Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yun-Sheng Yen is active.

Publication


Featured researches published by Yun-Sheng Yen.


Mathematical and Computer Modelling | 2011

Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs

Yun-Sheng Yen; Han-Chieh Chao; Ruay-Shiung Chang; Athanasios V. Vasilakos

A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing method using the genetic algorithm. The proposal will be flooding-limited using the available resources and minimum computation time in a dynamic environment. By selecting the appropriate values for parameters such as crossover, mutation, and population size, the genetic algorithm improves and tries to optimize the routes. Simulation results indicate its better performances compared to other methods.


Computers & Electrical Engineering | 2010

Routing with adaptive path and limited flooding for mobile ad hoc networks

Yun-Sheng Yen; Hung-Chieh Chang; Ruay-Shiung Chang; Han-Chieh Chao

In MANET, each mobile host can freely move around and the network topology is dynamically constructed. To send a datagram, a source host broadcasts a route discovery packet to the network. All neighboring nodes receiving this packet will rebroadcast this packet until it reaches the destination. It will have large flooding overhead, poor network performance and undesirable battery power consumption. To improve network performance, we designed a novel routing protocol called RAPLF (routing with adaptive path and limited flooding) for mobile ad hoc networks. Simulation results showed that our protocol has better performance especially in packet delivery rate and flooding overhead when compared to similar protocols.


Iet Communications | 2009

Controlled deployments for wireless sensor networks

Yun-Sheng Yen; S. Hong; Ruay-Shiung Chang; Han-Chieh Chao

In wireless sensor networks (WSNs), the operation of sensor nodes has to rely on a limited supply of energy (such as batteries). To support long lifetime operation of WSNs, an energy-efficient way of sensor deployment and operation of the WSNs is necessary. A new controlled layer deployment (CLD) protocol to guarantee coverage and energy efficiency for a sensor network is proposed. CLD outperforms previous similar protocols in that it can achieve the same performances and guarantee full area coverage and connection using a smaller number of sensors. It can also ameliorate the ‘cascading problem’ that reduces the whole network lifetime. Finally, analysis and simulation results show that CLD can use fewer sensor nodes for coverage and also increases the lifetime of the sensor network when compared with the probing environment and adapting sleeping (PEAS) protocol.


international conference on future generation communication and networking | 2007

Tree-Clustered Data Gathering Protocol (TCDGP) for Wireless Sensor Networks

Kai‐Chun Huang; Yun-Sheng Yen; Han-Chieh Chao

Wireless Sensor Networks (WSNs) consists of plenty nodes which are low cost, low power consuming, small volume and short-transmitting. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways of utilizing limited energy of sensor node in order to give longer life time of WSNs. Therefore, how to reduce nodes energy that is consumed in transmitting data has became a very important issue. From many kinds of paper, multi-hop routing protocol is well known for power saving in data gathering. Recently researches uses such types of the cluster-based (e.g., LEACH), the chain-based (e.g., PEGASIS) and the tree-based (e.g., TREEPSI) to establish their energy-efficient routing protocol. In this paper, we propose tree-clustered data gathering protocol (also called TCDGP) to improve the LEACH and TREEPSI. The novel proposed protocol can preserve both advantages and improve the power consumption further. Finally, simulation results show that our proposal has better performance than before.


Digital Investigation | 2011

A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence

Yun-Sheng Yen; I.-Long Lin; Bo-Lin Wu

This paper discusses the use of communication technology to commit crimes, including crime facts and crime techniques. The analysis focuses on the security of voice over Internet protocol (VoIP), a prevention method against VoIP call attack and the attention points for setting up an Internet phone. The importance of digital evidence and digital forensics are emphasised. This paper provides the VoIP digital evidence forensics standard operating procedures (DEFSOP) to help police organisations and establishes an experimental platform to simulate phone calls, hacker attacks and forensic data. Finally, this paper provides a general discussion of a digital evidence strategy that includes VoIP for crime investigators who are interested in digital evidence forensics.


