Entity

Time filter

Source Type

Tainan, Taiwan

Lin B.-C.,NUTN | Lea C.-T.,HKUST
Theoretical Computer Science | Year: 2015

Multi-Log2N networks have a wide range of applications in telecommunications. In this paper, we present a new type of nonblocking multi-Log2N networks, called repackable nonblocking, wherein rearrangement activities are required only during the departures, but not upon arrivals. Furthermore, the frequency of rearrangement activities is so low that under many circumstances, they perform like strictly nonblocking networks but with a much lower hardware complexity. © 2015 Elsevier B.V. Source


Chen Y.-S.,NUTN | Wen C.-C.,NUTN
2011 International Conference on Electric Technology and Civil Engineering, ICETCE 2011 - Proceedings | Year: 2011

Based on the identification and emotion, volunteers participated regional affairs, expressed their enthusiasm and the execution to the local affairs. Compared to public, volunteers provided interpretation and the service of environmental protection; they still had to comprehend the importance of ecology better than the others and carried higher sensibility to the environment. Therefore, this research attempted to study the image of ecological urban region Tainan from volunteers with Zaltman Metaphor Elicitation Technique (ZMET) which based on visual culture, in order to discuss the residential environment built by government bodies, to such an extant that the result of the study could be a reference for the government. From the vision and the image of the volunteers toward ecological urban region Tainan, the goal and task of Agenda 21 had arouse the residential passion, more, volunteers participated kinds of training and activities, the professional abilities were arouse and the values were also changes, above revealed that the concept of sustainable development could connect with practice to become the first step of the ground. © 2011 IEEE. Source


Huang H.-D.,National Center for High Performance Computing | Acampora G.,University of Salerno | Loia V.,University of Salerno | Lee C.-S.,NUTN | Kao H.-Y.,NUTN
IEEE International Conference on Fuzzy Systems | Year: 2011

Antimalware applications represent one of the most important research topic in the area of information security threat. Indeed, most computer network issues have malwares as their underlying cause. As a consequence, enhanced systems for analyzing the behavior of malwares are needed in order to try to predict their malicious actions and minimize eventual computer damages. However, because the environments where malwares operate are characterized by high levels of imprecision and vagueness, the conventional data analysis tools lack to deal with these computer safety applications. This work tries to bridge this gap by integrating semantic technologies and computational intelligence methods, such as the Fuzzy Ontologies and Fuzzy Markup Language (FML), in order to propose an advanced semantic decision making system that, as shown by experimental results, achieves good performances in terms of malicious programs identification. © 2011 IEEE. Source


Chen C.-P.,NUTN | Guo J.-F.,NUTN | Shih J.-L.,NUTN
Proceedings - 2013 IEEE 13th International Conference on Advanced Learning Technologies, ICALT 2013 | Year: 2013

Mobile games are different from traditional computer games in terms of their social interactions. Pervasive game (PG) is among one of the mobile games. It has been identified that all computer games have some functions facilitating learning, so as PG. However, it has also been identified that for low prior knowledge and/or less enthusiastic learners, educational games had no more effective than traditional media due to heavy cognitive load. This study intended to examine the effects of prior computer literacy and enthusiasm for cultural exploration on cognitive load. An instructional PG was conducted and a cognitive load inventory was given after the game. Results indicated that both computer literacy and enthusiasm had no effect on cognitive load, only gender, a demographic variable, had an effect. Further research is suggested. © 2013 IEEE. Source

Discover hidden collaborations