National Cheng Kung University

Displaying 1-40 of 53 results

  • White Papers // Oct 2013

    Selecting Key Management Schemes for WSN Applications

    Key management in Wireless Sensor Networks (WSN) is an active research topic. Due to the large number of Key Management Schemes (KMS) proposed in the literature, it is not easy for a sensor network designer to know exactly which KMS best fits in a particular WSN application. In this paper,...

    Provided By National Cheng Kung University

  • White Papers // Oct 2012

    Game Theoretic Channel Allocation for the Delay-Sensitive Cognitive Radio Networks

    In this paper, the authors propose several channel allocation schemes via the Game theoretical approaches for the distributed CR networks. Distinguished from the literature, more important factors are taken into account when designing the potential games for the interweave and underlay CR networks, i.e. the queuing delay, complete inter-system interference...

    Provided By National Cheng Kung University

  • White Papers // Oct 2012

    Two-Stage Compensation for Non-Ideal Effects in MIMO-OFDM Systems

    In this paper, the authors propose a two-stage estimation and compensation of the Carrier Frequency Offset (CFO) and the IQ imbalance in MIMO-OFDM systems. In the first stage, the receiver IQ imbalance is compensated along with CFO estimation. In the second stage, the transmitter IQ imbalance is compensated by taking...

    Provided By National Cheng Kung University

  • White Papers // Sep 2012

    Resolving TCP Re-Ordering Issues on a Multi-Homed NEMO-Based Network

    A multi-homed NEtwork MObility (NEMO) architecture has been proposed previously to improve the reliability and aggregate the bandwidth of Mobile Router (MR) by simultaneously using multiple wireless links. In this paper, the authors discuss some potential issues that could affect the performance of TCP traffic in a multi-homed architecture. In...

    Provided By National Cheng Kung University

  • White Papers // Sep 2012

    Using Virtual Credits to Provide Incentives for Vehicle Communication

    Participatory sensing has been recently proposed as a replacement for traditional mobile sensing system. In this paper, the authors adopt the concept of participatory sensing for mobile surveillance by involving a human into the loop of data collection. Furthermore, they introduce a virtual credit based mechanism to motivate the participants...

    Provided By National Cheng Kung University

  • White Papers // Sep 2012

    On the Formation of Vehicle Clusters

    Node mobility in a vehicular network is strongly affected by the driving behavior such as route choices. While route choice models have been extensively studied in the transportation community, as far as the authors know, the effects of preferred route on vehicular network simulations have not been discussed much in...

    Provided By National Cheng Kung University

  • White Papers // Jul 2012

    LOTIR: A Routing Protocol for Multi-Hop V-to-I Communication Using Local Traffic Information

    Vehicular Ad Hoc NETwork (VANET) is an emerging technology that can be applied to safety, transport efficiency, or infotainment applications for roads and highways. However, due to its unique features, such as dynamic mobility patterns and uneven distributions of vehicles, VANET faces many challenging research issues for robust data dissemination...

    Provided By National Cheng Kung University

  • White Papers // Jun 2012

    A Trace-Based Feasibility Study of Infrastructure-Less VoIP

    Voice over IP (VoIP) is one of the most popular Internet applications. Many VoIP protocols (e.g. SIP) are based on a central-server scheme in which a caller needs to query the central server first for the callee's information (e.g., IP address) before it can connect to them. However, such a...

    Provided By National Cheng Kung University

  • White Papers // May 2012

    Using Vehicular Sensor Networks for Mobile Surveillance

    Mobile surveillance has been recently proposed as a replacement for traditional road-side surveillance system. One important aspect of a mobile surveillance system is to decide what are the events of interest. In this paper, the authors adopt the concept of participatory sensing for mobile surveillance by involving a human into...

    Provided By National Cheng Kung University

  • White Papers // May 2012

    Using Smartphone With Un-Scaled Map for Indoor Localization

    The Pedestrian Dead Reckoning (PDR) system is a self-contained technique that has been proposed for indoor localization. It only requires a few sensors to be put on the user and can be used for any building without pre-installed beacon nodes or pre-built RF maps/propagation models based on surveys of the...

