default search action
Cheng-Yuan Ku
Person information
- affiliation: National Chung Cheng University, Chia-Yi County, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Kuang-Ming Chang, Ting-Yu Chang, Cooper Cheng-Yuan Ku, Chun-Wei Chiu, Ching-Ter Chang:
Sharing decision-making in knee osteoarthritis using the AHP-FMCGP method. Expert Syst. Appl. 249: 123610 (2024) - [j46]Feng-Lang Liu, Li-Chih Chien, Ting-Yu Chang, Cooper Cheng-Yuan Ku, Ching-Ter Chang:
A hybrid approach to resolve ambiguity in new product development. J. Intell. Fuzzy Syst. 46(1): 1359-1378 (2024) - 2023
- [j45]Shin-Hung Yan, Cooper Cheng-Yuan Ku:
Using language-specific input methods and pronunciation rules to improve the guesses of passwords. J. Inf. Secur. Appl. 77: 103588 (2023) - 2022
- [j44]Ting-Yu Chang, Cooper Cheng-Yuan Ku, Tai-Yuen Cheng, Cheng-Kung Chung, Emilio Chang Sanchez:
Modular counting management system for mall parking services. Comput. Ind. Eng. 171: 108362 (2022) - [j43]Hsin-Hsiu Chen, Cooper Cheng-Yuan Ku, David C. Yen:
Improved fault tolerant SPRT detection method for node replication attacks in wireless sensor networks. Int. J. Sens. Networks 39(4): 279-288 (2022) - 2021
- [j42]Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, James Chi-Chang Chan:
Detection of Malfunctioning Photovoltaic Modules Based on Machine Learning Algorithms. IEEE Access 9: 37210-37219 (2021) - [j41]Ting-Yu Chang, Cooper Cheng-Yuan Ku:
Fuzzy filtering ranking method for multi-criteria decision making. Comput. Ind. Eng. 156: 107217 (2021) - 2020
- [c7]Humble Po-Ching Hwang, Cooper Cheng-Yuan Ku, James Chi-Chang Chan:
Soiling Detection for Photovoltaic Modules Based on an Intelligent Method with Image Processing. ICCE-TW 2020: 1-2
2010 – 2019
- 2016
- [j40]Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen, Wen-Huai Hsieh:
An improved strategic information management plan for medical institutes. Comput. Stand. Interfaces 45: 26-36 (2016) - [j39]Hsin-Pin Fu, Cheng-Yuan Ku, Tsung-Sheng Chang:
A Decision Support System Based on a Genetic Algorithm for the Utilization of Leftovers. Int. J. Comput. Intell. Syst. 9(3): 483-496 (2016) - [j38]Tsung-Han Yang, Cheng-Yuan Ku, Man-Nung Liu:
Case study: Application of enhanced Delphi method for software development and evaluation in medical institutes. Kybernetes 45(4): 637-649 (2016) - [c6]Sadhna Sharma, Cheng-Yuan Ku, Yung-Ting Chuang:
An Approach to Risk Management for E-Commerce. PACIS 2016: 34 - 2015
- [j37]Hui-Ping Ho, Ching-Ter Chang, Cheng-Yuan Ku:
House selection via the internet by considering homebuyers' risk attitudes with S-shaped utility functions. Eur. J. Oper. Res. 241(1): 188-201 (2015) - [j36]Po-Ling Sun, Cheng-Yuan Ku, Dong-Her Shih:
An implementation framework for E-Government 2.0. Telematics Informatics 32(3): 504-520 (2015) - 2014
- [j35]Po-Ling Sun, Cheng-Yuan Ku:
Review of threats on trust and reputation models. Ind. Manag. Data Syst. 114(3): 472-483 (2014) - [j34]Cheng-Yuan Ku, Pei-Chen Sung, Wen-Huai Hsieh:
Policy satisfaction for separation of dispensing from medical practices in Taiwan: Success of the prescription-release information system. Telematics Informatics 31(2): 334-343 (2014) - 2013
- [j33]Hui-Ping Ho, Ching-Ter Chang, Cheng-Yuan Ku:
