Volume 3, Number 1
1.


Mao-Hsiung Hung, Qian Chen, and Yi Chen
A Review of Handling Continuous and Unknown Attribute Values of C4.5 Algorithm
Journal of Network Intelligence, Vol. 3, No. 1, pp. 1-8, Feb 2018.

2.


Chunlei Fan and Qun Ding
ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher
Journal of Network Intelligence, Vol. 3, No. 1, pp. 9-15, Feb 2018.

3.


Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, and John F. Roddick
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review
Journal of Network Intelligence, Vol. 3, No. 1, pp. 16-25, Feb 2018.

4.


Shangguan Hong, Anhong Wang, Xiong Zhang, and Zhiguo Gui
Low-Dose CT Image Processing Using Artifact Suppressed Total Generalized Variation
Journal of Network Intelligence, Vol. 3, No. 1, pp. 26-49, Feb 2018.

5.


Yung-Fa Huang and Chung-Hsin Hsu
Energy Efficiency of Dynamically Distributed Clustering Routing for Naturally Scattering Wireless Sensor Networks
Journal of Network Intelligence, Vol. 3, No. 1, pp. 50-57, Feb 2018.

6.


Gwo-Jiun Horng, Tun-Yu Chang, and Hsin-Te Wu
The Adaptive Node-Selection Mechanism Scheme in Solar-Powered Wireless Sensor Networks
Journal of Network Intelligence, Vol. 3, No. 1, pp. 58-73, Feb 2018.