Abstract is missing.
- Design of Triple-Band Planar Antenna for LTE/WLAN ApplicationsYuh-Yih Lu, Shih-Chieh Dai, Hsiang-Cheh Huang. 1-4 [doi]
- Ownership Protection for Progressive Transmission of Color Images with Reversible Data HidingHsiang-Cheh Huang, Jiun Lin, Yuh-Yih Lu. 5-8 [doi]
- An Auxiliary Teaching Management System by Applying Six Sigma MethodLiou Chu. 9-12 [doi]
- Fidelity Enhancement of Reversible Data Hiding for Images with Prediction-Based ConceptsHsiang-Cheh Huang, Chuan-Chang Lin, Yueh-Hong Chen. 13-16 [doi]
- Design of an Adapter Service for Web Application TransitionKun Xie, Po-Ju Li, Wei-Kai Chiu, Po-Yen Liu, Yao-Wei Chuang, Feng-Cheng Chang, Hsiang-Cheh Huang. 17-20 [doi]
- Visual Cryptography for Compressed Sensing of Images with Transmission over Multiple ChannelsHsiang-Cheh Huang, Feng-Cheng Chang. 21-24 [doi]
- Progressive Watermarking for Images with Regions of InterestYueh-Hong Chen, Hsiang-Cheh Huang. 25-28 [doi]
- High-Performance Digital Watermarking with L2-Norm Centroid for Colour ImagesChing-Yu Yang, Wen-Fong Wang. 29-32 [doi]
- Study on the Relationship between Stair's Slope and Upward/Downward Gaits in StairsWen-Fong Wang, Ching-Yu Yang, Hao-Xiang Wang. 33-36 [doi]
- An Imperceptible Information Hiding in Encoded Bits of Speech SignalRong-San Lin. 37-40 [doi]
- The Development of Emergency Communication APP Using Ad Hoc Network with IPv6Wen-Yen Lin, Kuang-Po Hsueh, Pai-Shan Pa. 41-44 [doi]
- Efficient Software Method for Decoding of the (71, 36, 11) Quadratic Residue CodeChing-Fu Huang, Yan-Haw Chen. 45-48 [doi]
- Using Back-Propagation Neural Network for Automatic Wheezing DetectionBor-Shing Lin, Huey-Dong Wu, Sao-Jie Chen, Gene Eu Jan, Bor-Shyh Lin. 49-52 [doi]
- Optical Technique for Estimating Cerebral Perfusion PressureChang-Ting Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin, Che-Chuan Wang, Jinn-Rung Kuo. 57-59 [doi]
- Vehicle Detection in Nighttime Environment by Locating Road Lane and TaillightsTsong-Yi Chen, Chao-Ho Chen, Guan-Ming Luo, Wu-Chih Hu, Johng-Chern Chern. 60-63 [doi]
- A Virtual Backbone Construction Heuristic for Maximizing the Lifetime of Dual-Radio Wireless Sensor NetworksBing-Hong Liu, Van Trung Pham, Ngoc-Tu Nguyen. 64-67 [doi]
- A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level EstimationBowen Xue, Xiaolong Li, Zongming Guo. 68-71 [doi]
- Data Hiding Based on Chinese Text Automatic ProofreadWenfa Qi, Zongming Guo. 72-75 [doi]
- Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base NotationalXin Liao, Liping Ding. 76-80 [doi]
- Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast EnhancementYang Yang, Weiming Zhang, Nenghai Yu. 81-84 [doi]
- Multiple Description Coding for Encrypted ImagesYuan Zhang, Xinpeng Zhang, Chuan Qin, Jiang Yu. 85-88 [doi]
- A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering TargetsJianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang. 89-92 [doi]
- Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma CorrectionJianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang. 93-96 [doi]
- Fragile Watermarking-Based Authentication Scheme for Demosaicked ImagesChia-Chen Lin, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan. 97-100 [doi]
- Fingertip Detection Using Two-Stage Random Decision ForestMeng-Hsin Liu, Tai-Hung Lin, Chih-Wen Su. 101-104 [doi]
- A Multiresolution Approach to Recovering Colors and Details of Clipped Image RegionsYi-Hung Lu, Yu-Hsi Chen, Hsueh-Yi Sean Lin. 105-108 [doi]
- Combined Prediction-Based Reversible Data Embedding Methods for High Image QualityTzu-Chuen Lu, Ying-Hsuan Huang. 109-112 [doi]
- Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic MatrixChin-Feng Lee, Si-Ting Chen, Jau-Ji Shen. 113-116 [doi]
- An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification OperationChin-Feng Lee, Yu-Ju Tseng. 117-120 [doi]
- Equalized CR-dropping for Image CompressionChun-Hsiu Yeh, Jau-Ji Shen, Jinn-ke Jan. 121-124 [doi]
- A Histogram Shifting-Based Reversible Data Hiding Scheme Using Multi-pattern StrategyChiung-Chen Tseng, Yu-Hsuan Chiu, Yung-Chen Chou. 125-128 [doi]
- Life Events Segmentation Based on Lifelog Recorded by Wearable DeviceChieh-Ling Huang, Yu-Hsiang Huang, Jwu-Jenq Chen. 129-132 [doi]
- Finding All Competitive Products Using the Dominant Relationship AnalysisYu-Chi Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang. 133-137 [doi]
- Channel Estimation for Inverse Power Control in Wireless Communication NetworksChang-Yi Yang. 138-141 [doi]
- Properties of an Emergency Broadcasting System Based on Audio Data HidingTetsuya Kojima, Akihiro Oizumi, Udaya Parampalli. 142-145 [doi]
- Tempo Modification of Mixed Music Signal by Nonlinear Time Scaling and Sinusoidal ModelingTsukasa Nishino, Takashi Nose, Akinori Ito. 146-149 [doi]
- Advertising System Based on Cloud Computing and Audio WatermarkingChengxiang Yin, Jin Hu, Xuejun Zhang, Xiang Xie. 150-155 [doi]
- An Audio Watermarking Method Using Tones of Diatonic ChordHarumi Murata, Akio Ogihara. 156-159 [doi]
- An Automatic Watermarking in CELP Speech Codec Based on Formant TuningErick Christian Garcia Alvarez, Shengbei Wang, Masashi Unoki. 160-163 [doi]
- Audible Secret Keying for Time-Spread-Echo Based Audio WatermarkingTatsuya Matsumoto, Kotaro Sonoda. 164-167 [doi]
- Detecting Duplicated Frames by Mapping Frames to 3D SkeletonsLiyang Yu, Qi Han, Xiamu Niu. 168-171 [doi]
- A Novel (2, 2) Visual Secret Sharing without the Pixel ExpansionXin Liu, Shen Wang, Weizhe Zhang, Xiamu Niu. 172-175 [doi]
- Formalized Description and Analysis of FTP on Petri NetBin Cai. 176-179 [doi]
- Modeling and Analysis of Intelligence Assurance System Based on the Complex Networks TheoryShu-Jian Han, Li Zhu, Zheng Li. 180-184 [doi]
- Tamper Detection Method for Clipped Double JPEG Compression ImageZhenzhen Gong, Shaozhang Niu, Hongli Han. 185-188 [doi]
- An Efficient Lattice-Based Proxy Signature Scheme without TrapdoorChunli Yang, Peigang Qiu, Shihui Zheng, Licheng Wang. 189-194 [doi]
- Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model"Feng Wang, Li Xu, Jeng-Shyang Pan. 195-198 [doi]
- Automatic NIDS Rule Generating System for Detecting HTTP-like Malware CommunicationChia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung, Che-Wei Lin. 199-202 [doi]
- Security Analysis of a Time-Bound Hierarchical Key Assignment SchemeJeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang. 203-206 [doi]
- A Design and Implementation of Multi-source Wi-Fi Display Model on Android DevicesYuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun. 207-210 [doi]
- Inspection Risk and Delay for Screening Cargo Containers at Security CheckpointsChia-Hung Wang, Mu-En Wu, Chien-Ming Chen. 211-214 [doi]
- A New Reduced-Latency SC Decoder for Polar CodesDan Le, Qiong Li, Lu Shan, Xiamu Niu. 215-218 [doi]
- Improving Weights for Graph-Based Image Fragment ReassemblyXianyan Wu, Qi Han, Xiamu Niu. 219-222 [doi]
- An Accountable Identity-Based Billing Protocol for Cloud EnvironmentNai-Wei Lo, Cheng-Tsung Liu. 223-226 [doi]
- A Swarm-Based Sanitization Approach for Hiding Confidential ItemsetsJerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Jeng-Shyang Pan. 227-230 [doi]
- A KL Divergence Function for Randomized Secret SharesJeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen, Chwei-Shyong Tsai. 231-234 [doi]
