Abstract is missing.
- An Efficient Solution for Time-Bound Hierarchical Key Assignment SchemeJeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang. 3-9 [doi]
- Quaternion Principal Component Analysis for Multi-modal FusionMeng Chen, Chenxia Wang, Xiao Meng, Zhifang Wang. 11-19 [doi]
- A Novel Load Balance Algorithm for Cloud ComputingLin-Lin Tang, Jeng-Shyang Pan, Yuanyuan Hu, Pingfei Ren, Yu Tian, Hongnan Zhao. 21-30 [doi]
- Interference Avoidance Function Research of Spread Spectrum System Using Composite SequenceBing Zhao, Zuo Li, Fei Xu. 31-38 [doi]
- An Adaptive Kelly Betting Strategy for Finite Repeated GamesMu-En Wu, Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng. 39-46 [doi]
- A Sanitization Approach of Privacy Preserving Utility MiningJerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Tzung-Pei Hong, Jeng-Shyang Pan. 47-57 [doi]
- Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server EnvironmentsJeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen. 59-69 [doi]
- A Modeling Method of Virtual Terrain EnvironmentLian-Lei Lin, Ling-Yu Li, Xin-Yi Song. 71-80 [doi]
- Method of Founding Focusing Matrix for Two-Dimensional Wideband SignalsJiaqi Zhen, Zhifang Wang, Lipeng Gao, Hongyuan Gao, Ruihai Yang. 81-90 [doi]
- Network Adaptive Flow Control Algorithm for Haptic Data Over the Internet-NAFCAHGeorge Kokkonis, Kostas E. Psannis, Manos Roumeliotis. 93-102 [doi]
- An Efficient Content Searching Method Using Transmission Records with Wasted Queries Reduction Scheme in Unstructured Peer-to-Peer NetworksYasuaki Ozawa, Shinji Sugawara. 103-113 [doi]
- Reliability Specification of Telecommunication Networks Based on the Failure Influence by Using Evolutional AlgorithmPingguo Huang, Hitoshi Watanabe. 115-126 [doi]
- Trade-off Relationship Between Operability and Fairness in Networked Balloon Bursting Game Using Haptic Interface DevicesMya Sithu, Yutaka Ishibashi, Pingguo Huang, Norishige Fukushima. 127-138 [doi]
- The Effect of Spatiotemporal Tradeoff of Picture Patterns on QoE in Multi-View Video and Audio IP TransmissionToshiro Nunome, Yusuke Tsuya. 139-146 [doi]
- Anomalous Behavior Detection in Mobile NetworkMon Mon Ko, Mie Mie Su Thwin. 147-155 [doi]
- Detection of Web Application Attacks with Request Length Module and Regex Pattern AnalysisEi Ei Han. 157-165 [doi]
- A Study on the Effects of Virtualization on Mobile Learning Applications in Private CloudSi Si Mar Win, Hnin Mya Aye, Than New Aung. 167-175 [doi]
- Developing Mobile Application Framework by Using RESTFul Web Service with JSON ParserEi Ei Thu, Than Nwe Aung. 177-184 [doi]
- Subquadratic Space-Complexity Parallel Systolic Multiplier Based on Karatsuba Algorithm and Block RecombinationChiou-Yng Lee, Che Wun Chiou, Jim-Min Lin. 187-200 [doi]
- Problems on Gaussian Normal Basis Multiplication for Elliptic Curve CryptosystemC. W. Chiou, Y. S. Sun, C. M. Lee, Y. L. Chiu, J.-M. Lin, C.-Y. Lee. 201-207 [doi]
- Auto-Scaling Mechanism for Cloud Resource Management Based on Client-Side Turnaround TimeXiao-Long Liu, Shyan-Ming Yuan, Guo-Heng Luo, Hao-Yu Huang. 209-219 [doi]
- Efficient Digit-Serial Multiplier Employing Karatsuba AlgorithmShyan-Ming Yuan, Chiou-Yng Lee, Chia-Chen Fan. 221-231 [doi]
- Implementation of an FPGA-Based Vision LocalizationWen-Yo Lee, Bo-Jhih Chen, Chieh-Tsai Wu, Ching-long Shih, Ya-Hui Tsai, Yi-Chih Fan, Chiou-Yng Lee, Ti-Hung Chen. 233-242 [doi]
