Papers by Cheng-ying Yang

Novel Emotion Recognition System Using Edge Computing Platform with Deep Convolutional Networks
Journal of Intelligent and Fuzzy Systems, Aug 1, 2023
Human faces have been naturally viewed as a central part in each image. One interesting task is t... more Human faces have been naturally viewed as a central part in each image. One interesting task is to classify each face into different categories based on the emotion shown in the facial expression. In addition, an awareness of emotion during work on a project and how affective states are presented in the communication style might help system developers work more effectively, thus improving the performance of a collaborative team. Currently, the feasibility and portability of emotion recognition in the platform with Raspberry PI are insufficient. Hereby, a novel emotion recognition system in real time using the edge computing platform with deep learning has been implemented successfully. The feature values of objects are calculated by a high computing processor on the embedded platform. When an object with the matching features is detected, it is drawn as a rectangular bounding box and the results are displayed on the screen. In the proposed system, it first annotates the image datasets and saves them in the corresponding input data format for model training. Thus, the You Only Look Once (YOLOv5) model has been employed for training because it is a state-of-the-art object detection system. In other words, a fast and accurate emotion recognition is the main benefits of choosing YOLOv5 model. Then, the correctly trained YOLOv5 model file is loaded into an edge computing platform; and the feature values of objects are analyzed by a high computing processor. Finally, the experimental results show that the promising mean Average Precision (mAP), 92.6%, and recognition speed in Frames Per Second (FPS), 40, are obtained, which outperforms other existing systems.
Smart Control of Home Appliances Using Hand Gesture Recognition in an IoT-Enabled System
Applied Artificial Intelligence, Feb 15, 2023
Development and Evaluation of an Intelligent System for Calibrating Karaoke Lyrics Based on Fuzzy Petri Nets
Applied Artificial Intelligence, Aug 22, 2022
Smart selection from petri net modeling tools for fast developing a manufacturing system
Cogent engineering, Jan 23, 2022
Systems Engineering, Feb 9, 2018
The ever increasing sales of Apple's iPad have created a tablet computer craze, attracting variou... more The ever increasing sales of Apple's iPad have created a tablet computer craze, attracting various manufacturers to invest and conduct research in this sector. Meanwhile, the production cost is crucial to being considered in the craze. To lower the cost, manufacturers are striving to develop reasonable and complete manufacturing processes. We have herewith proposed a Petri net model to describe the system structure and to label out the simulated operation messages or dynamic decision-making behaviors. The key minimal cost path is finally found so as to manifest the optimal decision-making on the production flow. Finally, the software tool, PIPE-2, is used to verify the algorithm of finding the minimal cost path. Thus, the experimental results successfully demonstrate the feasibility of the proposed approach.
Development and Evaluation of an Attendance Tracking System Using Smartphones with GPS and NFC
Applied Artificial Intelligence, Jun 4, 2022

Modeling and verification of an intelligent tutoring system based on Petri net theory
Mathematical Biosciences and Engineering, 2019
According to the educational regulations in Taiwan, students are required to learn English when t... more According to the educational regulations in Taiwan, students are required to learn English when they are at the first grade of elementary school. However, not all the students have an appropriate environment to practice English, especially, for those students whose school is not located in the city. Thus, their English abilities in speaking, reading, and listening are poor. An intelligent tutoring system is used to help the students improve their English capabilities. This paper aims to provide a convenient tutoring environment, where teachers and students do not need to prepare a lot of teaching aids. They can teach and learn English whenever in the environment. Also, it proposes a method to verify the intelligent tutoring system using Petri nets. We have built the intelligent tutoring system based on Augmented Reality (AR), Text-to-Speech (TTS), and Speech Recognition (SR). This intelligent tutoring system is divided into two parts: one for teachers and the other for students. The experimental results have indicated that using Petri nets can help users verify the intelligent tutoring system for better learning performance and operate it correctly.

Int. J. Netw. Secur., 2017
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for t... more With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently, the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative communication system. Based on the Shannon third theorem on channel capacity, this work analyzes the secrecy capacity between the source station and the destination station. For a practical situation in the system, the scenario includes multiple source stations, multiple relay stations, multiple destination stations, and eavesdroppers. For the positive secrecy rate consideration, the maximum mutual information between the source station and the destination station and the minimum mutual information between the source station and the eavesdropper should be held. To ensure a secure communication, the derived theoretical solution could be applied to find the optimal relay assignment. Beyond the relay selection, some issues related to the secure cooperative communication are suggested for the future researches in the final.
Novel Deadlock Control for Smartphone Manufacturing Systems Using Petri Nets
International Journal of Control Automation and Systems, Mar 1, 2022
An Edge Computing System for Fast Image Recognition Based on Convolutional Neural Network and Petri Net Model
Multimedia Tools and Applications, Jul 1, 2023
Error rate prediction of the low Earth orbit (LEO) satellite channel
Error rate prediction the LEO land mobile satellite channel is presented. Since it could hardly b... more Error rate prediction the LEO land mobile satellite channel is presented. Since it could hardly be expressed the error rate under the practical degradation factors in a closed form, the method to predict the error rate using the known moments of the degradation factors is employed. The numerical result in this analysis especially under the effects of the traveling wave

Sensors, Apr 5, 2018
Modern societies are moving toward an information-oriented environment. To gather and utilize inf... more Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

As the current agricultural industry is facing several challenges, including climate changes and ... more As the current agricultural industry is facing several challenges, including climate changes and lack of qualified farmers, it is extremely necessary to ensure sustainable agriculture and food supply by smart farming (SF). This can assist farmers and associated stakeholders in making correct decision that improves the yield and quality of agricultural product. Thus, an SF system based on low-cost Raspberry Pi and Internet of Things (IoT) technologies has been successfully implemented. Through the data items detected by sensors to deeply manage the planting process, the IoT-Enabled communication protocol under ISO standards of Message Queuing Telemetry Transport (MQTT) was used. The bar charts of real-time environmental parameters are presented on ThingsBoard to achieve the goal of data visualization. Meanwhile, a web server is built for the customized requirements, and the historical datasets are stored in the SQLite database system. Furthermore, a Petri net (PN) model is employed to detect all possible abnormal processes and to verify the feasibility and soundness of IoT-Enabled system by using a software tool, WoPeD. Finally, the experimental results show that the plants cultivated by the proposed IoT-Enabled system are superior to those cultivated by the traditional methods in many perspectives, especially a promising precision, 93.6%.
Research Square (Research Square), Jul 12, 2021

As the current agricultural industry is facing several challenges, including climate changes and ... more As the current agricultural industry is facing several challenges, including climate changes and lack of qualified farmers, it is extremely necessary to ensure sustainable agriculture and food supply by smart farming (SF). This can assist farmers and associated stakeholders in making correct decision that improves the yield and quality of agricultural product. Thus, an SF system based on low-cost Raspberry Pi and Internet of Things (IoT) technologies has been successfully implemented. Through the data items detected by sensors to deeply manage the planting process, the IoT-Enabled communication protocol under ISO standards of Message Queuing Telemetry Transport (MQTT) was used. The bar charts of real-time environmental parameters are presented on ThingsBoard to achieve the goal of data visualization. Meanwhile, a web server is built for the customized requirements, and the historical datasets are stored in the SQLite database system. Furthermore, a Petri net (PN) model is employed t...

A Secure End-to-End Mobile Chat Scheme
2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, 2014
Currently, mobile communications are provided convenient methods to explore and communicate with ... more Currently, mobile communications are provided convenient methods to explore and communicate with each other people. A multitude of services have converged on the smartphone platform, and potentially the most notable is social networking. Thus, the electronic Mobile Chat (MC) plays a very important role in the social networking. With the increasingly growing reliance on Mobile Chat System (MCS) in one hand, and the growing number of vulnerabilities and attacks on the other hand, there is an increasingly demand for the security solutions. Despite of the critical role of MCS in the typical Internet mobile user's life, electronic MC services are not so secure. Therefore, the secure End-to-End Mobile Chat (SE2E-MC) scheme is proposed to be one of the suitable solutions. The basic framework for SE2E-MC scheme and its associated requirements are also designed in this paper. The proposal is implemented to provide mutual authentication and prevent the password guessing attack and the undetectable on-line password guessing attack. Finally, the scheme is a password-based authentication and key agreement (AKA) having easy remembered property.

MATEC Web of Conferences, 2018
As both carbon monoxide (CO) and carbon dioxide (CO2) exit during a fire, they are obvious indica... more As both carbon monoxide (CO) and carbon dioxide (CO2) exit during a fire, they are obvious indicators for the need to be alert to the possibility of fire. Another problem concerning poisoning by carbon monoxide (CO) is asphyxiation that occurs in houses during winter. The development of an automatic gas poisoning prevention system in conjunction with a ventilation function using carbon monoxide/carbon dioxide sensors would prove beneficial, necessary. As presented here, this system includes two gas sensors, an alarm, a ventilation device, a motor, and a rain-protection louver. The louver is manipulated by a motor. Two thresholds of gas concentration are preset inside the microcontroller via a PC. The louver is opened by the motor as the first threshold of gas is reached. Additionally, an alarm system is triggered and the ventilation fan starts up if the second threshold of gas concentration is reached. Consequently, image-monitoring via the PC is established using an IPCAM.
Computers & Electrical Engineering, 2020

Journal of Electronic Science and Technology, 2014
Using a relaying system to provide spatial diversity and improve the system performance is a tend... more Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be implemented. Under the consideration of cooperative communication systems, the scenario includes one information source, M relay stations and N destinations. This work proposes a relay selection algorithm in the Raleigh fading channel. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, an approximate optimal solution with a greedy algorithm applied for the relay station selection is proposed. With different situations of the communication systems, the performance evaluation obtained by both the proposed algorithm and the exhaustive search algorithm are given for comparison. It shows the proposed algorithm could provide a solution approach t...
A Problem-Based Learning System in the Case of Information Technology Education
editlib.org
... Victor RL Shen1, Tong-Ying Juang1 and Cheng-Ying Yang*,2 1 Department of Computer Science and... more ... Victor RL Shen1, Tong-Ying Juang1 and Cheng-Ying Yang*,2 1 Department of Computer Science and Information Engineering National Taipei University 151, University Rd., San Shia, Taipei, 237 Taiwan ... In this project, there are twenty-five juniors attending in this experiment. ...
Uploads
Papers by Cheng-ying Yang