Journal: IJES

Volume 9, Issue 6

495 -- 504Cuicui Bai, Yinghui Zhang, Hua Ma, Zhenhua Liu. Expressive ciphertext-policy attribute-based encryption with direct user revocation
505 -- 522Afrah Djeddar, Hakim Bendjenna, Abdelkrim Amirat, Philippe Roose, Lawrence Chung. Context-driven composition for mobile applications: a metamodelling approach
523 -- 534Mayuri Digalwar, Praveen Gahukar, Biju K. Raveendran, Sudeept Mohan. Energy efficient real-time scheduling algorithm for mixed task set on multi-core processors
535 -- 547Haibo Tian, Yu-Feng Ma, Baodian Wei. Proxy re-designated verifier signature and its applications
548 -- 559Wei Yang, Qin Wang, Yadong Wan, Yue Qi. Time synchronisation attacks and defences in IEEE802.15.4e networks
560 -- 569Wenbo Zhang, Zhenshan Bao, Pengfei Yang, Lijuan Duan, Jian Li. A new construction of fuzzy operator-attribute-based signcryption on VCC
570 -- 582Alessandro Bezerra Trindade, Renato De Faria Degelo, Edilson Galvão Dos Santos Junior, Hussama Ibrahim Ismail, Helder Cruz Da Silva, Lucas Carvalho Cordeiro. Multi-core model checking and maximum satisfiability applied to hardware-software partitioning
583 -- 594Qingguo Zhou, Rui Zhou 0005, Binbin Yong, Xiaoqiang Wang, Gaofeng Zhang, Hai Jiang, Kuan-Ching Li. L4eRTL: a robust and secure real-time architecture with L4 microkernel and para-virtualised PSE51 partitions

Volume 9, Issue 5

391 -- 400B. B. Gupta, Omkar P. Badve. GARCH and ANN-based DDoS detection and filtering in cloud computing environment
401 -- 412Ivaylo Atanasov, Anastas Nikolov, Evelina Pencheva. An approach to transform Internet of Things data into knowledge
413 -- 425Mohammed G. H. al Zamil. A verifiable framework for smart sensory systems
426 -- 443Manel Gherari, Abdelkrim Amirat, Ridda Laouar, Mourad Chabane Oussalah. A smart mobile cloud environment for modelling and simulation of mobile cloud applications
444 -- 455P. Thanapal, M. A. Saleem Durai. A framework for computational offloading to extend the energy of mobile devices in mobile cloud computing
456 -- 463Mohammad Al-Rousan, Elham Al-Shara, Yaser Jararweh, Mohammad H. Alshayeji. Cloudlet-based ad hoc mobile cloud computing: design and evaluation
464 -- 474Gildo Torres, Paul McCall, Chen Liu, Mercedes Cabrerizo, Malek Adjouadi. EEG processing: a many-core approach utilising the Intel single-chip cloud computer platform
475 -- 483Archana Sreekumar, V. Radhamani Pillay. An increased resilient fault tolerant framework for navigation, guidance, control system with augmented resources
484 -- 494Achraf Ben Ahmed, Abderazek Ben Abdallah. Architecture and design of real-time system for elderly health monitoring

Volume 9, Issue 4

298 -- 309Emre Yay, Natividad Martínez Madrid. Creating recommendations in an energy-efficient and safety relevant driving system while considering driver stress and driver reaction
310 -- 320S. R. Vijayalakshmi, S. Muruganand. Different soft computing algorithms used in fire sensor node of wireless sensor network integrated with IoT
321 -- 327Amin Zammouri, Abdelaziz Ait Moussa. Eye blinks artefacts detection in a single EEG channel
328 -- 336Mathews Peter, Shriram K. Vasudevan. Accident prevention and prescription by analysis of vehicle and driver behaviour
337 -- 352Mario Barbareschi, Pierpaolo Bagnasco. Implementation of a reliable mechanism for protecting IP cores on low-end FPGA devices
353 -- 364Mario Barbareschi, Pierpaolo Bagnasco, Domenico Amelino, Antonino Mazzeo. Designing an SRAM PUF-based secret extractor for resource-constrained devices
365 -- 378Yongxuan Lai, Xing Gao, Tian Wang, Ziyu Lin. Efficient iceberg join processing in wireless sensor networks
379 -- 398Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu. Revocable hierarchical identity-based encryption over lattice for pay-TV systems

