Kuang-Yen Tai

ORCID: 0000-0003-1778-8896
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Software Engineering Techniques and Practices
  • Transportation and Mobility Innovations
  • Indoor and Outdoor Localization Technologies
  • Cryptography and Data Security
  • Access Control and Trust
  • Context-Aware Activity Recognition Systems
  • Software Engineering Research
  • Privacy-Preserving Technologies in Data
  • Energy Harvesting in Wireless Networks
  • Stroke Rehabilitation and Recovery
  • Target Tracking and Data Fusion in Sensor Networks
  • Collaboration in agile enterprises
  • Information Technology Governance and Strategy
  • Sharing Economy and Platforms
  • Cloud Computing and Resource Management
  • Advanced Authentication Protocols Security
  • IoT and Edge/Fog Computing
  • Software Reliability and Analysis Research
  • Information and Cyber Security
  • Energy Efficient Wireless Sensor Networks
  • Advanced Software Engineering Methodologies
  • Non-Invasive Vital Sign Monitoring
  • Advanced Adaptive Filtering Techniques

National Taiwan University
2018-2023

National Taipei University
2020-2021

Tunghai University
2017

Data61
2007

The rapid development of AIOT-related technologies has revolutionized various industries. advantage such real-time sensing, low costs, small sizes, and easy deployment makes extensive use wireless sensor networks in fields. However, due to the transmission data, limited built-in power supply, controlling energy consumption making application network more efficient is still an urgent problem be solved practice. In this study, we construct as a tree structure mathematical model, which mainly...

10.3390/s23020763 article EN cc-by Sensors 2023-01-09

At a significant moment in the rapid development of cloud technology, large-scale computing centers have emerged. With emergence internet and artificial intelligence, enormous resources are required to process data train machine learning models. The architecture involves millions resources, improper management these can increase operating costs exert tremendous pressure on environment. This study proposes an optimized resource energy algorithm for with heterogeneous from perspective Green...

10.1109/access.2023.3280930 article EN cc-by-nc-nd IEEE Access 2023-01-01

This study presents an architectural framework for the blockchain-based usage-based insurance (UBI) policy auction mechanism in internet of vehicles (IoV) applications. The main objective this is to analyze and design specific blockchain architecture management considerations UBI environment. An developed platform enhance consumer trust. identifies correlations between driving behaviors associated risks determine a driver's score. A decentralized bidding algorithm proposed implemented on...

10.3390/s23146482 article EN cc-by Sensors 2023-07-18

Location tracking in wireless networks has many applications, including enhanced network performance. In this work we investigate the experimental use of "particle filter" techniques as applied to mobile device problem WiFi networks. Particle filters are well suited non-Gaussian and biased error conditions characteristic signals found most networks, allowing for seamless data fusion with intermittent GPS availability prior map information. Our results show that particle filter can indeed...

10.1109/icc.2007.775 article EN IEEE International Conference on Communications 2007-06-01

Software reverse engineering (SRE) plays a crucial role in contemporary software environments. developers may implement system first then use SRE tools to generate design content such as the Unified Modeling Language (UML) diagrams. In literature of SRE, studies majorly focus on how precisely conversion can reflect system; there is, however, little or no research that further looks into quality converted results. Therefore, this paper presents an online knowledge-based ontological system,...

10.1109/access.2021.3102295 article EN cc-by IEEE Access 2021-01-01

With the growth of Virtual Reality (VR) and Augmented (AR) in technologies such as artificial intelligence, wireless, 5G, big data, massive compute, industrial 4.0 virtual stores. An improved secure mechanism which was previously still existed some shortcomings, presented this paper. Another new regards to achieve decentralized environment access control is introduced attain needs non-specific internet. Furthermore, it very important look attentively administrative previleges VR/AR clouds....

10.1109/iceta.2018.8572099 article EN 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA) 2018-11-01

This article highlights the importance of software process tailoring (SPT) in engineering and managing dynamic innovative development. In addition, it investigates effects learning capabilities a team surrounding climates when conducting SPT. Given highly interdependent characteristics development tasks knowledge-intensive nature SPT, this investigation focuses on absorptive capacity (AC) transactive memory systems (TMS) to determine how creates distributes knowledge perform SPT efficiently...

10.1109/tem.2023.3314284 article EN IEEE Transactions on Engineering Management 2023-09-21

The advance of information network makes lots users start to store personal or corporately confidential documents in environments digitally. In this case, it is necessary effectively prevent data from being stolen through the authority management. past years, some chief medical institutions apply e-database system and collect information, including patients' information. Aiming at patient's electronic record data, greatest advantage mobile agents use. virtual network, we can legally various...

10.1109/icice.2017.8479172 article EN 2017 International Conference on Information, Communication and Engineering (ICICE) 2017-11-01
Coming Soon ...