- Detection of Seam Carving and Contrast Enhancement Operation ChainJianwei Li, Yao Zhao, Rongrong Ni. 235-238 [doi]
- Small Moving Object Tracking in Dynamic VideoWei Sun, Dajian Li, Wei Jia, Penghui Li, Chunyu Zhao, Xumeng Chen. 239-242 [doi]
- Exploring Research of Algorithm in Signal Coning Error CompensationXin Wang. 243-246 [doi]
- Research on Imaging Detection Based on Digital Reflection DeviceXin Wang. 247-250 [doi]
- A FPGA Power Estimation Method Based on an Improved BP Neural NetworkGuochang Zhou, Baolong Guo, Xiang Gao, Jing Ma, HongJie He, Yunyi Yan. 251-254 [doi]
- Digital Image Stabilization for Cameras on Moving PlatformJuanjuan Zhu, Cheng Li, Jinli Xu. 255-258 [doi]
- Network Anomaly Detection with CompressionJun Ma, Jianguo Yao, Yunyi Yan. 259-262 [doi]
- An Efficient Weighting Method for Nakagami-m Envelope Distribution SimulationLei Shi, Xiaoping Li, Yanming Liu, Lei Zhao. 263-265 [doi]
- A Method to Search Fallible Branch in FPGA ProgramsHaixu Li, Yunyi Yan, Baolong Guo. 266-269 [doi]
- Image Retrieval by Salient Region DetectionFanjie Meng, Miao Song 0006, Baolong Guo. 270-273 [doi]
- Design for PLL of Maintenance System in SatellitesMiao Miao, Wei Zhou, Zhiqi Li, Xueping Zhang, Zongqiang Xuan. 274-277 [doi]
- Extended Discriminant Nearest Feature Line Analysis for Feature ExtractionYunxia Liu, Tie Cai, Guowei Huang. 278-281 [doi]
- Two-Dimensional Extended Feature Line Space for Feature ExtractionJiangang Chen, Xuefeng Bai, Guowei Huang. 282-285 [doi]
- Bilinear Feature Line Analysis for Face RecognitionLijun Yan, Jianhui Zhang, Jeng-Shyang Pan, Lin-Lin Tang. 286-289 [doi]
- Fuzzy Extended Feature Line Classifier for Image ClassificationJeng-Shyang Pan, Shu-Chuan Chu, Lijun Yan, Lin-Lin Tang. 290-293 [doi]
- A Method of the Detection of Frequency-Hopping Signal Based on Channelized Receiver in the Complicated Electromagnetic EnvironmentYi-Jia Zhang, Rui-Ying Liu, Hua-jun Song. 294-297 [doi]
- Application of Dichotomy to Network Partition Based on Sub Network Exchange GainYi-Jia Zhang, Zhong-Jian Kang, Zhen Wu, Zhe-Ming Lu. 298-301 [doi]
- An Automatic Geometric Features Extracting Approach for Facial Expression Recognition Based on Corner DetectionGuandong Gao, Kebin Jia, Bin Jiang. 302-305 [doi]
- Deep Feature Learning with Discrimination Mechanism for Brain Tumor Segmentation and DiagnosisLiya Zhao, Kebin Jia. 306-309 [doi]
- A Distributed Anomaly Detection Method of Operation Energy Consumption Using Smart Meter DataYe Yuan, Kebin Jia. 310-313 [doi]
- Design and Implementation of Remote Facial Expression Recognition Surveillance System Based on PCA and KNN AlgorithmsQite Wang, Kebin Jia, Pengyu Liu. 314-317 [doi]
- Video Annotation Based on Video Structure Information and Key Frames Semantic DescriptionZhonghua Sun, Miaojie Sang, Kebin Jia. 318-321 [doi]
- Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment EnvironmentYong Peng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang. 322-326 [doi]
- Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text MiningXianghui Zhao, Yong Peng, Zan Zhai, Yi Jin, Yuangang Yao. 327-332 [doi]
- A New Static Detection Method of Malicious Document Based on Wavelet Package AnalysisBinjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang. 333-336 [doi]
- Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined NetworkHaihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li. 337-340 [doi]
- Cyber Security Risk Assessment for Industrial Automation PlatformYiling Zheng, Song Zheng. 341-344 [doi]
- An Improved String Matching Algorithm for HTTP Data ReductionLei Zhang, Yong Peng, Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen. 345-348 [doi]
