JOURNAL OF COMPUTERS Vol. 32 No. 1 February 2021
0. |
Contents and cover
|
1. | Towards Understanding Bugs in WSN Applications Jing-Jing Zhao, Yu-Xia Sun, Qi Deng, Ming Cheng, Qing-Xuan Kuang full article
|
2. | 2D Phase Unwrapping Method Based on Minimum Balanced Trees of Dual Residues Jian Gao, Rui Cheng, Yi-Xiang Chen, Chang Jiang full article
|
3. | Research of HMM-Based Fall Detection System for Elderly Wei-Jian Xu, Yi-Feng Zhao, Wei-Nan Cao, Wei-Che Chien full article
|
4. | An Information Security Protocol for Automotive Ethernet Chu-Ting Wang, Gui-He Qin, Rui Zhao, Shi-Min Song full article
|
5. | Ghost Suppression Algorithm Based on TFDT Modeling Guo-Liang Xu, Hang Zhou, Liang-You Yuan full article
|
6. | Behaviour Classification of Cyber Attacks Using Convolutional Neural Networks Wen-Hui Lin, Ping Wang, Hsiao-Chung Lin, Bao-Hua Wu, Jeng-Ying Tsai full article
|
7. | A Fast Clustering Method for Real-Time IoT Data Streams Jing Sun, Xin Yao full article
|
8. | Using Deep Learning to Track Stray Animals with Mobile Device Rung-Ching Chen, Qiao-En Liu, Chung-Yen Liao full article
|
9. | A Wearable Embedded System for Assisting Cognition of Visually Impaired People by Street Scene Description Feng-Cheng Lin, Shou-Jin She, Huu-Huy Ngo, Chyi-Ren Dow, Fang-Rong Hsu full article
|
10. | Using Cloud-based IoT Technology for Wireless Medical Care Monitor System Hong-Ling Liu, Ruey-Shun Chen, Gang ke, Yu-Xi Hu, Rong Lu, Jianxin Li full article
|
11. | CPS-Based Smart Manufacturing: Integration of Sawing and Punching for Aluminum Profile L-B. Lin, R. Yang, D-B. Zhang, H. Qin, D-W. Wu full article
|
12. | Network Security Situation Prediction Method Based on Support Vector Machine Optimized by Artificial Bee Colony Algorithms Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh full article
|
13. | An Innovative Teaching Application and Research of the Game-Based Learning in the Game Design Essentials Course Hui-Chen Tsai, Hsiao-Chin Jen full article
|
14. | A Mixed-Methods Approach to Explore Users¡¦ Behavior in Playing Mobile Games Tung-Lin Chuang full article
|
15. | The Effects of a Self-designed Tabletop Game and Learning Achievement Kai-Ming Yang, Lai-Chung Lee, Chingya Chiu full article
|
16. | Using Web Service Middleware to Smart Smart Multi-Test System in CMOS Image Sensing Devices Dongsheng Cheng, Ruey-Shun Chen, Huiyu Zhang, Zhiyu Zhang full article
|
17. | Using AHP-Entropy Approach to Investigate the Key Factors on FinTech Service Can Xu full article |
18. | Sales Forecasting of Promotion Activities Based on the Cross-Industry Standard Process for Data Mining of E-commerce Promotional Information and Support Vector Regression Yiman Zhang full article |
19. | Multi-objective River Ecological Dispatching Algorithms Using NSGA-III Wenjuan Zhang, Yingping Huang full article |
20. | Method of 3D Vehicle Object Detection Based on Improved VoxelNet Yi-Fan Zhao, Shao-Bo Wu, Shi-Peng Dong full article |