33 results on '"C. R. Ou"'
Search Results
2. Activation of caspase-3 and its correlation with shear force in bovine skeletal muscles during postmortem conditioning1
- Author
-
Y.-F. Zou, Q.-Q. Zhang, K.-P. Ye, C.-R. Ou, D.-D. Pan, Muhammad Ammar Khan, Guanghong Zhou, and J.-X. Cao
- Subjects
Crystallography ,biology ,Chemistry ,Genetics ,biology.protein ,Animal Science and Zoology ,Caspase 3 ,General Medicine ,Molecular biology ,Caspase ,Food Science - Abstract
The study was aimed at exploring the mechanism of tenderization by establishing a correlation between caspase-3 activity and shear force, verifying the activation occurring by analyzing active caspase-3 and cleaved poly (ADP-ribose) polymerase (PARP) fragments, and understanding the pathways involved in activation of caspase-3 by evaluating its correlation with caspase-8 and -9 activities in LM, semitendinosus (STN), and psoas minor (PM) muscles. The results indicated that shear force decreased at 48 h in PM (P < 0.01), LM (P < 0.01), and STN (P < 0.05). We detected p22, p23, p20, and p18 caspase fragments as well as distinctive PARP fragments of 24 kDa by caspase-3 and 36 kDa by µ-calpain. Caspase-3 activity correlated with shear force negatively at 24 and 48 h in STN (P < 0.01 at 24 h; P < 0.01 at 48 h), PM (P < 0.001 at 24 h; P < 0.01 at 48 h), and LM muscles (P < 0.05 at 24 h; P < 0.01 at 48 h). The greatest activities of caspase-8 (P < 0.001 in PM and STN; P < 0.01 in LM) and caspase-9 (P < 0.001 in muscles) appeared at 4 h whereas that of caspase-3 was at 24 h (P < 0.001 in muscles). Caspase-9 activity correlated positively with caspase-3 at 4, 24, and 48 h in STN (P < 0.01 at 4 h; P < 0.05 at 24 h; P < 0.001 at 48 h) and at 4 and 96 h in PM (P < 0.001 at 4 h; P < 0.05 at 96 h) and LM muscles (P < 0.001 at 4 h; P < 0.001 at 96 h). The caspase-8 activity correlated with caspase-3 at 4, 48, and 96 h in STN (P < 0.05 at 4 h; P < 0.001 at 48 h; P < 0.05 at 96 h), at 4 and 24 h in PM (P < 0.001 at 4 h; P < 0.05 at 24 h), and at 4 and 96 h in LM (P < 0.001 at 4 h; P < 0.01 at 96 h). We concluded that caspase-3 was associated with the decline of shear force; the activation of caspase-3 was mediated by caspases -8 and -9 in muscles. However, more detailed studies are needed to define the precise mechanism for the cleavage of pro-caspases -8 and -9 during conditioning.
- Published
- 2013
- Full Text
- View/download PDF
3. Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
- Author
-
Chung-Ming Ou and C. R. Ou
- Subjects
Digital rights management ,business.industry ,Computer science ,media_common.quotation_subject ,General Engineering ,Public key infrastructure ,Trusted third party ,Payment ,Certificate ,Encryption ,Computer security ,computer.software_genre ,Computer Science Applications ,Non-repudiation ,Artificial Intelligence ,Mobile agent ,business ,Database transaction ,computer ,media_common - Abstract
Non-repudiation of a mobile digital rights management (DRM) ensures that when a user (U) sends some message to a rights issuer (RI), neither U nor RI can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that U and RI cannot repudiate sending and receiving the message respectively. U generates a mobile agent which carries encrypted payment information to RI. This mobile agent is also issued a proxy certificate by U; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. One advantage of this agent-based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile DRM.
- Published
- 2011
- Full Text
- View/download PDF
4. Catastrophic Description of Ferroelectric Liquid Crystal Instabilities
- Author
-
S. L. Young, C. H. Lin, Chung-Ming Ou, and C. R. Ou
- Subjects
Cusp (singularity) ,Theoretical physics ,Materials science ,Condensed matter physics ,Bistability ,Liquid crystal ,Computer Science::Neural and Evolutionary Computation ,Parameter space ,Catastrophe theory ,Condensed Matter Physics ,Ferroelectricity ,Instability ,Electronic, Optical and Magnetic Materials - Abstract
Industrial and scientific research has paid much attention to bistabilities of ferroelectric liquid crystals (FLCs). Identifying the parameter space for the FLC film is of great importance in exploring the performance of the bistabilities. This paper provides an analytical description of the parameter space by using catastrophe theory. The umbilicus of the FLC potential function is proved to be of the cusp type.