- Optimizing Ontology Alignments through NSGA-II Using an Aggregation Strategy and a Mapping Extraction ApproachXingsi Xue. 349-352 [doi]
- A Method of Latent Semantic Information Mining for Trajectory DataLyu-Chao Liao, Xin-hua Jiang, Fu-Min Zou, Pei-wei Tsai, Yan-Ling Deng. 353 [doi]
- A Self Adaptive Incremental Learning Fuzzy Neural Network Based on the Influence of a Fuzzy RuleHu Rong, Xia Ye, Xu Xiang. 354-359 [doi]
- Using Consumer Confidence Index in the Foreign Exchange Rate ForecastingPei-wei Tsai, Chia-Han Liu, Lyu-Chao Liao, Jui-Fang Chang. 360-363 [doi]
- A Novel Sleep Scheduling Algorithm for Wireless Sensor NetworksJing Zhang, Li Xu, Hong Yang. 364-367 [doi]
- Virtual Auditory Display on a Smartphone for High-Resolution Acoustic Space by Remote RenderingYukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li. 368-371 [doi]
- A Compact Representation of the Head-Related Transfer Function Inspired by the Wavelet Transform on the SphereJorge Trevino, Shichao Hu, Cesar Salvador, Shuichi Sakamoto, Junfeng Li, Yôiti Suzuki. 372-375 [doi]
- Prediction Method for Compression of Spherical Microphone Array Signals Using Geometric InformationShuichi Sakamoto, Arif Wicaksono, Jorge Trevino, Cesar Salvador, Yôiti Suzuki. 376-379 [doi]
- Equalization of Sound Reproduction System Based on the Human Perception CharacteristicsQianqian Fang, Huaxing Xu, Risheng Xia, Junfeng Li, Yonghong Yan 0002. 380-383 [doi]
- Feasibility of Estimating Direction of Arrival Based on Monaural Modulation SpectrumDaisuke Morikawa, Masaru Ando, Masashi Unoki. 384-387 [doi]
- Objective Measurement of Spatial Audio Coding Quality Based on MNLR Mapping ModelJing Wang, Xin Liu, Zedong Wang, Zhikun Wu, Xiang Xie, Zesong Fei, Jingming Kuang. 388-392 [doi]
- Weighted Extreme Learning Machine for Digital Watermarking in DWT DomainRam Pal Singh, Neelam Dabas, Nagendra, Vikash Chaudhary. 393-396 [doi]
- Feature Reduction of Multi-scale LBP for Texture ClassificationRan Hu, Wenfa Qi, Zongming Guo. 397-400 [doi]
- Passive Detection of Tampered JPEG Image Based on First Digit StatisticsQing Wang, Rong Zhang, Ke-qing. 401-404 [doi]
- Iterative Weighted DCT-SVD for Compressive ImagingZhenglin Wang, Ivan Lee. 405-408 [doi]
- Compressing Encrypted Images Using the Integer Lifting WaveletChuntao Wang, Jiangqun Ni. 409-412 [doi]
- Image Scrambling Scheme Based on Bit-Level Permutation and 2-D Cellular AutomataPing Ping, Feng Xu, Md Shaiful Islam Babu, Xin Lv, Yingchi Mao. 413-416 [doi]
- On Preserving Private Geosocial Networks against Practical AttacksYuechuan Li, Yidong Li. 417-420 [doi]
- Using Deep Belief Network to Capture Temporal Information for Audio Event ClassificationFeng Guo, Deshun Yang, Xiaoou Chen. 421-424 [doi]
- An Information Hiding Method Based on EMF Files CarrierYuxin Liu, Wenfa Qi, Zongming Guo. 425-428 [doi]
- Steganalyzer Performances in Operational ContextsYousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux. 429-432 [doi]
- Conversion of Speaker's Face Image Using PCA and Animation Unit for Video ChattingYuki Saito, Takashi Nose, Takahiro Shinozaki, Akinori Ito. 433-436 [doi]
- Amphibious Target Tracking with Single PTZ CameraCheng-Chang Lien, Wang Jian Xiang. 437-440 [doi]
- Stitching of Video Sequences for Weed MappingHuajian Liu, Sang-Heon Lee. 441-444 [doi]
- Development of a Visual Reality Headset and Its Applications in 3D Interactive Bike Race GamesZhen Wu, Guohua Feng, Hao Luo, Xiaofeng Wu. 445-448 [doi]
- The Noise Reduction of Speech Signals Based on RBFNJui-Chuan Cheng, Te-Jen Su, Tsung-Ying Li, Chia-Hua Wu. 449-452 [doi]