Abstract is missing.
- Extraction of EEG Components Based on Time - Frequency Blind Source SeparationXueying Zhang, Wei-Rong Wang, Cheng-Ye Shen, Ying Sun, Li-Xia Huang. 3-10 [doi]
- An Algorithm for Asymmetric Clipping Detection Based on Parameter OptimizationJiwei Zhang, Shaozhang Niu, Yueying Li, Yuhan Liu. 11-18 [doi]
- Automatic Facial Age Estimate Based on Convolution Neural NetworkJiancheng Zou, Xuan Yang, Honggen Zhang, Xiaoguang Chen. 19-26 [doi]
- The Application of Eye Tracking in EducationYuyang Sun, Qingzhong Li, Honggen Zhang, Jiancheng Zou. 27-33 [doi]
- Adaptive Multiple Description Depth Image Coding Based on Wavelet Sub-band CoefficientsJingyuan Ma, Huihui Bai, Meiqin Liu, Dongxia Chang, Rongrong Ni, Yao Zhao 0001. 34-41 [doi]
- Adaptive Histogram Shifting Based Reversible Data HidingYonggwon Ri, Jing Dong 0003, Wei Wang, Tieniu Tan. 42-50 [doi]
- Design and Implementation of Network Video Encryption System Based on STM32 and AES AlgorithmXingyu Tian, Chunlei Fan, Jia Liu, Qun Ding. 51-58 [doi]
- Fast Intra Mode Decision Algorithm for 3D-HEVC TranscodingXiujun Feng, Pengyu Liu, Kebin Jia. 59-66 [doi]
- Implementation of a Drone-Based Video StreamerZhifei Fan, Baolong Guo, Jie Hou. 67-74 [doi]
- Dialog-Based Interactive Movie Recommendation: Comparison of Dialog StrategiesHayato Mori, Yuya Chiba, Takashi Nose, Akinori Ito. 77-83 [doi]
- Response Selection of Interview-Based Dialog System Using User Focus and Semantic OrientationShunsuke Tada, Yuya Chiba, Takashi Nose, Akinori Ito. 84-90 [doi]
- Development and Evaluation of Julius-Compatible Interface for Kaldi ASRYusuke Yamada, Takashi Nose, Yuya Chiba, Akinori Ito, Takahiro Shinozaki. 91-96 [doi]
- Voice Conversion from Arbitrary Speakers Based on Deep Neural Networks with Adversarial LearningSou Miyamoto, Takashi Nose, Suzunosuke Ito, Harunori Koike, Yuya Chiba, Akinori Ito, Takahiro Shinozaki. 97-103 [doi]
- Evaluation of Nonlinear Tempo Modification Methods Based on Sinusoidal ModelingKosuke Nakamura, Yuya Chiba, Takashi Nose, Akinori Ito. 104-111 [doi]
- A Study on 2D Photo-Realistic Facial Animation Generation Using 3D Facial Feature Points and Deep Neural NetworksKazuki Sato, Takashi Nose, Akira Ito, Yuya Chiba, Akinori Ito, Takahiro Shinozaki. 112-118 [doi]
- Towards an Interrogation Speech Manipulation Detection Method Using Speech FingerprintingShinnya Takahashi, Kazuhiro Kondo. 121-129 [doi]
- Detection of Singing Mistakes from Singing VoiceIsao Miyagawa, Yuya Chiba, Takashi Nose, Akinori Ito. 130-136 [doi]
- A Study of Audio Watermarking Method Using Non-negative Matrix Factorization for a Duet of Different InstrumentsHarumi Murata, Akio Ogihara. 137-144 [doi]
- A Wind Noise Detection Algorithm for Monitoring Infrasound Using Smartphone as a Sensor DeviceRyouichi Nishimura, Shuichi Sakamoto, Yôiti Suzuki. 145-152 [doi]
- Study on Speech Representation Based on Spikegram for Speech FingerprintsDung Kim Tran, Masashi Unoki. 153-160 [doi]
- Embedding Multiple Audio Data Using Information Misreading TechniqueNaofumi Aoki. 161-168 [doi]
- A Steganography Algorithm Based on MP3 Linbits Bit of Huffman CodewordRu Zhang, Jianyi Liu, Feng Zhu. 169-176 [doi]
- An AFK-SVD Sparse Representation Approach for Speech Signal ProcessingFenglian Li, Xueying Zhang, Hongle Zhang, Yu-Chu Tian. 177-184 [doi]
- An Automatic Detection Method for Morse Signal Based on Machine LearningZhihao Wei, Kebin Jia, Zhonghua Sun. 185-191 [doi]
