{"id":1012,"date":"2023-12-18T14:26:39","date_gmt":"2023-12-18T14:26:39","guid":{"rendered":"https:\/\/iim.nycu.edu.tw\/?page_id=1012"},"modified":"2025-05-05T06:04:03","modified_gmt":"2025-05-05T06:04:03","slug":"ku-cheng-yuan","status":"publish","type":"page","link":"https:\/\/iim.nycu.edu.tw\/en\/teacher\/ku-cheng-yuan","title":{"rendered":"Ku, Cheng-Yuan"},"content":{"rendered":"<div class=\"wp-block-group alignfull has-palette-color-5-background-color has-background is-layout-constrained wp-container-core-group-is-layout-4d477f34 wp-block-group-is-layout-constrained wp-container-1 is-position-sticky\" style=\"border-radius:5px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--30);padding-right:0;padding-bottom:var(--wp--preset--spacing--30);padding-left:0\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Ku, Cheng-Yuan<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-bottom is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-right has-link-color wp-elements-aced355b3b7588503e766416235696b2\"><a href=\"https:\/\/iim.nycu.edu.tw\/en\/faculty\/all\/\" title=\"Faculty Members\">Faculty<\/a> \/ <a href=\"https:\/\/iim.nycu.edu.tw\/en\/faculty\/all\/#professors\" title=\"Faculty Members\">Faculty Members<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-palette-color-6-background-color has-background is-layout-constrained wp-container-core-group-is-layout-592f268c wp-block-group-is-layout-constrained\" style=\"border-radius:5px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bb1401d6\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-989d72c3 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Chen-Po-An\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Chen, Po-An<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-36c53abd wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Liu-Duen-Ren\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Liu, Duen-Ren<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-2eed99c2 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Tsai-Min-Jen\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Tsai, Min-Jen<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-ccf4151b wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Lin-Miao-Tsung\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Lin, Bertrand M.T.<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-2f758b70 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Li-Yung-Ming\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Li, Yung-Ming<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-89f01295 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"#\" onclick=\"return false;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Ku, Cheng-Yuan<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-5a1aa5e7 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Chuang-Yung-Ting\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Chuang, Yung-Ting<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-402b6bc0 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--80)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"393\" height=\"394\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u53e4\u653f\u5143.png\" alt=\"\" class=\"wp-image-1438\" style=\"width:184px;height:auto\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u53e4\u653f\u5143.png 393w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u53e4\u653f\u5143-300x300.png 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u53e4\u653f\u5143-150x150.png 150w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u53e4\u653f\u5143-200x201.png 200w\" sizes=\"(max-width: 393px) 100vw, 393px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<h1 class=\"wp-block-heading has-text-align-left has-palette-color-4-color has-text-color has-link-color wp-elements-0e1b110c9665f11c9afad456e73ba363\">Ku, Cheng-Yuan<\/h1>\n\n\n\n<pre class=\"wp-block-preformatted\">Office Extension Email Laboratory<\/pre>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h1 class=\"wp-block-heading has-text-align-left has-palette-color-4-color has-text-color has-link-color wp-elements-55846ac0c6e371ac62a9e80748de8e59\">Professor<\/h1>\n\n\n\n<pre class=\"wp-block-preformatted\" style=\"padding-right:0;padding-left:0\">\u7ba1\u7406\u4e8c\u9928MB309<br>57409<br>cooper.cyku@gmail.com, cooperku@nycu.edu.tw<br>Communication Networks and Information Security Lab<\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top has-palette-color-7-background-color has-background is-layout-flex wp-container-core-columns-is-layout-5243a9a1 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--80)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\">Communication Networks and Information Security Lab<\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Office: MB107, Management Building 2<br>Extension: 57409<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\"><strong>Research<\/strong><\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Computer and Data Communication Networks<br>Information Security<br>Artificial Intelligence Application<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\"><strong>Courses<\/strong><\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Stochastic Process<br>Information Security<br>Data Communications and Networking<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs\" data-active-tab=\"0\"><ul