


default search action
13th IIH-MSP 2017: Matsue, Shimane, Japan
- Jeng-Shyang Pan, Pei-Wei Tsai

, Junzo Watada, Lakhmi C. Jain:
Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Smart Innovation, Systems and Technologies 82, Springer 2018, ISBN 978-3-319-63858-4
Massive Image/Video Compression and Transmission for Emerging Networks
- Xueying Zhang, Wei-Rong Wang, Cheng-Ye Shen, Ying Sun, Lixia Huang:

Extraction of EEG Components Based on Time - Frequency Blind Source Separation. 3-10 - Jiwei Zhang, Shaozhang Niu, Yueying Li, Yuhan Liu:

An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization. 11-18 - Jiancheng Zou, Xuan Yang, Honggen Zhang, Xiaoguang Chen:

Automatic Facial Age Estimate Based on Convolution Neural Network. 19-26 - Yuyang Sun, Qingzhong Li, Honggen Zhang, Jiancheng Zou:

The Application of Eye Tracking in Education. 27-33 - Jingyuan Ma, Huihui Bai, Meiqin Liu, Dongxia Chang, Rongrong Ni, Yao Zhao:

Adaptive Multiple Description Depth Image Coding Based on Wavelet Sub-band Coefficients. 34-41 - Yonggwon Ri, Jing Dong, Wei Wang

, Tieniu Tan:
Adaptive Histogram Shifting Based Reversible Data Hiding. 42-50 - Xingyu Tian, Chunlei Fan, Jia Liu, Qun Ding:

Design and Implementation of Network Video Encryption System Based on STM32 and AES Algorithm. 51-58 - Xiujun Feng, Pengyu Liu, Kebin Jia:

Fast Intra Mode Decision Algorithm for 3D-HEVC Transcoding. 59-66 - Zhifei Fan, Baolong Guo, Jie Hou:

Implementation of a Drone-Based Video Streamer. 67-74
Advances in Speech and Language Processing
- Hayato Mori, Yuya Chiba, Takashi Nose

, Akinori Ito
:
Dialog-Based Interactive Movie Recommendation: Comparison of Dialog Strategies. 77-83 - Shunsuke Tada, Yuya Chiba, Takashi Nose

, Akinori Ito
:
Response Selection of Interview-Based Dialog System Using User Focus and Semantic Orientation. 84-90 - Yusuke Yamada, Takashi Nose

, Yuya Chiba, Akinori Ito
, Takahiro Shinozaki:
Development and Evaluation of Julius-Compatible Interface for Kaldi ASR. 91-96 - Sou Miyamoto, Takashi Nose

, Suzunosuke Ito, Harunori Koike, Yuya Chiba, Akinori Ito
, Takahiro Shinozaki:
Voice Conversion from Arbitrary Speakers Based on Deep Neural Networks with Adversarial Learning. 97-103 - Kosuke Nakamura, Yuya Chiba, Takashi Nose

, Akinori Ito
:
Evaluation of Nonlinear Tempo Modification Methods Based on Sinusoidal Modeling. 104-111 - Kazuki Sato, Takashi Nose

, Akira Ito, Yuya Chiba, Akinori Ito
, Takahiro Shinozaki:
A Study on 2D Photo-Realistic Facial Animation Generation Using 3D Facial Feature Points and Deep Neural Networks. 112-118
Recent Advances in Information Hiding and Signal Processing for Audio and Speech Signals
- Shinya Takahashi, Kazuhiro Kondo

:
Towards an Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting. 121-129 - Isao Miyagawa, Yuya Chiba, Takashi Nose

, Akinori Ito
:
Detection of Singing Mistakes from Singing Voice. 130-136 - Harumi Murata, Akio Ogihara:

A Study of Audio Watermarking Method Using Non-negative Matrix Factorization for a Duet of Different Instruments. 137-144 - Ryouichi Nishimura, Shuichi Sakamoto, Yôiti Suzuki:

A Wind Noise Detection Algorithm for Monitoring Infrasound Using Smartphone as a Sensor Device. 145-152 - Dung Kim Tran, Masashi Unoki

:
Study on Speech Representation Based on Spikegram for Speech Fingerprints. 153-160 - Naofumi Aoki:

Embedding Multiple Audio Data Using Information Misreading Technique. 161-168 - Ru Zhang, Jianyi Liu, Feng Zhu:

A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. 169-176 - Fenglian Li, Xueying Zhang, Hongle Zhang, Yu-Chu Tian

:
An AFK-SVD Sparse Representation Approach for Speech Signal Processing. 177-184 - Zhihao Wei, Kebin Jia, Zhonghua Sun:

