default search action
Journal of Multimedia Information System, Volume 3
Volume 3, Number 2, June 2016
- Vincentius Timothy, Ary Setijadi Prihatmanto, Kyung-Hyune Rhee:
R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data. 1-8 - Md. Israfil Ansari, Jaechang Shim:
Human Gender and Motion Analysis with Ellipsoid and Logistic Regression Method. 2-9 - Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication. 13-20 - Tatsuto Murayama, Peter Davis:
Noisy Data Aggregation with Independent Sensors: Insights and Open Problems. 21-26 - Junho Huh:
Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students. 27-34 - Ahmed Shdefat, Moonil Joo, Heecheol Kim:
A Method of Analyzing ECG to Diagnose Heart Abnormality utilizing SVM and DWT. 35-42 - Khojiakbar Egamberdiev:
Eyes and Lenses: A Comparison and Differences. 43-46
Volume 3, Number 3, September 2016
- Jenie Nam, Young Jae Kim, Seung Hyun Lee, Kwang Gi Kim:
Brain Hologram Visualization for Diagnosis of Tumors using Graphic Imaging. 47-52 - Taeho Jo:
Graph based KNN for Optimizing Index of News Articles. 53-62 - Lionel Nkenyereye, Jongwook Jang:
Design of Data Center Environmental Monitoring System Based On Lower Hardware Cost. 63-68 - Jun-Ho Huh, Dong-Geun Lee, Kyungryong Seo:
A Design of Base Technology for Airbag Actuation Checking Application Based on Mechanical Calculations for Old Container Vehicle. 69-76 - Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:
Shipboard Secret Electronic Voting System for Information and Communication Technology-isolated Ocean Crews. 77-84 - Zhi-Chao Cheng, Donghwoon Kwon, Chang-Hai Jin, Young-Jik Kwon:
A Study on C2B2C Business Integration Model Design Focusing On the Fashion Clothes Business. 85-90 - Thi-Thu-Huong Le, Jihyun Kim, Howon Kim:
Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection. 91-96 - Jin Lee, Kwang Jong Choi, Seong Jung Kim, Ji Eun Oh, Woong Bae Yoon, Kwang Gi Kim:
Breast Mass Classification using the Fundamental Deep Learning Approach: To build the optimal model applying various methods that influence the performance of CNN. 97-102 - Deresa Jang, Jin-bo Kim, Mi-Sun Kim, Jae-Hyun Seo:
Privacy of Capability Token in the IoT Service System. 103-110
Volume 3, Number 4, December 2016
- Joo Hyun Park, Soon-Bum Lim:
System Design and Service Scenario for the Second Screen Service. 111-118 - Yeunghak Lee, Jaechang Shim:
New Approach to Two-wheeler Detection using Correlation Coefficient based on Histogram of Oriented Gradients. 119-128 - Yuichiro Narahara, Shigeki Shiokawa:
Enhanced Dynamic Management of Mobile Agent in Location Based Routing. 129-134 - Aunee Azrina Zulkifli, Thong Huynh, Kaori Kuroda, Mikio Hasegawa:
Interference Coordination for Device-to-Device (D2D) under Multi-channel of Cellular Networks. 135-140 - Yuto Yoshida, Nobuyoshi Komuro, Jing Ma, Hiroo Sekiya:
Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks. 141-148 - Yuriko Yoshino, Masafumi Hashimoto, Naoki Wakamiya:
A Divided Scheduling Method based on Structural Characteristics in Wireless. 149-154 - Hiroki Matsushima, Hiroaki Kurokawa:
The Parameter Learning Method for Similar Image Rating Using Pulse Coupled Neural Network. 155-160 - Shohei Sugino, Hiroo Sekiya:
Power-Flow Simulator with Visualization Function Based on IEEE Common Data Format. 161-168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.