class=\"wp-block-getwid-tabs__nav-links\"><\/ul>\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Research areas and major experiences<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<table id=\"tablepress-45\" class=\"tablepress tablepress-id-45\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Academic Background<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">PhD in Electrical Engineering and Information Science from Northwestern University<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Department of Control Engineering, National Chiao Tung University<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-45 from cache -->\n\n\n<table id=\"tablepress-61\" class=\"tablepress tablepress-id-61\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Curriculum Vitae<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Professor of the Department of Information Management, Deputy Dean of the School of Management and Executive Director of EMBA, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Professor, Department Head and Director, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Professor, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Associate Professor, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Assistant Professor, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Associate Professor, Department of Information Engineering, I-Shou University<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Research Assistant, Department of Electrical Engineering and Information Science, Northwestern University<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-61 from cache --><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Papers and Books<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<table id=\"tablepress-76\" class=\"tablepress tablepress-id-76\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Journal Paper<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Wen-Huai Hsieh, Cooper Cheng-Yuan Ku, Humble Po-Ching Hwang, Min-Juei Tsai, and Zheng-Zhun Chen, \u201cModel for Predicting Complications of Hemodialysis Patients Using Data from the Internet of Medical Things and Electronic Medical Records,\u201d IEEE Journal of Translational Engineering in Health and Medicine, Forthcoming. (SCI) (Acceptance email was dated 28\/Dec\/2022)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, and Mason Chao-Yang Huang, \u201cIntelligent Cleanup Scheme for Soiled Photovoltaic Modules,\u201d Energy, vol. 265, article 126293, Feb. 2023. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Ting-Yu Chang, Cooper Cheng-Yuan Ku, Tai-Yuen Cheng, Cheng-Kung Chung, and Emilio Chang Sanchez, \u201cModular Counting Management System for Mall Parking Services,\u201d Computers &amp; Industrial Engineering, vol. 171, article 108362, Sep . 2022. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Hsin-Hsiu Chen, Cooper Cheng-Yuan Ku, and David C. Yen, \u201cImproved Fault-Tolerant SPRT Detection Method for Node Replication Attacks in Wireless Sensor Networks,\u201d International Journal of Sensor Networks, vol. 39, no. 4, pp . 279-288, 2022. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Xie Wenhuai, Gu Zhengyuan, and Huang Bojing, &quot;Anonymous evaluation and review system of medical service quality based on blockchain,&quot; Technical Journal, Volume 37, Issue 1, pp. 65-77, 111 Years of the Republic of China. (EI )<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Ting-Yu Chang, and Cooper Cheng-Yuan Ku, \u201cFuzzy Filtering Ranking Method for Multi-criteria Decision Making,\u201d Computers &amp; Industrial Engineering, vol. 156, article 107217, Jun. 2021. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, and James Chi-Chang Chan, \u201cDetection of Malfunctioning Photovoltaic Modules Based on Machine Learning Algorithms,\u201d IEEE Access, vol. 9, pp. 37210-37219, 2021. DOI: 10.1109 \/ACCESS.2021.3063461. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Karamo Kanagi, Cooper Cheng-Yuan Ku, Li-Kai Lin, and Wen-Huai Hsieh, \u201cEfficient Clinical Data Sharing Framework Based on Blockchain Technology,\u201d Methods of Information in Medicine, vol. 59, pp. 193-204, 2020. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Hong Jiaqing, Huang Zhengkui, Gu Zhengyuan, &quot;Research on information security news events and abnormal returns of corporate stock prices,&quot; Journal of Information Management, vol. 25, no. 3, pp. 283-306, Jul. 2018. (TSSCI)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Tsung-Han Yang, Cheng-Yuan Ku, and Man-Nung Liu, \u201cCase Study: Application of Enhanced Delphi Method for Software Development and Evaluation in Medical Institutes,\u201d Kybernetes, vol. 45, no. 4, pp. 637- 649 , 2016. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Hsin-Pin Fu, Cheng-Yuan Ku, and Tsung-Sheng Chang, \u201cA Decision Support System Based on a Genetic Algorithm for the Utilization of Leftovers,\u201d International Journal of Computational Intelligence Systems, vol. 9, no. 3, pp. 483-496, 2016. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen, and Wen-Huai Hsieh, \u201cAn Improved Strategic Information Management Plan for Medical Institutes,\u201d Computer Standards &amp; Interfaces, vol. 45, pp. 26-36, Mar. 2016. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Tsung-Han Yang, Cheng-Yuan Ku, and Man-Nung Liu, \u201cAn Integrated System for Information Security Management with the Unified Framework,\u201d Journal of Risk Research, vol. 19, no. 1, pp. 21-41, 2016 .(SSCI)<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Tsung-Sheng Chang, Hsin-Pin Fu, and Cheng-Yuan Ku, \u201cA Novel Model to Implement ERP Based on Dynamic Capabilities \u2013 A Case Study of An IC Design Company,\u201d Journal of Manufacturing Technology Management, vol. 26, no. 7, pp. 1053-1068, 2015.<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, &quot;House Selection via the Internet by Considering Homebuyers&#039; Risk Attitudes with S-shaped Utility Functions,&quot; European Journal of Operational Research, vol. 241, no. 1, pp. 188-201, Feb. 2015. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, Pei-Chen Sung and Wen-Huai Hsieh, \u201cPolicy Satisfaction for Separation of Dispensing from Medical Practices in Taiwan: Success of the Prescription-Release Information System,\u201d Telematics and Informatics, vol. 31, no. 2, pp. 334-343, May 2014. (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Pei-Chen Sung, Cheng-Yuan Ku, and Chien-Yuan Su, \u201cUnderstanding the Propagation Dynamics of Multipartite Computer Virus,\u201d Industrial Management &amp; Data System, vol. 114, no. 1, pp. 86-106, 2014. ( SCI)<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Hsin-Pin Fu, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, Cheng-Hsin Huang, \u201cThe Critical Success Factors Affecting the Adoption of an Inter-Organization System by SMEs,\u201d Journal of Business and Industrial Marketing, vol. 29, no. 5, pp. 400-416, 2014. (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, \u201cGrey Theory Analysis of Online Population and Online Game Industry Revenue in Taiwan,\u201d Technological Forecasting and Social Change, vol. 80, pp. 175-185, 2013. ( SSCI)<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, \u201cOn the Location Selection Problem Using Analytic Hierarchy Process and Multi-Choice Goal Programming,\u201d International Journal of Systems Science, vol. 44, no. 1, pp. 94-108, Jan. 2013. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">Hsieh-Hong Huang, Jack Shih-Chieh Hsu, and Cheng-Yuan Ku, \u201cUnderstanding the role of computer-mediated counter-argument in countering confirmation bias,\u201d Decision Support Systems, vol. 53, no. 3, pp. 438- 447, Jun. 2012. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">Cheng-Yuan Ku and Yi-Wen Chang, \u201cOptimal Production and Selling Policies with Fixed-Price Contracts and Contingent-Price Offers\u201d, International Journal of Production Economics, vol. 137, no. 1, pp. 94-101, May 2012 .(SCI)<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, \u201cAligning Websites with Enterprise Success: An Evaluative Approach,\u201d Journal of Computer Information Systems, vol. 52, no. 4, pp. 49- 58, summer 2012. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, Yi-Wen Chang, and Chun-Wei Kuo, \u201cA Method to Accelerate the Computation of Successive Approximation,\u201d Advanced Science Letters, vol. 16, no. 1, pp. 326-331, Sep. 2012. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">Pei-Chen Sung, Cheng-Yuan Ku, Chia-Ping Chen, \u201cResearch of the Computer Viruses Prevention Policy Using System Dynamics,\u201d Journal of Information Management, vol. 19, no. 3, pp. 621-652, Jul. 2012 . (in Chinese) (TSSCI)<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen and Wen-Huai Hsieh, &quot;Electronic Hand-Drafting and Picture Management System,&quot; Journal of Medical Systems, vol. 36, no. 4, pp. 2297-2307, Aug. 2012. (SCI)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-76 from cache -->\n\n\n<table id=\"tablepress-91\" class=\"tablepress tablepress-id-91\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Conference Paper<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Man-Nung Liu, Cheng-Yuan Ku and Tsung-Han Yang, 2014 May, \u201cA Secure Software Development Framework Based on Security Patterns,\u201d Proceedings of TIIM 2014, Seoul, Korea.<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Tsung-Han Yang, Cheng-Yuan Ku, Yung-Ting Chuang, 2014 Apr., \u201cAn Integrated Risk Analysis Framework for Improving Security of Software Development Life Cycle,\u201d Proceedings of WDSI 2014, Napa Valley, California, USA<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Po-Ling Sun and Cheng-Yuan Ku, 2013 Aug., \u201cTrust Management Model for QoS-driven Web Service Selection,\u201d Proceedings of 2013 International Conference on Medical Innovation and Computing Service, Tainan, Taiwan, ROC<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Hui-Ping Ho, Ching-Ter Chang and Cheng-Yuan Ku, 2013 Jun., &quot;House Selection via Internet by considering Homebuyers&#039; Risk Attitudes,&quot; PACIS 2013 Proceedings, Paper 151, Jeju Island, Korea, http:\/\/aisel. aisnet.org\/pacis2013\/151.<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Cheng-Yuan Ku and Yu-Siang Chiu, 2013 May, \u201cA Novel Infrastructure for Data Sanitization in Cloud Computing,\u201d Proceedings of TIIM 2013, Phuket, Thailand, pp. 72.