You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Editorial
  • Open Access

18 January 2019

Editorial of Special Issue “Information Technology and Its Applications”

Department of Information Management, Chaoyang University of Technology, 168, Jifeng East Road, Wufeng District, Taichung 41349, Taiwan
This article belongs to the Special Issue Information Technology and Its Applications
This book contains the successful invited submissions [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15] to a special issue of Symmetry on the subject area of ‘Information Technology and Its Applications’.
This special issue aims to provide a forum for presentations and discussions of the recent methodological advances in information technology and its applications. The special issue covers pure research and applications within novel scopes related to multimedia, such as image-related techniques image retrieval, and multimedia applications. In addition, it deals with information technologies, such as information hiding, IOT, cloud computing and so on.
This special issue includes the novel techniques and tools for information technology and its applications, such as:
  • Multimedia Applications
  • Image Related
  • Information Hiding
  • Pattern Recognition
  • IOT
  • Cloud Computing
  • Machine Learning
  • Data Mining
  • Neural Network
  • Distributed Systems
  • Software Engineering
  • Bio-informatics
  • Information Technology Related Issues
The response to our call had the following statistics:
  • Submissions (49);
  • Publications (15);
  • Rejections (34);
  • Article types: Research Article (15);
The geographical distribution of our authors (published papers) is:
  • Taiwan (7)
  • China (6)
  • USA (1)
  • Poland (1)
Published submissions are related to neural network, security, information hiding, multimedia applications, software engineering, machine learning and so on.
We found the edition and selections of papers for this book very inspiring and rewarding. We also thank the editorial staff and reviewers for their efforts and help during the process.

References

  1. Chang, C.-C.; Lu, T.-C.; Zhu, Z.-H.; Tian, H. An Effective Authentication Scheme Using DCT for Mobile Devices. Symmetry 2018, 10, 13. [Google Scholar] [CrossRef]
  2. Liu, B.; Zhang, Y.; He, D.; Li, Y. Identification of Apple Leaf Diseases Based on Deep Convolutional Neural Networks. Symmetry 2018, 10, 11. [Google Scholar] [CrossRef]
  3. Yao, H.; Song, S.; Qin, C.; Tang, Z.; Liu, X. Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks. Symmetry 2017, 9, 313. [Google Scholar] [CrossRef]
  4. Liu, W.-L.; Leng, H.-S.; Huang, C.-K.; Chen, D.-C. A Block-Based Division Reversible Data Hiding Method in Encrypted Images. Symmetry 2017, 9, 308. [Google Scholar] [CrossRef]
  5. Chang, Y.-F.; Tai, W.-L.; Hsu, M.-H. A Secure Mobility Network Authentication Scheme Ensuring User Anonymity. Symmetry 2017, 9, 307. [Google Scholar] [CrossRef]
  6. Wang, S.-Y.; Yang, S.-H.; Chen, Y.-P.; Huang, J.-W. Face Liveness Detection Based on Skin Blood Flow Analysis. Symmetry 2017, 9, 305. [Google Scholar] [CrossRef]
  7. Cheng, C.-H.; Liu, W.-X. An Appraisal Model Based on a Synthetic Feature Selection Approach for Students’ Academic Achievement. Symmetry 2017, 9, 282. [Google Scholar] [CrossRef]
  8. Li, Y.; Li, Y.; Chen, X.; Yu, J. Denoising and Feature Extraction Algorithms Using NPE Combined with VMD and Their Applications in Ship-Radiated Noise. Symmetry 2017, 9, 256. [Google Scholar] [CrossRef]
  9. Lu, T.-C.; Leng, H.-S. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique. Symmetry 2017, 9, 223. [Google Scholar] [CrossRef]
  10. Guo, Y.; Wang, M.; Li, X. An Interactive Personalized Recommendation System Using the Hybrid Algorithm Model. Symmetry 2017, 9, 216. [Google Scholar] [CrossRef]
  11. Połap, D.; Woz’niak, M. Polar Bear Optimization Algorithm: Meta-Heuristic with Fast Population Movement and Dynamic Birth and Death Mechanism. Symmetry 2017, 9, 203. [Google Scholar] [CrossRef]
  12. Li, Y.-H.; Wang, J.-Q.; Wang, X.-J.; Zhao, Y.-L.; Lu, X.-H.; Liu, D.-L. Community Detection Based on Differential Evolution Using Social Spider Optimization. Symmetry 2017, 9, 183. [Google Scholar] [CrossRef]
  13. Ai, Q.; Zhang, Y.; Qi, W.; Liu, Q.; Chen, K. Research on Lower Limb Motion Recognition Based on Fusion of sEMG and Accelerometer Signals. Symmetry 2017, 9, 147. [Google Scholar] [CrossRef]
  14. Tsai, Y.-T.; Wang, S.-C.; Yan, K.-Q.; Chang, C.-M. Precise Positioning of Marketing and Behavior Intentions of Location-Based Mobile Commerce in the Internet of Things. Symmetry 2017, 9, 139. [Google Scholar] [CrossRef]
  15. Wang, D.; Zhao, C.; Kong, J. The Fusion of an Ultrasonic and Spatially Aware System in a Mobile-Interaction Device. Symmetry 2017, 9, 137. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.