112學年度第2學期教師著作目錄管理系統 
您好!!  
>>教師著作目錄查詢

  1. 【查詢】按鈕:請先選擇學院→系所→教師,輸入起迄年或不輸入起迄年,再點選【查詢】即完成。
  2. 【進階查詢】按鈕:採用組合查詢的方式。
  3. 【匯出Word檔】按鈕:匯出教師【個人】著作資料。
搜尋條件:著作類別->全部著作 | 學院->College of Management | 系所->Department of Information Management | 教師姓名->Shih Dong-Her
      
         西元年      
施東河老師的論文著述

一、學術期刊論文

  1. Chang, I.-C.; Shiau, W.-M.; Lin, C.-Y.; Shih, D.-H.*, 2023, Consumer Intentions to Switch On-Demand Food Delivery Platforms: A Perspective from Push-Pull-Mooring Theory, J. Theor. Appl. Electron. Commer. Res.(Q2,63/154), 18(4), 2217-2232. (SSCI)(NSTC 112-2410-H-224-007, https://doi.org/10.3390/jtaer18040111)
  2. Shih D-H, Shih P-L, Wu T-W*, Lee C-X, Shih M-H., 2023, Distinguishing Bladder Cancer from Cystitis Patients Using Deep Learning., Mathematics, 11(19), pp.4118. (SCIE)(NSTC 112-2410-H-224-007;https://doi.org/10.3390/math11194118; SCIE, Q1(23/329))
  3. Shih D-H, Liao C-H, Wu T-W*, Chang H-S, Shih M-H., 2022, A New Early Warning Water Survival Index for the Domestic Water Demand, Mathematics, 10(23), pp.4478. (SCI)(Q1(21/332));MOST 111-2410-H-224-006;doi.org/10.3390/math10234478)
  4. Shih D-H*, Shih P-L, Wu T-W, Liang S-H, Shih M-H., 2022, An International Federal Hyperledger Fabric Verification Framework for Digital COVID-19 Vaccine Passport, Healthcare. doi.org/10.3390/healthcare10101950, 10(10), pp.1950. (SSCI)(Q2(35/88); MOST 111-2410-H-224-006)
  5. Shih D-H, Liao C-H, Wu T-W*, Xu X-Y, Shih M-H, 2022, Dysarthria Speech Detection Using Convolutional Neural Networks with Gated Recurrent Unit, Healthcare. doi.org/10.3390/healthcare10101956, 10(10), pp.1956. (SSCI)(Q2(35/88);MOST 111-2410-H-224-006)
  6. Shih D-H, Hien TT, Nguyen LSP, Wu T-W*, Lai Y-T., 2022, A Modified γ-Sutte Indicator for Air Quality Index Prediction, Mathematics, 10(17), pp.3060. (SCI)(MOST 110-2927-I-224-001; https://doi.org/10.3390/math10173060; SCI, Q1(21/332))
  7. Shih D-H*, Shih P-L, Wu T-W, Li C-J, Shih M-H., 2022, Cluster Analysis of US COVID-19 Infected States for Vaccine Distribution, Healthcare, 10(7), pp.1235. (SSCI)(MOST 110-2410-H-224-010; https://doi.org/10.3390/healthcare10071235, SSCI/Q2(35/88))
  8. Shih D-H*, Wu T-W, Shih P-Y, Lu N-A, Shih M-H., 2022, A Framework of Global Credit-Scoring Modeling Using Outlier Detection and Machine Learning in a P2P Lending Platform, Mathematics, 10(13), pp.2282. (SCI)(MOST 110-2410-H-224-010,https://doi.org/10.3390/math10132282,(SCI, Q1(21/332))
  9. Shih, P.-Y.; Cheng, C.-P.; Shih, D.-H. *; Wu, T.-W.; Yen, D.C., 2022, Who Is the Most Effective Country in Anti-Corruption? From the Perspective of Open Government Data and Gross Domestic Product., Mathematics, 10(13), pp.2180. (SCI)((https://doi.org/10.3390/math10132180; MOST 110024100HH2244010; SCI/Q1,21/332))
  10. Shih D-H, Wu T-W, Shih M-H, Chen G-W, Yen DC, 2022, Hyperledger Fabric Access Control for Industrial Internet of Things, Applied Sciences, Vol.12, No.6, pp.3125. (SCI)(MOST 110-2410-H-224-010,https://doi.org/10.3390/app12063125; SCI/Q2, 39/92)
  11. Shih D-H, Wu T-W, Shih M-H, Yang M-J, Yen DC., 2022, A Novel βSA Ensemble Model for Forecasting the Number of Confirmed COVID-19 Cases in the US, Mathematics, 10(5), pp.824. (SCI)(https://doi.org/10.3390/math10050824; MOST 110-2410-H-224-010; SCI/Q1,21/332)
  12. Shih, D.-H.; Wu, T.-W.; Shih, M.-H.; Tsai, W.-C.; Yen, D.C., 2021, A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment, Mathematics, Vol.9, No.24, pp.3214. (SCI)(https://doi.org/10.3390/math9243214; MOST 110-2410-H-224-010; SCI/Q1,21/332)
  13. Shih, D.H.; Huang, F.C.; Chieh, C.Y.; Shih, M.H.; Wu, T.W., 2021, Preventing Return Fraud in Reverse Logistics—A Case Study of ESPRES Solution by Ethereum., J. Theor. Appl. Electron. Commer. Res., Vol.16, No.(6), 2170-2191. (SSCI)(MOST 109-2410-H-224-022 (https://doi.org/10.3390/jtaer16060121.))
  14. Shih D.H, To TH, Nguyen LSP, Wu T.W, You W.T., 2021, Design of a Spark Big Data Framework for PM2.5 Air Pollution Forecasting, Int. J. Environ. Res. Public Health, Vol.18, No.13, pp.7087. (SSCI)(MOST 109-2410-H-224-022 and MOST 109-2927-I-224-001, https://doi.org/10.3390/ijerph18137087,SSCI/Q1)
  15. D. H. Shih, F. C. Huang, C. L. Weng, P. Y. Shih, D. C. Yen, 2020, Thirty-day Re-Hospitalization Rate Prediction of Diabetic Patients, Journal of Internet Technology, Vol.21, No.7, pp.2065-2074. (SCI)
  16. C. T. Li, D. H. Shih, C. C. Wang, C. L. Chen, C. C. Lee, 2020, A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System, IEEE Access, Vol.8, pp. 173904-173717. (SCI, EI)(DOI: 10.1109/ACCESS.2020.3025898)
  17. D. H. Shih, T. W. Wu, T. H. Tsu, P. Y. Shih and D. C. Yen, 2020, Verification of Cryptocurrency Mining Using Ethereum, IEEE Access, Vol.8, pp.120351-120360. (SCI, EI)(MOST 108-2410-H-224-040)(DOI: 10.1109/ACCESS.2020.3005523)
  18. D. H. Shih, T. W. Wu, W. X. Liu and P. Y. Shih, 2019, An Azure ACES Early Warning System for Air Quality Index Deteriorating, Int. J. Environ. Res. Public Health, Vol.16, No.23, pp.4679. (SSCI)(doi.org/10.3390/ijerph16234679)
  19. D. H. Shih, K. C. Lu, Y. T. Shih and P. Y. Shih, 2019, A Simulated Organic Vegetable Production and Marketing Environment by Using Ethereum, Electronics, Vol.8, No.11, pp.1341. (SCIE)(doi.org/10.3390/electronics8111341)
  20. D. H. Shih, K. C. Lu and P. Y. Shih, 2019, Exploring Shopper’s Browsing Behavior and Attention Level with an EEG Biosensor Cap, Brain Sciences, Vol.9, No.11, pp.301. (SCIE)(https://doi.org/10.3390/brainsci9110301)
  21. W. H. Hsieh, D. H. Shih, P. Y. Shih and S. B. Lin, 2019, An Ensemble Classifier with Case-Based Reasoning System for Identifying Internet Addiction, Int. J. Environ. Res. Public Health, Vol.16, No.7, pp.1233. (SSCI)(NSC 102-2410-H-224-016 and MOST 104-2410-H-224-017)
  22. D. H. Shih, C. M. Lu, C. H. Lee, Y. M. Parng, K. J. Wu and M. L. Tseng, 2018, A Strategic Knowledge Management Approach to Circular Agribusiness, Sustainability, Vol.10, 2389, 20pages. (SSCI)
  23. D. H. Shih, C. M. Lu, C. H. Lee, S. Y. Cai, K. J. Wu and M. L. Tseng, 2018, Eco-Innovation in Circular Agri-Business, Sustainability, Vol.10, 1140, 13pages. (SSCI)
  24. C. T. Li, D. H. Shih and C. C. Wang, 2018, Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems, Computer Methods and Programs in Biomedicine, Vol.157, pp. 191–203. (SCI, EI)
  25. C. T. Li, D. H. Shih, C. C. Wang, 2017, On the Security of A Privacy Authentication Scheme Based on Cloud for Medical Environment, Lecture Notes in Electrical Engineering,, Vol. 424, pp. 241-248. (EI)
  26. D. H. Shih, M. H. Shih, D. C. Yen and J. H. Hsu, 2016, Detection of abnormal mobility patterns in the GPS era, Cartography and Geographic Information Science, Vol.43, No.1, pp.55-67. (SCI)(NSC 101-2410-H-224-004)
  27. H. S. Chiang, D. H. Shih, M. H. Shih, J. M. Chang, 2015, APN model construction for malicious email detection, Expert Systems with Applications, Vol.42, Issue.13, pp.5696–5704. (SCI)(NSC 95–3113-P-224–004 and NSC 95–2221-E-224–049-MY2)
  28. P. L. Sun, C. Y. Ku and D. H. Shih, 2015, An implementation framework for E-Government 2.0, Telematics and Informatics, Vol.32, Issue 3, pp.504–520. (SSCI)
  29. H. S. Chiang, D. H. Shih, B. Lin and M. H. Shih, 2014, An APN model for Arrhythmic beat classification, Bioinformatics, Vol.30, No.12, 1739-1746. (SCI)(NSC 98-2218-E-212-001 and NSC-97-2218-E-224-008)
  30. D. H. Shih, M. H. Shih, D. C. Yen and C. L. Chang, 2014, A robust copyright and ownership protection mechanism for music, Multimedia Tools and Applications, Vol.70, No.1, 1-26. (SCI)(NSC 100-2410-H-224-028)
