Abstract is missing.
- An Improved High-Capacity ECG Steganography with Smart Offset CoefficientsChing-Yu Yang, Wen-Fong Wang. 3-10 [doi]
- Preview-Versioned Essential Secret Image SharingShang-Kuan Chen, Rei-Heng Cheng. 11-18 [doi]
- Visual Cryptography with QR-Code TransparenciesShang-Kuan Chen, Yen-Wu Ti. 19-26 [doi]
- Solving the Multiple Charging Vehicles Scheduling Problem for Wireless Rechargeable Sensor Networks Using Cuckoo Search ApproachRei-Heng Cheng, Shang-Kuan Chen. 27-35 [doi]
- An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus FunctionYu Yang, Ru Zhang, Jianyi Liu, Yuhan Wang, Fuhong Huang. 36-43 [doi]
- Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security LogJianyi Liu, Keyi Li, Yang Li, Ru Zhang, Xi Duan. 44-52 [doi]
- An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting and WatermarkingShinya Takahashi, Kazuhiro Kondo. 55-62 [doi]
- Digital Audio Watermarking Method Based on Singular Spectrum Analysis with Automatic Parameter Estimation Using a Convolutional Neural NetworkKasorn Galajit, Jessada Karnjana, Pakinee Aimmanee, Masashi Unoki. 63-73 [doi]
- Muting Machine Speech Using Audio WatermarkingAkinori Ito. 74-81 [doi]
- Leveraging a Small Corpus by Different Frame Shifts for Training of a Speech RecognizerAkinori Ito. 82-89 [doi]
- Evaluation of English Speech Recognition for Japanese Learners Using DNN-Based Acoustic ModelsJiang Fu, Yuya Chiba, Takashi Nose, Akinori Ito. 93-100 [doi]
- A Study on a Spoken Dialogue System with Cooperative Emotional Speech Synthesis Using Acoustic and Linguistic InformationMai Yamanaka, Yuya Chiba, Takashi Nose, Akinori Ito. 101-108 [doi]
- Comparison of Speech Recognition Performance Between Kaldi and Google Cloud Speech APITakashi Kimura, Takashi Nose, Shinji Hirooka, Yuya Chiba, Akinori Ito. 109-115 [doi]
- Melody Completion Based on Convolutional Neural Networks and Generative Adversarial LearningKosuke Nakamura, Takashi Nose, Yuya Chiba, Akinori Ito. 116-123 [doi]
- Segmental Pitch Control Using Speech Input Based on Differential Contexts and Features for Customizable Neural Speech SynthesisShinya Hanabusa, Takashi Nose, Akinori Ito. 124-131 [doi]
- Two-Stage Sequence-to-Sequence Neural Voice Conversion with Low-to-High Definition Spectrogram MappingSou Miyamoto, Takashi Nose, Kazuyuki Hiroshiba, Yuri Odagiri, Akinori Ito. 132-139 [doi]
- Improvement of Accent Sandhi Rules Based on Japanese Accent DictionariesHiroto Aoyama, Takashi Nose, Yuya Chiba, Akinori Ito. 140-148 [doi]
- Data Collection and Analysis for Automatically Generating Record of Human Behaviors by Environmental Sound RecognitionTakahiro Furuya, Yuya Chiba, Takashi Nose, Akinori Ito. 149-156 [doi]
- DNN-Based Talking Movie Generation with Face Direction ConsiderationToru Ishikawa, Takashi Nose, Akinori Ito. 157-164 [doi]
- A P2P Multimedia Service System Based on Mesh-ChordsZhiming Cai, Xuehong Huang, Deyao Lin, Jian Chen. 167-174 [doi]
- Denoising of ECG Signal with Power Line and EMG Interference Based on Ensemble Empirical Mode DecompositionShing-hong Liu, Li-Te Hsu, Cheng-Hsiung Hsieh, Yung-Fa Huang. 175-182 [doi]
