-
Chapter and Conference Paper
Automatic Information Extraction for Multiple Singular Web Pages
The World Wide Web is now undeniably the richest and most dense source of information, yet its structure makes it difficult to make use of that information in a systematic way. This paper extends a pattern dis...
-
Chapter and Conference Paper
Visual Features Extracting & Selecting for Lipreading
This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...
-
Chapter and Conference Paper
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...
-
Chapter and Conference Paper
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks
With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...
-
Chapter and Conference Paper
A Hybrid Approach to Determining the Best Combination on Product Form Design
This paper presents a hybrid approach, using a grey relational analysis (GRA), neural networks (NNs), and a tabu search (TS) algorithm, to determining the best combination of product form design. The GRA model...
-
Chapter and Conference Paper
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...
-
Chapter and Conference Paper
Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks
One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks
Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...
-
Chapter and Conference Paper
Bandwidth Management for Smooth Playback of Video Streaming Services
In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...
-
Chapter and Conference Paper
Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems
Queueing Theory deals with problems where some restricted resource should be shared between competitive flow of requests. In this paper we use Queueing Theory methods to perform a quantitative analysis of a si...
-
Chapter and Conference Paper
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
An Intelligent Traffic Light Control Based on Extension Neural Network
This paper presents an intelligent traffic light control method based on extension neural network (ENN) theory for crossroads. First, the number of passing vehicles and passing time of one vehicle within green...
-
Chapter and Conference Paper
Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life
This paper presents a ubiquitous and robust text-independent speaker recognitionarchitecture for home automation digital life. In this architecture, a multiple microphone configuration is adopted to receive th...
-
Chapter and Conference Paper
Multi-media e-Learning Platform Using Green Design with Near-Real Approach
The most of e-Learning and video conference platform receives the limitation of population and the file format, the inconvenience to the users, and requirement of specific software. This paper proposes an effe...
-
Chapter and Conference Paper
The Experience of Adopting Game-Based Learning in Library Instruction
The research is based on the course of library instruction and also a pilot study before adopting game-based learning into real library instruction course. The difficulty of the research is how we can make the...
-
Chapter and Conference Paper
Evaluation of the Acceptance of Audience Response System by Corporations Using the Technology Acceptance Model
The purpose of this research is to explore enterprises’ acceptance of Audience Response System (ARS) using Technology Acceptance Model (TAM). The findings show that (1) IT characteristics and facilitating cond...
-
Chapter and Conference Paper
Quality-of-Service in Wireless Personal Area Networks
IEEE 802.15.4 standard defines the physical layer and medium access control layer protocols for low-rate wireless personal area networks (LR-WPANs). In IEEE 802.15.4 LR-WPANs, quality-of-service is supported b...
-
Chapter and Conference Paper
A Two-Layer Steganography Scheme Using Sudoku for Digital Images
Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bi...
-
Chapter and Conference Paper
Image Data Hiding Schemes Based on Graph Coloring
Graph coloring has been applied in a variety of applications, but not for data hiding. Therefore, in this paper, we are proposing two graph coloring-based data hiding schemes that embed secret data in spatial ...