  31. T. Y. Wong, D. H. Shih, S. Y. Tsai and C. Y. Lee, 2013, Differentiating Physiological Effects of Midterm Break in a Prolonged Online Game Playing, Biomedical Engineering: Applications, Basis and Communications, Vol.25, No.6, pp.1350057. (SCI)
  32. S. H. Li, S. M. Huang, D. C. Yen, D. H. Shih, and H. Y. Hsueh, 2013, Business-to-Government Application Integration Framework: A Case Study of the High Technology Industry in Taiwan, Computer Standards & Interfaces, Vol.35, No.6, pp582-595. (SCI)
  33. D. H. Shih, H. S. Chiang, D. C. Yen and S. C. Huang, 2013, An Intelligent Embedded System for Malicious Email Filtering, Computer Standards & Interfaces, Vol.35, No.5, pp557-565. (SCI)(NSC95-3113-P-224-004 and NSC97-2218-E-224-012)
  34. D. H. Shih, S. F. Hsu, D. C. Yen and C. C. Lin, 2012, Exploring the individual's behavior on self-disclosure online, International Journal of Human-Computer Interaction, Vol.28, Issue 10, pp.627-645. (SSCI)
  35. D. H. Shih, C. C. Chen H. S. Chiang and M. H. Shih, 2012, Explore dependency syndrome on mobile phone user, International Journal of Mobile Communications, Vol.10, No.5, pp.475-489. (EI, SSCI)(NSC98-2410-H-224-011-MY2; NSC100-2410-H-224-028)
  36. D. H. Shih, D. C. Yen, C. H. Cheng and M. H. Shih, 2011, A secure multi-item e-Auction mechanism with bid privacy, Computers & Security, Vol.30, No.4, pp.273-287. (SCI)(NSC 98-2410-H-224-011-MY2)
  37. C. Y. Lai, D. H. Shih, C. C. Chen and H. S. Chiang, 2011, Base on Telemedicine - An Empirical Studies on Brain Movable Strength of Emotion and Psychokinesis, Journal of Convergence Information Technology, Vol.6, No.8, pp.277-283. (EI)
  38. D. H. Shih, D. C. Yen, H. C. Lin and M. H. Shih, 2011, An implementation and evaluation of recommender systems for traveling abroad, Expert Systems With Applications, Vol.38, No.12, pp15344–15355. (SCI)
  39. Y. W. Chiu, D. C. Yen and D. H. Shih, 2011, Importance- Performance Analysis for the Adoption of Radio Frequency Identification (RFID) Technology, Journal of Information Technology Management, Vol. 12, No. 2, pp30-40. (NSC95-2221-E-224-049-MY2, NSC 98-2410-H-224-011-MY2)
  40. C. Y. Lai, D. H. Shih, H. S. Chiang and C. C. Chen, 2011, A Study of Cloud Computing Affecting Switch Intentions of Information Service in junior and Elementary Schools, International Review on Computers and Software, Vol.6, No.3, pp. 371-383. (EI)
  41. C. C. Lin and D. H. Shih, 2011, Data Mining Techniques to Enhance Customer Lifetime Value, Advanced Materials Research, Vol.225-226, pp.3-7. (EI)
  42. C. C. LIN and D. H. Shih, 2011, Data Mining:Associating Information Literacy with Regulating Rules, Advanced Materials Research, Vol.204-210, pp.183-188. (EI)
  43. D. H. Shih, H. S. Chiang, B. Lin, and S.B.LIN, 2010, An embedded mobile ECG reasoning system for elderly patient, IEEE Transactions on Information Technology in BioMedicine, Vol.14, No.3, pp.854-865. (SCI)(NSC97-3114-E-168-002,NSC95-2221-E-224-049-MY2)
  44. I. C. Chen, D. H. Shih, S. C. Hu, 2010, Augmenting a web-ased learning enviroment through blending formative assessment services, Journal of Web Engineering, Vol.9, No.1, pp.48-65. (SCI)
  45. S. F. Hsu, D. H. Shih, 2009, A Model for Exploring Individual's Self-Disclosure Online, International Review on Computers and Software (IRECOS), Vol.4, No.5, pp.594-599. (EI)
  46. S. F. Hsu, D. H. Shih, 2009, The factors influencing individual's behavior on privacy protection, WSEAS Transtractions on Information Science and Applications, Vol.6, No.9, pp.1790-0832. (EI)
  47. D. H. Shih, H. S. Chiang, C. S. Lin, and M. H. Shih, 2009, Data Mining Methods in the Detection of Spam, Journal of Business and Management, Vol.14, No.2, pp.117-130. (NSC93-2213-E-224-038)
  48. D. H. Shih, H. S. Chiang and B. Lin, 2008, Collaborative Spam Filtering with Heterogeneous Agents, Expert Systems with Applications, Vol.35, No.4, pp.1555–1566. (SCI)(NSC 93-2213-E-224-038)
  49. D. H. Shih, B. Lin, H. S. Chiang and M. H. Shih, 2008, Security aspects of mobile phone virus: A critical survey, Industrial Management and Data Systems, Vol.108, No.4, pp.478-494. (SCI)
  50. S. I. Chang, C. F. Tsai, C. L. Hwang and D. H. Shih, 2008, The Development of Audit Detection Risk Assessment System: Using the Fuzzy Theory and Audit Risk Model, Expert Systems with Applications, Vol. 35, No.3, pp.1053-1067. (SCI)
  51. D. H. Shih, Y. W. Chiu, S. I. Chang and D. C. Yen, 2008, An Empirical Study of Factors affecting RFID's adoption in Taiwan, Journal of Global Information Management, Vol.16, No.2, pp.58-80. (SSCI)(NSC95-2221-E-224-049-MY2,NSC 94-2213-E-224-036)
  52. Y. M. Lin and D. H. Shih, 2008, Deconstructing mobile commerce service with continuance intention, Int. J. Mobile Communications, Vol.6, No.1, pp.67-87. (EI, SSCI)
  53. J. C. Shen, D. H. Shih, H. C. Wei and C. C. Li, 2008, Differential Quality of Service Provision in Mobile Networks, International Journal of Mobile Communications, Vol.6, No.1, pp.133-150. (EI, SSCI)
  54. H. S. Chiang, D. H. Shih and S. C. Huang, 2007, Ontology-based malicious email detection, J. Information Management, Vol.14, Special Issue, pp.1-28. (TSSCI)(NSC 95-3113-P-24-004)
  55. D. H. Shih, H. S. Chiang and B. Lin, 2007, A Generalized Associative Petri Net for Reasoning, IEEE Transactions on Knowledge and Data Engineering, Vol.19, No.9, pp1241-1251. (SCI)(NSC 95-3113-P-224-004 and NSC 95-2221-E-224-049-MY2)
  56. Y. W. Chiu, Y. M. Lin and D. H. Shih, 2007, The effects of technology Characteristics, Task Characteristics and Computer Self-efficacy on Behavioral Intention of Electronic Learning, Journal of E-Business, (Best Paper Award in 2007), Vol.9, No.2, pp.235-266. (TSSCI)
  57. D. H. Shih, B. Lin and S. Y. Huang, 2007, MoRVAM: A Reverse Vickrey Auction System for Mobile Commerce, Expert Systems with Applications, Vol. 32, No. 4, pp.1113-1123. (SCI)(NSC 93–2218–E–224–015)
  58. J. C. Shen, D. H. Shih, H. S. Chiang and S. B. Lin, 2007, A mobile physiological monitoring system for patient transport, Journal of High Speed Networks, Vol.16, No.1, pp.51-68. (SCI)
  59. D. H. Shih, S. Y. Huang and D. C. Yen, 2006, A Secure Reverse Vickrey Auction Scheme with Bid Privacy, Information Science, Vol. 176, Issue 5, pp. 550-564. (SCI)
  60. D. H. Shih, P. L. Sun and D. C. Yen, 2006, Taxonomy and Survey of RFID Anti-Collision Protocols, Computer communications, Vol.29, No.11, pp.2150-2166. (SCI)(NSC 94-2213-E-224-036)
  61. D. H. Shih and S. Y. Huang, 2006, Linking secure reverse auction with web service, International Journal of Services and Standards, Vol. 2, No. 1, pp. 15-31. (NSC 93-2218-E-224-015)
  62. Y. M. Lin, Y. W. Chiu and D. H. Shih, 2005, User Intention of E-learning: An Empirically Comparative Study, National Taiwan University Management Review, Vol.16, No.1, pp.41-67. (TSSCI)
  63. D. H. Shih and P. L. Sun, 2005, Securing Industry wide EPCglobal Network with WSS, Industrial Management and Data Systems, Vol.105, No. 7, pp. 972-996. (SCI)
  64. D. H. Shih, S. Y. Huang and D. C. Yen, 2005, A new reverse auction agent system for m-commerce using mobile agents, Computer Standards & Interfaces, Vol. 27, No. 4, pp. 383-395. (SCI)
  65. H. S. Chiang, J. C. Shen, D. H. Shih and C. S. Lin, 2005, A Collaborative Learning Method For Spam Filtering, Research on computer science - Advances in AI applications, Vol. 17, pp. 119-128.
