Basic Information
A Short Bio
Education
Experience
A Statement
Research Interests
Courses Offered
Publications
Graduate Students
Undergraduate Students
Professional Activities
Technical Manuscript Reviews



I am an associate professor in the School of Electrical Engineering & Computer Science at the University of North Dakota.


I am the Leading Guest Editor of the special issue Safe and Secure Artificial Intelligence for the Journal of Computers, Materials & Continua (SJR: 0.525, Quartile: Q2, & H-Index: 51). The important dates are as follows:
  • Paper Submission Deadline: August 01, 2025
  • First Round of Reviews Deadline: September 30, 2025
  • Submission of Revision Deadline: November 30, 2025
  • 2nd Round of Reviews Deadline: January 31, 2026
  • Decision of Acceptance Deadline: February 28, 2026
Papers can be submitted via IJS Submission System.

I am the Editor-in-Chief of the Journal of Information Technology Research (JITR), August 01, 2023 to present.

I was the Editor-in-Chief of the International Journal of Handheld Computing Research (IJHCR), November 01, 2008 to December 2017.


I was the general chairs for the following international conferences:

Conference
General
Chairs

  1. The 2019 International Conference on Engineering and Natural Science-Bangkok (ICENS 2019), March 15-17, 2019, The Landmark Bangkok, Bangkok, Thailand.
  2. The 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), June 25-27, 2018, The Grand Hotel Taipei, Taipei, Taiwan.
  3. The 2018 International Conference on Engineering and Natural Science (ICENS 2018), January 30 - February 01, 2018, Sapporo, Hokkaido, Japan.
  4. The 2017 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2017), November 7-9, Fukuoka, Japan.
  5. The 2017 International Conference on Engineering and Natural Science – Summer Session (ICENS-Summer 2017), August 23-25, 2017, Sapporo, Japan.
  6. The 2017 International Conference on Engineering and Natural Science (ICENS 2017), January 19-21, 2017, Bali, Indonesia.
  7. The 2016 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2016), Seoul Olympic Parktel, Seoul, Korea, November 7-9, 2016.
  8. The 2016 International Conference on Big Data, IoT, and Cloud Computing (BIC 2016), Chiang Mai, Thailand, August 23-25, 2016.
  9. The 2016 International Conference on Engineering and Natural Science – Summer Session (ICENS Summer), Kyoto, Japan, July 12-14, 2016.
  10. The 2nd International Conference on Business and Internet (ICBI 2016), Taipei, Taiwan, April 22-24, 2016.
  11. The 2nd International Conference on Engineering, Technology, and Applied Science (ICETA 2016), Taipei, Taiwan, April 22-24, 2016.
  12. The 3rd International Conference on Engineering and Natural Science (3rd ICENS), Bangkok, Thailand, January 19-21, 2016.
  13. The 2015 International Conference on Engineering, Technology, and Applied Science—Fall Session (ICETA 2015-Fall), Nagoya Congress Center, Nagoya, Japan, November 10-12, 2015.
  14. The 2015 International Conference on Big Data, IoT, and Cloud Computing (BIC 2015), Osaka, Japan, August 23-25, 2015.
  15. The 2nd International Conference on Engineering and Natural Science (ICENS 2nd), Tokyo, Japan, July 22-24, 2015.
  16. The 2015 Macau Conference on Engineering, Technology, and Applied Science (CETA 2015), Sheraton Macao Hotel, Macau, July 7-9, 2015.
  17. International Conference on Engineering, Technology, and Applied Science (ICETA 2015), Taipei, Taiwan, April 22-24, 2015.
  18. International Conference on Business and Internet (ICBI 2015), Taipei, Taiwan, April 22-24, 2015.
  19. The 2015 International Conference on Engineering and Natural Science (ICENS 2015), Bangkok, Thailand, January 21-23, 2015.


I have been editing/authoring the following journal, books, and proceeding:

Mark Fienup, Tom O’Neil, and Wen-Chen Hu, editors. Proceedings of the 48th Annual Midwest Instruction and Computing Symposium (MICS 2015), Grand Forks, North Dakota, April 10-11, 2015.
Including 39 articles and topics of undergraduate research, cloud/big data, mobile/web/database/scientific applications, distributed computing, computer science education, software testing, security, academic network administration, tools for teaching, algorithms, artificial intelligence, systems and control, etc.


Naima Kaabouch and Wen-Chen Hu, editors. Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, ISBN: 1-466-66571-8, IGI Global, 2014. It includes 36 chapters, more than 100 authors, and 4 sections: (1) radio spectrum sensing, (2) radio spectrum access and management, (3) software defined radio and antennas for cognitive radio networks, and (4) models, security, and other related topics.


Wen-Chen Hu, editor. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN: 1-466-64715-9, IGI Global, 2014.


Wen-Chen Hu and Naima Kaabouch, editors. Big Data Management, Technologies, and Applications, ISBN: 1-466-64699-3, IGI Global, 2013. It includes 17 chapters, 60 authors, and 4 sections: (1) big data technologies, methods, and algorithms, (2) big data storage, management, and sharing, (3) specific big data, and (4) big data and computer systems and other topics.


Wen-Chen Hu and S. Hossein Mousavinezhad, editors. Mobile and Handheld Computing Solutions for Organizations and End-Users, ISBN: 1-466-62785-9, IGI Global, 2012. It includes 20 chapters, 53 authors, and 7 sections: (1) Location-based services (LBS), (2) Mobile security, (3) Mobile evaluations and analyses, (4) Mobile human computer interaction (HCI), (5) Mobile health, (6) Mobile green computing, and (7) Mobile applications and networks.


Wen-Chen Hu and Naima Kaabouch, editors. Sustainable ICTs and Management Systems for Green Computing, ISBN: 1-466-61839-6, IGI Global, 2012.
Including 18 chapters, 48 authors, and 5 sections: (1) information and communication technologies and systems, (2) management and manufacturing, (3) mobile handheld devices, (4) computer vision and image processing, and (5) education and power generators.


Naima Kaabouch and Wen-Chen Hu, editors. Energy-Aware Systems and Networking for Sustainable Initiatives, ISBN: 1-466-61842-6, IGI Global, 2012.
Including 17 chapters, 64 authors, and 4 sections: (1) computing systems and clusters, (2) wireless networking, (3) routing and networking, and (4) computer and processor design and implementation.


Wen-Chen Hu, editor. Emergent Trends in Personal, Mobile, and Handheld Computing Technologies, ISBN: 1-466-60921-4, 20 chapters, IGI Global, 2012.
This book offers a vital compendium of the latest research within the field of personal computing, highlighting the latest trends in research and development of personal technology.


Wen-Chen Hu and Yanjun Zuo, editors. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, ISBN: 1-615-20761-9, IGI Global, 2010.
Including 200,000+ words, 22 chapters, 71 authors, and 4 sections: (1) handheld computing for mobile commerce, (2) handheld computing research and technologies, (3) wireless networks and handheld/mobile security, and (4) handheld images and videos.


Wen-Chen Hu. Internet-Enabled Handheld Devices, Computing, and Programming: Mobile Commerce and Personal Data Applications, ISBN: 1-591-40769-9, Information Science Reference, 2008.
Including 100,000+ words, 14 chapters, and 3 sections: (1) mobile commerce systems and handheld devices, (2) mobile web content design and implementation, and (3) client-side handheld computing and programming.


Wen-Chen Hu, editor. Selected Readings on Electronic Commerce Technologies: Contemporary Applications, ISBN: 1-605-66097-3, Information Science Reference, 2008.
Including 371 pages, 34 chapters, 76 authors, and 6 sections: (1) fundamental concepts and theories, (2) development and design methodologies, (3) tools and technologies, (4) utilization and application, (5) critical issues, and (6) emerging trends.


Tom O’Neil and Wen-Chen Hu, editors. Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007.
Including 71 articles, 115 authors, and topics of computational intelligence, algorithms, Web applications, software engineering, robotics, networks, distributed computing, tools for instruction/production, social implications, computational intelligence, programming languages, computer security, etc.


Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, editors. Advances in Security and Payment Methods for Mobile Commerce, ISBN: 1-591-40345-6, Idea Group Publishing, 2005.
Including 352 pages, 14 chapters, 37 authors, and 4 sections: (1) fundamentals of mobile commerce security and payment methods, (2) mobile commerce security, (3) mobile commerce payment methods, and (4) ad hoc mobile commerce security and payment methods.


I am currently appointed to the members of the following organizations:

Editor-in-chief of the International Journal of Handheld Computing Research (IJHCR), November 01, 2008 to December 2017.


Associate editor of the Journal of Information Technology Research (JITR), October 3, 2007 to present.


Editorial advisory board of the Contemporary Management Research, July 01, 2005 to present.


Editorial advisory review board of the IGI Global, January 01, 2007 to present.

 

Editorial review board of the Information Resources Management Journal (IRMJ), May 1, 2008 - present.


Editorial board member of the Journal of Wireless Communications (JoWC), November 01, 2015 - present.


Associate editor of the International Journal of Virtual Communities and Social Networking (IJVCSN), May 01, 2009 - present.


International advisory board member of the Encyclopedia of Information Science & Technology, January 2008 - present.



Basic Information

  • Me at the UND campus in late October 2008, when snow started to fall few days later Andy (attending medical school 👍 at the Ohio State University), Benji (attending the master program of Biomedical Engineering at the UND), and their mother in Summer 2002 at the Burger King, my favorite fast food
  • Email: wenchen@cs.und.edu
  • Office:
      School of Electrical Engineering and Computer Science
      University of North Dakota
      Upson II, Room 366K
      243 Centennial Drive Stop 7165
      Grand Forks, ND 58202-7165
      USA
  • : (O) 701-777-2413; (Fax) 701-777-3330
  • https://und.zoom.us/j/2489867333
  • Home:
      3706 19th Ave S
      Grand Forks, ND 58201-5710
      USA
  • ORCID   |   Facebook   |   LinkedIn   |   Google+
    Twitter   |   MySpace   |   Research Gate   |   Amazon
  • Research interests: (mobile) data research and applications such as (mobile) data security & mining, and mobile/smartphone/spatial/web computing.
  • Here is my resume.
  • My business card is as follows:


A Short Biography

Wen-Chen Hu received a BE, an ME, an MS, and a PhD, all in Computer Science, from Tamkang University, Taiwan, the National Central University, Taiwan, the University of Iowa, Iowa City, and the University of Florida, Gainesville, in 1984, 1986, 1993, and 1998, respectively. He is currently an associate professor in the School of Electrical Engineering and Computer Science of the University of North Dakota, Grand Forks. He was an assistant professor in the Department of Computer Science and Software Engineering at the Auburn University, Alabama, for years. He is the general chairs of about 20 international conferences such as the 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), and the Editor-in-Chief of the Journal of Information Technology Research (JITR). In addition, he has acted more than 100 positions as editors and editorial advisory/review board members of international journals/books, and track/session chairs and program committee members of international conferences. He has also won a couple of awards of best papers, best reviewers, and community services. Dr. Hu has been teaching for more than 25 years at the US universities and over 15 different computer/IT-related courses, and advising/consulting more than 100 graduate students. He has published over 100 articles in refereed journals, conference proceedings, books, and encyclopedias, edited more than 10 books and conference proceedings, was the Editor-in-Chief of the International Journal of Handheld Computing Research (IJHCR) from 2010 to 2017, and solely authored a book entitled “Internet-enabled handheld devices, computing, and programming: mobile commerce and personal data applications.” He is a member of ACM (Association of the Computing Machinery). His current research interests include (mobile) data research and applications such as (mobile) data security & mining, and mobile/smartphone/spatial/web computing.


Education

PhD in Computer and Information Science and Engineering August 1998
University of Florida, Gainesville, Florida  
Advisor: Dr. Gerhard X. Ritter. Research area: multimedia database systems. Dissertation title: “An image database system based on a linear skeleton representation.”

MS in Computer Science May 1993
University of Iowa, Iowa City, Iowa  
Research areas: programming languages and compiler design.

ME in Information Science and Electronic Engineering June 1986
National Central University, Chungli, Taiwan  
Advisor: Dr. Tuz-I Fan. Research area: AI programming languages. Thesis title: “A LISP/PROLOG mixed language programming environment.”

BE in Computer Science June 1984
Tamkang University, Tamsui, Taiwan  

Chemical Engineering August 1979 – June 1981
Tunghai University, Taichung, Taiwan  


Experience

Associate Professor August 2018 – present
School of Electrical Engineering and Computer Science at the University of North Dakota, Grand Forks, North Dakota
Offering 6 courses: CSCI 260 .NET and World Wide Web Programming, CSCI 280 Object-Oriented Programming, CSCI 370 Computer Architecture, CSCI 457 Electronic Commerce Systems, CSCI 513 Advanced Database Systems, and CSCI 515 Data Engineering and Management.

Associate Professor August 2008 – August 2018
Department of Computer Science at the University of North Dakota, Grand Forks, North Dakota
Offering 7 courses: CSCI 250 Assembly Language Programming, CSCI 260 .NET and World Wide Web Programming, CSCI 370 Computer Architecture, CSCI 457 Electronic Commerce Systems, CSCI 513 Advanced Database Systems, CSCI 515 Data Engineering and Management, and CSCI 532 Programming Languages and Paradigms; having been advising 10+ graduate students; and publishing 20+ articles and books.

Assistant Professor August 2002 – July 2008
Department of Computer Science at the University of North Dakota, Grand Forks, North Dakota
6 courses offered: Assembly Language Programming, Introduction to World Wide Web Programming, Introduction to File Processing, Electronic Commerce Systems, Handheld Computing, and Advanced Database Systems; 9 graduate students advised; and 48 articles and books published.

Assistant Professor September 1998 – May 2002
Department of Computer Science and Software Engineering at the Auburn University, Auburn, Alabama
4 courses offered: Database Systems I, Database Systems II, Advanced Document Analysis and Classification Systems, and Compiler Construction; 35 graduate students advised; and 17 articles published.

Teaching Assistant August 1996 – May 1998
Department of Computer and Information Science and Engineering at the University of Florida, Gainesville, Florida
Duties involve conducting tutorial classes for the students and supervising the lab assignments for the course “Introduction to Computers for Architecture Majors.

Research Assistant January 1994 – August 1998
Department of Computer and Information Science and Engineering at the University of Florida, Gainesville, Florida
Supervisors: Dr. Gerhard X. Ritter and Dr. Mark S. Schmalz. Work includes:
  • designing and implementing a content-based manipulation of an image database on the Web,
  • working in the SMDG project which is a mine detection project for the US Navy, and creating a software package named MATRE (Multispectral Automated Targets Recognition and Enhancement), and
  • designing and implementing image compression algorithms for the US Navy.
Second Lieutenant (Platoon Leader) July 1986 – May 1988
Field artillery (2nd Company, 995th Battalion, Artillery Brigade, 249th Motorized and Armored Division), Taiwan Army
Operations, equipment, supplies, ammunition, and personnel involved in the use of M108 105mm self-propelled Howitzers.
Picture of 1979 at a military training base ⇒


Research Assistant January 1985 – June 1986
Department of Information and Electronic Engineering at the National Central University, Chungli, Taiwan
Supervisor: Dr. Tzu-I Fan. Designed and implemented the following:
  • YACC-like software,
  • UNIX-like editor,
  • LISP compiler,
  • PROLOG compiler,
  • heap storage management system,
  • POPLOG virtual machine which both LISP and PROLOG compilers generate code for, and
  • LISP/PROLOG mixed language system.


Research, Teaching, Advising, and Administration

A Statement of My Current Research, Teaching, Advising, and Administration

Wen-Chen Hu, Department of Computer Science, University of North Dakota

Computer science is an ever-changing discipline and I always try to keep up with it. My research started with programming languages and compilers when I was a graduate student in the 1980s. For my master thesis, I developed a LISP/PROLOG mixed language programming environment for AI (artificial intelligence) developers by writing about 20,000 lines of C code. Image storage and retrieval were the topics of my PhD study as I were supported by the US military research projects. In the mid-1990s, when the Web started blooming, I began working on the web data indexing, searching, and mining. I created an online image database based on a linear skeleton representation for my PhD research. Mobile/handheld computing is the next milestone of computer science because global shipments of smartphones had reached 1 billion in 2014 according to Gartner, a market research company. As the e-commerce gradually moved towards m-commerce in the early 2000s, mobile commerce and computing became my research focal points. My current research interests include handheld/mobile/smartphone/spatial/tablet computing, location-based services, web-enabled information system such as search engines and web mining, electronic and mobile commerce systems, and web technologies. In a nutshell, my current research interests include the following five areas:
  • Spatial computing: It is one of the location-based research and refers to the computing related to space including spatial data structures, spatial databases, spatial data mining, and spatial statistics. One of the spatial computing examples is to predict spatial trajectories.

  • Location-based research: It is research based on the geographical position of a mobile handheld device. A variety of research and applications can be found from this subject. One of the examples is to protect mobile data by using handheld usage pattern matching.

  • Mobile/handheld computing: Handheld computing is the programming for handheld devices such as smartphones, and it can be divided into two kinds of programming: client and server -side mobile/handheld programming, which are the development of software on handheld devices and server, respectively.

  • Web information retrieval: With that size of web data, it is virtually impossible to manage the Web with the traditional computer technologies. Therefore, how to effectively and efficiently retrieve information from the Web becomes a major research topic.

  • Web data mining: Web usage mining is used to discover interesting user navigation patterns, which can be used to improve web sites, e.g., web site (re)organizing, user behavior studies, making additional topic or product recommendations, etc.
In addition, interdisciplinary research is important in these days, and I welcome cooperation with people from all areas. Three of my research areas in which others may be interested:
  • Data processing and databases: They include data preparation, data indexing and storage, and data processing and analysis. In addition, databases are indispensable for most of the functions.

  • Information retrieval and data mining: Once the data is processed, relevant information can be found by using various information retrieval technologies such as relevance feedback, and its hidden knowledge can be discovered by using data mining like artificial neural networks.

  • Web and mobile computing: Many web technologies like ASP.NET and LAMP and web research such as web mining have been applied to my research. Web is essential, but the trend is moving towards mobile computing. Android is the major platform for mobile apps, and various mobile research such as location- based computing and mobile usage pattern mining has been investigated by me.
I am also interested in working on mobile and electronic commerce system construction. This construction involves a wide variety of computer techniques and knowledge which include web interface studies, web-enabled database construction, and various web programming languages and tools, for example, AJAX, ASP.NET, CGI, CSS, HTML, Java, JavaScript, Perl, PHP, etc. These areas are the most up-to-date research topics and I have published several articles for each area. I have published more than 100 refereed research papers, edited more than 10 books and conference proceedings, and solely authored a research book:
Internet-enabled handheld devices, computing, and programming: mobile commerce and personal data applications
After many years’ teaching in the US universities, I realize how much students have learned is more important than how much I teach to them. I strongly believe education is to help and guide students to become better (IT) persons by encouraging them to learn as much as possible, but avoiding punishing/failing students just because they are not able to achieve the educational goals. With or without textbooks, each course offered by me provides award-winning, informative, and interactive lecture notes and detailed and precise class instructions. Collectively, the lecture notes and instructions are more like a small book, which supplies much more information than regular notes do and makes the subject studies much easier. Students highly praised the second-to-none lecture notes as they were of great help to their learning. Some of them even use the notes while they work for the industry after graduation. Most likely, you may not be able to find any references to beat my lecture notes on the subjects. Other than effective learning, I also believe students reach their full potential only if the classes are well organized and managed and instructions are clearly handed out based on my experience of two-year military training as an army officer. In my classes, fairness is the principle utmostly held. Students receive the grades they deserve solely based on how well they accomplish in the classes according to the class instructions provided. In addition, the educational experience of “learn by practicing” is important to me. All my classes and students have to do hands-on lab works and projects as well as subject studies, all of which use up-to-date and state-of-the-art knowledge and technologies and will pave the way for students’ future careers. I have been teaching at the US universities for more than 20 years. The following list shows a range of courses being taught by me:
  1. CSCI 101 Introduction to Computers
  2. CSCI 250 Computer Organization and Programming
  3. CSCI 260 .NET and Web Programming
  4. CSCI 280 Object-Oriented Programming (Java)
  5. CSCI 351 Introduction to File Processing
  6. CSCI 370 Computer Architecture
  7. CSCI 399 Handheld Computing
  8. CSCI 457 Electronic Commerce Systems
  9. CSCI 513 Advanced Database Systems
  10. CSCI 515 Data Engineering and Management
  11. DATA 520 Databases
  12. DATA 525 Data Engineering and Mining
  13. CSCI 532 Programming Languages and Paradigms
  14. COMP 6120 Database Systems I
  15. COMP 6210 Compiler Construction
  16. COMP 7120 Database Systems II
  17. COMP 8140 Advanced Document Analysis and Classification Systems
Most courses are related to databases, web technologies, and mobile computing. For academic advising, I have been advising more than 50 thesis/project graduate students. Most of my publications and students’ theses/projects are in the above five areas. I am the Editor-in-Chief (EIC) of the journal:
    Journal of Information Technology Research (JITR)
was the EIC of the International Journal of Handheld Computing Research (IJHCR), and editors, members, and advisors of various journals, conferences, books, and organizations. Hundreds of IT researchers and industrialists have close connections with me. I also have experience in helping organize many journals, books, and conferences as I am the chairs of the following international conferences:
  1. The 2019 International Conference on Engineering and Natural Science-Bangkok (ICENS 2019), March 15-17, 2019, The Landmark Bangkok, Bangkok, Thailand.
  2. The 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), June 25-27, 2018, The Grand Hotel Taipei, Taipei, Taiwan.
  3. The 2018 International Conference on Engineering and Natural Science (ICENS 2018), January 30 - February 01, 2018, Sapporo, Hokkaido, Japan.
  4. The 2017 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2017), November 7-9, Fukuoka, Japan.
  5. The 2017 International Conference on Engineering and Natural Science – Summer Session (ICENS-Summer 2017), August 23-25, 2017, Sapporo, Japan.
  6. The 2017 International Conference on Engineering and Natural Science (ICENS 2017), January 19-21, 2017, Bali, Indonesia.
  7. The 2016 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2016), Seoul Olympic Parktel, Seoul, Korea, November 7-9, 2016.
  8. The 2016 International Conference on Big Data, IoT, and Cloud Computing (BIC 2016), Chiang Mai, Thailand, August 23-25, 2016.
  9. The 2016 International Conference on Engineering and Natural Science – Summer Session (ICENS Summer), Kyoto, Japan, July 12-14, 2016.
  10. The 2nd International Conference on Business and Internet (ICBI 2016), Taipei, Taiwan, April 22-24, 2016.
  11. The 2nd International Conference on Engineering, Technology, and Applied Science (ICETA 2016), Taipei, Taiwan, April 22-24, 2016.
  12. The 3rd International Conference on Engineering and Natural Science (3rd ICENS), Bangkok, Thailand, January 19-21, 2016.
  13. The 2015 International Conference on Engineering, Technology, and Applied Science—Fall Session (ICETA 2015-Fall), Nagoya Congress Center, Nagoya, Japan, November 10-12, 2015.
  14. The 2015 International Conference on Big Data, IoT, and Cloud Computing (BIC 2015), Osaka, Japan, August 23-25, 2015.
  15. The 2nd International Conference on Engineering and Natural Science (ICENS 2nd), Tokyo, Japan, July 22-24, 2015.
  16. The 2015 Macau Conference on Engineering, Technology, and Applied Science (CETA 2015), Sheraton Macao Hotel, Macau, July 7-9, 2015.
  17. International Conference on Engineering, Technology, and Applied Science (ICETA 2015), Taipei, Taiwan, April 22-24, 2015.
  18. International Conference on Business and Internet (ICBI 2015), Taipei, Taiwan, April 22-24, 2015.
  19. The 2015 International Conference on Engineering and Natural Science (ICENS 2015), Bangkok, Thailand, January 21-23, 2015.
The conferences provide valuable platforms for STEM educators, researchers, developers, industrialists, and students from around the world to share their ideas and creations and promote their STEM knowledge at the same time.

Research Interests

My current research interests include handheld/mobile/smartphone/spatial computing, location-based services, web-enabled information system such as search engines and web mining, electronic and mobile commerce systems, and web technologies. (Smartphone Research)

Computer science is different from many other disciplines (like electrical engineering). It is more like a professional school (such as culinary schools), which emphasizes practical works instead of subject studies because many IT companies want the new recruitees to start contributing immediately. There are three kinds of computing personnel:

  • Developers:

    • Positions (plenty): Developers of front-end and back-end web pages, mobile apps, and all kinds of software
    • Skills (more stable): Programming languages (such as C++ and Java), web programming, mobile app development, data processing and management including databases, and data structures & algorithms

  • Practitioners:

    • Positions (not many): Experienced personnel like data scientists, database or system administrators, security analysts, and network architects (more applications & configuration and less development)
    • Skills (based on the needs of companies): Databases, data warehousing, data lake, Hadoop, MapReduce, Linux, SPSS, SAS, Cogno, Matlab, Tableau, etc.

  • Researchers:

    • Industrial positions (few and based on the needs of corporations): High quality personnel required for the advanced areas like artificial intelligence, security, computer vision, autonomous driving, and speech recognition
    • Academic positions/trends (few and changed according to the government policies): ❓ ⇐ artificial intelligence ⇐ big data ⇐ high-performance computing ⇐ security ⇐ (mobile) networks
Unless you have an impressive resume or a strong connection, practicing tens or hundreds of questions posted at the LeetCode is a must in order to secure a job at corporations (like Google and Facebook). Otherwise, your chance of answering the questions correctly is low because of their high difficulty and time constraint. In addition, you need to create LinkedIn pages to show your achievements, and may consider uploading your projects to the GitHub to showcase them.

Before starting your graduate study, read the following pages very carefully
Instead of asking your advisor what to do, tell her/him what you plan to do. By doing this way, it could save your time and effort tremendously. For graduate research assistantships, contact each professor individually according to and for graduate teaching assistantships, contact the Graduate Director. Before enrolling in courses or doing your research, pick your advisor based on the following methods:
  • Popularity: Students are smart and they tend to follow everyone’s approach. This way guarantees the safest way because everyone’s choice is usually the best choice. Ask your fellow students who the popular professors are.

  • Taking classes: You will know the professors’ research, standards, and styles after taking their classes. If you like them, you may pick her/him as your advisor.

  • Trendy research: For example, the current trendy research is AI, and the research trend is ❓ ⇐ artificial intelligence ⇐ big data ⇐ high-performance computing ⇐ security ⇐ (mobile) networks.

  • Research interests: Pick an advisor based on their research interests.
After picking the popular research you want to pursue, take the following steps to conduct research:
  1. Find a problem.
  2. Study related literature and methods.
  3. Design a new method or adapt an existing method to suit the problem.
  4. Figure out how to improve the accuracy, effectiveness, or performance of the method.
  5. Complete the implementation, testing, and comparisons.
  6. Publish the results and apply the method to the problem.
Below is a list of topics that I plan to do or have been accomplished by me before:

Mobile Text Message Management
“Mobile Text Information Preprocessing”
Before processing the mobile text messages, the following steps of preprocessing could be applied to the messages:
  1. Lexical analysis, which is the process of converting the input stream of characters of a message into a stream of words. For example, it breaks the string “The COVID-19 vaccines were not properly tested.” into nine words “The,” “COVID-19,” “vaccines,” “were,” “not,” “properly,” and “tested.”
  2. Stopword removal, which is to remove the trivial words, like a, the, and on, from the messages. For example, this step drops the stopwords “The,” “were,” and “not” from the above sentence.
  3. Stemming, which is the process for reducing inflected words to their stem. For example, “vaccines” becomes “vaccine,” and “tested” becomes “test.”
  4. Thesaurus construction, which is to find synonyms for keyword matching. For example, the terms “COVID-19,” “Omicron,” “Delta virus,” “Coronavirus,” and “BA.4” could be treated the same.
  5. Database, which saves related information about text messages such as the skeleton messages and their corresponding classes used by the next step.
After the Step 4, the messages are called skeleton messages.

Misinformation Detection
“Five Classes of Short Text Messages”
It is too simple to classify a mobile text message as either true or fake because some other classes exist. A message could be categorized into one of the following five classes:
  1. True, which is true information and is without a doubt. For example, it is true that the COVID-19 vaccine is effective because it has been authorized by the U.S. Food and Drug Administration (FDA) and vaccine programs have begun across the country.
  2. Fake, which is incorrect indisputably. For example, it is an obviously fake news that the COVID-19 vaccine contains microchips for government tracking because the current technology has not been this advanced yet.
  3. Misinformative, which is false or out-of-context information that is intentionally or unintentionally presented as fact to deceive.
  4. Disinformative, which is a type of misinformation that is intentionally delivered the false or misleading information to deceive or mislead readers.
  5. Neutral, which cannot be decided by the proposed method.
The differences between misinformation and disinformation are not distinct. This research treats the former as a mistake. If the information is intentionally to deceive, it is classified as disinformation. Otherwise, it is misinformation. That is misinformation actively demonstrates the information that is communicated to mislead, whereas disinformation can be recognized as malicious tricks and computational publicity.

Misinformation Detection Using SLMs (Small Language Models)
“LLMs (Large Language Models) for Misinformation Detection”
Many times, they may relay the news to their family members or friends if they deem the news is relevant to the family members or friends, but not all the news they receive is true. According to a study, 38% of Americans have the experience of sharing fake news with others, and people usually trust the news more if it is from the persons they know. Various machine learning methods have been used to identify fake news, and each has its pros and cons. Currently, LLMs (large language models) are trendy and very popular. They analyze huge data sets of languages and can comprehend and generate human language text. Two applications of LLMs related to misinformation management will be considered are
  • Using LLMs to identify misinformation and
  • Identifying the misinformation generated by LLMs.
more ...

Misinformation Detection Using kNN
“A Modern k-Nearest Neighbors (kNN) Algorithm for Effective Text Misinformation Detection”
Messaging apps like WhatsApp, LINE, and WeChat, are very popular in these days. People use the apps to receive, send, or relay messages such as news, video clips, and comments. They become an indispensable tool in our daily lives and much of the information we receive is from them. However, not all messages we receive are true and the worst is we may relay the false messages to our friends, who may lose faith on us after finding the messages are not correct. This research uses a modern k-Nearest Neighbors (kNN) algorithm to identify fake text messages. The kNN algorithm, a supervised learning algorithm, classifies the query instance by taking simple majority of the k nearest neighbors, which are determined based on the distances from the query instance to the training samples. Therefore, the accuracy of the kNN algorithms are highly dependent on the distances applied.

more ...

Privacy Preservation for Misinformation Management
“Privacy Preservation for Continuous Location-Based Misinformation Services”
Several terms are given first before the research methods are explained:
  • Location-based information (LBI), which is the information related to locations like a post of concerts,
  • Continuous location-based information (CLBI), which is a kind of LBI and the information is continuously received according to the user’s current locations such as the ads of gas stations in a trip,
  • Location-based misinformation (LBMI), which is a kind of LBI but is with incorrect or misleading information like a post of out-of-date concerts, and
  • Continuous location-based misinformation (CLBMI), which is a kind of LBMI and the misinformation is continuously received according to the user’s current locations such as the ads of closed gas stations in a trip.
The LBMI is received based on the user’s current location; e.g., a movie theater is suggested but showing a different movie from the one sent. Whereas, the CLBMI is received according to the user’s continuous locations during a trip. For example, a user plans a flexible trip starting from source, restaurant, rest stops, beach, gas station, and destination. During the trip, the user may need to handle misinformation like out-of-date concerts or out-of-reach gas stations. Both LBMI and CLBMI are from location-based services (LBS), of which privacy is one of the critical issues. Without proper privacy preservation, users would be reluctant to use the services. The most common way to preserve privacy for the location-based information (LBI) is using dummy locations to conceal the true location. However, preserving privacy for CLBI is more difficult.

more ...

In the Aftermath of Misinformation Identification
“Text Data Negation and Similarity Measurement for Misinformation Management”
Various methods are used to identify misinformation, and significant progress has been made. The methods usually notify users whether the information is true or fake, and not much else is provided. Other than the true or false answer, users may want more functions to be given. Some of the functions could be as follows. If the information is found to be fake, then what is the true information? How could the true information override the misinformation, so the mistake would not be made next time? In addition, is there a way to find out that the result is a false alarm? Simply providing the true or false answer for misinformation identification does not close the loop. This research discusses how to find the true information in the aftermath of misinformation detection by using several methods of text data processing.

more ...

Misinformation Detection Using ChatGPT
“Combining ChatGPT and Recurrent Neural Network to Identify Mobile Misinformation”
The misinformation problem has plagued people for a long time and causes serious trouble. Though there is no method that can solve the problem satisfactorily so far, each method has its own advantages. At the same time, the popular ChatGPT (Chat Generative Pre-trained Transformer) is used extensively and intensively in these days. Misinformation detection could be one of the functions provided by ChatGPT. However, like other methods, ChatGPT has its own advantages and disadvantages. This research first investigates the effectiveness of the application of mobile misinformation detection using ChatGPT.

more ...

Web Location Privacy Preservation
“Vigorous Location Privacy Protection Using Dummy Locations for Location-Based Services”
Instead of generating discrete dummy locations whenever a service is requested, this research creates the dummy locations from the endpoints of the dummy routes, which are generated incrementally. The method is explained as follows:
  1. Dummy locations are generated based on the true location when the first service is requested.
  2. Whenever a service is requested subsequently, it incrementally creates a true route where the start location is the first true location and the end location is the current true position.
  3. Similarly, it extends the dummy routes where the start locations are the first dummy locations and the end locations are randomly generated by following the features described below.
This method is more secure since the dummy locations are based on dummy routes instead of the true locations.

more ...

Mobile Misinformation Classification and Management
“Effective Misinformation Organization and Management Using Data Classification”
With the ubiquitous social media and networking services, everyone could be a commentator or reporter nowadays. This information explosion benefits most people, but it may also cause a great negative impact like making people refuse to take COVID-19 vaccine because of fake information sent intentionally or unintentionally. Hence, misinformation identification and management is critical before people can actually benefit from the information they receive. Misinformation usually needs to be organized and saved in databases before identification and management can be applied. This research is to organize misinformation according to its types such as health, politics, and businesses, so the detection can use the results to identify misinformation better.

more ...

Mobile Misinformation Identification and Management
“A 3D Similarity Matrix for Mobile Health Text Misinformation Identification”
Mobile health text messages could be true, fake, or controversial. This research does not judge their correctness by its own standards. Instead, it tries to classify the messages as one of the five categories (true, fake, misinformative, disinformative, and neutral) based on previous known messages, and lets users to judge the correctness of the messages by themselves according to our recommendations. The 3D similarity matrix, which is used to classify the incoming mobile messages into the five classes by comparing the incoming message to the known messages saved in the database.

more ...

Privacy-Preserving Continuous LBS
“A Robust Privacy-Preserving Method for Continuous Location-Based Services”
A critical issue for LBS (location-based service) adaptation is user privacy preservation. If the LBS does not well protect its users’ privacy, they will hesitate to use the service. A common method used by location-based services to preserve user privacy is to send a couple of dummy locations along with the true location to the service provider, so the provider would not know which is the true location. This method is simple and effective. However, most LBS users will keep using the LBS continuously, instead of one time only. If it is not carefully planned, using the dummy locations for continuous LBS may reveal users’ true locations. Therefore, this research is to present a robust method to preserve users’ privacy for continuous location-based services by using the following steps:

more ...

Dummy Locations
“Mobile Users Versus Service Providers in Privacy Preservation Using Dummy Locations”
Location-based services (LBS) are extremely popular in these days. Mobile users use the services such as GPS and Google Maps almost every day to assist their daily activities like finding a restaurant or looking for an apartment. However, in order to use the services, users have to share their location information with the service providers. This requirement may hold back the service adaptation since users may not like to share their locations with others. One common method to preserve user privacy is to send a couple of dummy locations along with the true location to the service providers, so the provider would not be able to tell which location is true. This method is simple and effective, but it also has some drawbacks that make the privacy safeguarding fragile. For example, the 4 million miles of roads covered in the US is only a fraction of a percent of the total land area in the lower 48 states. If the dummy locations are not carefully planned, they may land on fields or water and could be easily perceived as fake.

more ...

Location-Based Services
“Finding a Shortest Safe Path by Avoiding the Hazardous Hotspots”
The COVID-19 would not be the last deadly virus, and it would likely become a norm later because various kinds of virus may emerge to harm human beings from time to time. People have to start taking the danger into consideration in their daily lives. One of the daily activities that people commonly take is traveling from one place to another place. During the trip, people may pass through or by some hazardous hotspots like places plagued by virus, and it should be avoided if possible. This research tries to mitigate the problem by proposing a method that finds a shortest path between two locations and the path will avoid unsafe spots as it possibly could. The hazardous hotspots and their related data can be found from various sources like CDC (Centers for Disease Control and Prevention) and Google Maps, and they are constantly saved and updated in a database. There may have numerous paths and spots/cities between the source and destination. The proposed method removes the hotspots from our consideration based on our needs and comes up with a new graph/map. An algorithm of finding the shortest path is then applied to this new graph. Because the unsafe spots have been removed from the path, the path would be a shortest safe path. In addition, Android Google Maps API is used to facilitate the implementation as map applications could be very complicated. The COVID-19 has led the world to catastrophe, and it is expected more pandemics will follow. This research tries to help relieve a pandemic by proposing a method of finding a shortest safe path by avoiding the hazardous hotspots.

Mobile Misinformation Detection I
“Detecting Mobile Misinformation by Using Mobile Text Mining”
Smartphones are indispensable devices for people in these days, and tens or even hundreds of messages are sent to each device every day. All kinds of information can be found from the messages such as news, greetings from family members or friends, advertisements, promotions, weather reports, etc. People are overwhelmed by the sheer amount of information and they spend much time to sort out a way to find relevant information from the messages. Even worse is some messages give false or fake information, and mislead the viewers consequently. This research tries to automatically classify the messages received by a device into several categories such as advertisements, news, messages from family or friends, announcements, etc. even misinformation by using various mobile text/data mining technologies. The proposed method takes the following steps:
more ...

Keeping Track of Social Distance
“Enforcing the Social Distance by Using a Location-Based Service”
The COVID-19 has brought a catastrophe to the world. Two effective ways to stop the spreading of virus are to wear masks and keep social distance in public places. Many times, people just forget keeping the distance from others because it requires constant vigilance. In addition, once a person is tested positive coronavirus, she/he either forgets who having a close contact with her/him before or is too sick to recall it. This research is to help combatting the COVID-19 by using a location-based service (LBS) to keep tracking of social distance. The LBS app will alert people when they are too close to others based on the locations it receives. In addition, it will record whoever has been in a close contact with them, so when the worst (tested positive) happens, related people will be warned or may be quarantined or tested if needed.

Mobile Misinformation Detection II
“Detecting Mobile Misinformation Based on the Sender Credibility”
People are aware that misinformation is everywhere on the Internet, so they are cautious about the contents they actively find on the Internet like health advices or celebrity news. Nowadays, with the mobile information sent to people's devices constantly, the mobile misinformation causes more harm than ever such as false financial news or fake information trying to sabotage political foes. This research tries to mitigate the problem by warning people the mobile data they receive may not be accurate or may even cause harm. The detection rates the mobile information according to the credibility of the senders (including organizations, groups, and individuals), which is calculated based on their previous records and the number and quality of their followers. For example, if the information is sent by a tabloid, which has a subpar reputation, it may rate the information low. On the other hand, the information is rated highly if it is sent by a news agency, which has a good record and many quality followers. Mobile users receive a significant amount of information every day. They may be misled or even harmed by the misinformation they receive if they do not examine the information carefully before taking any actions. This research will help mobile users filter out the misinformation, so they will be able to make better judgements based on the valid information.

COVID-19 Impacts
“A Prediction Model for Economic Impacts from a Pandemic”
Many people get sick and even dying because of the COVID-19 pandemic. Not only does the COVID-19 cause the serious health problems, but it also has brought significant economic impacts. For example, the unemployment rates of North Dakota are 2.4%, 9.1%, 9.1%, and 6.1% in June 2019, April 2020, May 2020, and June 2020, respectively. It is obvious that the pandemic increases the unemployment rate, but it also shows some anomalies like the rate dropped from 9.1% to 6.1% from May to June though the number of COVID cases increased. This research tries to propose a prediction model for economic impacts from a pandemic, so when the next pandemic hits again, we will be well prepared for the worst.
more ...

COVID-19 Prevention
“Using Direction Searches to Stay Away from COVID-19”
This research is related to the author’s actual experience about the COVID-19 pandemic. The author had to drive from Grand Forks, North Dakota to Columbus, Ohio to visit his family. Traveling via airplanes or buses was not considered because the coronavirus may prevail in small, crowded space. However, driving is not without risk since they had to stop from time to time to do the tasks like filling up the gas tank, using restrooms, or buying food. There are numerous routes from Grand Forks to Washington D.C. To reduce the risk, they tried to take a “safe” route and avoid the “hotspots” like Chicago or Minneapolis as much as possible. This research uses the technique of incremental direction searches to find the “best” routes between two locations.
more ...

LBS Privacy Preservation
“Privacy-preserving spatial trajectory prediction based on a matrix representation”
Spatial trajectory prediction requires a complicated processing of routes (lists of locations) such as travel route collection, storage, indexing, transmission, and matching. This research makes spatial trajectory prediction simple and effective by using an innovative matrix representation for routes. At the same time, user privacy is fully protected because the matrix representation allows the trajectories to be predicted at the mobile clients instead of the server. By using our method, travel route processing becomes matrix processing, which is well documented and includes a variety of tools and methods. This research is useful and popular and is related to a couple of subjects such as mobile computing and security, location-based services, and human behavior recognition.

Spatial Trajectory Prediction
“Spatial trajectory prediction based on traffic flows”
Inertia has a moving object follow a path or trajectory that resists any change in its motion. Human travel patterns normally have the similar inertia feature. For example, the vehicles on a highway usually stay on the highway or people tend to walk towards a popular destination such as a mall or park. This research proposes a location-based service, spatial trajectory prediction, which is to predict the forthcoming locations of the human travel routes. It could be used in a variety of purposes such as travel recommendations and traffic control and planning. The proposed method is based on the previous traffic flows, a weighted graph. It predicts the spatial trajectory by finding a path with a maximal weight and within a length. A modified algorithm of the longest path is used to find the maximum-weight path. If the length of the path is over the limit specified by the user, the next maximum-weight path is used and the length is checked again. The process is repeated if necessary. Experimental results show the proposed method works, but further tests are needed to validate its effectiveness.

Green Computing
“Location-aware online map caching and prefetching for mobile handheld devices”
Map navigation is one of the most popular applications used by mobile users. To save the transmission time and reduce the delay, online mobile map navigation caches or prefetches maps by using various methods such as most-recently used and first-in, first-out algorithms. However, the mobility and location features of mobile users are usually left out by these methods. Caching and pre-fetching maps based on a mobile user’s locations would greatly reduce the transmission time and hence the battery power consumption. For example, if a user is visiting a town, prefetching the maps of nearby interesting stores and caching the maps of the visited, neighboring landmarks would help the user’s visitation and save the transmission time. The number of smartphone sales is expected to surpass the one of PCs and servers in the near future and it is predicted that more people will use smartphones than PCs or notebooks to browse the Internet in 2013. Despite the bright future of smartphones, they are not without problems, especially the short battery life. This research tries to relieve the problem by using location-aware online map caching and prefetching for saving battery power.

Location-Based Services
“Route anomaly detection using incremental location searching”
Since the introduction of iPhone in 2007, smartphones have become very popular. The high mobility of smartphones has created many applications that are not possible or inconvenient for PCs and servers, even notebooks. One of the mobile applications, location-based services (LBS), has attracted great attention recently. This research proposes location-based research, which uses location information to find route anomalies, a common problem of daily life. For example, an alert should be generated when a school bus misses part of a route. Different kinds of route anomalies are discussed and various methods for detecting the anomalies are proposed in this research. The major methods use a technique of incremental location search, which finds matched routes as the search route is entered location by location. An alert is generated when no matched routes exist. Preliminary experiment results show the proposed methods are effective and easy-to-use.

Handheld/Mobile Security
“Smartphone data protection using handheld usage pattern matching”
Handheld devices like smartphones must include rigorous and convenient handheld data protection in case the devices are lost or stolen. This research proposes a set of novel approaches to protecting handheld data by using usage pattern matching, which compares the current handheld usage pattern to the stored usage patterns. If they are drastic different, a security action such as requiring a password entry is activated. Various algorithms of pattern matching can be used in this research. Two of them are discussed in this research: (i) approximate usage string matching and (ii) usage finite automata. The first method uses approximate string matching to check device usage and the second method converts the usage tree into a deterministic finite automaton (DFA). Experimental results show this method is effective and convenient for handheld data protection, but the accuracy may need to be improved.

Handheld Computing
“Internet-enabled mobile handheld devices for mobile commerce”
The emergence of wireless and mobile networks has made possible the introduction of electronic commerce to a new application and research area: mobile commerce. Internet-enabled mobile handheld devices are one of the core components of a mobile commerce system, making it possible for mobile users to directly interact with mobile commerce applications. Much of a mobile user’s first impression of the application will be formed by his or her interaction with the device, therefore the success of mobile commerce applications is greatly dependent on how easy they are to use. This research first explains the role of handheld devices in mobile commerce systems and then discusses the devices in detail. A mobile handheld device includes six major components: (i) a mobile operating system, (ii) a mobile central processor unit, (iii) a microbrowser, (iv) input/output devices, (v) a memory, and (vi) batteries.

World Wide Web Usage Mining
“World Wide Web usage mining systems and technologies”
Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. This research studies and analyzes current web usage mining systems and technologies. A web usage mining system performs five major tasks: (i) data gathering, (ii) data preparation, (iii) navigation pattern discovery, (iv) pattern analysis and visualization, and (v) pattern applications. Each task is explained in detail and its related technologies are introduced and a list of major research systems and projects concerning web usage mining is also presented.

World Wide Web Search Engines
“World Wide Web search engines”
The World Wide Web now holds more than 25 billion pages covering almost all daily issues. The Web’s fast growing size and lack of structural style present a new challenge for information retrieval. Traditional search techniques are based on users typing in search keywords which the search services can then use to locate the desired web pages. However, this approach normally retrieves too many documents, of which only a small fraction are relevant to the users’ needs. Furthermore, the most relevant documents do not necessarily appear at the top of the query output list. Numerous search technologies have been applied to web search engines; however, the dominant search methods have yet to be identified. This research studies the existing technologies for web search engines and classifies them into six categories: (i) hyperlink exploration, (ii) information retrieval, (iii) metasearches, (iv) SQL approaches, (v) content-based multimedia searches, and (vi) others.

Image Databases
“An image retrieval system based on a linear skeleton representation”
Efficient storage and flexible retrieval are two principal needs in an image database. Image representation is the crucial factor in fulfilling these representations. This research proposes an image representation, including an image data structure and a spatial knowledge representation, that will facilitate the above two demands. The proposed data structure, called a line string, encodes an image via a string of linear skeleton and retrieves an image through string matching. The proposed spatial representation, called an OOLS, provides a structural and easy way to specify the line string in a database query. The research calculates the number of spatial relations held by a line string through a theorem. It also compares space needs and matching speed of line strings to other string data structures. It shows that a line string exhibits advantages over other structures but may require more storage and retrieval time.

Compiler Construction
“A Lisp/Prolog mixed language programming environment”
The Lisp and Prolog are two languages that are widely used for AI (artificial intelligence) development. However, both languages are not adequate for the AI researchers’ demands. As a result, an implementation which combines Lisp with Prolog would be extremely useful to AI researchers. This research presents a basis for constructing multi-language programming environments which integrate the logic language of Prolog into the procedural language Lisp. First of all, we set up the software facilities of the system; they include a Unix-like editor, a Lisp compiler, a Prolog compiler, a heap storage management system, and a POPLOG virtual machine for which both compilers generate code. Then we combine the Lisp machine with the Prolog machine by transferring the data structure and the sequence control of a compiled mixed language program from one machine to the other. With this mulit-language system, a programmer can then freely use the Lisp or Prolog language to develop any software desired.


Courses Offered

I have been teaching at the US universities for more than 20 years and offered more than 15 CS/DS/IT courses as follows:
  1. CSCI 101Introduction to Computers
    An overview of the fundamental concepts and applications of computer science. Topics include data storage, hardware, operating systems, and programming principles. 3 credits. Offered in 23f, 24s, and 24f.


  2. CSCI 250 Assembly Language Programming
    Computer structure, machine representation of numbers and characters, instruction codes and assembly systems. Includes laboratory. 4 credits. Offered in 02f, 03f, 04f, 05f, 06f, 07f, and 08f.


  3. CSCI 260 .NET and Web Programming
    An introduction to Microsoft .NET and World Wide Web programming for fundamental web content development. Topics including World Wide Web basics, web system structures, technology survey, client-side languages such as (X)HTML and VBScript, server-side languages such as ASP.NET but no database processing, web-host connection, and web content design and development. 3 credits. Offered in 07f, 10s, 11s, 12s, 13f, 14f, 15f, 16f, 17f, 18f, and 19f.


  4. CSCI 280 Object-Oriented Programming (Java)
    An introduction to the concept and execution of object-oriented programming, using the Java language. Includes an introduction to object creations, classes, inheritance, interfaces, exceptions, overloading, and more. 3 credits. Offered in 19f, 20f, and 21f.


  5. CSCI 351 Introduction to File Processing
    Techniques of using mass storage devices. Sequential, random and key-accessed files. B-trees and inverted file structures. 3 credits. Offered in 03s, 04s, 05s, 06s, 07s, and 08s.


  6. CSCI 370 Computer Architecture
    Computer structure, machine presentation of numbers and characters, instruction codes and assembly systems. Introduction to hardware methodologies and software extensions to hardware in computers. Some topics on hardware and software selection will be discussed. 4 credits. Offered in 09f, 10f, 11f, 12f, 13s, 14s, 15s, 16s, 16su, 17s, 17su, 18s, 19s, 20s, 21s, 23s, and 24s.


  7. CSCI 399/501 Handheld Computing
    This course gives a study of handheld computing which is the programming for handheld devices such as smart cellular phones and PDAs (Personal Digital Assistants). It consists of two kinds of programming:
    • client-side handheld programming such as address-book development for handheld devices, and
    • server-side handheld programming such as mobile web contents development.
    3 credits. Offered in 05f.


  8. CSCI 457 Electronic Commerce Systems
    Applied and theoretical topics related to the web programming, Web-DB connectivity, database design and programming, business issues, and comprehensive e-commerce system design and construction. 3 credits. Offered in 02f, 03f, 04f, 07s, 09s, 11s, 13s, 15s, 17s, 19s, 21s, 23s, and 24s.


  9. CSCI 513 Advanced Database Systems
    A study of concurrency control, recovery, query processing and optimization, security, and new advancements including research issues in database systems. 3 credits. Offered in 04s, 06s, 08s, 10s, 12s, 14s, 15f, 17f, 18f, 19f, 20f, 21f, 22s, 23f, and 24f.


  10. CSCI 515 Data Engineering and Management
    This course studies theoretical and applied research issues related to data engineering and management. Topics will reflect state-of-the-art and state-of-the-practice activities in the field. The course focuses on well-defined theoretical results and empirical studies that have potential impact on the acquisition, management, storage, and graceful degeneration of data, as well as in provision of data services. 3 credits. Offered in 09f, 11f, 13f, 16s, 18s, 19s, 20s, 21s, 22s, 22f, and 24s.


  11. CSCI 532 Programming Languages and Paradigms
    A study of current topics in programming languages and paradigms. Course content may vary with current issues and student interests. 3 credits. Offered in 08f.


  12. COMP 6120 Database Systems I
    Theoretical and applied issues related to the analysis, design, and implementation of relational database systems. 3 credits. Offered in 98w (quarter), 99f, 00s, 00f, 01s, 01f, and 02s.


  13. COMP 6210 Compiler Construction
    Compiler organization; lexical analysis; parsing; syntax-directed translation; symbol tables; basic dependence analysis; intermediate forms; interpreter vs. compilers; run-time storage management; code generation; error detection and recovery. 3 credits. Offered in 99s (quarter), 00f, and 01f.


  14. COMP 7120 Database Systems II
    Theoretical and applied issues related to the analysis, design, and implementation of object-oriented database systems. 3 credits. Offered in 98f (quarter), 00s, 01s, and 02s.


  15. COMP 8140 Advanced Document Analysis and Classification Systems
    Statistical and semantic methods of content analysis and classification; applications of neural networks for content analysis of documents; combination (statistical, semantic and neural networks) methods; the HEARSAY system. 3 credits. Offered in 99f.


  16. DATA 520 Databases
    An introduction to the principles of database design and management. Topics include query optimization, procedural extension of query languages, runtime error handling, normalization techniques, data warehousing, and NoSQL. 3 credits. Offered in 22f, 23f, and 24f.


  17. DATA 525 Data Engineering and Mining
    This course studies theoretical and applied issues related to data engineering and mining. Data engineering is to identify, investigate, and analyze the underlying principles in the design and effective use of information systems; and data mining is to discover patterns in large data sets and transform the patterns into a comprehensible structure for further applications. The following topics are covered: data collection, data preparation, data indexing and storage, data processing and analysis, data classification and clustering, knowledge discovery, information retrieval, data visualization, data sharing, data applications, and some other special topics. 3 credits. Offered in 22f, 23f, and 24f.

Research Courses

  1. CSCI 492 Senior Project I
    2 Credits.
    The first course in a two-semester sequence in which computer science majors undertake a culminating research or software development project. The course requires written documents, oral presentations, and peer review for the initial phases of the project, including a project proposal, a review of previous work, and a complete software design or research plan. Prerequisites: CSCI 242 and at least second-semester junior standing. Corequisites: Concurrent enrollment in CSCI 494 with student’s CSCI capstone project adviser is recommended. F.

  2. CSCI 493 Senior Project II
    2 Credits. The second course in a two-semester sequence in which computer science majors undertake a culminating research or software development project. The course requires written documents and oral presentations/demonstrations for both a preliminary and a final review of the completed project. Student must be concurrently enrolled in at least 1 credit of CSCI 494 with their CSCI capstone project advisor. Prerequisite: CSCI 492. Corequisite: CSCI 494. S.

  3. CSCI 494 Special Projects in Computer Science
    1 Credit (Co-Req CSCI 493).

    A course for advanced students. 1-3 credits varying with the choice of project. May be repeated (6 credits maximum). Prerequisite: Consent of instructor. Repeatable to 6 credits. F,S.

  4. CSCI 500 Graduate Orientation
    1 credit. A discussion of various research and applied computing projects. Continued enrollment required of all graduate students until a research/project topic and an advisor are selected. S/U grading.

  5. CSCI 537 Graduate Cooperative Education.
    1 to 3 credits. Prerequisite: A minimum of 9 graduate credits in Computer Science, and consent of the Department. A practical work experience in advanced computing, approved by the student’s advisor. Requirements include a written report and an oral presentation upon completion of the work experience. S/U grading only.

  6. CSCI 566 Software Engineering Project
    3 to 6 credits. Prerequisite: CSCI 463. The complete development of a useful software product, including specifications, design, documentation, coding, testing and verification. Students may work in teams. The project is supervised by the students’ Independent Study Advisor. This course may NOT be used as an elective for the non-thesis(?) or thesis option in computer science. S/U grading.

  7. CSCI 591 Directed Studies
    1 to 3 credits in each graduate degree program. Prerequisites: Graduate standing, consent of instructor. An investigation of some specific area by an individual or small group of students working closely with a member of the graduate faculty. Only three credits of CSCI 591 may be used as an elective.
    Must be approved by the Department’s Graduate Committee prior to registration.

  8. CSCI 599 Research
    Credits arranged. This course is intended for Ph.D. students to obtain credit for their research efforts.

  9. CSCI 996 Continuing Enrollment
    $100 per credit.

  10. CSCI 997 Independent Study
    2 credits. S/U only. For non-thesis students, present CSCI 997 in a format suitable for publication (2 credits). Preparation of an oral presentation of the study (CSCI 997) to the advisor, Graduate Program Committee, and interested faculty and students.
    The student’s advisor must approve the Topic Proposal and sign it.

  11. CSCI 998 Thesis
    S/U only

  12. CSCI 999 Dissertation

Undergraduate Requirements

  Undergraduate degrees

  List of approved science electives

  List of approved essential studies courses

  Complete CS course information

  For course registration questions:
    Undergraduate students:
    UND CEM Advising team at und.cem.advising@und.edu

    Graduate students:
    Angela Lockwood at angela.lockwood@und.edu

      Academic Advisors

      Solberg Student Success Center
      Collaborative Energy Complex 103
      243 Centennial Drive Stop 8155
      Grand Forks, ND 58202-8155

      College of Engineering & Mines
      University of North Dakota

      Email: UND.CEM.advising@UND.edu
      Phone: 701-777-2180

      Use Starfish to schedule an appointment.
  Support directory for faculty and staff

  Phone directory

Generic Information

  Academic catalog

  Academic catalog—Undergraduate

  Academic catalog—Graduate

  Forms for graduate students

  School of EECS

        GRE percentile     TOEFL percentile     IELTS percentile     IELTS 2     IELTS 3


Publications

Books and Proceedings

  1. Mark Fienup, Tom O’Neil, and Wen-Chen Hu, editors. Proceedings of the 48th Annual Midwest Instruction and Computing Symposium (MICS 2015), Grand Forks, North Dakota, April 10-11, 2015. It includes 39 articles and topics of undergraduate research, cloud/big data, mobile/web/database/scientific applications, distributed computing, computer science education, software testing, security, academic network administration, tools for teaching, algorithms, artificial intelligence, systems and control, etc.

  2. Naima Kaabouch and Wen-Chen Hu, editors. Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, ISBN: 1-466-66571-8, IGI Global, 2014. It includes 36 chapters, more than 100 authors, and 4 sections:
    1. Radio spectrum sensing,
    2. Radio spectrum access and management,
    3. Software defined radio and antennas for cognitive radio networks, and
    4. Models, security, and other related topics.

  3. Wen-Chen Hu, editor. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN: 1-466-64715-9, IGI Global, 2014. This book explores some of the latest advances in wireless communication technologies, making use of empirical research and analytical case studies to evaluate best practices in the discipline. It provides insight into the next generation of information and communication technologies for developers, engineers, students, researchers, and managers in the telecommunications field.

  4. Wen-Chen Hu and Naima Kaabouch, editors. Big Data Management, Technologies, and Applications, ISBN: 1-466-64699-3, IGI Global, 2013. This book collects high-quality research papers and industrial and practice articles in the areas of big data management, technologies, and applications from academics and industries. It includes research and development results of lasting significance in the theory, design, implementation, analysis, and application of big data, and other critical issues. It includes 17 chapters, 60 authors, and 4 sections:
    1. Big data technologies, methods, and algorithms,
    2. Big data storage, management, and sharing,
    3. Specific big data, and
    4. Big data and computer systems and other topics.

  5. Wen-Chen Hu and S. Hossein Mousavinezhad, editors. Mobile and Handheld Computing Solutions for Organizations and End-Users, ISBN: 1-466-62785-9, IGI Global, 2012. Computer technologies evolve fast and constantly. Organizations and end-users have to study the computer trend carefully before they adapt any computer products or technologies. On the other hand, developers have to use the trendy technologies and components to build their products. It includes 20 chapters, 53 authors, and 7 sections:
    1. Location-based services (LBS),
    2. Mobile security,
    3. Mobile evaluations and analyses,
    4. Mobile human computer interaction (HCI),
    5. Mobile health,
    6. Mobile green computing, and
    7. Mobile applications and networks.

  6. Wen-Chen Hu and Naima Kaabouch, editors. Sustainable ICTs and Management Systems for Green Computing, ISBN: 1-466-61839-6, IGI Global, 2012. This book focuses on information technology using sustainable green computing to reduce energy and resources used. It includes 18 chapters, 48 authors, and 5 sections:
    1. Information and communication technologies and systems,
    2. Management and manufacturing,
    3. Mobile handheld devices,
    4. Computer vision and image processing, and
    5. Education and power generators.

  7. Naima Kaabouch and Wen-Chen Hu, editors. Energy-Aware Systems and Networking for Sustainable Initiatives, ISBN: 1-466-61842-6, IGI Global, 2012. This book covers a great variety of topics such as materials, environment, electronics, and computing. It includes 17 chapters, 64 authors, and 4 sections:
    1. Computing systems and clusters,
    2. Wireless networking,
    3. Routing and networking, and
    4. Computer and processor design and implementation.

  8. Wen-Chen Hu, editor. Emergent Trends in Personal, Mobile, and Handheld Computing Technologies, ISBN: 1-466-60921-4, 20 chapters, IGI Global, 2012.
      This book offers a vital compendium of the latest research within the field of personal computing, highlighting the latest trends in research and development of personal technology. As tablets and mobile phones begin to replace traditional hardware, it is important to stay abreast of the latest market research to keep your institution on the technological cutting-edge. This collection of case studies, best practices, and research offers chapters from experts from around the world, offering a critical resource for practitioners and academics alike.

  9. Wen-Chen Hu and Yanjun Zuo, editors. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, ISBN: 1-615-20761-9, IGI Global, 2010. Including 200,000+ words, 22 chapters, 71 authors, and 4 sections:
    1. Handheld computing for mobile commerce,
    2. Handheld computing research and technologies,
    3. Wireless networks and handheld/mobile security, and
    4. Handheld images and videos.

  10. Wen-Chen Hu. Internet-Enabled Handheld Devices, Computing, and Programming: Mobile Commerce and Personal Data Applications, ISBN: 1-591-40769-9, Information Science Reference, 2008. Including 100,000+ words, 14 chapters, and 3 sections. The first book ever covering generic handheld computing and programming and including three major subjects:
    1. Mobile commerce systems and handheld devices,
    2. Mobile Web content design and implementation, and
    3. Client-side handheld computing and programming.

  11. Wen-Chen Hu, editor. Selected Readings on Electronic Commerce Technologies: Contemporary Applications, ISBN: 1-605-66097-3, Information Science Reference, 2008. Including 371 pages, 34 chapters, 76 authors, and 6 sections:
    1. Fundamental concepts and theories,
    2. Development and design methodologies,
    3. Tools and technologies,
    4. Utilization and application,
    5. Critical issues, and
    6. Emerging trends.

  12. Thomas O’Neil and Wen-Chen Hu, editors. Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007. Including 71 articles, 115 authors, and topics of computational intelligence, algorithms, web applications, software engineering, robotics, networks, distributed computing, tools for instruction/production, social implications, computational intelligence, programming languages, computer security, etc.

  13. Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, editors. Advances in Security and Payment Methods for Mobile Commerce, 352 pages (14 chapters and 37 authors), ISBN: 1-591-40345-6, Idea Group, Inc., 2005. A best seller first covering comprehensive mobile commerce security and payment methods and including four major subjects:
    1. Fundamentals of mobile commerce security and payment methods,
    2. Mobile commerce security,
    3. Mobile commerce payment methods, and
    4. Ad hoc mobile commerce security and payment methods.

Journal Papers

  1. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Using dummy locations to conceal whereabouts of mobile users in location-based services. In International Journal on Engineering, Science and Technology, 2023.

  2. Wen-Chen Hu, Sanjaikanth E Vadakkethil Somanathan Pillai, and Abdelrahman Ahmed ElSaid. Mobile health text misinformation identification using mobile data mining. Journal International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics (IJMDWTFE), 12(1), Article 3, 2022.

  3. Wen-Chen Hu, Benu Bansal, and Naima Kaabouch. Opportunities and challenges from the milestones of information technology (IT). Journal Systemics, Cybernetics and Informatics (JSCI), 18(7):132-137, 2020.

  4. Wen-Chen Hu, Benu Bansal, and Naima Kaabouch. Contemporary issues in the interdisciplinary research: smartphone computing research. Journal Systemics, Cybernetics and Informatics (JSCI), 18(7):110-117, 2020.

  5. Wen-Chen Hu, Benu Bansal, and Naima Kaabouch. Using incremental direction searches to stay away from COVID-19. Journal Systemics, Cybernetics and Informatics (JSCI), 18(6):89-94, 2020.

  6. Wen-Chen Hu, Benu Bansal, and Naima Kaabouch. Using mobile and wireless computing to facilitate virtual collaboration during a pandemic, Journal Systemics, Cybernetics and Informatics (JSCI), 18(1):273-288, 2020.

  7. Hongyu Guo, Amjad Nusayr, and Wen-Chen Hu. Analysis and resolution of semantic ambiguity of toggle buttons by standardizing the design in software GUI and mobile apps. International Journal of Handheld Computing Research, 8(4), October-December, 2017.

  8. Debabrata Ghosh, Naima Kaabouch, and Wen-Chen Hu. A robust iterative super resolution mosaicking algorithm using an adaptive and directional Huber-Markov regularization. Journal of Visual Communication and Image Representation, 40(A):98-110, October 2016.

  9. Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, and Wen-Chen Hu. A Bayesian approach to estimate and model SINR in wireless networks. International Journal of Communication Systems, September 13, 2016.

  10. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. Location-based service using geometric location methods to unite mobile users. Journal Systemics, Cybernetics and Informatics (JSCI), 14(1):43-48, 2016.

  11. Miao-Kuei Ho, Hung-Jen Yang, Li-Min Chen, Hsieh-Hua Yang, and Wen-Chen Hu. Developing fast training resource from demonstration. WSEAS Transactions on Information Science and Applications, 12:341-350, 2015.

  12. Hector Reyes, Sriram Subramaniam, Naima Kaabouch, and Wen-Chen Hu. A spectrum sensing technique based on autocorrelation and Euclidean distance and its comparison with energy detection for cognitive radio networks. Computers and Electrical Engineering, Elsevier, 2015.

  13. Hsieh-Hua Yang, Lung-Hsing Kuo, Wen-Chen Hu, and Hung-Jen Yang. Emerging technology curriculum on the focus of cloud computing. International Journal of Computers, 8:172-182, 2014.

  14. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. A privacy-preserving prediction method for human travel routes. Journal of Systemics, Cybernetics and Informatics, 12(7):43-48, 2014.

  15. Hsieh-Hua Yang, Wen-Chen Hu, Lung-Hsing Kuo, and Hung-Jen Yang. Applying social-network to enhance distance learning program. International Journal of Education and Information Technologies, 8:276-287, 2014.

  16. Lung-Hsing Kuo, Hsieh-Hua Yang, Wen-Chen Hu, and Hung-Jen Yang. Enhancing learning emerging technology with on-line e-portfolio for the high-scope project. International Journal of Education and Information Technologies, 8:105-117, 2014.

  17. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and S. Hossein Mousavinezhad. Privacy-preserving spatial trajectory prediction based on a novel matrix representation. International Journal of Handheld Computing Research, 5(1), January-March, 2014.

  18. Hector Reyes, Naima Kaabouch, and Wen-Chen Hu. Spectrum channel characterization using delay and doppler spread parameters. Journal of Communications, 2014.

  19. Lung-Hsing Kuo, Hsieh-Hua Yang, Wen-Chen Hu, Miao-Kuei Ho, and Hung-Jen Yang. Creating business intelligence upon conflicts. International Journal of Economics and Statistics, 2:151-160, 2014.

  20. L.-H. Kuo, J.-C. Yu, H.-H. Yang, W.-C. Hu, & H.-J. Yang. A web-stress evaluation on an on-line in-service training course. International Journal of Computers and Communications, 7(4):135-144, 2013.

  21. L.-H. Kuo, J.-C. Yu, H.-H. Yang, W.-C. Hu, & H.-J. Yang. Creating a high-scope on-line course for cloud computing. International Journal of Education and Information Technologies, 7(4):146-159, 2013.

  22. Lung-Hsing Kuo, Huei-Mei Wei, Wen-Chen Hu, and Hung-Jen Yang. Applying innovation theory in observing emerging technology acceptance. International Journal of Systems Applications, Engineering & Development, 1(7):56-65, 2013.

  23. Naima Kaabouch, Wen-Chen Hu, and Prashant Agnihotri. Controlling DC-DC converters in portable devices: A dynamic FPGA-based pulse shift modulation technique. Journal of Electrical & Electronics, 1(4), 2012.

  24. Jui-Chen Yu, Lung-Hsing Kuo, Hsieh-Hua Yang, Wen-Chen Hu, and Hung-Jen Yang. Applying prototyping method on Web-based course development. International Journal of Computers, 3(6):170-178, 2012.

  25. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and S. Hossein Mousavinezhad. Route anomaly detection using a linear route representation. Journal of Computer Networks and Communications, 2012.

  26. Naima Kaabouch, Wen Chen Hu, and Prashant Agnihotri. FPGA-based combined PWM-PFM technique to control DC-DC converters in portable devices. Journal of Electrical & Electronics, 2012.

  27. Lung-Hsing Kuo, Jui-Chen Yu, Hsieh-Hua Yang, Wen-Chen Hu, and Hung-Jen Yang. A study of creating technology education course for cloud computing. International Journal of Communications, 3(6):98-108, 2012.

  28. Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Hung-Jen Yang. Handheld usage data mining for handheld data protection. Contemporary Management Research, 2012.

  29. Naima Kaabouch, Yi Chen, Wen-Chen Hu, Julie W. Anderson, Forrest Ames, and Rolf Paulson. Enhancement of the asymmetry-based overlapping analysis through features extraction. Journal of Electronic Imaging, 20(1), January-March, 2011.

  30. Naima Kaabouch, Wen-Chen Hu, et al. Predicting neuropathic ulceration: An analysis of static temperature distributions in thermal images. Journal of Biomedical Optics, 2011.

  31. Lung-Hsing Kuo, Hsieh-Hua Yang, Hung-Jen Yang, Wen-Chen Hu, and S.M. Sue. A study of online asynchronous learning monitored by face recognition. WSEAS Transactions on Information Science and Applications, 10(7):1211-1229, October 2010.

  32. Wen-Chen Hu, Yanjun Zuo, Lei Chen, and Hung-Jen Yang. Contemporary issues in handheld computing research. International Journal of Handheld Computing Research, 1(1):1-23, January 2010.

  33. Lei Chen, Wen-Chen Hu, Ming Yang, and Lei Zhang. Security and privacy issues in secure e-mail standards and services. International Journal of Information Security and Privacy, 3(3):1-13, July 2009.

  34. Yanjun Zuo and Wen-Chen Hu. Trust-based information risk management in a supply chain network. International Journal of Information Systems and Supply Chain Management (IJISSCM), 2(3):19-34, July-September 2009.

  35. Jui-Chen Yu, Lung-Hsing Kuo, Li-Min Chen, Hung-Jen Yang, Hsieh-Hua Yang, and Wen-Chen Hu. Assessing and managing mobile technostress. WSEAS Transactions on Communications, 4(8):416-425, April 2009.

  36. Wen-Chen Hu, Chyuan-Huei Thomas Yang, Jyh-haw Yeh, and Weihong Hu. Mobile and electronic commerce systems and technologies. Journal of Electronic Commerce in Organizations, 6(3):54-73, July-September 2008.

  37. Hsieh-Hua Yang, Hung-Jen Yang, Jui-Chen Yu, Wen-Chen Hu. Multinomial regression model for in-service training. International Journal of Mathematical Models and Methods in Applied Sciences, 1(2):74-81, 2008.

  38. Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, and Hung-Jen Yang. Handheld computing and programming for mobile commerce. International Journal of Web Information Systems, 2(3-4):164-175, 2006.

  39. Yao-Ming Chu, Chen Ying Ju, Hung-Jen Yang, Hsieh-Hua Yang, and Wen-Chen Hu. A study of the intention of using computer as a strategic resource of web searching. WSEAS Transactions on Communications, 9(5):1852-1857, September, 2006.

  40. Wen-Chen Hu, Jyh-haw Yeh, Hung-Ju Chu, and Chung-wei Lee. Internet-enabled mobile handheld devices for mobile commerce. Contemporary Management Research, 1(1):13-34, 2005.

  41. Jyh-haw Yeh, Marion Scheepers, and Wen-Chen Hu. Modifying YCN key assignment scheme to resist the attack from Hwang. Information Processing Letters, 95(4):435-440, 2005.

  42. Jyh-haw Yeh, Wei Zhang, Wen-Chen Hu, and Chung-wei Lee. Design and simulation of a supplemental protocol for BGP. Journal of Computer Networks, 49(2):172-200, 2005.

  43. Wen-Chen Hu, Chih-fang Wang, Yapin Zhong, and Chao Wang. Algorithms for the longest approximate subsequence problems. Periodical of International Teacher Education in Technology, 1(1):19-32, 2003.

  44. Wen-Chen Hu, Xuli Zong, Chung-wei Lee, and Jyh-haw Yeh. World Wide Web usage mining systems and technologies. Journal on Systemics, Cybernetics, and Informatics, 1(4):53-59, 2003.

Book Chapters

  1. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. ChatGPT and ensemble learning for mobile text misinformation identification. In Amina Ahmed Nacer and Mohammed Riyadh Abdmeziem, editors, Emerging Technologies for Securing the Cloud and IoT, Chapter 7, DOI: 10.4018/979-8-3693-0766-3.ch007, IGI Global, 2024.

  2. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Using effective dummy locations and routes to conceal user locations. In Roger Lee, editor, Studies in Computational Intelligence Series (SCIS), vol. 1137, Software Engineering and Management: Theory and Application, vol. 16, chapter 11, ISBN 978-3-031-55173-4, Springer, 2024.

  3. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Mobile text misinformation detection using effective information retrieval methods. In Carlos Rabadão, Leonel Santos, and Rogério Luís de Carvalho Costa, editors, Information Security and Privacy in Smart Devices: Tools, Methods, and Applications, IGI Global, 2022.

  4. Wen-Chen Hu, Naima Kaabouch, and Hongyu Guo. Design and implementation of a location-based service with emphasis on a geographical database. In Mehdi Khosrow-Pour, editor, Encyclopedia of Organizational Knowledge, Administration, and Technologies, IGI Global, 2020.

  5. Wen-Chen Hu, Naima Kaabouch, Hongyu Guo, and AbdElRahman ElSaid. Location-based advertising using location-aware data mining. In P. Karthikeyan and M. Thangavel, editors, Applications of Security, Mobile, Analytic and Cloud (SMAC) Technologies for Effective Information Processing and Management, IGI Global, 2018.

  6. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. An empirical study of mobile/handheld app development using Android platforms. In Mehdi Khosrow-Pour, editor, Encyclopedia of Information Science and Technology, 4th Edition, IGI Global, 2016.

  7. Wen-Chen Hu, Naima Kaabouch, Hongyu Guo, and Hung-Jen Yang. An empirical study of NoSQL databases for big data. In Manoj Kumar Singh and Dileep Kumar G, editors, Handbook of Research on Big Data Management and Applications, IGI Global, 2016.

  8. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. Fundamental technologies and methodologies for mobile/handheld app development. In Mehdi Khosrow-Pour, editor, Encyclopedia of Information Science and Technology, ISBN13: 9-781-466-65888-2, ISBN10: 1-466-65888-6, IGI Global, 2014.

  9. Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Ming Yang. Essential technologies for location-aware mobile, online map prefetching and caching. In Wen-Chen Hu and Naima Kaabouch, editors, Sustainable ICTs and Management Systems for Green Computing, ISBN: 1-466-61839-6, IGI Global, 2012.

  10. Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Ming Yang. Incremental location matching for human travel route anomaly detection. In In Lee, editor, Mobile Services Industries, Technologies, and Applications in the Global Economy, ISBN: 1-466-61981-3, IGI Global, 2012.

  11. Lei Chen, Wen-Chen Hu, Ming Yang, and Lei Zhang. Security and privacy issues in secure e-mail standards and services. In Hamid Nemati, editor, Security and Privacy Assurance in Advancing Technologies: New Developments, Information Science Publishing, ISBN: 978-1609602000, pages 174-185, 2011.

  12. Wen-Chen Hu, Naima Kaabouch, S. Hossein Mousavinezhad, and Hung-Jen Yang. Smartphone data protection using mobile usage pattern matching. In Junaid Zubairi and Athar Mahboob, editors, Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, IGI Global, 2011.

  13. Anlei Wang, Naima Kaabouch, Wen-Chen Hu, and Richard R. Schultz. Automatic and robust system for correcting microarray images rotations and isolating spots. In Hamid R. Arabnia and Quoc-Nam Tran, editors, Software Tools and Algorithms for Biological Systems, ISBN: 1-441-97045-2, Springer, 2011.

  14. Lei Chen, Wen-Chen Hu, Ming Yang, and Lei Zhang. Applied cryptography in e-mail services and web services. In Hamid R. Nemati and Li Yang, editors, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Information Science Reference, ISBN: 1-615-20783-X, pages 130-145, 2010.

  15. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Weihong Hu. Technologies and systems for web content adaptation. In Wen-Chen Hu and Yanjun Zuo, editors, Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, Information Science Reference, ISBN: 1-615-20761-9, pages 263-277, 2010.

  16. Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, and Lei Chen. A technological perspective of mobile and electronic commerce systems. In Mehdi Khosrow-Pour, editor, E-Commerce Trends for Organizational Advancement: New Applications and Methods, (Advances in Electronic Commerce series), Information Science Reference, ISBN: 1-605-66964-4, pages 16-35, 2009.

  17. Wen-Chen Hu, Yanjun Zuo, Lei Chen, and Chyuan-Huei Thomas Yang. Adaptive mobile web browsing using web mining technologies. In Latif Al-Hakim and Massimo Memmola, editors, Business Web Strategy: Design, Alignment, and Application, ISBN: 1-605-66024-8, Information Science Reference, pages 198-207, 2008.

  18. Wen-Chen Hu, Yanjun Zuo, Chyuan-Huei Thomas Yang, and Yapin Zhong. Handheld programming languages and environments. In Mehdi Khosrow-Pour, editor, Encyclopedia of Information Science and Technology, ISBN: 1-591-40553-X, pages 1967-1972, Idea Group Reference, 2008.

  19. Lixin Fu and Wen-Chen Hu. Online analytical processing and data-cube technologies. In G. David Garson and Mehdi Khosrow-Pour, editors, Handbook of Research on Public Information Technology, ISBN: 1-599-04857-4, pages 627-637, Information Science Reference, 2008.

  20. Wen-Chen Hu, Lixin Fu, Hung-Jen Yang, and Sheng-Chien Lee. Handheld computing and Palm OS programming for mobile commerce. In Mario Freire and Manuela Pereira, editors, Encyclopedia of Internet Technologies and Applications, ISBN: 1-591-40993-4, pages 205-214, Information Science Publishing, 2007.

  21. Wen-Chen Hu, Jyh-haw Yeh, I-Lung Kao, and Yapin Zhong. Handheld computing and J2ME programming for mobile handheld devices. In David Taniar, editor, Encyclopedia of Mobile Computing and Commerce, ISBN: 1-599-04002-6, pages 302-309, IGI Global, 2007.

  22. Wen-Chen Hu, Tom Wiggen, and Hung-Jen Yang. Systems, handheld devices, and payment methods for mobile commerce. In Bhuvan Unvelkar, editor, Handbook of Research in Mobile Business: Technical, Methodological and Social Perspectives, ISBN: 1-591-40817-2, pages 401-418, Idea Group, Inc., 2006.

  23. Wen-Chen Hu, Jyh-haw Yeh, Hung-Jen Yang, and Chung-wei Lee. Mobile handheld devices for mobile commerce. In Mehdi Khosrow-Pour, editor, Encyclopedia of E-Commerce, E-Government and Mobile Commerce, ISBN: 1-591-40799-0, pages 792-798, Information Science Publishing, 2006.

  24. Wen-Chen Hu, Hung-Jen Yang, and Jyh-haw Yeh. Mobile Internet and handheld devices for virtual communities. In Subhasish Dasgupta, editor, Encyclopedia of Virtual Communities and Technologies, pages 314-320, CyberTech Publishing, 2005.

  25. Wen-Chen Hu, Hung-Jen Yang, Chung-wei Lee, and Jyh-haw Yeh. World Wide Web usage mining. In John Wang, editor, Encyclopedia of Data Warehousing and Mining, pages 1242-1248, CyberTech Publishing, 2005.

  26. Jyh-haw Yeh, Wen-Chen Hu, and Chung-wei Lee. Security issues and their possible countermeasures for a mobile agent based mobile commerce application. In Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, editors, Advances in Security and Payment Methods for Mobile Commerce, pages 140-163, Idea Group, Inc., 2005.

  27. Chung-wei Lee, Weidong Kou, and Wen-Chen Hu. Mobile commerce security and payment methods. In Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, editors, Advances in Security and Payment Methods for Mobile Commerce, pages 1-18, Idea Group, Inc., 2005.

  28. Chung-wei Lee, Weidong Kou, and Wen-Chen Hu. Mobile commerce security and payment. In Margherita Pagani, editor, Encyclopedia of Multimedia Technology and Networking, pages 615-621, Information Science Publishing, 2004.

  29. Wen-Chen Hu, Chung-wei Lee, and Jyh-haw Yeh. Mobile commerce systems. In Shi Nansi, editor, Mobile Commerce Applications, pages 1-23, Idea Group Publishing, 2004.

  30. Wen-Chen Hu, Hung-Jen Yang, Jyh-haw Yeh, and Chung-wei Lee. World Wide Web search technologies. In Mehdi Khosrow-Pour, editor, Encyclopedia of Information Science and Technology, Vol. I-V, pages 3111-3117, IRM Press, 2004.

  31. Chung-wei Lee, Wen-Chen Hu, and Jyh-haw Yeh. Mobile commerce technology. In Mehdi Khosrow-Pour, editor, Encyclopedia of Information Science and Technology, Vol. I-V, pages 1967-1972, IRM Press, 2004.

  32. Wen-Chen Hu and Jyh-haw Yeh. World Wide Web search engines. In Shi Nansi, editor, Architecture Issues of Web-Enabled Electronic Business, pages 155-169, Idea Group Publishing, 2002.

Conference Papers

  1. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Federated learning for fake news detection and data privacy preservation. To appear in Proceedings of the IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS’24), Grand Forks, ND, USA, October 28-29, 2024.

  2. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Security and privacy challenges and opportunities in FinTech. To appear in Proceedings of the IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS’24), Grand Forks, ND, USA, October 28-29, 2024.

  3. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Privacy-preserving mobile advertising using ElGamal encryption and private proximity testing. In Proceedings of the 62nd ACM Southeast Conference (ACMSE 2024), Marietta, GA, USA, April 18–20, 2024.

  4. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Privacy-preserving gross domestic product (GDP) calculation using Paillier encryption and differential privacy. In Proceedings of the 62nd ACM Southeast Conference (ACMSE 2024), Marietta, GA, USA, April 18–20, 2024.

  5. Carson Godwin, Ali Abdullah S. AlQahtani, Hosam Alamleh, Wen-Chen Hu, and AbdElRahman Ahmed ElSaid. Advancing privacy research: A novel realistic persona-based dataset. In Proceedings of the 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS 2024), Applied Science University in Bahrain, Kingdom of Bahrain, January 28-29, 2024.

  6. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Misinformation detection using an ensemble method with emphasis on sentiment and emotional analyses. In Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023), Orlando, Florida, May 23-25, 2023.

  7. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Effective information retrieval for mobile misinformation identification. In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.

  8. Sanjaikanth E Vadakkethil Somanathan Pillai and Wen-Chen Hu. Mobile users versus service providers in privacy preservation using dummy locations. In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.

  9. Sanjaikanth E Vadakkethil Somanathan Pillai, Wen-Chen Hu, and Abdelrahman Ahmed ElSaid. A self-reconfigurable system for mobile health text misinformation detection. In Proceedings of the 2022 IEEE International Conference on Electro/Information Technology (EIT 2022), pages 242-247, Mankato, Minnesota, May 19-21, 2022.

  10. Tala Talaei Khoei, Wen Chen Hu, and Naima Kaabouch. Residual convolutional network for detecting attacks on intrusion detection systems in smart grid. In Proceedings of the 2022 IEEE International Conference on Electro/Information Technology (EIT 2022), Mankato, Minnesota, May 19-21, 2022.

  11. (Best Paper Award) Benu Bansal, Wen-Chen Hu, and Naima Kaabouch. Detecting mobile pandemic misinformation by using mobile text/data mining. In Proceedings of the 25th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2021), Orlando, Florida, USA, July 18-21, 2021.

  12. Tala Talaei Khoei, Mary Catherine Labuhn, Toro Dama Caleb, Wen-Chen Hu, and Naima Kaabouch. A stacking-based ensemble learning model with genetic algorithm for detecting early stages of Alzheimer’s disease. In Proceedings of the 2021 IEEE International Conference on Electro/Information Technology (EIT 2021), Central Michigan University, Michigan, USA, May 13-15, 2021.

  13. (Best Paper Award) Wen-Chen Hu and Naima Kaabouch. Using incremental direction searches to stay away from COVID-19. In Proceedings of the 24th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2020), Orlando, Florida, USA, September 13-16, 2020.

  14. Wen-Chen Hu, Naima Kaabouch, and Hongyu Guo. Location privacy protection using dummy locations and routes. In Proceedings of the 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.

  15. Youness Arjoune, Wen-Chen Hu, and Naima Kaabouch. Chebyshev Vandermonde-like measurement matrix based compressive spectrum sensing. In Proceedings of the 2019 International Conference on Electro/Information Technology (EIT 2019), Brookings, South Dakota, May 20-22, 2019.

  16. Mohsen Riahi Manesh, Jonathan Kenney, Wen Chen Hu, Vijaya Kumar Devabhaktuni, and Naima Kaabouch. Detection of GPS spoofing attacks on unmanned aerial systems. In Proceedings of the IEEE Consumer Communications & Networking Conference (2019 IEEE CCNC), Las Vegas, January 11-14, 2019.

  17. Wen-Chen Hu, Naima Kaabouch, Hongyu Guo, and Ahmed El-Saied. Dummy locations for robust privacy preservation of location-based services. In Proceedings of the 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), Taipei, Taiwan, June 25-27, 2018.

  18. Ahmed El-Saied, Wen-Chen Hu, Naima Kaabouch, and Fatima El Jamiy. A location-based service using a server-side geographical database. In Proceedings of the Midwest Instruction and Computing Symposium 2018 (MICS 2018), Duluth, Minnesota, USA, April 6-7, 2018.

  19. Wen-Chen Hu, Naima Kaabouch, Sara Faraji Jalal Apostal, and Hung-Jen Yang. Location-aware mining for privacy-preserving location-based advertising. In Proceedings of the 2017 IEEE International Conference on Electro/Information Technology (EIT 2017), Lincoln, Nebraska, USA, May 14-17, 2017.

  20. Mohsen Manesh, Naima Kaabouch, Hector Reyes, and Wen-Chen Hu. A Bayesian model of the aggregate interference power in cognitive radio networks. In Proceedings of the 7th IEEE Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON 2016), New York City, USA, October 20-22, 2016.

  21. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. Secure spatial trajectory prediction based on traffic flows. In Proceedings of the 2016 IEEE International Electro/Information Technology Conference (EIT 2016), Grand Forks, North Dakota, USA, May 19-21, 2016.

  22. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. Location-based service using geometric location methods to unite mobile users. In Proceedings of the 19th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2015), Orlando, Florida, USA, July 12-15, 2015.

  23. Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. An empirical study of NoSQL databases by using MongoDB databases. In Proceedings of the Midwest Instruction and Computing Symposium (MICS 2015), Grand Forks, North Dakota, USA, April 10-11, 2015.

  24. (Best Paper Award) Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. A matrix-based prediction method for spatial trajectories. In Proceedings of the 18th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2014), Orlando, Florida, USA, July 15-18, 2014.

  25. Wen-Chen Hu, S. Hossein Mousavinezhad, Naima Kaabouch, and Hung-Jen Yang. Privacy-preserving spatial trajectory prediction. In Proceedings of the National Wireless Research Collaboration Symposium (NWRCS), Idaho Falls, Idaho, USA, May 15-16, 2014.

  26. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Xiwei Wang. Essential Android technologies and Google Maps APIs for location-based services. In Proceedings of the Midwest Instruction and Computing Symposium (MICS 2014), Verona, Wisconsin, USA, April 25-26, 2014.

  27. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Hongyu Guo. Adaptive mobile web pages using HTML5 and CSS for engineering faculty. In Proceedings of the 2013 ASEE North Midwest Section Conference, Fargo, North Dakota, USA, October 17-18, 2013.

  28. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Lei Chen. Spatial trajectory prediction using a matrix representation. In Proceedings of the 17th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2013), Orlando, Florida, USA, July 9-12, 2013.

  29. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Lei Chen. A novel matrix representation for privacy-preserving spatial trajectory prediction. In Proceedings of the 2013 IEEE International Conference on Electro/Information Technology (EIT 2013), Rapid City, South Dakota, USA, May 9-11, 2013.

  30. Shafiul Islam, Naima Kaabouch, and Wen Chen Hu. A survey of medical imaging techniques used for breast cancer detection. In Proceedings of the 2013 IEEE International Conference on Electro/Information Technology (EIT 2013), Rapid City, South Dakota, USA, May 9-11, 2013.

  31. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Xiwei Wang. Location-based services using HTML5 Geolocation and Google Maps APIs. In Proceedings of the Midwest Instruction and Computing Symposium (MICS 2013), La Crosse, Wisconsin, USA, April 19-20, 2013

  32. Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Liang Cheng. A linear route representation for route anomaly discovery. In Proceedings of the 16th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2012), Orlando, Florida, USA, July 17-20, 2012.

  33. S. Hossein Mousavinezhad, Steve Chiu, and Wen-Chen Hu. Research, teaching and learning in IISM areas. In Proceedings of the 3rd International Conference on Intelligent Information Systems and Management (IISM ’12), Tamilnadu, India, July 12-14, 2012.

  34. Jui-Chen Yu, Hsieh-Hua Yang, Wen-Chen Hu, Lung-Hsing Kuo, Li-Min Chen, and Hung-Jen Yang. Design a Web-based course by applying prototyping method. In Proceedings of the 12th WSEAS International Conference on Applied Computer Science (ACS ’12), Singapore City, Singapore, May 11-13, 2012.

  35. Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, and Ather Sharif. Location-based services design and implementation using Android platforms. In Proceedings of the 2012 Midwest Instruction and Computing Symposium (MICS 2012), Cedar Falls, Iowa, USA, April 13-14, 2012.

  36. Ming Yang, Lei Chen, Shengli Yuan, and Wen-Chen Hu. Secure processing and delivery of medical images for patient information protection. In Proceedings of the 2011 International Conference on Security and Management (SAM ’11) under the 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP 2011), Las Vegas, Nevada, USA, July 18-21, 2011.

  37. Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Hung-Jen Yang. Incremental location searching for route anomaly detection. In Proceedings of the 2011 IEEE International Conference on Electro/Information Technology (EIT 2011), Mankato, Minnesota, USA, May 15-17, 2011.

  38. Hector Ivan Reyes Moncayo, Naima Kaabouch, Wen-Chen Hu, and Anlei Wang. Performance evaluation of a turbo codec with Log-MAP algorithm on FPGA and CPU. In Proceedings of the 2011 IEEE International Conference on Electro/Information Technology (EIT 2011), Mankato, Minnesota, USA, May 15-17, 2011.

  39. Anupam Thakur, Wen-Chen Hu, Naima Kaabouch, and Liang Cheng. Web recommendations for mobile Web browsing. In Proceedings of the Midwest Instruction & Computing Symposium (MICS 2011), Duluth, Minnesota, April 8-9, 2011.

  40. Malvika Pimple, Wen-Chen Hu, Naima Kaabouch, and Hung-Jen Yang. A mobile Web focused search engine using implicit feedback. In Proceedings of the Midwest Instruction & Computing Symposium (MICS 2011), Duluth, Minnesota, April 8-9, 2011.

  41. Lung-Hsing Kuo, Shao-Chun Yang, Wen-Chen Hu, Chang-Tzuoh Wu, Hung-Jen Yang, Hsueh-Chih Lin. Applying big 6 on digital book for supporting learning. In Proceedings of the 10th WSEAS International Conference on Artificial Intelligence Engineering and Data Bases (AIKED ’11), pages 303-308, Cambridge, UK, February 20-22, 2011.

  42. Prashant Agnihotri, Naima Kaabouch, Hossein Salehfar, Wen-Chen Hu, and Akhilesh Upadhyay. A novel pulse shift modulation technique for controlling DC-DC converters. In Proceedings of PEDES 2010 Power India, New Delhi, India, December 21-23, 2010.

  43. Prashant Agnihotri, Naima Kaabouch, Hossein Salehfar, and Wen-Chen Hu. FPGA-based combined PWM-PFM technique to control DC-DC converters. In Proceedings of 2010 North American Power Symposium (NAPS 2010), Arlington, Texas, September 26-28, 2010.

  44. S. Hossein Mousavinezhad, Wen-Chen Hu, and Steve Chiu. Wireless communications and networks. In Proceedings of the 1st International Conference on Intelligent Information Systems and Management (IISM 2010), Tamil Nadu, India, June 10-12, 2010.

  45. Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, and Lei Chen. An optimization neural network for smartphone data protection. In Proceedings of 2010 IEEE International Conference on Electro/Information Technology (EIT 2010), Normal, Illinois, May 20-22, 2010.

  46. Varun Krishna, Wen-Chen Hu, Naima Kaabouch, and Aashish Bhatia. Design and implementation of mobile World Wide Web search engines. In Proceedings of Midwest Instruction and Computing Symposium (MICS 2010), Eau Claire, Wisconsin, April 16-17, 2010.

  47. Yanjun Zuo, Wen-Chen Hu, and Timothy O’Keefe. Securely querying sensor enabled RFID virtual databases (SERVDs). In Proceedings of International Conference on Information Technology: New Generations (ITNG 2010), Las Vegas, USA, April 12-14, 2010.

  48. Stuart West, Naima Kaabouch, Wen-Chen Hu, Julie Anderson, Forrest Ames, and Rolf Paulson. Can infrared imaging predict foot ulcers? In Proceedings of NIH Workshop, NIH09-NIH01-74, SPIE, July 9, 2009.

  49. Anlei Wang, Naima Kaabouch, and Wen-Chen Hu. A robust grid alignment system for microarray images. In Proceedings of Applied Imagery Pattern Recognition 2009 Conference, IEEE Computer Society Technical Committee on Pattern Analysis and Machine Intelligence, 2009.

  50. Naima Kaabouch, Yi Chen, Wen-Chen Hu, Julie Anderson, Forrest Ames, and Rolf Paulson. Early detection of foot ulcers through asymmetry analysis. In Proceedings of SPIE, DOI:10.1117/12.811676, vol. 7243, 72621L (2009), 2009.

  51. Lung-Hsing Kuo, Li-Min Chen, Hung-Jen Yang, Hsieh-Hua Yang, Jui-Chen Yu, and Wen-Chen Hu. Assessing mobile technostress. In Proceedings of the 8th WSEAS International Conference on Telecommunications and Informatics (TELE-INFO ’09), pages 37-42, Istanbul, Turkey, May 30 - June 1, 2009.

  52. Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, and Hung-Jen Yang. Mobile data protection using handheld usage context matching. In Proceedings of International Workshop on the Role of Services, Ontologies, and Context in Mobile Environments (RoSOC-M ’09), Taipei, Taiwan, May 18-21, 2009.

  53. Wen-Chen Hu, Hung-Jen Yang, Lei Chen, and Ruchitha Deshmukh. Web content adaptation for Internet-enabled mobile handheld devices. In Proceedings of the Midwest Instruction and Computing Symposium (MICS 2009), Rapid City, South Dakota, April 17-18, 2009.

  54. Yanjun Zuo, Wen-Chen Hu, and Timothy O’Keefy. Trust computing for social networking. In Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG 2009), pages 1534-1539, April 27-29, 2009, Las Vegas, Nevada.

  55. Naima Kaabouch, Yi Chen, Wen-Chen Hu, Julie Anderson, Forrest Ames, and Rolf Paulson. Early detection of foot ulcers through asymmetry analysis. In Proceedings of the 2009 SPIE Medical Imaging Proceedings, Lake Buena Vista, Florida, February 7-12, 2009.

  56. Wen-Chen Hu, Yanjun Zuo, Tom Wiggen, and Varun Krishna. Handheld data protection using handheld usage pattern identification. In Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, pages 237-240, Ames, Iowa, May 18-20, 2008.

  57. Wen-Chen Hu, Yanjun Zuo, Lei Chen, and Anusha Gopalakrishnan. Contemporary technologies and platforms for electronic and mobile commerce system construction. In Proceedings of the 41th Annual Midwest Instruction and Computing Symposium (MICS 2008), 15 pages, La Crosse, Wisconsin, April 11-12, 2008.

  58. Yaping Zhong, Weihong Hu, Wen-Chen Hu, Jin Zhang, Lei Zhang, Fei Yu, Sinlin Sun, Chinjin Yu, and Fei Ma. Multi-modal user interface based on a weight-lifting training management and evaluation system. In Proceedings of the 8th National Sports Science and Technology Conference, Beijing, China, October 23-26, 2007.

  59. Wen-Chen Hu, Lixin Fu, Weihong Hu, and Chung-wei Lee. Palm OS and programming for mobile commerce. In Proceedings of the 2007 Information Resources Management Association (IRMA 2007) International Conference, pages 780-784, Vancouver, Canada, May 19-23, 2007.

  60. Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Sheng-Chien Lee. Using mobile-computing technologies to access Internet-enabled genome databases. In Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), 10 pages, Grand Forks, North Dakota, April 20-21, 2007.

  61. Wen-Chen Hu, Sampath Bemgal, Lixin Fu, and Hung-Jen Yang. A focused mobile Web search engine using a topic-specific knowledge base. In Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), 12 pages, Grand Forks, North Dakota, April 20-21, 2007.

  62. Sheng-Chien Lee, Wen-Chen Hu, Melanie J. Correll, and Jiannong Xin. Accessing plant genome databases from Internet-enabled mobile handheld devices. In Proceedings of the 4th World Congress on Computers in Agriculture (WCCA 2006), pages 246-251, Orlando, Florida, July 24-26, 2006.

  63. Wen-Chen Hu, Jyh-haw Yeh, Hung-Ju Chu, and Sheng-Chien Lee. Adaptive Web browsing using Web mining technologies for Internet-enabled mobile handheld devices. In Proceedings of the 2006 Information Resources Management Association (IRMA 2006) International Conference, pages 277-280, Washington, D.C., May 21-24, 2006.

  64. Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Chung-wei Lee. Client-side handheld computing and Java 2 Platform, Micro Edition (J2ME). In Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), 13 pages, Mount Pleasant, Iowa, April 7-8, 2006.

  65. Wen-Chen Hu, I-Lung Kao, Hung-Jen Yang, and Jyh-haw Yeh. Handheld computing and Palm OS for mobile handheld devices. In Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), 14 pages, Mount Pleasant, Iowa, April 7-8, 2006.

  66. Lei Chen, Chung-wei Lee, and Wen-Chen Hu. Gene intrusion on a society of hill-climbers. In Proceedings of the 44th Annual ACM Southeast Conference, pages 34-39, Melbourne, Florida, March 10-12, 2006.

  67. Hung-Jen Yang and Wen-Chen Hu. Promoting learners’ conceptual change of their understanding of communication technology via multiple analogies. In Proceedings of 2005 International Conference: Curriculum & Instruction in Technology Education, Kaohsiung, Taiwan, November 4-6, 2005.

  68. (Best Paper Award) Hung-Jen Yang, Shi-Jer Lou, Hsieh-Hua Yang, Wen-Chen Hu, and Kuo-Hung Tseng. A study of web-based data collection for social-network research. In Proceedings of the Symposium on Risk Management and Cyber-Informatics: RMCI 2005, Orlando, Florida, July 10-13, 2005.

  69. Wen-Chen Hu, Tom Wiggen, and Hung-Jen Yang. Mobile commerce systems and payment methods. In Proceedings of the 2005 Information Resources Management Association (IRMA 2005) International Conference, pages 769-771, San Diego, May 15-18, 2005.

  70. Wen-Chen Hu, Jyh-haw Yeh, and Chung-wei Lee. Handheld devices and computing and payment methods for mobile commerce. In Proceedings of the 38th Annual Midwest Instruction and Computing Symposium, 15 pages, Eau Claire, Wisconsin, April 8-9, 2005.

  71. Hung-Jen Yang, Wen-Chen Hu, and Rong-Jui Fang. A study of technology value structure of mobile Internet usage in Taiwan. In Proceedings of the 3rd Biennial International Conference on Technology Education Research (Learning for Innovation in Technology Education), Gold Coast, Queensland, Australia, December 9-11, 2004.

  72. Wen-Chen Hu, Jui-Chen Yu, Shih-Van Chao, and Hung-Jen Yang. A study of technology requirements for mobile virtual communities (in Chinese). In Proceedings of 2004 International Conference: Curriculum & Instruction in Technology Education (2004 ICCITE), Kaohsiung, Taiwan, November 5-7, 2004.

  73. Wen-Chen Hu, Lei Liu, and Zhangmin Liu. Mobile commerce devices: Internet-enabled mobile handheld devices. In Proceedings of the 2004 Information Resources Management Association (IRMA 2004) International Conference, pages 1090-1092, New Orleans, May 23-26, 2004.

  74. Yeong Diann Uang, Chih-Hsung Hu, Hung-Jen Yang, Shih-Van Chao, Yi-Shian Jong, and Wen-Chen Hu. Developing a technology readiness scale for teachers. In Proceedings of the 15th Annual Conference of the Society for Information Technology and Teacher Education (Site 2004), pages 3750-3757, Atlanta, Georgia, March 1-6, 2004.

  75. Yapin Zhong, Juan Gilbert, and Wen-Chen Hu. Voice information retrieval for course resources. In Proceedings of ED-MEDIA 2003, World Conference on Educational Multimedia, Hypermedia & Telecommunications, pages 2804-2807, Honolulu, Hawaii, June 23-28, 2003.

  76. Chung-wei Lee, Wen-Chen Hu, and Jyh-haw Yeh. A system model for mobile commerce. In Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems Workshops, pages 634-639, Providence, Rhode Island, May 19-22, 2003.

  77. Jyh-haw Yeh, Chung-wei Lee, and Wen-Chen Hu. Protecting Internet public information integrity during transmission. In Proceedings of the 4th International Conference of Internet Computing, pages 308-314, Las Vegas, Nevada, June 23-26, 2003.

  78. Jyh-haw Yeh, Wei Zhang, Chung-wei Lee, and Wen-Chen Hu. A supplement protocol for BGP-source policy route discovery. In Proceedings of the 41st Annual ACM Southeast Conference, Savannah, Georgia, March 7-8, 2003.

  79. Yapin Zhong, Juan Gilbert, and Wen-Chen Hu. Speech user interface for document retrieval. In Proceedings of the 41st Annual ACM Southeast Conference, pages 130-131, Savannah, Georgia, March 7-8, 2003.

  80. (Best Paper Award) Wen-Chen Hu, Xuli Zong, Hung-Ju Chu, and Jui-Fa Chen. Usage mining for the World Wide Web. In Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2002, pages 75-80, Orlando, Florida, July 14-18, 2002.

  81. (Best Paper Award) Wen-Chen Hu, Jyh-haw Yeh, and Wei-Chuan Lin. An XML World Wide Web search engine using finite automata. In Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2002, pages 89-94, Orlando, Florida, July 14-18, 2002.

  82. Jui-Fa Chen, Wei-Chuan Lin, Chi-Ming Chung, Zhi-Yi Jian, and Wen-Chen Hu. A transmission service with three-queue management for a distributed remote monitoring. In Proceedings of the 4th International Workshop on Multimedia Network Systems and Applications, MNSA 2002, pages, 217-221, Vienna, Austria, July 2-5, 2002.

  83. Jyh-haw Yeh and Wen-Chen Hu. Access control for an organization connected by insecure public networks. In Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2002, pages 413-418, Orlando, Florida, July 14-18, 2002.

  84. Jui-Fa Chen, Wei-Chuan Lin, Chi-Ming Chung, Kun-Hsiao Tsai, Chia-Hao Chang, and Wen-Chen Hu. Distributed monitoring architecture for movable objects over the GSM system. In Proceedings of the SPIE Conference, Electronic Imaging, San Jose, California, January 21-26, 2001.

  85. Wen-Chen Hu, Yining Chen, Mark S. Schmalz, and Gerhard X. Ritter. An overview of World Wide Web search technologies. In Proceedings of the 5th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2001, pages 356-361, Orlando, Florida, July 22-25, 2001.

  86. Wen-Chen Hu, Yapin Zhong, Wei-Chuan Lin, and Jui-Fa Chen. An XML World Wide Web search engine using approximate structural matching. In Proceedings of the 5th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2001, pages 410-415, Orlando, Florida, July 22-25, 2001.

  87. Wen-Chen Hu, Kai H. Chang, and Gerhard X. Ritter. WebClass: Web document classification using modified decision trees. In Proceedings of the 38th Annual ACM Southeast Conference, pages 262-263, Clemson, South Carolina, April 2000.

  88. Wen-Chen Hu, Kai H. Chang, and Yapin Zhong. ApproxSeek: Web document search using approximate matching. In Proceedings of the 5th Joint Conference on Information Sciences, pages 320-323, Atlantic City, NJ, February 2000.

  89. Wen-Chen Hu, Mark S. Schmalz, and Gerhard X. Ritter. Image retrieval using the longest approximate common subsequences. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, pages 730-734, Florence, Italy, June 1999.

  90. Wen-Chen Hu, Mark S. Schmalz, and Gerhard X. Ritter. COQUINA: Content-queryable image and signal archive. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, pages 1009-1010, Florence, Italy, June 1999.

  91. Wen-Chen Hu, Gerhard X. Ritter, and Mark S. Schmalz. Approximating the longest approximate common subsequence problem. In Proceedings of the 36th Annual ACM Southeast Conference, pages 166-172, Marietta, Georgia, 1998.

  92. Wen-Chen Hu and Gerhard X. Ritter. A line string image representation for image storage and retrieval. In Proceedings of the IEEE International Conference on Multimedia Systems, pages 434-441, Ottawa, Canada, 1997.

  93. Mark S. Schmalz, Wen-Chen Hu, and Gerhard X. Ritter. Small-target detection in multispectral imagery with cyclic overlay processing. In Proceedings of the SPIE 2758 Conference, pages 64-76, June 1996.

  94. Mark S. Schmalz, Gerhard X. Ritter, Robert H. Forsman, Chyuan-Huei Yang, Wen-Chen Hu, Ryan A. Porter, Gary McTaggart, James F. Hranicky, and James F. Davis. Software requirements and support for image-algebraic analysis, detection, and recognition of small targets. In Proceedings of the SPIE 2496 Conference, pages 736-747, June 1995.

  95. Chyuan-Huei Yang, Mark S. Schmalz, Wen-Chen Hu, and Gerhard X. Ritter. Center-surround filters for the detection of small targets in cluttered multispectral imagery: Background and filter design. In Proceedings of the SPIE 2496 Conference, pages 637-648, June 1995.

  96. Mark S. Schmalz, Gerhard X. Ritter, Chyuan-Huei Yang, and Wen-Chen Hu. Center-surround filters for the detection of small targets in cluttered multispectral imagery: Analysis of errors and filter performance. In Proceedings of the SPIE 2496 Conference, pages 756-766, June 1995.

Patents

  1. Sanjaikanth E Vadakkethil Somanathan Pillai, Asma Syed Al Drees, and Wen-Chen Hu. Realtime racism detection system, September 08, 2024, Intellectual Property India.


Conference Keynote Speakers

  1. Wen-Chen Hu. Opportunities and challenges from the milestones of information technology (IT). The 24th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2020), Orlando, Florida, USA, September 13-16, 2020.

  2. Wen-Chen Hu. Contemporary smartphone computing research. The 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.

  3. Wen-Chen Hu. Engineering, technology, and applied science. The 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), Taipei, Taiwan, June 25-27, 2018.


Thesis/Dissertation/Graduate Projects Directed

  1. Begic, Amela (Data Science MS student since Fall 2022)

  2. Bemgal, Sampath (MS, Fall 2006)
    “A focused search using a topic-specific knowledge base for web-enabled mobile handheld devices”
    Rockwell Collins, Inc., Cedar Rapids, Iowa

  3. Bhatia, Aashish (MS student since Summer 2009)
    Research topic: “A location-aware recommender system for mobile shopping environments”

  4. Bui, Peter (MS student since Summer 2004)
    Research topic: “Detecting web page structure for adaptive viewing on small form factor devices”

  5. Chen, Liangzhou (MCSE exam option, Fall 1999)
    AT&T, San Diego, California

  6. Chen, Yining (MSwE, Fall 2001)
    “A visual XML syntax editor using XML structural information”
    Software development, Microsoft, Seattle, Washington

  7. Cheng, Liang (PhD student since Summer 2012)
    Research topic: “Using spatial trajectories to locate mobile objects”

  8. Cruz, Conrad (Data Science MS student since Fall 2021)

  9. Deshmukh, Ruchitha (MS, Summer 2014; nominal advisor; advised by Jianglong Zhang of Atmospheric Science)
    “Scientific data mining of Aerosol data”

  10. Dhandapani, Senthil (MS, Summer 2006)
    “Performance analysis and improvement for manufacturing execution systems”
    Infineon Technologies, Richmond, Virginia

  11. Du, Fangyan (MSwE, Spring 2001)
    “A web meta-search engine using a ranking algorithm based on a Markov model”
    Software development, Los Angeles, California

  12. E Vadakkethil Somanathan Pilla, Sanjaikanth (PhD student since Spring 2022)
    Research topic: “Privacy-preserving and secure mobile system for mobile misinformation identification and management”

  13. Fan, Hong (MSwE, Fall 2000)
    “A World Wide Web search engine using hyperlink structure to improve web searches”
    Texas Instruments, Dallas, Texas

  14. Gopalakrishnan, Anusha (MS, Spring 2009)
    “A mobile metasearch engine using a page analysis to enhance information retrieval and layout”

  15. Goter, Phillip Wagner (MS, Fall 2005)
    “Usage mining and recommender systems for the World Wide Web”
    Rockwell Collins, Inc., Cedar Rapids, Iowa

  16. He, Jun (DS MS student since Fall 2020)
    Research topic: “A prediction model for economic impacts from a pandemic”
    EERC (Energy & Environmental Research Center), Grand Forks, North Dakota

  17. Huang, Shi-Wei (MSwE, Spring 2001)
    “Relevance feedback technologies for World Wide Web information retrieval”
    Texas Instruments, Dallas, Texas

  18. Huang, Hsien-Lung (MSwE, Spring 2002)
    “Parallel computing in material resource planning (MRP)”
    Software engineer, Taipei, Taiwan

  19. Huang, Yanhui (MS, Summer 2002)
    “An XML World Wide Web search engine using an enhanced approximate tree embedding algorithm (EATEA)”
    PhD student of Statistics Department, University of Texas at Dallas

  20. Jain, Jhilmil (MSwE, Summer 2002)
    “Mining user backtracking behavior to improve website organization”
    User experience researcher, Digital Printing and Imaging, HP Labs, Palo Alto, California

  21. Jiang, Jun Justin (MS, Summer 2002)
    “An approximate structure matching method for an XML World Wide Web search engine”
    Infinity Insurance Company, Birmingham, Alabama

  22. Khan, Asad (MCSE, Winter 1999)
    “Access management of messaging and voice synthesis software”
    BellSouth Telecommunications, Atlanta, Georgia

  23. Kommera, Vanaja (MS, Summer 2004)
    “A location-aware recommender system for the mobile Internet”
    Software engineer, Intel Corporation, Chandler, Arizona

  24. Krishna, Varun (MS, Spring 2010)
    “A mobile World Wide Web search engine using page segmentation for browsing the search results”

  25. Kulkarni, Bharat (MS student since Fall 2011)
    Research topic: “Location-aware online map caching and prefetching for mobile handheld devices”

  26. Kulkarni, Rohit (MS student since Summer 2004)
    Research topic: “Efficient web browsing on handheld devices using page and form summarization”

  27. Kushnoor, Neeraj (MSwE, Fall 2002)
    “Information retrieval engine based on Huffman semi-static compression model”
    Kana Communications, New Jersey

  28. Li, Yu (MS, Spring 2002)
    “Discovery and an application of World Wide Web usage patterns”
    PhD student of Textile Engineering, Auburn University, Auburn, Alabama

  29. Liang, Huigang (MSwE, Fall 2001)
    “A URL-string-based algorithm for finding WWW mirror hosts”
    PhD student of Pharmacy, Auburn University, Auburn, Alabama

  30. Liu, Jianhui (MCSE, Summer 2000)
    “A web search engine using a data-classification neural network”
    Software development, Atlanta, Georgia

  31. Liu, Zhangmin (MS, Spring 2006)
    “Information retrieval using relevance feedback for the mobile Internet”
    Software development, ShopforT1.com, Utah

  32. Ma, Zhiqin Mark (MCSE, Summer 1999)
    “Study of audio information retrieval on the World Wide Web”
    Southern Company, Birmingham, Alabama

  33. Mugu, Swapna (MS student since Fall 2008)
    Research topic: “Use of RSS feeds for content adaptation in mobile Web browsing”

  34. Muthyala, Venkat (MS student since Spring 2004)
    Research topic: “Location dependent query processing for Internet-enabled mobile handheld devices”

  35. Myadam, Vivek (MS student since Summer 2004)
    Research topic: “Adapting content for wireless web service”

  36. Parimi, Rayudu (MS student since Fall 2012)
    Research topic: not set yet

  37. Patamarjarnkul, Attasith Som (MCSE, Spring 2000)
    “A customized web search engine using a tiny WebSQL query language”
    Software development, Los Angeles, California

  38. Pimple, Malvika (MS, Spring 2011)
    “A mobile World Wide Web search engine using implicit feedback”
    Software development, University of North Dakota, North Dakota

  39. Pulicherla, Ganesh (MS, Fall 2005)
    “An online geographical information system with web map service for distributed geospatial interoperability”
    Software development, New York City

  40. Raicha, Kalpesh (MS, Fall 2006)
    “Content delivery system and context-sensitive user interface for a web-enabled geographic information system”
    Software Engineer, The Thomson Corporation, Minneapolis, Minnesota

  41. Rao, Wei-Wei (MSwE, Summer 2002)
    “A World Wide Web usage mining system using an SQL-like mining language”

  42. Ren, Xiaojun (MSwE, Fall 2000)
    “World Wide Web search by mining the web’s link structure”
    General Motors, Milwaukee, Wisconsin

  43. Saiyos, Kuntaporn Karen (MSwE, Fall 2000)
    “WebGuess: A World Wide Web search engine for imperfect queries”
    Nortel Networks Limited, Dallas, Texas

  44. Sheng, Shih-Hsiung Andrew (MSwE, Fall 2000)
    “A World Wide Web metasearch engine using a page quality ranking algorithm”
    Software development, Taipei, Taiwan

  45. Shiu, Jiun-Hau Howard (MSwE, Spring 2001)
    “A World Wide Web difference machine for tracking and viewing changes of web documents”
    Software development, Taipei, Taiwan

  46. Singh, Rahul (MS, Summer 2008)
    “Design and implementation of the Web-enabled Sun, Earth, and Moon systems (SEMS)”
    Web developer, Inergize Digital Media, Minneapolis, Minnesota

  47. Sun, Jiafei (MSwE, Spring 2001)
    “World Wide Web information retrieval using web connectivity information”
    Software development, New York City

  48. Sun, Shuguang Michael (MS, Fall 2002)
    “A multi-functional and scalable World Wide Web crawler”
    EPL, Inc., Birmingham, Alabama

  49. Sun, Xiaopeng Tina (MCSE, Spring 2000)
    “A web query system using a SQL-like query language”
    Agilent Technologies, Santa Rosa, California

  50. Svidzinska, Ruslana (MSwE, Spring 2001)
    “A World Wide Web meta search engine using an automatic query routing algorithm”
    Software development, Madison, Wisconsin

  51. Tao, Yibing Martin (MS, Summer 2001)
    “Web site usage analysis, personalization, and caching based on an HPG model”
    MicroSoft Corporation, Seattle, Washington

  52. Thakur, Anupam (MS student since Spring 2007)
    Research topic: “Enhancing mobile web access using intelligent recommendations”

  53. Tian, Lin (MS, Spring 2001)
    “A customizable World Wide Web spider using heuristic metrics and regular expressions”
    Software development, North Carolina

  54. Wang, Kuang-Hsu (MS, Summer 2024)
    “Using libEmsemble to enhance numerical ice-sheet flow simulations”

  55. Wang, Shih-Yuan Charles (MCSE, Winter 2000)
    “A web-based mineral database system with automatic web mineral information collection”
    Software development, Los Angeles, California

  56. Wang, Xiwei (MS, Fall 2016)
    “Design and Development of the Projects and Loans Management System (PALMS) for the Water Infrastructure Finance Authority of Arizona (WIFA)”

  57. Xu, Feng (MSwE, Summer 2002)
    “A World Wide Web usage mining system using a sequence discovery algorithm”
    Software engineer, Northrop Grumman Corporation

  58. Zeng, Fuling (MCSE, Winter 2000)
    “Content-based video retrieval using object motion path”
    Infinity Insurance Company, Birmingham, Alabama

  59. Zhang, Yi Gloria (MCSE, Summer 2000)
    “A prototype web search engine using tag search and relevance feedback”
    Eastman Kodak Company, Rochester, New York

  60. Zhong, Yapin (MCSE, Winter 2000)
    “Study of image collection, classification and retrieval on the World Wide Web”
    Professor, Computer Information Engineering Center of SIPES, China

  61. Zhou, Xianghua (MSwE, Fall 2000)
    “A World Wide Web metasearch engine with clustered search results”
    Software development, San Jose, California

  62. Zhu, Yufang (MS, Summer 2001)
    “An SQL-like query language for World Wide Web information retrieval”
    Software development, Dallas, Texas

  63. Yin, Hong (MSwE, Summer 2001)
    “Web search context management using JavaScript/Cookie and JSP/database technologies”
    Intergraph, Huntsville, Alabama

  64. Zhang, Qiang (MS, Fall 2006)
    “Data consolidation and importing software for Microsoft Dynamic GP performance tests”
    Microsoft Dynamic GP, Fargo, North Dakota


Graduate Committee Services

  1. Ahamed, Md. Maruf (PhD, Fall 2021; major professor: Dr. Saleh Faruque; department: Electrical Engineering)
    “Design an advanced antenna system and adaptive higher-order cell-sectorization for the RF coverage planning of 5G networks and beyond”

  2. Aissou, Ghilas (PhD student since Fall 2022; major professor: Naima Kaabouch; department: Electrical Engineering)
    Research topic:

  3. Ajjimaporn, Pann (MS, Spring 2019; major professor: Dr. Emanuel Grant)
    “Evolution of object-oriented methods from the reverse engineering of programming code”

  4. Akhbardeh, Farhad (PhD student since Spring 2018; major professor: Dr. Travis Desell)
    Research topic: “Applying recurrent neural networks to damaged powerline detection”

  5. Akula, Shravan Kumar (PhD student since Fall 2022; major professor: Dr. Hossein Salehfar; department: Electrical Engineering)
    Research topic: “Energy management systems for a smart grid with comprehensive reliability and risk analysis”

  6. Amin, Md. Nurul (MS, Spring 2020; major professor: Dr. Ron Marsh)
    “Removal of blocking artifacts from JPEG-compressed images using a neural network”

  7. Anandhan, Arthi (MS, Summer 2007; major professor: Dr. Hassan Reza)
    “Usability testing of a web based system using CARE”
    Cisco System Inc., Dallas, Texas

  8. Apostal, David (PhD student since Fall 2014; major professor: Dr. Travis Desell)
    Research topic: “An optimization approach for application in heterogeneous computer architectures”

  9. Apu, Mohammad S. (MS student since Fall 2012; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    Research topic: “Biological effects associated with terahertz radiation”

  10. Arinaitwe, Mark (MS, Spring 2023; major professor: Dr. Hassan Reza)
    “Towards specifying and evaluating the trustworthiness of an AI-enabled system”

  11. Arinaitwe, Mark (PhD student since Spring 2024; major professor: Dr. Hassan Reza)
    Research topic: “Evaluating the trustworthiness of AI-enabled systems”

  12. Asobie, Okechukwu Bartholomew (PhD student since Spring 2013; major professor: Dr. Hassan Reza)
    Research topic: “Cyber security for power grid”

  13. Au, Ching-Feng Eric (MCSE, Summer 2000; major professor: Dr. Kai H. Chang)
    “On-line admission system for Auburn University graduate school”
    Graduate School, Auburn University, Auburn, Alabama

  14. Azizi, Haleh (MS, Spring 2021; major professor: Hassan Reza)
    “Developing a machine learning based approach fpr fractured zone detection by using petrophysical logs”

  15. Bansal, Benu (PhD student since Fall 2021; major professor: Dr. Junguk Hur; department: Biomedical Science)
    Research topic: “Data analysis using AI for biomedical research”

  16. Baurceanu, Daniel (MS student since Spring 2024; major professor: Dr. Hassan Reza)
    Research topic: “Improving the ease of software testing”

  17. Boucha, John Allen (MS, Summer 2011; major professor: Paul Hardersen; department: Space Studies)
    “Space studies for the iPad: Using technology to increase public knowledge and interest in space topics”

  18. Castro, Karen Joyce (MS student since Fall 2012; major professor: Dr. Emanuel Grant)
    Research topic: “Model transformation from Z to object Z specification”

  19. Chatterjee, Abir (MS, Spring 2008; major professor: Dr. Thomas Wiggen)
    “Adaptive routing algorithm design using genetic algorithm for unmanned aerial vehicle (UAV)”

  20. Chatterjee, Amrita (MS, Summer 2014; major professor: Dr. Hassan Reza)
    “Translation of AADL to PNML to ensure the utilization of Petri Nets”

  21. Chennamaneni, Rajani (MS, Fall 2005; major professor: Dr. Emanuel Grant)
    “Comparison and evaluation of methodologies for transforming UML class diagram models to object-relational database systems”
    Software development, San Antonio, Texas

  22. Collings, Jacob (MS student since Fall 2014; major professor: Jun Liu)
    Research topic: “Packet tagging for policy enforcement in distributed software-defined networks”

  23. Daley, Kaden (PhD student since Fall 2010; major professor: Dr. Emanuel Grant)
    Research topic: “A comparative analysis to validate the benefits of formal versus informal software model transformation”

  24. Dungo, Matthew (MS student since Spring 2012; major professor: Dr. Emanuel Grant)
    Research topic: “Software engineering and databases”

  25. El Jamiy, Fatima (PhD, Spring 2022; major professor: Dr. Ron Marsh)
    “Efficient distance accuracy estimation of real-world environments in virtual reality head-mounted displays”

  26. El Mrabet, Zakaria (PhD student since Spring 2018; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    Research topic: “Cyber security in smart grid and cognitive radio networks”

  27. ElSaid, AbdElRahman Ahmed (MS, Fall 2016; major professor: Dr. Travis Desell)
    “Using long-short-term-memory recurrent neural networks to predict aviation engine vibrations”

  28. Foerster, Kyle (EE PhD student since Fall 2024; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    Research topic: “Artificial intelligence for unmanned aerial vehicle”

  29. Gasimova, Aydan (MS, Fall 2022; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “A machine learning-based comparison for detecting GPS spoofing attacks targeting unmanned aerial vehicles (UAVs)”

  30. Ghosh, Debabrata (PhD, Fall 2015; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “A high resolution imaging algorithm for small satellites”

  31. Goehner, Kyle (MS, Summer 2015; major professor: Dr. Travis Desell)
    “Reducing scientist workload with computer vision and background subtraction”

  32. Gorji, Hamed Taheri (PhD student since Spring 2020; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    Research topic: “Early detection of Alzheimer's disease using artificial intelligence”

  33. Goyal, Sanchit (MS student since Fall 2010; major professor: Dr. Eunjin Kim)
    Research topic: “Fuzzy relational interval computing based human emotion classification for music recommendation system”

  34. Gu, Feifei (MS student since Spring 2009; major professor: Dr. Hassan Reza)
    Research topic: “Using time Petri nets to verify and validate the model of AADL”

  35. Harley, Brian (PhD student since Fall 2024; major professor: Dr. Hassan Reza)
    Research topic: “Enhancing AI virtual assistants through dynamic knowledge graphs, reinforcement learning, human-in-the-loop feedback mechanisms, and addressing key technical challenges”

  36. He, Wei (MSwE, Fall 2000; major professor: Dr. Homer Carlisle)
    “Introduction of Enterprise JavaBeans and its application to implement a customer service tracking system”

  37. Helps, Washington (MS, Spring 2013; major professor: Dr. Emanuel Grant)
    “A framework for the integration of technology into curricula development and student assessment”

  38. Hicks, Jason (MS, Fall 2020; major professor: Dr. Emanuel Grant)
    “Automation and visualization of program correctness for automatically generated code”

  39. Hou, Haiyu (MS, Spring 2002; major professor: Dr. Gerry V. Dozier)
    “Artificial immunity for computer network with constraint-based detector”

  40. Huber, Justin (MS student since Spring 2013; major professor: Dr. Hassan Reza)
    Research topic: “Testing and validation of a dual-computer small spacecraft”

  41. Hussain, Akhtar (PhD student since Fall 2023; major professor: Dr. Eunjin Kim)
    Research topic: “Knee osteoarthritis classification: A fusion of deep transfer learning and federated learning approaches”

  42. Isie, David (Data Science MS, Fall 2023; major professor: Dr. Hassan Reza)
    “Application of blockchain technology & integration of differential privacy: issues in e-health domains”

  43. Islam, Md Shafiul (PhD, Summer 2016; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “Microcalcifications detection using image and signal processing techniques for early detection of breast cancer”

  44. Jaganathan Manonmani, Arun (CS PhD student since Spring 2024; major professor: Dr. Hassan Reza)
    “The role of microservice software architecture in integrating blockchain systems and the Internet of things working in edge computing”

  45. Jalal, Sara Faraji (PhD, Spring 2020; major professor: Dr. Ronald Marsh)
    “Improving numerical reproducibility of scientific software in parallel systems”

  46. Jones, Kencoy (MS student since Spring 2020; mjaor professor: Dr. Emanuel Grant)
    Research topic: “Proving the correctness of a UML class diagram for a flight reservation system using OCL formal specification”

  47. Korvald, Christoffer (MS, Fall 2014; major professor: Dr. Hassan Reza)
    “Automated usability testing of websites using link structure”

  48. Kumar, Ronal (PhD student since Summer 2024; major professor: Dr. Jun Liu)
    Research topic: “Integration of network and edge and system architecture in the supercomputing system”

  49. Lande, Suhas (MS, Spring 2009; major professor: Dr. Jun Liu)
    “Developing a user-space semi-reliable transport toolkit for supporting the timely delivery of delay-sensitive streaming media”

  50. Li, Qingfeng (MSwE, Summer 2002; major professor: Dr. Homer Carlisle)
    “Peer to peer technology and project JXTA”

  51. Liang, Yun-Chia (PhD, Spring 2002; major professor: Dr. Alice E. Smith; department: Industrial and Systems Engineering; outside reader)
    “Ant colony optimization approach to combinatorial problems”
    IBM

  52. Lin, Jackson K. (MSwE, Summer 2002; major professor: Dr. Kai H. Chang)
    “Web-based software integration for training and skill assessment tools with the university information technology exams”

  53. Lin, Yuehua Jane (MS, Fall 2002; major professor: Dr. Juan E. Gilbert)
    “Online advertising models: new approaches and effectiveness study”

  54. Liu, Bing (MS student since Spring 2012; major professor: Dr. Jianglong Zhang; department: Atmospheric Sciences)
    “Satellite multi-sensor analysis of aerosol retrievals over global ocean using MISR, SeaWiFS and POLDER”

  55. Liu, Yuqing (MCSE, Spring 1999; major professor: Dr. Homer Carlisle)
    “Performance study of the CORBA multi-threaded ORB architecture in VisiBroker 3.3”

  56. Ma, Jinghai (MSwE, Summer 2001; major professor: Dr. Kai H. Chang)
    “Software integration for Auburn University computer course COMP 1000”
    Infinity Insurance Company, Birmingham, Alabama

  57. Maan, Raghuveer S. (MS, Summer 2005; major professor: Dr. Ron Marsh)
    “An adaptive grid security architecture”

  58. Mahmoud, Mohammed (PhD, Fall 2018; major professor: Dr. Hassan Reza)
    “Developing a new storage format and a warp-based SpMV kernel for configuration interaction sparse matrices on the GPU”

  59. Manesh, Mohsen Riahi (PhD, Fall 2019; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “Performance analysis of machine learning algorithms in detecting cyber attacks targeting automatic dependent surveillance-broadcast (ADS-B) systems”

  60. Mishra, Lalan (PhD student since Spring 2023; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    Research topic: “Wireless spectrum utilization in UAS command and control (C2)”

  61. Mishra, Saroj (MS, Summer 2022; major professor: Hassan Reza; school: Electrical Engineering and Computer Science)
    “A face recognition method using deep learning to identify mask and unmask objects”

  62. Mohan, Jaya Preethi (MS, Fall 2023; major professor: Prakash Ranganathan; school: Electrical Engineering and Computer Science)
    “GPS anomaly detection and machine learning models for precise unmanned aerial systems navigation”

  63. Moncayo, Hector Ivan Reyes (PhD, Fall 2014; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “Bayesian modeling for dealing with uncertainty in cognitive radios”

  64. Morgan, Kayanna (PhD student since Fall 2022; major professor: Dr. Eunjin Kim; school: Electrical Engineering and Computer Science)
    Research topic: “Evaluating linemates and complementary personality types in games”

  65. Muniyappa, Chandrashekar (PhD student since Fall 2023; major professor: Dr. Eunjin Kim; school: Electrical Engineering and Computer Science)
    Research topic: “Neuromodulated meta-learning transformer neural networks for continual learning”

  66. Nyakundi, Nicholas (PhD student since Fall 2021; major professor: Dr. Hassan Reza; school: Electrical Engineering and Computer Science)
    Research topic: “Development of effective safety assessment capable of measuring the safety of AI-based system”

  67. Ofor, Ogonnaya (PhD student since Spring 2013; major professor: Dr. Hassan Reza)
    Research topic: “Cloud and mobile computing with security”

  68. Poudel, Biswo N. (MS, Summer 2001; major professor: Dr. Richard O. Chapman)
    “Scheduling in resource-constrained environment”
    Ph.D. student, Rice University

  69. Qin, Haoyu (MCSE, Summer 2000; major professor: Dr. Kai H. Chang)
    “Design and implementation of database and graphic user interface”

  70. Quadri, Adnan (MS, Summer 2018; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “A channel ranking and selection scheme based on channel occupancy and SNR for cognitive radio systems”

  71. Rahman, Md. Saifur (PhD, Summer 2023; major professor: Dr. Hassan Reza)
    “A hybrid deep neural network model to forecast day-ahead electricity prices in the USA energy market”

  72. Ramaseri Chandra, Ananth (PhD student since Spring 2019; major professor: Dr. Hassan Reza)
    Research topic: “A machine learning approach towards quality attributes in virtual reality systems”

  73. Ramchandra, Akshay Ram (CS MS, Fall 2023; major professor: Dr. Prakash Ranganathan; department: Electrical Engineering)
    “Anomaly detection and trajectory prediction models for ADS-B data sets”

  74. Rana, Rahul (MCSE, Summer 1999; major professor: Dr. Homer Carlisle)
    “Implementation of a data driven application using the distributed internet applications (DNA) architecture”

  75. Reynolds, Shawn (PhD student since Summer 2024; major professor: Dr. Hassan Reza; department: Computer Science)
    Research topic: “Blockchain interoperability”

  76. Rupela, Varun (MS, Spring 2002; major professor: Dr. Gerry V. Dozier)
    “Parallel and distributed evolutionary computations for multimodal function optimization problems”

  77. Serrano, Ivy Joy (MS student since Fall 2012; major professor: Dr. Emanuel Grant)
    Research topic: “Implementation of the framework for the software engineering education”

  78. Shaaban, Rana (PhD, Summer 2021; major professor: Dr. Saleh Faruque; department: Electrical Engineering; member-at-large)
    “Visible light communication cyber security vulnerabilities for indoor and outdoor vehicle-to-vehicle communication”

  79. Shahabi, (Seyed)Mojtaba (PhD student since Spring 2021; major professor: Dr. Hassan Reza; department: Computer Science)
    Research topic: “Blockchain in electronic medical records (EMRs)”

  80. Shelley, Seelan (MS student since Spring 2003; major professor: Dr. Eunjin Kim)
    “Knowledge discovery in ectopic pregnancy data using decision tree and fuzzy relation”

  81. Shrestha, Binisha (MS, Fall 2020; major professor: Dr. Emanuel Grant)
    “Modelling of a microgrid using Z notation”

  82. Sinitsin, Oleg (MS, Spring 2000; major professor: Dr. Homer Carlisle)
    “Jini technology is a breakthrough in dynamic distributed computing”
    Software development, Dallas, Texas

  83. Skurdal, Anton (MS, Summer 2024; major professor: Prakash Ranganathan)
    “ADS-B integrity identification using machine learning models”

  84. Song, Jiansheng (MSwE, Summer 2002; major professor: Dr. Homer Carlisle)
    “Introduction to SASH technology and its application”
    PhD student, School of Civil Engineering, Purdue University

  85. Song, Ke (MSwE, Spring 2002; major professor: Dr. Homer Carlisle)
    “Using J2ME and XML in wireless application”

  86. Sriram, Subramaniam (MS, Fall 2015; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “A real time radio spectrum scanning technique based on the Bayesian model and its comparison with the frequentist technique”

  87. Subash Chandar, Barathwaja (CS MS, Fall 2023; major professor: Dr. Prakash Ranganathan; department: Electrical Engineering)
    “Benchmarking federated learning frameworks for aviation network data”

  88. Talaei Khoei, Tala (PhD, Fall 2023; major professor: Dr. Naima Kaabouch; department: Electrical Engineering)
    “Performance analysis of data-driven algorithms in detecting intrusions on smart grid”

  89. Tedla, Krishna Mohan (MS, Fall 2004; major professor: Dr. Emanuel Grant)
    “Application of object-oriented domain analysis and design in the model driven architecture framework”

  90. Udoidiok, Ifiok (MS student since Spring 2024; major professor: Dr. Jielun Zhang)
    Research topic: “Artificial intelligence in networking analytics, network security, and cybersecurity”

  91. Vijayan, Vedhanarayanan (MS, Spring 2000; major professor: Dr. Homer Carlisle)
    “Scalability measures of an EJB container in a multi-threaded, and a persistent environment”

  92. Wang, Yiwei (MCSE, Winter 2000; major professor: Dr. Homer Carlisle)
    “Implementation of a distributed application using Jini technology”
    Software development, Atlanta, Georgia

  93. Xiang, Menglan (PhD, Spring 2019; major professor: Dr. Ke Zhang; department: Pathology)
    “Understanding the molecular and cellular functions of odd-skipped related 1 in outflow tract development”

  94. Yachb, Muneer (MS, Summer 2001; major professor: Dr. Homer Carlisle)
    “PDAs revolutionizing the mobile world”

  95. Yang, Xiangdong (MSwE, Summer 2001; major professor: Dr. Homer Carlisle)
    “Web-WAP with JSP and XML”
    Intergraph, Huntsville, Alabama

  96. Yao, Qiang (MSwE, Fall 2000; major professor: Dr. Kai H. Chang)
    “Study of RP&M and implementation of the software for general part fabrication”

  97. Yu, Xuan (MS, Spring 2002; major professor: Dr. Alvin S. Lim)
    “Implementation of lookup service protocols for self-organizing sensor networks”

  98. Zhang, Chen (MCSE, Summer 2000; major professor: Dr. Sanjeev Baskiyar)
    “Scheduling DAGs onto multiple processors using message-passing”
    Software development, New Jersey

  99. Zhao, Chunmei (MCSE, Summer 1999; major professor: Dr. Homer Carlisle)
    “Study of XML and implementation of web database using XML and Java Servlet”
    CSX Corporation, Jacksonville, Florida

  100. Zhao, Lun (MS, Summer 2024; major professor: Dr. Bo Liang)
    “High performance simulation of astrocyte morphology and dynamics for brain imaging”


Undergraduate Senior Project Advising

  1. Larson Danes (Fall 2017 - Spring 2018)
    Research topic: “Tox21 Enricher: Web-based chemical and functional enrichment analysis tool for Tox21 toxicity screening platform”
    Agency: SMHS, UND; supervisor: Junguk Hur

  2. Zach Harrington (Fall 2016 - Spring 2017)
    “Customer portal for Steffes GETS”
    Agency: Steffes

  3. Changwoo Lee and Christopher Santana (Fall 2016 - Spring 2017)
    “Connecting people on the move”

  4. Fuad Mohamoud and Elvin Gateri (Fall 2017 - Spring 2018)
    Research topic: “Nutrition application”
    Agency: BERC, UND; supervisors: Kouhyar Tavakolian and Francis Vala

  5. Madison Diemert, Micah Nelson, Kristin Opheim, and Adam Stroh (Spring 2019)
    Research topic: “Design and implementation of an ordering system by using React (JavaScript), Ruby on Rails, and MySQL”
    Agency: Bio-Techne; supervisor: Michael Mann, Chemical Engineering, University of North Dakota

  6. Mohamed Said (Spring 2019)


Professional Activities

Institutional Services

  1. Full graduate faculty member. The Graduate School, University of North Dakota, October 2002 - present.

  2. Undergraduate committee member. School of Electrical Engineering and Computer Science, College of Engineering and Mines, University of North Dakota, September 2008 - August 2013, January 2017 - December 2018, and September 2021 - May 2023.

  3. Committee member. Tenure and Promotion Committee, School of Electrical Engineering and Computer Science, College of Engineering and Mines, University of North Dakota, September 2019 - May 2020.

  4. Committee member. Bylaws Committee, School of Electrical Engineering and Computer Science, College of Engineering and Mines, University of North Dakota, September 2020 - December 2020.

  5. Committee member. Data-Science Instructor Search Committee, School of Electrical Engineering and Computer Science, College of Engineering and Mines, University of North Dakota, December 2020 - May 2021.

  6. Group member. Data Core Advisory and Working Group, University of North Dakota, September 2020 - December 2020.

  7. Graduate committee member. School of Electrical Engineering and Computer Science, College of Engineering and Mines, University of North Dakota, December 2018 - May 2021.

  8. Committee member. Tenure and Promotion Committee, College of Engineering and Mine, University of North Dakota, October 2020 - December 2020.

  9. Graduate committee member. Department of Computer Science, University of North Dakota, September 2002 - December 2018.

  10. Personnel committee member. Department of Computer Science, University of North Dakota, September 2012 - August 2017 and September 2018 - December 2018.

  11. Committee member. Search Committee of the SEECS (School of Electrical Engineering and Computer Science) Director, College of Engineering and Mines, University of North Dakota, 2018.

  12. Organizing committee member. Midwest Instruction and Computing Symposium (MICS 2015), Department of Computer Science, University of North Dakota, April 10-11, 2015.

  13. Committee member. Presidential Ad Hoc Committee on Promotions, University of North Dakota, October 2013 - September 2014.

  14. Committee member. Tenure and Promotion Committee, John D. Odegard School of Aerospace Science, University of North Dakota, 2006 and 2011.

  15. Chair. Engineering and Technology Subcommittee, Faculty Research Seed Money, Senate Scholarly Activities Committee, University of North Dakota, 2010.

  16. Advisory committee member. Center for Instructional and Learning Technologies (CILT), University of North Dakota, October 2004 - August 2013.

  17. Committee member. Engineering and Technology Subcommittee, Faculty Research Seed Money, Senate Scholarly Activities Committee, University of North Dakota, 2004.

  18. Committee member. E-Day Program, College of Engineering, Auburn University, 1999-2002.

Conference Chairs

  1. The 2019 International Conference on Engineering and Natural Science-Bangkok (ICENS 2019), March 15-17, 2019, The Landmark Bangkok, Bangkok, Thailand.

  2. The 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), June 25-27, 2018, The Grand Hotel Taipei, Taipei, Taiwan.

  3. The 2018 International Conference on Engineering and Natural Science (ICENS 2018), January 30 - February 01, 2018, Sapporo, Hokkaido, Japan.

  4. The 2017 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2017), November 7-9, 2017, Fukuoka, Japan.

  5. The 2017 International Conference on Engineering and Natural Science – Summer Session (ICENS-Summer 2017), August 23-25, 2017, Sapporo, Japan.

  6. The 2017 International Conference on Engineering and Natural Science (ICENS 2017), January 19-21, 2017, Bali, Indonesia.

  7. The 2016 International Conference on Engineering, Technology, and Applied Science – Fall Session (ICETA-Fall 2016), Seoul Olympic Parktel, Seoul, Korea, November 7-9, 2016.

  8. The 2016 International Conference on Big Data, IoT, and Cloud Computing (BIC 2016), Chiang Mai, Thailand, August 23-25, 2016.

  9. The 2016 International Conference on Engineering and Natural Science – Summer Session (ICENS-Summer 2016), Kyoto, Japan, July 12-14, 2016.

  10. The 2nd International Conference on Business and Internet (ICBI 2016), Taipei, Taiwan, April 22-24, 2016.

  11. The 2nd International Conference on Engineering, Technology, and Applied Science (ICETA 2016), Taipei, Taiwan, April 22-24, 2016.

  12. The 3rd International Conference on Engineering and Natural Science (3rd ICENS), Bangkok, Thailand, January 19-21, 2016.

  13. The 2015 International Conference on Engineering, Technology, and Applied Science—Fall Session (ICETA 2015-Fall), Nagoya Congress Center, Nagoya, Japan, November 10-12, 2015.

  14. The 2015 International Conference on Big Data, IoT, and Cloud Computing (BIC 2015), Osaka, Japan, August 23-25, 2015.

  15. The 2nd International Conference on Engineering and Natural Science (ICENS 2nd), Tokyo, Japan, July 22-24, 2015.

  16. The 2015 Macau Conference on Engineering, Technology, and Applied Science (CETA 2015), Sheraton Macao Hotel, Macau, July 7-9, 2015.

  17. International Conference on Engineering, Technology, and Applied Science (ICETA 2015), Taipei, Taiwan, April 22-24, 2015.

  18. International Conference on Business and Internet (ICBI 2015), Taipei, Taiwan, April 22-24, 2015.

  19. The 2015 International Conference on Engineering and Natural Science (ICENS 2015), Bangkok, Thailand, January 21-23, 2015.

Journal Editors-in-Chief

  1. Wen-Chen Hu, Editor-in-Chief. Journal of Information Technology Research (JITR), ISSN: 1938-7857, EISSN: 1938-7865, DOI: 10.4018/JITR, inaugural issue: 2008. The Journal of Information Technology Research (JITR) presents comprehensive interdisciplinary and refereed research on the most emerging and breakthrough areas of information science and technology. August 2023 - present.

  2. Wen-Chen Hu, Editor-in-Chief. International Journal of Handheld Computing Research (IJHCR), ISSN: 1947-9158, EISSN: 1947-9166, inaugural issue: January-March 2010. The International Journal of Handheld Computing Research provides a forum for scholars, researchers, and practitioners to discuss and examine the current status and future trends of handheld computing. January 2010 - December 2017.

  3. Member, Interim Editor-in-Chief Board. IGI Global. April 2022 - present.

Journal Editors and Reviewers

  1. Editorial board member. International Journal of Geo-Spatial Knowledge and Intelligence (GSKI), April 01, 2017 - present.

  2. Reviewer. Journal of Computer Science Applications and Information Technology (JCSAIT), Symbiosis, August 01, 2016 - present.

  3. Editorial board member. Journal of Wireless Communications (JoWC), ISSN: 2377-3308, November 01, 2015 - present.

  4. Associate editor. International Journal of Virtual Communities and Social Networking (IJVCSN), ISSN: 1942-9010, EISSN: 1942-9029, May 01, 2009 - present.

  5. Editorial review board member. Information Resources Management Journal (IRMJ), ISSN: 1040-1628, EISSN: 1533-7979, May 1, 2008 - present.

  6. Associate editor. Journal of Information Technology Research (JITR), ISSN: 1938-7857, EISSN: 1938-7865, October 3, 2007 - July 31, 2023.

  7. Editorial advisory board member. Contemporary Management Research (CMR), ISSN 1813-5498, July 2005 - present.

  8. Editorial review board member. International Journal of E-Business Research (IJEBR), ISSN: 1548-1131, EISSN: 1548-114X, February 1, 2004 - present.

  9. Editorial advisory board member. International Journal of Cases on Electronic Commerce (IJCEC), ISSN: 1548-0623, EISSN: 1548-0615, January 2004 - present.

  10. Guest editor. Thematic series on Knowledge-Based Big Data Management in Cloud Computing Environments, Journal of Big Data, 2015.

  11. Editorial review board member. International Journal of Virtual Communities and Social Networking (IJVCSN), ISSN: 1942-9010, EISSN: 1942-9029, July 1, 2008 - April 30, 2015.

Book Editors

  1. Editorial advisory board member. Encyclopedia of Organizational Knowledge, Administration, and Technologies, 1st edition, Mehdi Khosrow-Pour, editor, IGI Global, 2018 - present.

  2. Editorial advisory board member. Encyclopedia of E-business Development and Management in the Global Economy, ISBN: 16152-06116, October 01, 2008 - present.

  3. International advisory board member. Encyclopedia of Information Science & Technology, ISBN: 15914-0553X, January 2008 - present.

  4. Editorial advisory board member. Encyclopedia of E-Commerce Development, Implementation, and Management, IGI Global, 2015.

  5. Editorial advisory board member. Security, Privacy, and Digital Forensics in the Cloud, Wiley and Higher Education Press, 2015.

  6. Handbook co-editor. Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, ISBN: 1-466-66571-8, IGI Global, 2014.

  7. Book editor. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN: 1-466-64715-9, IGI Global, 2014.

  8. Editorial advisory board member. Integrating Social Media into Business Practice, Applications, Management, and Models, IGI Global, Summer 2014.

  9. Editorial advisory board member. Integrating RFID Technology Integration for Business Performance Improvement, IGI Global, Summer 2014.

  10. Editorial board member. Recent Advances in Communications and Networking Technology, November 01, 2013 - January 10, 2014.

  11. Book co-editor. Big Data Management, Technologies, and Applications, IGI Global, 2013.

  12. Book co-editor. Mobile and Handheld Computing Solutions for Organizations and End-Users, ISBN: 1-466-62785-9, IGI Global, 2012.

  13. Book co-editor. Sustainable ICTs and Management Systems for Green Computing, ISBN: 1-466-61839-6, IGI Global, 2012.

  14. Book co-editor. Energy-Aware Systems and Networking for Sustainable Initiatives, ISBN: 1-466-61842-6, IGI Global, 2012.

  15. Book editor. Emergent Trends in Personal, Mobile, and Handheld Computing Technologies, ISBN: 1-466-60921-4, IGI Global, 2012.

  16. Editorial advisory board member. Wireless Network Security: Theories and Applications, Springer, September 27, 2010 to present.

  17. Book co-editor. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, ISBN: 1-615-20761-9, September 2008 - September 2009.

  18. Book editor. Selected Readings on Electronic Commerce Technologies: Contemporary Applications, ISBN: 1-605-66097-3, 2008.

  19. Editorial review board member. Advances in E-Business Research Book Series, In Lee, editor, January 01, 2007 - December 31, 2008.

  20. Editorial advisory board member. Encyclopedia of Computer Programming Languages, Zongmin Ma and Hongji Yang, editors, November 2006 - May 31, 2007.

  21. Book co-editor. Advances in Security and Payment Methods for Mobile Commerce, ISBN: 1-591-40345-6, Idea Group Publishing, 2004 - 2005.

Conference Proceeding Editors

  1. Conference co-editor and technical program committee member. The International Conference on Geoinformatics (ICG 2016), Suzhou, China, October 15-16, 2016.

  2. Proceeding co-editor. Proceedings of the 48th Annual Midwest Instruction and Computing Symposium (MICS 2015), Grand Forks, North Dakota, April 10-11, 2015.

  3. Proceeding co-editor. Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007.

Conference Session Chairs

  1. Session chair. The IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS’24), University of North Dakota, Grand Forks, North Dakota, October 28-29, 2024.

  2. Session chair. The 19th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2021), Kanazawa, Japan, June 20-22, 2021.

  3. Session co-chair. Information, Communication and Network Systems, Technologies and Applications Session, The 19th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2015), Orlando, Florida, USA, July 12-15, 2015.

  4. Session co-chair. Information Systems, Technologies and Applications / Human Information Systems Session, The 17th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2013), Orlando, Florida, USA, July 9-12, 2013.

  5. Session co-chair. Communication and Network Systems, Technologies and Applications Session, The 16th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2012), Orlando, Florida, USA, July 17-20, 2012.

  6. Track co-chair. The Ontologies, Semantic Web, and Web Services Track, The International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009), Fukuoka, Japan, March 16 - March 19, 2009.

  7. Track co-chair. Track of Semantic Web, The 2007 Information Resources Management Association (IRMA 2007) International Conference, Vancouver, Canada, May 19-23, 2007.

  8. Session chair. The 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007.

  9. Session chair. The 2006 Information Resources Management Association (IRMA 2006) International Conference, Washington, D. C., May 21-24, 2006.

  10. Session co-organizer. Special Session on Medical Imaging and Image Analysis/Indexing/Retrieval, The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), Orlando, Florida, July 14-18, 2002.

  11. Session co-organizer. Special Session on Medical Imaging and Image Analysis/Indexing/Retrieval, The 5th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, July 22-25, 2001.

  12. Session chair. The 5th International Conference on Computer Science and Informatics (CS&I 2000), Atlantic City, New Jersey, February 27 - March 3, 2000.

  13. Session organizer. Special Session on Image, Video, Audio Content Analysis and Indexing/Retrieval, The 1st International Workshop on Intelligent Multimedia Computing and Networking (IMMCN 2000), Atlantic City, New Jersey, February 27 - March 3, 2000.

Conference Committee Members

  1. Program committee member. The 19th International Conference on E-Service and Knowledge Management (ESKM 2024-Winter) in conjunction with IIAI AAI 2024-Winter Congress, Saigon Prince Hotel, Ho Chi Minh, Vietnam, December 16-18, 2024.

  2. Program committee member. The 28th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2024-Winter), Taichung, Taiwan, December 4-6, 2024.

  3. Program committee member. The 9th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2024), Nice, France, November 3-7, 2024.

  4. Technical program committee member. The IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS’24), University of North Dakota, Grand Forks, North Dakota, October 28-29, 2024.

  5. Program committee member. The 9th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science (BCD 2024-Summer), Kitakyushu, Japan, July 16-18, 2024.

  6. Program committee member. The 24th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2024-Summer I), Shanghai, China, July 7-9, 2024.

  7. Program committee member. The 18th International Conference on E-Service and Knowledge Management (ESKM 2024) in conjunction with IIAI AAI 2024 Congress, Takamatsu, Japan, July 6-12, 2024.

  8. Program committee member. The 22nd IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2024), Honolulu, Hawaii, USA, May 30 - June 01, 2024.

  9. Program committee member. The 10th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2024), Angers, France, May 2-4, 2024.

  10. Program committee member. The 8th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2023), Ho Chi Minh City, Vietnam, December 14-16, 2023.

  11. Program committee member. The 17th International Conference on E-Service and Knowledge Management (ESKM 2023-Winter) in conjunction with IIAI AAI 2023 Winter Congress, Bali, Indonesia, December 11-13, 2023.

  12. Program committee member. The 14th International Conference on Smart Computing and Artificial Intelligence (SCAI 2023-Winter) in conjunction with IIAI AAI 2023 Winter Congress, Bali, Indonesia, December 11-13, 2023.

  13. Program committee member. The 26th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2023-Winter), Taichung, Taiwan, December 6-8, 2023.

  14. Program committee member. The 8th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2023), Valencia, Spain, November 13-17, 2023.

  15. Program committee member. The 27th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2023), Orlando, Florida, USA, September 12-15, 2023.

  16. Program committee member. The 2nd ACIS International Symposium on Emotional Artificial Intelligence & Metaverse (EAIM), Seoul, Korea, August 4, 2023, Seoul, Korea.

  17. Program committee member. The 10th International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2023), London, UK, July 14-16, 2023.

  18. Program committee member. The 3rd ACIS International Conference of Artificial Intelligence (IAI-2023), London, UK, July 14-16, 2023.

  19. Program committee member. The 13th International Conference on Smart Computing and Artificial Intelligence (SCAI 2023) in conjunction with IIAI AAI 2023 Congress, Koriyama, Japan, July 8-13, 2023.

  20. Program committee member. The 16th International Conference on E-Service and Knowledge Management (ESKM 2023) in conjunction with IIAI AAI 2023 Congress, Koriyama, Japan, July 8-13, 2023.

  21. Program committee member. The 25th IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2023-Summer), Taiyuan, China, July 5-7, 2023.

  22. Program committee member. The IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS 2023), Wuxi, China, June 23-25, 2023.

  23. Technical program committee member. The 11th International Workshop on e-Health Pervasive Wireless Applications and Services (eHPWAS 2023) in conjunction with the IEEE WiMob Conference, Montreal, Canada, June 21, 2023.

  24. Program committee member. The 21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023), Orlando, USA, May 23-25, 2023.

  25. Program committee member. The 9th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2023), Prague, Czech Republic, April 25-27, 2023.

  26. Technical program committee member. The 22nd International Conference on Networks (ICN 2023), Venice, Italy, April 24-28, 2023.

  27. Program committee member. The 12th International Conference on Smart Computing and Artificial Intelligence (SCAI 2022) in conjunction with IIAI AAI 2022-Winter Congress, Phuket, Thailand, December 12-14, 2022.

  28. Program committee member. The 15th International Conference on E-Service and Knowledge Management (ESKM 2022) in conjunction with IIAI AAI 2022-Winter Congress, Phuket, Thailand, December 12-14, 2022.

  29. Program committee member. The 24th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2022-Winter), Taichung, Taiwan, December 7-9, 2022.

  30. Technical program committee member. The 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2022), Thessaloniki, Greece, October 10-12, 2022.

  31. Technical program committee member. The 10th International Workshop on e-Health Pervasive Wireless Applications and Services (eHPWAS 2022) in conjunction with the IEEE WiMob Conference, Thessaloniki, Greece, October 10, 2022.

  32. Program committee member. The 9th International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2022), Shanghai, China, August 10-12, 2022.

  33. Program committee member. The 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2022), Danang, Vietnam, August 4-6, 2022.

  34. Program committee member. The 1st ACIS International Symposium on Emotional Artificial Intelligence & Metaverse (EAIM 2022), Danang, Vietnam, August 4-6, 2022.

  35. Program committee member. The 26th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2022), Orlando, Florida, USA, July 12-15, 2022.

  36. Program committee member. The 23rd IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2022-Summer), Kyoto City, Japan, July 4-6, 2022.

  37. Program committee member. The 14th International Conference on E-Service and Knowledge Management (ESKM 2022), Kanazawa, Japan, July 2-7, 2022.

  38. Senior program committee member. The 11th International Conference on Smart Computing and Artificial Intelligence (SCAI 2022), Kanazawa, Japan, July 2-7, 2022.

  39. Program committee member. The IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS 2022), Zhuhai, China, June 26-28, 2022.

  40. Program committee member. The 20th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2022), Las Vegas, May 25-27, 2022.

  41. Program committee member. The 8th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2022), Prague, Czech Republic, April 27-29, 2022.

  42. Technical program committee member. The 21st International Conference on Networks (ICN 2022), Barcelona, Spain, April 24-28, 2022.

  43. Senior program committee member. The 11th International Congress on Advanced Applied Informatics (IIAI AAI 2021-Winter) Online / Hybrid Congress, Jakarta / Tokyo, December 17-19, 2021.

  44. Program committee member. The 22nd IEEE/ACIS International Summer Semi-Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2021-Fall), Taichung, Taiwan, November 24-26, 2021.

  45. Program committee member. The 21st IEEE/ACIS International Fall Conference on Computer and Information Science (ICIS 2021-Fall), Xi’an, China, October 13-15, 2021.

  46. Program committee member. The 1st ACIS International Virtual Conference of Artificial Intelligence (ACIS-IAI’21), Xi’an, China, October 13-15, 2021.

  47. Technical program committee member. The 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), Bologna, Italy, October 11-13, 2021.

  48. Program committee member. The 6th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2021), Barcelona, Spain, October 3-7, 2021.

  49. Program committee member. The 6th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2021), Zhuhai, China, September 13-15, 2021.

  50. Program committee member. The 25th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2021), Orlando, Florida, USA, July 18-21, 2021.

  51. Program committee member. The 10th International Conference on Advanced Applied Informatics (IIAI AAI 2021) Online Congress, July 11-16, 2021.

  52. Program committee member. The 19th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2021), Kanazawa, Japan, June 20-22, 2021.

  53. Program committee member. The 8th International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2021), Zhuhai, China, June 15-17, 2021.

  54. Program committee member. The 20th IEEE/ACIS International Fall Conference on Computer and Information Science (ICIS 2021-Summer), Shanghai, China, June 2-4, 2021.

  55. Program committee member. The 7th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2021), Prague, Czech Republic, April 23-25, 2021.

  56. Technical program committee member. The 20th International Conference on Networks (ICN 2021), Porto, Portugal, April 18-22, 2021.

  57. Program committee member. The 21st IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2021-Winter), Hochimin City, Vietnam, January 28-30, 2021.

  58. Technical program committee member. The 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication (Virtual) Conference (IEEE UEMCON 2020), New York, USA, October 28-31, 2020.

  59. Technical program committee member. The 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2020), Thessaloniki, Greece, October 12-14, 2020.

  60. Program committee member. The 9th International Congress on Advanced Applied Informatics (IIAI AAI 2020) Online Congress, Japan, September 1-15, 2020.

  61. Program committee member. The 18th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2020), Kitakyushu, Japan, July 6-8, 2020.

  62. Program committee member. The 21st IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2020), Melbourne, Australia, July 1-3, 2020.

  63. Program committee member. The 7th International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2020), Macao, June 15-17, 2020.

  64. Program committee member. The 5th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2020), Macao, June 15-17, 2020.

  65. Program committee member. The 1st ACIS International Conference of Artificial Intelligence (AI 2020), Macao, June 15-17, 2020.

  66. Program committee member. The 19th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2020), Shanghai, China, June 1-3, 2020.

  67. Program committee member. The 6th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2020), Prague, Czech Republic, May 7-9, 2020.

  68. Technical program committee member. The 19th International Conference on Networks (ICN 2020), Lisbon, Portugal, February 23-27, 2020.

  69. Technical program committee member. The 15th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), Barcelona, Spain, October 21-23, 2019.

  70. Technical program committee member. The 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (IEEE UEMCON 2019), Columbia University, New York, USA, October 10-12, 2019.

  71. Program committee member. The 7th International Conference on Smart Computing and Artificial Intelligence (SCAI 2019), Toyama, Japan, July 7–12, 2019.

  72. Program committee member. The 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019), Toyama, Japan, July 8-10, 2019.

  73. Program committee member. The 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.

  74. Program committee member. The 5th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2019), Heraklion, Crete, Greece, May 3-5, 2019.

  75. Technical program committee member. The 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2018), Limassol, Cyprus, October 15-17, 2018.

  76. Program committee member. The 6th International Conference on Smart Computing and Artificial Intelligence (SCAI 2018), Yonago, Tottori, Japan, July 8-13, 2018.

  77. Organizing committee member. The 6th International Conference on Computer Graphics, Animation & Computer-Aided Design (Computer Graphics 2018), London, England, June 18-19, 2018.

  78. Program committee member. The 16th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2018), Kunming, China, June 12-15, 2018.

  79. Program committee member. The 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2018), Busan, South Korea, June 26-29, 2018.

  80. Program committee member. The 22nd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2018), Orlando, Florida, USA, July 8-11, 2018.

  81. Technical program committee member. The 14th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2018), Chongqing, China, September 18-20, 2018.

  82. Program committee member. The 4th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2018), Funchal Madeira, Portugal, March 17-19, 2018.

  83. Technical program committee member. The 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2017), Rome, Italy, October 9-11, 2017.

  84. Program committee member. Computer Science Track, UND-SCIEI International Conference on Cyber-Security in: Aerospace, Computer Science, and Electrical Engineering (ICCS 2017), Alerus Convention Center, Grand Forks, North Dakota, USA, September 21–23, 2017.

  85. Program committee member. The 3rd International Workshop on Cloud Security and Forensics (WCSF 2017), Sydney, Australia, August 1-4, 2017.

  86. Program committee member. The 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017), London, England, June 7-9, 2017.

  87. Program committee member. The 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2017), Kanazawa, Japan, June 26-28, 2017.

  88. Program committee member. The 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), Wuhan, China, May 24-26, 2017.

  89. Program committee member. The 21st World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2017), Orlando, Florida, USA, July 8-11, 2017.

  90. Program committee member. The 5th International Conference on Smart Computing and Artificial Intelligence (SCAI 2017), Hamamatsu, Shizuoka, Japan, July 9-13, 2017.

  91. International program committee member. The 3rd International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2017), Porto, Portugal, April 27-28, 2017.

  92. Technical program committee member. The 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2016), New York, USA, October 17-19, 2016.

  93. Program committee member. The 4th International Conference on Smart Computing and Artificial Intelligence (SCAI 2016), Kumamoto, Japan, July 12-14, 2016.

  94. Program committee member. The 20th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2016), Orlando, Florida, USA, July 5-8, 2016.

  95. Program committee member. The 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016), Okayma, Japan, June 26-29, 2016.

  96. Technical program committee member. The International Workshop on Security and Forensics of Multimedia in the Cloud (IWSFMC 2016), Xi’an, China, June 18, 2016.

  97. Program committee member. The 14th International Conference on Software Engineering Research, Management and Applications (SERA 2016), Towson, Maryland, USA, June 8-10, 2016.

  98. Program committee member. The 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2016), Shanghai, China, May 30 - June 1, 2016.

  99. Program committee member. The 2016 Taiwan Conference on Business and Information (TBI 2016), Taipei, Taiwan, March 25, 2016.

  100. Program committee member. The 2016 International Conference on Business and Management (ICBM 2016), Taipei, Taiwan, March 23-25, 2016.

  101. Program committee member. The 3rd International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2015), Okayama, Japan, July 12-16, 2015.

  102. Program committee member. The 19th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2015), Orlando, Florida, USA, July 12-15, 2015.

  103. Program committee member. The 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015), Las Vegas, USA, June 30 - July 2, 2015.

  104. Technical Program Committee member. 2015 International Conference on Computer Information Systems and Industrial Applications (CISIA 2015), Bangkok, Thailand, June 28-29, 2015.

  105. Program committee member. The 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2015), Takamatsu, Japan, June 1-3, 2015.

  106. Program committee member. The 13th International Conference on Software Engineering Research, Management and Applications (SERA 2015), Hammamet, Tunisia, May 13-15, 2015.

  107. Program committee member. The 13th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2014), Chengdu, China, December 19-21, 2014.

  108. Program committee member. The 6th TPC Technology Conference on Performance Evaluation and Benchmarking (TPCTC 2014), Hangzhou, China, September 1-5, 2014.

  109. Program committee member. The International Conference on Software Engineering Research, Management and Applications (SERA 2014), Kitakyushu, Japan, August 31 - September 04, 2014.

  110. Program committee member. The 2nd International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2014), Kitakyushu, Japan, August 31 - September 04, 2014.

  111. Program committee member. The 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), Las Vegas, USA, June 30 - July 2, 2014.

  112. International committee member. The 4th International Conference on Marketing Studies (ICMS 2014), Taipei, Taiwan, June 18-20, 2014.

  113. International committee member. International Conference on Business and Management (ICBM 2014), Taipei, Taiwan, June 17-19, 2014.

  114. Program committee member. The 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014), Taiyuan, China, June 4-6, 2014.

  115. Program committee member. The 5th ACM/SPEC International Conference on Performance Engineering (ICPE 2014), Dublin, Ireland, March 23-26, 2014.

  116. Technical program committee member. The 3rd International Conference on Consumer Electronics, Communications and Networks (CECNet 2013), Xianning, Hubei Province, China, November 20-22, 2013.

  117. Program committee member. The 6th IEEE International Conference on Ubi-Media Computing (UMEDIA 2013), Aizu-Wakamatsu, Fukushima, Japan, November 2-4, 2013.

  118. Program committee member. The 1st International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2013), Kunibiki Messe, Matsue, Japan, August 31 - September 4, 2013.

  119. Program committee member. The 5th TPC Technology Conference on Performance Evaluation and Benchmarking (TPCTC 2013), Riva del Garda, Trento, August 26-30, 2013.

  120. Program committee member. The 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013), Honolulu, Hawaii, USA, July 1-3, 2013.

  121. Program committee member. The 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013), Niigata, Japan, June 19-21, 2013.

  122. Program committee member. International Workshop on Mobile Ad-Hoc Wireless Networks (iWMANET 2012) (co-located with the International Conference on Selected Topics (iCOST 2012) in Mobile & Wireless Networking, Avignon, France, July 2-4, 2012.

