Journal: IJES

Volume 12, Issue 4

404 -- 413Roberto De Prisco, Alfredo De Santis, Pompeo Faruolo, Marco Mannetta. Design of an outdoor position certification authority
414 -- 423Brij B. Gupta, Megha Quamara. Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles
424 -- 433Andrea Bruno, Giuseppe Cattaneo. An experimental estimate of the impact produced on PNU by new generation video codecs
434 -- 440Katarzyna Koptyra, Marek R. Ogiela. Lightweight and efficient approach for multi-secret steganography
441 -- 452Hugo Sbai, Jassim Happa, Michael Goldsmith, Samy Meftali. A survey on screenlogger attacks as well as countermeasures
453 -- 457Laiali Almazaydeh. Secure RGB image steganography based on modified LSB substitution
458 -- 466Lelio Campanile, Marco Gribaudo, Mauro Iacono, Michele Mastroianni. Modelling performances of an autonomic router running under attack
467 -- 474Yafei Wang, Ming Ma. Research on intelligent obstacle avoidance control method for mobile robot in multi-barrier environment
475 -- 483P. Kumaresan, Prabukumar Manoharan, S. Subha. Heuristic approach to minimise the energy consumption of sensors in cloud environment for wireless body area network applications
484 -- 490Wenbo Fu. Mass internet of things data security exchange model under heterogeneous environment
491 -- 499Shuai Yang, Zhi-Hui Zou, Gihong Min. Tracking algorithm of weak disturbance signal under multi-device interference in internet of things
500 -- 509Wei She, Zhihao Gu, Wei Liu, Jian-Sen Chen, Bo Wang, Zhao Tian. A channel matching scheme for cross-chain
510 -- 521Kehong Zhang, Keqiu Li. A novel algorithm for TOP-K optimal path on complex multiple attribute graph
522 -- 533Binbin Yong, Zijian Xu, Jun Shen 0001, Huaming Chen, Jianqing Wu, Fucun Li, Qingguo Zhou. A novel Monte Carlo-based neural network model for electricity load forecasting
534 -- 543Zuoting Ning, Lan He, Dafang Zhang, Kun Xie 0001. A novel localised network coding-based overhearing strategy
544 -- 553Jianbo Xu, Shu Feng, Wei Liang, Jian Ke, Xiangwei Meng, Ruili Zhang, Danping Shou. An algorithm for determining data forwarding strategy based on recommended trust value in MANET
554 -- 566Weili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Yuren Zhou, Jing Bian. Hierarchical bucket tree: an efficient account structure for blockchain-based system

Volume 12, Issue 3

277 -- 285Yi-Chun Chang, Jian Wei Li, Chia-Ching Lin, Fu-Syuan Yang. Multimedia push system based on a wellness slot machine
286 -- 293Ning Cao 0002, Guofu Li, Hua Yu, Yingying Wang, Mei Wu, Chenjing Gong. Analysis of single-hop routing protocol evaluation models in wireless sensor networks
294 -- 304Hong Zhang, Bing Guo, Yuncheng Shen, Xuliang Duan, Xiangqian Dong, Yan Shen. A research on hierarchical trackback technique for individual big data
305 -- 314Wei Sun, Yuzhou Zhao, Xiaorui Zhang, Yang Wu. Scale-adaptive vehicle tracking based on background information
315 -- 323Bin Gu, Long Chen 0017, Yufeng Ke, Yijie Zhou, Haiqing Yu, Kun Wang, Dong-ming. The effects of varying levels of mental workload on motor imagery based brain-computer interface
324 -- 340Krastin Nikov, José L. Núñez-Yáñez. Intra and inter-core power modelling for single-ISA heterogeneous processors
341 -- 349Wei Sun 0012, Hui Xu, Xiaorui Zhang, Aiguo Song. Automatic melanoma diagnosis framework based on common image feature learning
350 -- 358Xiangmao Chang, Yizhen Chen, Yan Li. Topology control for constructive interference-based data dissemination in WSN
359 -- 370Qi Wang, Chang-song Yang, Yu-Xiang Wang. Study on the observability degree of integrated inertial navigation system of autonomous underwater vehicle
371 -- 379Wei Sun 0012, Hongji Du, Guangyi Ma, Shunshun Shi, Xiaorui Zhang, Yang Wu. Moving vehicle video detection combining ViBe and inter-frame difference
380 -- 392Yan Leng, Jian Qi, Yepeng Liu, Fujian Zhu. Design of dry-type transformer temperature controller based on internet of things
393 -- 400Ping Ren, Jingzhao Li, Dayu Yang. A new mobile opportunity perception network strategy and reliability research in coal mine

Volume 12, Issue 2

137 -- 145Dingcheng Wang, Yiyi Lu, Beijing Chen, Youzhi Zhao. Wind weather prediction based on multi-output least squares support vector regression optimised by bat algorithm
146 -- 155Shujing Li, Linguo Li, Bin Xu 0014, Yingying Feng, Hongzhi Zhou. Research of a reliable constraint algorithm on MIMO signal detection
156 -- 165Xincheng Li, Yali Liu, Xinchun Yin. TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks
166 -- 176Yiwen Zhang. Energy-aware fixed-priority scheduling for periodic tasks with shared resources and IO devices
177 -- 185Mei Wu, Ning Cao 0002, Haihui Wang, Lina Xu, Guofu Li. A hybrid optimisation algorithm based on GA algorithm and ACO algorithm improvements for routing selection in heterogeneous sensor networks
186 -- 194Wendi Sun, Tao Wang, Zhili Zhou. Partial-duplicate image retrieval using spatial and visual contextual clues
195 -- 205Rui Ma 0004, Yue Liu, Ke Ma, Xu an Wang. Identification and addressing of internet of things based on distributed ID
206 -- 215Xiangsong Zhang, Zhenhua Liu, Xu an Wang, Fenghe Wang. Constant-size ring signature scheme using multilinear maps
216 -- 225Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li. Zero-knowledge identification scheme with companion matrices of primitive polynomials
226 -- 233Zhenhua Li, Dong-Li Duan. Identification of cascading dynamic critical nodes in complex networks
234 -- 242Sonia Sabrina Bendib, Hamoudi Kalla, Salim Kalla. Bi-objective scheduling with cooperating heuristics for embedded real-time systems
243 -- 252Shuzhen Pan, Yan Kong, Qi Liu. Privacy-preserving traffic forecast scheme for intelligent transportation system
253 -- 265Minyao Hua, Yinyuan Zhao, Tao Jiang 0017. Secure data deletion in cloud storage: a survey
266 -- 276Jing Li, Jing Jiang, Yunchan Zhou, Pengfei Guo, Xinze Li, Dongchen Xu. Design for the external frame of a resonant accelerometer sensor

Volume 12, Issue 1

1 -- 10Linguo Li, Ling Tan, Shujing Li, Qing Ye. Image fusion based on convolution sparse representation and pulse coupled neural network in non-subsampled contourlet domain
11 -- 21Quanzhi Lei, Lijun Xiao, Osama Hosam, Haibo Luo. A novel watermarking algorithm based on characteristics model of local fragmentary images
22 -- 30Boyi Liu, Xiangyan Tang, Jieren Cheng, Pengchao Shi. Traffic flow combination forecasting method based on improved LSTM and ARIMA
31 -- 38Qingtang Su, Lin Su, Gang Wang 0029, Leida Li, Jianting Ning. A novel colour image watermarking scheme based on Schur decomposition
39 -- 61Habib Chawki Touati, Fateh Boutekkouk. Reliable routing schemes in 3D network on chip
62 -- 71Haidong Zhong, Xianyi Chen. A separable reversible data hiding scheme in encrypted image for two cloud servers
72 -- 80Dongjie Zhu, Haiwen Du, Yuhua Wang, Xuan Peng. An IoT-oriented real-time storage mechanism for massive small files based on Swift
81 -- 92Maoling Yan, Pingzeng Liu, Cezhong Tong, Xiujuan Wang, Fujiang Wen, Changqing Song, Russell Higgs, Gregory M. P. O'Hare. A farmland-microclimate monitoring system based on the internet of things
93 -- 105Guangli Li, Lei Liu, Tongbo Zhang, Hang Yu, Yue Xu, Shuai Lü. Visual field movement detection model based on low-resolution images
106 -- 115Qiang Yue, Fusheng Liu, Changqing Song, Jing Liang, Yanmin Liu, Guangsheng Cao. Exploration and application of the value of big data based on data-driven techniques for the hydraulic internet of things
116 -- 124Junshe Wang, Han Wang, Hongbin Zhang. A trust and attribute-based access control framework in internet of things
125 -- 135Yang Liu 0001, Lin Meng, Ittetsu Taniguchi, Hiroyuki Tomiyama. A branch-and-bound approach to scheduling of data-parallel tasks on multi-core architectures