    Provided By National Cheng Kung University

  • White Papers // Mar 2012

    Decentralized Boundary Detection Without Location Information in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs) deployed in an outdoor environment, obstacles may occur as a result of a non-uniform distribution of the sensor nodes or the presence of barriers. These obstacles result in a degradation of the network performance, so obstacle identification is a major concern in most WSN applications....

    Provided By National Cheng Kung University

  • White Papers // Mar 2012

    Estimating Step Distance With a Smart Phone

    Some prior studies proposed the use of Pedestrian Dead Reckoning (PDR) for indoor localization. The PDR system does not require a beacon-based infrastructure, in which a small number of sensors are put on the pedestrian. These sensors (such as G-sensor and Gyro) are used to estimate the distance and direction...

    Provided By National Cheng Kung University

  • White Papers // Feb 2012

    Adaptive Vehicle to Vehicle Heterogeneous Transmission in Cooperative Cognitive Network VANETS

    The Vehicle-To-Vehicle (V2V) communication system is an active radio broadcast system to receive information of disseminated road congestion and accident in real-time situation. V2V and Vehicle-To-Infrastructure (V2I) communication are developed based on the IEEE 802.11p technology, ad hoc principles, and wireless multi-hop techniques using geographical positions. Cognitive Radio (CR) system...

    Provided By National Cheng Kung University

  • White Papers // Feb 2012

    Observer-Based Adaptive Fuzzy Robust Controller with Self-Adjusted Membership Functions for a Class of Uncertain MIMO Nonlinear Systems: A PSO-SA Method

    In this paper, a novel adaptive fuzzy robust controller with a state observer approach based on the hybrid Particle Swarm Optimization-Simulated Annealing (PSO-SA) technique for a class of Multi-Input Multi-Output (MIMO) nonlinear systems with disturbances is proposed. The Particle Swarm Optimization-Simulated Annealing (PSO-SA) is used to adjust the fuzzy membership...

    Provided By National Cheng Kung University

  • White Papers // Feb 2012

    A Multicast Mechanism Using Significance-Based and Interference-Aware Algorithm for Intra WiMAX Mesh Network

    IEEE 802.16 WiMAX is a rapidly developing technology for broadband wire-less access systems. The IEEE 802.16 MAC layer defines two operational modes, Point-to-MultiPoint (PMP) mode and mesh mode. In the centralized protocol, all resources are controlled by Base Station (BS). In this paper, the authors propose a novel two-stage scheme...

    Provided By National Cheng Kung University

  • White Papers // Jan 2012

    Estimating Step Distance Using Simple Harmonic Motion

    Some prior studies proposed the use of Pedestrian Dead Reckoning (PDR) for indoor localization. The PDR system does not require a beacon-based infrastructure, in which a small number of sensors are put on the pedestrian. These sensors (such as G-sensor and Gyro) are used to estimate the distance and direction...

    Provided By National Cheng Kung University

  • White Papers // Jan 2012

    Using Simple Harmonic Motion to Estimate Walking Distance for Waist-Mounted PDR

    A huge body of work utilized signal strength of short range signal (such as WiFi, Bluetooth, ultra sound or Infrared) to build a radio map for indoor localization, by deploying a great number of beacon nodes in the building. The drawback of such an infrastructure-based approach is that the deployment...

    Provided By National Cheng Kung University

  • White Papers // Oct 2011

    On the Efficiency of Cluster-Based Approaches for Motion Detection Using Body Sensor Networks

    Body Sensor Networks (BSN) are an emerging application that places sensors on the human body. Given that a BSN is typically powered by a battery, one of the most critical challenges is how to prolong the lifetime of all sensor nodes. Recently, using clusters to reduce the energy consumption of...

