Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yu-Chee Tseng is active.

Publication


Featured researches published by Yu-Chee Tseng.


acm/ieee international conference on mobile computing and networking | 1999

The broadcast storm problem in a mobile ad hoc network

Sze-Yao Ni; Yu-Chee Tseng; Yuh-Shyan Chen; Jang-Ping Sheu

Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently (such as finding a route to a particular host, paging a particular host, and sending an alarm signal). Because radio signals are likely to overlap with others in a geographical area, a straightforward broadcasting by flooding is usually very costly and will result in serious redundancy, contention, and collision, to which we call the broadcast storm problem. In this paper, we identify this problem by showing how serious it is through analyses and simulations. We propose several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcasts to alleviate this problem. Simulation results are presented, which show different levels of improvement over the basic flooding approach.


Mobile Networks and Applications | 2005

The coverage problem in a wireless sensor network

Chi-Fu Huang; Yu-Chee Tseng

One of the fundamental issues in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this problem as a decision problem, whose goal is to determine whether every point in the service area of the sensor network is covered by at least k sensors, where k is a given parameter. The sensing ranges of sensors can be unit disks or non-unit disks. We present polynomial-time algorithms, in terms of the number of sensors, that can be easily translated to distributed protocols. The result is a generalization of some earlier results where only k = 1 is assumed. Applications of the result include determining insufficiently covered areas in a sensor network, enhancing fault-tolerant capability in hostile regions, and conserving energies of redundant sensors in a randomly deployed network. Our solutions can be easily translated to distributed protocols to solve the coverage problem.


The Computer Journal | 2002

A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks

Shih-Lin Wu; Yu-Chee Tseng; Chih-Yu Lin; Jang-Ping Sheu

1Department of Electrical Engineering, Chang Gung University, Tao-Yuan, 333, Taiwan 2Department of Computer Science and Information Engineering, National Chiao-Tung University, Hsin-Chu, 300, Taiwan 3Department of Computer Science and Information Engineering, National Central University, Chung-Li, 32054, Taiwan Email: [email protected], [email protected], [email protected], [email protected]


IEEE Journal on Selected Areas in Communications | 2000

Intelligent medium access for mobile ad hoc networks with busy tones and power control

Shih-Lin Wu; Yu-Chee Tseng; Jang-Ping Sheu

In mobile ad hoc networks (MANETs), one essential issue is how to increase channel utilization while avoiding the hidden-terminal and the exposed-terminal problems. Several MAC protocols, such as RTS/CTS-based and busy-tone-based schemes, have been proposed to alleviate these problems. In this paper, we explore the possibility of combining the concept of power control with the RTS/CTS-based and busy-tone-based protocols to further increase channel utilization. A sender will use an appropriate power level to transmit its packets so as to increase the possibility of channel reuse. The possibility of using discrete, instead of continuous, power levels is also discussed. Through analyses and simulations, we demonstrate the advantage of our new MAC protocol. This, together with the extra benefits such as saving battery energy and reducing cochannel interference, does show a promising direction to enhance the performance of MANETs.


IEEE Transactions on Mobile Computing | 2006

Efficient in-network moving object tracking in wireless sensor networks

Chih-Yu Lin; Wen-Chih Peng; Yu-Chee Tseng

The rapid progress of wireless communication and embedded microsensing MEMS technologies has made wireless sensor networks possible. In light of storage in sensors, a sensor network can be considered as a distributed database, in which one can conduct in-network data processing. An important issue of wireless sensor networks is object tracking, which typically involves two basic operations: update and query. This issue has been intensively studied in other areas, such as cellular networks. However, the in-network processing characteristic of sensor networks has posed new challenges to this issue. In this paper, we develop several tree structures for in-network object tracking which take the physical topology of the sensor network into consideration. The optimization process has two stages. The first stage tries to reduce the location update cost based on a deviation-avoidance principle and a highest-weight-first principle. The second stage further adjusts the tree obtained in the first stage to reduce the query cost. The way we model this problem allows us to analytically formulate the cost of object tracking given the update and query rates of objects. Extensive simulations are conducted, which show a significant improvement over existing solutions


Pervasive and Mobile Computing | 2011

Review: From wireless sensor networks towards cyber physical systems

Fang-Jing Wu; Yu-Fen Kao; Yu-Chee Tseng

In the past two decades, a lot of research activities have been dedicated to the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). More recently, the cyber physical system (CPS) has emerged as a promising direction to enrich the interactions between physical and virtual worlds. In this article, we first review some research activities in WSN, including networking issues and coverage and deployment issues. Then, we review some CPS platforms and systems that have been developed recently, including health care, navigation, rescue, intelligent transportation, social networking, and gaming applications. Through these reviews, we hope to demonstrate how CPS applications exploit the physical information collected by WSNs to bridge real and cyber spaces and identify important research challenges related to CPS designs.


