Special Issue Papers | ||
Special Issue on Information Hiding and Multimedia Signal Processing | 1795-1795 | |
Hsiang-Cheh Huang, Bin-Yih Liao and Jeng-Shyang Pan | Preface | |
Real-time Video Object Segmentation Algorithm Based on Change Detection and Background Updating | 1797-1810 | |
Tsong-Yi Chen, Thou-Ho (Chao-Ho) Chen, Da-Jinn Wang and Yung-Chuen Chiou | Abstract | |
Small Target Detection in FLIR Imagery Using Multi-scale Morphological Filter and Kernel Density Estimation | 1811-1817 | |
Chang'an Wei and Shouda Jiang | Abstract | |
Brain Machine Interface: A Comparison between Fuzzy and Neural Classifiers | 1819-1827 | |
Hema C. R., Paulraj M. P., Nagarajan R. Sazali Yaacob, A. H. Adom | Abstract | |
A Portable Acoustic Caption Decoder Using IH Techniques for Enhancing Lives of the People Who Are Deaf or Hard-of-Hearing - System Configuration and Robustness for Airborne Sound - | 1829-1836 | |
Tetsuya Munekata, Toshimitsu Yamaguchi, Hiroki Handa, Ryouichi Nishimura and Yoiti Suzuki | Abstract | |
Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-H | 1837-1850 | |
Mehdi Rezaei, Imed Bouazizi and Moncef Gabbouj | Abstract | |
Applying Feature Extraction of Speech Recognition on VoIP Auditing | 1851-1856 | |
Xuan Wang, Jiancheng Lin, Yong Sun, Haibo Gan and Lin Yao | Abstract | |
Contrast Enhancement of MR Brain Images by Canonical Correlations Based Kernel Independent Component Analysis | 1857-1866 | |
Tomoko Tateyama, Zensho Nakao, Xianhua Han and Yen-Wei Chen | Abstract | |
A Digital Watermarking Scheme Based on Singular Value Decomposition and Micro-genetic Algorithm | 1867-1873 | |
Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai | Abstract | |
Hiding Multiple Watermarks in Transparencies of Visual Cryptography | 1875-1881 | |
Hao Luo, Fa-Xin Yu, Shu-Chuan Chu and Zhe-Ming Lu | Abstract | |
Content-based Audio Authentication Watermarking | 1883-1892 | |
Michael Gulbis, Erika Muller and Martin Steinebach | Abstract | |
Reversible Watermark for 3D Vertices Based on Data Hiding in Mesh Formation | 1893-1901 | |
Ding Chou, Chang-Yun Jhou and Shu-Chuan Chu | Abstract | |
Copyright Protection for Image Files with EXIF Metadata | 1903-1909 | |
Hsiang-Cheh Huang, Yueh-Hong Chen and Shin-Chang Chen | Abstract | |
A DC-based Approach to Robust Watermarking with Hamming-code | 1911-1917 | |
Mong-Fong Horng, Bo-Cheng Huang, Ming-Han Lee and Yau-Hwang Kuo | Abstract | |
The Key Management of the Encrypted Database Based on XML | 1919-1926 | |
Yong Zhang, Hui Zhang and Xia-Mu Niu | Abstract | |
The Heuristic Dispatching Method of Automatic Material Handling System in 300mm Semiconductor Fabrication | 1927-1935 | |
Chia-Nan Wang | Abstract | |
A New Method of TOE Architecture and Prototype Implementation | 1937-1948 | |
Tianhua Liu, Hongfeng Zhu and Jie Liu | Abstract | |
ANFIS-based Adaptive Expectation Model for Forecasting Stock Index | 1949-1958 | |
Jui-Fang Chang, Liang-Ying Wei and Ching-Hsue Cheng | Abstract | |
Improved SVM and ANN in Incipient Fault Diagnosis of Power Transformers Using Clonal Selection Algorithms | 1959-1974 | |
Horng-Yuan Wu, Chin-Yuan Hsu, Tsair-Fwu Lee and Fu-Min Fang | Abstract | |
Regular Papers | ||
Detection and Recognition of Vehicle License Plates Using Template Matching, Genetic Algorithms and Neural Networks | 1975-1985 | |
Stephen Karungaru, Minoru Fukumi, Norio Akamatsu and Takuya Akashi | Abstract | |
Automatic Text Summarization Using Support Vector Machine | 1987-1996 | |
Nadira Begum, Mohamed Abdel Fattah and Fuji Ren | Abstract | |
An Interactive Fuzzy Satisficing Method Based on Simple Recourse Model for Multiobjective Linear Programming Problems Involving Random Variable Coefficients | 1997-2010 | |
Kosuke Kato and Masatoshi Sakawa | Abstract | |
Determine Global Energy Minimum Solution via Lyapunov Stability Theorem | 2011-2030 | |
Wen-Tsai Sung | Abstract | |
Evaluating Customer Value for Liner Shipping Companies in Taiwan: An Empirical Study | 2031-2042 | |
Ji-Feng Ding | Abstract | |
Data Hiding Based on VQ Compressed Images Using Hamming Codes and Declustering | 2043-2052 | |
Wei-Liang Tai and Chin-Chen Chang | Abstract | |
A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System | 2053-2060 | |
Chin-Chen Chang and Jen-Ho Yang | Abstract | |
Drug Design via Novel Directivity Genetic Algorithms and Lyapunov Principle | 2061-2070 | |
Hung-Yuan Chung, Shih-Ching Ou and Chun-Yen Chung | Abstract | |
Generator and Parameters Estimation for IID General Alpha Stable Random Series | 2071-2080 | |
Xutao Li, Shouyong Wang and Ligang Wu | Abstract |