


default search action
14th IIH-MSP 2018: Sendai, Japan
- Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, Lakhmi C. Jain:

Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November, 26-28, 2018, Sendai, Japan, Volume 1. Smart Innovation, Systems and Technologies 109, Springer 2019, ISBN 978-3-030-03744-4 - Yun Wu, Mengke Wu, HaoJie Shu:

Correction to: Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering Algorithm. 1
Emerging Techniques and Its Applications in Computer Science
- Xingsi Xue, Jie Chen, Junfeng Chen, Dongxu Chen:

A Hybrid NSGA-II for Matching Biomedical Ontology. 3-10 - Ling Wang, Fu Tao Ma, Tie Hua Zhou, Xue Gao:

Multi-attributes Graph Algorithm for Association Rules Mining Over Energy Internet. 11-18 - Tie Hua Zhou, Cong Hui Sun, Ling Wang, Gongliang Hu:

Real-Time Electricity Pricing Trend Forecasting Based on Multi-density Clustering and Sequence Pattern Mining. 19-26 - Zhen Hong Liu, Gongliang Hu, Tie Hua Zhou, Ling Wang:

TDT_CC: A Hot Topic Detection and Tracking Algorithm Based on Chain of Causes. 27-34 - Hsin-Lung Wu, Jui-Sheng Chang, Jen-Chun Chang:

A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks. 35-44 - Zengyou Sun, Yujie Zhao:

A Method of Cancellation Interference in CCFD System. 45-51 - Jianpo Li, Yang Lu, Songjun Pan, Ziqi Dong, Baochun Mu, Fuxin Liu, Cong Zheng:

Power Optimization Method of Magnetic Coupling Resonant Wireless Energy Transmission System. 52-59 - Jianpo Li, Pengwei Dong, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong:

PSO-AFSA Global Maximum Power Point Tracking Algorithm with Adaptive Evolutionary Strategy for PV System. 60-67 - Jianpo Li, Jun Wang, Fuxin Liu, Songjun Pan, Cong Zheng, Baochun Mu, Ziqi Dong:

The Design of RFID Localization System for Library Books. 68-74 - Yun Wu, Xin Hu, Xiaodong Wang:

The Design and Implementation of Automatic Detection and Control Equipment with Unattended Truck Scales. 75-82 - Yun Wu, Qiang Wang, Jian Wang:

An Interactive Appliances' Intelligent Control Method Based on Time-Sharing Electricity Price. 83-90 - Jianpo Li, Na Li, Cong Zheng, Fuxin Liu, Songjun Pan, Baochun Mu, Ziqi Dong:

Modification Algorithm to Node Localization Error for Wireless Sensor Networks. 91-98 - Bor-Shing Lin

, Yu-Syuan Lin, I-Jung Lee
, Bor-Shyh Lin
:
A Real-Time Missing Data Recovery Method Using Recurrent Neural Network for Multiple Transmissions. 99-107 - Bo Meng, Xiaolin Wang, Xuejun Liu, Linlin Xia, Guannan Deng, Shengxi Jiao:

The Extraction and Application of the Color Texture Feature Based on Quaternion Gabor. 108-116 - Jiang Xin, Zhang Wen, Shaozhang Niu, Yiming Xue:

Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine Learning. 117-123 - Cai-Jie Weng, Jeng-Shyang Pan

, Shi-Jian Liu
, Mei-Jin Wang:
A Watermarking Method for Printed QR Code Based on Module Expansion. 124-133 - Yun Wu, Mengke Wu, HaoJie Shu:

Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering Algorithm. 134-141 - Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Sheng-Han Xiao, Tsu-Yang Wu

:
Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest. 142-150 - Yang Xi, Ning Gao, Mengchao Zhang, Lin Liu, Qi Li:

The Bayesian Causal Inference in Multisensory Information Processing: A Narrative Review. 151-161 - Yang Xi, Mengchao Zhang, Ning Gao, Yue Li, Lin Liu, Qi Li:

The Neural Mechanism of Audiovisual Integration Modulated by Attention: A DCM Study. 162-170 - Chien-Ming Chen

, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu
:
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor. 171-177 - Tsu-Yang Wu

, Chien-Ming Chen
, King-Hang Wang
, Jimmy Ming-Tai Wu, Jeng-Shyang Pan
:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. 178-183 - Xiaoli Guo, Li Feng, Yuhan Sun, Ping Guo:

The Research About Topic Extraction Method Based on the DTS-ILDA Model. 184-191 - Xiaoli Guo, Ping Guo, Li Feng, Wei Yue:

The Study of Power Server Operations Information Visualization Key Technologies. 192-199 - Wen Qi

:
Designing a Wearable Companion of Smartphone for Healthcare. 200-206 - Zhen-Hao Zhang, Wei Sun, Wei Lu, Lei Bian:

Research and Implementation of Fuzzy Control Method of UAV Formation with Ad Hoc Network. 207-213
Cross-Disciplinary Approaches and Applications
- Yu-Chen Hu, Pei-Jung Wu, Chia-Mei Chen, Yi-Hung Liu:

A Novel Tamper Detection and Image Recovery Technique for Color Image Demosaicking. 217-224 - Mao-Lun Chiang

, Yu-an Lin, Hui-Ching Hsieh, Weng-Chung Tsai:
Improving Latency and Reliability for Vehicle System Under Fog Computing Networks. 225-232 - Mao-Lun Chiang

, Ze-Yu Chen, Hui-Ching Hsieh, Tsui-Ping Chang:
Nominate Connected Dominating Set Algorithm in Mobile Ad Hoc Network. 233-240 - Long-Sheng Chen

, Yi-Ting Pan:
The Keywords of Affecting Performance for Live Streaming. 241-248 - Sue-Chen Hsueh, Jia-He Zeng:

Mobile Coupons Using Blockchain Technology. 249-255 - Hsien-Wen Tseng, Hui-Xin Lu, Hui-Shih Leng:

Dual Image Reversible Data Hiding Based on Modified LSB Matching Method. 256-263 - Chin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu:

A Survey of Semi-fragile Watermarking Authentication. 264-271 - Chin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang:

A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing. 272-279 - Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao:

High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. 280-288 - Shu-Ching Wang, Kuo-Qin Yan, Wei-Shu Xiong:

New Anatomy of Consensus in a Multiple Damage Communication VANET. 289-296 - Kuo-Qin Yan, Shu-Ching Wang, Wei-Shu Xiong, Ke-Yin Lu, Yun-Ju Cha:

Customer Management and Marketing Strategy Development in the Internet of Things. 297-304 - Yang Wang, Zhibin Pan:

A State Codebook Generation Algorithm of Side Match Vector Quantization. 305-312 - Lina Shi, Zichi Wang, Zhenxing Qian

, Xinpeng Zhang:
Distortion Function for Steganography in Texture Synthesized Images. 313-320 - Wei Sun, Wei Lu, Chun-yu Zhao, Bao-long Guo, Da-jian Li:

Calculating the Truck's Box Volume with a Single Image Under the Circle Projection and Vanishing Points Constraint. 321-329 - Ching-Chun Chang, Chang-Tsun Li

:
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations. 330-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