    Provided By National Cheng Kung University

  • White Papers // Aug 2011

    Fast Multi-Cipher Transformation and Its Implementation for Modern Secure Protocols

    In this paper, the authors propose a Fast Multi-Cipher Transformation (FMCT) scheme which enables a cryptosystem to employ multiple cipher algorithms concurrently and efficiently in a session of communication. A le can be encrypted by different cipher algorithms with diverse parameters through FMCT. They prove that a cryptosystem based on...

    Provided By National Cheng Kung University

  • White Papers // May 2011

    Examining the Factors that Affect ERP Assimilation

    The aim of this paper is to identify the factors that influence the assimilation of Enterprise Resource Planning (ERP) systems in the post-implementation stage. Building on Organizational Information Processing Theory (OIPT) and Absorptive Capacity (AC), the authors propose an integrated model, which examines the relationship among organizational fit, absorptive capacity,...

    Provided By National Cheng Kung University

  • White Papers // May 2011

    On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection Systems

    In an 802.11p (so-called DSRC) network, the WSMP protocol is used for the communication between OBU and RSU. Unlike a wired network, an 802.11p wireless network is prone to fading, shadowing and interferences, which might result in high error rates. However, there is no reliability mechanism embedded in the WSMP...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    A Delay-Bounded Relaying Diversity Scheme in Multi-User Cooperative Wireless Networks

    Relay-assisted cooperative communication has received considerable attention as a promising approach to alleviate the burden of installing multiple antennas on simple terminals but still achieving transmit diversity. In most prior work, perfect error detection is assumed to prevent relays that receive in error from forwarding. Since error detection is often...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    Evaluating the Perceived Quality of Infrastructure-Less VOIP

    Voice over IP (VoIP) is one of the most popular Internet applications. Many VoIP protocols (e.g. SIP) are based on a central-server scheme in which a caller needs to query the central server first for the callee's information (e.g. IP address) before it can connect to them. However, such a...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    An Effective Privacy Protection Scheme for Cloud Computing

    With the rapid development of cloud computing, more cloud services are into the people daily life, and thus security protection of cloud services, especially data privacy protection, becomes more important. However to perform privacy protection causes huge overhead. Thus it is a critical issue to perform the most suitable protection...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    Systematic Process Analysis in Industrial Business Management: A Practitioner Tool Kit

    The increasing labor cost had eroded the benefit of the manufacturing industry gradually. To revise the business process and to formulate a strategy in order to survival became an important lesson. Since the Supply Chain Council developed the Supply Chain Operations Reference (SCOR) model, it was widely applied by many...

    Provided By National Cheng Kung University

  • White Papers // Mar 2011

    Observer-Based Iterative Learning Control with Evolutionary Programming Algorithm for MIMO Nonlinear Systems

    In this paper, the observer-based iterative learning control with/without evolutionary programming algorithm is proposed for MIMO nonlinear systems. While the learning gain involves some un-measurable states, this paper proposes the observer-based Iterative Learning Control (ILC) for nonlinear systems and guarantees the tracking error convergences to zero via continual learning. Moreover,...

    Provided By National Cheng Kung University

  • White Papers // Feb 2011

    A Feasibility Study on Vehicle-to-Infrastructure Communication: WiFi Vs. WiMAX

    Vehicular network is becoming increasingly popular in recent years, in which vehicles constitute a wireless mobile network. Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) are two different modes of communication in a vehicular network. Some measurement studies have previously been undertaken to understand the feasibility of using WiFi for V2V and V2I...

    Provided By National Cheng Kung University

  • White Papers // Feb 2011

    A Novel Cache Replacement Algorithm for Cooperative Caching in Wireless Multimedia Sensor Networks

    In recent years, integrated applications with multimedia devices and wireless sensor networks promoted the evolution of wireless sensor networks, namely Wireless Multimedia Sensor Networks (WMSNs). The applications in WMSNs have to focus on both energy saving and application-level Quality of Service (QoS). To overcome this challenge, in this paper, the...

