Abstract is missing.
- Correction to: Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering AlgorithmYun Wu, Mengke Wu, HaoJie Shu. 1 [doi]
- A Hybrid NSGA-II for Matching Biomedical OntologyXingsi Xue, Jie Chen, Junfeng Chen, Dongxu Chen. 3-10 [doi]
- Multi-attributes Graph Algorithm for Association Rules Mining Over Energy InternetLing Wang, Fu Tao Ma, Tie Hua Zhou, Xue Gao. 11-18 [doi]
- Real-Time Electricity Pricing Trend Forecasting Based on Multi-density Clustering and Sequence Pattern MiningTie Hua Zhou, Cong Hui Sun, Ling Wang 0011, Gongliang Hu. 19-26 [doi]
- TDT_CC: A Hot Topic Detection and Tracking Algorithm Based on Chain of CausesZhen Hong Liu, Gongliang Hu, Tie Hua Zhou, Ling Wang 0011. 27-34 [doi]
- A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield NetworksHsin-Lung Wu, Jui-Sheng Chang, Jen-Chun Chang. 35-44 [doi]
- A Method of Cancellation Interference in CCFD SystemZengyou Sun, Yujie Zhao. 45-51 [doi]
- Power Optimization Method of Magnetic Coupling Resonant Wireless Energy Transmission SystemJianpo Li, Yang Lu, Songjun Pan, Ziqi Dong, Baochun Mu, Fuxin Liu, Cong Zheng. 52-59 [doi]
- PSO-AFSA Global Maximum Power Point Tracking Algorithm with Adaptive Evolutionary Strategy for PV SystemJianpo Li, Pengwei Dong, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong. 60-67 [doi]
- The Design of RFID Localization System for Library BooksJianpo Li, Jun Wang, Fuxin Liu, Songjun Pan, Cong Zheng, Baochun Mu, Ziqi Dong. 68-74 [doi]
- The Design and Implementation of Automatic Detection and Control Equipment with Unattended Truck ScalesYun Wu, Xin Hu, Xiaodong Wang. 75-82 [doi]
- An Interactive Appliances' Intelligent Control Method Based on Time-Sharing Electricity PriceYun Wu, Qiang Wang, Jian Wang. 83-90 [doi]
- Modification Algorithm to Node Localization Error for Wireless Sensor NetworksJianpo Li, Na Li, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong. 91-98 [doi]
- A Real-Time Missing Data Recovery Method Using Recurrent Neural Network for Multiple TransmissionsBor-Shing Lin, Yu-Syuan Lin, I-Jung Lee, Bor-Shyh Lin. 99-107 [doi]
- The Extraction and Application of the Color Texture Feature Based on Quaternion GaborBo Meng, Xiaolin Wang, Xuejun Liu, Linlin Xia, Guannan Deng, Shengxi Jiao. 108-116 [doi]
- Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine LearningJiang Xin, Zhang Wen, Shaozhang Niu, Yiming Xue. 117-123 [doi]
- A Watermarking Method for Printed QR Code Based on Module ExpansionCai-Jie Weng, Jeng-Shyang Pan 0001, Shi-Jian Liu, Mei-Jin Wang. 124-133 [doi]
- Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering AlgorithmYun Wu, Mengke Wu, HaoJie Shu. 134-141 [doi]
- Construct Left Ventricular Hypertrophy Prediction Model Based on Random ForestJimmy Ming-Tai Wu, Meng-Hsiun Tsai, Sheng-Han Xiao, Tsu-Yang Wu. 142-150 [doi]
- The Bayesian Causal Inference in Multisensory Information Processing: A Narrative ReviewYang Xi, Ning Gao, Mengchao Zhang, Lin Liu, Qi Li. 151-161 [doi]
- The Neural Mechanism of Audiovisual Integration Modulated by Attention: A DCM StudyYang Xi, Mengchao Zhang, Ning Gao, Yue Li, Lin Liu, Qi Li. 162-170 [doi]
- On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy ExtractorChien-Ming Chen 0001, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu. 171-177 [doi]
- Security Analysis of a Public Key Authenticated Encryption with Keyword Search SchemeTsu-Yang Wu, Chien-Ming Chen 0001, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan 0001. 178-183 [doi]
- The Research About Topic Extraction Method Based on the DTS-ILDA ModelXiaoli Guo, Li Feng, Yuhan Sun, Ping Guo. 184-191 [doi]
- The Study of Power Server Operations Information Visualization Key TechnologiesXiaoli Guo, Ping Guo, Li Feng, Wei Yue. 192-199 [doi]
- Designing a Wearable Companion of Smartphone for HealthcareWen Qi. 200-206 [doi]
- Research and Implementation of Fuzzy Control Method of UAV Formation with Ad Hoc NetworkZhen-Hao Zhang, Wei Sun, Wei Lu, Lei Bian. 207-213 [doi]
- A Novel Tamper Detection and Image Recovery Technique for Color Image DemosaickingYu-Chen Hu, Pei-Jung Wu, Chia-Mei Chen, Yi-Hung Liu. 217-224 [doi]
- Improving Latency and Reliability for Vehicle System Under Fog Computing NetworksMao-Lun Chiang, Yu-An Lin, Hui-Ching Hsieh, Weng-Chung Tsai. 225-232 [doi]
- Nominate Connected Dominating Set Algorithm in Mobile Ad Hoc NetworkMao-Lun Chiang, Ze-Yu Chen, Hui-Ching Hsieh, Tsui-Ping Chang. 233-240 [doi]
- The Keywords of Affecting Performance for Live StreamingLong-Sheng Chen, Yi-Ting Pan. 241-248 [doi]
- Mobile Coupons Using Blockchain TechnologySue-Chen Hsueh, Jia-He Zeng. 249-255 [doi]
- Dual Image Reversible Data Hiding Based on Modified LSB Matching MethodHsien-Wen Tseng, Hui-Xin Lu, Hui-Shih Leng. 256-263 [doi]
- A Survey of Semi-fragile Watermarking AuthenticationChin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu. 264-271 [doi]
- A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value DifferencingChin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang. 272-279 [doi]
- High-Capacity Reversible Data Hiding Based on Star-Shaped PVO MethodChin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao. 280-288 [doi]
- New Anatomy of Consensus in a Multiple Damage Communication VANETShu-Ching Wang, Kuo-Qin Yan, Wei-Shu Xiong. 289-296 [doi]
- Customer Management and Marketing Strategy Development in the Internet of ThingsKuo-Qin Yan, Shu-Ching Wang, Wei-Shu Xiong, Ke-Yin Lu, Yun-Ju Cha. 297-304 [doi]
- A State Codebook Generation Algorithm of Side Match Vector QuantizationYang Wang, Zhibin Pan. 305-312 [doi]
- Distortion Function for Steganography in Texture Synthesized ImagesLina Shi, Zichi Wang, Zhenxing Qian, Xinpeng Zhang 0001. 313-320 [doi]
- Calculating the Truck's Box Volume with a Single Image Under the Circle Projection and Vanishing Points ConstraintWei Sun, Wei Lu, Chun-yu Zhao, Bao-Long Guo, Da-jian Li. 321-329 [doi]
- Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic PermutationsChing-Chun Chang, Chang-Tsun Li. 330-339 [doi]