<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, and Chien-Te Ho, 2013 Mar., \u201cA Security Mechanism for Cloud Computing Based on Trust Platform Module,\u201d Proceedings of WDSI 2013, Long Beach, California, USA, paper 55.<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, 2013 Jan., \u201cSolving Optimal Match-up Problem with Heuristics Algorithm: A Simulation-based Investigation,\u201d International Conference on Innovation and Management (IAM 2013 Winter), Sapporo , Japan.<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, 2012 Apr., \u201cAssessing Alignment of Websites with Enterprise Success,\u201d Proceedings of WDSI 2012, Big Island, Hawaii, USA, pp. 349- 350.<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Ja-Long Chen, Cheng-Yuan Ku, and David C. Yen, 2012 Apr., \u201cAn Efficient Key Management Scheme for Multicast Communication,\u201d Proceedings of WDSI 2012, Big Island, Hawaii, USA, pp. 373-374.<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Cheng-Yuan Ku and Chih Zhe Hung, 2011 Dec., \u201cAn Anonymous and Non-framing Watermarking Protocol for Digital Right Management,\u201d Online Proceedings of World Business and Economics Research Conference, Auckland, New Zealand, http:\/\/www.wbiconpro .com\/513-Cheng-Yuan.pdf.<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, Yi-Chang Lee, Yi-Hsien Lin, and Yi-Wen Chang, 2011 Aug., \u201cA Detection Method for Replication Attacks in Wireless Sensor Networks,\u201d Proceedings of International Conference on HumanCom and EMC 2011, Enshi, China, pp. 235-244.<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, 2011 Apr., \u201cSystem Design of Active Detection for Alternate Data Streams in the NTFS File\u201d, CD Proceeding of TBI<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, 2011 Apr., \u201cA Client-based Handoff Algorithm for 4G Networks Using Fuzzy Decision\u201d, CD Proceeding of TBI<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, 2011 Apr., \u201cThe Efficient Broadcast Authentication Mechanism for Wireless Sensor Network Using GPS and HAS\u201d, CD Proceeding of TBI<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, 2011 Apr., \u201cA Secure and Anonymous Protocol for Online Reporting System\u201d, CD Proceeding of TBI<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Cheng-Yuan Ku, 2010 Jul., \u201cContinuous and Dynamic Pricing Strategy with Inventory Control and Multiple Demands\u201d presented in 2010 ACME, Macau.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-91 from cache --><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Laboratory<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-2e518730bdebb73b0118fe3af96aefcb is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\" style=\"border-style:none;border-width:0px\"><summary>Laboratory introduction<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-9e090c43fd5d032670a064daf26b9e01\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">This laboratory mainly focuses on the integrated application of information technology and network technology. It focuses on connecting academic research and industry-university needs for industrial development, with equal emphasis on theory and practice. Research and engage in computer network-related application technology development, as well as basic theories in this area. Topics include attack detection and protection, topology research, model optimization and network model simulation of networks such as Wireless Sensor Networks (WSN) and Long Term Evolution (LTE); it also targets the Internet of Things (IoT) and software Define systems such as networks (SDN) to solve their security or resource allocation issues; it also includes analysis and risk assessment of trust reputation models, service level agreements (SLA) and information security system architecture at the electronic and mobile commerce level. It is hoped to train members to be familiar with relevant technologies and applications through a parallel approach of theory and practice.<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-ed6fd03b871980faad5b4fd24152a2bb is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Laboratory Direction<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-82ae73244589893ee0deb88220452a36\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computers and Communication Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-f2f3f65f8ebcbf87f21eecac829480ba\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Information Security<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-101c78a78edc8fc7a30266d5588d6361\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Electronic and Mobile Commerce<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c9ed96c0a3b13ff7b1d27d73b3dd5c7e is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Research tool<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-0b4798e5e750bc5e2b69744db3c355c7\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Java<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-f319e23a1d1d680c6e5fe39acb71c784\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">C++ or C#<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-47ded056849f62fa885ab659a796b1e0\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Networking