Abstract is missing.
- Design of Triple Symmetric Arms Dipole Antenna for 900/1800/2450 MHz ApplicationsYuh-Yih Lu, Jun-Yi Guo, Hsiang-Cheh Huang. 1-4 [doi]
- Error-Control for Compressed Sensing of Images with Multi-channel TransmissionHsiang-Cheh Huang, Ting-Hsuan Wang, Feng-Cheng Chang. 5-8 [doi]
- Analysis and Simulation of Theme Park Queuing SystemLiou Chu, Fu-Yi Hung, Yen-Cheng Lu. 9-12 [doi]
- Enhanced Difference Alteration with Weighted Averages for Reversible Data HidingHsiang-Cheh Huang, Chuan-Chang Lin, Yuh-Yih Lu, Yueh-Hong Chen. 13-16 [doi]
- Discussions on Implementing Iterative Hard Thresholding AlgorithmFeng-Cheng Chang, Hsiang-Cheh Huang. 17-20 [doi]
- Reversible Image Watermarking Based on Genetic AlgorithmYueh-Hong Chen, Hsiang-Cheh Huang. 21-24 [doi]
- Data Glove Embedded with 6-DOF Inertial Sensors for Hand RehabilitationBor-Shing Lin, I.-Jung Lee, Pei-Chi Hsiao, Shu-Yu Yang, Willy Chou. 25-28 [doi]
- A Prototype Design of a Continuous and Real-Time Wireless Urine Monitoring SystemYung Tsung Cheng, Jiun-Hung Lin, Cheng-Chi Tai. 29-32 [doi]
- Design of Wearable Brain Computer Interface Based on Motor ImageryChuan Lung Lin, Tso-Yao Chu, Pei-Jung Wu, Chen-An Wang, Bor-Shyh Lin. 33-36 [doi]
- Wireless Surface Electromyography Monitoring System for Dysphagia EvaluationChih-Jen Cheng, Chien-Zhi Ou, Zu-Po Yang, Bor-Shyh Lin. 37-40 [doi]
- Building an IPv6 Virtual Lab with the Multi-level Training MechanismShian-Shyong Tseng, Ching-Heng Ku, Ai-Chin Lu, Jun-Ming Su, Geng-Da Tsai. 41-44 [doi]
- An Enhancement of IPv4-in-IPv6 MechanismN. Chuangchunsong, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Robert Elz. 45-48 [doi]
- A Light-Weight Penetration Test Tool for IPv6 ThreatsGu Hsin Lai. 49-52 [doi]
- The Implementation of IPv6-Enabled Locators for Location-Based Smart Marketing ServiceTseng-Yi Chen, Fan-Hsun Tseng, Nen-Fu Huang, Wei Kuan Shih, Han-Chieh Chao, Li-Der Chou. 53-56 [doi]
- Design and Implementation of Health Monitoring System for Solar Panel in IPv6 NetworkWen-Yen Lin, Kuang-Po Hsueh, Wang-Hsin Hsu, Liew Gha Yie, Wei Chen Tai. 57-60 [doi]
- Ontology-Based Anti-threat Decision Support System for IPV4/IPV6Shian-Shyong Tseng, Jui-Feng Weng, Li-Ling Hu, Hsu Nai Wen. 61-64 [doi]
- Robust Color Image Watermarking Approach Based on Shape-Specific PointsChing-Yu Yang, Wen-Fong Wang. 65-68 [doi]
- A Reversible Data Hiding Method Using Inverse S-Scan Order and Histogram ShiftingYung-Chen Chou, Guo-Hao Huang, Huang Ching Lee, Ke Jhen Lin. 69-72 [doi]
- A Web API Aggregation Service for Mobile Mashup ApplicationsHung-Yu Lin, Jiung Long Huang. 73-76 [doi]
- Ubiquitous Multimedia Services in Home-Based Context-Aware EnvironmentsChih-Lin Hu, Cheng Lun Lin, Hung-Tsung Huang, Yi-Yu Su, Pin-Chuan Liu. 77-80 [doi]
- 14-ms-Group-Delay and Low-Complexity Algorithm Design of 18-Band Quasi-ANSI S1.11 1/3 Octave Filter Bank for Digital Hearing AidsShin-Chi Lai, Chih-Hao Liu, Ling-Yi Wang, Sheau-Fang Lei. 81-84 [doi]
- Low-Complexity Algorithm of Recursive Analysis and Synthesis Quadrature Mirror Filterbanks for Digital Radio MondialeAn-Kai Li, Shin-Chi Lai, Wen-Kai Tsai, Sheau-Fang Lei. 85-88 [doi]
- A Novel Turtle Shell Based Scheme for Data HidingChing-Chun Chang, Yanjun Liu, Thai Son Nguyen. 89-93 [doi]
- Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart CardsYa-Fen Chang, Wei-Liang Tai, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen. 94-97 [doi]
- An ID-Based User Authentication Scheme for Cloud ComputingJen-Ho Yang, Pei-Yu Lin. 98-101 [doi]
- Analysis of Passenger Flow in Airport TerminalPing Nan Chiang, Kevin Taaffe. 102-105 [doi]
- A QR Code-Based on-Street Parking Fee Payment MechanismWen-Chuan Wu. 106-109 [doi]
- An Image Hiding Method by Applying Tree Structure on Linking PixelsChi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin. 110-113 [doi]
- An Optimal Modification BTC Scheme Based on Binary Search TreeChia-Chen Lin, Xiao-Long Liu, Jian Jie Zhou, Shyan-Ming Yuan. 114-117 [doi]
- An Instantiation of the Multiple-Transfer Framework to Reduce Efforts in Context Model Learning for New Users in Smart HomesChing-Hu Lu, Yi-Ting Chiang. 118-121 [doi]
- A Webpage Data Hiding Method by Using Tag and CSS Attribute SettingYung-Chen Chou, Hsin-Chi Liao. 122-125 [doi]
- An Efficient and Simplified Data Hiding Technique Based on 2's ComplementTzu-Chuen Lu, Chun-Ya Tseng, Chang-Mu Chen, Hui-Shih Leng, Ying-Hsuan Huang. 126-129 [doi]
- Tampering Detection and Content Recovery for Digital Images Using Halftone MechanismShanshan Yang, Chuan Qin, Zhenxing Qian, Boqing Xu. 130-133 [doi]
- Novel Image Authentication Scheme for AMBTC-Compressed ImagesChia-Chen Lin, Yuehong Huang, Wei-Liang Tai. 134-137 [doi]
- A Novel Reversible Data Hiding Scheme Using Ripple Strategy and Histogram ShiftingYung-Chen Chou, Huang Ching Lee, Yong Jin Yu. 138-141 [doi]
- Data Hiding Scheme Based on Edge Detection and Triangular MirroringTzu-Chuen Lu, Chun-Ya Tseng, Hui-Shih Leng, Chun-Chih Huang. 142-145 [doi]
- Transmissions for Delay-Guaranteed Information Using Smart Antenna SystemsLi-Ling Hung, Yu-Wei Huang, Sheng-Han Wu. 146-149 [doi]
- An Automatic Chinese Font Library Generation Method by Modifying Vector Contour CurvesWenfa Qi, Yuxin Liu, Wei Guo. 150-154 [doi]
- The Adaptive Recommendation Segment Mechanism to Reduce Traffic Congestion in Smart CityGwo-Jiun Horng. 155-158 [doi]
- Elimination of Matching Digital Images to Identify Objective Measures of QualityJakub Peksinski, Grzegorz Mikolajczak, Janusz Pawel Kowalski. 159-162 [doi]
- On Extreme Learning Machine for Watermarking of an Images in Discrete Wavelet Transform DomainRam Pal Singh, Neelam Dabas, Anurag Mishra, Vikash Chaudhary. 163-166 [doi]
- Analyzing Item Features for Cold-Start Problems in Recommendation SystemsSoryoung Kim, Sang-Min Choi, Yo-Sub Han, Ka Lok Man, Kaiyu Wan. 167-170 [doi]
- A Hybrid Multi-functions Digital Public Address System with Earthquake Early WarningChung Heng Chuang, Tsung-Hsing Lin, Liang-Bi Chen, Tung-Lin Lee, Chaio Hsuan Chuang, Katherine Shu-Min Li, Chih-Lin Hung, Chao-Wen Wu. 171-174 [doi]
- A Known-Key Scenario for Steganalysis and a Highly Accurate Detector within ItViktor Monarev, Andrey Pestunov. 175-178 [doi]
- The K-Means Clustering Methods Applied in the Message Scheduling Methods of Flexray Communication Network Based on the Embedded Flexray NodeYung-Hoh Sheu, Zuo Wen Wang, Yao Jhong Liou. 179-182 [doi]
- Semantic Vocabulary Cognition Model for the Improvement of Automatic Image AnnotationZhonghua Sun, Kebin Jia. 183-186 [doi]
- Optimization for I-Frame Based on Residual ImageYuan Gao, Pengyu Liu, Kebin Jia. 187-190 [doi]
- A Water Environment Security Monitoring Algorithm Based on Intelligent Video SurveillanceZihan Pang, Kebin Jia, Jinchao Feng. 191-194 [doi]
- Research Progress of Obstacle Detection Based on Monocular VisionQiang Wu, Jie Wei, Xuwen Li. 195-198 [doi]
- Stereo Matching Algorithm of Color Image Based on Weber's Law and CensusQiang Wu, Xiangnan Zhao, Xuwen Li. 199-202 [doi]
- Modification of Disparity Vector Derivation from Neighbouring Blocks in 3D-HEVCYuxin Song, Kebin Jia. 203-206 [doi]
- The PCA-Demons Algorithm for Medical Image RegistrationLiya Zhao, Kebin Jia. 207-210 [doi]
- A Deep Structure for Facial Expression Recognition under Partial OcclusionYue Cheng, Bin Jiang, Kebin Jia. 211-214 [doi]
- Flexible Quantum Image Secret Sharing Based on Measurement and StripXianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu. 215-218 [doi]
- An FPGA-Based Design of Efficient QKD Sifting ModuleQiong Li, Zhibin Lin, Dan Le, Hucheng Liu. 219-222 [doi]
- Equivalence Proof of Two (2, n) Progressive Visual Secret SharingXuehu Yan, Shen Wang, Xiamu Niu. 223-226 [doi]
- An FPGA-Based Communication Scheme of Classical Channel in High-Speed QKD SystemQiong Li, Siyou Ma, Haokun Mao, Lin Meng. 227-230 [doi]
- Spam Detection Approach Based on C-Support Vector Machine and Kernel Principal-Component AnalysisShu Geng, Liu Lv, Rongjun Liu. 231-234 [doi]
- A Method to Generate Random Number for Cryptographic ApplicationXiamu Niu, Yongting Wang, Di Wu. 235-238 [doi]
- A Novel Finger Vein Image Quality Evaluation Method Based on Triangular NormJialiang Peng, Qiong Li, Xiamu Niu. 239-242 [doi]
- A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQZhenjia Dou, Kexin Ren, Qi Han, Xiamu Niu. 243-246 [doi]
- Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature PointsChen Cui, Shen Wang, Xiamu Niu. 247-250 [doi]
- Gender-Dependent Babble Maskers Created from Multi-speaker Speech for Speech Privacy ProtectionKazuhiro Kondo, Hiroki Sakurai. 251-254 [doi]
- Encoding Data by Frequency Modulation of a High-Low Siren Emitted by an Emergency VehicleAkira Nishimura. 255-259 [doi]
- Robust Audio Information Hiding Based on Stereo Phase Difference in Time-Frequency DomainNobutaka Ono. 260-263 [doi]
- Secure Speech Encryption System Using Segments for Speech SynthesisMinoru Kohata. 264-267 [doi]
- An Audio Watermarking Method Using Pitch-Transformed Sound of Original MusicHarumi Murata, Akio Ogihara. 268-271 [doi]
- Hybrid Speech Watermarking Based on Formant Enhancement and Cochlear DelayShengbei Wang, Masashi Unoki. 272-275 [doi]
- A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block SelectionXinlu Gui, Siren Cai, Xiaolong Li, Bin Yang. 276-280 [doi]
- Moving-Object Intrusion Detection Based on Retinex-Enhanced MethodChao-Ho Chen, Tsong-Yi Chen, Yu-Chun Lin, Wu-Chih Hu. 281-284 [doi]
- HDR Enhancement Based on Bi-curve Mapping for Image SequencesTsong-Yi Chen, Chao-Ho Chen, Tzu Feng Tseng, Guan-Ming Luo, Wu-Chih Hu. 285-288 [doi]
- An Efficient Method for Sweep Coverage with Minimum Mobile SensorBing-Hong Liu, Ngoc-Tu Nguyen, Van Trung Pham. 289-292 [doi]
- A Fast Method for Decoding Reed-Solomon Codes on ProcessorsYan-Haw Chen, Ching-Fu Huang, Shao-I. Chu. 293-296 [doi]
- An Energy Minimization Approach for Automatic Video Shot and Scene Boundary DetectionSinnu Susan Thomas, Sumana Gupta, K. S. Venkatesh. 297-300 [doi]
- A Dynamic Street View System Using Video Event Data RecorderChing-Hao Lai, Jun-Dong Chang, Ji Wei Lu, Fay Huang. 301-304 [doi]
- Hardware and Software Co-design of the Moving Object Tracking SystemYeu-Horng Shiau, Cheng-Han Li, Zhi hao Wang, Yi Tai Guo. 305-308 [doi]
- Low-Cost and Low-Complexity Electrocardiogram Signal Recorder Design Based on Arduino PlatformShin-Chi Lai, Wen Chih Li, Sin He You, Da Wei Jhuang, Shih Ting Gao. 309-312 [doi]
- A Novel Coherence-Function-Based Noise Suppression Algorithm by Applying Sound-Source Localization and Awareness-Computation Strategy for Dual MicrophonesShin-Chi Lai, Hsu Cheng Lai, Feng Chung Hong, Huan Ru Lin, Sheau-Fang Lei. 313-316 [doi]
- Ultra Low Power Circuit Design Based on Adiabatic LogicChi-Chia Sun, Cheng Chih Wang, Ming-Hwa Sheu. 317-320 [doi]
- Real-Time Text Detection Using PAC/DUE Embedded SystemShih-Chang Hsia, Cheng-Nan Ho, Chien-Hung Liu. 321-324 [doi]
- Feature Points Based Video Object Tracking for Dynamic Scenes and Its FPGA System PrototypingYin-Tsung Hwang, Bing Cheng Tsai, Yu-Ting Pai, Ming-Hwa Sheu. 325-328 [doi]
- High Dynamic Range Image Based on Block-Based Edge Strength for Embedded System DesignWen-Kai Tsai, Chang Jie Lai, Ming-Hwa Sheu, Tsu Hsiung Chen. 329-332 [doi]
- Robust Object Tracking Using Adaptive Multi-Features Fusion Based on Local Kernel LearningHainan Zhao, Xuan Wang. 333-336 [doi]
- Dependency Parsing with Structure KnowledgeShixi Fan, Yongshuai Hou, Lidan Chen. 337-340 [doi]
- Semi-supervised Marginal Fisher AnalysisShu Wang. 341-344 [doi]
- Extracting Learning Features of Knowledge Unit in Knowledge MapXiang Jun Huang, Qing-Hua Zheng, Chao Zhang. 345-348 [doi]
- Visualization for Non-linear Enhanced Volume DataFei Yang, Weigang Lu, Lei Zhang, Kuanquan Wang, Yemin Li. 349-352 [doi]
- Night Video Surveillance Based on the Second-Order Statistics FeaturesCheng-Chang Lien, Wen Kai Yu, Chang-Hsing Lee, Chin-Chuan Han. 353-356 [doi]
- Robust Handwriting Extraction and Lecture Video SummarizationFu-Hao Yeh, Greg C. Lee, Ying-Ju Chen, Chien-Hsing Liao. 357-360 [doi]
- Full-Frame Video Stabilization via SIFT Feature MatchingYu-Hsi Chen, Hsueh-Yi Sean Lin, Chih-Wen Su. 361-364 [doi]
- Bezier Curve-Based Tour Generator for Navigation in Google Earth-Based Virtual CampusJen-Perng Yu, Jyh Jong Lin, Mei-Chen Chu, Yuh Hwa Pai. 365-368 [doi]
- Eye Tracking for Analyzing Applied Effects on Instructional Graphics Directing Visual AttentionHui-Hui Chen, Hung Sheng Lai, Bor-Jiunn Hwang, Chiao-Wen Kao, Shih-Yu Huang. 369-372 [doi]
- Applying Media Richness Theory to Essay Writing Instruction - A Case of an Elementary SchoolShyi-Huey Wu, Bor-Jiunn Hwang, Ya Ping Fan, Ching-Hui Chen. 373-376 [doi]
- A Dead-Reckoning Positioning Scheme Using Inertial Sensing for Location EstimationYih-Shyh Chiou, Fuan Tsai, Sheng-Cheng Yeh. 377-380 [doi]
- High-Payload Lossless Data Hiding Scheme with Block Statistics CharacteristicsShang-Kuan Chen, Ran-Zan Wang, Wen-Pinn Fang. 381-384 [doi]
- Data Transmission System for Mobile Device by Audio Hiding ApproachWen-Pinn Fang, Ran-Zan Wang, Tzu Hsuan Liao, Shang-Kuan Chen, Yeuan-Kuen Lee. 385-387 [doi]
- Video Resizing for Mobile DeviceWen-Pinn Fang, Ming-Hao Liu, Yeuan-Kuen Lee, Rei-Heng Cheng. 388-391 [doi]
- Real-Time Broadcast System for Android SystemWen-Pinn Fang, Chun Li, Tsu-Hsun Fu. 392-394 [doi]
- A Study on Captcha RecognitionChii-Jen Chen, You-Wei Wang, Wen-Pinn Fang. 395-398 [doi]
- An Image Inpainting Method for Stereoscopic Images Based on Filling RouteFang-Hsuan Cheng, Moo Di Loo. 399-402 [doi]
- Retinal Projection Display Using Diffractive Optical ElementYasuhiro Takatsuka, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi. 403-406 [doi]
- Three-Dimensional Light Field Display with Overlaid ProjectionHodaka Yamada, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi. 407-410 [doi]
- Vision-Based Path Learning for Home RobotsAtsushi Ueno, Natsuki Kajihara, Natsuko Fujii, Tomohito Takubo. 411-414 [doi]
- A Cluster Based Ranking Framework for Multi-typed Information NetworksPyke Tin, Takashi Toriu, Thi Thi Zin, Hiromitsu Hama. 415-418 [doi]
- A New Background Subtraction Method Using Bivariate Poisson ProcessThi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama. 419-422 [doi]
- Integration of Multiple Shape Features for Human Detection in VideosLiang-Hua Chen, Pei Chieh Lee, Li-Yun Wang, Hong-Yuan Mark Liao. 423-426 [doi]
- Scientific Literature Retrieval Model Based on Weighted Term FrequencyXi Quan Yang, Dian Yang, Ming Yuan, Xing Hua Lv. 427-430 [doi]
- Based on the Texture Analysis to Inspect the Tread Worn Status on the TireShih-Yen Huang, You-Jyun Syu. 431-434 [doi]
- Blurred Image Restoration Using Fast Blur-Kernel EstimationHui-Yu Huang, Wei-Chang Tsai. 435-438 [doi]
- The Cleaning Machine Path Design Using Image Recognition TechniquesWen-Yuan Chen, Shih Sung Cheng, Ching-Te Wang, Chin-Fu Tsai, Chiou-Kou Tung. 439-442 [doi]
- Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication TopologyRuey-Maw Chen, Hua Tsun Huang. 443-446 [doi]
- A Modified K-Means Algorithm - Two-Layer K-Means AlgorithmChen-Chung Liu, Shao Wei Chu, Yung-Kuan Chan, Shyr-Shen Yu. 447-450 [doi]
- License Plate Location System Using Smart-Phone with G-SensorChuin-Mu Wang, Jian De Hong, Geng-Cheng Lin, Jing Yuan Su, Zhe Fu Lin. 451-454 [doi]
- A New Approach to Reversible WatermarkingToshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen. 455-458 [doi]
- A Zero-Watermarking-Like Steganography and Potential ApplicationsHirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai. 459-462 [doi]
- Surveillance Camera System to Achieve Privacy Protection and Crime PreventionKento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen. 463-466 [doi]
- Image Protection System with Steganography and AuthenticationHyunho Kang, Keiichi Iwamura. 467-470 [doi]
- Analysis of Facebook Friends Using Disclosure LevelShimon Machida, Tomoko Kajiyama, Shigeru Shimada, Isao Echizen. 471-474 [doi]
- Steganalysis of LSB Matching Based on Local Binary PatternsXinlu Gui, Xiaolong Li, Bin Yang. 475-480 [doi]
- Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data HidingXiaocheng Hu, Weiming Zhang, Nenghai Yu. 481-484 [doi]
- Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding TechniqueChin-Chen Chang, Chin-Yu Sun. 485-488 [doi]
- Applying Histogram Modification to Embed Secret Message in AMBTCChin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung. 489-492 [doi]
- Compatible 2D-Code Having Tamper Detection System with QR-CodeTakayuki Ishihara, Michiharu Niimi. 493-496 [doi]
- A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting CodeKitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen. 497-501 [doi]
- Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a CameraKitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen. 502-506 [doi]
- Mathematical Simulation Model and Its Evaluation for Artificial Fiber PatternsKitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen. 507-511 [doi]
- A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification DirectionChin-Chen Chang, Hsiao-Ling Wu. 512-515 [doi]
- Effects of Random Sign Encryption in JPEG 2000-Based Data HidingWannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya. 516-519 [doi]
- Robust Message Hiding for QR CodeThach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen. 520-523 [doi]
- Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey ClusteringHaihui Gao, Zhonghua Dai, Yong Peng, Huikang Lu. 524-527 [doi]
- Multi-agent Intrusion Detection System Using Feature Selection ApproachYi Gong, Yong Fang, Liang Liu, Juan Li. 528-531 [doi]
- A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian NetworkZhonghua Dai, Haihui Gao, Yong Peng, Huikang Lu. 532-536 [doi]
- Techniques and Research Trends of Network TestbedHaihui Gao, Yong Peng, Zhonghua Dai, Hanjing Li. 537-541 [doi]
- Formalization and Systematization of Differential Cryptanalysis NotionsAndrey Pestunov. 542-545 [doi]
- An AODV-Based Backup Routing Mechanism for Time-Critical in Wireless Mesh NetworksMing-Hwa Cheng, Rui Juan Deng, Wen-Shyang Hwang, Yan-Jing Wu. 546-549 [doi]
- A Singing Voice Synthesizer Controlled by Arm Motions Using Compressed Phoneme Determination AlgorithmMasashi Ito, Tomohiro Ashina, Yujiro Saegusa. 550-553 [doi]
- Analysis of English Pronunciation of Singing Voices Sung by Japanese SpeakersKazumichi Yoshida, Takashi Nose, Akinori Ito. 554-557 [doi]
- Assessing the Intended Enthusiasm of Singing Voice Using Energy VarianceAkinori Ito. 558-561 [doi]
- Transcribing Frequency Modulated Musical Expressions from Polyphonic Music Using HMM Constrained Shift Invariant PLCADooyong Sung, Kyogu Lee. 562-565 [doi]
- On-Line Nonnegative Matrix Factorization for Music Signal SeparationSeokjin Lee. 566-569 [doi]
- Melody Extraction for Vocal Polyphonic Music Based on Bayesian FrameworkLiming Song, Ming Li 0026, Yonghong Yan 0002. 570-573 [doi]
- Emotional Speech Recognition and Synthesis in Multiple Languages toward Affective Speech-to-Speech Translation SystemMasato Akagi, Xiao Han, Reda Elbarougy, Yasuhiro Hamada, Junfeng Li. 574-577 [doi]
- Quantized F0 Context and Its Applications to Speech Synthesis, Speech Coding, and Voice ConversionTakashi Nose, Takao Kobayashi. 578-581 [doi]
- Voice Activity Detection Based on Statistical Model Employing Deep Neural NetworkInyoung Hwang, Joon-Hyuk Chang. 582-585 [doi]
- Speaker Adaptation Using Nonlinear Regression Techniques for HMM-Based Speech SynthesisDoo Hwa Hong, Shin Jae Kang, Joun Yeop Lee, Nam Soo Kim. 586-589 [doi]
- Boosted Hybrid DNN/HMM System Based on Correlation-Generated TargetsMengzhe Chen, Qingqing Zhang, Jielin Pan, Yonghong Yan 0002. 590-593 [doi]
- Enhanced Out of Vocabulary Word Detection Using Local Acoustic InformationXuyang Wang, Ta Li, Pengyuan Zhang, Jielin Pan, Yonghong Yan 0002. 594-597 [doi]
- Virtual Auditory Display by Remote Rendering via Computer NetworkYukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li. 598-601 [doi]
- Effect of Interaural Difference for Localization of Spatially Segregated SoundDaisuke Morikawa. 602-605 [doi]
- Representation of Individual HRTFs Using Weighting Coefficients of SENZIShuichi Sakamoto, Yoshiki Satou, Jorge Trevino, Yôiti Suzuki. 606-609 [doi]
- Feasibility Study for Objective Measurement on Sound Localization Using Auditory Evoked PotentialChan Jun Chun, Seok Hee Jeong, Jong Won Shin, Hong Kook Kim, Jin Ah Kang. 610-613 [doi]
- Auralization of Musical Instruments in Virtual Halls Considering Source DirectivityKyoungSoo Park, Jeong-Hun Seo, Jeunghun Kim, Cheon Sung Jun. 614-617 [doi]
- On the Performance and Robustness of Crosstalk Cancelation with Multiple LoudspeakersXing Yang, Risheng Xia, Zhonghua Fu, Junfeng Li, Yonghong Yan 0002, Shuichi Sakamoto, Yôiti Suzuki. 618-621 [doi]
- Recognizing Actions with Multi-view 2D Observations Recovered from Depth MapsGuoliang Lu, Yiqi Zhou, Xueyong Li. 622-625 [doi]
- Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA FeaturesLu Liu, Rongrong Ni, Yao Zhao, Siran Li. 626-629 [doi]
- Security Monitoring by Watermarking and Hashing for Multimedia Service on Internet PlatformZi Wang, Ju Liu, Wenbo Wan, Jiande Sun, Jun Bo, Yongkang Liu. 630-633 [doi]
- Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFIDChien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu. 634-637 [doi]
- Regular Clipping Detection of Image Based on SIFTYan-Li Huang, Hao Liang Cui, Shao-zhang Niu. 638-641 [doi]
- A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 StandardChin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng. 642-645 [doi]
- The Research and Analysis for Rear View Transmission Based on IEEE 802.11 Wireless NetworkTsung-Yuan Wu, Wei-Tsong Lee. 646-649 [doi]
- Reducing the Power Consumption of Servers with Bandwidth ConsiderationYu-Chang Lin, Wei-Tsong Lee, Jing Yue Qiu. 650-653 [doi]
- FHR-SCTP: The Research of a Quality Aware SCTP Congestion Control Mechanism to Improve Handover EfficiencyChen-Wei Chang, Wei-Tsong Lee, Hsin-Wen Wei. 654-657 [doi]
- Dynamically Adjust Packet Size and Block Size to Achieve Maximum Effectiveness of Forward Error CorrectionKai Po Chuang, Wei-Tsong Lee, Hsin-Wen Wei. 658-661 [doi]
- The Study of Mobile E-Portfolio ArchitectureYu Jen Pan. 662-665 [doi]
- A Location-Aware Home Appliance Control SystemRung-Shiang Cheng, Chia Peng Lin, Jiun Yu Jhou. 666-669 [doi]
- A Density-Aware Location-Aided Routing Protocol for Wireless Ad-Hoc NetworksShih-Chang Huang, Hong-Yi Chang. 670-673 [doi]
- A Novel Recommendation Scheme for Increasing Connectivity in ZigBee Wireless Sensor NetworksHong-Yi Chang, Shih-Chang Huang, Chih-Chun Lai, Zih Huan Hong. 674-677 [doi]
- Computing the Probability of Specific Random Sector Graphs with Applications in Wireless Networks with Directional AntennasChun-Yi Wu, Chang-Wu Yu. 678-681 [doi]
- A Novel Relay Placement Algorithm Based on Puzzle Games for Indoor Wireless Sensor NetworksHong-Yi Chang, Yu-Huei Huang, Tu-Liang Lin. 682-685 [doi]
- A Novel Algorithm for Searching Parking Space in Vehicle Ad Hoc NetworksHong-Yi Chang, Hao Wen Lin, Zih Huan Hong, Tu-Liang Lin. 686-689 [doi]
- Performance Evaluations of an Ant Colony Optimization Routing Algorithm for Wireless Sensor NetworksTu-Liang Lin, Yu-Sheng Chen, Hong-Yi Chang. 690-693 [doi]
- Adaptive Job Assign Algorithm Based on Hierarchical Server Cloud ComputingJing Yue Qiu, Hsin-Wen Wei, Wei-Tsong Lee, Yu-Chang Lin. 694-697 [doi]
- A Novel Protocol UDCP for Improving Fairness and Maintaining the High-Speed Rate of UDPHeng Yao Chang, Wei-Tsong Lee, Hsin-Wen Wei. 698-701 [doi]
- Base on Game Theory Model to Improve Trust Access Control in Cloud File-Sharing SystemWei Jyun Wong, Wei-Tsong Lee, Hsin-Wen Wei. 702-705 [doi]
- Leakage Resilient Provable Data Possession in Public Cloud StorageYongjun Ren, Yaping Chen, Jin Wang, Liming Fang. 706-709 [doi]
- Attributed Based Provable Data Possession in Public Cloud StorageYongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang. 710-713 [doi]
- Data Access Control for Multi-authority Cloud Storage SystemsZhangjie Fu, Lin Xin, Jin Wang, Xingming Sun. 714-717 [doi]
- A Virtual Force Based Movement Scheme for Area Coverage in Directional Sensor NetworksChiu-Kuo Liang, Cheng Yen Chung, Chuan-feng Li. 718-722 [doi]
- Self-Stabilizing Distributed Formation of Minimal k-Dominating Sets in Mobile Ad Hoc NetworksLi-Hsing Yen, Zong-Long Chen. 723-728 [doi]
- Analysis of Handover Decision with Adaptive Offset in Next-Generation Hybrid Macro/Femto-cell NetworksMin-Shu Hung, Jen-Yi Pan, Zheng-En Huang. 729-734 [doi]
- Energy Consumption Analysis for Sensors in Multi-sink Wireless Sensor NetworksRei-Heng Cheng, Chiming Huang, Wen-Pinn Fang, Shang-Kuan Chen, Ran-Zan Wang. 735-738 [doi]
- End-to-End Delay Performance Analysis of Anypath Routing over Wireless Mesh NetworksMing-Che Chen, Hui-Tang Lin. 739-743 [doi]
- A Reducing Broadcast Message Method in Vehicular NetworksMing-Fong Tsai, Chih-Han Chang. 744-747 [doi]
- Incorporation of Perceptually Energy-Compensated QIM into DWT-DCT Based Blind Audio WatermarkingHwai-Tsu Hu, Szu-Hong Chen, Ling-Yuan Hsu. 748-752 [doi]
- Service Conflict Detection and Avoidance Based on Scene with Urgency DegreeXukai Wang, Yan Lindsay Sun, Hong Luo. 753-756 [doi]
- A Dimension Model for Conflict-Free Service Management in Smart Environment Control SystemYanchen Ren, Hong Luo, Liang Liu. 757-761 [doi]
- A Novel Automatic Ontology Construction Method Based on Web DataQiuxia Song, Jin Liu, Xiaofeng Wang, Jin Wang. 762-765 [doi]
- A New Genetic Algorithm for Overlapping Community DetectionBo Shen, Ningwei Wang, Huihuai Qiu. 766-769 [doi]
- Security Analysis for UHF RFID TagsXinwei Liu, Yan Sun, Jie Liu. 770-774 [doi]
- Oriented Group Provable Data Possession in Public CloudYongjun Ren, Jiang Xu, Jin Wang, Liming Fang. 775-778 [doi]
- Analysis of Delegable and Proxy Provable Data Possession for Cloud StorageYongjun Ren, Jian Shen, Jin Wang, Liming Fang. 779-782 [doi]
- Secure Storage of Data in Cloud ComputingZhangjie Fu, Xinyue Cao, Jin Wang, Xingming Sun. 783-786 [doi]
- Document Attribute-Based Keyword Search over Encrypted DataZhangjie Fu, Jie Xi, Jin Wang, Xingming Sun. 787-790 [doi]
- A Similarity Search Method for Encrypted Cloud DocumentZhangjie Fu, Jiangang Shu, Jin Wang, Xingming Sun. 791-794 [doi]
- Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud StorageYongjun Ren, Jian Shen, Jin Wang, Liming Fang. 795-798 [doi]
- Intelligent Level Crossing Safety Control SystemChih-Wen Li, Chia Cheng Chu, Wei Lun Fong, Hwang-Cheng Wang. 799-802 [doi]
- A Metaheuristic Artificial Immune System Algorithm for Mobile Robot NavigationHsu-Chih Huang, Ter-Feng Wu, Chun Yu Huang. 803-806 [doi]
- Adaptive Hierarchical Emotion Recognition from Speech Signal for Human-Robot CommunicationBa-Vui Le, Sungyoung Lee. 807-810 [doi]
- Impact of Jamming Attack on Galileo ReceiversYing-Ren Chien, Po-Yu Chen. 811-814 [doi]
- Study of Stability Indices for Special Protection System in TaiwanYi-Ting Chou, Yi-Jen Wang, Chung-Han Hsieh, Ruei Yu Wang, Syed Khawar Shah. 815-818 [doi]
- Data Acquisition and Transmission Reliability for Wireless Image Sensor NetworksDan Tao, Guangwei Yang, Yan Sun, Haiyang Zhang, Xiaoyu Feng. 819-822 [doi]
- K-Extended Constrain Independent Relay Node Placement with Base Stations in Two-Tiered Wireless Sensor NetworkZhipeng Gao, Kan Chen, Weijing Cheng, Yuwen Hao, Xiaoxue Li. 823-826 [doi]
- An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor NetworkZhiqiang Shi, Jin Liu, Qiuxia Song, Jin Wang. 827-830 [doi]
- A Fuzzy Control Theory and Neural Network Based Sensor Network Control SystemAnqi Wang, Jin Liu, Xiaofeng Wang, Jin Wang. 831-834 [doi]
- A Sensor Information Gateway Based on Thing Interaction in IoT-IMS Communication PlatformJenq-Muh Hsu, Chin Yo Chen. 835-838 [doi]
- Adaptive Fuzzy CMAC Design for an Omni-directional Mobile RobotTer-Feng Wu, Hsu-Chih Huang, Pu-Sheng Tsai, Nien-Tsu Hu, Zhi-Qiang Yang. 839-843 [doi]
- A Single-Stage Power Converter for DC UPS ApplicationsMaoh-Chin Jiang, Bing Jyun Shih, Shyh Shing Perng, Tai Chun Liu. 844-847 [doi]
- A High Performance Three-Phase Active Power FilterMaoh-Chin Jiang, Shyh Shing Perng, Bing Jyun Shih, Tai Chun Liu, Wei Cheng Ke. 848-851 [doi]
- Design and Implementation of a FPGA-Based Induction Motors Drive SystemShyh Shing Perng, Chih-Wen Li, Maoh-Chin Jiang, Ter-Feng Wu, Rui-Ting Ma. 852-855 [doi]
- Design of a Kinect Sensor Based Posture Recognition SystemChia-Wen Chang, Min Da Nian, Yi Fang Chen, Ching Ho Chi, Chin-Wang Tao. 856-859 [doi]
- An Algorithm to Detect the Crack in the Tunnel Based on the Image ProcessingDapeng Qi, Yun Liu, Xiaoyang Wu, Zhen-Jiang Zhang. 860-863 [doi]
