default search action
International Journal of Embedded Systems, Volume 11
Volume 11, Number 1, 2019
- Fernando del Ama Gonzalo, Belén Moreno Santamaria, Juan A. Hernandez:
Designing a wireless sensor with ultra-capacitor and PV microcell for smart building energy management. 1-10 - Anas AlMajali, Waleed Dweik:
Analysing and modelling worm propagation speed in the smart grid communication infrastructure. 11-21 - Fadia B. Elissa, Mohammad Jamil Mismar:
Adaptive FIR filter for frequency and power estimation of sinusoids. 22-27 - Manan AlMusallam, Adel Soudani:
Design of embedded atrial fibrillation detection scheme for wireless body area networks. 28-37 - Moh'd Sami Ashhab, Omar Akash:
Neural network based study of PV panel performance in the presence of dust. 38-45 - Mohammed El Amine Fekair, Abderrahmane Lakas, Ahmed Korichi, Nasreddine Lagraa:
An efficient fuzzy logic-based and bio-inspired QoS-compliant routing scheme for VANET. 46-59 - Mustapha Merabet:
Radio-frequency and microwave spectroscopy investigation of bacteria solutions: determination of the aggregation threshold. 60-67 - Necdet Sinan Ozbek, Ilyas Eker:
Experimental evaluation of various modified Smith predictor-based fractional order control design strategies in control of a thermal process with time delay. 68-77 - Hadeer M. Sayed, Shereen A. Taie, Reda A. El-Khoribi, Ibraheem F. Abdelrahman, A. K. Helmy:
Point clouds reduction model based on 3D feature extraction. 78-83 - Jianbo Xu, Nanjun Ma, Jian Ke, Eileen Jianxun Yang, Shu Feng:
A fast video haze removal algorithm via mixed transmissivity optimisation. 84-93 - Weihong Huang, Renfa Li, Jianbo Xu, Yin Huang, Yong Sheng:
A fast-blind IP watermark detection scheme based on position fuzzification. 94-105
Volume 11, Number 2, 2019
- Gaocai Wang, Xinsheng Yu, Daofeng Li, Jin Ye:
Energy efficient analysis with end-to-end delay constraints in wireless sensor networks. 107-114 - Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing. 115-124 - Montassar Ben Saad, Ahmed Jedidi, Smaïl Niar, Mohamed Abid:
Application source code modification for processor architecture lifetime improvement. 125-138 - Qun Lin, Jianzhong Li, Xuechang Ren:
A provably secure delegated authentication scheme and its applications. 139-146 - Samir Laksir, Abdelaali Chaoub, Ahmed Tamtaoui:
Iterative algorithms for impulsive noise reduction in OFDM-based power line communications. 147-162 - Chunyue Hu, Dongyang Li, Zhenyan Sun, Ning Zhang, Jianjun Lei:
Region-based trilateral filter for depth video coding. 163-169 - Yuan Ni, Zhiwei Zhang, Xiaoling Tao:
A new scheme for improving the utilisation of nested-cloud resources. 170-181 - Mustafa A. Al-Khawaldeh, Xi Chen, Philip R. Moore, Ibrahim Al-Naimi:
Knowledge-based auto-configuration system using ubiquitous robotics for services delivery in smart home. 182-199 - Baofang Hu, Hong Wang, Yuanjie Zheng:
Sign prediction and community detection in directed signed networks based on random walk theory. 200-209 - Bin Dai, Rung-Ching Chen, Yuan-Yu Ding:
A practical approach for estimating human daily water intake. 210-219 - Hongguang Pan, Mei Wang, Xiaokang Wang, Jzau-Sheng Lin:
EEG control variable algorithm and motion control strategy for toy rail car. 220-228 - Hongluan Zhao, Guoyong Han:
Biclique cryptanalysis on Midori block cipher. 229-239 - Qi Liu, Yanyun Zou, Xiaodong Liu, Nigel Linge:
A survey on rainfall forecasting using artificial neural network. 240-249
Volume 11, Number 3, 2019
- Liang Yu, Nan Jia, Ruomei Wang, Jiao Jiao, Qingzhen Xu:
