code to insert encryption data table to encrypted news and store the encrypted news to encrypted news database. We create the broadcast list table to broad the order of news. When we want to broadcast, we decrypt the encrypted news first and then show out. We use this location code of news in the news information database to get encryption data table in the encrypted news. We use encryption data table to do decryption. When we install these algorithms in the computer system to process, it is securer.


information management, innovation management and industrial engineering | 2009

Modernizing Government: Reengineering through Knowledge Management Approach

Hau-Dong Tsui; Tsang-Yean Lee; Chong-Yen Lee

Knowledge management (KM) in electronic government (e-government) is a critical factor for e-service delivery and it has always been a constant concern in public administrations. Many information and communication technology (ICT) enabled applications of KM have become available to support policy development and implementation tasks. Plans to modernize government processes and practices are leading to a reconsideration of how to manage the vast range of knowledge resources that are found within the public sector. Much of the work in the public sector revolves around the use and interpretation of information and knowledge. With the quantity and multiplicity of types of information being held and used within the public sector, managing knowledge is a difficult task. One consequence of this is that concepts of KM are increasingly being applied. Today in response to the changes in globalization, growing customer demands and increasing ICT possibilities the public sector adapts approaches that have proven to be successful in business environment. The paper addresses the KM key issues, activities and questions whether the KM approach that has proven to be successful in business environment is applicable to the provision of modernizing government.


international conference on innovative computing, information and control | 2007

Analysis of Algorithm of Cipher Text Containing Data and Key in Network Security

Huey-Ming Lee; Tsang-Yean Lee

In this paper, we propose the algorithm of cipher text containing plaintext, relative data and tables of encryption and being transmitted through the network. We pack the final symbol table, relative data, relative tables and control byte to generate cipher text. We analysis this method and discuss the possible cryptanalysis to attack this algorithm.


industrial and engineering applications of artificial intelligence and expert systems | 2006

A self-tuning emergency model of home network environment

Huey-Ming Lee; Shih-Feng Liao; Tsang-Yean Lee; Jin-Shieh Su

In this paper, we proposed a self-tuning emergency model of home network environment (SEMHNE). This model can not only tune the scaling factors and membership functions to fit the home network environment but also detect the emergency events automatically. There are three modules in this model, namely, emergency report module (ERM), renewable emergency rule base (RERB), and evolutionary database (EDB). ERM determines the emergency situations by fuzzy inferences and sends the warning message to the users. RERB can provide rules to ERM for inference. EDB can do self-tuning by using genetic algorithm and provide information to ERM for inference. Via this model, our home network environment will become more reliable and safety.

Collaboration


Dive into the Tsang-Yean Lee's collaboration.

Top Co-Authors

Avatar

Huey-Ming Lee

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Heng-Sheng Chen

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Chong-Yen Lee

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Jin-Shieh Su

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Homer Wu

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Wuu-Yee Chen

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Hau-Dong Tsui

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Chia-Hsien Chung

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Nai-Wen Kuo

Chinese Culture University

View shared research outputs
Top Co-Authors

Avatar

Lily Lin

China University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge