Han‐Chieh Chao

ORCID: 0000-0003-3222-1708
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Wireless Networks and Protocols
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Wireless Network Optimization
  • Cooperative Communication and Network Coding
  • Data Mining Algorithms and Applications
  • Advanced MIMO Systems Optimization
  • Software-Defined Networks and 5G
  • Mobile Agent-Based Network Management
  • Rough Sets and Fuzzy Logic
  • Data Management and Algorithms
  • Wireless Communication Networks Research
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Harvesting in Wireless Networks
  • Security in Wireless Sensor Networks
  • Context-Aware Activity Recognition Systems
  • Multimedia Communication and Technology
  • Network Traffic and Congestion Control
  • Internet Traffic Analysis and Secure E-voting

Fo Guang University
2024-2025

National Dong Hwa University
2016-2025

UCSI University
2023-2025

Tamkang University
2024-2025

Czech Academy of Sciences, Institute of Computer Science
2018-2024

Hungkuang University
2024

National Ilan University
2013-2023

National Taipei University of Technology
2021

National Taiwan University
2021

Georgia Institute of Technology
2021

The age of big data is now coming. But the traditional analytics may not be able to handle such large quantities data. question that arises is, how develop a high performance platform efficiently analyze and design an appropriate mining algorithm find useful things from To deeply discuss this issue, paper begins with brief introduction analytics, followed by discussions analytics. Some important open issues further research directions will also presented for next step

10.1186/s40537-015-0030-3 article EN cc-by Journal Of Big Data 2015-10-01

An important challenge for supporting multimedia applications in the Internet of Things is security heterogeneity wired and wireless sensor actuator networks. In this work, we design a new efficient media-aware framework facilitating various Things. First, present novel traffic classification analysis method handling diverse applications. Then architecture proposed based on given to enable services being available anywhere anytime. Furthermore, provide rule strategy achieve good trade-off...

10.1109/mnet.2011.5772059 article EN IEEE Network 2011-05-01

The main purpose of data mining and analytics is to find novel, potentially useful patterns that can be utilized in real-world applications derive beneficial knowledge. For identifying evaluating the usefulness different kinds patterns, many techniques constraints have been proposed, such as support, confidence, sequence order, utility parameters (e.g., weight, price, profit, quantity, satisfaction, etc.). In recent years, there has an increasing demand for utility-oriented pattern (UPM, or...

10.1109/tkde.2019.2942594 article EN cc-by IEEE Transactions on Knowledge and Data Engineering 2019-09-20

With the fast development of industrial Internet things (IIoT), a large amount data is being generated continuously by different sources. Storing all raw in IIoT devices locally unwise considering that end devices' energy and storage spaces are strictly limited. In addition, unreliable vulnerable to many threats because networks may be deployed remote unattended areas. this paper, we discuss emerging challenges aspects processing, secure storage, efficient retrieval dynamic collection IIoT....

10.1109/tii.2018.2793350 article EN IEEE Transactions on Industrial Informatics 2018-01-15

Abstract The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. intruders utilize loophole to carry out their malicious behaviors because route discovery process necessary and inevitable. Many researchers have conducted different detection techniques propose types schemes. In this paper, we survey existing solutions discuss state-of-the-art routing methods. We not only classify these proposals into single collaborative but also analyze categories...

10.1186/2192-1962-1-4 article EN cc-by Human-centric Computing and Information Sciences 2011-11-22

With the growing popularity of shared resources, large volumes complex data different types are collected automatically. Traditional mining algorithms generally have problems and challenges including huge memory cost, low processing speed, inadequate hard disk space. As a fundamental task mining, sequential pattern (SPM) is used in wide variety real-life applications. However, it more challenging than other tasks, i.e., frequent itemset association rule also suffers from above when handling...

10.1145/3314107 article EN ACM Transactions on Knowledge Discovery from Data 2019-06-07

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation delay constraints WSNs, traditional mechanisms cannot be used. Trust management models have been recently suggested as an effective mechanism for WSNs. Considerable research has done on modeling managing trust. In this paper, we present a detailed survey various trust that geared towards Then, analyze applications models. They malicious attack detection, secure routing, data...

10.1016/j.jcss.2013.06.014 article EN publisher-specific-oa Journal of Computer and System Sciences 2013-07-04

As vehicle applications, mobile devices and the Internet of Things are growing fast, developing an efficient architecture to deal with big data in Vehicles (IoV) has been important concern for future smart city. To overcome inherent defect centralized processing cloud computing, fog computing proposed by offloading computation tasks local servers (LFSs). By considering factors like latency, mobility, localization, scalability, this article proposes a regional cooperative fog-computing-based...

10.1109/mcom.2017.1700208 article EN IEEE Communications Magazine 2017-12-01

In order to optimize the resource utilization of physical machines (PMs), workload prediction virtual (VMs) is vital but challenging. Most existing literatures focus on either or allocation individually, both them are highly correlated. this paper, we propose a multiobjective genetic algorithm (GA) dynamically forecast and energy consumption in cloud data center. We formulate optimization problem allocation, which considers CPU memory VMs PMs, The proposed GA forecasts requirement next time...

10.1109/jsyst.2017.2722476 article EN IEEE Systems Journal 2017-07-21

Traditional education has been updated with the development of information technology in human history. Within big data and cyber-physical systems, Metaverse generated strong interest various applications (e.g., entertainment, business, cultural travel) over last decade. As a novel social work idea, consists many kinds technologies, e.g., data, interaction, artificial intelligence, game design, Internet computing, Things, blockchain. It is foreseeable that usage will contribute to...

10.1109/bigdata55660.2022.10021004 article EN 2021 IEEE International Conference on Big Data (Big Data) 2022-12-17

As a fusion of various emerging digital technologies, the Metaverse aims to build virtual shared space. It is closely related extended reality, twin, blockchain, and other technologies. Its goal space based on real world, form economic system, expand human activities, which injects new vitality into social, economic, fields. In this article, we make following contributions. We first introduce basic concepts such as development process, definition, characteristics Metaverse. After that,...

10.48550/arxiv.2210.07990 preprint EN other-oa arXiv (Cornell University) 2022-01-01

This study presents a healthcare monitoring architecture coupled with wearable sensor systems and an environmental network for elderly or chronic patients in their residence. The system, built into fabric belt, consists of various medical sensors that collect timely set physiological health indicators transmitted via low energy wireless communication to mobile computing devices. Three application scenarios are implemented using the proposed architecture. group-based data collection...

10.1109/jsac.2009.090505 article EN IEEE Journal on Selected Areas in Communications 2009-05-01

Traditional association rule mining has been widely studied. But it is unsuitable for real‐world applications where factors such as unit profits of items and purchase quantities must be considered. High‐utility itemset (HUIM) designed to find highly profitable patterns by considering both the items. However, most HUIM algorithms are applied static databases. in market basket analysis business decision‐making, databases often dynamically updated inserting new data customer transactions....

10.1002/widm.1242 article EN Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery 2018-01-14

Nowadays, smartphones have become indispensable to everyone, with more and built-in location-based applications enrich our daily life. In the last decade, fingerprinting based on RSS has a research focus in indoor localization, due its minimum hardware requirement satisfiable positioning accuracy. However, time-consuming labor-intensive site survey is big hurdle for practical deployments. Fingerprint crowdsourcing recently been promoted relieve burden of by allowing common users contribute...

10.1109/mwc.2016.7498078 article EN IEEE Wireless Communications 2016-06-01

Mining useful patterns from varied types of databases is an important research topic, which has many real-life applications. Most studies have considered the frequency as sole interestingness measure to identify high-quality patterns. However, each object different in nature. The relative importance objects not equal, terms criteria, such utility, risk, or interest. Besides, another limitation frequent that they generally a low occupancy, is, often represent small sets items transactions...

10.1109/tcyb.2019.2896267 article EN IEEE Transactions on Cybernetics 2019-02-20

Due to the rapid growth of resource sharing, distributed systems are developed, which can be used utilize computations. Data mining ( DM ) provides powerful techniques for finding meaningful and useful information from a very large amount data, has wide range real‐world applications. However, traditional algorithms assume that data is centrally collected, memory‐resident, static. It challenging manage large‐scale process them with limited resources. For example, amounts quickly produced...

10.1002/widm.1216 article EN Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery 2017-07-18

Wireless networks have evolved from 1G to 4G networks, allowing smart devices become important tools in daily life. The 5G network is a revolutionary technology that can change consumers' Internet use habits, as it creates truly wireless environment. It faster, with better quality, and more secure. Most importantly, users services anytime, anywhere. With increasing demand, the of bandwidth frequency spectrum resources beyond expectations. This paper found information considerable relevance;...

10.1109/access.2014.2357435 article EN cc-by-nc-nd IEEE Access 2014-01-01

This paper aimed to use several triaxial acceleration sensor devices for joint sensing of injured body parts, when an accidental fall occurs. The model transmitted the information fed by sensors distributed over various parts computer through wireless transmission further analysis and judgment, employed cognitive adjustment method adjust range in different movements. can determine possible occurrence accidents, significantly exceeds usual range. In addition, after a accident occurs, impact...

10.1109/jsen.2010.2062501 article EN IEEE Sensors Journal 2010-09-29

The current Internet has many inherent shortcomings, such as poor security, low mobility, and high energy consumption, which all seriously hinder its further development. This article first re-examines the original design of Internet, points out so-called triple bindings, namely resource/location binding, user/network control/data are root causes Internet's problems. A collaborative architecture named SINET is proposed by removing restrictions from bindings completely. contains three layers...

10.1109/mnet.2016.7474343 article EN IEEE Network 2016-05-01

Abstract Key establishment is the most fundamental cryptographic primitive in all kinds of applications where security a concern. However, nature limited resources on sensor nodes restricts use conventional key management techniques wireless networks. Many researchers have conducted different to propose types distribution schemes. In this paper, we survey existing solutions and describe state‐of‐the‐art techniques. We not only classify these proposals into location‐independent schemes...

10.1002/sec.354 article EN Security and Communication Networks 2011-07-13

Edge computing has emerged as a promising technique because of its advantages in providing low-latency computation offloading services for resource-limited mobile user devices and Internet Things applications. Computationally intensive artificial intelligence (AI) tasks are well suited to be offloaded the Cloudlet server, but there is lack energy-delay optimization models specifically designed this edge AI scenario. In paper, we propose multiple algorithm service model (MASM) that provides...

10.1109/tii.2019.2897001 article EN IEEE Transactions on Industrial Informatics 2019-02-01

High-utility sequential pattern (HUSP) mining is an emerging topic in the field of knowledge discovery databases. It consists discovering subsequences that have a high utility (importance) sequences, which can be referred to as HUSPs. HUSPs applied many real-life applications, such market basket analysis, e-commerce recommendations, click-stream and route planning. Several algorithms been proposed efficiently mine utility-based useful patterns. However, due combinatorial explosion search...

10.1109/tcyb.2020.2970176 article EN publisher-specific-oa IEEE Transactions on Cybernetics 2020-02-28
Coming Soon ...