- Capacity Reduction of Distribution Transformer by Harmonic EffectYen-Ming Tseng, Li-Shan Chen, Jeng-Shyang Pan 0001, Hsi-Shan Huang, Lee Ku. 195-204 [doi]
- Base on Transmission Line Model to Investigate the Power Margins of Main TransformersYen-Ming Tseng, Rong-Ching Wu, Jeng-Shyang Pan 0001, En-Chih Chang, Peijiang Li. 205-214 [doi]
- Development of Optical Fiber Stress Sensor Based on OTDRHsi-Shan Huang, Jeng-Shyang Pan 0001, Yen-Ming Tseng, Weidong Fang, Ruey-Ming Shih. 215-222 [doi]
- Application of AlN-Coated Heat Sink to Improve the Thermal Management of Light-Emitting Diode AssemblesGuo-Fu Lian, Ming-Der Jean, Tzu-Hsuan Chien. 223-227 [doi]
- A Fuzzy Neural Network on the Internet Addiction for University Students in ChinaChien-Hua Wang, Jich-Yan Tsai, I-Hsiang Lin, Chin-Tzong Pang. 228-235 [doi]
- Optimal Economic Dispatch of Fuel Cost Based on Intelligent Monkey King Evolutionary AlgorithmJing Tang, Jeng-Shyang Pan 0001, Yen-Ming Tseng, Pei-wei Tsai, Zhenyu Meng. 236-243 [doi]
- Optimum Design and Control Research of Direct Drive Hub MotorZhong-Shu Liu. 244-254 [doi]
- Building of a Practical Monitoring System for the Small Wind TurbineRong-Ching Wu, Yen-Ming Tseng, En-Chih Chang, Chih-Yang Hsiao. 255-263 [doi]
- A Survey of Secret Sharing Schemes Based on Latin SquaresRaylin Tso, Ying Miao. 267-272 [doi]
- A NFC-Based Authentication Scheme for Personalized IPTV ServicesKuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang. 273-281 [doi]
- On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone ApplicationsShi-Cho Cha, Wei-Ching Peng, Zijia Huang, Tzu-Yang Hsu, Jyun-Fu Chen, Tsung-Ying Tsai. 282-289 [doi]
- Accelerated vBNN-IBS Authentication Scheme for WSNDanyang Qin, Yan Zhang, Jingya Ma, Songxiang Yang, Erfu Wang. 290-297 [doi]
- A Pre-assigned Key Management Scheme for Heterogeneous Wireless Sensor NetworksDanyang Qin, Jingya Ma, Yan Zhang, Songxiang Yang, Zhifang Wang. 298-305 [doi]
- A Protocol Vulnerability Analysis Method Based on Logical Attack GraphChunrui Zhang, Shen Wang, Dechen Zhan. 309-317 [doi]
- A Preamble Mining Algorithm Oriented to Binary Protocol Using Random ProbesTingyue Yu, Shen Wang, Xiangzhan Yu. 318-326 [doi]
- Particle Swarm Optimization-Based Time Series Data PredictionXiuli Ning, Yingcheng Xu, Ying Li, Ya Li. 327-334 [doi]
- Time Series Data Analysis with Particle Filter-Based Relevance Vectors Machine LearningXiuli Ning, Yingcheng Xu, Ying Li, Ya Li. 335-342 [doi]
- GUI of GMS Simulation Tool Using Fuzzy MethodsYeonchan Lee, Jaeseok Choi, Myeunghoon Jung, Junzo Watada. 343-351 [doi]
- Discharge Summaries ClassifierShusaku Tsumoto, Tomohiro Kimura, Haruko Iwata, Shoji Hirano. 352-360 [doi]
- Design and Implementation of Pseudo-Random Sequence Generator Based on Logistic Chaotic System and m-Sequence Using FPGAKai-Feng, Qun Ding. 361-369 [doi]
- Cryptanalysis of a Random Number Generator Based on a Chaotic CircuitSalih Ergün. 370-377 [doi]
- Training Method for a Feed Forward Neural Network Based on Meta-heuristicsHaydee Melo, Huiming Zhang, Pandian Vasant, Junzo Watada. 378-385 [doi]
- Hamming Code Protection Method of FPGA-Based Space SystemDan Wang, Baolong Guo, Yunyi Yan, Haibin Xu. 386-392 [doi]
- Optimization of AES and RSA Algorithm and Its Mixed Encryption SystemJia Liu, Chunlei Fan, Xingyu Tian, Qun Ding. 393-403 [doi]
- Fast Coding Unit Depth Decision for HEVC Intra CodingYueying Wu, Pengyu Liu, Zeqi Feng, Kebin Jia. 404-413 [doi]
- A New Approach of Shape Recognition with Affine Invariance Based on HSCYan Zheng, Baolong Guo, Yunyi Yan. 414-419 [doi]