Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Part I: A computer program for the simulation of telecommunication systems: application to optical transmission systems

    The conception and analysis of optical transmission systems employing various optical devices (semiconductor lasers, optical fibre, optical amplifiers, photo-diodes,…) require the support supplied by simulatio...

    Emmanuel Gay, Eric Guillard, Marc Le Ligné in Annales Des Télécommunications (1995)

  2. No Access

    Chapter and Conference Paper

    Fault Diagnosis of Air-conditioning System Using CMAC Neural Network Approach

    In this paper, a CMAC neural network application on fault diagnosis of a large air-conditioning system is proposed. This novel fault diagnosis system contains an input layer, binary coding layer, and fired up ...

    Chin-Pao Hung, Mang-Hui Wang in Advances in Soft Computing (2003)

  3. No Access

    Article

    A QoS-Enabled Transmission Scheme for MPEG Video Streaming

    While MPEG is the de facto encoding standard for video services, online video streaming service is becoming popular over the open network such as the Internet. As the performance of open network is non-predictabl...

    Joseph Kee-Yin Ng, Karl R. P. H. Leung, Calvin Kin-Cheung Hui in Real-Time Systems (2005)

  4. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  5. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  6. Article

    Open Access

    Activity-Oriented Design of Health Pal: A Smart Phone for Elders' Healthcare Support

    Wireless telephones and personal digital assistants are emerging, as the information hubs connect their human users with assorted electronic devices and the World Wide Web. As such, they quickly become the de fac...

    John K. Zao, Shih-Chen Fan, Ming-Hui Wen in EURASIP Journal on Wireless Communications… (2007)

  7. Chapter and Conference Paper

    A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

    Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...

    Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

  8. No Access

    Article

    Autocorrelations of l-sequences with prime connection integer

    In this paper, the autocorrelations of l-sequences with prime connection integer are discussed. Let \(\underline{a}\) b...

    Hong Xu, Wen-Feng Qi, Yong-Hui Zheng in Cryptography and Communications (2009)

  9. Article

    Open Access

    NQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks

    We propose a network quality aware routing (NQAR) mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods tha...

    Jaewon Choi, Baek-Young Choi, Sejun Song in EURASIP Journal on Wireless Communications… (2009)

  10. No Access

    Chapter

    Web Services Discovery in Metric Space through Similarity Search

    Most current semantic web services discovery approaches focus on the matchmaking of services in a specific description language such as OWL-S, and WSML. However, in practical applications, effective services d...

    Ming-hui Wu, Fan-wei Zhu in Advances in Wireless Networks and Information Systems (2010)

  11. No Access

    Article

    Cross-layer mobile WiMAX MAC designs for the H.264/AVC scalable video coding

    To effectively provide the QoS of streaming services in mobile WiMAX systems, this paper proposes a cross-layer design between the streaming server and mobile WiMAX base stations. We will show that for each us...

    Hung-Hui Juan, Hsiang-Chun Huang, ChingYao Huang, Tihao Chiang in Wireless Networks (2010)

  12. Article

    Open Access

    A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks

    UMTS-WLAN heterogeneous mobile networks allow a single mobile user with different radio technologies to access different mobile networks, but how to secure such interworking networks and provide a seamless ser...

    Shen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen in EURASIP Journal on Wireless Communications… (2011)

  13. No Access

    Chapter and Conference Paper

    A Method of Image Enhancement Based on Least Squares Support Vector Machine

    This paper presents a weighted local adaptive contrast enhancement algorithms, it took into account the details in the image, at the same time enhancing the noise suppression, after filtering the target image ...

    Hui Wan in Information Engineering and Applications (2012)

  14. No Access

    Chapter and Conference Paper

    A Trust Model Under Grid Computing Environment

    It is a challenging task to design a trust model that can effectively evaluate the relationships between different entities under Grid computing environment. In recent years, integrating trust into grid comput...

    Wang Li-juan, Zhang Guang-hui, Chen Shan in Information Engineering and Applications (2012)

  15. No Access

    Chapter and Conference Paper

    One-to-One Complementary Collaborative Learning Based on Blue-Red Multi-Trees of Rule-Space Model for MTA Course in Social Network Environment

    It has become increasingly important that applies and develops an intelligent e-learning system in a social network environment. In this paper, we used the combination of Rule-Space Model and multi-tree to inf...

    Yung-Hui Chen, Lawrence Y. Deng, Neil Y. Yen in Human Centric Technology and Service in Sm… (2012)

  16. No Access

    Chapter and Conference Paper

    Research on the Query Subsystem for Large Information System Based on Decision-Making

    In this paper, Information System is introduced firstly, and then combining practical examples during our development of IS, on the basis of the establishment of the decision-making oriented query subsystem in...

    Hui Liu, **ang-Hui Zhao, Lin Liu, Lei Zhang in Future Information Technology, Application… (2012)

  17. No Access

    Chapter and Conference Paper

    Research on Agent for Mail Classification

    This chapter researches on agent for mail classification. An Email Intelligent Classification system is designed to classify the e-mails into four kinds by their significance. It has proved the feasibility of ...

    Ying-hui Sun, Ying-juan Sun, Dong-bing Pu in Green Communications and Networks (2012)

  18. No Access

    Chapter and Conference Paper

    Approach of Classification Based on Rough Set

    Propose a novel approach of classification based on rough set. Fully consider each condition attribute significance and classification object during making policy. It gets higher classification accuracy and le...

    Ying-juan Sun, Ying-hui Sun, Dong-bing Pu in Green Communications and Networks (2012)

  19. No Access

    Chapter and Conference Paper

    Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from Taiwan

    Real-time traffic information service is an important part of Intelligent Transport Systems (ITS), and the performance of service is a major concern to transportation planners and road users. For users, gettin...

    Jui-Yen Chang, Tung-Wen Wang, Sheng-Hui Chen in Future Information Technology, Application… (2012)

  20. No Access

    Article

    Group-Based Authentication and Key Agreement

    This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). I...

    Yu-Wen Chen, Jui-Tang Wang, Kuang-Hui Chi in Wireless Personal Communications (2012)

previous disabled Page of 5