- Using the Photoplethysmography Technique to Improve the Accuracy of LVET Measurement in the ICG TechniqueShing-hong Liu, Zheng-Yu Zhu, Shao-Heng Lai, Tai-Shen Huang. 183-190 [doi]
- Network Anomaly Detection Based on Artificial IntelligenceChia-Mei Chen, Wen-Ling Lo, Gu Hsin Lai, Yu-Chen Hu. 191-195 [doi]
- Traffic Flow Correlation Analysis of K Intersections Based on Deep LearningHung-Chi Chu, Chi-Kun Wang, Yi-Xiang Liao. 196-203 [doi]
- Detecting Attention and Meditation EEG Utilized Deep LearningChung-Yen Liao, Rung Ching Chen, Qiao-En Liu. 204-211 [doi]
- Improving the Implementation of Sensor Nodes for Illegal Logging DetectionJen-Ting Chen, Chuan-Bi Lin, Jiun-jian Liaw, Yu-Yan Chen. 212-219 [doi]
- Forecasting for the Total Electricity Consumption of Taiwan by Fuzzy Time Series ModelJing-Rong Chang, Zhong-qi Liu, Pei-Yu Yu. 220-225 [doi]
- Performance Analysis of Grouping Strategy in Relay-Based Cooperative NetworksJheng-Sian Li, Jyh-Horng Wen. 226-232 [doi]
- The Development of Display Interface for Automatic Identification System and Digital Selective Calling SystemChien-Erh Weng, Zhu-Yun Zheng, Lie Yang. 233-237 [doi]
- The Properties of Order and Failure Estimation on Redundancy SystemLin Xu, Chao-Fan Xie, Lu-Xiong Xu, Fuquan Zhang 0001. 241-248 [doi]
- Hepatic Texture Synthesis Method Based on the Accelerated CUDALin Xu, Na Wang, Chao-Fan Xie, Lu-Xiong Xu, Fuquan Zhang. 249-256 [doi]
- A Study on CNC Machine Training Based on Virtual Reality TechnologyTzu-Chuen Lu, Rong-Chung Chen, Guang-En Hsuen, Shu-Wen Huang. 257-265 [doi]
- Intelligent Infant Monitoring System Involving a Wi-Fi Wireless Sensor NetworkChi-Chang Lu, Chung-Hsien Wu, Hui-Kai Su. 269-276 [doi]
- Long Lifetime Data Aggregation Using Geographic Division in Wireless Sensor NetworksChia-Hsin Cheng, Hui-Kai Su, Feng-Cheng Wu. 277-284 [doi]
- Heart Rate Detection Based on Facial Feature Points TrackingChuan-Yu Chang, Hsiang-Chi Liu. 287-293 [doi]
- 3D Modeling for Upper of Shoe Based on Bilateral TriangulationHsien-Huang Wu, Ying-Dong Lian, Ya-Yung Huang. 294-301 [doi]
- A New Application of Hyperspectral Techniques in Drug ClassificationShih-Yu Chen, Yen-Chung Chen, Chou-Tien Lien. 302-307 [doi]
- Evaluation of DoS Attacks on Vehicle CAN Bus SystemShi-Huang Chen, Chun-Hung Richard Lin. 308-314 [doi]
- Deep Learning-Based Identification of Steel ProductsLi-Wei Kang, You-Ting Chen, Wei-Chen Jhong, Chao-Yung Hsu. 315-323 [doi]
- Reinforcement Learning-Based Two-Wheel Robot ControlChing-Lung Chang, Kang-Hao Liou. 324-331 [doi]
- A Localization Approach Based on Fixed 3D Objects for Autonomous RobotsChien-Chou Lin, Liang-Zheng Huang, Hsin-Te Chiang. 332-336 [doi]
- Clockwise and Counter-Clockwise Torsion in Different Operational Angles on Transverse PlaneDengchuan Cai, Jhongpei Wu, Chuan-Yu Chang. 337-344 [doi]
- Micro Physiological Vibration Detection for Human HeartbeatsWen-Fong Wang, Ying-Peng Huang, Chuan-Yu Chang, Ching-Yu Yang. 345-353 [doi]
- Design and Implementation of a Host-Based Intrusion Detection System for Linux-Based Web ServerCheng-Chung Kuo, Shu-Han Yao, Chia-Ling Hou, Chu-Sing Yang. 354-361 [doi]