    Provided By National Cheng Kung University

  • White Papers // Jan 2011

    A Method to Diagnose Self-Weaknesses for Software Development Organizations

    A root cause is a source of a defect such that if it is removed, the defect is subsequently decreased or removed. By analyzing the root causes of defects of the software projects, the authors will be able to determine the weaknesses of their software development teams. They could thus...

    Provided By National Cheng Kung University

  • White Papers // Dec 2010

    SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks

    Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There are a large number of available KMS protocols in the literature, but it is not clear...

    Provided By National Cheng Kung University

  • White Papers // Sep 2010

    Beyond ERP Implementation: The Moderating Effect of Knowledge Management on Business Performance

    The implementation of an Enterprise Resource Planning (ERP) system is known to be time consuming and resource demanding. The success rate of implementation has been notoriously low. This may be attributed to the contextual factors of an implementing organization. Previous studies of the success factors of ERP system implementation often...

    Provided By National Cheng Kung University

  • White Papers // Sep 2010

    Reliable Data Broadcast for Zigbee Wireless Sensor Networks

    As people know, the data transmission in the wireless networks is more unreliable than it is in the wired network environment. Although the virtual carrier sensing scheme can be used in the wireless unicast transmission, the multicast and broadcast still not utilize the acknowledgement mechanism for reliable transmission. This is...

    Provided By National Cheng Kung University

  • White Papers // Jul 2010

    Measuring the Location of Bio-Sensing Sensors

    In recent years, the wireless sensor network is getting more and more popular and applied into many applications. Depending on different requirements, people usually use more than one sensor in their application since the sensor is cheap, low power consuming and easy to carry. Besides, most applications require identifying the...

    Provided By National Cheng Kung University

  • White Papers // Apr 2010

    Towards Optimized Packet Processing for Multithreaded Network Processor

    With the evolution of the Internet, current routers need to support a variety of emerging network applications while the high packet processing rate is still guaranteed. As a result, the network processor has become a promising solution for network devices due to its computation capability and programming flexibility. However, developing...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    PAT: A Path-Aggregation-Tree Multicast Routing Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) make possible many new applications in a wide range of application domains. Many of these applications are based on a many-to-many communication paradigm in which multiple sensor nodes send their sensed data to multiple sinks. To support these many-to-many applications, this paper proposes an energy-efficient transport...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    Ontology-Based Knowledge Integration for Distributed Product Knowledge Service

    Conventional business models focus on providing end products and services regardless of product or service related knowledge. Such models are unable to meet customer requirements in the age of knowledge economy. This paper presents an ontology-based knowledge integration approach that is able to handle heterogeneity and variation of knowledge form...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    Spectrum Sharing in Cognitive Radio Networks - An Auction Based Approach

    Cognitive radio is emerging as a promising technique to improve the utilization of radio frequency spectrum. In this paper, the authors consider the problem of spectrum sharing among primary (or "Licensed") and secondary (or "Unlicensed") users. They formulate the problem based on bandwidth auction in which each secondary user makes...

    Provided By National Cheng Kung University

  • White Papers // Jul 2009

    The Effects of Detailed Mobility Models on Vehicular Network Simulations

    While it is crucial to test and evaluate protocol implementations in a real world environment, simulations are still commonly used as a first step in the protocol development for Vehicular Ad-Hoc NETwork (VANET) research. Several communication networking simulation tools already exist to provide a platform to test and evaluate network...

    Provided By National Cheng Kung University

  • White Papers // Jul 2009

    Localized Data Dissemination in Vehicular Sensing Networks

    A Vehicular Sensing Network (VSN) is a type of Wireless Sensor Network that empowers legacy resource-constrained WSNs by taking advantage of the rich network resources (e.g., the battery life, storage capability, and mobility) of vehicles. In this paper, the authors posit that the sensed data in VSNs is generally local...

    Provided By National Cheng Kung University

  • White Papers // Jun 2009

    A RSSI-Based Algorithm for Indoor Localization Using ZigBee in Wireless Sensor Network

    For the various applications in home automation, the service system requires to precisely estimate user's locations by certain sensors. It is considered as a challenge to automatically serve a mobile user in the house. However, indoor localization cannot be carried out effectively by the well-know Global Positioning System (GPS). In...

