15 research outputs found

    An agent-based consumer recommendation mechanism

    Get PDF
    [[abstract]]The rapid development of Internet technologies is promoting e-commerce. Mobile agents are mobile, personalized, autonomous, and adaptive. These qualities make them useful for information-rich and communication-rich environments such as e-commerce. Online shopping market commerce sites have two main drawbacks: 1. Because of the different product data format in the database and representation, it is difficult to exchange information between two online markets. 2.Consumers must search and filter product information by browsing a lot of shopping sites and compare product prices by themselves. 3. It's hard to accumulate consumer loyalty. Therefore, the aim is to extend the e-commerce platform developed by our agent-based e-commerce research group and build an agent-bated consumer recommendation mechanism. On behalf of consumers, agents can trade on the e-commerce platform, record consumer preference and produce appropriate product recommendation information according to the consumer's preference.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20040329~20040331[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]Fukuoka, Japa

    Packet Scheduling Algorithm with QoS Provision in HSDPA

    Get PDF
    [[abstract]]The 3rd generation WCDMA standard has been enhanced to offer significantly increased performance for packet data. But coming application like multimedia on desiring data rates will spur the UMTS can support. To support for such high data rates, high speed downlink access (HSDPA), labeled as a 3.5G wireless system , has been published in UMTS Release05. Under the HSDPA system, have to support high speed transmission and promises a peak data rate of up to 10 Mb/s. To achieve such high speed rate, system provides the channel quality indicator (CQI) information to detect the air interface condition. Then, there are many channel condition related scheduling schemes have been proposed to attend achievement of high system performance and guarantee the quality-of-service (QoS) requirements. However, there is no solution of packet scheduling algorithm can consider differences of data-types priority management under the hybrid automatic repeat (H-ARQ) scenario. In this paper, we propose the weight combination packet scheduling algorithm to target to enhance the system efficiency and balanced QoS requirements. The proposed schemes is simulated with OPNET simulator and compared with the Max CIR and PF algorithms in fast fading channel. Simulation result shows that the proposed algorithm can both effectively increase the cell throughput and meet userpsilas satisfaction base on QoS requirements.[[conferencetype]]國際[[conferencedate]]20090526~20090529[[iscallforpapers]]Y[[conferencelocation]]Bradford, U

    Handoff strategy for multi-tier IP-based wireless network

    Get PDF
    [[abstract]]The developments of wired network technologies are significant rapidly, such as the IP-based network. These technologies can be used to develop wireless network directly. Recently, there are many communication systems brought up in order to offer mobile users with the best services. The combination of wired network and wireless network could be used to access data mutually. In this paper, the multi-tier architecture is based on IP network. Combining all these systems in a multi-tier IP-based wireless network is an important issue. In this paper, we propose a novel handoff algorithm of wireless communication for multi-tier IP-based network; the handoff algorithm is divided into two parts, which are Old-tier priority and New-tier priority algorithm. Making programs by C for simulating, and making sure that the algorithm is workable. The results of simulation show 11.99% of handoff frequency has been decreased and 8% of using rates of resource has been increased.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20030327~20030329[[iscallforpapers]]Y[[conferencelocation]]Xi'an, Chin

    Why Or Why Not Service Oriented Architecture

    Get PDF
    [[abstract]]Service Oriented Architecture (SOA) is a new computation technology in these years. Though this architecture, business application can be wrapped as loosely-coupled component. Base on business needs, connecting different component into necessary services of real process, enterprise can utilize existing applications repeatedly, then integrate the independent applications into new services. This paper focused on the issues on which enterprise needs to consider before implementation of SOA. We have a further discussion on advantages and disadvantages for adopting SOA. Once SOA is implemented what we need to care about? It is helpful on your long term success if you can thoroughly understand the key points of this paper, then the enterprise can well evaluate if its information system needs to adopt SOA.[[conferencetype]]國際[[conferencelocation]]Zhangjiajie, Chin

    Interfering-aware QoS multipath routing for ad hoc wireless network

    Get PDF
    [[abstract]]Mobile nodes are interconnected by multihop routing paths consist of unstable radio links in ad hoc wireless network. It is complex and difficult to provide QoS routing in such network because of imprecise network information, insufficient bandwidth and dynamic topology. For improving network stability and throughput, multipath routing protocols are proposed. A sender node discovers multiple disjoined routing paths and spread traffic into multiple streams according to their delay or bandwidth. For real-time streaming, unstable throughput or insufficient bandwidth invites unexpected delay or jitter if it is a multimedia streaming. Some multipath routing protocols pre-evaluate available bandwidth of paths and select enough total bandwidth from them if real-time applications demand for QoS constraint. For minimizing the cost of these paths, a path with smaller hopcounts is prior selected. These disjoined paths are general too closed with each other and the total throughput cannot just be sum up because of "paths interfering". Discovering and selecting multiple high-interfering paths is ineffectual and the total available bandwidth is not precise. In this paper, we proposed an interfering-aware QoS multipath routing protocol for QoS-constraint multimedia and real-time applications in ad hoc wireless network. We apply a scheme to evaluate available bandwidth according to the network capacities with different media access control (MAC) protocols. A concept of "interfering ratio" of multipath is discussed and we evaluate the stability and throughput improvement by simulations.[[notice]]補正完畢[[conferencetype]]國際[[iscallforpapers]]Y[[conferencelocation]]Fukuoka, Japa

