Subjective experiment was conducted to identify the relationship between brightness sensation and the percentage of the subjectswho turned on the ceiling luminaire in an experimental room which introduced diffused dir...
详细信息
Subjective experiment was conducted to identify the relationship between brightness sensation and the percentage of the subjectswho turned on the ceiling luminaire in an experimental room which introduced diffused direct sunlight by using reflecting panelbeside the window. Brightness sensation judged by the subjects just after they entered the room with diffused direct sunlight became higher than that without diffused direct sunlight. However diffused direct sunlight introduced into the room had no significant effects on the subjects' brightness sensation judged after they stayed in the room for 5 minutes. It was also identified that in the case when the illuminance on the desk was higher than about 200-400 lx, half of the subjects turned off the ceiling luminaire.
This paper discusses a problem concerning intertemporal decision-making under uncertainty when its subject has psychological biases. Here, we consider an investment company as a decision maker that invests money from ...
详细信息
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
作者:
Chiang, C.-C.Lee, J.-C.Chang, Y.-M.Chuang, C.-F.Shu, C.-M.
1 Jin-De Rd. Changhua Changhua 50074 Taiwan Department of Electrical Engineering
Hsiuping Institute of Technology 11 Gong-Ye Rd. Dali Taichung 41280 Taiwan Doctoral Program
Graduate School of Engineering Science and Technology National Yunlin University of Science and Technology 123 University Rd. Sec. 3 Douliou Yunlin 64002 Taiwan
Bao-Shan Campus 1 Jin-De Rd. Changhua Changhua 50074 Taiwan
Knowledge of material safety properties is critical for safe handing in the chemical process industries, especially for flammable chemicals that might result in serious fires and explosions. This study investigated th...
详细信息
Styrene is an important chemical in the petrochemical industry. In recent years, there have been sporadic releases, runaway reactions, fires, and thermal explosion accidents incurred by styrene and its derivatives wor...
详细信息
Laboratory experiments were conducted to investigate the run-up of internal solitary waves (ISWs) on steep uniform slopes in a two-layered fluid system with a free surface. A 12 m long wave flume, which incorporated a...
详细信息
A hierarchical set of kinetic models were proposed and discussed for simulation of autocatalytic decomposition of cumene hydroperoxide (CHP) in cumene at low temperatures. The hierarchy leads from a formal model of fu...
详细信息
Volatile organic compounds (VOCs) are the main factors involved in pollution control and global warming in industrialized nations. Various treatment methods involving incineration, adsorption, etc., were employed to r...
详细信息
There is a growing body of experimental evidence suggesting that the Ca2+ signaling in ventricular myocytes is characterized by a high gradient near the cell membrane and a more uniform Ca2+ distribution in the cell i...
详细信息
There is a growing body of experimental evidence suggesting that the Ca2+ signaling in ventricular myocytes is characterized by a high gradient near the cell membrane and a more uniform Ca2+ distribution in the cell interior [1]--[7]. An important reason for this phenomenon might be that in these cells the t-tubular system forms a network of extracellular space, extending deep into the cell interior. This allows the electrical signal, that propagates rapidly along the cell membrane, to reach the vicinity of the sarcoplasmic reticulum (SR), where intracellular Ca2+ required for myofilament activation is stored [1], [8]--[11]. Early studies of cardiac muscle showed that the t-tubules are found at intervals of about 2 lm along the longitudinal cell axis in close proximity to the Z-disks of the sarcomeres [12]. Subsequent studies have demonstrated that the t-tubular system has also longitudinal extensions [9]--[11], [13].
Wireless sensor network (WSNs) is a demanding multidisciplinary field that has been target of research in the last decade. The increasing demand for security and automated monitoring of things and places makes WSNs a ...
详细信息
ISBN:
(纸本)9781424425761
Wireless sensor network (WSNs) is a demanding multidisciplinary field that has been target of research in the last decade. The increasing demand for security and automated monitoring of things and places makes WSNs a promising technology although there are still many open research contributions needed to make this the standard of environmental sensing. The goal of this article is to identify the research challenges on WSNs by dividing them into functional groups, building on previous work. We followed a structured approach based on a simplified yet complete vision of a design space for WSNs. Moreover, this work aims to identify research gaps and investigation fields yet unexplored or hardly explored by researchers in order to plot paths for future research. Several challenges and research areas were identified, like Models for Sensor Networks, Benchmarking Methodologies, Distributed Processing, Interface WSNs and Network Reprogramming. Some of these challenges will become even clearer as increasingly WSNs become Wireless Sensor and Actuator Networks (WSANs).
暂无评论