You are here:

Journal of Applied Research and Technology

August 2013 Volume 11, Number 4

Search this issue

Table of Contents

Number of articles: 14

  1. Perceptual Zero-Tree Coding with Efficient Optimization for Embedded Platforms

    B.F. Wu & H.Y. Huang, Institute of Electrical and Control Engineering National Chiao Tung University Hsinchu, Taiwan; J.H. Wang, Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei, Taiwan; C.J. Chen, CSSP Inc. Hsinchu, Taiwan; Y.L. Chen, Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei, Taiwan

    This study proposes a block-edge-based perceptual zero-tree coding (PZTC) method, which is implemented with efficient optimization on the embedded platform. PZTC combines two novel compression... More

    Language: Español/Spanish

    pp. 487-495

    View Abstract
  2. GPS/INS Integration Accuracy Enhancement Using the Interacting Multiple Model Nonlinear Filters

    D.J. Jwo, Department of Communications, Navigation and Control Engineering National Taiwan Ocean University, Taiwan; F.C. Chung, Inventec Appliances, Taiwan; K.L. Yu, Systems & Technology Corp., Taiwan

    In this paper, performance evaluation for various single model nonlinear filters and nonlinear filters with interacting multiple model (IMM) framework is carried out. A high gain (high bandwidth)... More

    pp. 496-509

    View Abstract
  3. Cultural Evolution Algorithm for Global Optimizations and its Applications

    H.C. Kuo & C.H. Lin

    The course of socio-cultural transition can neither be aimless nor arbitrary, instead it requires a clear direction. A common goal of social species’ evolution is to move towards an advanced... More

    pp. 510-522

    View Abstract
  4. Research on Optimized Problem-solving Solutions: Selection of the Production Process

    C.K. Ke

    In manufacturing industries, various problems may occur during the production process. The problems are complex and involve the relevant context of working environments. A problem-solving process... More

    pp. 523-532

    View Abstract
  5. The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

    Y. Chen, Department of Computer Science, Huazhong Normal University Wuhan, China; G. Gao, School of Computer Science, Wuhan University Wuhan, China; S.B. Liao & H.Y. Yang, National Engineering Rearch Center for E-Learning, Huazhong Normal University Wuhan, China; S. Wang, Department of Computer Science, Huazhong Normal University Wuhan, China

    With the ever-increasing wireless data application recently, considerable efforts have been focused on the design of distributed explicit rate scheme based on Network Utility Maximization (NUM) or ... More

    pp. 533-539

    View Abstract
  6. RSVP Extensions for Seamless Handoff in Heterogeneous WLAN/WiMAX Networks

    N.C. Wang & Y.K. Chiang, Department of Computer Science and Information Engineering National United University Miao-Li, Engineering Pukyong National University Daeyeon 3-Dong; S.M. Wei, Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung, Engineering Pukyong National University Daeyeon 3-Dong

    Providing a seamless handoff for QoS connections in heterogeneous wireless local networks (WLANs) and worldwide interoperability for microwave access (WiMAX) networks is crucial. The handoff delay ... More

    pp. 540-548

    View Abstract
  7. Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

    X.W. Li & D.H. Kim, Department of information and communications, Engineering Pukyong National University; S.J. Cho, Department of Applied mathematics, Pukyong National University; S.T. Kim, Department of information and communications, Engineering Pukyong National University

    A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear... More

    pp. 549-558

    View Abstract
  8. Bilateral Waveform Similarity Overlap-and-Add Based Packet Loss Concealment for Voice over IP

    J.F. Yeh, Department of Computer Science and Information Engineering, National Chiayi University; P.C. Lin, Department of Computer Science and Information Engineering, Far East University; M.D. Kuo & Z.H. Hsu, Department of Computer Science and Information Engineering, National Chiayi University

    This paper invested a bilateral waveform similarity overlap-and-add algorithm for voice packet lost. Since Packet lost will cause the semantic misunderstanding, it has become one of the most... More

    pp. 559-567

    View Abstract
  9. Fuzzy Analytic Hierarchy Process for Risk Assessment to General-assembling of Satellite

    J. Tian & Z.F. Yan

    With a fuzzy analytic hierarchy process, the hierarchy of risk factors in satellite general-assembling process is established, based on which, the weights of various risk factors are determined one... More

    pp. 568-577

    View Abstract
  10. A Kind of New Multicast Routing Algorithm for Application of Internet of Things

    G. Li, D.G. Zhang, K. Zheng, X.C. Ming, Z.H. Pan & K.W. Jiang, Key Laboratory of Computer Vision and System (Tianjin University of Technology), China

    Wireless Sensor Networks (WSN) is widely used as an effective medium to integrate physical world and information world of Internet of Things (IOT). While keeping energy consumption at a minimal... More

    pp. 578-585

    View Abstract
  11. Structure Learning of Bayesian Networks by Estimation of Distribution Algorithms with Transpose Mutation

    D.W. Kim & S. Ko, School of Computer Science and Engineering, Chung-Ang University; B.Y. Kang, School of Mechanical Engineering, Kyungpook National University

    Estimation of distribution algorithms (EDAs) constitute a new branch of evolutionary optimization algorithms that were developed as a natural alternative to genetic algorithms (GAs). Several... More

    pp. 586-596

    View Abstract
  12. Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme

    Y.C. Lee

    Due to the open environment, all network systems suffer from various security threats. The remote user authentication scheme is a secure mechanism to allow users obtaining a variety of information ... More

    pp. 597-603

    View Abstract
  13. Adaptive Transmission Opportunity Scheme Based on Delay Bound and Network Load in IEEE 802.11e Wireless LANs

    S. Kim, Department of Computer Software Engineering Kumoh National Institute of Technology Gumi; Y.J. Cho, Department of Information and Computer Engineering Ajou University Suwon

    The IEEE 802.11e EDCA (Enhanced Distributed Channel Access) is able to provide QoS (Quality of Service) by adjusting the transmission opportunities (TXOPs), which control the period to access the... More

    pp. 604-611

    View Abstract
  14. Throughput Analysis Model for IEEE 802.11e EDCA with Multiple Access Categories

    Y. Lee

    IEEE 802.11e standard has been specified to support differentiated quality of service (QoS), one of the critical issues on the conventional IEEE 802.11 wireless local area networks (WLANs).... More

    pp. 612-621

    View Abstract