The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Do patients' Internet searches of disease information and physician performances affect patients' trust in physicians during diagnoses? This study proposes a research model concerning the effect of whether patients use Internet and Internet usage on perceived physician performances (including perceived communication time, explanation quality and physician attitude) and on trust. Our empirical study...
Mobile internet penetration is increasing significantly in Taiwan, but it also leads to more and more subscribers' complaints about mobile internet performance. The regulatory authority, National Communications Commission (NCC), authorizes Telecom Technology Center (TTC) to start the project named “Measure Taiwan Mobile Internet” since 2012. The project not only aims to comprehensively understand...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and...
In recent years, Camera Smart phone has become a popular consumer electronics product. Young people like to use that to record their daily lives, moreover, they will share these photos and information to others. However, the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible watermarks into images. However, an additional...
Social learning is showing one of the immersive potentialities for human knowledge gathering on the Internet throughout the last decade. Due to rapid growth of Internet, people can communicate with each other using IM (Instant Messaging), WWW and P2P. IM Services, such as, Yahoo, Twitter, Google Talk, ICQ (I seek you), etc. which provides individual and group communications. Web search engines (Google,...
After twenty-year development, national high-tech zones in China step into "the second entrepreneurship" which emphasizes on enhancing the capacity of independent innovation. In order to promote the sustainable development of high-tech zone, this paper studies the case of Hangzhou high-tech zone and analyzes the problems and difficulties in science popularization after the actual investigation,...
Recently, SNS, blog and microblog have become very popular. A different form of diversified contents, comparing to traditional static HTML web pages, are so easy to be generated dynamically, and can be provided to users by timeline. These contents are generally processed data streams, and have become an important part of the Internet resources. In this study, we try to integrate these dynamically...
Detecting anomaly nodes from graphs is an important objective in many applications ranging from social networks to World Wide Web. Recently several methods have been proposed to address this problem. A limitation of most of these methods is that they are based on the random walk of the graph, and often fail to be effective. In this paper, we propose a new framework to detect anomaly nodes within a...
The traditional PID controller parameters are hard to tune timely under the rapid changes of the dynamic network circumstances, which affect the PID algorithm's control effects on network data flows. To alleviate the problem, a novel AQM algorithm based on PID controller is proposed, called the improved expert intelligent PID algorithm (IEI-PID). By combining expert knowledge with PID and adding more...
To address the problems of network congestion, Active queue management (AQM) is advocated to improve the quality of services (QoS) for Internet. Random early detective (RED) algorithm is one of notably AQM mechanism, because it could reduce the high drop rate of bursty flows, avoid global synchronization among flows and reduces network latency (“ping time”). However, RED requires careful tuning of...
Watermarking is a potential method for copyright protection and multimedia data authentication in the Internet. The watermarking process can be considered as a communication task, where the watermarking acting like information embedded into a host image, which acts like noise in a communication channel susceptible to all kinds of attacks acting like as jamming. In this paper, a novel watermarking...
As there are more and more online stores and shopping sites available on the Web, integration of product and shopping information provided by different sources has become more and more important, and attract attention of recent research in information integration. One of the fundamental problems is to integrate specifications for products of the same type from difference vendors so that they are described...
The paper presents intermediate results of a long-term project to develop an Internet platform that based upon supply chain and offers servicing assistance in new agricultural products possessed of high-tech content (NAP) For instance, Customers are able to use prediction tools online to get quotations for standard orders and may lookup the progress of larger projects. These services on demand are...
Watermarking is a potential method for copyright protection and multimedia data authentication in the internet. The watermarking process can be considered as a communication task. In this paper, a novel watermarking scheme using code division multiple access (CDMA) modulation is proposed to achieve a superior performance in terms of robustness and imperceptibility. In the proposed scheme, every three...
In many research fields of numerical simulations, programs often produce a large amount of mesh data with complex structure. It is a fatal bottleneck for scientists to manage such large-scale simulation data. In allusion to typical data characteristics of multi-dimension and multi-variables numerical simulation programs, the relativity between time and space, and practical problems of data exchange...
Random Early Detection (RED) can effectively avoid transmitting congestion at routers, but RED can not provide bandwidth fairness. Different packet sizes are one of the reasons that damage fairness. RED routers provide little protection from some bulky data flows that use considerably more bandwidth than other flows in time of congestion. Modifying the formulas of calculating final packet-discard...
The information resources on the Web are diversified, and the amount is increasing rapidly. Demands for selecting useful information from the Internet, managing personal contents, and sharing contents under control have risen. In this study, we propose the ubiquitous personal study (UPS), a framework of personalized virtual study to support accessing, managing, organizing, sharing and recommending...
Modular exponentiation with a large modulus, which is usually accomplished by repeated modular multiplications, has been widely used in public key cryptosystems for secured data communications. To speed up the computation, the Montgomery modular multiplication algorithm is used to relax the process of quotient determination, and the carry-save addition (CSA) is employed to reduce the critical path...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.