-
Article
Part I: A computer program for the simulation of telecommunication systems: application to optical transmission systems
The conception and analysis of optical transmission systems employing various optical devices (semiconductor lasers, optical fibre, optical amplifiers, photo-diodes,…) require the support supplied by simulatio...
-
Chapter and Conference Paper
Fault Diagnosis of Air-conditioning System Using CMAC Neural Network Approach
In this paper, a CMAC neural network application on fault diagnosis of a large air-conditioning system is proposed. This novel fault diagnosis system contains an input layer, binary coding layer, and fired up ...
-
Article
A QoS-Enabled Transmission Scheme for MPEG Video Streaming
While MPEG is the de facto encoding standard for video services, online video streaming service is becoming popular over the open network such as the Internet. As the performance of open network is non-predictabl...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
Bandwidth Management for Smooth Playback of Video Streaming Services
In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...
-
Article
Open AccessActivity-Oriented Design of Health Pal: A Smart Phone for Elders' Healthcare Support
Wireless telephones and personal digital assistants are emerging, as the information hubs connect their human users with assorted electronic devices and the World Wide Web. As such, they quickly become the de fac...
-
Chapter and Conference Paper
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...
-
Article
Autocorrelations of l-sequences with prime connection integer
In this paper, the autocorrelations of l-sequences with prime connection integer are discussed. Let \(\underline{a}\) b...
-
Article
Open AccessNQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks
We propose a network quality aware routing (NQAR) mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods tha...
-
Chapter
Web Services Discovery in Metric Space through Similarity Search
Most current semantic web services discovery approaches focus on the matchmaking of services in a specific description language such as OWL-S, and WSML. However, in practical applications, effective services d...
-
Article
Cross-layer mobile WiMAX MAC designs for the H.264/AVC scalable video coding
To effectively provide the QoS of streaming services in mobile WiMAX systems, this paper proposes a cross-layer design between the streaming server and mobile WiMAX base stations. We will show that for each us...
-
Article
Open AccessA fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks
UMTS-WLAN heterogeneous mobile networks allow a single mobile user with different radio technologies to access different mobile networks, but how to secure such interworking networks and provide a seamless ser...
-
Chapter and Conference Paper
A Method of Image Enhancement Based on Least Squares Support Vector Machine
This paper presents a weighted local adaptive contrast enhancement algorithms, it took into account the details in the image, at the same time enhancing the noise suppression, after filtering the target image ...
-
Chapter and Conference Paper
A Trust Model Under Grid Computing Environment
It is a challenging task to design a trust model that can effectively evaluate the relationships between different entities under Grid computing environment. In recent years, integrating trust into grid comput...
-
Chapter and Conference Paper
One-to-One Complementary Collaborative Learning Based on Blue-Red Multi-Trees of Rule-Space Model for MTA Course in Social Network Environment
It has become increasingly important that applies and develops an intelligent e-learning system in a social network environment. In this paper, we used the combination of Rule-Space Model and multi-tree to inf...
-
Chapter and Conference Paper
Research on the Query Subsystem for Large Information System Based on Decision-Making
In this paper, Information System is introduced firstly, and then combining practical examples during our development of IS, on the basis of the establishment of the decision-making oriented query subsystem in...
-
Chapter and Conference Paper
Research on Agent for Mail Classification
This chapter researches on agent for mail classification. An Email Intelligent Classification system is designed to classify the e-mails into four kinds by their significance. It has proved the feasibility of ...
-
Chapter and Conference Paper
Approach of Classification Based on Rough Set
Propose a novel approach of classification based on rough set. Fully consider each condition attribute significance and classification object during making policy. It gets higher classification accuracy and le...
-
Chapter and Conference Paper
Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from Taiwan
Real-time traffic information service is an important part of Intelligent Transport Systems (ITS), and the performance of service is a major concern to transportation planners and road users. For users, gettin...
-
Article
Group-Based Authentication and Key Agreement
This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). I...