Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Implementation of Switch Slicing in 5G/B5G/6G Networks

    The 5th/B5Gth/6th generation mobile networks (5G for short) virtualize a physical device into n virtual components to support packet transmission, n ≥ 1. 5G further classifies a network into three major categorie...

    Li-Wen Peng, Fang-Yie Leu, Heru Susanto in Innovative Mobile and Internet Services in… (2024)

  2. No Access

    Chapter and Conference Paper

    Base-Station Resource Allocation Based on Frame/Sub-Frame

    In recent years, with the rapid development of network technology, human beings request high quality of wireless services. The demands for self-driving cars, remote medical surgeries and real-time ward monitor...

    Yu-Han Chen, Fang-Yie Leu, Heru Susanto in Innovative Mobile and Internet Services in… (2024)

  3. No Access

    Chapter and Conference Paper

    5G Network Base Station Timeline Scheduling

    Currently, the main applications of 5G networks are divided into three types, including: Enhanced Mobile Broadband (eMBB), Ultra-reliable and Low Latency Communications (uRLLC) and Massive Machine Type Communi...

    Yu-Han Chen, Chao-Hsiang Hsu, Heru Susanto in Advances on Broad-Band and Wireless Comput… (2024)

  4. No Access

    Article

    A Q-learning-based downlink scheduling in 5G systems

    Nowadays, due to the rapid growth of network service requests and popularity of IoT device deployment, wireless networks currently suffer from huge traffic produced by these requests and devices. On the other ...

    Jung-Chun Liu, Heru Susanto, Chi-Jan Huang, Kun-Lin Tsai, Fang-Yie Leu in Wireless Networks (2023)

  5. No Access

    Chapter and Conference Paper

    Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense

    Nowadays, 5G networks has gradually entered human’s everyday lives. But network services re quested by users continuously grow. On the other hand, hackers can be found everywhere. Our information systems and n...

    Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu in Mobile Internet Security (2023)

  6. No Access

    Chapter and Conference Paper

    CIRC Model Based on Audiovisual Local Wisdom on Ability to Write Malay Pantun

    One of the factors causing the low ability of students in writing literature is because learning is centered on the teacher (teacher center) and not focused on students (student center). Generally, teachers us...

    Gunta Wirawan, Eti Sunarsih in Learning Technology for Education Challeng… (2023)

  7. No Access

    Chapter and Conference Paper

    Asymmetric Cryptography Among Different 5G Core Networks

    In 5G networks, packets transmitted from local UPF of a 5G network to another UPF in different destination 5G network is not encrypted. This conducts a risk of data leakage, particularly along the connection ...

    Yu-Syuan Lu, Heru Susanto, Fang-Yie Leu in Innovative Mobile and Internet Services in… (2022)

  8. No Access

    Chapter and Conference Paper

    The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks

    With the fast development of network technology, nowadays mobile communication is popularly employed all over the world. Mobile network services, e.g., Multimedia programs and Internet surfing, have so far enr...

    Pei-Hua Yu, Heru Susanto, Li-Xuan Liu in Advances on Broad-Band Wireless Computing,… (2022)

  9. No Access

    Chapter and Conference Paper

    Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance

    In Taiwan, the regular software maintenance is the essential procedure in general commercial banks. However, during system maintenance, the banking system must be suspended and stop related services. Maintenan...

    Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu in Innovative Mobile and Internet Services in… (2022)

  10. No Access

    Chapter and Conference Paper

    5G Base Station Scheduling

    5G base stations (BS) distribute resources to User Equipments (UEs) by dividing the BS’s spectrum into sub-channels of different sizes, and then allocate them to UE’s flows for uploading or downloading data ba...

    Yi-Cheng Jian, Meng-Shao Chung, Heru Susanto in Innovative Mobile and Internet Services in… (2022)

  11. No Access

    Chapter and Conference Paper

    Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure

    The failure rate of software projects has always been high. One of the key factors is the inability to detect and effectively solve the progress delay problem in time. Progress delay problems will continuous t...

    Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu in Advances on Broad-Band Wireless Computing,… (2022)

  12. No Access

    Chapter and Conference Paper

    A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems

    Nowadays, due to the rapid growth and popularity of IoT devices, current wireless networks suffer from the huge traffic produced by these devices. On the other hand, with the availably of 5G networks, people e...

    Zhi-Qian Hong, Heru Susanto, Fang-Yie Leu in Innovative Mobile and Internet Services in… (2022)

  13. No Access

    Chapter and Conference Paper

    Small Object Detection Based on SSD-ResNeXt101

    Object detection is closely related to video analysis and image retention, which has attracted many researchers to research in this field

    Uus Khusni, Aniati Murni Arymurthy in Proceedings of the 11th International Conf… (2022)

  14. No Access

    Chapter and Conference Paper

    Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy

    Nowadays, Hackers are everywhere. Current information systems often suffer from attacks anytime. Also, 5G network have gradually entered human lives to satisfy our network-service needs. At present, without hu...

    Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu in Innovative Mobile and Internet Services in… (2022)

  15. No Access

    Article

    A Fault Tolerant Mechanism for UE Authentication in 5G Networks

    Generally, the 5th Generation (5G) network will be soon available in the near future. It will be one with the feature that some of its network functions are handled by Virtual Machines (VMs), rather than by a ...

    Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu in Mobile Networks and Applications (2021)

  16. No Access

    Chapter and Conference Paper

    News Collection and Analysis on Public Political Opinions

    With the fast development of news media and freedom of speech in Taiwan, some news is not objectively reported. In fact, in order to attract people’s attention and increase the click rates of news, many journa...

    Zhi-Qian Hong, Fang-Yie Leu, Heru Susanto in Advances on Broad-Band Wireless Computing,… (2020)

  17. No Access

    Chapter and Conference Paper

    System Implementation of AUSF Fault Tolerance

    In this study, we deal with two topics. The first is that a machine, named Mediator, is added to a 5G system for managing and kee** track of UE’s authentication. The purpose is that when an AUSF fails, other...

    Wei-Sheng Chen, Fang-Yie Leu, Heru Susanto in Advances on Broad-Band Wireless Computing,… (2020)

  18. No Access

    Chapter and Conference Paper

    Mobile Physiological Sensor Cloud System for Long-Term Care

    In this study, we propose a Mobile Physiological Sensor Cloud System for Long-term Care (MPCLC), the main functions of which are collecting carereceiver’s physiological data by using sensors and analyzing and ...

    **-Jui Chiang, Heru Susanto, Fang-Yie Leu in Advances on Broad-Band Wireless Computing,… (2020)

  19. No Access

    Chapter and Conference Paper

    Revealing Storage and Speed Transmission Emerging Technology of Big Data

    The study highlighted the storage of data and the ability to transmit it at a faster speed securely. It is acknowledged that Big Data represents a large volume of data, and this brings a matter of ways on how ...

    Heru Susanto, Fang-Yie Leu, Didi Rosiyadi in Advanced Information Networking and Applic… (2020)

  20. No Access

    Chapter and Conference Paper

    Migration of Edge Computing Services in 5G Networks – Firewall as a Service Example

    According to Ericsson Mobility Report announced in 2017, by 2022, billions of User Equipment (UE) and IoT devices will connect to IoT networks for collecting our environmental and surrounding data. Since foll...

    Fang-Yie Leu, Heru Susanto, **-Hung Chou in Advances on Broadband and Wireless Computi… (2019)

previous disabled Page of 2