On the location selection problem using analytic hierarchy process and multi-choice goal programming. Int. J. Syst. Sci. 44(1): 94-108 (2013) - [j32]Pei-Chen Sung, Cheng-Yuan Ku, Chien-Yuan Su:
Understanding the propagation dynamics of multipartite computer virus. Ind. Manag. Data Syst. 114(1) (2013) - [c5]Hui-Ping Ho, Ching-Ter Chang, Cheng-Yuan Ku:
House Selection via Internet by Considering Homebuyers' Risk Attitudes. PACIS 2013: 151 - 2012
- [j31]Hsieh-Hong Huang, Jack Shih-Chieh Hsu, Cheng-Yuan Ku:
Understanding the role of computer-mediated counter-argument in countering confirmation bias. Decis. Support Syst. 53(3): 438-447 (2012) - [j30]Wei-Hsi Hung, Cheng-Yuan Ku, Robert John McQueen, Li-Min Chang:
Aligning Websites with Enterprise Success: An Evaluative Approach. J. Comput. Inf. Syst. 52(4): 49-58 (2012) - [j29]Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen, Wen-Huai Hsieh:
Electronic Hand-Drafting and Picture Management System. J. Medical Syst. 36(4): 2297-2307 (2012) - 2010
- [j28]Ching-Ter Chang, Cheng-Yuan Ku, Hui-Ping Ho:
Fuzzy Multi-Choice Goal Programming for Supplier Selection. Int. J. Oper. Res. Inf. Syst. 1(3): 28-52 (2010) - [j27]Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen, Yi-Chen Lin:
Utilizing the interactive techniques to achieve automated service composition for Web Services. J. High Speed Networks 17(4): 219-236 (2010)
2000 – 2009
- 2009
- [j26]Hsieh-Hong Huang, Cheng-Yuan Ku:
A RFID Grouping Proof Protocol for Medication Safety of Inpatient. J. Medical Syst. 33(6): 467-474 (2009) - 2008
- [j25]She-I Chang, Chin-Shyh Ou, Cheng-Yuan Ku, Morris Yang:
A study of RFID application impacts on medical safety. Int. J. Electron. Heal. 4(1): 1-23 (2008) - 2007
- [j24]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptographic relational algebra for databases using the field authenticator. Comput. Math. Appl. 54(1): 38-44 (2007) - 2006
- [j23]Din-Yuen Chan, Cheng-Yuan Ku, Ming-Chai Li:
A method to improve integer linear programming problem with branch-and-bound procedure. Appl. Math. Comput. 179(2): 484-493 (2006) - [j22]Cheng-Yuan Ku, Yenfang Ho, Yiwen Chang:
The implementation of signing e-documents by using the Wireless Identity Module of cellular phones. Int. J. Mob. Commun. 4(6): 743-760 (2006) - [j21]Sean Lancaster, David C. Yen, Cheng-Yuan Ku:
E-supply chain management: an evaluation of current web initiatives. Inf. Manag. Comput. Secur. 14(2): 167-184 (2006) - 2005
- [j20]Din-Yuen Chan, Cheng-Yuan Ku:
Finite-precision arithmetic coding via index-splitting and probability-fitting. Appl. Math. Comput. 167(2): 976-995 (2005) - [j19]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptanalysis of large RSA exponent by using the LLL algorithm. Appl. Math. Comput. 169(1): 516-525 (2005) - [j18]Adam Theiss, David C. Yen, Cheng-Yuan Ku:
Global Positioning Systems: an analysis of applications, current development and future implementations. Comput. Stand. Interfaces 27(2): 89-100 (2005) - 2004
- [j17]Hsin-Ginn Hwang, Cheng-Yuan Ku, David C. Yen, Chi-Chung Cheng:
Critical factors influencing the adoption of data warehouse technology: a study of the banking industry in Taiwan. Decis. Support Syst. 37(1): 1-21 (2004) - [j16]Cheng-Yuan Ku, Shi-Ming Huang, David C. Yen, Yi-Wen Chen:
Near-optimal channel reservation for cellular phone system. Int. J. Electron. Bus. 2(3): 244-254 (2004) - [j15]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptanalysis of short secret exponents modulo RSA primes. Inf. Sci. 160(1-4): 225-233 (2004) - [j14]Cheng-Yuan Ku, Chang-Jinn Tsao, Yi-Hsien Lin, Chien-Yuan Chen:
An escrow electronic cash system with limited traceability. Inf. Sci. 164(1-4): 17-30 (2004) - [j13]Shi-Ming Huang, Yu-Chung Hung, Houn-Gee Chen, Cheng-Yuan Ku:
Transplanting the Best Practice for Implementation of an ERP System: A Structured Inductive Study of an International Company. J. Comput. Inf. Syst. 44(4): 101-110 (2004) - [c4]Lain-Chyr Hwang, Steen J. Hsu, Cheng-Yuan Ku, Chun-Shin Jie:
A New Scheduler for AF and EF in a DS Node. ICDCS Workshops 2004: 10-15 - [c3]Cheng-Yuan Ku, Yenfang Ho, Yiwen Chang:
The Implementation of Signing E-Document by Using the Wireless Identity Module in Cellular Phone. ICEB 2004: 832-837 - 2003
- [j12]Cheng-Yuan Ku, Lain-Chyr Hwang, Hsin-Tzung Wu:
Ping-pong flow control for ATM ABR traffic. Comput. Stand. Interfaces 25(5): 515-528 (2003) - [j11]Din-Yuen Chan, Cheng-Yuan Ku:
A low-complexity, high-quality, 64-Kbps audio codec with efficient bit allocation. Digit. Signal Process. 13(1): 23-41 (2003) - [j10]Shin-Yuan Hung, Cheng-Yuan Ku, Chia-Ming Chang:
Critical factors of WAP services adoption: an empirical study. Electron. Commer. Res. Appl. 2(1): 42-60 (2003) - [j9]Cheng-Yuan Ku, Scott Jordan:
Near optimal admission control for multiserver loss queues in series. Eur. J. Oper. Res. 144(1): 166-178 (2003) - [j8]Cheng-Yuan Ku, Shi-Ming Huang, David C. Yen:
A field study to implement data warehouse technology for the banking industry in Taiwan. Int. J. Serv. Technol. Manag. 4(3): 287-301 (2003) - [j7]Cheng-Yuan Ku, Din-Yuen Chan, Lain-Chyr Hwang:
Optimal reservation policy for two queues in tandem. Inf. Process. Lett. 85(1): 27-30 (2003) - 2002
- [j6]David C. Yen, Shi-Ming Huang, Cheng-Yuan Ku:
The impact and implementation of XML on business-to-business commerce. Comput. Stand. Interfaces 24(4): 347-362 (2002) - [j5]Shaohong Zheng, David C. Yen, Douglas Havelka, Cheng-Yuan Ku:
The integrative role of CRM with ERP and SCM in the e-business environment. Int. J. Inf. Technol. Manag. 1(1): 50-68 (2002) - [j4]Jane Chang, David C. Yen, Dale Young, Cheng-Yuan Ku:
Critical issues in CRM adoption and implementation. Int. J. Serv. Technol. Manag. 3(3): 311-324 (2002) - [j3]Cheng-Yuan Ku, Scott Jordan:
Access control of parallel multiserver loss queues. Perform. Evaluation 50(4): 219-231 (2002) - [c2]Lain-Chyr Hwang, Steen J. Hsu, Cheng-Yuan Ku, Ying-Tien Tsai, Amy Wang:
DMWRR: A QoS Scheduling for the Delay Fairness. JCIS 2002: 984-987 - 2001
- [j2]Lain-Chyr Hwang, Cheng-Yuan Ku, Steen J. Hsu, Huan-Ying Lo:
QoS buffer management of multimedia networking with GREEN algorithm. J. Commun. Networks 3(4): 334-341 (2001) - [c1]Lain-Chyr Hwang, Steen J. Hsu, Cheng-Yuan Ku, Hsin-Tzung Wu:
An Implementation of Ping-Pong Flow Control in ATM. ICDCS Workshops 2001: 295-300
1990 – 1999
- 1997
- [j1]Cheng-Yuan Ku, Scott Jordan:
Access control to two multiserver loss queues in series. IEEE Trans. Autom. Control. 42(7): 1017-1023 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint