Journal: IJES

Volume 15, Issue 6

457 -- 466Marcus de V. D. da Silva, Eduardo E. Mosca, Rafael L. Gomes. Green industrial internet of things through data compression
467 -- 474Mouaad Mohy-Eddine, Said Benkirane, Azidine Guezzaz, Mourade Azrour. Random forest-based IDS for IIoT edge computing security using ensemble learning for dimensionality reduction
475 -- 492Shekhar Karanwal, Manoj Diwakar. EDRM-LBP: effective directional radial median local binary pattern for face recognition
493 -- 504Fan Zhang, Yinghui Zhang, Gang Han. Blockchain-based attribute-based keyword searchable encryption for health cloud system
505 -- 515Zhenyu Luo, Guoqing Zou, Zhiyong Li 0001, ShaoMiao Chen, Jianbo Xu. A memetic ready-mixed concrete scheduling method based on bidirectional collaborative optimisation for highway construction
516 -- 524Hetal V. Dave, Nirali A. Kotak. Critical analysis of cache memory performance concerning miss rate and power consumption

Volume 15, Issue 5

377 -- 384Huachen Tan. An asynchronous and parallel row-wise compressed SpMV kernel on heterogeneous CPU-GPU architectures
385 -- 394Rafal Kapela, Patryk Bartkowiak. Hardware-software embedded module for position correction of the telescope control system
395 -- 403Aruru Sai Kumar, T. V. K. Hanumantha Rao. Performance assessment of adaptive core mapping for NoC-based architectures
404 -- 420Latif Akçay, Berna Örs Yalçin. Analysing the potential of transport triggered architecture for lattice-based cryptography algorithms
421 -- 428Xu Zhang, Weisi Chen, Jianfeng Cui, Weidong Xiao. Research on multi-path network balancing method for cloud computing
429 -- 447Swapnil Sutar, Priyanka Mekala. Design of a performance evaluation platform for ultra-light crypto-system to develop a secure IoT node in edge computing
448 -- 456Yuan Wang, Liping Yang, Jun Wu, ShaoMiao Chen. K-prototype-based cluster algorithm for mixed educational data mining

Volume 15, Issue 4

289 -- 299Raz Ben Yehuda, Nezer Jacob Zaidenberg. The offline nanovisor
300 -- 312Likun Xing, Menglong Zhang, Yunfan Lu, Min Guo, Liuyi Ling. State of charge estimation for electric vehicle lithium-ion batteries based on model parameter adaptation
313 -- 325Mahfuzulhoq Chowdhury. An energy harvesting, blockchain, and QoS-aware intelligent healthcare task coordination policy for IoT-assisted networks
326 -- 332Vivek Kumar Singh, Abhishek Nag, Sambhu Nath Pradhan. Design and analysis of a low power strategy in finite state machines implemented in configurable logic blocks
333 -- 343Khadidja Belattar, Abdelhak Mehadjbia, Abdelkarim Bala, Ahmed Kechida. An embedded system-based hand-gesture recognition for human-drone interaction
344 -- 353Shuying Wang, Yonghua Hu, Anxing Xie, Huixiang Li, Xin Zhang, Shangfeng Mo. A vector processing method applicable to convolutional algorithms executed in digital signal processors
354 -- 362Muttuluru Sreekanth, R. K. Jeyachitra. Implementation of area-efficient AES using FPGA for IOT applications
363 -- 375Mahesh C. Pawaskar, Gaurav Vijay. Taylor rate-distortion trade-off with Laplace correction-assisted coding in HEVC encoder

