column
Guest Editorial:Special Issue on Information Security and Applications
Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai
2017, 15(3): 209-210. DOI: 10.11989/JEST.1674-862X.60804019
Abstract PDF
Study of Difference-Expansion Embedding Schemes
Ke Mao, Chin-Feng Lee, Chin-Cheng Chang, Run-Hua Shi
2017, 15(3): 211-216. DOI: 10.11989/JEST.1674-862X.60806019
Abstract PDF
Dual Image Reversible Data Hiding by Modifying Least-Significant-Bit Matching Revisited Rules
Chi-Shiang Chan, Chao-Liang Liu, Yuan-Yu Tsai
2017, 15(3): 217-221. DOI: 10.11989/JEST.1674-862X.60804042
Abstract PDF
(r, QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng
2017, 15(3): 222-230. DOI: 10.11989/JEST.1674-862X.60804020
Abstract PDF
Developments and Applications of Data Deidentification Technology under Big Data
Hung-Li Chen, Yao-Tung Tsou, Bo-Chen Tai, Szu-Chuang Li, Yen-Nun Huang, Chia-Mu Yu, Yu-Shian Chiu
2017, 15(3): 231-239. DOI: 10.11989/JEST.1674-862X.60804064
Abstract PDF
Secure and Efficient Mutual Authentication Scheme for NFC Mobile Devices
You-Han Tung, Wen-Shenq Juang
2017, 15(3): 240-245. DOI: 10.11989/JEST.1674-862X.60804031
Abstract PDF
Static and Dynamic Integrated Analysis Scheme for Android Malware
Chun-Hao Yung, Wen-Shenq Juang
2017, 15(3): 246-250. DOI: 10.11989/JEST.1674-862X.60804053
Abstract PDF
Gender Classification Based on Multi-Scale and Run-Length Features
Sheng-Hung Wang, Chih-Yang Lin, Jing-Tong Fu
2017, 15(3): 251-257. DOI: 10.11989/JEST.1674-862X.60608011
Abstract PDF
Guest Editorial: TTA Special Section on Terahertz Devices
Qi-Jie Wang
2017, 15(3): 258-258. DOI: 10.11989/JEST.1674-862X.6120526
Abstract PDF
Local Field Enhancement Tuning of Horseshoe-Shaped Nanoparticles
Zhi-Yuan Du, Bin Hu, Fei-Long Ma, Juan Liu
2017, 15(3): 259-262. DOI: 10.11989/JEST.1674-862X.6051810
Abstract PDF
0.22 THz Waveguide Bandpass Filter with High Stop-Band Suppression
Meng-Juan Zhao, Yong Zhang, Shuang Liu
2017, 15(3): 263-266. DOI: 10.11989/JEST.1674-862X.6080911
Abstract PDF
345 GHz Band-Pass Filter Using Ultra-Precision Machining Technology
Yu-Kun Li, Yong Zhang, Cai-Jie Ai
2017, 15(3): 267-270. DOI: 10.11989/JEST.1674-862X.6080922
Abstract PDF
Relay Selection Strategy in the Secure Cooperative Communications System
Hsin-Ying Liang, Cheng-Ying Yang, Wei-Liang Wu
2017, 15(3): 271-276. DOI: 10.11989/JEST.1674-862X.60311012
Abstract PDF
Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters
Ze-Jun Jiang, Zhi-Ke Zhang, Li-Fang Wang, Chin-Chen Chang, Li Liu
2017, 15(3): 277-282. DOI: 10.11989/JEST.1674-862X.60613017
Abstract PDF
Improved Bacterial Foraging Optimization Algorithm Based on Fuzzy Control Rule Base
Cui-Cui Du, Xu-Gang Feng, Jia-Yan Zhang
2017, 15(3): 283-288. DOI: 10.11989/JEST.1674-862X.6101019
Abstract PDF
Cost Sensitive Multi-Granulation Preference Relation Rough Set for Ordinal Decision System
Wei Pan, Kun She
2017, 15(3): 289-302. DOI: 10.11989/JEST.1674-862X.6061913
Abstract PDF
Optimal Deployment Patterns for k-Coverage and k-Connectivity 3D WSNs in Underground Tunnel
Wang-Sheng Fang, Gao-Xiang Lei, Zhong-Dong Hu, Jin Li
2017, 15(3): 303-312. DOI: 10.11989/JEST.1674-862X.6011413
Abstract PDF
Method for Analog Circuit Soft-Fault Diagnosis and Parameter Identification Based on Indictor of Phase Deviation and Spectral Radius
Qi-Zhong Zhou, Yong-Le Xie
2017, 15(3): 313-323. DOI: 10.11989/JEST.1674-862X.6123013
Abstract PDF