- Published
- 2010
- Full Text
- View/download PDF
5. Magnetization Processes of (La 0.7 Pb 0.3 MnO 3 ) 1−x (SiO 2 ) x Composites
- Author
-
C. R. Ou, H. Z. Chen, S. L. Young, J. B. Shi, C. H. Lin, Lance Horng, N. F. Shih, M. C. Kao, and Tian-Chiuan Wu
- Subjects
Field cooling ,Materials science ,Condensed matter physics ,Transition temperature ,Sintering ,Condensed Matter Physics ,Electronic, Optical and Magnetic Materials ,Condensed Matter::Materials Science ,Magnetization ,Ferromagnetism ,Magnetic dilution ,visual_art ,visual_art.visual_art_medium ,Condensed Matter::Strongly Correlated Electrons ,Ceramic ,Composite material ,Saturation (magnetic) - Abstract
The ceramic composites, (La0.7Pb0.3MnO3)1−x (SiO2) x , with diluted magnetic properties are prepared using solid-sate sintering route. Magnetization processes of (La0.7Pb0.3MnO3)1−x (SiO2) x composites are explored in this study. Ferromagnetism is gradually attenuated due to the magnetic dilution induced by the increase of SiO2 content. Clearly, irreversible behavior is observed in the zero-field cooling and the field cooling (ZFC–FC) curves at a low field of 100 Oe. Saturation magnetization decreases as x increases while ferromagnetic transition temperature remains around 346 K for all composites. All the composites exhibit ferromagnetic hysteresis behavior which can be modeled by the law of the approach to saturation in the form M=M S(1−a/H). The term a/H expresses the deviation of magnetization from saturation. The smaller factor a for La0.7Pb0.3MnO3-rich samples results in sharper square curve which should be associated with the long-range spin order of ferromagnetic coupling.
- Published
- 2010
- Full Text
- View/download PDF
6. Comparison of the magnetization behavior in Nd and Sm substituted La 0.7 Pb 0.3 MnO 3 systems
- Author
-
C. H. Lin, M. C. Jhang, C. R. Ou, C. Y. Shen, Ming-Cheng Kao, C. C. Lin, San-Lin Young, Jen-Bin Shi, and Hone-Zern Chen
- Subjects
chemistry.chemical_compound ,Magnetization ,Ionic radius ,chemistry ,Ferromagnetism ,Spins ,Condensed matter physics ,Phase (matter) ,Oxide ,Electron ,Condensed Matter Physics ,Ion - Abstract
In this work, the magnetization behavior of two maganite oxide systems, La0.7–xNdxPb0.3MnO3 and La0.7–xSmxPb0.3MnO3, has been synthesized. The partial replacement of La ions by Nd or Sm results in a considerable decrease in the ferromagnetic ordering temperature TC. Moreover, clearly irreversible behavior in the field-cooling and zero-field-cooling curves at a low applied field shows the short-range spin order phase. These facts are in agreement with the smaller ionic radii of Nd (0.127 nm) and Sm (0.124 nm) ions in contrast to La ion (0.136 nm) with the corresponding larger distortion of perovskite structure. The saturation magnetization MS is increased as Nd content is increased which provides a relative contrast with the decrease of MS by the increase of Sm content. This can be interpreted in terms of the competition between the suppression of ferromagnetism due to structure tuning induced by the small ionic radius of the interpolated cation into the La-site and the increase of ferromagnetic spins due to the introduction of magnetic Nd or Sm ions with f -shell electrons. (© 2008 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim)
- Published
- 2007
- Full Text
- View/download PDF
7. Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems
- Author
-
Chung-Ming Ou and C. R. Ou
- Subjects
Computer science ,business.industry ,Public key infrastructure ,Trusted third party ,Encryption ,Computer security ,computer.software_genre ,Certificate ,Non-repudiation ,Artificial Intelligence ,Mobile payment ,ComputingMilieux_COMPUTERSANDSOCIETY ,Mobile agent ,business ,computer ,Database transaction - Abstract
Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that B and S cannot repudiate sending and receiving the purchase order respectively. The buyer generates a mobile agent which carries encrypted purchase order to the seller. This mobile agent is also issued a proxy certificate by the buyer; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. One advantage of this agent-based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile payments.