Volume 15, Issue 3

183 -- 192Runyue Li. Computer embedded automatic test system based on VxWorks
193 -- 203Xingyun Peng, Dongfang Nie. Virtual sports rehabilitation and monitoring system for the elderly based on intelligent interaction and embedded system
204 -- 215Yao Cheng. Digital medical instrument based on embedded computer system
216 -- 225Yulan Mou. Embedded system for mobile interconnection control system of sports training cyclists
226 -- 238Iryna Voronenko, Maryna Nehrey, Anna Laptieva, Vitalina Babenko, Kostiantyn Rohoza. National cybersecurity: assessment, risks and trends
239 -- 248Vitalina Babenko, Olena Dmitrieva, Vyachslav Bratkevich, Yevhen Hrabovskyi, Oleksandr Al'boschiy. Development of methods formalisation subject technology design of multimedia edition
249 -- 258Chengjun Fu. Physical fitness evaluation system for athlete selection based on big data technology
259 -- 269Pengfei Wang, Xiuhui Diao. Beidou GPS SINS satellite positioning system based on embedded operating system
270 -- 278Linhong Wang, Lu Kong, Ping Wang. A simple measurement matrix for compressed sensing of synthetic aperture ultrasound imaging
279 -- 287Huirong Yang, Wenjie Zhang. Data mining in college student education management information system

Volume 15, Issue 2

83 -- 92Olmer Garcia-Bedoya, Janito Vaqueiro Ferreira. An embedded software architecture for the development of a cooperative autonomous vehicle
93 -- 107D. Divya, M. Bhasi 0001, M. B. Santosh Kumar. Characterisation of anomaly detection algorithms using simulated dataset for algorithm selection in application cases
108 -- 118Wenhui Xiao, ZhaoHui Tang, Jinping Liu. Spatial-temporal joint zinc flotation froth image denoising based on bubble dynamic features
119 -- 131Sanjib Kumar Nayak, Sanjaya Kumar Panda, Satyabrata Das, Sohan Kumar Pande. A multi-objective renewable energy-based algorithm for geographically distributed datacentres
132 -- 138Xinhua Guo, Hongbo Zhou, Mingdong Tang. The API-mashup ecosystem: a comprehensive study of ProgrammableWeb
139 -- 148Eko Fajar Cahyadi, Min-Shiang Hwang. An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings
149 -- 157Osama Hosam. An earthquake query system based on hidden Markov models
158 -- 166Chongren Wang, Qigang Liu, Shuping Li. A two-stage credit risk scoring method with stacked-generalisation ensemble learning in peer-to-peer lending
167 -- 179Tianming Yang, Haitao Wu, Wei Sun, Shuchen Zhou, Wen-Kuang Chou. Improving the performance and lifetime of TLC SSD by leveraging flash level disparities

Volume 15, Issue 1

1 -- 8Zongbo Wu, Wenhui Xiao, Han Deng, Lan Yang. Research on data privacy protection methods based on genome-wide association study
9 -- 18Mei Zhang, Li Gao, Xiao Zhang, Shuangshuang Zhang. An infrasound source localisation algorithm for improving location accuracy of gas pipeline leakage detection system
19 -- 26Tianke Fang, Han Deng, Bin Liu, Lan Yang, Xiangyi Xie. A safe distribution scheme of sensitive data based on full homomorphic encryption model
27 -- 33Zenyu Cai, Jingxiao Li, Yuhao Zhang, Jianwei Zhang, Wenqian Wang. Adaptive DSR routing caching strategy based on local connection mechanism
34 -- 43Yonghong Zhang, Jiaolian Zhao, Bo Zhang. An image encrypting algorithm based on 1D and 2D logistic chaotic systems
44 -- 52Danyang Zhao, Xinzhi Wang, Xiangfeng Luo. Path embedded hybrid reasoning model for relation prediction in knowledge graphs
53 -- 60Jincheng Hu, Tao Wang. Two-stream attention network with local and non-local dependence for referring relationships
61 -- 68Shyamali Mitra, Arunasish Datta, Souradeep Sikdar, Mrinal Kanti Naskar. FPGA implementation of fast square root algorithm with tunable accuracy
69 -- 81Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama. Mouldable fork-join task scheduling techniques with inter and intra-task communications