Yun-Sheng Yen
Fo Guang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yun-Sheng Yen.
Mathematical and Computer Modelling | 2011
Yun-Sheng Yen; Han-Chieh Chao; Ruay-Shiung Chang; Athanasios V. Vasilakos
A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing method using the genetic algorithm. The proposal will be flooding-limited using the available resources and minimum computation time in a dynamic environment. By selecting the appropriate values for parameters such as crossover, mutation, and population size, the genetic algorithm improves and tries to optimize the routes. Simulation results indicate its better performances compared to other methods.
Computers & Electrical Engineering | 2010
Yun-Sheng Yen; Hung-Chieh Chang; Ruay-Shiung Chang; Han-Chieh Chao
In MANET, each mobile host can freely move around and the network topology is dynamically constructed. To send a datagram, a source host broadcasts a route discovery packet to the network. All neighboring nodes receiving this packet will rebroadcast this packet until it reaches the destination. It will have large flooding overhead, poor network performance and undesirable battery power consumption. To improve network performance, we designed a novel routing protocol called RAPLF (routing with adaptive path and limited flooding) for mobile ad hoc networks. Simulation results showed that our protocol has better performance especially in packet delivery rate and flooding overhead when compared to similar protocols.
Iet Communications | 2009
Yun-Sheng Yen; S. Hong; Ruay-Shiung Chang; Han-Chieh Chao
In wireless sensor networks (WSNs), the operation of sensor nodes has to rely on a limited supply of energy (such as batteries). To support long lifetime operation of WSNs, an energy-efficient way of sensor deployment and operation of the WSNs is necessary. A new controlled layer deployment (CLD) protocol to guarantee coverage and energy efficiency for a sensor network is proposed. CLD outperforms previous similar protocols in that it can achieve the same performances and guarantee full area coverage and connection using a smaller number of sensors. It can also ameliorate the ‘cascading problem’ that reduces the whole network lifetime. Finally, analysis and simulation results show that CLD can use fewer sensor nodes for coverage and also increases the lifetime of the sensor network when compared with the probing environment and adapting sleeping (PEAS) protocol.
international conference on future generation communication and networking | 2007
Kai‐Chun Huang; Yun-Sheng Yen; Han-Chieh Chao
Wireless Sensor Networks (WSNs) consists of plenty nodes which are low cost, low power consuming, small volume and short-transmitting. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways of utilizing limited energy of sensor node in order to give longer life time of WSNs. Therefore, how to reduce nodes energy that is consumed in transmitting data has became a very important issue. From many kinds of paper, multi-hop routing protocol is well known for power saving in data gathering. Recently researches uses such types of the cluster-based (e.g., LEACH), the chain-based (e.g., PEGASIS) and the tree-based (e.g., TREEPSI) to establish their energy-efficient routing protocol. In this paper, we propose tree-clustered data gathering protocol (also called TCDGP) to improve the LEACH and TREEPSI. The novel proposed protocol can preserve both advantages and improve the power consumption further. Finally, simulation results show that our proposal has better performance than before.
Digital Investigation | 2011
Yun-Sheng Yen; I.-Long Lin; Bo-Lin Wu
This paper discusses the use of communication technology to commit crimes, including crime facts and crime techniques. The analysis focuses on the security of voice over Internet protocol (VoIP), a prevention method against VoIP call attack and the attention points for setting up an Internet phone. The importance of digital evidence and digital forensics are emphasised. This paper provides the VoIP digital evidence forensics standard operating procedures (DEFSOP) to help police organisations and establishes an experimental platform to simulate phone calls, hacker attacks and forensic data. Finally, this paper provides a general discussion of a digital evidence strategy that includes VoIP for crime investigators who are interested in digital evidence forensics.
Iet Communications | 2008
Yun-Sheng Yen; Ruay-Shiung Chang; Han-Chieh Chao
Multi-constrained quality-of-service (QoS) routing is used to find routes in a network to satisfy multiple independent QoS constraints. This problem is considered to be NP-complete, and most existing QoS routing algorithms are based on maintaining a global network state at every node. A multi-constrained, flooding-limited, QoS routing method to deal with limited available resources and minimum computation in a dynamic environment is proposed. The solution is based on decomposition of a routing area and a restriction in the exchange of routing information. It reduces the size of the control messages, restricts the amount of routing information, minimises the overhead from the flooding of control traffic and decreases the complexity of path selection. It is also proved that the flooding-limited-path heuristic can achieve very high performance by maintaining entries in each node, which indicates that the performance of the limited-path heuristic is not sensitive to the number of constraints. Simulation results show that this protocol provides better performance than other protocols, especially with regards to end-to-end delay, throughput and packet loss.
Telecommunication Systems | 2013
Yun-Sheng Yen; L.-Y. Chen; T.-Y. Chi; Han-Chieh Chao
Abstract In this paper, we proposed a scheduling handover mechanism called SMIPv6 which is based on Mobile IPv6. In the SMIPv6, a new care-of-address is obtained by IP preconfiguration and afterwards, we calculated a better timing to process the handover. Compared with FMIPv6 (Fast handover for MIPv6), SMIPv6 has done away with the tunnel mechanism and reduced the bandwidth waste. Hence, SMIPv6 can reduce the CPU loading of the access routers. Finally, the simulation results showed that SMIPv6 has better handover efficiency and does not cause packet sequence disorders when compared with FMIPv6.
IEEE Transactions on Consumer Electronics | 2005
Yun-Sheng Yen; Fred Lin; Han-Chieh Chao
Ubiquitous network connectivity and enhanced home-appliance technologies are leading to an evolution in advanced consumer electronics equipment, called the residential gateway (RG). This paper proposes an IPv6-enabled platform-independent Integrated residential gateway (IRG) skeleton that integrates a novel P2P solution based on IPv6 networks. For network equipment to exchange information and gain benefits, this approach combines the current RFID, RG IA management, native IPv6 DNS and the blog community.
broadband and wireless computing, communication and applications | 2010
I-Long Lin; Yun-Sheng Yen; Bo-Lin Wu; Hsiang-Yu Wang
Research, Development and Evaluation Commission once hold an Internet election of “Top Ten Complaints”, the result showed that the overabundance of phone and Internet fraud was included. This result represents that the phone and Internet fraud trouble people a lot. Thus, this paper will first discuss the analysis of the crime mode of phone and Internet fraud and the collect the security threats of VoIP. Then this paper will analyze the threats one-by-one and comes up with different reacting policies. Furthermore, this paper also to provide the VoIP Digital Evidence Forensics Standard Operating Procedures (DEFSOP) in order to help the police organizations and sets up an experimenting platform which is able to operate phone calls, attacks and forensics to test and verify the research.
international conference on information science and applications | 2011
Yun-Sheng Yen; Wen-Chen Chiang; Hsiang-Yu Wang; Chwan-Yi Shiah
The inconvenience of transportation frequently causes delay in health care for home-dwelling patients with chronic diseases, resulting in inequality of medical care. This paper proposes a Telemonitoring System (WiMAX Telemonitoring Service) framework for monitoring and delivering health care service to home-dwelling chronic hypertension patients, with the idea of improving the accessibility of medical care by utilizing the benefits of Internet to construct a ubiquitous health care environment. The study compared and analyzed three wireless Networks: WiMAX, WiFi and HSDPA, and found that WiMAX has the best performance regarding to stability as a long-distance health care delivery platform. A questionnaire survey in the hospital also revealed that the medical staff are highly recognized with telemedicine, which supports and serves as a reference for the designing of the telemonitoring system.