- Published
- 2007
- Full Text
- View/download PDF
8. Gap Formation and Interfacial Heat Transfer Between Thermoelastic Bodies in Imperfect Contact
- Author
-
Shong-Leih Lee and C. R. Ou
- Subjects
Thermal contact conductance ,Materials science ,Mechanical Engineering ,Thermodynamics ,Thermal contact ,Mechanics ,Deformation (meteorology) ,Condensed Matter Physics ,Thermal conduction ,Stress (mechanics) ,Thermoelastic damping ,Mechanics of Materials ,Heat transfer ,General Materials Science ,Displacement (fluid) - Abstract
In this paper, the integration scheme is employed to solve a coupling problem of transient heat conduction and displacement due to thermal deformation. Based on the resulting displacement, gap or contact pressure on the interface of two thermoelastic bodies in imperfect contact is estimated. Such information is then used to determine the interfacial heat transfer between the two thermoelastic bodies. This again affects the temperature distribution and thus the thermal deformation. In the course of heat transfer and thermal deformation, effect of thermal rectification also is taken into account. Numerical solutions of transient and steady-state quantities including gap formation, normal stress, and temperature are demonstrated for a pair of stainless steel and aluminum with conforming shapes. Such an analysis of conduction-deformation interaction based on a finite-difference-like scheme has not been studied in the past.
- Published
- 2000
- Full Text
- View/download PDF
9. Integration Scheme for Elastic Deformation and Stresses
- Author
-
C. R. Ou and Sanboh Lee
- Subjects
Discretization ,Mechanical Engineering ,Traction (engineering) ,Mathematical analysis ,Finite difference method ,Finite difference ,Condensed Matter Physics ,Finite element method ,symbols.namesake ,Mechanics of Materials ,Dirichlet boundary condition ,symbols ,Boundary value problem ,Boundary element method ,Mathematics - Abstract
The integration scheme is proposed in this paper to solve linear deformation and stresses for elastic bodies. The discretized equations are of the finite difference type such that all of the advantages in the use of a finite difference scheme are preserved. In addition, the boundary traction can be easily converted into Dirichlet boundary condition for the displacement equations without recourse to fictitious points. Three examples are illustrated in this study to examine the performances of the integration scheme. In the case of thermal loading, the integration scheme is seen to provide solution with six-place accuracy while the finite element and the boundary element solutions possess only two- to three-place accuracy at essentially the same number of grid points. A similar situation is believed to exist also in the case of pure mechanical loading, although no exact solution is available for comparison. For a square bimaterial under a thermal loading without boundary traction, the integration scheme is found to successfully predict the existence of the interface zone. Due to its simplicity and efficiency, the integration scheme is expected to have good performance for solid mechanical problems, especially when coupled with heat transfer and fluid flow inside and outside the solid.
- Published
- 1999
- Full Text
- View/download PDF
10. 4.4: Microdisplay as Optical Neural/Cell Growth Guiding Device
- Author
-
Ron Chang, Jai-Mei Chung, Pai-Kai Hung, Ray Ho, Ching-I Shen, Jai-Wei Guo, Rebecca Sun, C. R. Ou, Cheng-Jong Chang, and Chung-Ming Ou
- Subjects
Cell growth ,Nanotechnology ,Biology ,Neural cell ,Cell biology - Abstract
This paper introduces the preliminary results that using the commercialized microdisplay as optical neural/cell growth guiding device. Results indicate the feasibilities of the present approach. Advantages, drawbacks and improvements are discussed for the further developments.
- Published
- 2007
- Full Text
- View/download PDF
11. Activation of caspase-3 and its correlation with shear force in bovine skeletal muscles during postmortem conditioning
- Author
-
J-X, Cao, C-R, Ou, Y-F, Zou, K-P, Ye, Q-Q, Zhang, M A, Khan, D-D, Pan, and G, Zhou
- Subjects
Male ,Caspase 8 ,Meat ,Caspase 3 ,Caspases ,Postmortem Changes ,Blotting, Western ,Animals ,Cattle ,Stress, Mechanical ,Muscle, Skeletal ,Caspase 9 - Abstract
The study was aimed at exploring the mechanism of tenderization by establishing a correlation between caspase-3 activity and shear force, verifying the activation occurring by analyzing active caspase-3 and cleaved poly (ADP-ribose) polymerase (PARP) fragments, and understanding the pathways involved in activation of caspase-3 by evaluating its correlation with caspase-8 and -9 activities in LM, semitendinosus (STN), and psoas minor (PM) muscles. The results indicated that shear force decreased at 48 h in PM (P0.01), LM (P0.01), and STN (P0.05). We detected p22, p23, p20, and p18 caspase fragments as well as distinctive PARP fragments of 24 kDa by caspase-3 and 36 kDa by µ-calpain. Caspase-3 activity correlated with shear force negatively at 24 and 48 h in STN (P0.01 at 24 h; P0.01 at 48 h), PM (P0.001 at 24 h; P0.01 at 48 h), and LM muscles (P0.05 at 24 h; P0.01 at 48 h). The greatest activities of caspase-8 (P0.001 in PM and STN; P0.01 in LM) and caspase-9 (P0.001 in muscles) appeared at 4 h whereas that of caspase-3 was at 24 h (P0.001 in muscles). Caspase-9 activity correlated positively with caspase-3 at 4, 24, and 48 h in STN (P0.01 at 4 h; P0.05 at 24 h; P0.001 at 48 h) and at 4 and 96 h in PM (P0.001 at 4 h; P0.05 at 96 h) and LM muscles (P0.001 at 4 h; P0.001 at 96 h). The caspase-8 activity correlated with caspase-3 at 4, 48, and 96 h in STN (P0.05 at 4 h; P0.001 at 48 h; P0.05 at 96 h), at 4 and 24 h in PM (P0.001 at 4 h; P0.05 at 24 h), and at 4 and 96 h in LM (P0.001 at 4 h; P0.01 at 96 h). We concluded that caspase-3 was associated with the decline of shear force; the activation of caspase-3 was mediated by caspases -8 and -9 in muscles. However, more detailed studies are needed to define the precise mechanism for the cleavage of pro-caspases -8 and -9 during conditioning.
- Published
- 2013
12. Agent-Based Artificial Immune Systems (ABAIS) for Intrusion Detections: Inspiration from Danger Theory
- Author
-
C. R. Ou, Yao-Tien Wang, and Chung-Ming Ou
- Subjects
Intrusion ,Immune system ,Innate immune system ,Antigen ,Computer science ,Artificial immune system ,Distributed computing ,Intrusion detection system ,Danger signal ,Host (network) - Abstract
Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems(IDS). The intelligence behind ABIDS is based on the functionality of dendritic cells in human immune systems. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. ABAIS is based on the danger theory while dendritic cells agents (DC agent) are emulated for innate immune subsystem and T-cell agents (TC agent) are for adaptive immune subsystem. This ABIDS is based on the dual detections of DC agent for signals and TC agent for antigen, where each agent coordinates with other to calculate danger value (DV). According to DVs, immune response for malicious behaviors is activated by either computer host or Security Operating Center (SOC).
- Published
- 2013
- Full Text
- View/download PDF
13. Shape optimization in contact problems with desired contact traction distribution on the specified contact surface
- Author
-
W. H. Chen and C. R. Ou
- Subjects
Applied Mathematics ,Mechanical Engineering ,Traction (engineering) ,Mathematical analysis ,Computational Mechanics ,Ocean Engineering ,Geometry ,Weighting ,Computational Mathematics ,Error function ,Transformation matrix ,Computational Theory and Mathematics ,Shape optimization ,Differentiable function ,Boundary element method ,Smoothing ,Mathematics - Abstract
An efficatious technique is developed to deal with the shape optimization in conctact problems with desired contact traction on a specified contact surface. The error function with appropriate weighting coefficients for smoothing local and global contact traction distribution is proposed. Since the mapping from the space of design variables to the space of error function is usually not differentiable, a Genetic Algorithm is introduced without using the gradient calculations. The boundary element technique together with the transformation matrix method are employed for the contact traction analysis. To demonstrate the versatility and applicability of this approach, two examples with desired traction distributions of elliptical and rectangular types on the specified contact surface are solved respectively.
- Published
- 1995
- Full Text
- View/download PDF
14. Intrusion detection systems adapted from agent-based artificial immune systems
- Author
-
Yao-Tien Wang, Chung-Ming Ou, and C. R. Ou
- Subjects
Innate immune system ,Computer science ,business.industry ,Artificial immune system ,Multi-agent system ,Context (language use) ,Intrusion detection system ,Immune system ,Antigen ,Adaptive system ,Artificial intelligence ,business ,Host (network) ,Computer network - Abstract
Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems (IDS). A multiagent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. The intelligence behind ABIDS is based on the functionality of dendritic cells in human immune systems and the danger theory, while dentritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agent for signals and TC agent for antigen, where each agent coordinates with other to calculate danger value (DV). ABAIS is an intelligent system with learning and memory capabilities. According to DVs, immune response for malicious behaviors is activated by either computer host or Security Operating Center (SOC). Multiple agents are ”embedded” to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. Accordingly, computer hosts met with malicious intrusions can be effectively detected via input signals and temporary output signals such as PAMP, danger and safe signals.
- Published
- 2011
- Full Text
- View/download PDF
15. Multiagent-Based Dendritic Cell Algorithm with Applications in Computer Security
- Author
-
C. R. Ou, Yao-Tien Wang, and Chung-Ming Ou
- Subjects
Innate immune system ,business.industry ,Artificial immune system ,Computer science ,Context (language use) ,Intrusion detection system ,DUAL (cognitive architecture) ,Computer security ,computer.software_genre ,Immune system ,Antigen ,Artificial intelligence ,business ,computer ,Dendritic cell algorithm - Abstract
Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems (IDS). A multiagent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. The intelligence behind ABIDS is based on the functionality of dendritic cells in human immune systems and the danger theory, while dentritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. This ABIDS is based on the dual detections of DC agent for signals and TC agent for antigen, where each agent coordinates with other to calculate danger value (DV). Agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses.
- Published
- 2011
- Full Text
- View/download PDF
16. Immune Memory Mechanism Based on Cyclic Idiotypic Network
- Author
-
Chung-Ming Ou and C. R. Ou
- Subjects
Computer science ,animal diseases ,Immune network ,Mechanism based ,chemical and pharmacologic phenomena ,biochemical phenomena, metabolism, and nutrition ,Immunological memory ,Dynamical system ,Nonlinear system ,Immune system ,Antigen ,bacteria ,State (computer science) ,Neuroscience - Abstract
Immune memory can be regarded as an equilibrium state of immune network system with nonlinear behavior. The rapid response of immune systems to the second-time antigen is owing to the stable structure of memory state forming by a closed loop of the idiotypic immune network. A dynamical system is proposed which explains how the memory state is formed and stabilized in the immune network.
- Published
- 2010
- Full Text
- View/download PDF
17. Agent-Based Immunity for Computer Virus: Abstraction from Dendritic Cell Algorithm with Danger Theory
- Author
-
Chung-Ming Ou and C. R. Ou
- Subjects
Artificial immune system ,Computer science ,business.industry ,Context (language use) ,Intrusion detection system ,computer.software_genre ,Computer virus ,Immune system ,Anomaly detection ,Artificial intelligence ,business ,computer ,Host (network) ,Abstraction (linguistics) - Abstract
Biologically-inspired artificial immune systems (AIS) have been applied to computer virus detection systems (CVDS) An agent-based CVDS based on danger theory of human immune system is proposed The intelligence behind such system is based on the functionality of dendritic cells in human immune systems This paper embeds multiple agents into AIS-based virus detection system, where each agent coordinates one another to calculate mature context antigen value (MCAV) According to MCAV, computer host met with malicious intrusion can be effectively detected.
- Published
- 2010
- Full Text
- View/download PDF
18. Adaptive Immunity-Based Multiagent Systems (AIBMAS) Inspired by the Idiotypic Network
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
TheoryofComputation_MISCELLANEOUS ,business.industry ,Artificial immune system ,Mechanism (biology) ,animal diseases ,Multi-agent system ,Immune network ,chemical and pharmacologic phenomena ,biochemical phenomena, metabolism, and nutrition ,Biology ,Acquired immune system ,Immune system ,bacteria ,Foreign agent ,Artificial intelligence ,Immune network theory ,business - Abstract
An adaptive immune-inspired multiagent system (AIBMAS) is proposed. The intelligence behind such system is based on the idiotypic immune network. Tunable activation Threshold (TAT) proposes that agents adapt their activation thresholds. Immune algorithm based on the immune network theory and memory mechanism is derived.
