- Jing Tang, Jeng-Shyang Pan, Yen-Ming Tseng, Pei-Wei Tsai, Zhenyu Meng:
Optimal Economic Dispatch of Fuel Cost Based on Intelligent Monkey King Evolutionary Algorithm. IIH-MSP (2) 2017: 236-243 - Xingyu Tian, Chunlei Fan, Jia Liu, Qun Ding:
Design and Implementation of Network Video Encryption System Based on STM32 and AES Algorithm. IIH-MSP (2) 2017: 51-58 - Dung Kim Tran, Masashi Unoki:
Study on Speech Representation Based on Spikegram for Speech Fingerprints. IIH-MSP (2) 2017: 153-160 - Yen-Ming Tseng, Li-Shan Chen, Jeng-Shyang Pan, Hsi-Shan Huang, Lee Ku:
Capacity Reduction of Distribution Transformer by Harmonic Effect. IIH-MSP (2) 2017: 195-204 - Yen-Ming Tseng, Rong-Ching Wu, Jeng-Shyang Pan, En-Chih Chang, Peijiang Li:
Base on Transmission Line Model to Investigate the Power Margins of Main Transformers. IIH-MSP (2) 2017: 205-214 - Raylin Tso, Ying Miao:
A Survey of Secret Sharing Schemes Based on Latin Squares. IIH-MSP (2) 2017: 267-272 - Shusaku Tsumoto, Tomohiro Kimura, Haruko Iwata, Shoji Hirano:
Discharge Summaries Classifier. IIH-MSP (2) 2017: 352-360 - Dan Wang, Baolong Guo, Yunyi Yan, Haibin Xu:
Hamming Code Protection Method of FPGA-Based Space System. IIH-MSP (2) 2017: 386-392 - Chien-Hua Wang, Jich-Yan Tsai, I-Hsiang Lin, Chin-Tzong Pang:
A Fuzzy Neural Network on the Internet Addiction for University Students in China. IIH-MSP (2) 2017: 228-235 - Zhihao Wei, Kebin Jia, Zhonghua Sun:
An Automatic Detection Method for Morse Signal Based on Machine Learning. IIH-MSP (2) 2017: 185-191 - Yueying Wu, Pengyu Liu, Zeqi Feng, Kebin Jia:
Fast Coding Unit Depth Decision for HEVC Intra Coding. IIH-MSP (2) 2017: 404-413 - Rong-Ching Wu, Yen-Ming Tseng, En-Chih Chang, Chih-Yang Hsiao:
Building of a Practical Monitoring System for the Small Wind Turbine. IIH-MSP (2) 2017: 255-263 - Yusuke Yamada, Takashi Nose, Yuya Chiba, Akinori Ito, Takahiro Shinozaki:
Development and Evaluation of Julius-Compatible Interface for Kaldi ASR. IIH-MSP (2) 2017: 91-96 - Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A NFC-Based Authentication Scheme for Personalized IPTV Services. IIH-MSP (2) 2017: 273-281 - Tingyue Yu, Shen Wang, Xiangzhan Yu:
A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes. IIH-MSP (2) 2017: 318-326 - Ru Zhang, Jianyi Liu, Feng Zhu:
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. IIH-MSP (2) 2017: 169-176 - Jiwei Zhang, Shaozhang Niu, Yueying Li, Yuhan Liu:
An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization. IIH-MSP (2) 2017: 11-18 - Xueying Zhang, Wei-Rong Wang, Cheng-Ye Shen, Ying Sun, Lixia Huang:
Extraction of EEG Components Based on Time - Frequency Blind Source Separation. IIH-MSP (2) 2017: 3-10 - Chunrui Zhang, Shen Wang, Dechen Zhan:
A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. IIH-MSP (2) 2017: 309-317 - Yan Zheng, Baolong Guo, Yunyi Yan:
A New Approach of Shape Recognition with Affine Invariance Based on HSC. IIH-MSP (2) 2017: 414-419 - Jiancheng Zou, Xuan Yang, Honggen Zhang, Xiaoguang Chen:
Automatic Facial Age Estimate Based on Convolution Neural Network. IIH-MSP (2) 2017: 19-26