Journal: IJES

Volume 13, Issue 4

361 -- 371Nunzio Cecere, Massimo Tipaldi, Davide De Pasquale. Applying analytical and empirical schedulability analysis techniques to a real spacecraft flight software
372 -- 379Wenbin Yu 0002, Zijia Xiong, Yang Liu, Shanshan Rong, Siyao Wang, Yinsong Xu 0001, Alex X. Liu. Zero-error channel capacity of quantum 5-symbol obfuscation model
380 -- 386Fengchang Xue, Juan Tian, Xiaoyi Song, Yan Yan. Urban waterlogging monitoring and early warning based on video images
387 -- 397Guojun Yang, Xiaohu Zhou, Zhiyao Liang. Enterprise internationalisation performance evaluation model based on artificial neural network
398 -- 404Chungen Xu, Yingying Zhang, Lin Mei, Lei Xu 0019, Cong Zuo. Attacking the Niederreiter-type cryptosystem based on rank metric
405 -- 413Xiaoli Li 0005, Guomei Song, Shuailing Zhou, Yujia Yan, Zhenlong Du. Rainfall runoff prediction via a hybrid model of neighbourhood rough set with LSTM
414 -- 421Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu. Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices
422 -- 430Demin Gao, Jie Xin, Fuquan Zhang. A decision tree algorithm for forest fire prediction based on wireless sensor networks
431 -- 438Abhishek Nag, Subhajit Das, Sambhu Nath Pradhan. Low power transistor level synthesis of finite state machines using a novel dual gating technique
439 -- 448Lili Pan, Cong Li, Yan Zhou, Rongyu Chen, Bing Xiong. A combinational convolutional neural network of double subnets for food-ingredient recognition
449 -- 458Jing Zhang, Dan Yang. Time-aware parallel collaborative filtering movie recommendation based on Spark
459 -- 465Hangjun Zhou, Xingxing Zhou, Jing Liu, KeZhuo Chen. Factor analysis and evaluation of China's higher education development in big data era
466 -- 475Md. Al Maruf, Akramul Azim. A software-based calibration approach to increase the robustness of embedded systems
476 -- 484Yonghui Dai, Tao Wang, Ziyi Wang, Bo Xu. Effect of the crowdfunding description on investment decisions from the perspective of prosocial behaviour

Volume 13, Issue 3

255 -- 263Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma. A sparse system identification algorithm based on fractional order LMS
264 -- 273Hassun Vakilian Zand, Mohsen Raji, Hossein Pedram, Hossein Heidari SharifAbadi. A genetic algorithm-based tasks scheduling in multicore processors considering energy consumption
274 -- 282Yinxiang Qu, Yifei Wei, Mei Song, Dan Liu, Xiaojun Wang 0001. A new software-defined network architecture to solve energy balance problems in wireless sensor networks
283 -- 291Jianfeng Lu, Xuanyuan Yang. Localisation algorithm based on weighted semi-definite programming
292 -- 299Jiaqi Zhen, Boshen Liu, Yanwei Wang, Yong Liu. An improved method for indoor positioning based on ZigBee technique
300 -- 307Jiaqi Zhen, Yanwei Wang, Yong Liu. DOA estimation of wideband sources by sparse recovery based on uniform circle array
308 -- 317Ning Chen, Xiaohu Ding, Hongyi Zhang. Improved Faster R-CNN identification method for containers
318 -- 327Jing Wang, Dezhi Han. Design of network intrusion detection system based on parallel DPC clustering algorithm
328 -- 340Shao Wen, Tao Zui, Xie Yong, John J. Qu, Huan Hai, Tian Chuan Yang. Based on the GF1 and GF4 radiation calibration analysis
341 -- 351Lina Wang, Chaoyao Shen, Sheng Yuan, Yongjun Ren, Yong Wang, Jinyue Xia. Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde
352 -- 359Weiwei Liu, Yang Tang, Fei Yang, Yi Dou, Jin Wang. Research on urban transport network topology vulnerability identification under rainfall conditions

Volume 13, Issue 2

129 -- 135Haitao Wu, Tianming Yang, Ping Huang 0001, Wen-Kuang Chou. Extending the lifetime of NAND flash-based SSD through compacted write
136 -- 147Mohammad Reza Heidari Iman, Pejman Yaghmaie. A software control flow checking technique in multi-core processors
148 -- 157Hong Xiao, Rongyue Zhang, Zhigang Chen, Yingshuang Liu, Yubin Zhou. Maintenance cycle optimisation of multi-component systems under the constraints of overall cost and reliability
158 -- 168Wei Zhuang, Suyun Xu, Yue Han, Jian Su, Chunming Gao, Dan Yang. The design and implementation of a wearable human activity recognition system based on IMU
169 -- 179Wei Zhuang, Yi Zhan, Yue Han, Jian Su, Chunming Gao, Dan Yang. Design of a hand gesture recognition system based on forearm surface electromyography feedback
180 -- 187Haibo Luo, Zhiqiang Ruan. Release and collection method of residual energy for one-dimensional linear-zone internet of things
188 -- 199Amin Danial Asham. A new upper bound of the completion time of the background task in a foreground-background system
200 -- 208Xiangqian Wang, Huizong Li, Jie Yang 0009, Chaoyu Yang, Haixia Gui. Optimal path selection for logistics transportation based on an improved ant colony algorithm
209 -- 220Zhenyu Liu, Xin Su 0004, Dafang Zhang, Jing Long. A robust error control coding-based watermarking algorithm for FPGA IP protection
221 -- 235Vincenzo Conti, Andrea Ziggiotto, Mauro Migliardi, Salvatore Vitabile. Bio-inspired security analysis for IoT scenarios
236 -- 253João Gabriel Reis, Antônio Augusto Fröhlich. Towards deterministic FPGA reconfiguration

Volume 13, Issue 1

1 -- 8Tingting Shao, Xuening Chen. Hash-based and privacy-aware movie recommendations in a big data environment
9 -- 17Juan Huan, Weijian Cao, Yuwan Gu, Yilin Qin. A hybrid model of empirical wavelet transform and extreme learning machine for dissolved oxygen forecasting
18 -- 27Yuwan Gu, Yaru Wang, Juan Huan, Yuqiang Sun, Shoukun Xu. An improved TFIDF algorithm based on dual parallel adaptive computing model
28 -- 39Amit Kumar, Yugal Kumar, Ashima Kukkar. A feature selection model for prediction of software defects
40 -- 49B. B. Gupta 0001, Megha Quamara. Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications
50 -- 64Hitesh Yadav, A. Charan Kumari, Rita Rana Chhikara. Feature selection optimisation of software product line using metaheuristic techniques
65 -- 73Guangyi Ma, Hui Xu, Xijie Zhou, Wei Sun 0012. Home security alarm system for middle-aged people living alone
74 -- 84Virendra P. Vishwakarma, Varsha Sisaudia. Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy
85 -- 100Srichandan Sobhanayak, Kavita Jaiswal, Ashok Kumar Turuk, Bibhudatta Sahoo 0001, Bhabendu Kumar Mohanta, Debasish Jena. Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm
101 -- 112Baohua Huang, Sheng Liang, Dongdong Xu, Zhuohao Wan. A homomorphic range searching scheme for sensitive data in internet of things
113 -- 120Qi Wang, Chang-song Yang, Shaoen Wu. RFID aided SINS integrated navigation system for lane applications
121 -- 127Qi Wang, Chang-song Yang, Shaoen Wu. Application of vision aided strapdown integrated navigation in lane vehicles