Journal: J. Netw. Intell.

Volume 3, Issue 4

235 -- 246Zhenfei Zhao, Hao Luo 0001, Shu-Chuan Chu, Yongheng Shang, Xiaofeng Wu. An Immersive Online Shopping System Based on Virtual Reality
247 -- 258Chin-Ling Chen, Yung-Wen Tang. On the Basis of Eye Tracker to Design A Remote Home Care Application System
259 -- 277Pei-Feng Shiu, Chia-Chen Lin, Jinn-ke Jan, Ya-Fen Chang. A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy
278 -- 290Chung Ming Kuo, Nai-Chung Yang, Shen-Cha Tseng, Meng-Tso Chen. A Novel Texture Descriptor for Texture Image Retrieving
291 -- 304Baoxiang Du, Junhua Zhu, Qun Ding. Optimization of multi-scale kernel chaotic time series prediction method based on the joint parameters were optimized with variable particle swarm

Volume 3, Issue 3

152 -- 161Yiru Sun, Weimin Zheng. An Identity-Based Ring Signcryption Scheme in Ideal Lattice
162 -- 169Chunyuan Liu, Qun Ding. Complexity Analysis and Research based on the Chaotic System of Sample Entropy
170 -- 188Bao Rong Chang, Hsiu Fen Tsai, Hsia-Chung Huang. Implementation of Smart Mobile Point-of-Sale Cash Register System
189 -- 194Sung-Tung Shih, Lui Kam. Multi-Fractal Texture Segmentation for Off-Road Robot Vision Application
195 -- 213Chin-Chen Chang 0001, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen. Distortion Free Progressive BTC based Secret Image Sharing
214 -- 234Chin-Feng Lee, Yi-Jia Wang, Shu-Chuan Chu, John F. Roddick. An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions

Volume 3, Issue 2

74 -- 90Trong-The Nguyen, Thi-Kien Dao, Jeng-Shyang Pan, Mong-Fong Horng, Chin-Shiuh Shieh. An Improving Data Compression Capability in Sensor Node to Support SensorML-Compatible for Internet-of-Things
91 -- 101Chate Harold, Niquice Nelta. Blind Images Quality Assessment of Distorted Screen Content Images
102 -- 112Yuanyun Wang, Jun Wang, Chengzhi Deng, Huasheng Zhu, Shengqian Wang. L1-L2 Norms Based Target Representation for Visual Tracking
113 -- 125Yi-Jen Su, Hsin-Te Wu, Yue-Qun Chen, Wu-Chih Hu. Using CCLM to Promote the Accuracy of Intelligent Sentiment Analysis Classifier for Chinese Social Media Service
126 -- 137Tzung-Pei Hong, Jimmy Ming-Tai Wu, Yan-Kang Li, Chun-Hao Chen. Generalizing Concept-Drift Patterns for Fuzzy Association Rules
138 -- 151Chin-Feng Lee, Ya-Chen Li, Shu-Chuan Chu, John F. Roddick. Data Hiding Scheme Based on A Flower-Shaped Reference Matrix

Volume 3, Issue 1

1 -- 8Mao-Hsiung Hung, Qian Chen, Yi Chen. A Review of Handling Continuous and Unknown Attribute Values of C4.5 Algorithm
9 -- 15Chunlei Fan, Qun Ding. ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher
16 -- 25Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick. Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review
26 -- 49Shangguan Hong, Anhong Wang, Xiong Zhang, Zhiguo Gui. Low-Dose CT Image Processing Using Artifact Suppressed Total Generalized Variation
50 -- 57Yung-Fa Huang, Chung-Hsin Hsu. Energy Efficiency of Dynamically Distributed Clustering Routing for Naturally Scattering Wireless Sensor Networks
58 -- 73Gwo-Jiun Horng, Tun-Yu Chang, Hsin-Te Wu. The Adaptive Node-Selection Mechanism Scheme in Solar-Powered Wireless Sensor Networks