1.
|
Mao-Hsiung Hung, Qian Chen, and Yi Chen
A Review of Handling Continuous and Unknown Attribute Values of C4.5 Algorithm
Journal of Network Intelligence, Vol. 3, No. 1, pp. 1-8, Feb 2018.
|
2.
|
Chunlei Fan and Qun Ding
ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher
Journal of Network Intelligence, Vol. 3, No. 1, pp. 9-15,
Feb 2018.
|
3.
|
Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, and John F. Roddick
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review
Journal of Network Intelligence, Vol. 3, No.
1, pp. 16-25, Feb 2018.
|
4.
|
Shangguan Hong, Anhong Wang, Xiong Zhang, and Zhiguo Gui
Low-Dose CT Image Processing Using Artifact Suppressed Total Generalized Variation
Journal of Network Intelligence, Vol. 3, No. 1, pp. 26-49, Feb 2018.
|
5.
|
Yung-Fa Huang and Chung-Hsin Hsu
Energy Efficiency of Dynamically Distributed Clustering Routing for Naturally Scattering Wireless Sensor Networks
Journal of Network Intelligence, Vol. 3, No. 1, pp. 50-57, Feb 2018.
|
6.
|
Gwo-Jiun Horng, Tun-Yu Chang, and Hsin-Te Wu
The Adaptive Node-Selection Mechanism Scheme in Solar-Powered Wireless Sensor Networks
Journal of Network Intelligence, Vol. 3, No. 1, pp. 58-73, Feb 2018.
|