專任教授

鄭炳強教授美國紐約大學 (New York University) 資訊科學博士

連絡方式:
E-mail:jeng@mis.nsysu.edu.tw


學歷

工作經歷

研究領域

最近五年相關著作:


A. 期刊論文(Journal)


  1. S.H. Yeh, B. Jeng, L.-W. Lin, T.-H. Ho, C.-Y. Hsiao, L.-N. Lee and S.-L. Chen, “Implementatlon and Evaluation of a Nursing Process Support System for Long-Term Care: A Taiwanese Study,” Journal of Clinical Nursing (accepted)
  2. Wen-Shyong Tzou, Wei-Po Lee, and B. Jeng, “Exploiting knowledge ontology and software agents for PPI network analysis,” Expert Systems with Applications. Vol. 38(2) (to appear) [SCI, EI] (Impact Factor 1.2361)
  3. W.-P. Lee, T.-H. Yang and B. Jeng. “Building Neural Network-Based Behavior Systems for Emotion-Based Pet Robots,” International Journal of Modelling, Identification and Control, Vol.10, No.3 (to appear) [EI]
  4. G.-H. Lai, C.-M. Chen, B. Jeng, S.-C. Chao “Ant-Based IP Traceback,” Expert Systems with Applications, 34(4), pp. 3071–3080, 2008. [SCI, EI] (Impact Factor 0.957)
  5. Chen, D.N., B. Jeng, W.P. Lee, C.-H. Chuang, “An Agent-Based Model for Consumer-to-Business Electronic Commerce,” Expert Systems with Applications. Vol. 34(1), Jan., pp. 469-481, 2008 [SCI, EI] (Impact Factor 1.2361)( NSC 91-2416-H-110-007)
  6. Hsiu-Chi Wang, B. Jeng and Chia-Mei Chen, “Structural Testing Using a Memetic Algorithm,” Journal of Software Engineering Studies, Vol. 2, No. 4. 2007. (Invited paper)
  7. Wei-Po Lee, B. Jeng, Tun-Wen Pai, Chin-Pei Tsai, Chang-Yung Yu, and Wen-Shyong Tzou, “Differential evolutionary conservation of motif modes in a yeast protein interaction network,” BMC Genomics, 7:89, April, 2006. [SCI] (Impact Factor 4.09) (NSC 91-2113-M-037-023; NSC 92-2113-M-019-001)
  8. Jeng, B., Chen, J. and Liang, T.P. “Applying data mining to learn system dynamics in a biological model,” Expert Systems with Applications. Vol. 30, Issue 1, January 2006, 50 - 58. [SCI, EI] (Impact Factor 0.957) (NSC 92-2213-E-110-037)
  9. Chen, Y.T. and Jeng, B. “MFILM: a multi-dimensional fuzzy inductive learning method,” Journal of Experimental & Theoretical Artificial Intelligence, Vol. 17, No. 3, September 2005, 267–281. [SCI] (Impact Factor 0.466)(NSC89-2416-H-110-088; NSC 93-2524-S-001-001)

B. 研討會論文(Conference)


  1. S. F. Lin, Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, "Malicious Webpage Detection by Semantics-Aware Reasoning," IEEE Intelligent System Design and Application (ISDA) Conference, Nov. 2008.
  2. Y. T. Hou, Chia-Mei Chen and B. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept,” International Conference on Network-Based Information Systems (NBiS2007), Regensburg, Germany, Sept. 3-7, 2007.
  3. G. H. Lai, Chia-Mei Chen, B. Jeng, “DoS Detection in Cluster-based Sensor Networks,” IASTED International Conference on Communication, Network and Information Security (CNIS 2007), Sept. 24-26, 2007, Berkeley, USA.
  4. Y. F. Chiu, Chia-Mei Chen, B. Jeng, and H. C. Lin, “An Alliance-based Anti-Spam Approach,” International Conference on Natural Computation, August, 2007, Haikou, China.
  5. S. F. Lin, Chia-Mei Chen, B. Jeng, “Malicious DHTML Detection by Model-Based Reasoning,” Information Security Conference, June, 2007.
  6. Chia-Mei Chen, B. Jeng, G. H. Lai, C. L. Wang, “Adaptive Clustering for Sensor Network,” International Conference in IT and Application (ICITA) sponsored by IEEE NSW Section, 15-18, Januray, 2007, Harbin, China.
  7. Y. T. Hou, Chia-Mei Chen and B. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept,” Lecture Notes in Computer Science, 2007.
  8. Chia-Mei Chen, B. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach,” Lecture Notes in Computer Science: Applications of Evolutionary Computing. 2006.
  9. Y. T. Hou, T. C. Lee, Chia-Mei Chen, and B. Jeng, “Node Placement for Optimal Coverage in Sensor Networks,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 5-7, June, 2006.
  10. Chia-Mei Chen, B. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach,” European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems (EvoCOMNET) 2006, 10-12 April, 2006, Budapest, Hungary.
  11. Y. T. Hou, T. C. Lee, B. Jeng, and Chia-Mei Chen, “Optimal Coverage Deployment for Wireless Sensor Networks,” International Conference on Advanced Communication Technology co-sponsored by IEEE Communications Society, 20-22 February, 2006, Phoenix Park, Korea.
  12. Bingchiang Jeng, Dowming Yeh, Deron Wang, Shu-Lan Chu, “An Empirical Study of Effort Estimation Using Simplified Functional Point Analysis,” International Computer Symposium, Dec 4-6, Taipei, Taiwan, 2006.
  13. Hsiu-Chi Wang, Bingchiang Jeng, “Structural Testing Using Memetic Algorithm,” Proceedings of the Second Taiwan Conference on Software Engineering, June 9-10, Taipei, Taiwan, 2006.
  14. Bingchiang Jeng, Wen-Shyong Tzou, Jian-Xun Chen, “How Reliable an Encoding Process is to Build Models from Observed Data?” The Medical Informatics Symposium in Taiwan (MIST), Taoyuan, 2005.
  15. Bingchiang Jeng, Wen-Shyong Tzou, Jian-Xun Chen, “Linking system dynamics science and systems biology with Machine learning techniques,” Bioinformatics in Taiwan, Tainan, 2005.
  16. Bingchiang Jeng, Deron Wang, “Function Points Analysis – A Simplified Approach,” Proceedings of the First Taiwan Conference on Software Engineering, June, Taipei, Taiwan, 2005.
  17. 曾仲強, 賴谷鑫, 陳嘉玫, 鄭炳強 2005, “以支援向量機為基礎之後門程式入侵偵測” 第十六屆人工智慧與應用研討會, 國立高雄大學, 12/2/2005
  18. 曾漠益、賴谷鑫、陳嘉玫、鄭炳強,「以約略集合理論為基礎之垃圾郵件過濾研究」,2005年第十一屆資訊管理暨實務研討會,2005年 12月 10日,台北
  19. 邱郁芬, 賴谷鑫, 陳嘉玫, 鄭炳強 2005, “以區域聯防為基礎之垃圾郵件防治研究,2005 年「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會, 中央警察大學, 12/23/2005
  20. 鄭炳強、王德榮。「可調整的功能點分析法」第一屆軟體工程會議,台北,June, 2005.
  21. 范文宙、陳建勳、鄭炳強,以類神經網路來輔助當PSA在4~10ng/ml時的前列腺癌診斷,The Medical Informatics Symposium in Taiwan (MIST),Chiayi,2004。
  22. 陳建勛、鄭炳強、鄒文雄,「以混合基因演算法從時間序列資料推估生物系統的動力係數」,「第九屆(TAAI 2004年)人工智慧與應用研討會」。
  23. Jeng, B. and Wang, D., “A simplified approach for function point analysis,” 2nd. International Conference on Computing, Communication and Control Technologies: CCCT '04, Austin, Texas, USA, August 14-17, 2004.
  24. Chen, Y.T., and Jeng, B., “Policy Design by Fitting Desired Behavior Patterns to System Dynamics Models,” The 22nd International Conference of the System Dynamics Society, Oxford, England, July 25 - 29, 2004.

C. 研究計畫


  1. 新式程式設計教學平台之開發與理論研究
    -計劃編號97-2221-E-110-046
    -行政院國家科學委員會委託, 主持人, 2008/08/01-2009/07/31
  2. 資源測試的理論及應用平台開發
    -計劃編號96-2221-E-110-038
    -行政院國家科學委員會委託, 主持人, 2007/08/01-2008/07/31
  3. 人性化語音諮詢輔助功能擴充之研究
    -計劃編號IA96H01313E03
    -資策會委託, 主持人, 2007/03/01-2007/12/31
  4. 資源導向的自動化程式測試方法
    -計劃編號95-2221-E-110-053
    -行政院國家科學委員會委託, 主持人, 2006/08/01-2007/07/31
  5. 利用「行為資料採礦」探索生物系統的網路基序
    -計劃編號93-2213-E-110-029
    -行政院國家科學委員會委託, 主持人, 2004/08/01-2005/07/31
  6. 轉錄體與交互作用體的系統分析(2/2)
    -計劃編號92-2113-M-019-001
    -行政院國家科學委員會委託, 共同主持人, 2003/08/01-2004/10/31
  7. 從表現資料到生物系統回饋環路的反向工程
    -計劃編號92-2213-E-110-037
    -行政院國家科學委員會委託, 主持人, 2003/08/01-2004/07/31
  8. 轉錄體與交互作用體的系統分析(1/2)
    -計劃編號91-2113-M-037-023
    -行政院國家科學委員會委託, 共同主持人, 2002/09/01-2003/07/31
  9. 智慧型代理人在C2B電子商務之應用研究
    -計劃編號91-2416-H-110-007
    -行政院國家科學委員會委託, 主持人, 2002/08/01-2003/07/31
  10. 醫療院所病歷電子化試辦計畫
    -行政院衛生署委託, 共同主持人, 2002/07/01-2003/03/31
  11. 複決策結果之歸納學習法
    -計劃編號89-2416-H-110-088
    -行政院國家科學委員會委託, 主持人, 2000/08/01-2001/07/31
  12. 訓練類神經網路來建立系統動力模型
    -行政院國家科學委員會委託, 主持人, 2000
  13. 在全球資訊網上應用FILM來學習顧客特性以支援買賣雙方電子商務行為
    -行政院國家科學委員會委託, 主持人, 1999
  14. 複決策之歸納學習法
    -行政院國家科學委員會委託, 主持人, 1999
  15. 長期照護機構院民評估及照護工具電腦中文系統
    -長庚醫學院委託, 主持人, 1999

D. 專利


  1. 鄭炳強,「偵測廣播電視節目中廣告位置之方法及系統」,中華民國專利第I255142號,5/11/2006。

E. 著作


  1. 鄭炳強,軟體工程—從實務出發。智勝出版社。ISBN:978-957-729-659-7。出版日期:2007.08。