    Provided By National Cheng Kung University

  • White Papers // Oct 2013

    Selecting Key Management Schemes for WSN Applications

    Key management in Wireless Sensor Networks (WSN) is an active research topic. Due to the large number of Key Management Schemes (KMS) proposed in the literature, it is not easy for a sensor network designer to know exactly which KMS best fits in a particular WSN application. In this paper,...

    Provided By National Cheng Kung University

  • White Papers // May 2008

    Predicting Change Propagation in Software System With Data Mining Techniques

    Software maintenance is a very costly and time-consuming work during the software life cycle. The problems with software maintenance are even more pressing in the software system. Software developers are often faced with modification tasks that involve sources and spread across code bases. Some dependencies between sources, such as the...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    PAT: A Path-Aggregation-Tree Multicast Routing Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) make possible many new applications in a wide range of application domains. Many of these applications are based on a many-to-many communication paradigm in which multiple sensor nodes send their sensed data to multiple sinks. To support these many-to-many applications, this paper proposes an energy-efficient transport...

    Provided By National Cheng Kung University

  • White Papers // Dec 2008

    Fairness and QoS Guarantees of WiMAX OFDMA Scheduling With Fuzzy Controls

    IEEE 802.16 standard (WiMAX) is one of the most popular standards for fixed and mobile broadband wireless access systems to provide last mile access. Due to various users with diverse QoS requirements and wireless communication technologies, the resource scheduler plays an important role to provide fairness and QoS guarantees. As...

    Provided By National Cheng Kung University

  • White Papers // Dec 2008

    A Sharable JAVA Class Library for e-Learning

    This paper defines a sharable JAVA class library for e-learning which helps develop flexible e-learning courses with the ability of interaction between client side and server side. Also the authors refine SCORM by absorbing the spirit of Component-based software engineering which let the course developers benefit by reuse of JAVA...

    Provided By National Cheng Kung University

  • White Papers // Sep 2010

    Reliable Data Broadcast for Zigbee Wireless Sensor Networks

    As people know, the data transmission in the wireless networks is more unreliable than it is in the wired network environment. Although the virtual carrier sensing scheme can be used in the wireless unicast transmission, the multicast and broadcast still not utilize the acknowledgement mechanism for reliable transmission. This is...

    Provided By National Cheng Kung University

  • White Papers // Jun 2008

    Loss Aversion And The January Size Effect: Evidence From Three Chinese Culture-oriented Stock Markets

    The remarkable economic growth in the Pacific-Basin Chinese region has made the area's stock markets attractive to investors around the world. Researchers have also shown tremendous interest in exploring related issues, particularly the stock markets in the Pacific-Basin Chinese region, like China, Hong Kong, and Taiwan. The people in this...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    Ontology-Based Knowledge Integration for Distributed Product Knowledge Service

    Conventional business models focus on providing end products and services regardless of product or service related knowledge. Such models are unable to meet customer requirements in the age of knowledge economy. This paper presents an ontology-based knowledge integration approach that is able to handle heterogeneity and variation of knowledge form...

    Provided By National Cheng Kung University

  • White Papers // Sep 2010

    Beyond ERP Implementation: The Moderating Effect of Knowledge Management on Business Performance

    The implementation of an Enterprise Resource Planning (ERP) system is known to be time consuming and resource demanding. The success rate of implementation has been notoriously low. This may be attributed to the contextual factors of an implementing organization. Previous studies of the success factors of ERP system implementation often...

    Provided By National Cheng Kung University

  • White Papers // May 2008

    Short-Code Threading: A Memory-Saving and Efficient Approach to Accelerate the Token Threaded Code for Embedded Systems

    Short-code threading for virtual machine interpreters is substantially similar to direct threading. But short-code threading consumes less memory at the cost of a little performance degradation, as compared with direct threading in a 32-bit or 64-bit address machine. A 16-bit short-code is used to enroll the least two significant bytes...

    Provided By National Cheng Kung University

  • White Papers // May 2008

    An Embedded System Design for Speech Command Recognition Using Improved AMDF-Based Pitch Features

    This paper presents an embedded system design for speech command recognition using improved AMDF (Average Magnitude Difference Function)-based pitch features. Compared with the autocorrelation method, AMDF has the advantage of low computation and high precision. This paper presents three kinds of improvement for AMDF based pitch extraction. One is the...

    Provided By National Cheng Kung University

  • White Papers // Jun 2009

    A RSSI-Based Algorithm for Indoor Localization Using ZigBee in Wireless Sensor Network

    For the various applications in home automation, the service system requires to precisely estimate user's locations by certain sensors. It is considered as a challenge to automatically serve a mobile user in the house. However, indoor localization cannot be carried out effectively by the well-know Global Positioning System (GPS). In...

    Provided By National Cheng Kung University

  • White Papers // Jan 2011

    A Method to Diagnose Self-Weaknesses for Software Development Organizations

    A root cause is a source of a defect such that if it is removed, the defect is subsequently decreased or removed. By analyzing the root causes of defects of the software projects, the authors will be able to determine the weaknesses of their software development teams. They could thus...

    Provided By National Cheng Kung University

  • White Papers // Mar 2009

    A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree

    The Internet consists of a mesh of routers interconnected by links. In a router, the major function in packet forwarding process is to lookup the destination addresses for the incoming packets according to the routing table. In the recent years, due to the prevalence of the World Wide Web (WWW)...

    Provided By National Cheng Kung University

  • White Papers // Feb 2009

    A Pipelined IP Forwarding Engine With Fast Update

    IP address lookup is one of the most important functionalities in the router design. To meet the requirements in high speed routers consisting of linecards with 40Gbps transfer rates, researchers usually take lookup/update speed, storage requirement, and scalability into consideration when designing a high performance forwarding engine. As a result,...

    Provided By National Cheng Kung University

  • White Papers // Feb 2009

    Packet Processing With Blocking For Bursty Traffic on Multi-Thread Network Processor

    It is well-known that there are bursty accesses in network traffic. It means a burst of packets with the same meaningful headers are usually received by routers at the same time. With such traffic, routers usually perform the same computations and access the same memory location repeatedly. To utilize this...

    Provided By National Cheng Kung University

  • White Papers // Apr 2010

    Towards Optimized Packet Processing for Multithreaded Network Processor

    With the evolution of the Internet, current routers need to support a variety of emerging network applications while the high packet processing rate is still guaranteed. As a result, the network processor has become a promising solution for network devices due to its computation capability and programming flexibility. However, developing...

    Provided By National Cheng Kung University

  • White Papers // Feb 2011

    A Feasibility Study on Vehicle-to-Infrastructure Communication: WiFi Vs. WiMAX

    Vehicular network is becoming increasingly popular in recent years, in which vehicles constitute a wireless mobile network. Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) are two different modes of communication in a vehicular network. Some measurement studies have previously been undertaken to understand the feasibility of using WiFi for V2V and V2I...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    Evaluating the Perceived Quality of Infrastructure-Less VOIP

    Voice over IP (VoIP) is one of the most popular Internet applications. Many VoIP protocols (e.g. SIP) are based on a central-server scheme in which a caller needs to query the central server first for the callee's information (e.g. IP address) before it can connect to them. However, such a...

    Provided By National Cheng Kung University

  • White Papers // Jan 2012

    Using Simple Harmonic Motion to Estimate Walking Distance for Waist-Mounted PDR

    A huge body of work utilized signal strength of short range signal (such as WiFi, Bluetooth, ultra sound or Infrared) to build a radio map for indoor localization, by deploying a great number of beacon nodes in the building. The drawback of such an infrastructure-based approach is that the deployment...

