default search action
Journal of Electrical and Computer Engineering, Volume 2016
Volume 2016, 2016
- Dong Yang
, Shiyin Qin:
Restoration of Partial Blurred Image Based on Blur Detection and Classification. 2374926:1-2374926:12 - Fatma Khammar, Nasr E. eddine Debbache:
Application of Artificial Intelligence Techniques for the Control of the Asynchronous Machine. 8052027:1-8052027:11 - Giuseppe Faraci, Alfio Lombardo
, Giovanni Schembra
:
A Processor-Sharing Scheduling Strategy for NFV Nodes. 3583962:1-3583962:10 - Özge Cepheli, Saliha Büyükçorak, Günes Karabulut-Kurt
:
Hybrid Intrusion Detection System for DDoS Attacks. 1075648:1-1075648:8 - Chuanlei Zhang, Shanwen Zhang, Weidong Fang:
Plant Leaf Recognition through Local Discriminative Tangent Space Alignment. 1989485:1-1989485:5 - Jia-Ning Luo
, Ming-Hour Yang:
Analysis and Improvement of Key Distribution Scheme for Secure Group Communication. 2750268:1-2750268:7 - Yingying Bi, Thomas Shunrong Shen, Jing Jin, Ke Wang
, Leonid G. Kazovsky:
Remotely Powered and Reconfigured Quasi-Passive Reconfigurable Nodes for Optical Access Networks. 2938415:1-2938415:10 - Shanxiong Chen, Maoling Pen, Hailing Xiong, Yu Xianping:
SVM Intrusion Detection Model Based on Compressed Sampling. 3095971:1-3095971:6 - Roberto Bruschi
, Alessandro Carrega
, Franco Davoli
:
A Game for Energy-Aware Allocation of Virtualized Network Functions. 4067186:1-4067186:10 - Xiankun Zhang, Xin-ya Gao, Qian Zhang, Jia Jia:
Research on the Rough Extension of Ontology Description Language of SWRL. 5636254:1-5636254:8 - Gang Pan
, Di Sun
, Yarui Chen
, Chuanlei Zhang
:
Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion. 5683632:1-5683632:8 - Lincong Zhang, Lei Guo, Yejun Liu, Kefeng Wei, Weigang Hou:
A Multicast-Traffic-Oriented Energy-Saving Algorithm with a Hybrid Sleep Mode for EPONs. 6785752:1-6785752:10 - Hongyu Yang
, Ruiwen Tang
:
Power Consumption Based Android Malware Detection. 6860217:1-6860217:6 - Yongfeng Dong, Jingyu Liu
, Yan Jie, Hongpu Liu, Youxi Wu:
HS-RAID2: Optimizing Small Write Performance in HS-RAID. 7341735:1-7341735:8 - Diego Santoro, Michele Vadursi:
Performance Analysis of a DEKF for Available Bandwidth Measurement. 7538108:1-7538108:8 - Yong Jin, Chaobo Yan, James Nightingale:
Cognition Cloud Model for Next Generation Mobile Internet: Communication, Control, and Application. 7578298:1-7578298:2 - Zhenshu Wang
, Xiaohui Jiang, Shaorun Bian, Yangyang Ma, Bowen Fan:
Accurate Load Modeling Based on Analytic Hierarchy Process. 7626847:1-7626847:11 - Chao Liu Bang, Shan Juan Xie, Dong Sun Park:
Finger Vein Recognition Using Optimal Partitioning Uniform Rotation Invariant LBP Descriptor. 7965936:1-7965936:10 - Oscar Somarriba Jarquín
, Urko Zurutuza
, Roberto Uribeetxeberria, Laurent Delosières, Simin Nadjm-Tehrani:
Detection and Visualization of Android Malware Behavior. 8034967:1-8034967:17 - Yiying Zhang, Suxiang Zhang, Yuemin Ding
:
Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid. 8252901:1-8252901:12 - Yevhen Zolotavkin, Martti Juhola:
A New Scalar Quantization Method for Digital Image Watermarking. 9029745:1-9029745:16 - Jianhua Cao, Xiankun Zhang, Yan Wang, Qi Zhao:
Subsurface Geobody Imaging Using CMY Color Blending with Seismic Attributes. 9181254:1-9181254:7 - Kefei Mao
, Jianwei Liu, Jie Chen:
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS. 1905872:1-1905872:14 - Xihai Zhang, Junlong Fang, Fanfeng Meng:
An Efficient Node Localization Approach with RSSI for Randomly Deployed Wireless Sensor Networks. 2080854:1-2080854:11 - Michele Vadursi
, Andrea Ceccarelli
, Elias P. Duarte Jr., Aniket Mahanti
:
System and Network Security: Anomaly Detection and Monitoring. 2093790:1-2093790:2 - Guohua Wang, Ying-bao Geng:
Fast Direct Solution of Electromagnetic Scattering from Left-Handed Materials Coated Target over Wide Angle. 2108586:1-2108586:7 - Xiushan Wu, Yanzhi Wang, Siguang An, Jianqiang Han, Ling Sun:
A Four Quadrature Signals' Generator with Precise Phase Adjustment. 2138794:1-2138794:6 - Xinyue Cao, Zhangjie Fu, Xingming Sun:
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing. 3219042:1-3219042:7 - Qing Zhao, Congcong Xiong, Peng Wang:
Heuristic Data Placement for Data-Intensive Applications in Heterogeneous Cloud. 3516358:1-3516358:8 - Yongfeng Dong
, Hongmei Xiao
, Yancong Zhou
:
Disordered and Multiple Destinations Path Planning Methods for Mobile Robot in Dynamic Environment. 3620895:1-3620895:10 - Vincenzo Eramo
, Xavier Hesselbach-Serra, Yan Luo, Juan Felipe Botero
:
Design of High Throughput and Cost-Efficient Data Center Networks. 4695185:1-4695185:2 - Vineet Kumar
, Abhijit R. Asati
, Anu Gupta
:
A Novel Edge-Map Creation Approach for Highly Accurate Pupil Localization in Unconstrained Infrared Iris Images. 4709876:1-4709876:10 - Zahid Akhtar
, Gian Luca Foresti:
Face Spoof Attack Recognition Using Discriminative Image Patches. 4721849:1-4721849:14 - Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. 5212314:1-5212314:13 - Franco Callegati
, Walter Cerroni
, Chiara Contoli
:
Virtual Networking Performance in OpenStack Platform for Network Function Virtualization. 5249421:1-5249421:15 - Feng Wang, Jianping Zhang, Guiling Sun, Tianyu Geng:
Iterative Forward-Backward Pursuit Algorithm for Compressed Sensing. 5940371:1-5940371:7 - Yu Lu, Wei Wu, Keyi Wang:
High-Speed Transmission and Mass Data Storage Solutions for Large-Area and Arbitrarily Structured Fabrication through Maskless Lithography. 6074791:1-6074791:7 - Elena Lisova
, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, Mats Björkman:
Protecting Clock Synchronization: Adversary Detection through Network Monitoring. 6297476:1-6297476:13 - Yeison Alberto Garcés-Gómez
, Nicolás Toro García
, Fredy Edimer Hoyos Velasco:
New Application's Approach to Unified Power Quality Conditioners for Mitigation of Surge Voltages. 6384390:1-6384390:8 - Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. 6567146:1-6567146:14 - Sead Muftic, Nazri bin Abdullah, Ioannis Kounelis:
Business Information Exchange System with Security, Privacy, and Anonymity. 7093642:1-7093642:10 - Vincenzo Eramo
, Alessandro Tosti, Emanuele Miucci:
Server Resource Dimensioning and Routing of Service Function Chain in NFV Network Architectures. 7139852:1-7139852:12 - Liang Wang, Mei Wang, Xinying Guo, Xuebin Qin:
Microblog Sentiment Orientation Detection Using User Interactive Relationship. 7282913:1-7282913:6 - Jian Zhou, Canyan Zhu:
Compensatory Analysis and Optimization for MADM for Heterogeneous Wireless Network Selection. 7539454:1-7539454:9 - Jinfeng Yang, Zhen Zhong
, Guimin Jia, Yanan Li:
Spatial Circular Granulation Method Based on Multimodal Finger Feature. 7913170:1-7913170:7 - Myeong-Eun Hwang, Sungoh Kwon
:
DPFFs: C2MOS Direct Path Flip-Flops for Process-Resilient Ultradynamic Voltage Scaling. 8268917:1-8268917:10 - Jianzheng Liu, Chunlin Fang, Chao Wu:
A Fusion Face Recognition Approach Based on 7-Layer Deep Learning Neural Network. 8637260:1-8637260:7 - Li-Xia Xie, Chong Wang:
Cloud Multidomain Access Control Model Based on Role and Trust-Degree. 9820590:1-9820590:8 - Manh Cong Tran
, Yasuhiro Nakamura:
Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software. 2017373:1-2017373:11 - Jucheng Yang
, Hui Cheng, Sook Yoon, Anthony T. S. Ho, Weiming Zeng:
Advanced Information Technology Convergence. 2901835:1-2901835:2 - Li Yang, Chang Xia
, Chang Juan:
Image Edge Detection Based on Gaussian Mixture Model in Nonsubsampled Contourlet Domain. 4125909:1-4125909:10 - Jing-pei Wang
, Jie Liu:
The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios. 4361719:1-4361719:10 - Chang-Jun Zha
, Yao Li, Jinyao Gui, Huimin Duan, Tai-Long Xu:
Compressive Imaging of Moving Object Based on Linear Array Sensor. 4560642:1-4560642:6 - Radhey Shyam
, Yogendra Narain Singh
:
Multialgorithmic Frameworks for Human Face Recognition. 4645971:1-4645971:9 - Md. Jaminul Haque Biddut
, Nazrul Islam
, Md. Maksudul Karim, Mohammad Badrul Alam Miah
:
An Analysis of QoS in ZigBee Network Based on Deviated Node Priority. 6254395:1-6254395:8 - Yasmin Mahmoud Amin
, Amr Talaat Abdel-Hamid:
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks. 7165952:1-7165952:12 - Rui Du, Yangyu Fan, Jianshu Wang:
Design of Fixed Wideband Beamformer through Improved Maximum Energy Approach. 7912364:1-7912364:7 - Daniel Castillo, Olga Ramos
:
Augmented Reality for Assistance of Total Knee Replacement. 9358369:1-9358369:6 - Hesheng Cheng
, Huakun Zhang:
Investigation of Improved Methods in Power Transfer Efficiency for Radiating Near-Field Wireless Power Transfer. 2136923:1-2136923:11 - Yuansheng Huang
, Shenhai Huang
, Jiayin Song
:
A Novel Hybrid Method for Short-Term Power Load Forecasting. 2165324:1-2165324:10 - Zhongpeng Wang
, Shoufa Chen:
A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems. 2326563:1-2326563:7 - Yanfei Jia
, Xiaodong Yang
:
Adaptive Complex-Valued Independent Component Analysis Based on Second-Order Statistics. 2467198:1-2467198:7 - Shu-Ying Wang, Jian-Feng Zhao
, Xian-Feng Li, Li-Tao Zhang
:
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization. 4138654:1-4138654:14 - Xueyuan Hao
, Xiaohong Yan:
Two Improved Cancellation Techniques for Direct-Conversion Receivers. 4253125:1-4253125:7 - Farman Ali Mangi
, Shaoqiu Xiao
, Ghulam Ali Mallah, Deedar Ali Jamro, Imran Memon
, Ghulam Fatima Kakepoto:
Multiband Circular Polarizer Based on Fission Transmission of Linearly Polarized Wave for X-Band Applications. 4293089:1-4293089:8 - Mazdak Zamani
, Isao Echizen, Arash Habibi Lashkari
:
Innovations in Communications Security. 4743084:1 - Aggeliki Vlachostergiou
, Georgios Stratogiannis, George Caridakis
, George Siolas, Phivos Mylonas
:
User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies. 4789803:1-4789803:20 - Jian Li, Yiming Fang
, Jiyong Tang
, Hai-Lin Feng, Xiong-wei Lou:
Development of Testing Platform and Comparison Studies for Wood Nondestructive Testing. 6279869:1-6279869:7 - Fang Liu
, Yongxin Feng
:
An Optimization Synchronization Algorithm for TDDM Signal. 6349341:1-6349341:7 - Huayang Li, Dehui Kong, Shaofan Wang
, Baocai Yin:
Hand Depth Image Denoising and Superresolution via Noise-Aware Dictionaries. 6587162:1-6587162:12 - Haijun Wang
, Hongjuan Ge, Shengyan Zhang:
Object Tracking via 2DPCA and ℓ2-Regularization. 7975951:1-7975951:7 - Deepak Bansal
, Anuroop Bajpai
, Prem Kumar
, Maninder Kaur, Kamal Jit Rangra
:
Low Actuating Voltage Spring-Free RF MEMS SPDT Switch. 7984548:1-7984548:7 - Noushin Ghaderi
, Hamid Reza Erfani Jazi
, Mehdi Mohseni-Mirabadi:
A Low Noise, Low Power Phase-Locked Loop, Using Optimization Methods. 8202581:1-8202581:9 - Malgorzata Michalska
, Nicolas Zufferey, Marco Mattavelli:
Performance Estimation Based Multicriteria Partitioning Approach for Dynamic Dataflow Programs. 8536432:1-8536432:15 - Yun Huang
:
A Novel Method for Constructing Grid Multi-Wing Butterfly Chaotic Attractors via Nonlinear Coupling Control. 9143989:1-9143989:9 - Jie Huang, Chin-Tser Huang
:
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. 9859830:1-9859830:12 - Xin Liu
, Tong Chen
, Guoqiang Xie, Guangyuan Liu
:
Contact-Free Cognitive Load Recognition Based on Eye Movement. 1601879:1-1601879:8 - Zhihao Wang
, Junfang Wang, Yonghua Huo, Yanjun Tuo, Yang Yang
:
A Searching Method of Candidate Segmentation Point in SPRINT Classification. 2168478:1-2168478:5 - Yuntao Zhao
, Hengchi Liu, Yongxin Feng
:
An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy. 2579274:1-2579274:5 - Johannes Jordan
, Elli Angelopoulou, Andreas K. Maier
:
A Novel Framework for Interactive Visualization and Analysis of Hyperspectral Image Data. 2635124:1-2635124:17 - Zhicheng Lu, Zhizheng Liang
:
A Complete Subspace Analysis of Linear Discriminant Analysis and Its Robust Implementation. 3919472:1-3919472:10 - Valentin Smirnov
, Dmitry Ignatov, Michael Gusev, Mais P. Farkhadov
, Natalia Rumyantseva, Mukhabbat Farkhadova
:
A Russian Keyword Spotting System Based on Large Vocabulary Continuous Speech Recognition and Linguistic Knowledge. 4062786:1-4062786:9 - Francesca Palumbo
, Tiziana Fanni
, Carlo Sau
, Paolo Meloni, Luigi Raffo
:
Modelling and Automated Implementation of Optimal Power Saving Strategies in Coarse-Grained Reconfigurable Architectures. 4237350:1-4237350:27 - Bo Zhang
, Rong Qi, Hui Lin, Julius K. Mwaniki
:
A Model for Analyzing a Five-Phase Fractional-Slot Permanent Magnet Tubular Linear Motor with Modified Winding Function Approach. 4501046:1-4501046:13 - Lei Lei, Kun She
:
Speaker Recognition Using Wavelet Cepstral Coefficient, I-Vector, and Cosine Distance Scoring and Its Application for Forensics. 4908412:1-4908412:11 - Jessada Karnjana
, Masashi Unoki
, Pakinee Aimmanee, Chai Wutiwiwatchai:
Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self-Synchronization. 5067313:1-5067313:15 - Shu Fan
, Honglin Zhao
:
Cross-Layer Control with Worst Case Delay Guarantees in Multihop Wireless Networks. 5762851:1-5762851:10 - Chengchang Zhang
, Lihong Zhang
:
Intermediate Frequency Digital Receiver Based on Multi-FPGA System. 6123832:1-6123832:8 - Juha Partala
, Angelos Fylakis
, Anu Pramila
, Anja Keskinarkaus
, Tapio Seppänen
:
Improving Robustness of Biometric Identity Determination with Digital Watermarking. 6390741:1-6390741:9 - Xiumei Guo
, Weidong Zhou:
A Novel Dictionary Learning Model with PT-HLBP for Palmprint Recognition. 6423834:1-6423834:7 - Peng Du, Yuan Zhang
:
Joint Radio Resource Allocation and Base Station Location Selection in OFDMA Based Private Wireless Access Networks for Smart Grid. 7948018:1-7948018:13 - Marius Miron
, Julio J. Carabias-Orti
, Juan J. Bosch, Emilia Gómez, Jordi Janer:
Score-Informed Source Separation for Multichannel Orchestral Recordings. 8363507:1-8363507:19 - M. Sabbaghpur Arani, Maryam A. Hejazi
:
The Comprehensive Study of Electrical Faults in PV Arrays. 8712960:1-8712960:10 - Keerti Tiwari
, Davinder S. Saini, Sunil V. Bhooshan
:
On the Capacity of MIMO Weibull-Gamma Fading Channels in Low SNR Regime. 9304597:1-9304597:8 - Daniel G. Costa
, Cristian Duran-Faundez
:
Assessing Availability in Wireless Visual Sensor Networks Based on Targets' Perimeters Coverage. 9312439:1-9312439:14 - Branimir Jaksic
, Mihajlo C. Stefanovic, Danijela Aleksic, Dragan Radenkovic, Sinisa Minic
:
First-Order Statistical Characteristics of Macrodiversity System with Three Microdiversity MRC Receivers in the Presence of κ-μ Short-Term Fading and Gamma Long-Term Fading. 9689586:1-9689586:9 - Vasilisa Verkhodanova
, Vladimir Shapranov
:
Experiments on Detection of Voiced Hesitations in Russian Spontaneous Speech. 2013658:1-2013658:8 - R. Sarjila
, Kuppan Ravi
, J. Belwin Edward
, K. Sathish Kumar
, Avagaddi Prasad
:
Parameter Extraction of Solar Photovoltaic Modules Using Gravitational Search Algorithm. 2143572:1-2143572:6 - Hong Tang
, Ting Li, Tianshuang Qiu
, Yongwan Park:
Fetal Heart Rate Monitoring from Phonocardiograph Signal Using Repetition Frequency of Heart Sounds. 2404267:1-2404267:6 - Nehal N. Shah
, Harikrishna Singapuri, Upena D. Dalal:
Hardware Efficient Architecture with Variable Block Size for Motion Estimation. 5091519:1-5091519:11 - Amar Sharma
, Puneet Khanna
, Kshitij Shinghal
, Arun Kumar:
Design of CPW-Fed Antenna with Defected Substrate for Wideband Applications. 6546481:1-6546481:10 - Cairong Zou, Xinran Zhang
, Cheng Zha, Li Zhao:
A Novel DBN Feature Fusion Model for Cross-Corpus Speech Emotion Recognition. 7437860:1-7437860:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.