  123. Program committee member. Special session of the 2012 8th International Conference on Natural Computation (ICNC’12) and the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’12), Chongqing, China, May 29-31, 2012.

  124. Program committee member. Special session of Data Mining and Computational Intelligence for Digital Forensics and Information Assurance (DMCIDFIA) of the 25th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, Dalian, China, June 9-12, 2012.

  125. Program committee member. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Shanghai, China, May 30 - June 1, 2012.

  126. Program committee member. The International Conference on Software Engineering Research, Management and Applications (SERA 2012), Kunming, China, April 16-18, 2012.

  127. Program committee member. The 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012), Kyoto, Japan, August 8-10, 2012.

  128. Technical program committee member. The Pervasive Communication Security, Social Network and Social Engineering Workshop of the 2012 International Conference on Computing, Networking and communications (ICNC 2012), Maui, Hawaii, January 30 - February 02, 2012.

  129. Program committee member. The 1st ACIS International Symposium on Software and Network Engineering (SSNE 2011), Seoul, Korea, December 19-20, 2011.

  130. Program committee member. The 9th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2011), August 10-12, 2011, Towson University, USA.

  131. Technical program committee member. Advanced Networking and Applications Symposium of the 13th IEEE International Conference on Computational Science and Engineering (IEEE CSE 2010), December 11-13, 2010, Hong Kong SAR, China.

  132. Technical program committee member. Wireless/Sensor Networks and Pervasive Computing track of the 40th ICPP (International Conference on Parallel Processing), Taiwan, 2011.

  133. International program committee. The 8th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2010), Montreal, Canada, May 24-26, 2010.

  134. Organization committee member. The 2009 International Symposium on Bioelectronics and Bioinformatics (ISBB 2009), Melbourne, Australia, 9-11 December, 2009.

  135. International program committee member. The 7th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2009), Haikou, Hainan Island, China, December 2-4, 2009.

  136. Program committee member. The 8th Global Mobility Roundtable Conference on Innovative Services through Mobile Technologies (GMR 2009), Cairo, Egypt, October 31 - November 2, 2009.

  137. Program committee member. The 10th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2006, Orlando, Florida, July 16-19, 2006.

  138. Program committee member. The 2006 Information Resources Management Association (IRMA 2006) International Conference, Washington, D. C., May 21-24, 2006.

  139. Program committee member. The 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, July 20-22, 2005.

  140. Program committee member. The 2005 Information Resources Management Association (IRMA 2005) International Conference, San Diego, May 15-18, 2005.

  141. Program committee member. The 2004 Information Resources Management Association (IRMA 2004) International Conference, New Orleans, May 23-26, 2004.

  142. Organizing committee member. The 5th International Conference on Computer Science and Informatics (CS&I 2000), Atlantic City, New Jersey, February 27 - March 3, 2000.

Other Professional Services

  1. Guest editor. Multimedia Technologies, Digital Communications and Networking blog of IGI Global, April 01, 2010 - present.

  2. International advisory board member. The Best Research and Practices in Technology Book Series, Information Resources Management Association (IRMA), June 2009 - present.

  3. Selection committee member. The Annual Excellence in Research Awards, IGI Global, February 06, 2009 - present.

  4. Editorial advisory review board member. IGI Global, January 2007 - present.

  5. Reviewer. Special issue on Next-Generation Trustworthy Applications of Distributed Sensor Networks (NGTA), International Journal of Distributed Sensor Networks, 2015.

  6. External reviewer for promotion and tenure. Idaho State University, USA, 2011-2012.

  7. External reviewer for promotion and tenure. Texas A&M University-Corpus Christi, 2010-2012.

  8. Judge. The 2011 North Dakota State Science and Engineering Fair (NDSSEF 2011), April 08, 2011, North Dakota University, North Dakota, USA.

  9. Research advisory panel member. Business Technology Research Panel, CMP Media LLC, August 2007 - present.


Technical Manuscript Reviews

Journal Paper Reviews

  1. Contemporary Management Research, Wenchang Fang, editor-in-chief, ISSN 1813-5498, Academy of Taiwan Information Systems Research, 2009 - present.

  2. International Journal of Virtual Communities and Social Networking (IJVCSN), ISSN: 1942-9010, EISSN: 1942-9029, July 1, 2008 - present.

  3. Journal of Information Technology Research (JITR), ISSN: 1938-7857, EISSN: 1938-7865, 2008 - present.

  4. Information Resources Management Journal (IRMJ), ISSN: 1040-1628, EISSN: 1533-7979, 2006 - present.

  5. International Journal of Cases on Electronic Commerce (IJCEC), Mehdi Khosrow-Pour, editor, ISSN: 1548-0623, EISSN: 1548-0615, Idea Group Publishing, 2005 - present.

  6. International Journal of E-Business Research (IJEBR), IGI Publishing, 2004 - present.

  7. Pervasive and Mobile Computing, Elsevier 2020.

  8. International Journal of Handheld Computing Research (IJHCR), ISSN: 1947-9158, EISSN: 1947-9166, 2010 - 2018.

  9. IET Signal Processing, Thomson Reuters, 2017.

  10. International Journal of E-Health and Medical Communications (IJEHMC), IGI Global, 2016 and 2017.

  11. International Journal of Critical Infrastructure Protection, Elsevier B.V., 2017.

  12. Information Sciences, ISSN: 0020-0255, Elsevier B.V., 2000, 2013, 2014, and 2016.

  13. International Journal of Information Management (IJIM), Elsevier, 2016.

  14. Journal of Big Data, Springer, 2015 and 2016.

  15. IEEE Transactions on Mobile Computing, IEEE, 2015.

  16. International Journal of Computers and Applications, ISSN: 1206-212X, ACTA Press, 2009, 2013, and 2014.

  17. IEEE Computer Magazine, ISSN: 0018-9162, 2011 and 2013.

  18. International Journal of Mathematics and Engineering Research (IJMER), Watch Plus, 2013.

  19. Journal of Computers (JCP), ISSN 1796-203X, Academy Publisher, 2011.

  20. International Journal of Tomography & Statistics (IJTS), ISSN 0973-7294, Requested by Xiaoping Shen, associate editor, 2009.

  21. Advances in Engineering Software, ISSN: 0965-9978, Elsevier B.V., 2009.

  22. International Journal of Healthcare Information Systems and Informatics (IJHISI), Requested by San Murugesan and Uma Srinivasan, guest editors of the Special Issue on Web Services-Based Health Information Systems, Idea Group Publishing, 2006.

  23. International Journal of High Performance Computing and Networking (IJHPCN), Requested by Yoshitaka Shibata, Leonard Barolli, and Hui-Huang Hsu, guest editors of the Special Issue on Network Protocols and Applications, Inderscience, 2005.

  24. Journal of Mathematical Imaging and Vision, ISSN: 0924-9907, Springer, 2000.

  25. Decision Support Systems, ISSN: 0167-9236, Elsevier B.V.

  26. Electronic Commerce Studies, ISSN: 1726-2364, Chinese Electronic Periodical Services.

  27. International Journal of Information Technology and Decision Making, ISSN: 0219-6220, World Scientific Publishing Co.

  28. International Journal of Neural Systems, ISSN: 0129-0657, World Scientific Publishing Co.

  29. Journal of Research and Practice in Information Technology (JRPIT), ISSN: 1443-458X, Australian Computer Society Inc.

Book Chapter Reviews

  1. Encyclopedia of Organizational Knowledge, Administration, and Technologies, 1st edition, Mehdi Khosrow-Pour, editor, IGI Global, 2018 - present.

  2. Advances in E-Business Research (AEBR) Book Series, In Lee, editor-in-chief, IGI Global, 2006 - present.

  3. Encyclopedia of Information Science and Technology, Mehdi Khosrow-Pour, editor, Information Science Reference, 2005 - present.

  4. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications, Carlos Rabadão, Leonel Santos, and Rogério Luís Costa, editors, IGI Global, 2022.

  5. Encyclopedia of Information Science and Technology, 4th edition, IGI Global, 2016.

  6. Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, ISBN: 1-466-66571-8, IGI Global, 2014.

  7. Big Data Management, Technologies, and Applications, ISBN: 1-466-64699-3, IGI Global, 2013.

  8. Sustainable ICTs and Management Systems for Green Computing, ISBN: 1-466-61839-6, IGI Global, 2012

  9. Energy-Aware Systems and Networking for Sustainable Initiatives, ISBN: 1-466-61842-6, IGI Global, 2012.

  10. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, Junaid Zubairi and Athar Mahboob, editors, ISBN: 16096-08518, IGI Global, 2011.

  11. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, Wen-Chen Hu and Yanjun Zuo, editors, ISBN: 16152-07619, IGI Global, 2010.

  12. Human Behavior Recognition Technologies: Intelligent Applications for Monitoring and Security, Hans Guesgen and Stephen Marsland, editors, ISBN: 14666-36823, IGI Global, 2011.

  13. Encyclopedia of Internet Technologies and Applications, Mario Freire and Manuela Pereira, editors, ISBN: 15914-09934, Information Science Reference, 2006.

  14. Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Mehdi Khosrow-Pour, editor, ISBN: 15914-07990, Information Science Reference, 2005.

  15. Encyclopedia of Data Warehousing and Mining, John Wang, editor, ISBN: 15914-05572, Information Science Reference, 2004.

  16. Encyclopedia of Multimedia Technology and Networking, Margherita Pagani, editor, ISBN: 15914-05610, Information Science Reference, 2004.

  17. Advances in Security and Payment Methods for Mobile Commerce, Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, editors, ISBN: 15914-03456, Idea Group Publishing, 2004.

  18. Encyclopedia of Virtual Communities and Technologies, Subhasish Dasgupta, editor, ISBN: 15914-05637, Information Science Reference, 2004.

  19. Mobile Commerce Applications, Shi Nansi, editor, ISBN: 15914-01828, Idea Group Publishing, 2003.

  20. Architectural Issues of Web-Enabled Electronic Business, Shi Nansi, editor, ISBN: 15914-0049X, Idea Group Publishing, 2002.

  21. Books (mobile commerce), IGI Global, Inc., 2000.

Conference Paper Reviews

  1. The 19th International Conference on E-Service and Knowledge Management (ESKM 2024-Winter) in conjunction with IIAI AAI 2024-Winter Congress, Saigon Prince Hotel, Ho Chi Minh, Vietnam, December 16-18, 2024.

  2. The 28th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2024-Winter), Taichung, Taiwan, December 4-6, 2024.

  3. The 9th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2024), Nice, France, November 3-7, 2024.

  4. The IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS’24), University of North Dakota, Grand Forks, North Dakota, October 28-29, 2024.

  5. The 9th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science (BCD 2024-Summer), Kitakyushu, Japan, July 16-18, 2024.

  6. The 24th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2024-Summer I), Shanghai, China, July 7-9, 2024.

  7. The 18th International Conference on E-Service and Knowledge Management (ESKM 2024) in conjunction with IIAI AAI 2024 Congress, Takamatsu, Japan, July 6-12, 2024.

  8. The 22nd IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2024), Honolulu, Hawaii, USA, May 30 - June 01, 2024.

  9. The 10th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2024), Angers, France, May 2-4, 2024.

  10. The 8th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2023), Ho Chi Minh City, Vietnam, December 14-16, 2023.

  11. The 17th International Conference on E-Service and Knowledge Management (ESKM 2023-Winter) in conjunction with IIAI AAI 2023 Winter Congress, Bali, Indonesia, December 11-13, 2023.

  12. The 14th International Conference on Smart Computing and Artificial Intelligence (SCAI 2023-Winter) in conjunction with IIAI AAI 2023 Winter Congress, Bali, Indonesia, December 11-13, 2023.

  13. The 26th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2023-Winter), Taichung, Taiwan, December 6-8, 2023.

  14. The 8th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2023), Valencia, Spain, November 13-17, 2023.

  15. The 27th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2023), Orlando, Florida, USA, September 12-15, 2023.

  16. The 13th International Conference on Smart Computing and Artificial Intelligence (SCAI 2023) in conjunction with IIAI AAI 2023 Congress, Koriyama, Japan, July 8-13, 2023.

  17. The 16th International Conference on E-Service and Knowledge Management (ESKM 2023) in conjunction with IIAI AAI 2023 Congress, Koriyama, Japan, July 8-13, 2023.

  18. The 25th IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2023-Summer), Taiyuan, China, July 5-7, 2023.

  19. The IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS 2023), Wuxi, China, June 23-25, 2023.

  20. The 21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023), Orlando, USA, May 23-25, 2023.

  21. The 9th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2023), Prague, Czech Republic, April 25-27, 2023.

  22. The 12th International Conference on Smart Computing and Artificial Intelligence in conjunction with IIAI AAI 2022-Winter Congress, Phuket, Thailand, December 12-14, 2022.

  23. The 15th International Conference on E-Service and Knowledge Management in conjunction with IIAI AAI 2022-Winter Congress, Phuket, Thailand, December 12-14, 2022.

  24. The 24th IEEE/ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2022-Winter), Taichung, Taiwan, December 7-9, 2022.

  25. The 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2022), Thessaloniki, Greece, October 10-12, 2022.

  26. The 10th International Workshop on e-Health Pervasive Wireless Applications and Services (eHPWAS 2022) in conjunction with the IEEE WiMob Conference, Thessaloniki, Greece, October 10, 2022.

  27. The 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2022), Danang, Vietnam, August 4-6, 2022.

  28. The 26th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2022), Orlando, Florida, USA, July 12-15, 2022.

  29. The 23rd IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2022-Summer), Kyoto City, Japan, July 4-6, 2022.

  30. The 14th International Conference on E-Service and Knowledge Management (ESKM 2022), Kanazawa, Japan, July 2-7, 2022.

  31. The 11th International Conference on Smart Computing and Artificial Intelligence (SCAI 2022), Kanazawa, Japan, July 2-7, 2022.

  32. The IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS 2022), Zhuhai, China, June 26-28, 2022.

  33. The 20th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2022), Las Vegas, May 25-27, 2022.

  34. The 8th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2022), Prague, Czech Republic, April 27-29, 2022.

  35. The 11th International Congress on Advanced Applied Informatics (IIAI AAI 2021-Winter) Online / Hybrid Congress, Jakarta / Tokyo, December 17-19, 2021.

  36. The 22nd IEEE/ACIS International Summer Semi-Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2021-Fall), Taichung, Taiwan, November 24-26, 2021.

  37. The 21st IEEE/ACIS International Fall Conference on Computer and Information Science (ICIS 2021-Fall), Xi’an, China, October 13-15, 2021.

  38. The 1st ACIS International Virtual Conference of Artificial Intelligence (ACIS-IAI’21), Xi’an, China, October 13-15, 2021.

  39. The 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), Bologna, Italy, October 11-13, 2021.

  40. The 6th International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing (HEALTHINFO 2021), Barcelona, Spain, October 3-7, 2021.

  41. The 6th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2021), Zhuhai, China, September 13-15, 2021.

  42. The 25th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2021), Orlando, Florida, USA, July 18-21, 2021.

  43. The 10th International Conference on Advanced Applied Informatics (IIAI AAI 2021) Online Congress, July 11-16, 2021.

  44. The 19th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2021), Kanazawa, Japan, June 20-22, 2021.

  45. The 6th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2021), Zhuhai, China, June 15-17, 2021.

  46. The 8th International Conference on Computational Science/Intelligence & Applied Informatics (CSII 2021), Zhuhai, China, June 15-17, 2021.

  47. The 20th IEEE/ACIS International Fall Conference on Computer and Information Science (ICIS 2021-Summer), Shanghai, China, June 2-4, 2021.

  48. The 7th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2021), Prague, Czech Republic, April 23-25, 2021.

  49. The 25th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2021), Orlando, Florida, USA, July 18-21, 2021.

  50. The 21st IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2021-Winter), Hochimin City, Vietnam, January 28-30, 2021.

  51. The 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2020), Thessaloniki, Greece, October 12-14, 2020.

  52. The 9th International Conference on Advanced Applied Informatics (IIAI AAI 2020) Online Congress, Japan, September 1-15, 2020.

  53. The 6th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2020), Prague, Czech Republic, May 7-9, 2020.

  54. The 15th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), Barcelona, Spain, October 21-23, 2019.

  55. The 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019), Toyama, Japan, July 8-10, 2019.

  56. The 7th International Conference on Smart Computing and Artificial Intelligence (SCAI 2019), Toyama, Japan, July 7–12, 2019.

  57. The 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.

  58. The 5th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2019), Heraklion, Crete, Greece, May 3-5, 2019.

  59. The 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2018), Limassol, Cyprus, October 15-17, 2018.

  60. The 6th International Conference on Smart Computing and Artificial Intelligence (SCAI 2018), Yonago, Tottori, Japan, July 8-13, 2018.

  61. The 22nd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2018), Orlando, Florida, USA, July 8-11, 2018.

  62. The 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2018), Busan, Korea, June 27-29, 2018.

  63. The 16th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2018), Kunming, China, June 12-15, 2018.

  64. The 4th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2018), Funchal Madeira, Portugal, March 17-19, 2018.

  65. The 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2017), Rome, Italy, October 9-11, 2017.

  66. The 5th International Conference on Smart Computing and Artificial Intelligence (SCAI 2017), Hamamatsu, Shizuoka, Japan, July 9-13, 2017.

  67. The 21st World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2017), Orlando, Florida, USA, July 8-11, 2017.

  68. The 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2017), Kanazawa, Japan, June 26-28, 2017.

  69. The 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017), London, England, June 7-9, 2017.

  70. The 3rd International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM 2017), Porto, Portugal, April 27-28, 2017.

  71. The 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2016), New York, USA, October 17-19, 2016.

  72. The 4th International Conference on Smart Computing and Artificial Intelligence (SCAI 2016), Kumamoto, Japan, July 12-14, 2016.

  73. The 20th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2016), Orlando, Florida, USA, July 5-8, 2016.

  74. The 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016), Okayma, Japan, June 26-29, 2016.

  75. The 14th International Conference on Software Engineering Research, Management and Applications (SERA 2016), Towson, Maryland, USA, June 8-10, 2016.

  76. The 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2016), Shanghai, China, May 30 - June 1, 2016.

  77. The 3rd International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2015), Okayama, Japan, July 12-16, 2015.

  78. The 19th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2015), Orlando, Florida, USA, July 12-15, 2015.

  79. The 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015), Las Vegas, USA, June 30 - July 2, 2015.

  80. The 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2015), Takamatsu, Japan, June 1-3, 2015.

  81. The 13th International Conference on Software Engineering Research, Management and Applications (SERA 2015), Hammamet, Tunisia, May 13-15, 2015.

  82. The 13th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2014), Chengdu, China, December 19-21, 2014.

  83. The 3rd International Conference on Biomedical Engineering and Biotechnology (ICBEB 2014), Beijing, China, September 25-28, 2014.

  84. The 6th TPC Technology Conference on Performance Evaluation and Benchmarking (TPCTC 2014), Hangzhou, China, September 1-5, 2014.

  85. The International Conference on Software Engineering Research, Management and Applications (SERA 2014), Kitakyushu, Japan, August 31 - September 04, 2014.

  86. The 2nd International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2014), Kitakyushu, Japan, August 31 - September 04, 2014.

  87. The 4th International Conference on Smart Computing and Artificial Intelligence (SCAI 2016), Kumamoto, Japan, July 12-14, 2016.

  88. The 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), Las Vagas, USA, June 30 - July 2, 2014.

  89. The 2014 IEEE International Conference on Electro/Information Technology (EIT 2014), Milwaukee, Wisconsin, USA, June 5-7, 2014.

  90. The 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014), Taiyuan, China, June 4-6, 2014.

  91. The 5th ACM/SPEC International Conference on Performance Engineering (ICPE 2014), Dublin, Ireland, March 23-26, 2014.

  92. The 3rd International Conference on Consumer Electronics, Communications and Networks (CECNet 2013), Xianning, Hubei Province, China, November 20-22, 2013.

  93. The 6th IEEE International Conference on Ubi-Media Computing (UMEDIA 2013), Aizu-Wakamatsu, Fukushima, Japan, November 2-4, 2013.

  94. The 1st International Conference on Smart Computing and Artificial Intelligence (ICSCAI 2013), Kunibiki Messe, Matsue, Japan, August 31 - September 4, 2013.

  95. The 5th TPC Technology Conference on Performance Evaluation and Benchmarking (TPCTC 2013), Riva del Garda, Trento, August 26-30, 2013.

  96. The 2013 IEEE International Conference on Electro/Information Technology (EIT 2013), Rapid City, South Dakota, USA, May 9-11, 2013.

  97. The 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013), Toki Messe, Niigata, Japan, June 16-20, 2013.

  98. The 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013), Honolulu, Hawaii, USA, June 3-5, 2013.

  99. The 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012), Kyoto, Japan, August 8-10, 2012.

  100. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Shanghai, China, May 30-June 1, 2012.

  101. The 2012 IEEE International Conference on Electro/Information Technology (EIT 2012), Indianapolis, Indiana, USA, May 6-8, 2012.

  102. Wireless/Sensor Networks and Pervasive Computing Track of the 40th ICPP (International Conference on Parallel Processing), Taipei, Taiwan, September 13-16, 2011.

  103. The 9th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2011), Towson University, USA, August 10-12, 2011.

  104. The 13th IEEE International Conference on Computational Science and Engineering (IEEE CSE 2010), December 11-13, 2010, Hong Kong SAR, China.

  105. The 7th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2009), Haikou, Hainan Island, China, December 2-4, 2009.

  106. The 2007 Information Resources Management Association (IRMA 2007) International Conference, Vancouver, Canada, May 19-23, 2007.

  107. The 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007.

  108. International Symposium on Knowledge Communication and Conferences (KCC 2006), Orlando, Florida, July 16-19, 2006.

  109. The 2006 Information Resources Management Association (IRMA 2006) International Conference, Washington, D.C., May 21-24, 2006.

  110. The 3rd International Conference on Information & Communication Technology (ICICT 2005), Cairo, Egypt, December 5-6, 2005.

  111. The 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka Institute of Technology (FIT), Fukuoka, Japan, July 20-22, 2005.

  112. The 2005 Information Resources Management Association (IRMA 2005) International Conference, San Diego, May 15-18, 2005.

  113. The 2004 Information Resources Management Association (IRMA 2004) International Conference, New Orleans, May 23-26, 2004.

  114. The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), Orlando, Florida, July 14-18, 2002.

  115. The 10th International Conference on Information and Knowledge Management (ACM CIKM 2001), Atlanta, Georgia, November 5-10, 2001.

  116. The 5th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, July 22-25, 2001.

  117. Multimedia & Visualization Track, ACM Symposium on Applied Computing, SAC 2000-01.

  118. The 1st International Workshop on Intelligent Multimedia Computing and Networking (IMMCN 2000), Atlantic City, New Jersey, February 27 - March 3, 2000.

  119. The 5th International Conference on Computer Science and Informatics (CS&I 2000), Atlantic City, New Jersey, February 27 - March 3, 2000.

Other Manuscript Reviews

  1. Ph.D. Thesis Examiner, Anna University, Chennai, 600 025, India, 2017.

  2. Brunei Research Council Research Fund, Institut Teknologi Brunei, Brunei, May 24, 2014.

  3. Ohio University Research Committee (OURC) Grant, Office of Vice President for Research, Ohio University, Athens, Ohio, 2004, 2011, and 2012.

  4. Excellence in Information Technology Research Award Program, IGI Global, 2009.

  5. Enhancement Grant for Research (EGR), Office of Research and Special Programs, Sam Houston State University, 2007.

  6. Technology Funding Programs, Henry Ahn, program manager, Maryland Technology Development Corporation (TEDCO), 2002.

  7. Ph.D. Dissertation Outside Reader, The Graduate School, Auburn University, 1999-2000.



Please send comments to: wenchen@cs.und.edu Free counters!