scispace - formally typeset
Search or ask a question
Author

Shyan-Ming Yuan

Bio: Shyan-Ming Yuan is an academic researcher from National Chiao Tung University. The author has contributed to research in topics: Cloud computing & The Internet. The author has an hindex of 29, co-authored 294 publications receiving 3287 citations. Previous affiliations of Shyan-Ming Yuan include Industrial Technology Research Institute & Asia University (Taiwan).


Papers
More filters
Journal ArticleDOI
TL;DR: While students with high executive thinking styles significantly improved over two rounds of peer assessment, low executive students did not improve through the cycles, suggesting that future web-based peer assessment adopts a specific feedback format for all students.
Abstract: This study used aptitude treatment interaction design to examine how feedback formats (specific vs. holistic) and executive thinking styles (high vs. low) affect web-based peer assessment. An Internet-based (anonymous) peer-assessment system was developed and used by 58 computer science students who submitted assignments for peer review. The results indicated that while students with high executive thinking styles significantly improved over two rounds of peer assessment, low executive students did not improve through the cycles. In addition, high executive students contributed substantially better feedback than their low executive counterparts. In the second round of peer assessment, thinking style and feedback format interactively affected student learning. Low executive students receiving specific feedback significantly outperformed those receiving holistic feedback. In receiving holistic feedback, high executive thinkers outperformed their low executive counterparts. This study suggests that future web-based peer assessment adopts a specific feedback format for all students.

303 citations

Journal ArticleDOI
TL;DR: An evaluation of learning effects and students' perceptions about peer review during the spring of 1998 revealed that students not only performed better under peer review, but also displayed higher level thinking skills, i.e., critical thinking, planning, monitoring, and regulation.
Abstract: This study describes an effective web-based learning strategy, peer review, used by 143 computer science undergraduate students in an operating systems class at a Taiwanese university. Peer review, based on social constructivism, can be easily implemented via the authors' well-developed web-based peer review (WPR) system. Through peer review, the authors hope to form an authentic learning environment similar to an academic society in which a researcher submits a paper to a journal and receives reviews from society members before publication. Students using this learning strategy are expected to develop higher level thinking skills. The WPR system functioned in the following roles in this study: (1) an information distribution channel and management center for assignment submissions and peer review; (2) a forum for peer interaction and knowledge construction; and (3) storage for knowledge construction procedures. An evaluation of learning effects and students' perceptions about peer review during the spring of 1998 revealed that students not only performed better under peer review, but also displayed higher level thinking skills, i.e., critical thinking, planning, monitoring, and regulation. Students perceived peer review as an effective strategy that promoted their learning motivation. However, merely being an effective reviewer or an effective author may not excel in a peer review environment. The most effective individual appears to be the strategic adapter who effectively constructs a project, adjusts to peers' comments, and serves as a critical reviewer as well.

199 citations

Journal ArticleDOI
TL;DR: The experimental results indicated that the proposed watermarking mechanism can withstand various processing attacks and accurately locate the tampered area of an image.
Abstract: This paper presents a blind dual watermarking mechanism for digital color images in which invisible robust watermarks are embedded for copyright protection and fragile watermarks are embedded for image authentication. For the purpose of copyright protection, the first watermark is embedded using the discrete wavelet transform in YCbCr color space, and it can be extracted blindly without access to the host image. However, fragile watermarking is based on an improved least significant bits’ replacement approach in RGB components for image authentication. The authenticity and integrity of a suspicious image can be verified blindly without the host image and the original watermark. The combination of robust and fragile watermarking makes the proposed mechanism suitable for protecting valuable original images. The experimental results indicated that the proposed watermarking mechanism can withstand various processing attacks and accurately locate the tampered area of an image.

150 citations

Journal ArticleDOI
TL;DR: It is suggested that teachers tended to develop more creative, theoretically relevant, and practical science activities as a result of the networked peer assessment, but the peers' evaluations were not highly consistent with experts' (e.g., university professors) grades.
Abstract: This paper described the use of a networked peer assessment system to facilitate the development of inquiry-oriented activities for secondary science education. Twenty-four preservice teachers in Taiwan participated in this study and experienced a three-round peer assessment for developing science activities. The findings suggested that teachers tended to develop more creative, theoretically relevant, and practical science activities as a result of the networked peer assessment. However, the peers' evaluations were not highly consistent with experts' (e.g., university professors) grades. This study also revealed that students who offered detailed and constructive comments on reviewing and criticizing other peers' work might help them improve their own work, especially in the beginning stage of revising their original work.

150 citations

Journal ArticleDOI
TL;DR: A design of blockchain based system, namely MedChain, for managing medical records is proposed, which employs timed-based smart contracts for governing transactions and controlling accesses to electronic medical records and adopts advanced encryption techniques for providing further security.
Abstract: Although the blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing electronic medical records, is an attractive mission for recent research to balance the needs for increasing data privacy and the regular interaction among patients and health providers. Various systems that adopts the blockchain in managing medical records have been proposed. However, there is a need for more work to better characterize, understand and evaluate the employment of blockchain technology in the healthcare industry. In this paper, a design of blockchain based system, namely MedChain, for managing medical records is proposed. MedChain is designed to improve the current systems as it provides interoperable, secure, and effective access for medical records by patients, health care providers, and other third parties, while keeping the patients' privacy. MedChain employs timed-based smart contracts for governing transactions and controlling accesses to electronic medical records. It adopts advanced encryption techniques for providing further security. This work proposes a new incentive mechanism that leverages the degree of health providers regarding their efforts on maintaining medical records and creating new blocks. Extensive experiments are conducted to evaluate the MedChain performance, and results indicate the efficiency of our proposal in handling a large dataset at low latency.

103 citations


Cited by
More filters
01 Jan 2002

9,314 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Journal ArticleDOI
TL;DR: The analysis of recent advances in genetic algorithms is discussed and the well-known algorithms and their implementation are presented with their pros and cons with the aim of facilitating new researchers.
Abstract: In this paper, the analysis of recent advances in genetic algorithms is discussed. The genetic algorithms of great interest in research community are selected for analysis. This review will help the new and demanding researchers to provide the wider vision of genetic algorithms. The well-known algorithms and their implementation are presented with their pros and cons. The genetic operators and their usages are discussed with the aim of facilitating new researchers. The different research domains involved in genetic algorithms are covered. The future research directions in the area of genetic operators, fitness function and hybrid algorithms are discussed. This structured review will be helpful for research and graduate teaching.

1,271 citations