


default search action
Journal of Information and Telecommunication, Volume 2
Volume 2, Number 1, 2018
- Le Vinh Danh, Ngoc Thanh Nguyen:

From the Editors and Ton Duc Thang University. 1
- Pablo C. Cañizares

, Mercedes G. Merayo
, Alberto Núñez
:
FORTIFIER: a FORmal disTrIbuted Framework to Improve the dEtection of thReatening objects in baggage. 2-18 - Chao-Fu Hong, Mu-Hua Lin, Pen-Choug Sun, Hsiao-Fang Yang:

Framework of early adopters' incipient and innovative ideas and chance discovery. 19-32 - Cuong Duc Nguyen, Trong Hai Duong:

EREL: an Entity Recognition and Linking algorithm. 33-52 - Leon Bobrowski, Pawel Zabielski:

Basis exchange and learning algorithms for extracting collinear patterns. 53-67 - Bálint Molnár

, András Béleczki, András A. Benczúr:
Information systems modelling based on graph-theoretic background. 68-90 - Trong-The Nguyen

, Jeng-Shyang Pan
, Thi-Kien Dao
, Shu-Chuan Chu
:
Load balancing for mitigating hotspot problem in wireless sensor network based on enhanced diversity pollen. 91-106 - Phat Tan Lam, Tan Quang Le, Ngan Nguyen Le

, Dat Son Nguyen:
Wireless sensing modules for rural monitoring and precision agriculture applications. 107-123
Volume 2, Number 2, 2018
- Notice of duplicate publication. 125

- Hai Vu, Thi-Lan Le, Van Giap Nguyen

, Tan Hung Dinh:
Semantic regions segmentation using a spatio-temporal model from an UAV image sequence with an optimal configuration for data acquisition. 126-146 - Hong Hai Le, Ngoc-Hoa Nguyen, Tri-Thanh Nguyen:

Speeding up and enhancing a large-scale fingerprint identification system on GPU. 147-162 - Basabi Chakraborty, Atsushi Kawamura:

A new penalty-based wrapper fitness function for feature subset selection with evolutionary algorithms. 163-180 - Dragan Lambic

:
S-box design method based on improved one-dimensional discrete chaotic map. 181-191 - Leslie F. Sikos

:
VidOnt: a core reference ontology for reasoning over video scenes. 192-204 - Mehmet Sarigul

, Mutlu Avci
:
Performance comparison of different momentum techniques on deep reinforcement learning. 205-216 - Joanna Jedrzejowicz

, Robert Kostrzewski, Jakub Neumann
, Magdalena Zakrzewska:
Imbalanced data classification using MapReduce and relief. 217-230
Volume 2, Number 3, 2018
- Faisal Mohammed Nafie Ali, Abdelmoneim Ali Mohamed Hamed:

Usage Apriori and clustering algorithms in WEKA tools to mining dataset of traffic accidents. 231-245 - Doan Duy

, Kiyofumi Tanaka:
Enhanced virtual release advancing algorithm for real-time task scheduling. 246-264 - Nguyen Mau Toan, Yasushi Inoguchi:

Audio fingerprint hierarchy searching strategies on GPGPU massively parallel computer. 265-290 - Mare Koit

:
Reasoning and communicative strategies in a model of argument-based negotiation. 291-304 - Amy Hamijah Ab. Hamid, Mohd Zaidi Abd Rozan, Roliana Ibrahim, Safaai Deris, Ali Selamat

, Muhd. Noor Muhd Yunus:
Requirements engineering of Malaysian radiological medical emergency response simulator. 305-321 - Jacek Grekow:

Audio features dedicated to the detection and tracking of arousal and valence in musical compositions. 322-333 - Omar Sami Thiab, Lukasz Nogal

, Ryszard Kowalik:
Adaptive phasor estimation technique during off-nominal frequency for numerical relays. 334-346 - Gozde Ozsert Yigit, Buse Melis Özyildirim

:
Comparison of convolutional neural network models for food image classification. 347-357
Volume 2, Number 4, 2018
- Yasuhiro Ogawa, Makoto Nakamura, Tomohiro Ohno, Katsuhiko Toyama:

Extraction of legal bilingual phrases from the Japanese Official Gazette, English Edition. 359-373 - Daiki Kurita, Boonsita Roengsamut, Kazuhiro Kuwabara, Hung-Hsuan Huang:

Simulating gamified crowdsourcing of knowledge base refinement: effects of game rule design. 374-391 - Siamak Dehghanpour, Akbar Esfahanipour

:
Dynamic portfolio insurance strategy: a robust machine learning approach. 392-410 - Kambiz Badie

, Nasrin Asadi
, Maryam Tayefeh Mahmoudi:
Zone identification based on features with high semantic richness and combining results of separate classifiers. 411-427 - Grzegorz Kolaczek, Jolanta Mizera-Pietraszko

:
Security framework for dynamic service-oriented IT systems. 428-448 - Tomasz Xieski

, Roman Siminski:
Backward chaining inference as a database stored procedure - the experiments on real-world knowledge bases. 449-464 - Emmanuel Okafor, Lambert Schomaker

, Marco A. Wiering
:
An analysis of rotation matrix and colour constancy data augmentation in classifying images of animals. 465-491 - Konstantinos Demertzis

, Lazaros S. Iliadis, Vardis-Dimitris Anezakis
:
Extreme deep learning in biosecurity: the case of machine hearing for marine species identification. 492-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