    Provided By National Cheng Kung University

  • White Papers // Mar 2012

    Decentralized Boundary Detection Without Location Information in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs) deployed in an outdoor environment, obstacles may occur as a result of a non-uniform distribution of the sensor nodes or the presence of barriers. These obstacles result in a degradation of the network performance, so obstacle identification is a major concern in most WSN applications....

    Provided By National Cheng Kung University

  • White Papers // Aug 2011

    Fast Multi-Cipher Transformation and Its Implementation for Modern Secure Protocols

    In this paper, the authors propose a Fast Multi-Cipher Transformation (FMCT) scheme which enables a cryptosystem to employ multiple cipher algorithms concurrently and efficiently in a session of communication. A le can be encrypted by different cipher algorithms with diverse parameters through FMCT. They prove that a cryptosystem based on...

    Provided By National Cheng Kung University

  • White Papers // Mar 2011

    Observer-Based Iterative Learning Control with Evolutionary Programming Algorithm for MIMO Nonlinear Systems

    In this paper, the observer-based iterative learning control with/without evolutionary programming algorithm is proposed for MIMO nonlinear systems. While the learning gain involves some un-measurable states, this paper proposes the observer-based Iterative Learning Control (ILC) for nonlinear systems and guarantees the tracking error convergences to zero via continual learning. Moreover,...

    Provided By National Cheng Kung University

  • White Papers // Feb 2011

    A Novel Cache Replacement Algorithm for Cooperative Caching in Wireless Multimedia Sensor Networks

    In recent years, integrated applications with multimedia devices and wireless sensor networks promoted the evolution of wireless sensor networks, namely Wireless Multimedia Sensor Networks (WMSNs). The applications in WMSNs have to focus on both energy saving and application-level Quality of Service (QoS). To overcome this challenge, in this paper, the...

    Provided By National Cheng Kung University

  • White Papers // Oct 2012

    Game Theoretic Channel Allocation for the Delay-Sensitive Cognitive Radio Networks

    In this paper, the authors propose several channel allocation schemes via the Game theoretical approaches for the distributed CR networks. Distinguished from the literature, more important factors are taken into account when designing the potential games for the interweave and underlay CR networks, i.e. the queuing delay, complete inter-system interference...

    Provided By National Cheng Kung University

  • White Papers // Oct 2012

    Two-Stage Compensation for Non-Ideal Effects in MIMO-OFDM Systems

    In this paper, the authors propose a two-stage estimation and compensation of the Carrier Frequency Offset (CFO) and the IQ imbalance in MIMO-OFDM systems. In the first stage, the receiver IQ imbalance is compensated along with CFO estimation. In the second stage, the transmitter IQ imbalance is compensated by taking...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    Systematic Process Analysis in Industrial Business Management: A Practitioner Tool Kit

    The increasing labor cost had eroded the benefit of the manufacturing industry gradually. To revise the business process and to formulate a strategy in order to survival became an important lesson. Since the Supply Chain Council developed the Supply Chain Operations Reference (SCOR) model, it was widely applied by many...

    Provided By National Cheng Kung University

  • White Papers // May 2011

    Examining the Factors that Affect ERP Assimilation

    The aim of this paper is to identify the factors that influence the assimilation of Enterprise Resource Planning (ERP) systems in the post-implementation stage. Building on Organizational Information Processing Theory (OIPT) and Absorptive Capacity (AC), the authors propose an integrated model, which examines the relationship among organizational fit, absorptive capacity,...

    Provided By National Cheng Kung University

  • White Papers // Jan 2008

    A Novel Secure Communication Scheme in Vehicular Ad Hoc Networks

    Vehicular networks are very likely to become the most pervasive and applicable of mobile ad hoc networks in this decade. Vehicular Ad-hoc NETwork (VANET) has become a hot emerging research subject, but few academic publications describing its security infrastructure. In this paper, the authors review the secure infrastructure of VANET,...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    An Effective Privacy Protection Scheme for Cloud Computing

    With the rapid development of cloud computing, more cloud services are into the people daily life, and thus security protection of cloud services, especially data privacy protection, becomes more important. However to perform privacy protection causes huge overhead. Thus it is a critical issue to perform the most suitable protection...

