Search Results - "2010 International Conference on Networking and Digital Society"

Refine Results
  1. 1

    A fuzzy logic based vertical handoff decision algorithm between WWAN and WLAN by Qing He

    “…Next generation wireless communications will integrate multiple wireless access networks, including Wireless Wide Area Network (WWAN) and Wireless Local Area…”
    Get full text
    Conference Proceeding
  2. 2

    A PKI-based mechanism for secure and efficient access to outsourced data by Jiazhu Dai, Qin Zhou

    “…Providing secure and efficient access to large scale data is an important component of cloud computing. In this paper, a PKI-based access control mechanism is…”
    Get full text
    Conference Proceeding
  3. 3

    The study on network intrusion detection system of Snort by Zhou, Zhimin, Chen, Zhongwen, Zhou, Tiecheng, Guan, Xiaohui

    “…Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous…”
    Get full text
    Conference Proceeding
  4. 4

    A behavior classification based on Enhanced Gait Energy Image by Lin Chunli, Wang Kejun

    “…A behavior classification method based on Enhanced Gait Energy Image (EGEI) and 2-Directional 2-dimensional principal component analysis ((2D) 2 PCA) was…”
    Get full text
    Conference Proceeding
  5. 5

    Research on the optimal combination of ACO parameters based on PSO by Xin Xie, Peng Wu

    “…As ACO's different value of parameters has impact on its performance. Try to find the optimal combination of parameters can make algorithm have best…”
    Get full text
    Conference Proceeding
  6. 6

    Application of web 2.0 technologies in e-learning context by Liyong Wan

    “…Web 2.0 is defined as the collective set of Internet-based tools such as wikis, blogs, web based applications, social networking sites and so on. The use of…”
    Get full text
    Conference Proceeding
  7. 7

    Face detection system based on skin color model by Chen Zhipeng, Hu Junda, Zou Wenbin

    “…This paper presents a simple face detection algorithm which is based on skin color model and can be easily realized and transplanted, with high-performance and…”
    Get full text
    Conference Proceeding
  8. 8

    An effective algorithm for mining quantitative associations based on subspace clustering by Yang, Junrui, Feng, Zhang

    “…Algorithms for mining Boolean association rules have been well studied and documented, but they cannot deal with quantitative data directly. In this paper, a…”
    Get full text
    Conference Proceeding
  9. 9

    Research of self-adaptive Chroma Space Model Skin-color Algorithm Based on Illumination and its application to erotic webpage filtering by Xiaohui Zhao

    “…Network erotic information can do very bad influences on people. Skin-color detection is the key technique to the Face Recognition and Erotic Image Filtering…”
    Get full text
    Conference Proceeding
  10. 10

    An Adaptive Forward Error Control Method for Voice Communication by Wang Lizhong, Wu Muqing, Wei Lulu, Li Mojia

    “…In the end-to-end voice communication networks, the packet losses caused by network congestion and wireless channel errors reduce the efficiency of the forward…”
    Get full text
    Conference Proceeding
  11. 11

    Creating a Web 2.0 government: Views and perspectives by Hau-Dong Tsui, Chong-Yen Lee, Ching-Bang Yao

    “…Over the last decade, the role played by governments has moved further away from direct service provision towards regulation and governance of services…”
    Get full text
    Conference Proceeding
  12. 12

    Review of online stickiness research from consumer perspective by Haiping Wang

    “…Online stickiness means that the attributes website owns to absorb and retain consumers in e-marketing from marketing perspective. It can help to create and…”
    Get full text
    Conference Proceeding
  13. 13

    Analysis of virtual simulation environment for driving behavior based on imaging movements by Liang Jingkun, Xu Guizhi, Ge Jianrong, Zhu Feng, Feng Xiuyan

    “…To meet driving behavior based on imaging movements, an environment is designed integrated with audio-visual simulation, compared with arrows and other simple…”
    Get full text
    Conference Proceeding
  14. 14

    Incremental maintenance of association rules over data streams by Jun Tan, Yingyong Bu, Haiming Zhao

    “…There exist emerging applications of data streams that require association rules mining, such as web click stream mining, sensor networks, and network traffic…”
    Get full text
    Conference Proceeding
  15. 15

    Node power management design in wireless sensor networks based on genetic algorithm by Hongsheng Li, Yongzhong Ding, Zhuomin Zhang, Haiyan Zhang

    “…Node power management is one of the key problems in wireless sensor networks. This paper proposes a new power management method by using genetic algorithm…”
    Get full text
    Conference Proceeding
  16. 16

    Analysis and research of network topology discovery method by He Peng, Qiu Jian-lin, Gu Xiang

    “…This paper introduces five popular topology discovery methods such as method based on ICMP protocol, method based on SNMP protocol, method based on ARP…”
    Get full text
    Conference Proceeding
  17. 17

    Wireless monitoring system based on Bluetooth smart phones by Wu Ting, Hu Jun-da, Gao Chenjie, Zhao Jia, Ye Wei

    “…Compared with other mature wireless technology, Bluetooth technology has many properties, such as short-distance convenience communications and devices…”
    Get full text
    Conference Proceeding
  18. 18

    An accessibility study of Chinese local government websites by Zhenxiang Sun, Huaihe Chen

    “…The Chinese local government websites have brought great convenience to people's daily lives and work since the inception of "Government Online"Project…”
    Get full text
    Conference Proceeding
  19. 19

    Research on the security of storage virtualization based on trusted computing by Zhang Qiang, Wu Yunlong, Cui Dong, Dang Zhuang

    “…The technology of storage virtualization is widely used all around the world. The network-based virtualization is an essential tendency of storage systems…”
    Get full text
    Conference Proceeding
  20. 20

    Levenberg-Marquardt neural network for gear fault diagnosis by Tang Jia-li, Liu Yi-jun, Wu Fang-sheng

    “…In this study we are trying with the Levenberg-Marquardt neural network model to the problem of gear fault diagnosis. By using second derivative information,…”
    Get full text
    Conference Proceeding