


default search action
Journal of Information and Telecommunication, Volume 2
Volume 2, Number 1, 2018
- Le Vinh Danh, Ngoc Thanh Nguyen:
From the Editors and Ton Duc Thang University. 1
- Pablo C. Cañizares
, Mercedes G. Merayo
, Alberto Núñez
:
FORTIFIER: a FORmal disTrIbuted Framework to Improve the dEtection of thReatening objects in baggage. 2-18 - Chao-Fu Hong, Mu-Hua Lin, Pen-Choug Sun, Hsiao-Fang Yang:
Framework of early adopters' incipient and innovative ideas and chance discovery. 19-32 - Cuong Duc Nguyen, Trong Hai Duong:
EREL: an Entity Recognition and Linking algorithm. 33-52 - Leon Bobrowski, Pawel Zabielski:
Basis exchange and learning algorithms for extracting collinear patterns. 53-67 - Bálint Molnár
, András Béleczki, András A. Benczúr:
Information systems modelling based on graph-theoretic background. 68-90 - Trong-The Nguyen
, Jeng-Shyang Pan
, Thi-Kien Dao
, Shu-Chuan Chu
:
Load balancing for mitigating hotspot problem in wireless sensor network based on enhanced diversity pollen. 91-106 - Phat Tan Lam, Tan Quang Le, Ngan Nguyen Le
, Dat Son Nguyen:
Wireless sensing modules for rural monitoring and precision agriculture applications. 107-123
Volume 2, Number 2, 2018
- Notice of duplicate publication. 125
- Hai Vu, Thi-Lan Le, Van Giap Nguyen, Tan Hung Dinh:
Semantic regions segmentation using a spatio-temporal model from an UAV image sequence with an optimal configuration for data acquisition. 126-146 - Hong Hai Le, Ngoc-Hoa Nguyen, Tri-Thanh Nguyen:
Speeding up and enhancing a large-scale fingerprint identification system on GPU. 147-162 - Basabi Chakraborty, Atsushi Kawamura:
A new penalty-based wrapper fitness function for feature subset selection with evolutionary algorithms. 163-180 - Dragan Lambic
:
S-box design method based on improved one-dimensional discrete chaotic map. 181-191 - Leslie F. Sikos
:
VidOnt: a core reference ontology for reasoning over video scenes. 192-204 - Mehmet Sarigul
, Mutlu Avci
:
Performance comparison of different momentum techniques on deep reinforcement learning. 205-216 - Joanna Jedrzejowicz
, Robert Kostrzewski, Jakub Neumann
, Magdalena Zakrzewska:
Imbalanced data classification using MapReduce and relief. 217-230
Volume 2, Number 3, 2018
- Faisal Mohammed Nafie Ali, Abdelmoneim Ali Mohamed Hamed:
Usage Apriori and clustering algorithms in WEKA tools to mining dataset of traffic accidents. 231-245 - Doan Duy
, Kiyofumi Tanaka:
Enhanced virtual release advancing algorithm for real-time task scheduling. 246-264 - Nguyen Mau Toan, Yasushi Inoguchi:
Audio fingerprint hierarchy searching strategies on GPGPU massively parallel computer. 265-290 - Mare Koit
:
Reasoning and communicative strategies in a model of argument-based negotiation. 291-304 - Amy Hamijah Ab. Hamid, Mohd Zaidi Abd Rozan, Roliana Ibrahim, Safaai Deris, Ali Selamat
, Muhd. Noor Muhd Yunus:
Requirements engineering of Malaysian radiological medical emergency response simulator. 305-321 - Jacek Grekow:
Audio features dedicated to the detection and tracking of arousal and valence in musical compositions. 322-333 - Omar Sami Thiab, Lukasz Nogal
, Ryszard Kowalik:
Adaptive phasor estimation technique during off-nominal frequency for numerical relays. 334-346 - Gozde Ozsert Yigit, Buse Melis Özyildirim
:
Comparison of convolutional neural network models for food image classification. 347-357
Volume 2, Number 4, 2018
- Yasuhiro Ogawa, Makoto Nakamura, Tomohiro Ohno, Katsuhiko Toyama:
Extraction of legal bilingual phrases from the Japanese Official Gazette, English Edition. 359-373 - Daiki Kurita, Boonsita Roengsamut, Kazuhiro Kuwabara, Hung-Hsuan Huang:
Simulating gamified crowdsourcing of knowledge base refinement: effects of game rule design. 374-391 - Siamak Dehghanpour, Akbar Esfahanipour
:
Dynamic portfolio insurance strategy: a robust machine learning approach. 392-410 - Kambiz Badie
, Nasrin Asadi
, Maryam Tayefeh Mahmoudi:
Zone identification based on features with high semantic richness and combining results of separate classifiers. 411-427 - Grzegorz Kolaczek, Jolanta Mizera-Pietraszko
:
Security framework for dynamic service-oriented IT systems. 428-448 - Tomasz Xieski
, Roman Siminski:
Backward chaining inference as a database stored procedure - the experiments on real-world knowledge bases. 449-464 - Emmanuel Okafor, Lambert Schomaker
, Marco A. Wiering
:
An analysis of rotation matrix and colour constancy data augmentation in classifying images of animals. 465-491 - Konstantinos Demertzis
, Lazaros S. Iliadis, Vardis-Dimitris Anezakis
:
Extreme deep learning in biosecurity: the case of machine hearing for marine species identification. 492-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.