The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The handoff, that is when the user move, quickly, and from within the large scope of the WLAN into smaller and shorter range of RFID range of services, then leave the RFID range of services to another WLAN range of services. At this time the vertical short period of time will cause a number of frequently handoff times, resulting in decreased system efficiency, service quality also followed in case...
In the design of MAC layer protocols for wireless sensor networks, many factors including energy-saving, simple in operation, reducing transmission collisions, transmission efficiency, load balancing, and support for routing, etc. should be considered. This paper proposes a new MAC layer protocol called DMAS with which sensor nodes operate according to a predefined periodic schedule named a superframe...
The purpose of this study is to explore the relationship between different personality types of vocational high school students and their perception of professional ethics. The result shows that vocational high school students' perception of professional ethics was not different according to their genders, grades, majors, and school locations. However, their performance was rather good in the aspect...
Due to the advantages of higher efficiency over fixed-price trading and the ability to discover equilibrium prices quickly, auction is a popular way of trading goods. In business-to-business e-commerce (B2B), many goods with complementarities or substitutabilities are being traded using auctions. Combinatorial auctions can be applied to improve the efficiency of trading in B2B marketplaces. In combinatorial...
Due to the popularity of the Internet and the trend in digital information, large amounts of information can be transmitted quickly around the world. Because of this, intellectual property rights have become an issue. Some valuable or confidential information might be obtained by unauthorized users from the Internet and, consequently, providing an effective protection mechanism for digital content...
In the traditional visual cryptography scheme, a secret pixel will be encoded into a block, causing the size of recovered image is larger than the original one. Thus, later studies attempt to improve these shortcomings, distortion of the recover image and a higher transmission cost. This paper proposes a visual secret sharing (VSS) scheme without expansion, and gets a better recovered result than...
The splogs are those blogs created for commercial purposes and purely copies contents from other blogs or webs. The splogs will block the contents of regular blogs and deprecate the value of the blog web server. The problems of detecting the splogs become the research topics in web engineering recently. In this paper, the methodologies and algorithms for detecting the splogs from the Chinese web logs...
Based on the multiparty quantum secret sharing protocol [Z. J. Zhang and Z. X. Man, Phys. Rev. A 72, 022303 (2005)] [1], we proposed two schemes to enhance the transmission efficiency of whole protocol. In our improved version of the Zhang-Man protocol which the dealer can transmit double amount of secret messages at a time securely instead of doing the Zhang-Man protocol twice. Besides, we save a...
In 2008, Yoon and Yoo [19] proposed a password-based 3PEKE scheme, which can improve some secure weaknesses of the password-based 3PEKE scheme [2]. However, in 2009, Lo and Yeh [14] shown that the 3PEKE scheme [19] cannot resist undetectable on-line password guessing attacks and proposed a new approach to solve this problem. Although they actually propose an improved approach, the exchange-message...
In a traditional wireless sensor network (WSN), sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as an energy hole problem (EHP). From open literatures, most research works have focused on how...
A graph G is called pancyclic if it contains a cycle of length l for each integer l from 3 to |V (G)| inclusive, where |V (G)| denotes the cardinality of the vertex set of graph G. It has been shown by Ma et al. (2007) that the augmented cube, proposed by Choudum and Sunitha (2002), is pancyclic. In this paper, we propose a more refined property, namely double-pancyclicity. Let G be a pancyclic graph...
In any activity in which people have an emotional reaction, memory and emotion in travel are often not separated. Travel will always be full of memories and emotions with the return of these memories will be the proof of the existence of life. Everyone wants to reserve forever in their minds. With the technological advancements, there are a lot of tools that could preserve the moment. Through the...
The mapping of application tasks to processing elements (PE) connected by a network-on-chip (NoC) has a significant impact on the overall performance and power consumption of the applications. In this work, a novel dynamic task mapping algorithm is proposed to reduce the overall latency and power consumption of a given set of applications. Applications are modeled by task graphs. Each task graph represents...
SaaS cloud computing is gaining momentum in recent years with more and more successful application adoptions. Processes of these applications often comprise a series of services mapping to users' work flows and a consumer has to designate a particular provider for each service when deploying an application. As long as the provider fails to deliver the service, all application processes which include...
It is getting important that applies social network of collaborative learning to intelligent distance learning system. In this paper, we used the Rule-Space Model to infer reasonable Blue-Red trees of learning performance and their definitions. We can derive nine learning groups of social network grouping algorithms and classify particular Blue-Red Trees that belong to specific learning group from...
Human relationship is an influence connection. People always live together with interactions in order to get values. This paper first discusses the contents of a general value system with measures for positive and negative values. A framework of value-oriented human relationship then is proposed. Interchange can produce relationship among participants. In such, this paper proposes a human relationship...
When Taiwan's traditional food industry facing the economic recession in 2008, except strengthen the constitution of themselves, they also promote the market scope to chain to develop franchise system aggressively. In order to promote the competition of enterprise and reduce management cost, this study that the writer counseling “LUNGHSIENCHU” will show the proven process of e-commerce, it becomes...
Digital divides are the byproducts of the development of information technologies and digitalization. What concerns most of the governments and the international organizations is the disturbance of the promotion of national competitiveness as well as the improvement of human lives caused by the presence of digital divides. Countries world wide have proposed numerous of strategies to reduce digital...
The urgent needs of medical assistant for elderly increase rapidly. This paper presents an e-service design on stroke-precaution for elderly, followed by its implementation and evaluation. The e-service design focuses on the elderly problems including the degeneracy of memory and vision as well as the recession of attention. These physiological problems become the barriers for elderly to learn knowledge...
The information communication technology definitely encouraging global collaboration among enterprises on a project basis makes virtual enterprises possible and popular. Moreover, web service provides various advantages for facilitating co-operation between business partners in virtual enterprises. For improving the efficiency of project management in the cyber space, the semantic support becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.