Journal: Computers & Electrical Engineering

Volume 38, Issue 6

1377 -- 1387De-gan Zhang, Dan-chao Dong, Hong-tao Peng. Research on development of embedded uninterruptable power supply system for IOT-based mobile service
1388 -- 1398Tien Van Do, Hyotaek Lim, Ram Chakka. An efficient model for dimensioning an ATA-based virtual storage system
1399 -- 1408Jhih-Chung Chang. Combining GA and iterative MVDR for DOA estimation in space-time CDMA systems
1409 -- 1432Alireza Poshtkohi, M. B. Ghaznavi-Ghoushchi. The xDotGrid native, cross-platform, high-performance xDFS file transfer framework
1433 -- 1443Mou Dasgupta, G. P. Biswas. Design of multi-path data routing algorithm based on network reliability
1444 -- 1455Chia Yee Ooi, Jia Pao Sua, Siaw Chen Lee. Power-aware system-on-chip test scheduling using enhanced rectangle packing algorithm
1456 -- 1466Xianfu Meng, Yalin Ding. A dynamic load balancing strategy with the push and pull approaches in DHT networks
1467 -- 1479Khaled Daqrouq, Khalooq Y. Al Azzawi. Average framing linear prediction coding with wavelet transform for text-independent speaker identification system
1480 -- 1489S. K. Sadon, Norashidah Md. Din, Mohammed Hayder Al-Mansoori, N. A. Radzi, I. S. Mustafa, M. Yaacob, Mohd. Shahmi Abdul Majid. Dynamic hierarchical bandwidth allocation using Russian Doll Model in EPON
1490 -- 1501Haibo Miao, Liusheng Huang, Zhili Chen, Wei Yang, Ammar Al-hawbani. A new scheme for covert communication via 3G encoded speech
1502 -- 1512F. Javier López-Martínez, Eduardo Martos-Naya, José T. Entrambasaguas. Low complexity cell search scheme for LTE and LTE-advanced mobile technologies
1513 -- 1523Tomaz Nahtigal, Primoz Puhar, Andrej Zemva. A systematic approach to configurable functional verification of HW IP blocks at transaction level
1524 -- 1533I. Alhama, F. Alhama, Antonio Soto Meca. The network method for a fast and reliable solution of ordinary differential equations: Applications to non-linear oscillators
1534 -- 1549Santosh Biswas. Diagnosability of discrete event systems for temporary failures
1550 -- 1563Hassan Salamy. Minimizing address arithmetic instructions in embedded applications on DSPs
1564 -- 1572Adem Tuncer, Mehmet Yildirim. Dynamic path planning of mobile robots with improved genetic algorithm
1573 -- 1578K. S. Bhatia, T. S. Kamal, R. S. Kaler. An adaptive compensation scheme-based coded direct detection optical-orthogonal frequency division multiplex (OFDM) system
1579 -- 1594Mohamed Djendi, Aouda Bounif. Performance analysis of under-modelling stereophonic acoustic echo cancellation by adaptive filtering LMS algorithm
1595 -- 1615Amir Hooshang Mazinan, A. Amir-Latifi. Improvement of mean shift tracking performance using a convex kernel function and extracting motion information
1616 -- 1626Monobrata Debnath, Wei-Ming Lin, Eugene John. Adaptive instruction dispatching techniques for Simultaneous Multi-Threading (SMT) processors
1627 -- 1635Umut Altinisik, Mehmet Yildirim. A new fault tolerant control approach for the three-tank system using data mining
1636 -- 1646Jianming Wang, Ming Zhu, Ling Ding. Noise-robust software based R/D conversion methods using over-sample technique
1647 -- 1657Chun-Hui Wu, Xiaofeng Chen 0001, Qin Li, Dongyang Long. Efficient ID-based non-malleable trapdoor commitment
1658 -- 1669Sesham Srinu, Samrat L. Sabat. FPGA implementation and performance study of spectrum sensing based on entropy estimation using cyclic features
1670 -- 1686Kunihiko Fujita, Yasuyuki Tsukada. An approach to the formal analysis of license interoperability
1687 -- 1702Ali Mahdoum. Combined heuristics for synthesis of SOCs with time and power constraints
1703 -- 1716Abdoreza Pishvaie, Ghassem Jaberipur, Ali Jahanian. Improved CMOS (4; 2) compressor designs for parallel multipliers
1717 -- 1730Adel Soudani, Thierry Divoux, Rached Tourki. Data traffic load balancing and QoS in IEEE 802.11 network: Experimental study of the signal strength effect
1731 -- 1744Osamah S. Badarneh, Haythem Bany Salameh. Probabilistic quality-aware routing in cognitive radio networks under dynamically varying spectrum opportunities
1745 -- 1759Hugh L. Kennedy, William Scott, Stephen C. Cook. Data association and geolocation for electronic support systems
1760 -- 1767Jhih-Chung Chang. Robust blind multiuser detection based on PSO algorithm in the mismatch environment of receiver spreading codes
1768 -- 1776Zhenglin Liu, Qidi Zhao, Dongfang Li, Xuecheng Zou. Memory monitor module for embedded systems
1777 -- 1784Ihsan Pehlivan, Yilmaz Uyaroglu. A new 3D chaotic system with golden proportion equilibria: Analysis and electronic circuit realization
1785 -- 1797P. Salini, S. Kanmani. Survey and analysis on Security Requirements Engineering
1798 -- 1807M. Hariharan, C. Y. Fook, R. Sindhu, Bukhari Ilias, Sazali Yaacob. A comparative study of wavelet families for classification of wrist motions
1808 -- 1819Adnan Idris, Muhammad Rizwan, Asifullah Khan. Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies
1820 -- 1836Damjan Vlaj, Zdravko Kacic, Marko Kos. Voice activity detection algorithm using nonlinear spectral weights, hangover and hangbefore criteria