Computer Networks | 2003

Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks

Yu-Chee Tseng; Chih-Shun Hsu; Ten-Yueng Hsieh

Power-saving is a critical issue for almost all kinds of portable devices. In this paper, we consider the design of powersaving protocols for mobile ad hoc networks (MANETs) that allow mobile hosts to switch to a low-power sleep mode. The MANETs being considered in this paper are characterized by unpredictable mobility, multi-hop communication, and no clock synchronization mechanism. In particular, the last characteristic would complicate the problem since a host has to predict when another host will wake up to receive packets. We propose three power management protocols, namely dominating-awake-interval, periodically-fully-awake-interval, and quorum-based protocols, which are directly applicable to IEEE 802.11-based MANETs. As far as we know, the power management problem for multihop MANETs has not been seriously addressed in the literature. Existing standards, such as IEEE 802.11, HIPERLAN, and bluetooth, all assume that the network is fully connected or there is a clock synchronization mechanism. Extensive simulation results are presented to verify the effectiveness of the proposed protocols.


IEEE Computer | 2006

Wireless sensor networks for emergency navigation

Yu-Chee Tseng; Meng-Shiuan Pan; Yuen-Yung Tsai

In an emergency, wireless network sensors combined with a navigation algorithm could help safely guide people to a building exit while helping them avoid hazardous areas. We propose a distributed navigation algorithm for emergency situations. At normal time, sensors monitor the environment. When the sensors detect emergency events, our protocol quickly separates hazardous areas from safe areas, and the sensors establish escape paths. Simulation and implementation results show that our scheme achieves navigation safety and quick convergence of the navigation directions. We based our protocol on the temporally ordered routing algorithm for mobile ad hoc networks. TORA assigns mobile nodes temporally ordered sequence numbers to support multipath routing from a source to a specific destination node


IEEE Transactions on Communications | 2002

A secure data hiding scheme for binary images

Yu-Chee Tseng; Yu-Yuan Chen; Hsiang-Kuang Pan

This letter presents a novel steganography scheme capable of concealing a piece of critical information in a host message which is a binary image (e.g., a facsimile). A binary matrix and a weight matrix are used as secret keys to protect the hidden information. Given a host image of size m/spl times/n, the proposed scheme can conceal as many as /spl lfloor/log/sub 2/ (mn+1)/spl rfloor/ bits of data in the image by changing, at most, two bits in the host image. This scheme can provide a higher security, embed more information, and maintain a higher quality of the host image than available schemes.


international wireless internet conference | 2005

Efficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks

You-Chiun Wang; Chun-Chi Hu; Yu-Chee Tseng

Sensor deployment is a critical issue since it reflects the cost and detection capability of a wireless sensor network. Although lots of work has addressed this issue, most of them assume that the sensing field is an open space and there is a special relationship between the communication range and sensing range of sensors. In this work, we consider the sensing field as an arbitrary-shaped region possibly with obstacles. Besides, we allow an arbitrary relationship between the communication range and sensing range, thus eliminating the constraints of existing results. Our approach is to partition the sensing field into smaller sub-regions based on the shape of the field, and then to deploy sensors in these sub-regions. Simulation results show that our method requires fewer sensors compared to existing results.

Collaboration


Dive into the Yu-Chee Tseng's collaboration.

Top Co-Authors

Avatar

Jang-Ping Sheu

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

You-Chiun Wang

National Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jen-Jee Chen

National University of Tainan

View shared research outputs
Top Co-Authors

Avatar

Jia-Ming Liang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chi-Fu Huang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Sheng-Po Kuo

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chih-Yu Lin

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Meng-Shiuan Pan

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge