default search action
Journal of Electrical and Computer Engineering, Volume 2016
Volume 2016, 2016
- Dong Yang, Shiyin Qin:
Restoration of Partial Blurred Image Based on Blur Detection and Classification. 2374926:1-2374926:12 - Fatma Khammar, Nasr E. eddine Debbache:
Application of Artificial Intelligence Techniques for the Control of the Asynchronous Machine. 8052027:1-8052027:11 - Giuseppe Faraci, Alfio Lombardo, Giovanni Schembra:
A Processor-Sharing Scheduling Strategy for NFV Nodes. 3583962:1-3583962:10 - Özge Cepheli, Saliha Büyükçorak, Günes Karabulut-Kurt:
Hybrid Intrusion Detection System for DDoS Attacks. 1075648:1-1075648:8 - Chuanlei Zhang, Shanwen Zhang, Weidong Fang:
Plant Leaf Recognition through Local Discriminative Tangent Space Alignment. 1989485:1-1989485:5 - Jia-Ning Luo, Ming-Hour Yang:
Analysis and Improvement of Key Distribution Scheme for Secure Group Communication. 2750268:1-2750268:7 - Yingying Bi, Thomas Shunrong Shen, Jing Jin, Ke Wang, Leonid G. Kazovsky:
Remotely Powered and Reconfigured Quasi-Passive Reconfigurable Nodes for Optical Access Networks. 2938415:1-2938415:10 - Shanxiong Chen, Maoling Pen, Hailing Xiong, Yu Xianping:
SVM Intrusion Detection Model Based on Compressed Sampling. 3095971:1-3095971:6 - Roberto Bruschi, Alessandro Carrega, Franco Davoli:
A Game for Energy-Aware Allocation of Virtualized Network Functions. 4067186:1-4067186:10 - Xiankun Zhang, Xin-ya Gao, Qian Zhang, Jia Jia:
Research on the Rough Extension of Ontology Description Language of SWRL. 5636254:1-5636254:8 - Gang Pan, Di Sun, Yarui Chen, Chuanlei Zhang:
Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion. 5683632:1-5683632:8 - Lincong Zhang, Lei Guo, Yejun Liu, Kefeng Wei, Weigang Hou:
A Multicast-Traffic-Oriented Energy-Saving Algorithm with a Hybrid Sleep Mode for EPONs. 6785752:1-6785752:10 - Hongyu Yang, Ruiwen Tang:
Power Consumption Based Android Malware Detection. 6860217:1-6860217:6 - Yongfeng Dong, Jingyu Liu, Yan Jie, Hongpu Liu, Youxi Wu:
HS-RAID2: Optimizing Small Write Performance in HS-RAID. 7341735:1-7341735:8 - Diego Santoro, Michele Vadursi:
Performance Analysis of a DEKF for Available Bandwidth Measurement. 7538108:1-7538108:8 - Yong Jin, Chaobo Yan, James Nightingale:
Cognition Cloud Model for Next Generation Mobile Internet: Communication, Control, and Application. 7578298:1-7578298:2 - Zhenshu Wang, Xiaohui Jiang, Shaorun Bian, Yangyang Ma, Bowen Fan:
Accurate Load Modeling Based on Analytic Hierarchy Process. 7626847:1-7626847:11 - Chao Liu Bang, Shan Juan Xie, Dong Sun Park:
Finger Vein Recognition Using Optimal Partitioning Uniform Rotation Invariant LBP Descriptor. 7965936:1-7965936:10 - Oscar Somarriba Jarquín, Urko Zurutuza, Roberto Uribeetxeberria, Laurent Delosières, Simin Nadjm-Tehrani:
Detection and Visualization of Android Malware Behavior. 8034967:1-8034967:17 - Yiying Zhang, Suxiang Zhang, Yuemin Ding:
Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid. 8252901:1-8252901:12 - Yevhen Zolotavkin, Martti Juhola:
A New Scalar Quantization Method for Digital Image Watermarking. 9029745:1-9029745:16 - Jianhua Cao, Xiankun Zhang, Yan Wang, Qi Zhao:
Subsurface Geobody Imaging Using CMY Color Blending with Seismic Attributes. 9181254:1-9181254:7 - Kefei Mao, Jianwei Liu, Jie Chen:
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS. 1905872:1-1905872:14 - Xihai Zhang, Junlong Fang, Fanfeng Meng:
An Efficient Node Localization Approach with RSSI for Randomly Deployed Wireless Sensor Networks. 2080854:1-2080854:11 - Michele Vadursi, Andrea Ceccarelli, Elias P. Duarte Jr., Aniket Mahanti:
System and Network Security: Anomaly Detection and Monitoring. 2093790:1-2093790:2 - Guohua Wang, Ying-bao Geng:
Fast Direct Solution of Electromagnetic Scattering from Left-Handed Materials Coated Target over Wide Angle. 2108586:1-2108586:7 - Xiushan Wu, Yanzhi Wang, Siguang An, Jianqiang Han, Ling Sun:
A Four Quadrature Signals' Generator with Precise Phase Adjustment. 2138794:1-2138794:6 - Xinyue Cao, Zhangjie Fu, Xingming Sun:
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing. 3219042:1-3219042:7 - Qing Zhao, Congcong Xiong, Peng Wang:
Heuristic Data Placement for Data-Intensive Applications in Heterogeneous Cloud. 3516358:1-3516358:8 - Yongfeng Dong, Hongmei Xiao, Yancong Zhou:
Disordered and Multiple Destinations Path Planning Methods for Mobile Robot in Dynamic Environment. 3620895:1-3620895:10 - Vincenzo Eramo, Xavier Hesselbach-Serra, Yan Luo, Juan Felipe Botero:
Design of High Throughput and Cost-Efficient Data Center Networks. 4695185:1-4695185:2 - Vineet Kumar, Abhijit R. Asati, Anu Gupta:
A Novel Edge-Map Creation Approach for Highly Accurate Pupil Localization in Unconstrained Infrared Iris Images. 4709876:1-4709876:10 - Zahid Akhtar, Gian Luca Foresti:
Face Spoof Attack Recognition Using Discriminative Image Patches. 4721849:1-4721849:14 - Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. 5212314:1-5212314:13 - Franco Callegati, Walter Cerroni, Chiara Contoli:
Virtual Networking Performance in OpenStack Platform for Network Function Virtualization. 5249421:1-5249421:15 - Feng Wang, Jianping Zhang, Guiling Sun, Tianyu Geng:
Iterative Forward-Backward Pursuit Algorithm for Compressed Sensing. 5940371:1-5940371:7 - Yu Lu, Wei Wu, Keyi Wang:
High-Speed Transmission and Mass Data Storage Solutions for Large-Area and Arbitrarily Structured Fabrication through Maskless Lithography. 6074791:1-6074791:7 - Elena Lisova, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, Mats Björkman:
Protecting Clock Synchronization: Adversary Detection through Network Monitoring. 6297476:1-6297476:13 - Yeison Alberto Garcés-Gómez, Nicolás Toro García, Fredy Edimer Hoyos Velasco:
New Application's Approach to Unified Power Quality Conditioners for Mitigation of Surge Voltages. 6384390:1-6384390:8 - Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. 6567146:1-6567146:14 - Sead Muftic, Nazri bin Abdullah, Ioannis Kounelis:
Business Information Exchange System with Security, Privacy, and Anonymity. 7093642:1-7093642:10 - Vincenzo Eramo, Alessandro Tosti, Emanuele Miucci:
Server Resource Dimensioning and Routing of Service Function Chain in NFV Network Architectures. 7139852:1-7139852:12 - Liang Wang, Mei Wang, Xinying Guo, Xuebin Qin:
Microblog Sentiment Orientation Detection Using User Interactive Relationship. 7282913:1-7282913:6 - Jian Zhou, Canyan Zhu:
Compensatory Analysis and Optimization for MADM for Heterogeneous Wireless Network Selection. 7539454:1-7539454:9 - Jinfeng Yang, Zhen Zhong, Guimin Jia, Yanan Li:
Spatial Circular Granulation Method Based on Multimodal Finger Feature. 7913170:1-7913170:7 - Myeong-Eun Hwang, Sungoh Kwon:
DPFFs: C2MOS Direct Path Flip-Flops for Process-Resilient Ultradynamic Voltage Scaling. 8268917:1-8268917:10 - Jianzheng Liu, Chunlin Fang, Chao Wu:
A Fusion Face Recognition Approach Based on 7-Layer Deep Learning Neural Network. 8637260:1-8637260:7 - Li-Xia Xie, Chong Wang:
Cloud Multidomain Access Control Model Based on Role and Trust-Degree. 9820590:1-9820590:8 - Manh Cong Tran, Yasuhiro Nakamura:
Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software. 2017373:1-2017373:11 - Jucheng Yang, Hui Cheng, Sook Yoon, Anthony T. S. Ho, Weiming Zeng:
Advanced Information Technology Convergence. 2901835:1-2901835:2 - Li Yang, Chang Xia, Chang Juan:
Image Edge Detection Based on Gaussian Mixture Model in Nonsubsampled Contourlet Domain. 4125909:1-4125909:10 - Jing-pei Wang, Jie Liu:
The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios. 4361719:1-4361719:10 - Chang-Jun Zha, Yao Li, Jinyao Gui, Huimin Duan, Tai-Long Xu:
Compressive Imaging of Moving Object Based on Linear Array Sensor. 4560642:1-4560642:6 - Radhey Shyam, Yogendra Narain Singh:
Multialgorithmic Frameworks for Human Face Recognition. 4645971:1-4645971:9 - Md. Jaminul Haque Biddut, Nazrul Islam, Md. Maksudul Karim, Mohammad Badrul Alam Miah:
An Analysis of QoS in ZigBee Network Based on Deviated Node Priority. 6254395:1-6254395:8 - Yasmin Mahmoud Amin, Amr Talaat Abdel-Hamid:
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks. 7165952:1-7165952:12 - Rui Du, Yangyu Fan, Jianshu Wang:
Design of Fixed Wideband Beamformer through Improved Maximum Energy Approach. 7912364:1-7912364:7 - Daniel Castillo, Olga Ramos:
Augmented Reality for Assistance of Total Knee Replacement. 9358369:1-9358369:6 - Hesheng Cheng, Huakun Zhang:
Investigation of Improved Methods in Power Transfer Efficiency for Radiating Near-Field Wireless Power Transfer. 2136923:1-2136923:11 - Yuansheng Huang, Shenhai Huang, Jiayin Song:
A Novel Hybrid Method for Short-Term Power Load Forecasting. 2165324:1-2165324:10 - Zhongpeng Wang, Shoufa Chen:
A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems. 2326563:1-2326563:7 - Yanfei Jia, Xiaodong Yang:
Adaptive Complex-Valued Independent Component Analysis Based on Second-Order Statistics. 2467198:1-2467198:7 - Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li, Li-Tao Zhang:
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization. 4138654:1-4138654:14 - Xueyuan Hao, Xiaohong Yan:
Two Improved Cancellation Techniques for Direct-Conversion Receivers. 4253125:1-4253125:7 - Farman Ali Mangi, Shaoqiu Xiao, Ghulam Ali Mallah, Deedar Ali Jamro, Imran Memon, Ghulam Fatima Kakepoto:
Multiband Circular Polarizer Based on Fission Transmission of Linearly Polarized Wave for X-Band Applications. 4293089:1-4293089:8 - Mazdak Zamani, Isao Echizen, Arash Habibi Lashkari:
Innovations in Communications Security. 4743084:1 - Aggeliki Vlachostergiou, Georgios Stratogiannis, George Caridakis, George Siolas, Phivos Mylonas:
User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies. 4789803:1-4789803:20 - Jian Li, Yiming Fang, Jiyong Tang, Hai-Lin Feng, Xiong-wei Lou:
Development of Testing Platform and Comparison Studies for Wood Nondestructive Testing. 6279869:1-6279869:7 - Fang Liu, Yongxin Feng:
An Optimization Synchronization Algorithm for TDDM Signal. 6349341:1-6349341:7 - Huayang Li, Dehui Kong, Shaofan Wang, Baocai Yin:
Hand Depth Image Denoising and Superresolution via Noise-Aware Dictionaries. 6587162:1-6587162:12 - Haijun Wang, Hongjuan Ge, Shengyan Zhang:
Object Tracking via 2DPCA and ℓ2-Regularization. 7975951:1-7975951:7 - Deepak Bansal, Anuroop Bajpai, Prem Kumar, Maninder Kaur, Kamal Jit Rangra:
Low Actuating Voltage Spring-Free RF MEMS SPDT Switch. 7984548:1-7984548:7 - Noushin Ghaderi, Hamid Reza Erfani Jazi, Mehdi Mohseni-Mirabadi:
A Low Noise, Low Power Phase-Locked Loop, Using Optimization Methods. 8202581:1-8202581:9 - Malgorzata Michalska, Nicolas Zufferey, Marco Mattavelli:
Performance Estimation Based Multicriteria Partitioning Approach for Dynamic Dataflow Programs. 8536432:1-8536432:15 - Yun Huang:
A Novel Method for Constructing Grid Multi-Wing Butterfly Chaotic Attractors via Nonlinear Coupling Control. 9143989:1-9143989:9 - Jie Huang, Chin-Tser Huang:
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. 9859830:1-9859830:12 - Xin Liu, Tong Chen, Guoqiang Xie, Guangyuan Liu:
Contact-Free Cognitive Load Recognition Based on Eye Movement. 1601879:1-1601879:8 - Zhihao Wang, Junfang Wang, Yonghua Huo, Yanjun Tuo, Yang Yang:
A Searching Method of Candidate Segmentation Point in SPRINT Classification. 2168478:1-2168478:5 - Yuntao Zhao, Hengchi Liu, Yongxin Feng:
An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy. 2579274:1-2579274:5 - Johannes Jordan, Elli Angelopoulou, Andreas K. Maier:
A Novel Framework for Interactive Visualization and Analysis of Hyperspectral Image Data. 2635124:1-2635124:17 - Zhicheng Lu, Zhizheng Liang:
A Complete Subspace Analysis of Linear Discriminant Analysis and Its Robust Implementation. 3919472:1-3919472:10 - Valentin Smirnov, Dmitry Ignatov, Michael Gusev, Mais P. Farkhadov, Natalia Rumyantseva, Mukhabbat Farkhadova:
A Russian Keyword Spotting System Based on Large Vocabulary Continuous Speech Recognition and Linguistic Knowledge. 4062786:1-4062786:9 - Francesca Palumbo, Tiziana Fanni, Carlo Sau, Paolo Meloni, Luigi Raffo:
Modelling and Automated Implementation of Optimal Power Saving Strategies in Coarse-Grained Reconfigurable Architectures. 4237350:1-4237350:27 - Bo Zhang, Rong Qi, Hui Lin, Julius K. Mwaniki:
A Model for Analyzing a Five-Phase Fractional-Slot Permanent Magnet Tubular Linear Motor with Modified Winding Function Approach. 4501046:1-4501046:13 - Lei Lei, Kun She:
Speaker Recognition Using Wavelet Cepstral Coefficient, I-Vector, and Cosine Distance Scoring and Its Application for Forensics. 4908412:1-4908412:11 - Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai:
Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self-Synchronization. 5067313:1-5067313:15 - Shu Fan, Honglin Zhao:
Cross-Layer Control with Worst Case Delay Guarantees in Multihop Wireless Networks. 5762851:1-5762851:10 - Chengchang Zhang, Lihong Zhang:
Intermediate Frequency Digital Receiver Based on Multi-FPGA System. 6123832:1-6123832:8 - Juha Partala, Angelos Fylakis, Anu Pramila, Anja Keskinarkaus, Tapio Seppänen:
Improving Robustness of Biometric Identity Determination with Digital Watermarking. 6390741:1-6390741:9 - Xiumei Guo, Weidong Zhou:
A Novel Dictionary Learning Model with PT-HLBP for Palmprint Recognition. 6423834:1-6423834:7 - Peng Du, Yuan Zhang:
Joint Radio Resource Allocation and Base Station Location Selection in OFDMA Based Private Wireless Access Networks for Smart Grid. 7948018:1-7948018:13 - Marius Miron, Julio J. Carabias-Orti, Juan J. Bosch, Emilia Gómez, Jordi Janer:
Score-Informed Source Separation for Multichannel Orchestral Recordings. 8363507:1-8363507:19 - M. Sabbaghpur Arani, Maryam A. Hejazi:
The Comprehensive Study of Electrical Faults in PV Arrays. 8712960:1-8712960:10 - Keerti Tiwari, Davinder S. Saini, Sunil V. Bhooshan:
On the Capacity of MIMO Weibull-Gamma Fading Channels in Low SNR Regime. 9304597:1-9304597:8 - Daniel G. Costa, Cristian Duran-Faundez:
Assessing Availability in Wireless Visual Sensor Networks Based on Targets' Perimeters Coverage. 9312439:1-9312439:14 - Branimir Jaksic, Mihajlo C. Stefanovic, Danijela Aleksic, Dragan Radenkovic, Sinisa Minic:
First-Order Statistical Characteristics of Macrodiversity System with Three Microdiversity MRC Receivers in the Presence of κ-μ Short-Term Fading and Gamma Long-Term Fading. 9689586:1-9689586:9 - Vasilisa Verkhodanova, Vladimir Shapranov:
Experiments on Detection of Voiced Hesitations in Russian Spontaneous Speech. 2013658:1-2013658:8 - R. Sarjila, Kuppan Ravi, J. Belwin Edward, K. Sathish Kumar, Avagaddi Prasad:
Parameter Extraction of Solar Photovoltaic Modules Using Gravitational Search Algorithm. 2143572:1-2143572:6 - Hong Tang, Ting Li, Tianshuang Qiu, Yongwan Park:
Fetal Heart Rate Monitoring from Phonocardiograph Signal Using Repetition Frequency of Heart Sounds. 2404267:1-2404267:6 - Nehal N. Shah, Harikrishna Singapuri, Upena D. Dalal:
Hardware Efficient Architecture with Variable Block Size for Motion Estimation. 5091519:1-5091519:11 - Amar Sharma, Puneet Khanna, Kshitij Shinghal, Arun Kumar:
Design of CPW-Fed Antenna with Defected Substrate for Wideband Applications. 6546481:1-6546481:10 - Cairong Zou, Xinran Zhang, Cheng Zha, Li Zhao:
A Novel DBN Feature Fusion Model for Cross-Corpus Speech Emotion Recognition. 7437860:1-7437860:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.