  66. D. H. Shih, S. F. Hsu, H. S. Chiang and C. P. Chang, 2005, Misuse Detection of Email Viruses base on SOM with k-medoids, Research on computer science - Advances in AI applications, vol. 17, pp. 139-148. (NSC 92-2218-E-224-015)
  67. D. H. Shih, H. S. Chiang and D. C. Yen, 2005, Classification Methods in the Detection of New Malicious Emails, Information Sciences, Vol. 172, Issue: 1-2,, pp. 241-261. (SCI, SSCI)
  68. D. H. Shih, C.Y. Lin and B. Lin, 2005, RFID Tags: Privacy and Security Aspects, Int. J. Mobile Communications, Vol. 3, No. 3, pp. 214-230. (EI, SSCI)(NSC 93-2218-E-194-016)
  69. D. H. Shih and Z.Q. Lin, 2004, Bandwidth saturation QoS provisioning for adaptive multimedia in wireless/mobile networks, Computer Standards & Interfaces, Vol . 26, No . 4, pp. 279-288. (SCI)
  70. D. H. Shih, H. S. Chiang, C.Y. Chan, 2004, Internet Security: Malicious Emails Detection and Protection, Industrial Management and Data Systems, Vol. 104, No. 7, pp. 613–623. (SCI)
  71. D. H. Shih and H. S. Chiang, 2004, Email virus: How organizations can protect their emails, Online Information Review, Vol. 28, No.5, pp. 356-366. (SSCI)
  72. Dursch, Andy , David C. Yen and D. H. Shih, 2004, Bluetooth Technology - An Exploratory Study of the Analysis and Implementation Frameworks, Computer Standards and Interfaces, Vol. 26, No. 4, pp. 263-277. (SCI)
  73. D. H. Shih, 2004, Detection of New Malicious Emails Based on Self-Organizing Maps And K-Medoids Clustering, J. of Information Management, Vol. 11, No. 2, pp. 211-235. (TSSCI)(NSC 92-2218-E-224-015)
  74. D. H. Shih and Hwang Y. C., 2003, Analysis and study of web intrusion detection system, J. of Information Management, Vol. 9, No. 2, pp. 183-214. (TSSCI)
  75. D. H. Shih and Wan, S.J., 2001, A study of applying hybrid intelligent systems in the warrant pricing model and hedging scheme, J. of Information Management, Vol. 7, No. 2, pp. 123-142. (TSSCI)
  76. D. H. Shih, and Shyu G. S., 1999, A study and prediction of life insurance demand in Taiwan, J. of Management and System, Vol. 6, No.1, pp. 29-46. (TSSCI)
  77. Shih, D.H., Wan, T.J., and Ni, J.H., 1997, A study of expert system for water quality management in wastewater treatment plants, J. Yunlin Inst. Tech., Vol. 6, No. 2, pp. 245-252.
  78. Hwang, C.S., Shih, D.H., and Liu, C.L., 1996, Neural network prediction of risk prediction on Taiwan Life Insurer stocks, J. of Information Management, Vol. 3, No. 1, pp. 63-80. (TSSCI)
  79. Shih, D.H., Lin, C.L., and Su, C.T., 1995, Unemployment rate prediction by using neural networks, J. Yunlin Inst. Tech., Vol. 4, pp. 97-103.
  80. Shih, D.H. and Lin, B.S., 1994, A parallel tridiagonal System solver, J. Yunlin Inst. Tech., Vol. 3, pp. 221-228.
  81. Shih, D.H. and Lee, C.H., 1993, Parallel evaluation of polynomial expressions on systolic array, J. Yunlin Inst. Tech., Vol. 2, pp. 29-35.
  82. Shih, D.H. and Hwang, Y.J., 1992, Systolic designs for linear complement-tarity problem, J. Yunlin Inst. Tech., Vol. 2, pp. 77-82.
  83. Shih, D.H., Shen, R.C., 1987, Numerical inversion of multidimensional Laplace transform, Int. J. System Sci., Vol. 18, No. 4, pp. 739-742. (SCI)
  84. Shih, D.H., Kung, F.C., and Chao, C.M., 1986, Laguerre series approach to the analysis of linear control system incorporating observers, Int. J. Control, Vol. 43, No. 1, pp. 123-128. (SCI)
  85. Shih, D.H. and Wang, L.F., 1986, Optimal control of deterministic system described by integrodifferential equations, Int. J. Control, Vol. 44, No. 6, pp. 1737-1745. (SCI)
  86. Shih, D.H. and Kung, F.C., 1986, Shifted Legendre approach to the analysis and identification of linear delayed system with a nonlinear gain, IEE Proc. Pt.D, Vol. 133, No. 3, pp. 127-132. (SCI)
  87. Shih, D.H. and Kung, F.C., 1986, Optimal control of deterministic systems via shifted Legendre polynomials, IEEE Trans. Autom. Contr., Vol. AC-31, No. 5, pp. 451-454. (SCI)
  88. Shih, D.H. and Kung, F.C., 1986, Nonlinear system identification via block-pulse functions, Advance in Modeling and Simulations, Vol. 5, No. 1, pp. 49-63. (SCI)
  89. Shih, D.H. and Kung, F.C., 1986, Analysis and parameter estimation of nonlinear system via shifted Chebyshev ezpansions, Int. J. System Sci., Vol. 17, No. 2, pp. 231-240. (SCI)
  90. Shih, D.H. and Kung, F.C., 1986, Analysis and parameter estimation of a scaled system via shifted Legendre polynomials, Int. J. System Sci., Vol. 17, No. 3, pp. 401-408. (SCI)
  91. Kung, F.C. and Shih, D.H., 1986, Analysis and identification of Hammerstein model nonlinear delay systems using block-pulse functions, Int. J. Control, Vol. 43, No. 1, pp. 139-147. (SCI)
  92. Hwang, C., Shih, D.H., and Kung, F.C., 1986, The use of block-pulse functions in the optimal control of deterministic system, Int. J. Control., Vol. 44, No. 2, pp. 343-349. (SCI)
  93. Shih, D.H. and Kung, F.C., 1985, Shifted Legendre approach to nonlinear system analysis and identification, Int. J. Control, Vol. 42, No. 6, pp. 1399-1410. (SCI)
二、研討會論文
  1. 施東河, 莊家榮, 2021, 傳統產業如何導入知識管理系統之案例研究–以LT公司為例, 2021年第26屆國際資訊管理暨實務研討會, 2021/12/18, 中華民國資訊管理學會, 雲林縣斗六市,雲林科大, 15pages.
  2. 施東河, 吳怡慧, 2021, 中醫病患滿意與再就醫意願之關係研究:分析中醫的認知與廣告懷疑的效果, 2021年第26屆國際資訊管理暨實務研討會, 2021/12/18, 中華民國資訊管理學會, 雲林縣斗六市,雲林科大, 15pages.
  3. 施東河, 陳柏升, 2021, 以社會資本和社會交換理論觀點探討資訊安全委外成功因素, 2021年第26屆國際資訊管理暨實務研討會, 2021/12/18, 中華民國資訊管理學會, 雲林縣斗六市,雲林科大, 15pages.
  4. 施東河, 楊澄裕, 2021, 運用資料探勘技術於CIS晶圓白像素缺陷預測模式之研究, 2021年第26屆國際資訊管理暨實務研討會, 2021/12/18, 中華民國資訊管理學會, 雲林縣斗六市,雲林科大, 15pages.
  5. 賴韋豪, 施東河, 2021, 非關聯式資料庫聚合中資料隱私保護與效能分析之研究, 2021年第26屆國際資訊管理暨實務研討會, 2021/12/18, 中華民國資訊管理學會, 雲林科大, 15pages.
  6. D. H. Shih; Y. T. Shih and P. Y. Shih, 2019, Organic Vegetable Production and Marketing using Ethereum Technology, 2019 4th International Conference on Image, Vision and Computing, 2019/07/05-07, IEEE, Xiamen, China, 5 pages. (MOST 107-2410-H-224-012)
  7. D. H. Shih; T. H. Hsu; S. C. Chang, 2019, Malicious web-based cryptocurrency mining verification based on Ethereum smart contract, The 30th International Conference on Information Management 2019, 2019/05/18, Chinese Society of Information Management, Fu Jen Catholic University, Taipei, 12 pages. (MOST 108-2410-H-224-040)
  8. D. H. Shih and Y. T. Shih, 2019, Organic Vegetable Production and Marketing Using Ethereum Technology, The 30th International Conference on Information Management 2019, 2019/05/18, Chinese Society of Information Management, Fu Jen Catholic University, Taipei, 12 pages.
  9. D. H. Shih, T. W. Wu and P. Y. Shih, 2019, 導入區塊鏈技術於逆物流活動之退換貨詐騙防治之研究, The 30th International Conference on Information Management 2019, 2019/05/18, Chinese Society of Information Management, Fu Jen Catholic University, Taipei, 12 pages.
  10. D. H. Shih, H. L. Hsu and P. Y. Shih, 2019, A study of Early Warning System in Volume Burst Risk Assessment of Stock with Big Data Platform, 2019 the 4th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2019), 2019/04/12-15, IEEE, Chengdu, China., pp.244-248. (MOST 107-2410-H-224-012)
  11. 施東河, 徐祥理, 施博元, 2018, 股票即時交易量突發風險評估之研究, 2018年第二十四屆國際資訊管理暨實務研討會, 2018/12/01, Chinese Society of Information Management, 崑山科大, 270 (15 pages). (MOST 107-2410-H-224-012)
  12. 施東河, 伍廷蔚, 2018, 導入區塊鏈與否-以不同情境探討區塊鏈的佈署程度, 2018 年第二十四屆國際資訊管理暨實務研討會 (IMP 2018), 2018/12/01, Chinese Society of Information Management, 崑山科大, 13 pages.
  13. D. H. Shih, M. Y. Lin and P. Y. Shih, 2018, Restricted Live Streaming Genre Identification, IEEE 20th International Workshop on Multimedia Signal Processing, 2018/08/29-31, Simon Fraser University, Vancouver, Canada, pp.168. (MOST 107-2410-H-224-012)
  14. 施東河, 徐祥理, 施博元, 2018, 大數據平台股票交易量突發風險評估預警系統之研究, 2018 第八屆台灣網路智能研討會(NCWIA 2018), 2018/06/28-29, 台灣網路智能學會, National Yunlin University of Science and Technology, 5 pages. (MOST 107-2410-H-224-012)
  15. P. Y. Shih, D. H. Shih and T. S. Huang, 2018, A DEA-Based Decision Support Reverse Auction Model for Buyer and Sellers in Electronic Procurement, 2018 Data Envelopment Analysis International Conference, 2018/06/14-16, Ming Chuan University, Taipei, 12 pages.
  16. D. H. Shih, K. C. Lu and T. W. Wu, 2018, Explore consumers’ visual attention when shopping online, The 29th International Conference on Information Management (ICIM 2018), 2018/06/03, Chinese Society of Information Management, Tunghai University, 12 pages.
  17. D. H. Shih, P. Y. Shih and T. W. Wu, 2018, An Infrastructure of Multi-Pollutant Air Quality Deterioration early Warning System in Spark Platform, 2018 the 3rd IEEE International Conference on Cloud Computing and Big Data Analysis, 2018/04/20-22, IEEE Computational Intelligence Society (CIS), Southwest Jiaotong University, Chengdu, China, 5 pages. (MOST 107-2914-I-224-003-A1)
  18. D. H. Shih, J. T. Wu and T. W. Wu, 2018, A novel technology-based Smartphone Addiction Inhibitor, 2017 International Conference on Information Management & Practice, IMP2017(2017/12/09), 2018/01/01, Chinese Society of Information Management, Miaoli, 12 pages. (MOST 106-2410-H-224-004)
  19. D. H. Shih, 2017, Clustering and Behavior Analysis of Web Robot, 2017 USENIX Summit on Hot Topics in Security (HotSec '17), 2017/08/15, USENIX association, Sheraton Vancouver Wall Centre Hotel, Vancouver, Canada, 16 pages.
  20. 施東河, 翁采玲, 伍廷蔚, 2017, 糖尿病患者30天再次住院資料探勘與分析, 12th International Conference on Healthcare Information Management (UHIMA 2017), 2017/06/02-03, Taiwan Health Information Management Association, National Chiao Tung University (Hsinchu, Taiwan), 7 pages.
  21. D. H. Shih, T. W. Wu and C. L. Weng, 2017, Thirty-day Readmissions Rates Prediction in Diabetic Patients, The 28th International Conference on Information Management (ICIM 2017), 2017/05/13, Chinese Society of Information Management, National Chengchi University, Taipei, 15 pages.
  22. D. H. Shih, F. C. Huang, W. H. Lai and M. H. Shih, 2017, Privacy preserving and performance analysis on not only SQL database aggregation in bigdata era, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2017/04/28-30, IEEE Computational Intelligence Society (CIS), Southwest Jiaotong University, Chengdu, China, pp.56-60. (MOST 105-2410-H-224-008.)
  23. D. H. Shih, K. C. Lu, Charlie C. Chen, and P. Y. Shih, 2017, Understanding Consumers’ Behavior when Shopping Online, Western Decision Sciences Institute 46 Annual Meeting (WDSI 2017), 2017/04/04-08, Decision Sciences Institute, Pan Pacific Hotel, Vancouver, Canada., 2 pages. (MOST 104-2410-H-224-017, MOST 105-2410-H-224-008 (Best Paper Award))
  24. C. T. Li, D. H. Shih, C. C. Wang, 2017, On the Security of A Privacy Authentication Scheme Based on Cloud for Medical Environment, 8th iCatse Conference on Information Science and Applications (ICISA 2017), 2017/03/20-23, Springer, Macau, China, pp. 241-248.
  25. P. Y. Shih, D. H. Shih and A. C. Liu, 2016, A Colored Petri Net for Stock Trading Signal Detection, IEEE World Congress on Computational Intelligence (IEEE WCCI), 2016/07/24-29, IEEE Computational Intelligence Society (CIS), Vancouver, Canada, 6 pages. (MOST 103-2410-H-224-011 and MOST 104-2410-H-224-017.)
  26. P. Y. Shih, D. H. Shih, S. Y. Hung and M. H. Shih, 2016, A Rough Petri Nets Model for Stock Trading Signal Detection, International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2016), 2016/07/05-07, IEEE, Chengdu, China, 4 pages. (MOST 104-2410-H-224-017)
  27. P. Y. Shih, D. H. Shih and M. H. Shih, 2016, Stock Trading Point decision with Petri Net, Proceeding of the 20th Pacific Asia Conference on Information Systems (PACIS 2016), 2016/06/27-2016/07/01, Association for Information Systems, Chiayi, National Chung Cheng University, 6 pages. (MOST 103-2410-H-224-011 and MOST 104-2410-H-224-017.)
  28. D. H. Shih and M. Y. Lin, 2016, Real Time Online Live Streaming Genre Identification, The 2016 International Conference on Information Management (ICIM 2016), 2016/05/21, Chinese Society of Information Management, Taichung, Providence University, 8 pages.
  29. D. H. Shih, K. C. Lu, T. W. Wu and Y. R. Huang, 2016, A Study on Consumers' Preference by Using EEG in Marketing, The 2016 International Conference on Information Management (ICIM 2016), 2016/05/21, Chinese Society of Information Management, Taichung, Providence University, 11 pages.
  30. P. Y. Shih, C. F. Li, D. H. Shih and M. H. Shih, 2016, A Decision Support Model for Stock Trading Signal Detection, Western Decision Sciences Institute 45 Annual Meeting (WDSI 2016), 2016/04/05-08, Decision Sciences Institute, Las Vegas, 2 pages. (MOST 104-2410-H-224-017)
  31. 陸冠竹, 楊其媺, 施博元, 施東河, 2015, 網路購物時商品設計的特點對消費者視覺感知影響之研究, 第21屆資訊管理暨實務研討會 (IMP2015), 2015/11/27, 中華民國資訊管理學會, Taichung, 15 pages.
  32. D. H. Shih, C. M. Lu and M. H. Shih, 2015, A Flick Biometric Authentication Mechanism on Mobile Devices, IEEE International Conference on Informative and Cybernetics for Computational Social Systems, 2015/08/13-15, IEEE Systems, Man and Cybernetics Soceity, Chengdu, 3 pages. (MOST 103-2410-H-224-011)
  33. D. H. Shih, K. C. Lu, P. Y. Shih and T. W. Wu, 2015, Understanding consumers' visual perception when shopping online, The 26th International Conference on Information Management (ICIM 2015), 2015/05/23, Chinese Society of Information Management, Taipei, 15 pages.
  34. D. H. Shih, M. H. Shih L. Y. Chen and P. Y. Shih,, 2015, A Multi-level Marketing M-Coupon Mechanism for M-Commerce, Western Decision Sciences Institute 44 Annual Meeting (WDSI 2015), 2015/03/31-2015/04/03, Western Decision Sciences Institute, Maui, Hawaii, USA, 2 pages. (NSC 101-2410-H-224-004 and MOST 103-2410-H-224-011)
  35. K. S. Cheng, D. H. Shih, J. H. Liu and H. Wen-Zen, 2014, Analysis of Hot Keywords in the National Science Council Project Reports, The 20th Conference on Information Management & Practice (IMP2014), 2014/12/13, Chinese Society of Information Managemen, Taoyuan, Lunghwa University of Science and Technology, pp.869-879. (NSC 102-3111-E-006-001)
  36. D. H. Shih, M. H. Shih and P. Y. Shih, 2014, A Multi-objective Decision Support Mechanism for Reverse Auction, The 9th International Conference on Computer Science & Education (ICCSE 2014), 2014/08/22-24, University of British Columbia and IEEE Vancouver Section, Vancouver, Canada, 4 pages. (NSC102-2410-H-224-016)
  37. J. H. Cheng and D. H. Shih, 2014, The Influence of Moral Orientation and Relational Risk on Knowledge Sharing in Supply Chains, The 18th Pacific Asia Conference on Information Systems (PACIS 2014), 2014/06/24-28, Southwestern University of Finance and Economics, Chengdu, China, 8 pages.
  38. W. H. Hsieh, D. H. Shih, M. H. Shih, P. Y. Shih and S. B. Lin, 2014, An EMBAR System for Internet Addiction, International Symposium on Healthcare Information Management (UHIMA2014), 2014/06/13-14, Taiwan Healthcare Information Management Association, Taichung, Taiwan, 8 pages. (NSC 98-2218-E-212-001 and NSC-97-2218-E-224-008)
  39. D. H. Shih, M. H. Shih and P. Y. Shih, 2014, A DEA-based Decision Support Mechanism for Reverse Auction, The 25th International Conference on Information Management (ICIM 2014), 2014/05/24, Chinese Society of Information Management, Taichung,Taiwan, 10 pages. (NSC102-2410-H-224-016)
  40. D. H. Shih, P.Y. Shih, W. H. Shen and T. S. Huang, 2014, A DEA-Based Decision-making Model for Multi-Attribute Reverse Auction, Western Decision Sciences Institute 43 Annual Meeting (WDSI 2014), 2014/04/01-04, Western Decision Sciences Institute, Napa Valley, CA, USA, 2 pages. (NSC102-2410-H-224-016)
  41. D. H. Shih, M. H. Shih, L. Y. Chen and A. C. Cheng, 2013, A Secure M-Coupon Mechanism for M-commerce, The 19th Conference on Information Management and Practice (IMP 2013), 2013/12/07, Chinese Society of Information Management, Taichung, 13 pages. (NSC 101-2410-H-224-004)
  42. D. H. Shih, H. S. Chiang and M. H. Shih, 2013, ECG identification of arrhythmias by using an associative Petri net, IEEE International Conference on Cluster Computing (CLUSTER), 2013/09/23-27, Indiana University, Indianapolis, IN, USA, 2 pages. (NSCl02 -24l0-H-224-016)
  43. D. H. Shih, W. H. Shen, J. C. Shen and J. H. Chen, 2013, Knowledge discovery from bank direct marketing, 2013 International Conference on Information Management (ICIM 2013), 2013/05/25-26, Chinese Society of Information Management, Tamsui, Taiwan, 7 pages.
  44. D. H. Shih, S. L. Tai, J. C. Shen, and W. H. Shen, 2013, An APN model for stock trading signal detection, Western Decision Sciences Institute 42 Annual Meeting (WDSI 2013), 2013/03/26-29, Western Decision Sciences Institute, Long Beach, CA, 5 pages. (NSC 101-2410-H-224-004)
  45. 洪仕杰, 沈浩宇, 沈瑞棋, 施東河, 2012, 購物網站商品搭配銷售之研究, 第十八屆資訊管理暨實務研討會, 2012/12/08, 中華民國資訊管理學會, Taipei, 10 pages.
  46. W. H. Shen, J. C. Shen, D. H. Shih and Y. D. Chu, 2012, Variations in Physiological Parameters after an Online Game Playing Task in the Morning or Afternoon, Asia Pacific Conference on Information Management 2012 (APCIM2012), 2012/08/16-18, Japan Society for Information and Management (JSIM), Seattle University, WA., 7 pages.
  47. S. M. Huang, L. Y. Chou, D. H. Shih, 2012, Understanding the Effect of Third-Party Web Assurance Seals on Consumers’ Trust from the Perspective of the Seal Providers, Portland International Center for Management of Engineering and Technology (PICMET), 2012/07/29-2012/08/02, PORTLAND STATE UNIVERSITY, Vancouver, Canada, 12 pages.
  48. W. H. Shen, J. C. Shen, D. H. Shih and Y. D. Chu, 2012, A Study of Relationship between Level of Internet Addiction and Physiological Effects when Surfing the Web, The 23th International Conference on Information Management (ICIM 2012), 2012/05/19, Chinese Society of Information Management, National University of Kaohsiung, 5 pages. (NSC 100-2410-H-224-028)
  49. J. C. Shen, W. H. Shen, D. H. Shih and Y. D. Chu, 2012, Differentiating Physiological Effects of Internet Disorderer when Surfing the Web, The 7th International Symposium on Healthcare Information Management (UHIMA 2012) (Best paper Award), 2012/04/20-21, 台灣健康資訊管理學會, Tainan, 9 pages.
  50. W. H. Shen, J. C. Shen, D. H. Shih and Y. D. Chu, 2012, A study of relationship between level of Internet addiction and psychophysiological recovery time when surfing the web, Western Decision Sciences Institute Forty First Annual Meeting (WDSI 2012), 2012/04/03-06, Western Decision Sciences Institute, Big Island, Hawaii, pp.338-342. (NSC 100-2410-H-224-028)
  51. W. H. Shen, J. C. Shen, D. H. Shih and Y. D. Chu,, 2011, Differentiating physiological effects of computer worker when surfing the web, 第十七屆資訊管理暨實務研討會, 2011/12/10, 中華民國資訊管理學會, Tainan, 10 pages.
  52. D. H. Shih, J. C. Shen, W. H. Shen and M. J. Yang, 2011, A mobile intrusion detection system for mobile device, The 21st International Conference on the Pacific Rim Management, 2011/07/09-11, National Cheng Kung University, Tainan,, 15 pages.
  53. D. H. Shih, J. C. Shen, W. H. Shen and C. C. Lai, 2011, A possible auditing framework in DICOM standard, The 22th International Conference Information Management (ICIM 2011), 2011/05/21, Chinese Society of Information Management, Taichung, 12 pages.
  54. D. H. Shih, J. C. Shen, W. H. Shen and C. C. Lai, 2011, Providing optimistic auditing in DICOM Images: An Inference Approach, 2011 6th International Symposium on Healthcare Information Management, 2011/04/15, Taiwan Healthcare Information Management Association, Changhua, Taiwan, 8 pages.
  55. W. H. Shen, J. C. Shen, D. H. Shih, 2011, Differential Physiological Effects for Internet addiction disorder, 2011 e-CASE & e-Tech International Conference, 2011/01/18-20, KAT,iBAC, Toshi Center Hotel, Tokyo, pp.1761-1773.
  56. D. H. Shih, P. C. Chuang, M. H. Shih, 2010, A Portable Single Sign-On System with Keystroke Dynamic Authentication, 2010 Joint Statistical Meetings (JSM2010), 2010/07/31-2010/08/05, The American Statistical Association, Vancouver, British Columbia, 16 pages. (NSC98-2410-H-224-011-MY2)
  57. H. S Chiang, C. Y. Lai, C. C. Chen, D. H. Shih, 2010, A Comparative Study of Classification Techniques on Support Diagnosis of ECG Arrhythmia, International Conference on Business and Information 2010, 2010/07/05-07, International Business Academics Consortium (iBAC), Kitakyushu, Japan, 16 pages. (NSC98-2410-H-224-011-MY2)
  58. C. C. Lin and D. H. Shih, 2010, Green Consumption Attitudes of the Tourists Lodging in the Resort Hotel, The International conference on Environmental Pollution and Public Health, 2010/06/21-23, EPPH2010, Chengdu, China, 3 pages.
  59. C. C. Lin and D. H. Shih, 2009, Mind Mapping : A Creative Development in Industrial Engineering Education, 2009 Wireless Communications, Networking and Mobile Computing, 2009/09/24-26, WICOM 2009, Beijing, China, 3 pages.
  60. D. H. Shih, C. C. Chen, H. S. Chiang, 2009, An Empirical Studies on Mobile phone dependency Syndrome., The Eighth International Conference on Mobile Business(ICMB 2009), 2009/06/26-28, Dalian University of Technology, Dalian, 6 pages. (NSC97-3114-E-168-002)
  61. D. H. Shih, D. Y. Kao, J. C. Shen, 2009, An Embedded TOP System for m-Commerce User Authentication, The Eighth International Conference on Mobile Business(ICMB 2009), 2009/06/26-28, Dalian University of Technology, Dalian, 6 pages. (NSC97-3114-E-168-002)
  62. C. C. Lin and D. H. Shih, 2009, Information System Reengineering for Enterprise ResourcePlanning as Businesses Adapting to the E-Business Era, 2009 World Congress on Software Engineering, 2009/05/19-21, WCSE 2009, Xiamen, China, 3 pages.
  63. I. C. Chen, S. C. Hu, D. H. Shih, 2009, A Platform for Syndicating and Manipulating Instrumentation and Measurement, International Conference Virtual Environments, Human-Computer Interfaces, and Measurement Systems (IEEE VECIMS 2009), 2009/05/11-13, IEEE, Hong Kong, pp.38-42.
  64. I. C. Chen S. C, Hu and D.H. Shih, 2009, A Platform for Syndicating and Manipulating Instrumentation and Measurement Data on the Web, IEEE VECIMS 2009, 2009/05/11-13, The University of Hong Kong, Hong Kong, 6 pages.
  65. D. H. Shih, I. C.Chen, S. C. Hu, 2009, A Study of the adoption of self-service technologies by consumers in convenience stores, The 11th International Conference on Advanced Communication Technology (IEEE ICACT 2009), 2009/02/15-18, IEEE, Phoenix Park, pp.1986-1989.
  66. D. H. Shih, W. S. Chuang, M. H. Shih, 2009, Exploring users resistance in e-voting system, The 2009 International Conference on e-Commerce, e-Administration, e-Society, and e-Education (e-CASE 2009), 2009/01/08-10, Singapore, 14 pages. (NSC 98-2918-I-224-003 and NSC 97-2218-E-224-008)
  67. C. C. Lin and D. H. Shih, 2008, Fundamental Framework of Supporting M-learning in RFID System, 2008International Symposium on Intelligent Information Technology Application, 2008/12/21-22, IITA2008, Shanghai, China, 3pages.
  68. D. H. Shih, C. S. Jhuang and M. H. Shih, 2008, A study of mobile SpaSMS filtering system, Proceeding of International Conference on Pacific Rim Management 18th Annual Meeting, 2008/07/24-26, Toronto, Ontario, 11 pages.
  69. D. H. Shih and T. C. Lin, 2008, User authentication system by using keystroke dynamics, Proceeding of International Conference on Pacific Rim Management 18th Annual Meeting, 2008/07/24-26, Toronto, Ontario, 14 pages. (NSC95-2218-E-224-008, NSC 96-2218-E-224-010)
  70. C. C. Lin, W. C. Tsai, and D. H. Shih, 2008, A Study of Information System Reengineering as ERP Is Introduced to Businesses Adapting to the E-Business Era, The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), 2008/06/18-20, Dalian, C21-08.
  71. C. C. Lin and D. H. Shih, 2008, Associating Information Literacy with Regulating Rules in Family by Data Mining, The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), 2008/06/18-20, Dalian, C11-01,.
  72. D. H. Shih and T. C. Lin,, 2008, Enhanced user authentication through keystroke dynamics with smart cards, Proceeding of 2008 Symposium on Digital Life Technology, 2008/06/05-06, Tainan, 10 pages. (NSC 96-2218-E-224-010, NSC95-2218-E-224-008)
  73. I. C. Chen, S. C. Hu, and D. H. Shih, 2008, Syndicating and Manipulating Numerical Web Data: A RSS Approach, First Pacific-Asia Workshop on Web Mining and Web-based Application 2008 (WAMA 2008), 2008/05/20-21, Osaka, 8 pages.
  74. 賴雅玲, 涂泰源, 施東河, 2007, 應用資料探勘於技專校院推薦甄選科系之推薦研究, 2007 National Computer Symposium, 2007/12/20-21, Taichung, 9 pages.
  75. M. C. Lin and D. H. Shih, 2007, The Impact of Striving for License on the Stock Returns, 第十三屆資訊管理暨實務研討會, 2007/12/08, Kaohsiung, pp.899~916.
  76. Y. L. Lai, T. Y. Tu and D. H. Shih, 2007, Applying Neural Network in the recommendation of the departments of TVE Universities/Colleges, 第十三屆資訊管理暨實務研討會, 2007/12/08, Kaohsiung, pp.1704~1720.
  77. 施東河, 林澤君, 胡源智, 2007, U化環境中合法使用者之安全驗證, 2007 International conference on Open Source, 2007/11/01-04, Taipei, 10 pages. (NSC 96-2218-E-224-010)
  78. D. H. Shih, H. S. Chiang, S. B. Lin and M. H. Shih, 2007, An intelligent ECG reasoning system for the elderly, Proceedings of the Sixth International Conference on Machine Learning and Cybernetics (EI indexed), 2007/08/19-22, Hong Kong, pp.1826-1831.
  79. D. H. Shih, H. S. Chiang and Y. C. Hu,, 2007, Enhanced password authentication through typing biometrics, Proceeding of International Conference on Pacific Rim Management 17th Annual Meeting, 2007/07/12-14, Las Vegas, Nevada, pp.C28-18-C48-25.
  80. D. H. Shih, W. S. Chuang and M. H. Shih,, 2007, A Secure Electronic Voting Scheme with Elliptic Curve Cryptography, Proceeding of International Conference on Pacific Rim Management 17th Annual Meeting,(Best Paper Award), 2007/07/12-14, Las Vegas, Nevada, pp.C48-15-C48-26.
  81. D. H. Shih, Y. L. Lai and M. H. Shih,, 2007, Recommendation in the selection of the department of TVE Universities/Colleges, Proceeding of International Conference on Pacific Rim Management 17th Annual Meeting, 2007/07/12-14, Las Vegas, Nevada, pp.C48-1-C48-14.
  82. D. H. Shih, C. H. Cheng, J. C. Shen, 2007, Secure Protocol of Reverse Discriminatory Auction with Bid Privacy, Sixth International Conference on the Management of Mobile Business (EI index)., 2007/07/09-11, Toronto, Ontario, 8 pages.
  83. D. H. Shih, C. H. Cheng and J. C. Shen, 2007, A Secure Multi-item E-Auction Mechanism with Bid Privacy, Western Decision Sciences Institute Thirty-Sixth Annual Meeting, 2007/04/03-07, Englewood, Colorado, USA, 3 pages.
  84. J. C. Shen, D. H. Shih, H. S. Chiang, 2007, A mobile ECG monitoring system for elderly patients, The First International Conference on Information Technology and Management, 2007/01/03-05, Hong Kong, China, pp.418-425. (NSC95-3113-P-224-004)
  85. J. C. Shen, D. H. Shih, H. S. Chiang and S. B. Lin, 2006, A Mobile Physiological Monitoring System for Patient Transport, Management International Conference 2006,, 2006/11/23-25, Portoroz, Slovenia, pp.1763-1772.
  86. D. H. Shih, G. J. Wu and K. S. Cheng, 2006, A New Bandwidth Qos Provision Method for Hose Model VPNs, International Symposium on Broadband Access Technologies in Metropolitan Area Networks, 2006/10/05-06, Niagara Falls, Canada, 3 pages.
  87. D. H. Shih, H. S. Chiang, and H. C. Lin, 2006, Collaborative Spam Filtering with Heterogeneous Agents, Proceedings of International Conference on Pacific Rim Management 16th Annual Meeting, 2006/07/27-29, Honolulu, Hawaii, pp625-630.
  88. H. S. Chiang, J. C. Shen, D. H. Shih, 2006, Ontology based Knowledge Management of Email Viruses, Proceedings of International Conference on Pacific Rim Management 16th Annual Meeting, 2006/07/27-29, Honolulu, Hawaii, pp455-460.
  89. D. H. Shih, J. C. Shen, H. S. Chiang, T. E. Hsu, 2006, Collaborative Spam Filtering with Multi-Agent System, The 10th World Multi-Conference on Systemics, Cybernetics and Informatics, 2006/07/16-19, Orlando, Florida, Vol. I, pp285-290.
  90. D. H. Shih, P. L. Sun and J. S. Roan, 2006, A Secure Framework on RFID-Enabled Supply Chain with Web Services, Proceedings of the Thirty-Fifth Annual Meeting of the Western Decision Sciences Institute April 11-15, 2006/04/11-15, Waikoloa,Hawaii, 3 pages. (NSC 94-2218-E-194-005,NSC 94-2213-E-224-036)
  91. D. H. Shih, and H. C. Wei, 2006, A New Code Reservation Strategy for differential QoS in OVSF Code assignment, The 12th Mobile Computing Workshop (MC2006), 2006/03/31, Taichung, pp. 394-413.
  92. 施東河, 李章義, 鄭又腆, 2006, RFID應用於血液管理方面之初探, International symposium on healthcare information management, 2006/03/11-12, Kaohsiung, pp. 133-139.
  93. D. H. Shih, C. Y. Li and J. C. Shen, 2006, Mobile Telehelathcare System by using RFID, International symposium on healthcare information management, 2006/03/11-12, Kaohsiung, pp. 140-144.
  94. 施東河, 黃信誼, 沈瑞棋, 2005, 行動商務反向維克瑞拍賣系統之研究, 第十一屆資訊管理暨實務研討會, 2005/12/10, Taipei. (NSC 93-2218-E-224-015)
  95. H. S. Chiang, J. C. Shen, D. H. Shih, and C. S. Lin, 2005, A Collaborative Learning Method For Spam Filtering, Mexican International Conference on Artificial Intelligence, 2005/11/14-18, Monterrey, 10 pages.
  96. D. H. Shih, S. F. Hsu, H. S. Chiang and C. P. Chang, 2005, Misuse Detection of Email Viruses base on SOM with k-medoids, Mexican International Conference on Artificial Intelligence, 2005/11/14-18, Monterrey,, 10 pages. (NSC 92-2218-E-224-015)
  97. 施東河, 蔡裕琦, 2005, 以平衡計分卡觀點探討CMMI對於軟體專案效益之研究, 2005 International Conference on Open Source, 2005/11/10-12, Taipei, 10 pages.
  98. D. H. Shih, F. L. Huang and K. H. Chang, 2005, Exploring Computer Forensics, 2005 International Forensic Science Symposium, 2005/11/07-12, Taipei.
  99. D. H. Shih, C.S. Lin and Y.L. Chen, 2005, An Enhanced Naïve Bayesian Classifier on Spam Filtering, The XV ACME Int. Conf. on Pacific Rim Management, 2005/07/28-30, San Diego. (NSC 93-2213-E-224-038)
  100. D. H. Shih and H. C. Wei, 2005, Consolidation of Available Resource and Code Reservation for Code Management in W-CDMA, The XV ACME Int. Conf. on Pacific Rim Management, 2005/07/28-30, San Diego.
  101. D. H. Shih and C.Y. Lin, 2005, A Lightweight Authentication Cryptography for RFID Smart Tags, 第十六屆國際資訊管理學術研討會(ICIM 2005), 2005/05/28, Taipei. (NSC 93-2218-E-194-016)
  102. D. H. Shih and P. L. Sun, 2005, A secure framework on RFID-enabled EPCglobal Network with Web Services, 第十六屆國際資訊管理學術研討會(ICIM 2005), 2005/05/28, Taipei. (NSC 93-2218-E-224-015)
  103. D. H. Shih, G. J. Wu and B. Lin,, 2005, Provisioning Virtual Private Networks in Hose Model with Clustering-BFS Tree, International Association for Computer Information Systems Pacific 2005 Conference, 2005/05/19-21, Taipei, pp. 617-622. (NSC 93–2218–E–224–015)
  104. D. H. Shih, P. L. Sun and B. Lin, 2005, Securing industry wide EPCGlobal network with WSS, International Association for Computer Information Systems Pacific 2005 Conference, 2005/05/19-21, Taipei, pp. 290-296. (NSC 93–2218–E–194–016)
  105. 施東河,蔡裕琦, 2005, 以平衡計分卡觀點評估軟體專案導入CMMI之研究, 2005 International Conference on Accounting and Information Technology, 2005/05/17-19, Chiayi, pp. 585-604.
  106. D. H. Shih, H. S. Chiang and C.S.Lin,, 2005, Data Mining Methods in the Detection of Spam, Proceedings of the 34th WDSI Annual Meeting, 2005/03/22-26, Vancouver, pp. 271-273. (NSC 93-2213-E-224-038)
  107. D. H. Shih and P. L. Sun, 2005, Anti-Collision Aspect of RFID Tags and Reader, Proceedings of the 34th WDSI Annual Meeting, 2005/03/22-26, Vancouver, pp. 268-270. (NSC 93-2218-E-194-016)
  108. D. H. Shih, C.I. Lin and Binshan Lin, 2005, Privacy and security aspects of RFID tags, Southwest Decision Sciences Institute thirty-Sixth Annual Conference, 2005/03/01-05, Dallas,Texas. (NSC 93-2218-E-194-016)
  109. 施東河, 魏漢權, 2004, 應用資源剩餘策略於無線網路中服務品質保證機制之研究, 第十屆資訊管理暨實務研討會, 2004/12/18, Taichung, pp. 837-850.
  110. D. H. Shih, P. L Sun and Y. W. Chiu,, 2004, Barriers to Radio Frequency Identifier, 第一屆服務業管理與創新學術研討會, 2004/10/08-09, Penghu.
  111. D. H. Shih, T. E. Hsu and B. Lin, 2004, Collaborative Spam Filtering on Multiagent System, The XIV ACME Int. Conf. on Pacific Rim Management, 2004/07/29-31, Chicago, pp. 619-624. (NSC 92-2218-E-224-015)
  112. D. H. Shih, S. Y. Huang and B. Lin, 2004, Linking Threshold Cryptosystem for Reverse Auction with Web Service, The XIV ACME Int. Conf. on Pacific Rim Management, 2004/07/29-31, Chicago, pp. 613-618. (NSC 92-2218-E-224-015)
  113. D. H. Shih, C. P. Chang and H. S. Chiang, 2004, Malicious Email Detection by Self-Organizing Maps, The XIV ACME Int. Conf. on Pacific Rim Management, 2004/07/29-30, Chicago, pp. 631-636. (NSC 92-2218-E-224-015)
  114. 施東河, 施嘉興, 陳嘉隆, 2004, 無線通訊網路中正交可變展頻係數通道碼管理的服務品質保證機制, 第十五屆 ICIM 國際資訊管理學術研討會, 2004/05/29, Taipei.
  115. D. H. Shih, C. P. Chang, and H. S. Chiang, 2004, Misuse Detection of New Malicious Emails, 第十五屆 ICIM 國際資訊管理學術研討會, 2004/05/29, Taipei. (NSC 92-2218-E-224-015)
  116. D. H. Shih and T. E. Hsu, 2004, Collaborative Spam Filtering in Distributed P2P Networks, 第十五屆 ICIM 國際資訊管理學術研討會, 2004/05/29, Taipei. (NSC 92-2218-E-224-015)
  117. D. H. Shih, H. S. Chiang and M. H. Shih, 2004, How Companies Can Protect Their Emails from Email Viruses, 第六屆中小企業管理研討會, 2004/05/28, Chiayi, pp. 229-240.
  118. D. H. Shih, Huang S.Y. and Yen D. C., 2004, Non-interactive bid reverse auction scheme with strong privacy, Proceedings of the 33rd WDSI Annual Meeting, 2004/04/13-17, Manzanillo,Mexico, pp. 219-221.
  119. D. H. Shih, and Z. Q. Lin, 2003, A Study on the Provision of Quality of Service of Bandwidth Degradation in Wireless Network, Int. Conf. on Pacific Rim Management 13th Annual meeting, 2003/07/31-2003/08/02, Seattle, pp. 921-926.
  120. D. H. Shih and H. S. Chiang, 2003, Bayesian classification Method for detection of New Malicious Emails, Int. Conf. on Pacific Rim Management 13th Annual meeting, 2003/07/31-2003/08/02, Seattle, pp. 904-909.
  121. D. H. Shih, and C. Y. Chan, 2003, Web Intrusion Detection Using Probabilistic Network with Undirected Links, Int. Conf. on Pacific Rim Management 13th Annual meeting, 2003/07/31-2003/08/02, Seattle, pp. 882-887.
  122. Liang Chen, David C. Yen and Dong-Her Shih, 2003, The management and implementation issues of eCRM, Proceedings of the 32nd WDSI Annual Meeting, 2003/04/15-19, Kauai, pp. 418-420.
  123. 施東河, 周易星, 2002, 行動顧客關係管理系統之建置研究, 第八屆國際資訊管理研究暨實務研討會, 2002/12/23, Kaohsiung, pp. 925-942.
  124. 施東河, 黃于爵, 2002, 網站入侵偵測系統之研究, 2002年臺灣網際網路研討會, 2002/10/30-2002/11/01, Hsinchu, pp. 809-815.
  125. H. Joseph Wen, H. C. Chen and D. H. Shih, 2001, Emerging model of e-commerce web site design, Proceedings of the 30th WDSI Annual Meeting, 2001/04/04-07, Vancouver, pp. 440-442.
  126. 施東河,嚴紀中,莊見成, 2000, 企業使用Middleware架構之建置與分析, 第十一屆全國資訊管理學術研討會, 高雄, pp. 121-129.
  127. 施東河,錢憶蘋, 2000, 以中介軟體為基礎之企業應用整合探討, 第六屆資訊管理研究暨實務研討會, 新竹, pp. 100-107.
  128. 施東河,王文總, 2000, 網路管理代理程式之探討, 第十一屆全國資訊管理學術研討會, 高雄, pp. 85-90.
  129. Yen, D.C. and Shih D.H., 2000, MIDDLEWARE: An analysis for future implementation and integration, Proceedings of the 29th WDSI Annual Meeting, Maui, pp. 1102-1107.
  130. 施東河,王勝助, 1999, 認購權證評價模式與避險部位之研究, 第十屆國際資訊管理學術研討會, 台北, pp. 1086-1093.
  131. 施東河, 王勝助, 1999, 運用類神經網路在認購權證評價之研究, 1999年財務金融學術研討會, 台中, pp. 823-838.
  132. 沈瑞棋, 施東河, 王勝助, 1999, 觀光業經營績效分析, 第14屆全國技職教育研討會, 台南, pp. 57-70.
  133. Shih, D.H., Wang S.J., and Shen, J.C., 1999, A study of investment decision model in warrant by using artificial neural network, Proceedings of the 28th WDSI Annual Meeting, Puerto Vallarta,Mexico, pp. 690-692.
  134. Shih, D.H. and Wang S.J., 1999, A neural network approach to pricing warrant, 銘傳大學跨世紀國際學術研討會, 台北, pp. 629-637.
  135. 施東河, 陳宇佐, 1998, 即時互動式媒體在網路行銷上之應用, 1998傳播管理研討會, 高雄, pp. 266-285.
  136. 施東河, 王勝助, 沈瑞棋, 1998, 金融機構授信決策評估模式之研究, 國際資訊管理研究暨實務研討會, 台北, pp. 601-608.
  137. 施東河, 王勝助, 1998, 灰色聚類在股市投資決策上之研究, 國際資訊管理研究暨實務研討會, 桃園, pp. 615-622.
  138. 沈瑞棋, 施東河, 王勝助, 1998, 應用灰關聯分析於旅遊風險評估模式之研究, 灰色系統理論與應用研討會, 台北, pp. 185-193.
  139. Shih, D.H. and Shen, J.C., 1998, An empirical study of credit card fraud detection system in Taiwan, Proceedings of the 27th WDSI Annual Meeting, Reno, pp. 648-649.
  140. Shih, D.H. and Hsu, G.S., 1997, The exploration of risk premium-An empirical study of property/casualty insurance industry in Taiwan., Proc. The 8th Conf. On information management, pp. 927-934.