Volume 38, Issue 5

1033 -- 1034Gregorio Martínez Pérez, Félix Gómez Mármol, Jose M. Alcaraz Calero. Introduction to Recent Advances in Security and Privacy in Distributed Communications
1035 -- 1046Yuan Mei, Guo Cao, HuaiJiang Sun, Rongtao Hou. A systematic gradient-based method for the computation of fingerprint's orientation field
1047 -- 1061Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong. Pulse quarantine strategy of internet worm propagation: Modeling and analysis
1062 -- 1072Carlos Catania, Carlos García Garino. Automatic network intrusion detection: Current techniques and open issues
1073 -- 1087Imad M. Abbadi, Muntaha Alawneh. A framework for establishing trust in the Cloud
1088 -- 1101Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang. Modeling access control for cyber-physical systems using reputation
1102 -- 1114Verónica Mateos Lanchas, Víctor A. Villagrá, Francisco Romero Bueno, Julio Berrocal. Definition of response metrics for an ontology-based Automated Intrusion Response Systems
1115 -- 1128Husameldin Mukhtar, Khaled Salah, Youssef Iraqi. Mitigation of DHCP starvation attack
1129 -- 1145Farhan Siddiqui, Sherali Zeadally, Thabet Kacem, Scott Fowler. Zero Configuration Networking: Implementation, performance, and security
1146 -- 1161Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera. A cyber-physical experimentation environment for the security analysis of networked industrial control systems
1162 -- 1163Ferat Sahin. Introduction to Special Issue on Image Processing
1164 -- 1176Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Robust gray-scale logo watermarking in wavelet domain
1177 -- 1185Bin Huang, Guohui Tian, Fengyu Zhou. Human typical action recognition using gray scale image of silhouette sequence
1186 -- 1195Wei Ji, Dean Zhao, Fengyi Cheng, Bo Xu, Ying Zhang, Jinjing Wang. Automatic recognition vision system guided for apple harvesting robot
1196 -- 1204Xiangzhi Bai, Fugen Zhou, Bindang Xue. Toggle and top-hat based morphological contrast operators
1205 -- 1212Huanghui Shen, Zhensong Wang, Weimin Zheng. Corner turn of SAR data based on multi-FPGAs parallel system
1213 -- 1221Weiping Yang, Xuezhi Wang, Bill Moran, Ashley Wheaton, Nicola Cooley. Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation
1222 -- 1239Dongil Han, Jongho Choi, Byungwhan Kim, Jae Il Cho. Design and VLSI implementation of a high-performance face detection engine
1240 -- 1248Lili Liu, Qiang Zhang, Xiaopeng Wei. A RGB image encryption algorithm based on DNA encoding and chaos map
1249 -- 1261Xin-Wei Li, Baolong Guo, Long Chen, Xian-xiang Wu, Lei-Da Li. A high capacity and strong robust fingerprinting for compressed images
1262 -- 1277P. Jidesh, Santhosh George. Shock coupled fourth-order diffusion for image enhancement
1278 -- 1298Amit Phadikar, Santi P. Maity. On protection of compressed image in fading channel using data hiding
1299 -- 1309Hamit Soyel, Hasan Demirel. Localized discriminative scale invariant feature transform based facial expression recognition
1310 -- 1324Hong Shen, Bo Chen. From single watermark to dual watermark: A new approach for image watermarking
1325 -- 1335Syed Mahfuzul Aziz, Minh-Duc Pham. Efficient parallel architecture for multi-level forward discrete wavelet transform processors
1336 -- 1345Jinzheng Lu, Qiheng Zhang, Zhiyong Xu, Zhenming Peng. 0 norm minimization
1346 -- 1357Cailing Wang, Xiaoyuan Jing, Chunxia Zhao. Local Upsampling Fourier Transform for accurate 2D/3D image registration
1358 -- 1376Sherin M. Youssef. ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval

Volume 38, Issue 4

811 -- 818Shu-Nung Yao, Timothy Collins, Peter Jancovic. Hybrid method for designing digital Butterworth filters
819 -- 826Kabir Chakraborty, Abhinandan De, Abhijit Chakrabarti. Voltage stability assessment in power network using self organizing feature map and radial basis function
827 -- 839Saeed Parsa, Reza Entezari-Maleki. A queuing network model for minimizing the total makespan of computational grids
840 -- 852Jianxin Liao, Qi Qi, Zhaoyong Xun, Tonghong Li, Yufei Cao, Jingyu Wang. A linear chained approach for service invocation in IP Multimedia Subsystem
853 -- 861Yaobin Zou, Hong Liu, Enmin Song, Zhiyong Huang. Image bilevel thresholding based on multiscale gradient multiplication
862 -- 881Kostas Tsagkaris, Aimilia Bantouna, Panagiotis Demestichas. Self-Organizing Maps for advanced learning in cognitive radio systems
882 -- 890Fan Zhang, Xinhong Zhang, Kui Cao, Rui Li. Contour extraction of gait recognition based on improved GVF Snake model
891 -- 905Chun-Chuan Yang, Yi-Ting Mai, Jeng-Yueng Chen, Yu-Shiuan Shen, Yu-Chen Kuo. LBPS: Load-Based Power Saving in the IEEE 802.16e Network
906 -- 916Yancang Chen, Zhonghai Lu, Lunguo Xie, Jinwen Li, Minxuan Zhang. A single-cycle output buffered router with layered switching for Networks-on-Chips
917 -- 925Fengcai Li, Guanghua Gu, Chengru Wang. Scene categorization based on integrated feature description and local weighted feature mapping
926 -- 937C. Restrepo, Carlos Andrés Ramos-Paja, Roberto Giral, Javier Calvente, Alfonso Romero. Fuel cell emulator for oxygen excess ratio estimation on power electronics applications
938 -- 952Mohamed Djendi. An efficient stabilized fast Newton adaptive filtering algorithm for stereophonic acoustic echo cancellation SAEC
953 -- 962Sheng-Shih Wang, Chan-Ying Lien, Wen-Hwa Liao, Kuei-Ping Shih. LASER: A load-aware spectral-efficient routing metric for path selection in IEEE 802.16j multi-hop relay networks
963 -- 974Melika Tinati, Ahmad Khademzadeh, Ali Afzali-Kusha, Majid Janidarmian. HACS: A novel cost aware paradigm promising fault tolerance on mesh-based network on chip architecture
975 -- 985Puwen Wei, Xiaoyun Wang, Yuliang Zheng. Public key encryption without random oracle made truly practical
986 -- 993Ali Massoud, Abdalla Osman, Aboelmagd Noureldin. DOA estimation based on fourth order cumulant beamforming for nonuniform linear array of DIFAR sonobuoys
994 -- 1009Peter Vial, Beata J. Wysocki, Tadeusz A. Wysocki, Montserrat Ros, David Stirling. On the effect of Multiple Access Interference in a Space Time Spreading Time Hopping PPM UWB system
1010 -- 1022Mohammed Saeed Jawad, Widad Ismail, Badrul Hisham Ahmad. Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures
1023 -- 1032Liang Cheng, Manchun Li, Yongxue Liu, Wenting Cai, Yanming Chen, Kang Yang. Remote sensing image matching by integrating affine invariant feature extraction and RANSAC