An improved human physiological simulation model for healthcare applications. 251-258 - Li'e Zi, Wanli Chen, Xingcheng Liu, Xiang Chen:
A novel chain-based routing protocol, BranChain, in wireless sensor networks. 259-268 - Zhikui Chen, Yonglin Leng, Yueming Hu:
An improved incomplete AP clustering algorithm based on K nearest neighbours. 269-277 - Longzhe Han, Xuecai Bao, Hongying Yu, Huasheng Zhu, Tanghuai Fan, Jia Zhao, Yeonseung Ryu:
A PID-FEC mechanism using cross-layer approach for video transmission over multi-hop wireless networks. 278-284 - Xin Zhang, Xiaoming Liu, Chang Liu, Zhenyu Na:
An iterative shrinkage threshold method for radar angular super-resolution. 285-294 - Yiying Zhang, Kun Liang, Ying Liu, Yeshen He:
The power big data-based energy analysis for intelligent community in smart grid. 295-305 - Yangqian Su, Yunfei Yi, Jun Qin:
The attack efficiency of PageRank and HITS algorithms on complex networks. 306-314 - Chenchen Ji, Peng Yu, Wenjing Li, Puyuan Zhao:
Comprehensive vulnerability assessment and optimisation method of power communication network. 315-324 - Abdallah Meraoumia, Djamel Samai, Salim Chitroub:
Can finger knuckle patterns help strengthen the e-banking security? 325-339 - Li Cai, Bingyu Zhu, Yifeng Luo, Shuigeng Zhou:
Interactive map matching and its visualisation: techniques and system. 340-351 - Peng Zhou, Wen-Kuang Chou:
IBBO-LSSVM-based network anomaly intrusion detection. 352-362 - Jingsong Cui, Hang Tu:
Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings. 363-373 - Ping Chen, Zhiying Wang, Xiaoling Tao:
A new efficient privacy-preserving data publish-subscribe scheme. 374-385 - Yongxuan Sang, Zhongwen Li, Lili Zhang, Hai Jiang, Kuan-Ching Li:
Lattice-based identity-based ring signature without trapdoors. 386-396
Volume 11, Number 4, 2019
- K. Rajesh Rao, Ashalatha Nayak:
Data residency as a service: a secure mechanism for storing data in the cloud. 397-418 - Chuanrong Wu, Feng Li:
Multi-objective fuzzy optimisation of knowledge transfer organisations in the big data environment. 419-426 - Tien-Hsiung Weng, Yi-Siang Chen, Huimin Lu, Mario Donato Marino, Kuan-Ching Li:
On parallelisation of image dehazing with OpenMP. 427-439 - Ying Wang, Guorui Li, Sancheng Peng, Cong Wang, Ying Yuan:
A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks. 440-451 - Kun Qian, Hui Huang:
A new identity-based public auditing against malicious auditor in the cloud. 452-460 - Shubhangi K. Gawali, Biju K. Raveendran:
DPVFS: a dynamic procrastination cum DVFS scheduler for multi-core hard real-time systems. 461-471 - Gil Kedar, Avi Mendelson, Israel Cidon:
Energy oriented EDF for real-time systems. 472-482 - Ping Ren, Jingzhao Li, Dayu Yang:
The research on model construction and application of coal mine CPS perception and control layer. 483-492 - Geeta Patil, Neethu Bal Mallya, Biju K. Raveendran:
MOESIF: a MC/MP cache coherence protocol with improved bandwidth utilisation. 493-507 - Chundong Wang, Yi Zhao, Xiu-liang Mo:
A detection model of malicious Android applications based on Naive Bayes. 508-515 - Bingpeng Ou, Jingjing Guo, Xiaoling Tao:
An efficient privacy-preserving friendship-based recommendation system. 516-525 - Ziao Liu, Tao Jiang, Xiaoling Tao:
A result correctness verification mechanism for cloud computing based on MapReduce. 526-539
Volume 11, Number 5, 2019
- Tabi Fouda Bernard Marie, Dezhe Han, Bowen An:
Microcontroller design for security system: implementation of a microcontroller based on STM32F103 microchip. 541-550 - Zeyu Sun, Jun Liu, Xiaofei Xing, Chuanfeng Li, Xiaoyan Pan:
