![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Scale A street case library for environmental design with agent interfaces
-
Chapter and Conference Paper
Adaptive Clustering with Virtual Subnets Support in Ad Hoc Networks
This paper concerns how the virtual subnet mechanism is engaged with the hierarchical architecture in ad hoc networks. The employment of virtual subnets performed at the Data Link Layer can prevent the reveal ...
-
Chapter and Conference Paper
Optimization Technique and FE Simulation for Lag Screw Placement in Anterior Column of the Acetabulum
This paper presents an optimization technique for determining the lag screw placement in the anterior column of the acetabulum, and investigates new method for generating accurate finite-element (FE) model for...
-
Chapter and Conference Paper
Optimal Recycling and Ordering Policy with Partial Backordered Shortage
Product recycle and parts reutilization are two of the vital ways to protect environment. In recent years, more and more industries begin to adopt recycling as their key strategy. Koh, et al. [3] developed a m...
-
Chapter and Conference Paper
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based ...
-
Chapter and Conference Paper
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which is used to preserve confidentiality and data integrity over an open network. In 2007, Oh et al. proposed a...
-
Chapter and Conference Paper
Feature Selection Method Combined Optimized Document Frequency with Improved RBF Network
Feature selection is the core research topic in text categorization. Firstly, it combined word frequency with document frequency and presented an optimized document frequency (ODF) method. Then it proposed an ...
-
Chapter and Conference Paper
Design of an Object-Based Video Retrieval System Using SCA and Invariant Moments
In recent years, it has become more important to process multimedia data efficiently. Especially, in the case of multimedia information, the user interface technique and retrieval technique are necessary. Vide...
-
Chapter and Conference Paper
Research on the Application of ZigBee Technology in Positioning System
ZigBee is a new global standard for wireless connectivity, focusing on standardizing and enabling interoperability of products within home control, building automation and industrial control and monitoring. It...
-
Chapter and Conference Paper
A Method of Image Enhancement Based on Least Squares Support Vector Machine
This paper presents a weighted local adaptive contrast enhancement algorithms, it took into account the details in the image, at the same time enhancing the noise suppression, after filtering the target image ...
-
Chapter and Conference Paper
A Trust Model Under Grid Computing Environment
It is a challenging task to design a trust model that can effectively evaluate the relationships between different entities under Grid computing environment. In recent years, integrating trust into grid comput...
-
Chapter and Conference Paper
Integration Design and Installation of Girder Systems in the Injection Section of Taiwan Photon Source
The electron beam is injected from the end of the transport line into the injection section of the storage ring in Taiwan Photon Source (TPS). A girder system for the injection section has been designed to sup...
-
Chapter and Conference Paper
Modeling on Sensitivity of Influential Factors to City Water Demand Based on System Dynamic Mechanics Method
To study the sensitivity of the influential factors to city water demand, thus promoting the construction of water-saving society. The paper gives a preliminary qualitative analysis by applying system dynamic ...
-
Chapter and Conference Paper
Study on Recreational and Leisure Activities Participation
In recent years, many Chinese students went to Korea for study. Leisure has a great meaning for foreign students, through the participation of leisure to spend their time after daily going to school, and then ...
-
Chapter and Conference Paper
Deploying Autonomous Coordinating Agent for Assessment Model in Smart Urban Space: A Case Study of Cozy Space Design Pattern
This research proposes an effective method for assessing the design of the coordination of autonomous agents, which can be applied to urban outdoor space design based on the developed “cozy place” model base. ...
-
Chapter and Conference Paper
Development of Fuzzy Comprehensive Evaluation and Approaching Degree Toolbox via Matlab
In the twenty-first century, for the science and technology peripheral auxiliary, mostly computer software are used to do a bulk of numerical analysis and verification, especially in soft computing calculation...
-
Chapter and Conference Paper
LEV Suspension System Design and Development
In this study, the vehicle suspension system design and analysis procedure have been proposed for the Light-weight Electric Vehicles. The objective for the suspension design is quick handling and stably riding...
-
Chapter and Conference Paper
Core Competence of Information Security Service Specialists in System Integration Service Provider
In Taiwan, about 80 % information security services companies are system integration services provider. In the era of recession, system integration service companies are not only promising, there are also a la...
-
Chapter and Conference Paper
Wearable Computing Connecting Gas Sensor to Detector Harmful Air - Implement
In recent years, wearable computing was more popular. Wearable computing is a device which user can use their own equipment and computer more efficiently and assist them to acquire information from database or...