


default search action
Journal of Multimedia Information System, Volume 3
Volume 3, Number 2, June 2016
- Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:

R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data. 1-8 - Md. Israfil Ansari, Jaechang Shim:

Human Gender and Motion Analysis with Ellipsoid and Logistic Regression Method. 2-9 - Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:

Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication. 13-20 - Tatsuto Murayama, Peter Davis:

Noisy Data Aggregation with Independent Sensors: Insights and Open Problems. 21-26 - Junho Huh:

Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students. 27-34 - Ahmed Shdefat, Moonil Joo, Heecheol Kim:

A Method of Analyzing ECG to Diagnose Heart Abnormality utilizing SVM and DWT. 35-42 - Khojiakbar Egamberdiev:

Eyes and Lenses: A Comparison and Differences. 43-46
Volume 3, Number 3, September 2016
- Jenie Nam, Young Jae Kim, Seung Hyun Lee, Kwang Gi Kim:

Brain Hologram Visualization for Diagnosis of Tumors using Graphic Imaging. 47-52 - Taeho Jo:

Graph based KNN for Optimizing Index of News Articles. 53-62 - Lionel Nkenyereye, Jongwook Jang:

Design of Data Center Environmental Monitoring System Based On Lower Hardware Cost. 63-68 - Jun-Ho Huh, Dong-Geun Lee, Kyungryong Seo:

A Design of Base Technology for Airbag Actuation Checking Application Based on Mechanical Calculations for Old Container Vehicle. 69-76 - Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:

Shipboard Secret Electronic Voting System for Information and Communication Technology-isolated Ocean Crews. 77-84 - Zhi-Chao Cheng, Donghwoon Kwon, Chang-Hai Jin, Young-Jik Kwon:

A Study on C2B2C Business Integration Model Design Focusing On the Fashion Clothes Business. 85-90 - Thi-Thu-Huong Le, Jihyun Kim, Howon Kim:

Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection. 91-96 - Jin Lee, Kwang Jong Choi, Seong Jung Kim, Ji Eun Oh, Woong Bae Yoon, Kwang Gi Kim:

Breast Mass Classification using the Fundamental Deep Learning Approach: To build the optimal model applying various methods that influence the performance of CNN. 97-102 - Deresa Jang, Jin-bo Kim, Mi-Sun Kim, Jae-Hyun Seo:

Privacy of Capability Token in the IoT Service System. 103-110
Volume 3, Number 4, December 2016
- Joo Hyun Park, Soon-Bum Lim:

System Design and Service Scenario for the Second Screen Service. 111-118 - Yeunghak Lee, Jaechang Shim:

New Approach to Two-wheeler Detection using Correlation Coefficient based on Histogram of Oriented Gradients. 119-128 - Yuichiro Narahara, Shigeki Shiokawa:

Enhanced Dynamic Management of Mobile Agent in Location Based Routing. 129-134 - Aunee Azrina Zulkifli, Thong Huynh, Kaori Kuroda, Mikio Hasegawa

:
Interference Coordination for Device-to-Device (D2D) under Multi-channel of Cellular Networks. 135-140 - Yuto Yoshida, Nobuyoshi Komuro, Jing Ma, Hiroo Sekiya:

Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks. 141-148 - Yuriko Yoshino, Masafumi Hashimoto, Naoki Wakamiya:

A Divided Scheduling Method based on Structural Characteristics in Wireless. 149-154 - Hiroki Matsushima, Hiroaki Kurokawa:

The Parameter Learning Method for Similar Image Rating Using Pulse Coupled Neural Network. 155-160 - Shohei Sugino, Hiroo Sekiya:

Power-Flow Simulator with Visualization Function Based on IEEE Common Data Format. 161-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














