透過您的圖書館登入
IP:18.190.217.134

網際網路技術學刊/Journal of Internet Technology

  • Ahead-of-Print

台灣軟體模擬學會 & Ainosco Press,此刊物暫停授權合作

選擇卷期


已選擇0筆
  • 期刊

Instant messaging software through network service and smart device has been widely used, which gradually and significantly changed social interpersonal communication network. This transform brings not only various commerce opportunities in mobile application field, but leads into highly competition. Assuming most consumers in Taiwan might not keep high brand loyalty, to keep good relationship and maintain high loyalty with consumers become the main mission to enterprises. The objective of this study focus on the instant messaging software LINE as the scope of research to investigate about related influence on consciousness usefulness, consciousness usability, consciousness playfulness, then, further to find out the influences about different addicted levels with users. It applied Technology acceptance model and immerse experiences to explore the users' attitude and behavior intention. There were total 300 valid questionnaires completed from LINE users in Taiwan. Statistic System was utilized to analyze results for descriptive statistics, reliability analysis. The results may imply some enterprises or software developers to create the advantage of operation strategies.

  • 期刊
Yi-Wei Ma Chih-Hung Chen Jiann-Liang Chen 以及其他 1 位作者

Based on current Internet technologies, several mobile technologies have been developed. The advancement of information technology has generated diverse and innovative environment in our daily environments being related to the future of the Internet. Service innovations are being made in network access technologies, user terminals, devices, applications, and the provision of services. Therefore, the future of the Internet will support flexible, real-time services and operation management that gives users more economic, ubiquitous, and high-quality experience. However, in an Internet of Things (IoT) network environment that is composed of a wide range of devices, the efficiency of executing applications will be affected by unfavorable network environments and the use of equipment. To solve this problem, a network service quality management design, in which the applications of the upper layer are unaffected by changes in the bottom layer, ensuring service quality, must be developed. This work proposes and concentrates on solutions named operation, administration and maintenance (OA&M) architecture that are based on cloud computing and IoT environment architecture. This study gives simulation results to show that this approach is efficient with an average communication delay of 591 milliseconds and a reduction in the data duplicate rate by 81.45%.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

This article presents a detailed analysis of 21 popular Professional Social Networks (PSNs) which are a means to allow workers to manage their professional profiles online. The functionality and principal characteristics of the PSNs are analyzed, including recruitment, security, privacy and communication issues, which are studied and exemplified using real cases. PSNs provide a variety of functions which use this work-related information to help both workers and companies solve problems, such as finding a job or personnel recruitment. According to our study, recommendation systems are essential in PSNs since they support all the decisions principally related to recruitment issues and are also capable of recommending courses, which will be of greater importance in the future. Finally, the impact of PSNs on workers and their search for jobs is studied by means of statistics regarding how people use the principal PSNs such as LinkedIn. Some advice is also offered to both applicants and recruiters in order to improve their effectiveness when using PSNs.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

Existing remote data integrity checking mechanisms mainly focus on the properties such as retrievability, privacy-preserving and data-updating. Little attention has been paid to the property of scalability. Scalability here means that, when the scale of data expands to terabyte-level, the integrity checking system still works well. In this paper, we present a secure and efficient remote data integrity checking protocol named REDICS. Similar to the mechanisms of this field, REDICS is based on digital signature techniques. However, compared to other well known approaches, REDICS not only ensures data integrity, but also enjoys the scalability feature. Experimental results show that the proposed protocol is feasible for real applications.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

Internet Protocol Television (IPTV) services over Internet and wireless networks have been increasing rapidly in recent years. Video streaming over time-varying and error-prone wireless networks poses many challenges because it has stringent delay and jitter constraints and requires a smooth packet transmission rate. To overcome such issues, a presentation deadline-based cross-layer design for improving the QoS of IPTV services over wireless networks is introduced. The proposed cross-layer design uses the presentation timestamps in the RTP packet header to derive a presentation deadline for each MAC frame. Subsequently, the wireless Access Point (AP) employs the presentation deadline and the number of retries to determine whether a MAC frame needs to be sent or not. Additionally, the MAC frame size can adapt to the wireless channel conditions. Numerical results demonstrate that the proposed transmission mechanism for video frames can avoid a waste of wireless bandwidth resources on transmitting lateness MAC frames. Thus, the proposed cross-layer design achieves a lower lateness loss rate and better application layer goodput for IPTV services.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