- Supporting Physical Agents in an Interactive e-bookJim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Jing-Rui Hsiao. 243-252 [doi]
- A Communication Strategy for Paralleling Grey Wolf OptimizerTien-Szu Pan, Thi-Kien Dao, Trong-The Nguyen, Shu-Chuan Chu. 253-262 [doi]
- Urban Build-Up Building Change Detection Using Morphology Based on GISKhaing Cho Moe, Myint Myint Sein. 263-272 [doi]
- Cow Identification by Using Shape Information of Pointed PatternKosuke Sumi, Ikuo Kobayashi, Thi Thi Zin. 273-280 [doi]
- Perfect Play in Miniature OthelloYuki Takeshita, Makoto Sakamoto, Takao Ito, Satoshi Ikeda. 281-290 [doi]
- The Development of the Nano-Mist Sprayer and Its Application to AgricultureShugo Kaminota, Koichi Tanno, Hiroki Tamura, Kiyoto Kawasaki. 293-298 [doi]
- Low Offset Voltage Instrumentation Amplifier by Using Double Chopper Stabilization TechniqueMakoto Sada, Koichi Tanno, Masaya Shimoyama, Zainul Abidin, Hiroki Tamura, Takako Toyama. 299-309 [doi]
- A Study on Human Interface for Communication Using Electrooculogram SignalsKazuya Gondou, Hiroki Tamura, Koichi Tanno. 311-320 [doi]
- A Study on Indoor Presence Management System Using SmartphoneTakami Taninoki, Yoshinobu Furukawa, Hiroaki Matsumoto, Hiroki Tamura, Koichi Tanno. 321-330 [doi]
- A Study on sEMG Pattern Classification Method of Muscles of RespirationRyosuke Kokubo, Shogo Okazaki, Misaki Shoitizono, Hiroki Tamura, Koichi Tanno. 331-339 [doi]
- High Power Wireless Power Transfer Driven by Square Wave InputsKazuya Yamaguchi, Takuya Hirata, Ichijo Hodaka. 341-346 [doi]
- Analyzing Tagging Accuracy of Part-of-Speech TaggersNyein Pyae Pyae Khin, Than Nwe Aung. 347-354 [doi]
- Detection of Airway Obstruction from Frequency Distribution Feature of Lung Sounds with Small Power of Abnormal SoundsTomoki Nakano, Shigeyoshi Nakajima. 355-363 [doi]
- Entropy Based Test Cases Reduction Algorithm for User Session Based TestingHsu Mon Maung, Kay Thi Win. 365-373 [doi]
- Fusion of E-Textbooks, Learning Management Systems, and Social Networking Sites: A Mash-Up DevelopmentMasumi Hori, Seishi Ono, Shinzo Kobayashi, Kazutsuna Yamaji, Toshihiro Kita, Tsuneo Yamada. 377-386 [doi]
- New Component Technologies and Development Strategies of e-Learning in MOOC and Post-MOOC ErasTsuneo Yamada. 387-394 [doi]
- Development and Deployment of the Open Access Repository and Its Application to the Open Educational RecoursesKazutsuna Yamaji, Toshihiro Aoyama, Masako Furukawa, Tsuneo Yamada. 395-403 [doi]
- Challenges of Implementing e-Learning in Developing Countries: A ReviewThan Nwe Aung, Soe Soe Khaing. 405-411 [doi]
- SWOT Analysis of E-Learning Course Operation in Higher Education (Case Study: University of Technology, Yatanarpon Cyber City)Soe Soe Khaing, Aung Win, Than Nwe Aung. 413-421 [doi]
- A Sematic Role Labeling Approach in Myanmar TextMay Thu Naing, Aye Thida. 423-429 [doi]
- Text Document Clustering with Ontology Applying Modify Concept WeightingHmway Hmway Tar, Myint Myint Khaing. 431-438 [doi]
- Ontology Based Comparative Sentence and Relation Mining for Sentiment ClassificationMyat Su Wai, May Aye Chan Aung, Than Nwe Aung. 439-446 [doi]
- Word Boundary Identification for Myanmar Text Using Conditional Random FieldsWin Pa Pa, Ye Kyaw Thu, Andrew M. Finch, Eiichiro Sumita. 447-456 [doi]
- Index Structure for Nearest Neighbors Search with Required Keywords on Spatial DatabaseSu Nandar Aung, Myint Myint Sein. 457-467 [doi]