RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Cryptosystem Applications in Mobile Agent Security

        Timothy K. Shih 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.1

        Despite of many practical benefits of mobile agent these technology results in a significant new security threats from malicious agents and hosts. One of the added complications is the change of state in ways that adversely impact the functionality of agent as it traverses in multiple hosts. With primary added complication, this paper investigates the threat and presents a solution using encryption and digital signing techniques for providing confidentiality, data integrity and authenticity. We use both encryption and digital signing techniques for providing confidentiality, data integrity and authenticity. The document itself is partially signed by multiple nodes without breaking the digital signatures

      • A Personal Tutoring Mechanism Based on the Cloud Environment

        Martin M. Weng,Timothy K. Shih,Jason C. Hung 한국정보기술융합학회 2013 JoC Vol.4 No.2

        With the advent of the age of the Knowledge Economy, the desire for knowledge has been growing gradually. E-learning not only escapes from the limitations of time and space but allows researchers to develop related services via an open and powerful environment (i.e. cloud computing) through the development of information communication techniques and the popularity of portable devices. In this paper, we will introduce the two core mechanisms, asynchronous caching and adaptive delivery that integrate in the cloud environment. The first mechanism takes advantage of background scheduling to allow partial content processing and downloading in parallel. The second pays more attention to personalization service provision in accordance with situations such as location, time, and external information. The system optimizes the pervasive learning environment through the processing of the mechanisms mentioned above in the cloudbased environment.

      • Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification

        Myung, Jihoon,Lee, Wonjun,Srivastava, Jaideep,Shih, Timothy K. IEEE 2007 IEEE transactions on parallel and distributed syst Vol.18 No.6

        <P>Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags transmit their IDs simultaneously, the tag-to-reader signals collide and this collision disturbs a reader's identification process. Therefore, tag collision arbitration for passive tags is a significant issue for fast identification. This paper presents two adaptive tag anticollision protocols: an Adaptive Query Splitting protocol (AQS), which is an improvement on the query tree protocol, and an Adaptive Binary Splitting protocol (ABS), which is based on the binary tree protocol and is a de facto standard for RFID anticollision protocols. To reduce collisions and identify tags efficiently, adaptive tag anticollision protocols use information obtained from the last process of tag identification. Our performance evaluation shows that AQS and ABS outperform other tree-based tag anticollision protocols.</P>

      • KCI등재

        Indicator Elimination for Locally Adaptive Scheme Using Data Hiding Technique

        ( Hon-hang Chang ),( Yung-chen Chou ),( Timothy K. Shih ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.12

        Image compression is a popular research issue that focuses on the problems of reducing the size of multimedia files. Vector Quantization (VQ) is a well-known lossy compression method which can significantly reduce the size of a digital image while maintaining acceptable visual quality. A locally adaptive scheme (LAS) was proposed to improve the compression rate of VQ in 1997. However, a LAS needs extra indicators to indicate the sources, consequently the compression rate of LAS will be affected. In this paper, we propose a novel method to eliminate the LAS indicators and so improve the compression rate. The proposed method uses the concept of data hiding to conceal the indicators, thus further improving the compression rate of LAS. From experimental results, it is clearly demonstrated that the proposed method can actually eliminate the extra indicators while successfully improving the compression rate of the LAS.

      • KCI등재

        Analysis of Kernel Performance in Support Vector Machine Using Seven Features Extraction for Obstacle Detection

        Fitri Utaminingrum,Sri Mayena,I Komang Somawirata,Anindita Septiarini,Timothy K. Shih 제어·로봇·시스템학회 2023 International Journal of Control, Automation, and Vol.21 No.1

        Many electric powered wheelchairs (EPW) users fall due to the user’s carelessness of the road conditions in front of them that will have a significant impact on accidents. The process for detecting road conditions is one solution to maintain the safety of EPW users. This research is conducted to develop autonomous systems in the wheelchair to detect stair descent and floor obstacles. The system accomplished to prevent fatal risks occurs to the user, such as falling from the stairs that cause fractures. Moreover, the main goal of the system expansion is to identify the best kernel class from the support vector machine (SVM) classification method to distinguish the stair descent and the floor. This experiment is completed using the SVM method classified into four kernel functions: linear, polynomial, Gaussian, and Sigmoid kernel class, and also associated with gray-level co-occurrence matrix (GLCM) features extraction. The SVM produces the best result for detecting used linear kernel function with GLCM parameters (d = 1, θ = 0) was reached an average of accuracy is 89.0% for image data testing and video testing is 82.6%.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