Journal: IJES

Volume 10, Issue 6

445 -- 452Yingwei Yan, Yu Du, Wenan Zhou. Study on the local path planning for intelligent vehicles based on an improved VFH method
453 -- 469Salim Djaaboub, Elhillali Kerkouche, Allaoua Chaoui. Generating verifiable LOTOS specifications from UML models: a graph transformation-based approach
470 -- 483Yunn-Lin Hwang, Thi-Na Ta, Kun-Nan Chen. Using zero moment point preview control formulation to generate nonlinear trajectories of walking patterns on humanoid robots
484 -- 493Xuehui Wu, Xiaobo Lu, Xue Han, Chunxue Liu. An adaptive denoising method for colour images of mobile phone based on bivariate shrinkage function
494 -- 502Mohammad Fraiwan, Ahmad Alsaleem, Hashem Abandeh, Omar Aljarrah. A system for application development using aerial robots
503 -- 517Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Brij B. Gupta. Petri net-based verification of security protocol implementation in software evolution
518 -- 525Jieren Cheng, Boyi Liu, Xiangyan Tang, Zhuhua Hu, Jianping Yin. Traffic flow detection method based on vertical virtual road induction line
526 -- 536Yali Chen, Kaixin Ren, Naijie Gu. Router-shared-pair mesh: a reconfigurable fault-tolerant network-on-chip architecture
537 -- 545Mahmoud Naghibzadeh. Handling startling circumstances with IRM scheduler of real-time systems

Volume 10, Issue 5

345 -- 355Yongxing Liu, Kenli Li, Zhuo Tang, Keqin Li 0001. Energy aware list-based scheduling for parallel applications in cloud
356 -- 365Zhenxing Xu, Ling Chen 0001, Haodong Guo, Mingqi Lv, Gencai Chen. User similarity-based gender-aware travel location recommendation by mining geotagged photos
366 -- 377Alessandro Cilardo, Nicola Mazzocca, Paolo Prinetto. An abstraction layer enabling pervasive hardware-reconfigurable systems
378 -- 393Chaokun Yan, HuiMin Luo, Zhigang Hu. Scheduling deadline-constrained scientific workflow using chemical reaction optimisation algorithm in clouds
394 -- 405Rasmus Ulslev Pedersen, Martin Schoeberl. Direct garbage collection: two-fold speedup for managed language embedded systems
406 -- 422Nour El-Houda Benalia, Noureddine Djedi, Salim Bitam, Nesrine Ouannes, Yves Duthen. An improved CUDA-based hybrid metaheuristic for fast controller of an evolutionary robot
423 -- 436Yang Bo, Chunhe Xia, Yang Luo, Qing Tang. Static compliance checking beyond separation of duty constraints
437 -- 444Shanguo Lv, Yiqin Cao. An algorithm of video network transmission based on unbalanced multiple description coding

Volume 10, Issue 4

260 -- 272Maheswari Arumugam, Arun Kumar Sangaiah. An intelligent paradigm for denoising motion artefacts in ECG preprocessing: smart filters
273 -- 286Vaishali R. Thakare, John Singh K. An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing
287 -- 300Shynu P. G., John Singh K. Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
301 -- 312Xiupeng Chen, Rongzeng Mu, Yuepeng Yan. Automated identification of callbacks in Android framework using machine learning techniques
313 -- 322Yameng Li, Jingsha He, Na Huang 0002, Gongzheng Liu. Recovering multiple versions of YAFFS2 files based on Hash and timestamps
323 -- 333Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh. A framework and a process for digital forensic analysis on smart phones with multiple data logs
334 -- 343Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almiani, Syed S. Rizvi, Akshat Hans. Token security for internet of things

Volume 10, Issue 3

181 -- 187Lingzhi Yang, Xiaojuan Ban, Yitong Li, Guang Yang. Multiple features fusion for facial expression recognition based on ELM
188 -- 195Huyin Zhang, Kan Wang. Research of dynamic load balancing based on stimulated annealing algorithm
196 -- 202Yanqin Chen, Wenying Zhang. Differential-linear cryptanalysis of SIMON32/64
203 -- 216Kamil Kluczniak, Lucjan Hanzlik, Jianfeng Wang. Efficient VLR group signatures for smart cards
217 -- 224Long Gao, Jianping Yin, En Zhu, Tianhang Liu, Wei Chen, Minghui Qiu. Mechanical amelioration to improve hexapod robot speed
225 -- 232Guangfu Wu, Keke Wang, Jinjun Zhang, Jiguang He. A lightweight and efficient encryption scheme based on LFSR
233 -- 240Li Di, Zheng Zheng, Song Wang, Ruidong Zhang, Min Xia, Kai Hu. Electric power communication bandwidth prediction based on adaptive extreme learning machine
241 -- 247Yunlong Wang, Zhili Zhou. Spatial descriptor embedding for near-duplicate image retrieval
248 -- 256Qi Liu 0001, Shengjun Li, Xiaodong Liu, Nigel Linge. A method for electric load data verification and repair in home environment

Volume 10, Issue 2

89 -- 103Hsung-Pin Chang, Tsung-Yu Yeh. An autonomous fault resistant system for mission-critical embedded sensor nodes
104 -- 112Shuanggen Liu, Guanglu Qi, Xu an Wang. Fast elliptic curve algorithm using deformed Fibonacci-type series
113 -- 119Lili Pan, Tiane Wang, Jiaohua Qin, Xuyu Xiang. A dynamic test prioritisation based on DU-chain coverage for regression testing
120 -- 125Jianming Zhang, Qianqian Huang, Honglin Wu, Yangchun Liu. Effective traffic signs recognition via kernel PCA network
126 -- 136Qiuhui Zhu, Min Zhu, Mingzhao Li, Min Fu, Zhibiao Huang, Qihong Gan, Zhenghao Zhou. Transportation modes behaviour analysis based on raw GPS dataset
137 -- 147Hyoungjong Kim, Jaehyeon Jang, Moonju Park. Dynamic frequency scaling for embedded systems with memory intensive applications
148 -- 160Mokhtar Aboelaze, Mohamed Ghazy Shehata, Sumaia Atiwa. A hardware in the loop emulator for a satellite control system
161 -- 167Lin Guo, Zhigang Chen, Ling Huang. A novel cognitive radio spectrum allocation scheme with chaotic gravitational search algorithm
168 -- 179He Yu, Gui-he Qin, Minghui Sun, Xin Yan, Xing-chen Wu. A study of IP-based vehicular gateway with IPv6

Volume 10, Issue 1

1 -- 12Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi. A language-based intrusion detection approach for automotive embedded networks
13 -- 21Zhimin Liu, Weijia Jia, Guojun Wang. Area coverage estimation model for directional sensor networks
22 -- 31Ryutaro Doi, Masanori Hashimoto, Takao Onoye. An analytic evaluation on soft error immunity enhancement due to temporal triplication
32 -- 40Yadong Wan, Xinqiang Luo, Yue Qi, Jie He, Qin Wang. Access-driven cache attack resistant and fast AES implementation
41 -- 51Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir, Rabah Attia. A modified Q-learning algorithm to solve cognitive radio jamming attack
52 -- 61Shuguang Dai, Zhengjun Jiang, Fangguo Zhang. Efficient leakage-resilient blind and partially blind signatures
62 -- 70Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu. GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption
71 -- 88Sourour Trab, Eddy Bajic, Ahmed Zouinkhi, Mohamed Naceur Abdelkrim, Hassen Chekir. RFID IoT-enabled warehouse for safety management using product class-based storage and potential fields methods