Iet Communications | 2008

Flooding-limited for multi-constrained quality-of-service routing protocol in mobile ad hoc networks

Yun-Sheng Yen; Ruay-Shiung Chang; Han-Chieh Chao

Multi-constrained quality-of-service (QoS) routing is used to find routes in a network to satisfy multiple independent QoS constraints. This problem is considered to be NP-complete, and most existing QoS routing algorithms are based on maintaining a global network state at every node. A multi-constrained, flooding-limited, QoS routing method to deal with limited available resources and minimum computation in a dynamic environment is proposed. The solution is based on decomposition of a routing area and a restriction in the exchange of routing information. It reduces the size of the control messages, restricts the amount of routing information, minimises the overhead from the flooding of control traffic and decreases the complexity of path selection. It is also proved that the flooding-limited-path heuristic can achieve very high performance by maintaining entries in each node, which indicates that the performance of the limited-path heuristic is not sensitive to the number of constraints. Simulation results show that this protocol provides better performance than other protocols, especially with regards to end-to-end delay, throughput and packet loss.


Telecommunication Systems | 2013

A novel predictive scheduling handover on mobile IPv6

Yun-Sheng Yen; L.-Y. Chen; T.-Y. Chi; Han-Chieh Chao

Abstract In this paper, we proposed a scheduling handover mechanism called SMIPv6 which is based on Mobile IPv6. In the SMIPv6, a new care-of-address is obtained by IP preconfiguration and afterwards, we calculated a better timing to process the handover. Compared with FMIPv6 (Fast handover for MIPv6), SMIPv6 has done away with the tunnel mechanism and reduced the bandwidth waste. Hence, SMIPv6 can reduce the CPU loading of the access routers. Finally, the simulation results showed that SMIPv6 has better handover efficiency and does not cause packet sequence disorders when compared with FMIPv6.


IEEE Transactions on Consumer Electronics | 2005

Integrated residential gateway: easy IA management with P2P community using RFID

Yun-Sheng Yen; Fred Lin; Han-Chieh Chao

Ubiquitous network connectivity and enhanced home-appliance technologies are leading to an evolution in advanced consumer electronics equipment, called the residential gateway (RG). This paper proposes an IPv6-enabled platform-independent Integrated residential gateway (IRG) skeleton that integrates a novel P2P solution based on IPv6 networks. For network equipment to exchange information and gain benefits, this approach combines the current RFID, RG IA management, native IPv6 DNS and the blog community.


broadband and wireless computing, communication and applications | 2010

VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP)

I-Long Lin; Yun-Sheng Yen; Bo-Lin Wu; Hsiang-Yu Wang

Research, Development and Evaluation Commission once hold an Internet election of “Top Ten Complaints”, the result showed that the overabundance of phone and Internet fraud was included. This result represents that the phone and Internet fraud trouble people a lot. Thus, this paper will first discuss the analysis of the crime mode of phone and Internet fraud and the collect the security threats of VoIP. Then this paper will analyze the threats one-by-one and comes up with different reacting policies. Furthermore, this paper also to provide the VoIP Digital Evidence Forensics Standard Operating Procedures (DEFSOP) in order to help the police organizations and sets up an experimenting platform which is able to operate phone calls, attacks and forensics to test and verify the research.


international conference on information science and applications | 2011

WiMAX Network for Health Care Telemonitoring Service

Yun-Sheng Yen; Wen-Chen Chiang; Hsiang-Yu Wang; Chwan-Yi Shiah

The inconvenience of transportation frequently causes delay in health care for home-dwelling patients with chronic diseases, resulting in inequality of medical care. This paper proposes a Telemonitoring System (WiMAX Telemonitoring Service) framework for monitoring and delivering health care service to home-dwelling chronic hypertension patients, with the idea of improving the accessibility of medical care by utilizing the benefits of Internet to construct a ubiquitous health care environment. The study compared and analyzed three wireless Networks: WiMAX, WiFi and HSDPA, and found that WiMAX has the best performance regarding to stability as a long-distance health care delivery platform. A questionnaire survey in the hospital also revealed that the medical staff are highly recognized with telemedicine, which supports and serves as a reference for the designing of the telemonitoring system.

Collaboration


Dive into the Yun-Sheng Yen's collaboration.

Top Co-Authors

Avatar

Han-Chieh Chao

National Dong Hwa University

View shared research outputs
Top Co-Authors

Avatar

Ruay-Shiung Chang

National Dong Hwa University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chia-Chang Hsu

National Dong Hwa University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

I-Long Lin

Central Police University

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge