古政元

教授

研究室

管理二館MB309

校內分機

57413

E-mail

cooper.c.y.ku@gmail.com, cooperku@nycu.edu.tw

實驗室

通訊網路與資訊安全實驗室

通訊網路與資訊安全實驗室

地點:管理二館MB107

分機:57421

研究領域

電腦與資料通訊網路

資訊安全

電子與行動商務

開授課程

隨機過程

資訊安全

商用資料通訊

教師學歷

  • 西北大學 電機工程與資訊科學博士
  • 國立交通大學 控制工程系

教師經歷

  • 國立中正大學 資訊管理系所 教授兼管理學院副院長暨EMBA執行長
  • 國立中正大學 資訊管理系所 教授兼系主任暨所長
  • 國立中正大學 資訊管理系所 教授
  • 國立中正大學 資訊管理系所 副教授
  • 國立中正大學 資訊管理系所 助理教授
  • 義守大學 資訊工程系所 副教授
  • 美國 西北大學 電機工程與資訊科學系所 研究助理

研究領域

  • 電腦與資料通訊網路
  • 資訊安全
  • 電子與行動商務

開授課程

  • 隨機過程
  • 資訊安全
  • 商用資料通訊

期刊論文

  • 1.Wen-Huai Hsieh, Cooper Cheng-Yuan Ku, Humble Po-Ching Hwang, Min-Juei Tsai, and Zheng-Zhun Chen, “Model for Predicting Complications of Hemodialysis Patients Using Data from the Internet of Medical Things and Electronic Medical Records,” IEEE Journal of Translational Engineering in Health and Medicine, Forthcoming. (SCI) (Acceptance email was dated 28/Dec/2022)
  • 2.Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, and Mason Chao-Yang Huang, ”Intelligent Cleanup Scheme for Soiled Photovoltaic Modules,” Energy, vol. 265, article 126293, Feb. 2023. (SCI)
  • 3.Ting-Yu Chang, Cooper Cheng-Yuan Ku, Tai-Yuen Cheng, Cheng-Kung Chung, and Emilio Chang Sanchez, “Modular Counting Management System for Mall Parking Services,” Computers & Industrial Engineering, vol. 171, article 108362, Sep. 2022. (SCI)
  • 4.Hsin-Hsiu Chen, Cooper Cheng-Yuan Ku, and David C. Yen, “Improved Fault-Tolerant SPRT Detection Method for Node Replication Attacks in Wireless Sensor Networks,” International Journal of Sensor Networks, vol. 39, no. 4, pp. 279-288, 2022. (SCI)
  • 5.謝文淮,古政元,黃伯靜,”植基於區塊鏈之醫療服務品質匿名評價評論系統,”技術學刊,第三十七卷,第一期,65-77頁,中華民國111年. (EI)
  • 6.Ting-Yu Chang, and Cooper Cheng-Yuan Ku, "Fuzzy Filtering Ranking Method for Multi-criteria Decision Making," Computers & Industrial Engineering, vol. 156, article 107217, Jun. 2021. (SCI)
  • 7.Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, and James Chi-Chang Chan, “Detection of Malfunctioning Photovoltaic Modules Based on Machine Learning Algorithms,” IEEE Access, vol. 9, pp. 37210-37219, 2021. DOI: 10.1109/ACCESS.2021.3063461. (SCI)
  • 8.Karamo Kanagi, Cooper Cheng-Yuan Ku, Li-Kai Lin, and Wen-Huai Hsieh, “Efficient Clinical Data Sharing Framework Based on Blockchain Technology,” Methods of Information in Medicine, vol. 59, pp. 193-204, 2020. (SCI)
  • 9.洪嘉慶,黃正魁,古政元,”資訊安全新聞事件與企業股價異常報酬之研究,”資訊管理學報, vol. 25, no. 3, pp. 283-306, Jul. 2018. (TSSCI)
  • 10.Tsung-Han Yang, Cheng-Yuan Ku, and Man-Nung Liu, “Case Study: Application of Enhanced Delphi Method for Software Development and Evaluation in Medical Institutes,” Kybernetes, vol. 45, no. 4, pp. 637- 649, 2016. (SCI)
  • 11.Hsin-Pin Fu, Cheng-Yuan Ku, and Tsung-Sheng Chang, “A Decision Support System Based on a Genetic Algorithm for the Utilization of Leftovers,” International Journal of Computational Intelligence Systems, vol. 9, no. 3, pp. 483-496, 2016. (SCI)
  • 12.Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen, and Wen-Huai Hsieh, “An Improved Strategic Information Management Plan for Medical Institutes,” Computer Standards & Interfaces, vol. 45, pp. 26-36, Mar. 2016. (SCI)
  • 13.Tsung-Han Yang, Cheng-Yuan Ku, and Man-Nung Liu, “An Integrated System for Information Security Management with the Unified Framework,” Journal of Risk Research, vol. 19, no. 1, pp. 21-41, 2016. (SSCI)
  • 14.Tsung-Sheng Chang, Hsin-Pin Fu, and Cheng-Yuan Ku, “A Novel Model to Implement ERP Based on Dynamic Capabilities - A Case Study of An IC Design Company,” Journal of Manufacturing Technology Management, vol. 26, no. 7, pp. 1053-1068, 2015.
  • 15.Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, “House Selection via the Internet by Considering Homebuyers' Risk Attitudes with S- shaped Utility Functions,” European Journal of Operational Research, vol. 241, no. 1, pp. 188-201, Feb. 2015. (SCI)
  • 16.Cheng-Yuan Ku, Pei-Chen Sung and Wen-Huai Hsieh, “Policy Satisfaction for Separation of Dispensing from Medical Practices in Taiwan: Success of the Prescription-Release Information System,” Telematics and Informatics, vol. 31, no. 2, pp. 334-343, May 2014. (SSCI)
  • 17.Pei-Chen Sung, Cheng-Yuan Ku, and Chien-Yuan Su, “Understanding the Propagation Dynamics of Multipartite Computer Virus,” Industrial Management & Data System, vol. 114, no. 1, pp. 86-106, 2014. (SCI)
  • 18.Hsin-Pin Fu, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, Cheng-Hsin Huang, “The Critical Success Factors Affecting the Adoption of an Inter-Organization System by SMEs,” Journal of Business and Industrial Marketing, vol. 29, no. 5, pp. 400-416, 2014. (SSCI)
  • 19.Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, "Grey Theory Analysis of Online Population and Online Game Industry Revenue in Taiwan," Technological Forecasting and Social Change, vol. 80, pp. 175-185, 2013. (SSCI)
  • 20.Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, “On the Location Selection Problem Using Analytic Hierarchy Process and Multi-Choice Goal Programming,” International Journal of Systems Science, vol. 44, no. 1, pp. 94-108, Jan. 2013. (SCI)
  • 21.Hsieh-Hong Huang, Jack Shih-Chieh Hsu, and Cheng-Yuan Ku, “Understanding the role of computer-mediated counter-argument in countering confirmation bias,” Decision Support Systems, vol. 53, no. 3, pp. 438-447, Jun. 2012. (SCI)
  • 22.Cheng-Yuan Ku and Yi-Wen Chang, “Optimal Production and Selling Policies with Fixed-Price Contracts and Contingent-Price Offers”, International Journal of Production Economics, vol. 137, no. 1, pp. 94-101, May 2012. (SCI)
  • 23.Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, “Aligning Websites with Enterprise Success: An Evaluative Approach,” Journal of Computer Information Systems, vol. 52, no. 4, pp. 49-58, summer 2012. (SCI)
  • 24.Cheng-Yuan Ku, Yi-Wen Chang, and Chun-Wei Kuo, “A Method to Accelerate the Computation of Successive Approximation,” Advanced Science Letters, vol. 16, no. 1, pp. 326-331, Sep. 2012. (SCI)
  • 25.Pei-Chen Sung, Cheng-Yuan Ku, Chia-Ping Chen, "Research of the Computer Viruses Prevention Policy Using System Dynamics," Journal of Information Management, vol. 19, no. 3, pp. 621-652, Jul. 2012. (in Chinese) (TSSCI)
  • 26.Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen and Wen-Huai Hsieh, “Electronic Hand-Drafting and Picture Management System,” Journal of Medical Systems, vol. 36, no. 4, pp. 2297-2307, Aug. 2012. (SCI)

研討會論文

  • 1.Man-Nung Liu, Cheng-Yuan Ku and Tsung-Han Yang, 2014 May, “A Secure Software Development Framework Based on Security Patterns,” Proceedings of TIIM 2014, Seoul, Korea.
  • 2.Tsung-Han Yang, Cheng-Yuan Ku, Yung-Ting Chuang, 2014 Apr., “An Integrated Risk Analysis Framework for Improving Security of Software Development Life Cycle,” Proceedings of WDSI 2014, Napa Valley, California, U.S.A.
  • 3.Po-Ling Sun and Cheng-Yuan Ku, 2013 Aug., “Trust Management Model for QoS-driven Web Service Selection,” Proceedings of 2013 International Conference on Medical Innovation and Computing Service, Tainan, Taiwan, R.O.C.
  • 4.Hui-Ping Ho, Ching-Ter Chang and Cheng-Yuan Ku, 2013 Jun., “House Selection via Internet by considering Homebuyers’ Risk Attitudes,” PACIS 2013 Proceedings, Paper 151, Jeju Island, Korea, http://aisel.aisnet.org/pacis2013/151.
  • 5.Cheng-Yuan Ku and Yu-Siang Chiu, 2013 May, “A Novel Infrastructure for Data Sanitization in Cloud Computing,” Proceedings of TIIM 2013, Phuket, Thailand, pp. 72.
  • 6.Cheng-Yuan Ku, and Chien-Te Ho, 2013 Mar., “A Security Mechanism for Cloud Computing Based on Trust Platform Module,” Proceedings of WDSI 2013, Long Beach, California, U.S.A., paper 55.
  • 7.Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, 2013 Jan., “Solving Optimal Match-up Problem with Heuristics Algorithm: A Simulation-based Investigation,” International Conference on Innovation and Management (IAM 2013 Winter), Sapporo, Japan.
  • 8.Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, 2012 Apr., “Assessing Alignment of Websites with Enterprise Success,” Proceedings of WDSI 2012, Big Island, Hawaii, U.S.A., pp. 349-350.
  • 9.Ja-Long Chen, Cheng-Yuan Ku, and David C. Yen, 2012 Apr., “An Efficient Key Management Scheme for Multicast Communication,” Proceedings of WDSI 2012, Big Island, Hawaii, U.S.A., pp. 373-374.
  • 10.Cheng-Yuan Ku and Chih Zhe Hung, 2011 Dec., “An Anonymous and Non-framing Watermarking Protocol for Digital Right Management,” Online Proceedings of World Business and Economics Research Conference, Auckland, New Zealand, http://www.wbiconpro.com/513-Cheng-Yuan.pdf.
  • 11.Cheng-Yuan Ku, Yi-Chang Lee, Yi-Hsien Lin, and Yi-Wen Chang, 2011 Aug., “A Detection Method for Replication Attacks in Wireless Sensor Networks,” Proceedings of International Conference on HumanCom and EMC 2011, Enshi, China, pp. 235-244.
  • 12.Cheng-Yuan Ku, 2011 Apr., “System Design of Active Detection for Alternate Data Streams in the NTFS File”, CD Proceeding of TBI
  • 13.Cheng-Yuan Ku, 2011 Apr., “A Client-based Handoff Algorithm for 4G Networks Using Fuzzy Decision”, CD Proceeding of TBI
  • 14.Cheng-Yuan Ku, 2011 Apr., “The Efficient Broadcast Authentication Mechanism for Wireless Sensor Network Using GPS and HAS”, CD Proceeding of TBI
  • 15.Cheng-Yuan Ku, 2011 Apr., “A Secure and Anonymous Protocol for Online Reporting System”, CD Proceeding of TBI
  • 16.Cheng-Yuan Ku, 2010 Jul., “Continuous and Dynamic Pricing Strategy with Inventory Control and Multiple Demands” presented in 2010 ACME, Macau.

實驗室介紹

本實驗室主要著重在資訊科技與網路技術的整合應用,以連結產業發展的學術研究與產學需求為主軸,理論與實務並重。研究從事電腦網路相關應用技術開發,以及此方面的基礎理論。主題有無線感測網路 (WSN)和長期演進技術(LTE)等網路之攻擊偵測與防護、拓樸研究、模型最佳化與網路模型模擬;也針對物聯網(IoT)和軟體定義網路(SDN)等系統解決其安全或資源分配之問題;另外包括電子與行動商務層面的信任聲譽模型、服務水平協議(SLA)和資訊安全系統架構之分析與風險評估等。希冀藉由理論與實務並行的方式訓練成員熟悉相關技術和應用。

實驗室方向

電腦與通訊網路
資訊安全
電子與行動商務

研究工具

Java
C++ or C#
Networking Simulators
Computer Networks
Information Security

基礎需求

Programming
Computer Networks
Wireless Sensor Networks
Information Security

可供聯絡之學長姊

Amber Wang / amber1218.mg09@nycu.edu.tw

實驗室花絮