Volume 38, Issue 3

471 -- 472Mehdi Shadaram, David Akopian, Glaucio H. S. Carvalho. Guest Editors' Introduction to the Special Issue on The design and analysis of wireless systems: New inspirations
473 -- 491Lei Guo, Lincong Zhang, Yuhuai Peng, Jingjing Wu, Xiao-Ying Zhang, Weigang Hou, Jun Zhao. Multi-path routing in Spatial Wireless Ad Hoc networks
492 -- 509Tatiana G. Bonifácio, Rodrigo Palucci Pantoni, Dennis Brandão. SMAC multi-hop mesh routing protocol using IEEE 802.15.4
510 -- 521B. Q. Kan, J. H. Fan, J. Y. Wang, Z. Y. Lu, J. Cheng, Q. Wu. Jamming aware routing for MHWN with dynamic measurement
522 -- 532S. Smys, G. Josemin Bala. Efficient self-organized backbone formation in mobile ad hoc networks (MANETs)
533 -- 550Zhaolong Ning, Lei Guo, Yuhuai Peng, Xiaojie Wang. Joint scheduling and routing algorithm with load balancing in wireless mesh network
551 -- 562Wei Wang 0033, Guosun Zeng, Jing Yao, Hanli Wang, Daizhong Tang. Towards reliable self-clustering Mobile Ad Hoc Networks
563 -- 572Hua Guo, Chang Xu, Yi Mu, Zhoujun Li. A provably secure authenticated key agreement protocol for wireless communications
573 -- 581Hu Xiong, Zhong Chen, Fagen Li. Efficient and multi-level privacy-preserving communication protocol for VANET
582 -- 590Rong Geng, Lei Guo, Xingwei Wang. A new adaptive MAC protocol with QoS support based on IEEE 802.11 in ad hoc networks
591 -- 602Fotis Foukalas, George T. Karetsos, Lazaros F. Merakos. Spectral efficiency of cognitive radio networks under interference constraint and QoS guarantees
603 -- 615Catalin Lacatus, David Akopian, Mehdi Shadaram. Reduced complexity crosscorrelation interference mitigation in GPS-enabled collaborative ad-hoc wireless networks - Theory
616 -- 625Raksha Upadhyay, Sanjiv Tokekar, P. D. Vyavahare. Performance analysis of WLAN physical layers using Markov channel model
626 -- 642Sheikh Tahir Bakhsh, Halabi Hasbullah, Sabeen Tahir. Dynamic relay management protocol for efficient inter-piconet scheduling in Bluetooth scatternet
643 -- 651Gengzhong Zheng, Sanyang Liu, Xiaogang Qi. Scale-free topology evolution for wireless sensor networks with reconstruction mechanism
652 -- 661Huanqing Cui, Yinglong Wang. Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks
662 -- 671Aimin Wang, Dailiang Yang, Dayang Sun. A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks
672 -- 680Murad Abusubaih. Joint RTS/CTS and time slotting for interference mitigation in multi-BSS 802.11 wireless LANs
681 -- 693Chih-Peng Lin, Hsing-Lung Chen, Jenq-Shiou Leu. A predictive handover scheme to improve service quality in the IEEE 802.21 network
694 -- 702De-gan Zhang, Chen-peng Zhao, Yan-pin Liang, Zhao-jing Liu. A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network
703 -- 721Yunsheng Liu, Zheng Wang. Maximizing energy utilization routing scheme in wireless sensor networks based on minimum hops algorithm
722 -- 723Fangyang Shen, Mei Yang, Maurizio Palesi. Guest Editors' Introduction to the Special Issue on "Emerging Computing Architectures and Systems"
724 -- 745C. Christopher Columbus, Sishaj P. Simon. Profit based unit commitment: A parallel ABC approach using a workstation cluster
746 -- 755Yijun Liu, Anthony S. Fong, Fangyang Shen. HISC: A computer architecture using operand descriptor
756 -- 771Eduard Fernandez-Alonso, David Castells-Rufas, Jaume Joven, Jordi Carrabina. Development process for clusters on a reconfigurable chip
772 -- 784Yuan Tian, Weikuan Yu, Jeffrey S. Vetter. RXIO: Design and implementation of high performance RDMA-capable GridFTP
785 -- 800Xiongli Gu, Peng Liu 0016, Mei Yang, Jie Yang, Cheng Li, Qingdong Yao. An efficient scheduler of RTOS for multi/many-core system
801 -- 810Yiou Chen, JianHao Hu, Xiang Ling, Tingting Huang. A novel 3D NoC architecture based on De Bruijn graph

Volume 38, Issue 2

185 -- 193Shu-Chung Yi. A new construction adder based on Chinese abacus algorithm
194 -- 205Xianfu Meng, Wenqing Cui. Research on the immune strategy for the polluted file propagation in structured P2P networks
206 -- 216Fotis Plessas, Efthimios Davrazos, Alexis Alexandropoulos, Michael K. Birbas, John C. Kikidis. A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control
217 -- 230Yang Zhou, Gangyi Jiang, Mei Yu, Zongju Peng, Feng Shao. Region-based error concealment of right-view frames for stereoscopic video transmission
231 -- 242George Lagogiannis, Nikos A. Lorentzos. Partially persistent B-trees with constant worst-case update time
243 -- 257Krishna M. Kavi, Izuchukwu Nwachukwu, Ademola Fawibe. A comparative analysis of performance improvement schemes for cache memories
258 -- 269Jorge González-Domínguez, Guillermo L. Taboada, Basilio B. Fraguela, María J. Martín, Juan Touriño. Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite
270 -- 281Feiyang Liu, Huaxi Gu, Yintang Yang. DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip
282 -- 293Mohamed Reda Lakehal, Youcef Ferdi, Abdelmalik Taleb-Ahmed. β sequences synthesized by recursive filtering
294 -- 305George N. Korres, Nikolaos M. Manousakis. A state estimator including conventional and synchronized phasor measurements
306 -- 329Chao Wu, Yike Guo, Bo Zhou. Social networking federation: A position paper
330 -- 345Basel A. Mahafzah, Mohammad Alshraideh, Tasneem M. Abu-Kabeer, Elham F. Ahmad, Nesreen A. Hamad. The Optical Chained-Cubic Tree interconnection network: Topological structure and properties
346 -- 355Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta. Using identities to achieve enhanced privacy in future content delivery networks
356 -- 369Nooshin Bigdeli, Yousef Farid, Karim Afshar. A robust hybrid method for image encryption based on Hopfield neural network
370 -- 380Fuchun Guo, Yi Mu, Willy Susilo. Efficient and secure stored-value cards with leakage resilience
381 -- 387Fengtong Wen, Xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme
388 -- 398Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd. A novel approach to enhance distributed virtual memory
399 -- 412Mohammed Amoon. A fault-tolerant scheduling system for computational grids
413 -- 421Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model
422 -- 433Mohamed Mohandes, Mohamed Deriche, U. Johar, S. Ilyas. A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model
434 -- 443Pandya Lakshman. Combining deblurring and denoising for handheld HDR imaging in low light conditions
444 -- 458Servet Soyguder, Hasan Alli. Kinematic and dynamic analysis of a hexapod walking-running-bounding gaits robot and control actions
459 -- 470Tao Wu, Kun Qin. Image data field for homogeneous region based segmentation