Volume 9, Issue 3

195 -- 201Yujuan Sun, Zeju Wu, Xiaofeng Zhang, Yongqing Lei. Three dimensional face reconstruction based on average face model and photometric stereo
202 -- 210Jinglong Zuo, Delong Cui, Qirui Li. A novel slant transform-based image feature extract algorithm
211 -- 219Wei Li, Kangshun Li, Ying Huang, Xiaoyang Deng. Defects of wheel hubs detection and recognition based on trend peak algorithm
220 -- 228Cheng Chen, Zhendong Wu, Jianwu Zhang, Ping Li, Freeha Azmat. A finger vein recognition algorithm based on deep learning
229 -- 240Huilan Luo, Chengtao Wan, Minjie Guo. Fusing multiple features and spatial information for image classification via codebook ensemble
241 -- 249Yunlu Wang, Hao Wen, Zhihua Jian, Li Shuhuai. A novel WDM-PON based on quantum key distribution FPGA controller
250 -- 261Jianwu Zhang, Jianchao He, Zhendong Wu, Freeha Azmat, Ping Li. Prosodic features-based speaker verification using speaker-specific-text for short utterances
262 -- 274Shuqiang Huang, Jielin Zeng, Hongchun Zhou, Zhusong Liu, Yuyu Zhou. A near-field magnet peak values detecting method to locate short circuit points on PCB
275 -- 282Dongbo Zhang, Yanfang Shou, Jianmin Xu. An improved parallel K-means algorithm based on MapReduce
283 -- 295José Antonio Esparza Isasa, Peter Gorm Larsen, Finn Overgaard Hansen. A holistic approach to energy-aware design of cyber-physical systems

Volume 9, Issue 2

101 -- 111Lubiao Li, Junsheng Zhang, Yanqing He, Huilin Wang. Chinese temporal relation resolution based on Chinese-English parallel corpus
112 -- 118Xihai Zhang, Tianjian Wang, Junlong Fang. A node localisation approach based on mobile beacon using particle swarm optimisation in wireless sensor networks
119 -- 129Xianfeng Li, Zhiqiang Bao. A comprehensive performance study of HTML5-enabled WebApps
130 -- 146Joni Jantunen, Ilari Teikari, Michaël Pelissier, Bertrand Gomez, Florent Lepin. Implementation and verification of a new impulse UWB radio system with HF/UHF remote-powering for passive wireless memory tags
147 -- 156Yang Liu, Lin Meng, Ittetsu Taniguchi, Hiroyuki Tomiyama. A dual-mode scheduling approach for task graphs with data parallelism
157 -- 167Sikandar M. Zulqarnain Khan, Giorgio Buttazzo. Increasing the resolution of laser rangefinders using low frequency pulses
168 -- 176Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma. An efficient revocable ID-based encryption scheme in the standard model
177 -- 187Jianhong Zhang, Jian Mao. Anonymous multi-receiver broadcast encryption scheme with strong security
188 -- 194Lingwei Xu. Performance analysis of AF relaying M2M cooperative system

Volume 9, Issue 1

3 -- 11Xiaobing Xian, Feng Chen, Jia-nian Wang. An insight into campus network user behaviour analysis decision system
12 -- 19Narisha, Zhiwei Li, Henan Qiu, Xudong Wang. Research of position sensorless control for PMSM based on sliding mode observer and phase-locked loop
20 -- 28Wenliang Jiao, Xudong Wang, Risha Na, Lixin Zhang, Lihua Li. Study of optimum control strategy for multiple pulse thyristor rectifiers
29 -- 35Heng Song, Junwu Zhu, Weicong Chen, Hongchuan Zhang. On consumption shifting scheme for power
36 -- 44Wenchao Fang, Hanqiao Jiang, Junjian Li, Wenpei Miao, Kang Ma, Wu Xiao. An intelligent production fluctuation monitoring system for giant oilfield development
45 -- 53Xiaoyong Ni, Hongjian Zhang, Dianhong Wang, Jian Luo. Implementation of dynamic reconfigurable interpolator for open architecture CNC by using FPGA
54 -- 60Ming-Xin Jiang, Dusheng Wang, Tianshuang Qiu. Multi-person detecting and tracking based on RGB-D sensor for a robot vision system
61 -- 73Mabel Mary Joy, Franz-Josef Rammig. A hybrid methodology to detect memory leaks in soft real-time embedded systems software
74 -- 89B. Sharat Chandra Varma, Kolin Paul, M. Balakrishnan, Dominique Lavenier. Hardware acceleration of de novo genome assembly
90 -- 100Nilanjan Dey, Sk. Saddam Ahmed, Sayan Chakraborty, Prasenjit Maji, Achintya Das, Sheli Sinha Chaudhuri. Effect of trigonometric functions-based watermarking on blood vessel extraction: an application in ophthalmology imaging