An Automatic Detection Method for Morse Signal Based on Machine Learning. 185-191
Intelligent Distribution Systems and Applications
- Yen-Ming Tseng, Li-Shan Chen, Jeng-Shyang Pan

, Hsi-Shan Huang, Lee Ku:
Capacity Reduction of Distribution Transformer by Harmonic Effect. 195-204 - Yen-Ming Tseng, Rong-Ching Wu, Jeng-Shyang Pan

, En-Chih Chang, Peijiang Li:
Base on Transmission Line Model to Investigate the Power Margins of Main Transformers. 205-214 - Hsi-Shan Huang, Jeng-Shyang Pan

, Yen-Ming Tseng, Weidong Fang, Ruey-Ming Shih:
Development of Optical Fiber Stress Sensor Based on OTDR. 215-222 - Guo-Fu Lian, Ming-Der Jean, Tzu-Hsuan Chien:

Application of AlN-Coated Heat Sink to Improve the Thermal Management of Light-Emitting Diode Assembles. 223-227 - Chien-Hua Wang, Jich-Yan Tsai, I-Hsiang Lin, Chin-Tzong Pang:

A Fuzzy Neural Network on the Internet Addiction for University Students in China. 228-235 - Jing Tang, Jeng-Shyang Pan

, Yen-Ming Tseng, Pei-Wei Tsai
, Zhenyu Meng:
Optimal Economic Dispatch of Fuel Cost Based on Intelligent Monkey King Evolutionary Algorithm. 236-243 - Zhong-Shu Liu:

Optimum Design and Control Research of Direct Drive Hub Motor. 244-254 - Rong-Ching Wu, Yen-Ming Tseng, En-Chih Chang, Chih-Yang Hsiao:

Building of a Practical Monitoring System for the Small Wind Turbine. 255-263
Recent Advances in Security and Privacy for Multimodal Network Environments
- Raylin Tso, Ying Miao:

A Survey of Secret Sharing Schemes Based on Latin Squares. 267-272 - Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:

A NFC-Based Authentication Scheme for Personalized IPTV Services. 273-281 - Shi-Cho Cha, Wei-Ching Peng, Zijia Huang, Tzu-Yang Hsu, Jyun-Fu Chen, Tsung-Ying Tsai:

On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications. 282-289 - Danyang Qin, Yan Zhang, Jingya Ma, Songxiang Yang, Erfu Wang:

Accelerated vBNN-IBS Authentication Scheme for WSN. 290-297 - Danyang Qin, Jingya Ma, Yan Zhang, Songxiang Yang, Zhifang Wang:

A Pre-assigned Key Management Scheme for Heterogeneous Wireless Sensor Networks. 298-305
Multimedia Signal Processing and Machine Learning
- Chunrui Zhang, Shen Wang, Dechen Zhan:

A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. 309-317 - Tingyue Yu, Shen Wang, Xiangzhan Yu:

A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes. 318-326 - Xiuli Ning, Yingcheng Xu, Ying Li, Ya Li:

Particle Swarm Optimization-Based Time Series Data Prediction. 327-334 - Xiuli Ning, Yingcheng Xu, Ying Li, Ya Li:

Time Series Data Analysis with Particle Filter-Based Relevance Vectors Machine Learning. 335-342 - Yeonchan Lee, Jaeseok Choi, Myeunghoon Jung, Junzo Watada:

GUI of GMS Simulation Tool Using Fuzzy Methods. 343-351 - Shusaku Tsumoto, Tomohiro Kimura, Haruko Iwata, Shoji Hirano:

Discharge Summaries Classifier. 352-360 - Kai Feng, Qun Ding:

Design and Implementation of Pseudo-Random Sequence Generator Based on Logistic Chaotic System and m-Sequence Using FPGA. 361-369 - Salih Ergün

:
Cryptanalysis of a Random Number Generator Based on a Chaotic Circuit. 370-377 - Haydee Melo, Huiming Zhang, Pandian Vasant

, Junzo Watada:
Training Method for a Feed Forward Neural Network Based on Meta-heuristics. 378-385 - Dan Wang, Baolong Guo, Yunyi Yan

, Haibin Xu:
Hamming Code Protection Method of FPGA-Based Space System. 386-392 - Jia Liu, Chunlei Fan, Xingyu Tian, Qun Ding:

Optimization of AES and RSA Algorithm and Its Mixed Encryption System. 393-403 - Yueying Wu, Pengyu Liu, Zeqi Feng, Kebin Jia:

Fast Coding Unit Depth Decision for HEVC Intra Coding. 404-413 - Yan Zheng, Baolong Guo, Yunyi Yan

:
A New Approach of Shape Recognition with Affine Invariance Based on HSC. 414-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