A lot of topology measurement researches on router level Internet show that router-level Internet topology is apparently different from AS-level Internet topology. In this paper, we first reveal structures of the router-level Internet topology using CERNET ISP network, based on the basic characteristics of topology from empirical research of router-level Internet topology, using Multi-subnet composited complex network model, through loading website subnet to router subnet, a router-level Internet topology evolution model is proposed. In our model, from the point of view of network performance optimization, the actual impact factors, such as minimizing of the mileage of links, physical capability of router equipment and network traffic transmission demands between nodes are considered into the model. With appropriate parameters, important metrics, such as cluster coefficient and average path length of network generated by our model, exhibit the similar value of the actual router-level Internet topology while keeping the degree distribution of generated topology to follow power-law.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

We build a novel hybrid model, which uses a questionnaire to survey 500 enterprises in Taiwan on their use invoices. The respondents include enterprise owners as well as financial accounting and information technology staff. Our model was combined with the Technology Acceptance Model, and was extended using three research variables to construct a novel hybrid model -- e-invoicing platform self-efficacy, professional agents, and enterprises' transaction relations. Further, we performed structural equation modeling to test the model's fit and path analysis. Since we hope to conduct a more in-depth study on the use of e-invoicing platforms and the relationship between behavior and motivation, we analyzed the possible factors influencing enterprises to adopt e-invoicing. These findings could help the Taiwanese government (as well as other governments) in promoting the adoption of business-to-business e-invoicing among enterprises, and they could be used to encourage enterprises to adopt e-invoicing.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

With the rapid development of the digital multimedia and network communication, data hiding in the compression domain becomes increasingly popular in the need for speeding up the transmission process and reducing bandwidth. Recently, various kinds of watermarking techniques based on VQ have attracted more interests from researchers. In 2015, Tu and Wang proposed a reversible data hiding scheme with high payload which embeds confidential information into the VQ-compression codes of a host image with a relatively higher capacity than other existing methods. However, their scheme introduced extra bits to reverse the original vector quantization index of the cover image. In this study, we propose a novel reversible hiding scheme which reduces the usage of extra bits. In our method, a codebook is clustered into six groups which are organized in accordance with the referred frequency of codewords from high to low. Then, a new mapping relationship among the six clusters is constructed to hide secret data more cost-effectively with high payload. The experimental results demonstrate that the proposed scheme outperforms Tu and Wang's scheme for complex texture images.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊

In this paper, we develop a smart topics finding system to organize the research topics into a hierarchical tree. First of all, we use some natural language processing techniques to convert the collected snippets into a series of meaningful candidate terms. Second, we use a suffix tree clustering with threshold and two-steps hash to generate the topic label. Third, we use a divisive hierarchical clustering method to arrange the topic label into a hierarchical tree. In this paper, we use precision and normalized Google distance to measure the quality of topic results. According to the results of experiments, we conclude that using our system can give significant performance gains than current academic systems.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!
  • 期刊
Wenbin Hu Huan Wang Zhenyu Qiu 以及其他 2 位作者

Situation aware based on the situation context is important to classify context and infer further situation about context. However, the relevant applications are still difficult to deal with the inherent shortcomings of situation recognition in decision making. The existing methods of situation-aware mainly depend on situation recognition by modeling, classifying and apperceiving of context information, which is insufficient in the utilization of situation relevance. To overcome the disadvantage, situation relevance (including the trigger and dependency among situations) based on situation ontology is fully analyzed in this paper, and a situation-aware method based on ontology analysis of the semantic social network (SR-SSNOA) is also proposed. The main research lie in three aspects: (1) The situation quality, the situation relevance and the community impact are synthetically considered in the recognition and recommendation of situation by SR-SSNOA; (2) The situation ontology are converted into different figures by SR-SSNOA, which introduces semantic social network to analyze situation ontology. Extensive experiments reveal the excellent performance of SR-SSNOA at different parameter values. By conducting a questionnaire to evaluate the results, the accuracy and correctness of our method is proved.

本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!