- Published
- 2010
- Full Text
- View/download PDF
19. Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
Contextual image classification ,business.industry ,Computer science ,Mobile computing ,Pattern recognition ,Cryptography ,Public-key cryptography ,World Wide Web ,Server ,Mobile agent ,Artificial intelligence ,business ,Heuristics ,Classifier (UML) - Abstract
Image classification is an important technique for effective content-based multimedia retrieval. Many classifiers have been proposed while frequent patterns based approaches have received many attentions in recent years. In this paper, we proposed an image classification approach utilizing sequential patterns discovered from distinct classes. The image is segmented and low-level features are extracted as a sequence of feature-sets. Sequence-rules are collected from each class and conflict rules are resolved by rule pruning. Useful rules are then selected to form the prediction rules. Four prediction heuristics are provided to raise the prediction accuracy of the image classifier. Experimental results using synthetic datasets show that the proposed algorithm may reach an accuracy of 78%. Effective image classification thus can be achieved by mining sequential patterns for the construction of the rule-based sequence classifier.
- Published
- 2009
- Full Text
- View/download PDF
20. Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
Innate immune system ,Computer science ,Artificial immune system ,Distributed computing ,Intrusion detection system ,DUAL (cognitive architecture) ,Computer security ,computer.software_genre ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Immune system ,Danger signal ,Host (network) ,computer ,Abstraction (linguistics) - Abstract
Danger theory-inspired Multi-agent artificial immune system (MAAIS) is applied to intrusion detection systems (IDS). Antigens are profiles of system calls while corresponding behaviors are regarded as signals. The intelligence behind such system is based on the danger theory while dentricit cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. This IDS is based on the dual detections of DC agent for signals and TC agent for antigen, where each agent coordinates with other to calculate danger value (DV). According to DV, immune response for malicious behaviors is activated by either computer host or Security Operating Center (SOC).
- Published
- 2009
- Full Text
- View/download PDF
21. Security of Mobile Agent-Based Web Applications
- Author
-
Yao-Tien Wang, C. R. Ou, and Chung-Ming Ou
- Subjects
Authentication ,business.industry ,Computer science ,Access control ,Public key infrastructure ,Information security ,Computer security ,computer.software_genre ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Public-key cryptography ,Authorization certificate ,Intelligent agent ,Mobile agent ,business ,computer ,Computer network - Abstract
Mobile agents are considered to be an alternative to client-server systems. Security issues are discussed for generic agent-based systems, i.e. intelligent agents migrate to agent platforms. Public key infrastructure (PKI) is a major cryptographic systems deployed for agent-based systems. Cryptographic techniques such as digital signatures, hash function, proxy certificate and attribute certificate, are utilized for protecting both intelligent agents and agent platforms. Countermeasures to agent protections and agent platform protection are given, which are based on information security mechanisms such as authentication, authorization, access control and confidentiality. Other major security concern such as the identity binding and delegation between intelligent agent and its host are discussed with solutions based on proxy certificates and attribute certificates.
- Published
- 2008
- Full Text
- View/download PDF
22. Dynamic role assignment based on X.509 PMI mechanism for mobile agent systems
- Author
-
C. R. Ou, Yao-Tien Wang, and Chung-Ming Ou
- Subjects
Computer access control ,business.industry ,Computer science ,Interoperability ,Authorization ,Access control ,Computer security ,computer.software_genre ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Authorization certificate ,Role-based access control ,Privilege Management Infrastructure ,Mobile agent ,business ,computer ,Computer network - Abstract
Unauthorized access of malicious entities to agent systems is becoming a serious threat to agent-based communications. An X.509 attribute certificate-based access control mechanism for mobile agent systems is given. Authorization policies of this access control can be dynamically adapted to the constantly evolving threats from computer systems and networks. The privilege management infrastructure (PMI) based on X.509 standard provides an interoperability solution among varied agent platform by utilizing external authorization data structure, namely, attribute certificate fields. A role-based access control (RBAC) mechanism for agent systems based on attribute certificates is designed.
- Published
- 2008
- Full Text
- View/download PDF
23. SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
business.industry ,Purchase order ,Computer science ,Payment system ,Trusted third party ,Computer security ,computer.software_genre ,Credit card ,Mobile payment ,ComputingMilieux_COMPUTERSANDSOCIETY ,Mobile agent ,Payment service provider ,Payment processor ,business ,computer - Abstract
Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that B and S cannot repudiate sending and receiving the purchase order respectively. SETNR/A protocol is proposed to improve the weakness of lacking non-repudiation mechanism from SET and SET/A for credit card-based transactions; on the other hand, agent-based protocol is ideal for complicated payment system. Broker generates a mobile agent for B which carries encrypted purchase order to S. A trusted third party (TTP) acts as a lightweight notary for evidence generations. One advantage of this agent-based payment protocol is to reduce inconvenience for mobile clients such as connection time and search for suitable merchant servers, etc.; it also provides necessary security mechanisms for mobile payment transactions.
- Published
- 2008
- Full Text
- View/download PDF
24. A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
Computer science ,business.industry ,Mobile computing ,Public key infrastructure ,Mutual authentication ,Computer security ,computer.software_genre ,Public-key cryptography ,Certificate authority ,Wireless ,Cryptosystem ,Mobile telephony ,business ,computer - Abstract
We propose a new wireless PKI security scheme suitable for future mobile communication such as the third generation (3G). This scheme is based on two major elements, one is a trusted server, and the other is the dual public-key cryptosystems, to provide end-to-end security between mobile clients and the Healthcare Information System (HIS). Applications and services based on this WPKI scheme are also proposed.
- Published
- 2006
- Full Text
- View/download PDF
25. SETNR/A: an agent-based secure payment protocol for mobile commerce
- Author
-
C. R. Ou and Chung-Ming Ou
- Subjects
Transaction processing ,business.industry ,Computer science ,Payment system ,Secure Electronic Transaction ,Trusted third party ,Computer security ,computer.software_genre ,Credit card ,Mobile payment ,ComputingMilieux_COMPUTERSANDSOCIETY ,Mobile agent ,Payment service provider ,business ,computer ,Information Systems - Abstract
Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that B and S cannot repudiate sending and receiving the purchase order respectively. SETNR/A protocol is proposed to improve the weakness of lacking non-repudiation mechanism from the secure electronic transaction (SET) protocol and SET/A for credit card-based transactions; on the other hand, agent-based protocol is ideal for complicated payment system. Broker generates a mobile agent for B which carries encrypted purchase order to S. A trusted third party (TTP) acts as a lightweight notary for evidence generations. One advantage of this agent-based payment protocol is to reduce inconvenience for mobile clients such as connection time and search for suitable merchant servers, etc.; it also provides necessary security mechanisms for mobile payment transactions.
- Published
- 2010
- Full Text
- View/download PDF
26. P-35: Image Hamiltonian: A Proposed Metric for Medical Image Transmission
- Author
-
C. R. Ou, Ray Ho, and Chung-Ming Ou
- Subjects
symbols.namesake ,business.industry ,Present method ,symbols ,Computer vision ,Artificial intelligence ,business ,Hamiltonian (quantum mechanics) ,Mathematics - Abstract
A metric based on the two-dimensional Hamiltonian is suggested for medical image transmission. By comparing the images on different platforms, the present method can give a reasonable prediction and judgment on the quality of the transmitted medical images.
- Published
- 2008
- Full Text
- View/download PDF
27. VISUAL EFFETCS OF HUMAN EYE WITH LASIK AND ARTIFICAL LENS IMPLANTATION
- Author
-
C.J. Chang, Y. Tsai, Rebecca Sun, Ray Ho, and C. R. Ou
- Subjects
medicine.medical_specialty ,business.industry ,medicine.medical_treatment ,Rehabilitation ,Biomedical Engineering ,Biophysics ,LASIK ,medicine.anatomical_structure ,Ophthalmology ,Lens (anatomy) ,medicine ,Orthopedics and Sports Medicine ,Human eye ,business - Published
- 2007
- Full Text
- View/download PDF
28. 19.4: MicroDisplay Panel as Vision Test Chart Imager
- Author
-
Tai-Been Chen, C.J. Chang, C. Y. Kung, Ray Ho, J. W. Liao, C. R. Ou, Chung-Ming Ou, and Rebecca Sun
- Subjects
genetic structures ,Computer science ,business.industry ,media_common.quotation_subject ,High resolution ,eye diseases ,Chart ,Computer graphics (images) ,Contrast (vision) ,Computer vision ,Vision test ,Artificial intelligence ,Sensitivity (control systems) ,business ,Adaptive optics ,media_common - Abstract
Microdisplay device is well known as high resolution imagers. In this study, we propose that using microdisplay as the vision test chart imagers. The measurements, such as vision acuity and contrast sensitivity, can be by using this kind of device.
