Yao‐Tien Wang

ORCID: 0000-0003-4865-4065
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Peer-to-Peer Network Technologies
  • Mobile Agent-Based Network Management
  • Artificial Immune Systems Applications
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Multimedia Communication and Technology
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Caching and Content Delivery
  • Wireless Networks and Protocols
  • Advanced Wireless Communication Techniques
  • Influenza Virus Research Studies
  • Neuroinflammation and Neurodegeneration Mechanisms
  • Elevator Systems and Control
  • Video Coding and Compression Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Open Education and E-Learning
  • Service-Oriented Architecture and Web Services
  • Online and Blended Learning
  • Access Control and Trust
  • Telecommunications and Broadcasting Technologies
  • T-cell and B-cell Immunology
  • Image and Video Quality Assessment
  • Image and Video Stabilization

Hungkuang University
2011-2013

Kainan University
2006-2010

National Central University
2004-2006

Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems (IDS). A multiagent-based IDS (ABIDS) inspired by the danger theory of human proposed. The intelligence behind ABIDS based on functionality dendritic cells in and theory, while dentritic agents (DC agent) are emulated for innate subsystem T-cell (TC adaptive subsystem. Antigens profiles calls corresponding behaviors regarded as signals. This dual detections DC agent signals TC antigen, where each...

10.1109/fuzzy.2011.6007564 article EN 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2011-06-01

Abstract In the third generation of wireless cellular system, adaptive dynamic channel borrowing is presented to maximize number served calls in networks. This has led an intensive research mobile computing provide users access Internet. this paper, a neural‐fuzzy controller for channel‐borrowing scheme (NFDCBS) multimedia services and support increasing users. network, call‐arrival rate, call duration communication overhead between base stations control centre are vague uncertain....

10.1002/dac.781 article EN International Journal of Communication Systems 2006-02-09

10.1016/j.jnca.2010.03.012 article EN Journal of Network and Computer Applications 2010-04-01

In this paper, a fuzzy-based dynamic channel-borrowing scheme (FDCBS) is presented to maximize the number of served calls in distributed wireless cellular network. The uneven traffic load may create hot-spot cells and possibly causes high blocking rate cells. Most conventional method use indices with threshold value determine status cell. However, it exists ping-pong effect as loads are around value. This result an unstable system unnecessary message passed overhead. addition, estimation...

10.1109/vetecs.2003.1207074 article EN 2004-04-23

With the wide deployment of Internet Protocol (IP) infrastructure and rapid development digital technologies, Television (IPTV) has emerged as one major multimedia access techniques. A general IPTV transmission system employs both encryption forward error correction (FEC) to provide authorized subscriber with a high-quality perceptual experience. This two-layer processing, however, complicates design in terms computational cost management cost. In this paper, we propose novel FEC scheme...

10.1155/2012/720791 article EN cc-by International Journal of Digital Multimedia Broadcasting 2012-01-01

Data broadcasting is independent of client arrival rate, and thus it very suitable to transmit popular videos that interest many clients at a particular period time. One method (called periodic broadcasting) partition video into segments, which are then simultaneously broadcast on several data channels. Once want watch the video, they download segments from these Specially, skyscraper (SkB), client-centric approach (CCA), greedy disk-conserving (GDB) schemes were proposed support with small...

10.1109/icn.2008.18 article EN 2008-04-01

Mobile agents are considered to be an alternative client-server systems. Security issues discussed for generic agent-based systems, i.e. intelligent migrate agent platforms. Public key infrastructure (PKI) is a major cryptographic systems deployed Cryptographic techniques such as digital signatures, hash function, proxy certificate and attribute certificate, utilized protecting both Countermeasures protections platform protection given, which based on information security mechanisms...

10.1109/apscc.2008.225 article EN 2008-12-01

In ad hoc wireless network, nodes can communicate with each other through broadcasting. Nevertheless, such an network has many unstable factors causing the transmission being unreliable. Thus, broadcasting algorithm needs fault tolerant capability to solve possible failure of process. this paper, we propose self-pruning-with-fault-tolerant (SPFT) achieve tolerance and reachable capability. By using self-pruning approach, SPFT reduce redundant transmissions. addition, selects stable links in...

10.6138/jit.2013.14.1.07 article EN 網際網路技術學刊 2013-01-01

In this paper, adaptive channel borrowing approach fuzzy neural networks for load balancing (ACB-FNN) is presented to maximized the number of served calls and depending on asymmetries traffic problem. a wireless network, call's arrival rate, call duration communication overhead between base station mobile switch center are vague uncertain. A new algorithm with cell involved negotiation also in paper. The ACB-FNN exhibits better learning abilities, optimization robustness, fault-tolerant...

10.1109/jcn.2008.6388326 article EN Journal of Communications and Networks 2008-03-01

Unauthorized access of malicious entities to agent systems is becoming a serious threat agent-based communications. An X.509 attribute certificate-based control mechanism for mobile given. Authorization policies this can be dynamically adapted the constantly evolving threats from computer and networks. The Privilege Management Infrastructure (PMI) based on standard provides an interoperability solution among varied platform by utilizing external authorization data structure, namely,...

10.1109/icmlc.2008.4621048 article EN International Conference on Machine Learning and Cybernetics 2008-07-01

Hierarchical genetic algorithms (HGA) as a tool for search and optimizing methodology has now reached mature stage. The minimum resource facility to carry user traffic which is called channel unit (CU) composed of the IEEE 802.16 medium access control (MAC) protocol. number CU depending on load solves heterogeneous asymmetrical problem in 4G system. In cellular network, call arrival rate, duration communication overhead between base stations center are vague uncertain. Whether criteria...

10.1109/apscc.2008.160 article EN 2008-12-01

Periodic broadcasting is an effective approach for delivering popular videos. In general, this does not provide interactive (i.e., VCR) functions, and thus a client can tolerate playback latency from video server. The concept behind the partitioning into multiple segments, which are then broadcast across individual communication channels in terms of IP multicast. method improves system throughput by allowing numerous clients to share channels. For many schemes, receiving bandwidth must equal...

10.1155/2013/930316 article EN cc-by Journal of Applied Mathematics 2013-01-01
Coming Soon ...