A dynamic cluster job scheduling optimisation algorithm based on data irreversibility in sensor cloud. 551-561 - Fucheng Pan, Dezhi Han, Yuping Hu:
Design and application of real-time network abnormal traffic detection system based on Spark Streaming. 562-572 - Mirjana Ivanovic, Aleksandra Klasnja-Milicevic:
Big data and collective intelligence. 573-583 - Qiuting Tian, Dezhi Han, Zhenxin Du:
DDoS attack detection based on global unbiased search strategy bee colony algorithm and artificial neural network. 584-593 - Suyuan Luo:
Research on profit abilities of order placement strategies in pairs trading. 594-601 - Sen Zhang, Yuping Hu, Zhuoyi Tan:
Research on borrower's credit classification of P2P network loan based on LightGBM algorithm. 602-612 - Dongni Yang, Songyan Li, Zhaobin Liu, Xinfeng Ye:
Differentially private geospatial data publication based on grid clustering. 613-623 - Yabin Wang, Yi Qiao, Zhaobin Liu, Zhiyi Huang:
HighPU: a high privacy-utility approach to mining frequent itemset with differential privacy. 624-633 - Yang Lu, Qi Zeng:
Cryptanalysis of the existing integrated PKE and PEKS schemes. 634-642 - Hongsong Chen, Zhongchuan Fu, Gang Wang:
A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network. 643-652 - Xiaolong Ma, Yonghui Dai, Weining Tang, Guowei Li, Shengqi Lu:
Research on user acceptance behaviour of mobile group intelligent sensing applications based on UTAUT. 653-660 - Darshika G. Perera, Kin Fun Li:
A design methodology for mobile and embedded applications on FPGA-based dynamic reconfigurable hardware. 661-677 - Jingzhao Li, Dayu Yang, Xiaoming Zhang:
Research on modelling and scheduling strategy for mine transportation control system based on CPS. 678-686
Volume 11, Number 6, 2019
- Mengping Yin, Shichong Tan, Ning Zhang, Xiaotong Fu, Suchun Yuan:
A new approximate image verification mechanism in cloud computing. 687-697 - Li Fu, Hua Fu, Zhen Liu, Fei You:
Local connectedness over soft rough topological space. 698-706 - Kai Nie, Yunling Wang, Xiaoling Tao:
Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing. 707-718 - Hsiung-Cheng Lin, Chi-Wei Liu, Jhih-Siang Lin:
Development of current-controllable batteries charging system based on multi-stage mechanism. 719-730 - Li Mao, Wei Du:
A method of crime rate forecast based on wavelet transform and neural network. 731-737 - Rania Mzid, Chokri Mraidha, Jean-Philippe Babau, Mohamed Abid:
From real-time design model to RTOS-specific models: a model-driven methodology. 738-754 - Zhongming Yang, Hui Xiong, Zhaoquan Cai, Yu Peng:
A new method of vision-based seat belt detection. 755-763 - Huixia Huo, Tao Jiang, Shichong Tan, Xiaoling Tao:
Efficient public integrity auditing with secure deduplication in cloud computing. 764-777 - Tien-Hsiung Weng, Teng-Xian Wang, Meng-Yen Hsieh, Hai Jiang, Jun Shen, Kuan-Ching Li:
Parallel fast Fourier transform in SPMD style of Cilk. 778-787 - Huaiyu Zheng, Shigang Liu, Fengjie Sun:
Exponential stability of big data in networked control systems for a class of uncertain time-delay and packet dropout. 788-795 - Fang Long, Hailan Shen, Xiaoheng Deng:
ISIRS: information theory-based social influence with recommender system. 796-805 - Anton A. Zhilenkov, Sergei G. Chernyi:
Models and algorithms of the positioning and trajectory stabilisation system with elements of structural analysis for robotic applications. 806-814 - Yong Gan, Bingli Wang, Yuan Zhuang, Zengyu Cai, Qikun Zhang:
An authenticated hierarchical asymmetric group key agreement protocol based on identity. 815-824
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.