- Published
- 2006
- Full Text
- View/download PDF
29. LP-7: Late-News Paper: A Simple LCOS Optical System
- Author
-
S. C. Chung, C. C. Lin, Y. C. Fang, Ray Her, Wisely Chen, C. R. Ou, H. Y. Lin, and C-C. Chen
- Subjects
Liquid crystal on silicon ,Engineering ,Simple (abstract algebra) ,business.industry ,Component (UML) ,Electronic engineering ,Construct (python library) ,business ,Grid ,Computer hardware - Abstract
In this article we present a simple optical engine system that using the wired grid component to construct the LCOS engine. The performance of this optical engine (ITRIBOX) is suitable for the portable applications.
- Published
- 2002
- Full Text
- View/download PDF
30. P-110: Stray Light Analysis for Particle on Optical Components
- Author
-
C. R. Ou and S. C. Chung
- Subjects
Physics ,stomatognathic diseases ,Optics ,business.industry ,Stray light ,Particle ,Contrast ratio ,Condensed Matter::Mesoscopic Systems and Quantum Hall Effect ,business - Abstract
It is well known that the particles in/on the optical component will cause the straylight and degrade the contrast ratio, but few of literature describe the relation between the distribution of the particle and the contrast ratio. In this article, we try to explore the relations between these phenomena, as well as the experiment results.
- Published
- 2002
- Full Text
- View/download PDF
31. P-111: The Mechanical-Optical Properties of Wire-Grid Type Polarizer in Projection Display System
- Author
-
Y. C. Fang, H. S. Lin, T. Y. Chen, C. R. Ou, C. H. Chen, and G. H. Ho
- Subjects
Wire grid ,chemistry.chemical_classification ,Materials science ,Birefringence ,business.industry ,Physics::Optics ,Polymer ,Polarizer ,Polarization (waves) ,law.invention ,Optics ,chemistry ,law ,Projection display ,Thermal ,Optoelectronics ,business - Abstract
In order to eliminate the thermal issues of the polymer based polarizer and thermal induce birefringence of bulky PBS, the wire-grid type polarizer is a promising optical component. However, as a part of the imaging optics, mechanical holding may affect the image qualities. In this article, two configurations for using wire-grid polarization are introduced. The image defects including astigmatism and distortion due to improper mechanical holding are evaluated.
- Published
- 2002
- Full Text
- View/download PDF
32. P-92: Thermal-Optical Simulations on ColorQuad™ for Image Quality
- Author
-
S. C. Chung, Chien-Chung Lin, L. C. Lin, W. T. Lee, and C. R. Ou
- Subjects
Engineering ,Commercial software ,business.industry ,Image quality ,Study methodology ,Projection display ,Thermal ,Water cooling ,Contrast ratio ,business ,Simulation - Abstract
This article presents a methodology on the analysis of the thermal effects in the ColorQuad™ for the image quality. ColorQuad™ is one of the most promising optical components in the projection display system. Various types of thermal effects might occur in optical system. ITRI/OES is developing a study methodology that combines different kinds of commercial software (ASAP™ FlowTherm™ and ANSYS™). The ability to simulate the multi-physics phenomena is important to the analysis of the image quality for various optical components. This simulation indicates that the cooling system will cause depolarization of the light in the first PBS, which will degrade the contrast ratio of the system.
- Published
- 2001
- Full Text
- View/download PDF
33. P-76: Numerical Simulations of Nematic Liquid Crystal by Finite Difference Method
- Author
-
W. Seng, C. J. Yoo, C. R. Ou, and G. S. Ho
- Subjects
Surface (mathematics) ,Field (physics) ,Series (mathematics) ,business.industry ,Computer science ,Organic Chemistry ,Mathematical analysis ,Finite difference method ,Grid ,Biochemistry ,Rubbing ,Optics ,Liquid crystal ,Position (vector) ,business - Abstract
In spite of the fact that many simulation programs have already been commercialized, this article provides a reliable methodology for the simulation of the director field of liquid crystal. The present method is easier to be applied than ref. [1,2], especially in various asymmetric pretilt orientations and twists angles. Through this technique, ITRI/OES is developing a series of spreadsheets. Present work is simple and easy to be extended to dynamics and two/three dimensional simulations. The giving grid test also shows that for small discrete numbers the errors will become serious while position is near the rubbing surface. Some of the published simulation works do not mention about this.
- Published
- 2001
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.