default search action
Journal of Information and Telecommunication, Volume 2
Volume 2, Number 1, 2018
- Le Vinh Danh, Ngoc Thanh Nguyen:
From the Editors and Ton Duc Thang University. 1
- Pablo C. Cañizares, Mercedes G. Merayo, Alberto Núñez:
FORTIFIER: a FORmal disTrIbuted Framework to Improve the dEtection of thReatening objects in baggage. 2-18 - Chao-Fu Hong, Mu-Hua Lin, Pen-Choug Sun, Hsiao-Fang Yang:
Framework of early adopters' incipient and innovative ideas and chance discovery. 19-32 - Cuong Duc Nguyen, Trong Hai Duong:
EREL: an Entity Recognition and Linking algorithm. 33-52 - Leon Bobrowski, Pawel Zabielski:
Basis exchange and learning algorithms for extracting collinear patterns. 53-67 - Bálint Molnár, András Béleczki, András A. Benczúr:
Information systems modelling based on graph-theoretic background. 68-90 - Trong-The Nguyen, Jeng-Shyang Pan, Thi-Kien Dao, Shu-Chuan Chu:
Load balancing for mitigating hotspot problem in wireless sensor network based on enhanced diversity pollen. 91-106 - Phat Tan Lam, Tan Quang Le, Ngan Nguyen Le, Dat Son Nguyen:
Wireless sensing modules for rural monitoring and precision agriculture applications. 107-123
Volume 2, Number 2, 2018
- Notice of duplicate publication. 125
- Hai Vu, Thi-Lan Le, Van Giap Nguyen, Tan Hung Dinh:
Semantic regions segmentation using a spatio-temporal model from an UAV image sequence with an optimal configuration for data acquisition. 126-146 - Hong Hai Le, Ngoc-Hoa Nguyen, Tri-Thanh Nguyen:
Speeding up and enhancing a large-scale fingerprint identification system on GPU. 147-162 - Basabi Chakraborty, Atsushi Kawamura:
A new penalty-based wrapper fitness function for feature subset selection with evolutionary algorithms. 163-180 - Dragan Lambic:
S-box design method based on improved one-dimensional discrete chaotic map. 181-191 - Leslie F. Sikos:
VidOnt: a core reference ontology for reasoning over video scenes. 192-204 - Mehmet Sarigul, Mutlu Avci:
Performance comparison of different momentum techniques on deep reinforcement learning. 205-216 - Joanna Jedrzejowicz, Robert Kostrzewski, Jakub Neumann, Magdalena Zakrzewska:
Imbalanced data classification using MapReduce and relief. 217-230
Volume 2, Number 3, 2018
- Faisal Mohammed Nafie Ali, Abdelmoneim Ali Mohamed Hamed:
Usage Apriori and clustering algorithms in WEKA tools to mining dataset of traffic accidents. 231-245 - Doan Duy, Kiyofumi Tanaka:
Enhanced virtual release advancing algorithm for real-time task scheduling. 246-264 - Nguyen Mau Toan, Yasushi Inoguchi:
Audio fingerprint hierarchy searching strategies on GPGPU massively parallel computer. 265-290 - Mare Koit:
Reasoning and communicative strategies in a model of argument-based negotiation. 291-304 - Amy Hamijah Ab. Hamid, Mohd Zaidi Abd Rozan, Roliana Ibrahim, Safaai Deris, Ali Selamat, Muhd. Noor Muhd Yunus:
Requirements engineering of Malaysian radiological medical emergency response simulator. 305-321 - Jacek Grekow:
Audio features dedicated to the detection and tracking of arousal and valence in musical compositions. 322-333 - Omar Sami Thiab, Lukasz Nogal, Ryszard Kowalik:
Adaptive phasor estimation technique during off-nominal frequency for numerical relays. 334-346 - Gozde Ozsert Yigit, Buse Melis Özyildirim:
Comparison of convolutional neural network models for food image classification. 347-357
Volume 2, Number 4, 2018
- Yasuhiro Ogawa, Makoto Nakamura, Tomohiro Ohno, Katsuhiko Toyama:
Extraction of legal bilingual phrases from the Japanese Official Gazette, English Edition. 359-373 - Daiki Kurita, Boonsita Roengsamut, Kazuhiro Kuwabara, Hung-Hsuan Huang:
Simulating gamified crowdsourcing of knowledge base refinement: effects of game rule design. 374-391 - Siamak Dehghanpour, Akbar Esfahanipour:
Dynamic portfolio insurance strategy: a robust machine learning approach. 392-410 - Kambiz Badie, Nasrin Asadi, Maryam Tayefeh Mahmoudi:
Zone identification based on features with high semantic richness and combining results of separate classifiers. 411-427 - Grzegorz Kolaczek, Jolanta Mizera-Pietraszko:
Security framework for dynamic service-oriented IT systems. 428-448 - Tomasz Xieski, Roman Siminski:
Backward chaining inference as a database stored procedure - the experiments on real-world knowledge bases. 449-464 - Emmanuel Okafor, Lambert Schomaker, Marco A. Wiering:
An analysis of rotation matrix and colour constancy data augmentation in classifying images of animals. 465-491 - Konstantinos Demertzis, Lazaros S. Iliadis, Vardis-Dimitris Anezakis:
Extreme deep learning in biosecurity: the case of machine hearing for marine species identification. 492-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.