Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Complex Industrial Machinery Health Diagnosis Challenges and Strategies

    This study is dedicated to addressing a spectrum of pivotal challenges and predicting their potential ramifications. Specifically, its objectives encompass the detection of tool breakage in milling-turning com...

    Hsiao-Yu Wang, Ching-Hua Hung in Smart Grid and Internet of Things (2024)

  2. No Access

    Chapter and Conference Paper

    InterWorking Function for Mission Critical Push to Talk Services

    Due to the continuous development of mobile communication technologies, commercialized mobile communication systems have been globally deployed. Among them, LTE-A (Long-Term Evolution-Advanced) has been adopte...

    Chih-Cheng Tseng, Shao-Yu Lien, Chuan-**an Zhuang in Smart Grid and Internet of Things (2022)

  3. No Access

    Chapter and Conference Paper

    Design of Public Course Teaching Evaluation System in Colleges and Universities Under Mobile Education Platform

    In the construction of the public curriculum system in colleges and universities, it is necessary to evaluate the teaching of public curriculum in colleges and universities in order to improve the control of t...

    **ao-yu Wang, Jian-rong Li, Chang-zhu Li in Advanced Hybrid Information Processing (2022)

  4. No Access

    Chapter and Conference Paper

    Acoustic Emission Signal Analysis for Stam** Machine Condition Monitoring and Fault Diagnosis

    A quality inspection is often carried out after the stam** processing for a relay contactor. Once a failure occurs in the process, it may be difficult to detect the defective products due to the fast stampin...

    Hsiao-Yu Wang, Yu-Hung Chiang, Chih-Yuan Chen, Yu-Shiang Hon in Frontier Computing (2021)

  5. No Access

    Chapter and Conference Paper

    Research on User Privacy Security of China’s Top Ten Online Game Platforms

    The privacy agreement presented to online game users is the basic guarantee of the running of an online game. An online game platform can have access to users’ private information by setting various mandatory ...

    Lan-Yu Cui, Mi-Qian Su, Yu-Chen Wang, Zu -Mei Mo in Big Data Technologies and Applications (2021)

  6. No Access

    Chapter and Conference Paper

    The Design of Collaborative Surveillance System Based on Blockchain Technology

    Traditional surveillance system is a centralized architecture and have some drawbacks including single point of failure and is a private environment. Surveillance videos or images in such environment could not...

    Chuan-Feng Chiu, Hsiao-Yu Wang, Han-Yun Hsieh, Wei-Chuan Chung in Frontier Computing (2020)

  7. No Access

    Chapter and Conference Paper

    Scalable Data-Storage Framework for Smart Manufacturing

    Data is the core of the smart manufacturing. Sharing the data between different systems and machines will help the factories to enhance the utilization, increase the quality. The production efficiency also can...

    Hsiao-Yu Wang, Chen-Kun Tsung in Frontier Computing (2019)

  8. No Access

    Chapter and Conference Paper

    Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)

    Cloud platforms often take advantage of virtualization technology and make their actual hosts virtualized. As network attack events occur frequently, providing system security in a virtualized environment is ...

    Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng in Information Security Practice and Experien… (2017)

  9. No Access

    Chapter and Conference Paper

    Efficient Network Structure of 5G Mobile Communications

    5G mobile communications requires system and network considerations from many aspects. Instead of high spectral efficient physical layer communication, We introduce efficient network structure supplying a new ...

    Kwang-Cheng Chen, Whai-En Chen in Wireless Algorithms, Systems, and Applicat… (2015)

  10. No Access

    Chapter and Conference Paper

    Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things

    This paper concentrates in the privacy protection in Internet of things. It firstly focuses on the security issues and attack risks of Internet of things from four aspects, which are perception layer, transpor...

    Li Peng, Wang Ru-chuan, Su **ao-yu, Chen Long in Advances in Wireless Sensor Networks (2014)

  11. No Access

    Chapter and Conference Paper

    A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy

    This paper presents a fast chaos-based confusion-diffusion type image cipher which introduces a diffusion mechanism in the confusion stage through a novel bit-level permutation. As the pixel value mixing effec...

    Chong Fu, Tao Wang, Zhao-yu Meng, Jun-xin Chen in Cyberspace Safety and Security (2013)

  12. No Access

    Chapter and Conference Paper

    Research on Online Monitoring Method for Longitudinal Rip of Steel-Core Belt

    Steel-core belt is the large transport device in coal mine and other departments, the longitudinal rip of steel-core belt will bring great losses to production and safety, this article proposed one kind of onl...

    Qiao Tie-Zhu, Wang Fu-Qiang, Lu **ao-Yu in Emerging Research in Artificial Intelligen… (2011)

  13. No Access

    Chapter and Conference Paper

    Schur-Convexity on Generalized Information Entropy and Its Applications

    The information entropy has general applications in different subjects, such as information theory, linear algebra, signal processing, dynamical systems, ergodic theory, probability and statistical. Then the s...

    Bo-yan **, Shu-hong Wang, Tian-yu Zhang in Information Computing and Applications (2011)

  14. No Access

    Chapter and Conference Paper

    Parameter Selection of Robust Fine Granularity Scalable Video Coding over MPEG-4

    In this paper, we propose an approach to automatically choose the α and β parameters in the RFGS coding scheme for the coding of video sequences. We first analyze the residuals after motion compensation with diff...

    Shao-Yu Wang, Sheng-Jyh Wang in Advances in Image and Video Technology (2006)