default search action
14th IIH-MSP 2018: Sendai, Japan
- Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, Lakhmi C. Jain:
Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 1. Smart Innovation, Systems and Technologies 109, Springer 2019, ISBN 978-3-030-03744-4 - Yun Wu, Mengke Wu, HaoJie Shu:
Correction to: Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering Algorithm. 1
Emerging Techniques and Its Applications in Computer Science
- Xingsi Xue, Jie Chen, Junfeng Chen, Dongxu Chen:
A Hybrid NSGA-II for Matching Biomedical Ontology. 3-10 - Ling Wang, Fu Tao Ma, Tie Hua Zhou, Xue Gao:
Multi-attributes Graph Algorithm for Association Rules Mining Over Energy Internet. 11-18 - Tie Hua Zhou, Cong Hui Sun, Ling Wang, Gongliang Hu:
Real-Time Electricity Pricing Trend Forecasting Based on Multi-density Clustering and Sequence Pattern Mining. 19-26 - Zhen Hong Liu, Gongliang Hu, Tie Hua Zhou, Ling Wang:
TDT_CC: A Hot Topic Detection and Tracking Algorithm Based on Chain of Causes. 27-34 - Hsin-Lung Wu, Jui-Sheng Chang, Jen-Chun Chang:
A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks. 35-44 - Zengyou Sun, Yujie Zhao:
A Method of Cancellation Interference in CCFD System. 45-51 - Jianpo Li, Yang Lu, Songjun Pan, Ziqi Dong, Baochun Mu, Fuxin Liu, Cong Zheng:
Power Optimization Method of Magnetic Coupling Resonant Wireless Energy Transmission System. 52-59 - Jianpo Li, Pengwei Dong, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong:
PSO-AFSA Global Maximum Power Point Tracking Algorithm with Adaptive Evolutionary Strategy for PV System. 60-67 - Jianpo Li, Jun Wang, Fuxin Liu, Songjun Pan, Cong Zheng, Baochun Mu, Ziqi Dong:
The Design of RFID Localization System for Library Books. 68-74 - Yun Wu, Xin Hu, Xiaodong Wang:
The Design and Implementation of Automatic Detection and Control Equipment with Unattended Truck Scales. 75-82 - Yun Wu, Qiang Wang, Jian Wang:
An Interactive Appliances' Intelligent Control Method Based on Time-Sharing Electricity Price. 83-90 - Jianpo Li, Na Li, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong:
Modification Algorithm to Node Localization Error for Wireless Sensor Networks. 91-98 - Bor-Shing Lin, Yu-Syuan Lin, I-Jung Lee, Bor-Shyh Lin:
A Real-Time Missing Data Recovery Method Using Recurrent Neural Network for Multiple Transmissions. 99-107 - Bo Meng, Xiaolin Wang, Xuejun Liu, Linlin Xia, Guannan Deng, Shengxi Jiao:
The Extraction and Application of the Color Texture Feature Based on Quaternion Gabor. 108-116 - Jiang Xin, Zhang Wen, Shaozhang Niu, Yiming Xue:
Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine Learning. 117-123 - Cai-Jie Weng, Jeng-Shyang Pan, Shi-Jian Liu, Mei-Jin Wang:
A Watermarking Method for Printed QR Code Based on Module Expansion. 124-133 - Yun Wu, Mengke Wu, HaoJie Shu:
Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering Algorithm. 134-141 - Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Sheng-Han Xiao, Tsu-Yang Wu:
Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest. 142-150 - Yang Xi, Ning Gao, Mengchao Zhang, Lin Liu, Qi Li:
The Bayesian Causal Inference in Multisensory Information Processing: A Narrative Review. 151-161 - Yang Xi, Mengchao Zhang, Ning Gao, Yue Li, Lin Liu, Qi Li:
The Neural Mechanism of Audiovisual Integration Modulated by Attention: A DCM Study. 162-170 - Chien-Ming Chen, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu:
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor. 171-177 - Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. 178-183 - Xiaoli Guo, Li Feng, Yuhan Sun, Ping Guo:
The Research About Topic Extraction Method Based on the DTS-ILDA Model. 184-191 - Xiaoli Guo, Ping Guo, Li Feng, Wei Yue:
The Study of Power Server Operations Information Visualization Key Technologies. 192-199 - Wen Qi:
Designing a Wearable Companion of Smartphone for Healthcare. 200-206 - Zhen-Hao Zhang, Wei Sun, Wei Lu, Lei Bian:
Research and Implementation of Fuzzy Control Method of UAV Formation with Ad Hoc Network. 207-213
Cross-Disciplinary Approaches and Applications
- Yu-Chen Hu, Pei-Jung Wu, Chia-Mei Chen, Yi-Hung Liu:
A Novel Tamper Detection and Image Recovery Technique for Color Image Demosaicking. 217-224 - Mao-Lun Chiang, Yu-an Lin, Hui-Ching Hsieh, Weng-Chung Tsai:
Improving Latency and Reliability for Vehicle System Under Fog Computing Networks. 225-232 - Mao-Lun Chiang, Ze-Yu Chen, Hui-Ching Hsieh, Tsui-Ping Chang:
Nominate Connected Dominating Set Algorithm in Mobile Ad Hoc Network. 233-240 - Long-Sheng Chen, Yi-Ting Pan:
The Keywords of Affecting Performance for Live Streaming. 241-248 - Sue-Chen Hsueh, Jia-He Zeng:
Mobile Coupons Using Blockchain Technology. 249-255 - Hsien-Wen Tseng, Hui-Xin Lu, Hui-Shih Leng:
Dual Image Reversible Data Hiding Based on Modified LSB Matching Method. 256-263 - Chin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu:
A Survey of Semi-fragile Watermarking Authentication. 264-271 - Chin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang:
A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing. 272-279 - Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao:
High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. 280-288 - Shu-Ching Wang, Kuo-Qin Yan, Wei-Shu Xiong:
New Anatomy of Consensus in a Multiple Damage Communication VANET. 289-296 - Kuo-Qin Yan, Shu-Ching Wang, Wei-Shu Xiong, Ke-Yin Lu, Yun-Ju Cha:
Customer Management and Marketing Strategy Development in the Internet of Things. 297-304 - Yang Wang, Zhibin Pan:
A State Codebook Generation Algorithm of Side Match Vector Quantization. 305-312 - Lina Shi, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Distortion Function for Steganography in Texture Synthesized Images. 313-320 - Wei Sun, Wei Lu, Chun-yu Zhao, Bao-long Guo, Da-jian Li:
Calculating the Truck's Box Volume with a Single Image Under the Circle Projection and Vanishing Points Constraint. 321-329 - Ching-Chun Chang, Chang-Tsun Li:
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations. 330-339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.