Simulators<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-37c3eed2ba771f8cccb95564f551e78c\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computer Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-a9cb4f2787143c2276d84c48c239ed11\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Information Security<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-a7941dd3e0c088018f815ac962871f41 is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Basic Requirements<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-5dab5d60de0f697d4e73bb1141cf1868\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Programming<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-37c3eed2ba771f8cccb95564f551e78c\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computer Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-b55d3df0618f2eaa10b87af4e96c6338\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Wireless Sensor Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-a9cb4f2787143c2276d84c48c239ed11\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Information Security<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c353a76789a890aebec4c0e33ffa59cb is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Contact<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-05b18fb4283835e5467983deddb49ac7\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--60);margin-bottom:0;margin-left:var(--wp--preset--spacing--60)\">\u5442\u51a0\u878d \/ xo7999.mg11@nycu.edu.tw<\/h6>\n\n\n\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color wp-elements-3e69b136bc07c93ee9eea1b98e43c40b\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--60);margin-bottom:0;margin-left:var(--wp--preset--spacing--60);font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.156), 16px);\"><strong>\u6c5f\u7043\u6829 \/ fenghsu.mg12@nycu.edu.tw<\/strong><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-1478dd11298682925a6afc35f8ffd37b is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Laboratory Highlights<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"590\" height=\"408\" data-id=\"2091\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-1-1.jpg\" alt=\"\" class=\"wp-image-2091\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-1-1.jpg 590w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-1-1-300x207.jpg 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-1-1-200x138.jpg 200w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"590\" height=\"408\" data-id=\"2092\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-4.jpg\" alt=\"\" class=\"wp-image-2092\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-4.jpg 590w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-4-300x207.jpg 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-4-200x138.jpg 200w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" data-id=\"2088\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-2.jpg\" alt=\"\" class=\"wp-image-2088\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-2.jpg 960w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-2-300x169.jpg 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-2-768x432.jpg 768w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-2-200x113.jpg 200w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"720\" data-id=\"2090\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-3.jpg\" alt=\"\" class=\"wp-image-2090\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-3.jpg 960w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-3-300x225.jpg 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-3-768x576.jpg 768w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/NET-3-200x150.jpg 200w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n<\/figure>\n<\/details>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">\u51fa\u570b\u5831\u544a\u66f8<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<p><a href=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2025\/05\/\u51fa\u570b\u5831\u544a\u66f8.pdf\" target=\"_blank\" rel=\"noopener\" title=\"\">2025 WDSI \u51fa\u570b\u5831\u544a\u66f8<\/a><\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u53e4\u653f\u5143-\u6559\u6388 \u5e2b\u8cc7\u8207\u5be6\u9a57\u5ba4 \/ \u5c08\u4efb\u6559\u5e2b \u53e4\u653f\u5143 \u7814\u7a76\u5ba4 \u6821\u5167\u5206\u6a5f \u96fb\u5b50\u90f5\u4ef6 \u5be6\u9a57\u5ba4 \u6559\u6388 \u7ba1\u7406\u4e8c\u9928MB309 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":1568,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-1012","page","type-page","status-publish","hentry"],"blocksy_meta":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"\u912d \u701a","author_link":"https:\/\/iim.nycu.edu.tw\/en\/author\/hanworld"},"uagb_comment_info":0,"uagb_excerpt":"\u53e4\u653f\u5143-\u6559\u6388 \u5e2b\u8cc7\u8207\u5be6\u9a57\u5ba4 \/ \u5c08\u4efb\u6559\u5e2b \u53e4\u653f\u5143 \u7814\u7a76\u5ba4 \u6821\u5167\u5206\u6a5f \u96fb\u5b50\u90f5\u4ef6 \u5be6\u9a57\u5ba4 \u6559\u6388 \u7ba1\u7406\u4e8c\u9928MB309&hellip;","_links":{"self":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":24,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1012\/revisions"}],"predecessor-version":[{"id":3621,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1012\/revisions\/3621"}],"up":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1568"}],"wp:attachment":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/media?parent=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}