Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Scale A street case library for environmental design with agent interfaces

    Chiung-Hui Chen, Mao-Lin Chiu in Innovations in Design & Decision Support S… (2006)

  2. Chapter and Conference Paper

    Adaptive Clustering with Virtual Subnets Support in Ad Hoc Networks

    This paper concerns how the virtual subnet mechanism is engaged with the hierarchical architecture in ad hoc networks. The employment of virtual subnets performed at the Data Link Layer can prevent the reveal ...

    Tzu-Chiang Chiang, Ming-Hui Tsai, Yueh-Min Huang in Computational Science – ICCS 2006 (2006)

  3. Chapter and Conference Paper

    Optimization Technique and FE Simulation for Lag Screw Placement in Anterior Column of the Acetabulum

    This paper presents an optimization technique for determining the lag screw placement in the anterior column of the acetabulum, and investigates new method for generating accurate finite-element (FE) model for...

    Ruo-feng Tong, Sheng-hui Liao, **-xiang Dong in Computational Science – ICCS 2006 (2006)

  4. No Access

    Chapter and Conference Paper

    Optimal Recycling and Ordering Policy with Partial Backordered Shortage

    Product recycle and parts reutilization are two of the vital ways to protect environment. In recent years, more and more industries begin to adopt recycling as their key strategy. Koh, et al. [3] developed a m...

    Hui-Ming Teng, Hui-Ming Wee, **-Hui Hsu in Computational Science and Its Applications… (2007)

  5. No Access

    Chapter and Conference Paper

    An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Youngho Park in Computational Science and Its Applications… (2007)

  6. No Access

    Chapter and Conference Paper

    An Enhanced ID-Based Deniable Authentication Protocol on Pairings

    Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based ...

    Meng-Hui Lim, Sanggon Lee, Youngho Park in Computational Science and Its Applications… (2007)

  7. No Access

    Chapter and Conference Paper

    Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol

    A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which is used to preserve confidentiality and data integrity over an open network. In 2007, Oh et al. proposed a...

    Meng-Hui Lim, Sanggon Lee, Hoonjae Lee in Computational Science and Its Applications… (2008)

  8. No Access

    Chapter and Conference Paper

    Feature Selection Method Combined Optimized Document Frequency with Improved RBF Network

    Feature selection is the core research topic in text categorization. Firstly, it combined word frequency with document frequency and presented an optimized document frequency (ODF) method. Then it proposed an ...

    Hao-Dong Zhu, **ang-Hui Zhao, Yong Zhong in Advanced Data Mining and Applications (2009)

  9. No Access

    Chapter and Conference Paper

    Design of an Object-Based Video Retrieval System Using SCA and Invariant Moments

    In recent years, it has become more important to process multimedia data efficiently. Especially, in the case of multimedia information, the user interface technique and retrieval technique are necessary. Vide...

    Jang-Hui Kim, Dae-Seong Kang in Communication and Networking (2009)

  10. No Access

    Chapter and Conference Paper

    Research on the Application of ZigBee Technology in Positioning System

    ZigBee is a new global standard for wireless connectivity, focusing on standardizing and enabling interoperability of products within home control, building automation and industrial control and monitoring. It...

    Ge **ao-Yu, Wang Qing-Hui, Feng An-Song in Applied Informatics and Communication (2011)

  11. No Access

    Chapter and Conference Paper

    A Method of Image Enhancement Based on Least Squares Support Vector Machine

    This paper presents a weighted local adaptive contrast enhancement algorithms, it took into account the details in the image, at the same time enhancing the noise suppression, after filtering the target image ...

    Hui Wan in Information Engineering and Applications (2012)

  12. No Access

    Chapter and Conference Paper

    A Trust Model Under Grid Computing Environment

    It is a challenging task to design a trust model that can effectively evaluate the relationships between different entities under Grid computing environment. In recent years, integrating trust into grid comput...

    Wang Li-juan, Zhang Guang-hui, Chen Shan in Information Engineering and Applications (2012)

  13. No Access

    Chapter and Conference Paper

    Integration Design and Installation of Girder Systems in the Injection Section of Taiwan Photon Source

    The electron beam is injected from the end of the transport line into the injection section of the storage ring in Taiwan Photon Source (TPS). A girder system for the injection section has been designed to sup...

    Keng-Hao Hsu, Wei-Yang Lai, Yung-Hui Liu in Intelligent Technologies and Engineering S… (2013)

  14. No Access

    Chapter and Conference Paper

    Modeling on Sensitivity of Influential Factors to City Water Demand Based on System Dynamic Mechanics Method

    To study the sensitivity of the influential factors to city water demand, thus promoting the construction of water-saving society. The paper gives a preliminary qualitative analysis by applying system dynamic ...

    Guang-Hui Wei, Feng Liu, Liang Ma in Proceedings of the 2nd International Confe… (2013)

  15. No Access

    Chapter and Conference Paper

    Study on Recreational and Leisure Activities Participation

    In recent years, many Chinese students went to Korea for study. Leisure has a great meaning for foreign students, through the participation of leisure to spend their time after daily going to school, and then ...

    Guang-hui Qiao in Proceedings of the International Conferenc… (2013)

  16. No Access

    Chapter and Conference Paper

    Deploying Autonomous Coordinating Agent for Assessment Model in Smart Urban Space: A Case Study of Cozy Space Design Pattern

    This research proposes an effective method for assessing the design of the coordination of autonomous agents, which can be applied to urban outdoor space design based on the developed “cozy place” model base. ...

    Chiung-Hui Chen in Intelligent Technologies and Engineering Systems (2013)

  17. No Access

    Chapter and Conference Paper

    Development of Fuzzy Comprehensive Evaluation and Approaching Degree Toolbox via Matlab

    In the twenty-first century, for the science and technology peripheral auxiliary, mostly computer software are used to do a bulk of numerical analysis and verification, especially in soft computing calculation...

    Yaug-Fea Jeng, Ting-Hui Hsu, Kun-Li Wen in Intelligent Technologies and Engineering S… (2013)

  18. No Access

    Chapter and Conference Paper

    LEV Suspension System Design and Development

    In this study, the vehicle suspension system design and analysis procedure have been proposed for the Light-weight Electric Vehicles. The objective for the suspension design is quick handling and stably riding...

    Hsing-Hui Huang, Ming-Jiang Tsai in Proceedings of the 2nd International Confe… (2014)

  19. No Access

    Chapter and Conference Paper

    Core Competence of Information Security Service Specialists in System Integration Service Provider

    In Taiwan, about 80 % information security services companies are system integration services provider. In the era of recession, system integration service companies are not only promising, there are also a la...

    Chun-Yi Chen, Chen Lin, Tsung-Hui Lu in Proceedings of the 2nd International Confe… (2014)

  20. No Access

    Chapter and Conference Paper

    Wearable Computing Connecting Gas Sensor to Detector Harmful Air - Implement

    In recent years, wearable computing was more popular. Wearable computing is a device which user can use their own equipment and computer more efficiently and assist them to acquire information from database or...

    Yung-Hui Chen, Jyu-Wei Wang in Computer Science and its Applications (2015)

previous disabled Page of 2