- A Concept Maps Oriented E-Book Content Design System for Evaluating Learning PerformanceDe Wei Chang, Chin-Feng Lai, Shih-Yeh Chen, Yueh-Min Huang, Yu-Lin Jeng. 864-867 [doi]
- A Forecasting System of Micro-blog Public Opinion Based on Artificial Neural NetworkNai Yue Chen, Yun Liu, Zhen-Jiang Zhang. 868-871 [doi]
- Research on Analysis Method of Network User PreferenceShen Bo, Zhang Huan, Hu Baowen. 872-875 [doi]
- An Improved Collaborative Filtering Recommendation Algorithm for Microblog Based on Community DetectionHui Huai Qiu, Yun Liu, Zhen-Jiang Zhang, Gui Xun Luo. 876-879 [doi]
- Sorting Topic Specific Web Pages Based on Ontology KnowledgeQiuxia Song, Jin Liu, Ming Ni, Liang Chen, Jialiang Shen. 880-883 [doi]
- A Heuristic Design of Uplink Scheduler in LTE-A NetworksYen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin. 884-888 [doi]
- An Effective NAT Traversal Mechanism for IMS Applications in 3GPP NetworksWhai-En Chen, Bo-En Chen. 889-892 [doi]
- Facilitating Initial Cell Selection in Dense Heterogeneous Network Using Mobile Speed ClassificationChun-Yen Hsu, Chia-Hung Wei, Feng-Ming Yang, Whai-En Chen. 893-897 [doi]
- Downlink Co-tier Interference Mitigation for Femtocell NetworksKuo-Chang Ting, Hwang-Cheng Wang, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang. 898-901 [doi]
- A Study on Effects of Different Access Modes on Database Performance for SIP ServerWhai-En Chen, Shih-Yuan Cheng, Yi Lun Ciou. 902-906 [doi]
- A Routing Framework in Software Defined Network EnvironmentZhaowen Lin, Can Zhang, Yan Ma, Jian Li. 907-911 [doi]
- Cloud Terminal Access and QoS Enhancement by Content Store and Service Load Classification in Named Data NetworkTin Yu Wu, Chun-Yu Hsieh. 912-915 [doi]
- User Posting Behavior Analysis and Modeling in MicroblogYun Liu, Weiguo Yuan. 916-919 [doi]
- Research on Topic Detection Strategy Based on Extension of Comments and HowNet LexemeYun Liu, Xiaoxian Li, Bing Zhao. 920-923 [doi]
- Mobile Payment Anomaly Detection Mechanism Based on Information EntropyZhen-Jiang Zhang, Xiaoni Wang, Lin Sun. 924-927 [doi]
- A New Method of Subway Tunnel Crack Image Compression Based on ROI and Motion EstimationXiaoyang Wu, Yun Liu, Dapeng Qi, Zhen-Jiang Zhang. 928-931 [doi]
- Analysis of Coexistence between the DTMB System and TD-LTE SystemLianfen Huang, Xuelian Yang, Zhiyuan Shi, Yuliang Tang, Xin Su, Jie Zeng. 932-937 [doi]
- PBMA: A Proxy Based Mobility Support Approach in Named Data NetworkingYing Rao, Deyun Gao, Hongbin Luo, Hongke Zhang, Shuai Gao. 938-941 [doi]
- A Star Search Algorithm for Civil UAV Path Planning with 3G CommunicationFan-Hsun Tseng, Tsung Ta Liang, Cho Hsuan Lee, Li-Der Chou, Han-Chieh Chao. 942-945 [doi]
- A Dynamic Video Streaming Quality Adaption Method for IP Multimedia SubsystemShih-Wen Hsu, Song Chun Lin, Yong Ming Jheng, Wei Kuan Shih, Han-Chieh Chao. 946-949 [doi]
- A Power Saving Scheme taking into Account Coverage and Connection Problem in WSNsShu Wei Pai, Hsin-Hung Cho, Han-Chieh Chao, Timothy K. Shih. 950-953 [doi]
- The Potential Cloud Application Model for Internet of Things - Case Study of Shopping MallsKai-Di Chang, Jiann-Liang Chen, Han-Chieh Chao, Ching Wei Liu. 954-957 [doi]
- Use of Ultrasonic Sensors to Enable Wheeled Mobile Robots to Avoid ObstaclesTer-Feng Wu, Pu-Sheng Tsai, Nien-Tsu Hu, Jen-Yang Chen. 958-961 [doi]
- Digital Tracker for a Class of Continuous Time-Delay Singular SystemsNien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen. 962-965 [doi]
- Adaptive Control Using the Fuzzy Basis Function with Robust DesignNien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen. 966-969 [doi]
- Modeling of Fuzzy Control Design for Nonlinear Systems Based on Takagi-Sugeno MethodPu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu, Jen-Yang Chen. 970-973 [doi]
- Adaptive TSK Fuzzy Control Design Using Scaling Gain Adaptation for Nonlinear SystemsNien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen. 974-977 [doi]
- Obstacle Avoidance System for Wheeled Mobile Robots by CMOS Image SensorsPu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu, Jen-Yang Chen. 978-981 [doi]