    Mobility management of IP-based multi-tier network supporting mobile multimedia communication services

    Get PDF
    [[abstract]]Wireless communication that provides voice only is not sufficient to support the needs of users. It is an important feature of next generation wireless communication to offer this capability through mobile Internet. Mobile IP allows mobile hosts to change their location and reduce the probability of losing data packets in wireless communication networks. However, Mobile IP still has some defects in handoff and routing aspects. Therefore, the cellular IP protocol is proposed for routing of IP datagrams to mobile stations and fast handoff control in a limited geographical area. It can cooperate with mobile IP to provide wide area mobility support. In this paper, a handoff method is proposed to improve quality of service and resource switching management to reduce data packet loss for mobile multimedia communication in cellular IP and mobile IP networks.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20020702~20020705[[iscallforpapers]]Y[[conferencelocation]]Vienna, Austri

    Mobile agent protection and verification in the internet environment

    No full text
    [[abstract]]For mobile agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs which attack or steal our server or original data. Hence, this paper proposes a mobile agent application of E-commerce system and some authentication mechanisms for the system that include authentication of the legality of servers in E-commerce, authentication of the legality of mobile agents, and the verification of attacks on servers and mobile agents. By applying mobile agent and encryption/ decryption technologies, this paper will introduce how coordinator server establishes authentication mechanisms, and the authentication between servers, as well as how coordinator server verifies that each server is attacked or not? Meanwhile, this paper also introduces the authentication between: (1) buyer/ seller and server, (2) mobile agent and server, as well as the verification of attacks on mobile agent. Finally, this paper focuses on protecting and verifying the data that are collected by mobile agent, to ensure the data's integrity, authentication, non-repudiation, confidentiality and availability, so as to achieve the targets of data security mechanism.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20040914~20040916[[iscallforpapers]]Y[[conferencelocation]]Wuhan, Chin

    An English-learning application based on extended link grammar formalism

    No full text
    [[notice]]補正完畢[[conferencetype]]國際[[conferencelocation]]Chicago, US

    A Power Saving Sleep Scheduling based on Transmission Power Control for Wireless Sensor Networks

    No full text
    [[abstract]]The relate technologies of Wireless Sensor Networks (WSNs) have become an essential research in the future. The sensor nodes of WSNs can only use limited energy like battery. When the energy has been exhausted, WSNs cannot work anymore. In order to extend the lifetime of WSNs, the management of the sensors’ energy is an important issue. The Sleep Schedule addressed on “A Power Control Mechanism based on Sleep Scheduling for Wireless Sensor Networks” cannot guarantee that neighbor node has ability to do transmission. Use the improved algorithm and the original algorithm to do simulation comparison. The improved algorithm which is better than the network without sleep scheduling algorithm can complete 40 rounds and has no data loss. As a result, the improved algorithm proposed in this thesis can effectively resolve the data loss problem of the original algorithm.[[conferencetype]]國際[[conferencedate]]20110703~20110704[[booktype]]紙本[[booktype]]電子版[[conferencelocation]]Sao Paulo, Brazi

    第三代無線通訊系統之動態速率給定演算法 Dynamic Rate Assign Algorithm in Third-Generation Mobile Communication System

    No full text
    [[abstract]]隨著無線通訊技術問世以來,其移動的特性為我們帶來了許多的便利性,讓我們可以隨時隨地與他人通話,進而縮短了人與人之間的距離。在系統方面也從第一代類比式進步到第二代的數位式,提高了容量與保密性等問題,強化了用戶的服務品質,因此吸引了大量的消費者,為電信業帶來一片欣欣向榮的商機與利機。在第二代通訊系統之前,業者皆以通話作為客戶主要的服務項目,短訊或收發電子郵件等為加值性服務,然而在第三代無線通訊系統中,將提供使用者存取網路中豐富的資源,這其中可能包含了即時性與非即時性的資料內容,所需要的傳輸速率也勢必提高,因此必須對過去的技術加以改進,提出新的解決方案,基於這種需求,作者便在這篇論文中提出動態資源配置演算法,希望使用者能在傳輸中配合當時的通話流量與傳送資料的種類來調整目前所用的傳輸速率。[[sponsorship]]澎湖技術學院資訊工程科; 教育部顧問室[[conferencetype]]國內[[conferencedate]]20010608~20010608[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]澎湖縣, 臺
    corecore