Volume 38, Issue 1

1 -- 2Weichuan Yu, Zheng-Hua Tan, Yi Wan. Guest Editors' Introduction to the Special Issue on "New Trends in Signal Processing and Biomedical Engineering"
3 -- 10Lei Chen, Guangnan Xing, Yingjie Xu, Xiaoxiang Liu, Tuanjie Zhao, Junyi Gai. Identification of major responding proteins of abnormal leaf and flower in soybean with an integrative "omics" strategy
11 -- 18Kun-Li Wen, Ya-Ting Lee. Applying rough set theory in the function group analysis for phenolic amide compounds
19 -- 34Wenchao Jiang, Matthias Baumgarten, Qingyun Dai, Yanhong Zhou. The deployment and evaluation of a bioinformatics grid platform - The HUST_Bio_Grid
35 -- 44Boyu Wang, Chiman Wong, Feng Wan, Peng Un Mak, Pui-In Mak, Mang I Vai. Trial pruning based on genetic algorithm for single-trial EEG classification
45 -- 51Guang-zheng Yu, Bo-sun Xie, Xiang-xu Chen. Analysis on minimum-phase characteristics of measured head-related transfer functions affected by sound source responses
52 -- 67Elias Aboutanios, Yannis Kopsinis, Denis Rubtsov. Instantaneous frequency based spectral analysis of nuclear magnetic resonance spectroscopy data
68 -- 74Rajarshi Gupta, Jitendranath Bera, Madhuchhanda Mitra. A bi-phase enabled serial acquisition system for remote processing of digitized ECG
75 -- 81Orhan Er, A. Çetin Tanrikulu, Abdurrahman Abakay, Feyzullah Temurtas. An approach based on probabilistic neural network for diagnosis of Mesothelioma's disease
82 -- 95Mohammad Reza Seifi, Mohammad Eshghi. Clustered NOC, a suitable design for group communications in Network on Chip
96 -- 104Yamin Wen, Fangguo Zhang, Lingling Xu. Secret handshakes from ID-based message recovery signatures: A new generic approach
105 -- 115Prabagarane Nagaradjane, Lakshmi Krishnan, Arvind Sai Sarathi Vasan. Performance analysis of multicell multiuser MIMO MC DS/CDMA system with MMSE user-ordered SIC technique
116 -- 127Mande Xie, Guiyi Wei, Yujia Ge, Yun Ling. Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks
128 -- 139D. P. Torres, Evelio M. García Fernández, Eduardo P. Ribeiro, Vitalio Alfonso Reguera, C. de Oliveira. On the impact of adaptive RED in IP networks transporting H.264/MPEG-4 AVC video streams
140 -- 147M. J. Lengare, Rajan H. Chile, Laxman M. Waghmare. Design of decentralized controllers for MIMO processes
148 -- 160Paris Kitsos, Nicolas Sklavos, Maria Parousi, Athanassios N. Skodras. A comparative study of hardware architectures for lightweight block ciphers
161 -- 174Servet Soyguder, Hasan Alli. Computer simulation and dynamic modeling of a quadrupedal pronking gait robot with SLIP model
175 -- 184Jing Guo, Xiaoping Zeng, Zhishun She. Blind source separation based on high-resolution time-frequency distributions