Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Yi-chih Kao"'
Publikováno v:
IEEE Access, Vol 8, Pp 34706-34716 (2020)
The exhaustion of IPv4 addresses has led to the rapid implementation of IPv6. However, the design of IPv6 is incompatible with that of its predecessor IPv4 and slows down the development of the IPv4-to-IPv6 migration. Several transitioning mechanisms
Externí odkaz:
https://doaj.org/article/b7fd0e637d884dc2a2e10ba266a9f0fa
Autor:
Yi-chih Kao, 高宜芝
99
Bohuslav Martinu (1890-1959) was one of the most influential Czech composers in the 20th century. His variable styles and dramatic way of composing form unique elements in his music. This thesis will discuss the background of the composer, hi
Bohuslav Martinu (1890-1959) was one of the most influential Czech composers in the 20th century. His variable styles and dramatic way of composing form unique elements in his music. This thesis will discuss the background of the composer, hi
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/27362976208278263234
Autor:
Yi-Chih Kao, 高逸誌
96
The purpose of this article is to study the strength of containership due to bow flare slamming and plunge by using FEA (finite element analysis). In the numerical analysis, finite element software, MSC/Patran and Nastran, is the analytic too
The purpose of this article is to study the strength of containership due to bow flare slamming and plunge by using FEA (finite element analysis). In the numerical analysis, finite element software, MSC/Patran and Nastran, is the analytic too
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/64669422361001721043
Autor:
Yi-Chih Kao, 高義智
93
The study aims to find key factors of information system success in a non-profit education and training institute. The institute under study has five centers providing on-job training and long-term cultivation in the area of information techn
The study aims to find key factors of information system success in a non-profit education and training institute. The institute under study has five centers providing on-job training and long-term cultivation in the area of information techn
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/68122720586660410178
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030695132
With the emergence of the Internet of Things (IoT) technology, the number of related devices has been increasing at a very rapid speed. The security of IoT systems has become a crucial issue. Due to the complex IoT environment and users’ unawarenes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40553305a8e9b6207e0f735b057dd371
https://doi.org/10.1007/978-3-030-69514-9_17
https://doi.org/10.1007/978-3-030-69514-9_17
Publikováno v:
Journal of Network and Computer Applications. 78:125-133
With Software Defined Networking (SDN), IP multicast becomes promising again. For IPTV applications over SDN, existing works would not scale well since they are based on per-source trees. As control-plane in SDN is logically centralized, constructing
Publikováno v:
Computer. 49:68-76
Balanced Hash Tree (BHT) is a mechanism for service function (SF) chaining, service routing, and traffic steering that enables switches to select SF instances for load balancing without involving the controller. In an experimental evaluation, BHT dec
Publikováno v:
Security with Intelligent Computing and Big-data Services ISBN: 9783319764504
Attack trees provide a model to describe the security of a system based on the possibility of various attacks. In this paper, we propose the concept of “attack graphs” as an extension of attack trees, wherein directed acyclic graphs are used to d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::16869659063a77df975c426ef5de9700
https://doi.org/10.1007/978-3-319-76451-1_8
https://doi.org/10.1007/978-3-319-76451-1_8
Publikováno v:
DSC
A distributed denial-of-service (DDoS) attack could cause the incoming connections per second exceeding the capacity of the firewall device and the network system might be paralyzed. By analyzing the syslog of firewall, we design an effective mechani
Publikováno v:
J. of Electrical Engineering. 5