    Provided By National Cheng Kung University

  • White Papers // Jul 2009

    Localized Data Dissemination in Vehicular Sensing Networks

    A Vehicular Sensing Network (VSN) is a type of Wireless Sensor Network that empowers legacy resource-constrained WSNs by taking advantage of the rich network resources (e.g., the battery life, storage capability, and mobility) of vehicles. In this paper, the authors posit that the sensed data in VSNs is generally local...

    Provided By National Cheng Kung University

  • White Papers // Jul 2010

    Measuring the Location of Bio-Sensing Sensors

    In recent years, the wireless sensor network is getting more and more popular and applied into many applications. Depending on different requirements, people usually use more than one sensor in their application since the sensor is cheap, low power consuming and easy to carry. Besides, most applications require identifying the...

    Provided By National Cheng Kung University

  • White Papers // Jul 2008

    On the Effects of Detailed Mobility Models in Vehicular Network Simulations

    Vehicular Ad-Hoc NETwork (VANET) communication has recently become an increasingly popular research topic in the area of wireless networking as well as the automotive industries. The goal of VANET research is to develop a vehicular communication system to enable quick and cost-efficient distribution of data for the benefit of passengers'...

    Provided By National Cheng Kung University

  • White Papers // May 2011

    On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection Systems

    In an 802.11p (so-called DSRC) network, the WSMP protocol is used for the communication between OBU and RSU. Unlike a wired network, an 802.11p wireless network is prone to fading, shadowing and interferences, which might result in high error rates. However, there is no reliability mechanism embedded in the WSMP...

    Provided By National Cheng Kung University

  • White Papers // Jul 2009

    The Effects of Detailed Mobility Models on Vehicular Network Simulations

    While it is crucial to test and evaluate protocol implementations in a real world environment, simulations are still commonly used as a first step in the protocol development for Vehicular Ad-Hoc NETwork (VANET) research. Several communication networking simulation tools already exist to provide a platform to test and evaluate network...

    Provided By National Cheng Kung University

  • White Papers // Oct 2009

    Spectrum Sharing in Cognitive Radio Networks - An Auction Based Approach

    Cognitive radio is emerging as a promising technique to improve the utilization of radio frequency spectrum. In this paper, the authors consider the problem of spectrum sharing among primary (or "Licensed") and secondary (or "Unlicensed") users. They formulate the problem based on bandwidth auction in which each secondary user makes...

    Provided By National Cheng Kung University

  • White Papers // Dec 2010

    SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks

    Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There are a large number of available KMS protocols in the literature, but it is not clear...

    Provided By National Cheng Kung University

  • White Papers // Apr 2011

    A Delay-Bounded Relaying Diversity Scheme in Multi-User Cooperative Wireless Networks

    Relay-assisted cooperative communication has received considerable attention as a promising approach to alleviate the burden of installing multiple antennas on simple terminals but still achieving transmit diversity. In most prior work, perfect error detection is assumed to prevent relays that receive in error from forwarding. Since error detection is often...

    Provided By National Cheng Kung University

  • White Papers // Feb 2009

    Update-Aware Controlled Prefix Expansion for Fast IP Lookups

    In high performance routers design, fast IP address lookup is always a challenge. In order to obtain fast lookup speed, multi-bit tries are often used to represent the routing tables. The drawbacks of multi-bit tries are the large memory usage and extensive update cost. To reduce the memory usage of...

    Provided By National Cheng Kung University

  • White Papers // Apr 2009

    Service Creation and Composition for Realization on Service-Oriented Architecture

    Applying ICT to assist daily activities and interests is already a worldwide trend. Through software and network techniques, computers could remotely provide various services. Up to now, Service-Oriented Architecture (SOA) has become one of the most popular techniques to realize these daily services in various areas. Therefore, the authors would...

    Provided By National Cheng Kung University