  141. Shih, D.H. and Hsu, G.S., 1997, A study of determinants and prediction of the household electricity consumption demand in Taiwan, 第12屆全國技職教育研討會, 台中, pp. 71-80.
  142. Shih, D.H. and Chen, C.C., 1997, An empirical study of credit card risk assessment, Proc. The 8th Conf. On information management, pp. 920-926.
  143. Hsu, G.S., Shen, Z.C., and Shih, D.H., 1997, A grey forecasting of tourism demand in Taiwan, 第12屆技職教育研討會, 台中, pp. 67-76.
  144. Hwang, C.S., Shih, D.H., and Lin, C.L., 1996, Artificial neural network in Financial forecast-An application of prediction of risk premiums on Taiwan life insures stocks, Proc. The 7th Int. conf. On information management, pp. 375-382.
  145. Shih, D.H., Wan. T.J., and Ni. J.H., 1995, A study of waste water treatment plants expert system, Proc. The 6th Int. conf. On information management, pp. 331-339.
  146. Shih, D.H., Lin, C.L., and Ma, F.T., 1995, A study of credit card risk assessment, Proc. The 6th conf. On information management, pp. 141-146.
  147. Kung, F.C. and Shih, D.H., 1985, Shifted Chebyshv series approach to the anslysis and parameter estimation of nonlinear delay systems, Proc. National Symp. Autom. Contr., pp. 43-57.
三、其他論著
  1. 施東河, 2023, 使用深度學習進行失智症嚴重程度之預測, NSTC 112-2410-H-224-007,國科會,主持人..
  2. 施東河, 2022, 基於持續元音的構音障礙檢測之研究, MOST 111-2410-H-224-006, 科技部,主持人..
  3. 施東河, 2021, 具價格推薦與可信執行環境之英式拍賣區塊鏈之研究, MOST 110-2410-H-224-010, 科技部,主持人.
  4. 施東河, 2020, 應用以太坊技術於逆物流退換貨詐騙防治, MOST 109-2410-H-224-022, 科技部,主持人.
  5. 施東河, 2019, 第三方驗證及區塊鏈系統導入良性網頁挖礦程式偵測之研究,, MOST 108-2410-H-224-040,科技部,主持人..
  6. 施東河, 2018, 大數據平台股票交易量突發風險評估即時預警系統之研究, MOST 107-2410-H-224-012, 科技部, 主持人.
  7. 施東河, 2017, 手機成癮者干預程式之開發與研究, MOST 106-2410-H-224-004, 科技部, 主持人.
  8. 施東河, 2016, 非關聯式資料庫聚合中資料隱私保護與效能分析之研究, MOST 105-2410-H-224-008, 科技部, 主持人..
  9. 施東河, 2015, 手機應用於人類活動辨識之研究, MOST 104-2410-H-224-017,科技部,主持人..
  10. 施東河, 2014, 利用觸控行為特徵認證的近場通信行動支付安全機制, MOST 103-2410-H-224-011,科技部,主持人.
  11. 施東河, 2013, 以資料包絡分析法為基礎之多回合反式拍賣決策支援模式, NSC102-2410-H-224-016, 國科會, 主持人.
  12. 施東河, 2012, 在行動商務上一個使用人體辨識技術的安全傳銷行動優惠券機制,NSC 101-2410-H-224-004, 國科會,主持人.
  13. 施東河, 2011, 數位音樂權利保護機制之研究, NSC 100-2410-H-224 -028, 國科會,主持人.
  14. 施東河, 2010, 多單位電子拍賣安全機制與接受模式之研究(2/2), NSC 98-2410-H-224 -011 -MY2,國科會,主持人.
  15. 施東河, 2009, 多單位電子拍賣安全機制與接受模式之研究(1/2), NSC 98-2410-H-224 -011 -MY2,國科會,主持人.
  16. 施東河, 2008, 未來生活互動式溝通環境之建置--總計畫(I),NSC97-2218-E-224-003, 國科會, 共同主持人.
  17. 施東河, 2008, 智慧型多功能之老人居家照護服務應用輕型電動載具(I),NSC97-3114-E-168-002,國科會,共同主持人.
  18. 施東河, 2008, 以動態鍵擊特徵為基礎的嵌入式單一登入系統之研製, NSC97-2218-E-224-012, 國科會,主持人.
  19. 施東河, 2008, 未來生活互動式溝通環境之建置-子計畫五:居家如音隨行感測網路之研製(I) NSC-97-2218-E-224-008, 國科會,主持人.
  20. 施東河, 2007, 在異質網路上打造一安全U化之環境-總計畫(II) (NSC96-2218-E-224-005-) 國科會, 共同主持人.
  21. 施東河, 2007, 供應鏈管理導入無線射頻辨識系統安全架構之研究(2/2), NSC95-2221-E-224-049-MY2,國科會, 主持人..
  22. 施東河, 2007, 在異質網路上打造一安全U化之環境--子計畫五:U-化環境中合法使用者之安全驗證(II), NSC 96-2218-E-224-010,國科會,主持人..
  23. 施東河, 2006, 在異質網路上打造一安全U化之環境-總計畫(I), NSC95-2218-E-224-003, 國科會, 共同主持人.
  24. 施東河, 2006, 嵌入式郵件病毒過濾器之研製, NSC 95-3113-P-224-004, 國科會,主持人.
  25. 施東河, 2006, 運用網路服務技術整合無線射頻辨識系統與供應鏈管理之架構應用(3/3), NSC 95-2218-E-194-004,國科會, 共同主持人.
  26. 施東河, 2006, 在異質網路上打造一安全U化之環境--子計畫五:U-化環境中合法使用者之安全驗證(I), NSC95-2218-E-224-008-,國科會, 主持人.
  27. 施東河, 2006, 供應鏈管理導入無線射頻辨識系統安全架構之研究(1/2), NSC95-2221-E-224-049-MY2,國科會, 主持人.
  28. 施東河, 2005, 對等式網路代理人於垃圾郵件偵測之研究, NSC 93-2213-E-224-038, 國科會,主持人.
  29. 施東河, 2005, 運用網路服務技術整合無線射頻辨識系統與供應鏈管理之架構應用(2/3), NSC 94-2218-E-194-005, 國科會,共同主持人.
  30. 施東河, 2005, 無線射頻辨識技術隱私與安全之研究, NSC 94-2213-E-224-036, 國科會,主持人.
  31. 施東河, 2005, 行動商務反向維克瑞拍賣系統之研製, NSC 93-2218-E-224-015, 國科會,主持人.
  32. 施東河, 2004, 運用網路服務技術整合無線射頻辨識系統與供應鏈管理之架構應用(1/3), NSC 93-2218-E-194-016, 國科會,共同主持人.
  33. 施東河, 2004, 混合型入侵偵測系統之研製, NSC 92-2218-E-224-015, 國科會,主持人.
  34. 施東河, 2004, 技職教育評鑑資訊系統第四期專案報告, 協同主持人,教育部技職司.
  35. 施東河, 2003, 技職教育評鑑資訊系統第三期專案報告, 協同主持人,教育部技職司.
  36. 施東河, 2002, 技職教育評鑑資訊系統第二期專案報告, 協同主持人,教育部技職司.
  37. 施東河, 2001, 題庫資訊系統架構規劃, 測驗中心,主持人.
  38. 施東河, 2001, 計算機組事務作業流程改善及標準化之研究, 測驗中心,主持人.
  39. 施東河, 2001, 技職教育評鑑資訊系統第一期專案報告, 協同主持人,教育部技職司.
  40. 施東河, 2000, 寬頻網路管理代理程式之研究, NSC 89-2416-H-224-016, 國科會,主持人.
  41. 施東河, 2000, 台灣學術網路\研究網路連線計劃, NSC 89-2745-P-224-001, 國科會,主持人.
  42. 施東河, 2000, 台灣研究網路連線計劃(II), NSC 89-2745-P-224-002, 國科會,主持人.
  43. 施東河, 1998, 網際網路商務(I):基礎面及應用面研究-電子虛擬商店在高速網路上之設計與製作, NSC 87-2416-H-224-015-N7, 國科會,主持人.
  44. 施東河, 1998, 台灣地區家庭用電量預測與影響因子之研究, NSC 87-2815-c-224- 028E, 國科會.
  45. 施東河, 1996, 信用卡信用風險評估之研究, NSC 85-2418-H-224-008, 國科會.
  46. 施東河, 1991, 類神經網路運算與應用之研究, NSC 81-0115-C004-01-001H, 國科會,主持人 1991.
  47. 施東河, 1991, 時間序列分析之研究, NSC 81-0115-C004-01-002H, 國科會,主持人 1991.
  48. 施東河, 1991, 台灣地區股票上市公司股價變動幅度的決定因子之實証研究, NSC 80-0301-H004-06, 國科會,主持人 1991.
  49. 施東河, 1991, 分散式電腦輔助評量支援系統, NSC 79-0111-S-004-02, 國科會,共同主持人.
  50. 施東河, 1990, 電傳視訊觀光資訊系統資料庫架構之規畫與內容之研製, 交通部,MOC-STAO-RD26061. (協同主持人1990).
 
讀取 pdf 檔請安裝 Adobe Reader (下載點) 本系統請使用瀏覽器IE 6.0以上版本
 

SSO單一入口網 SSO ∣ YunTech雲科大首頁 YunTech Home ∣ mail諮詢信箱 Mail ∣ Home首頁 Home ∣ Reg帳號註冊 Registerlogon登入 Login