


default search action
Computers & Electrical Engineering, Volume 38
Volume 38, Number 1, January 2012
- Weichuan Yu

, Zheng-Hua Tan
, Yi Wan:
Guest Editors' Introduction to the Special Issue on "New Trends in Signal Processing and Biomedical Engineering". 1-2 - Lei Chen, Guangnan Xing, Yingjie Xu, Xiaoxiang Liu, Tuanjie Zhao, Junyi Gai:

Identification of major responding proteins of abnormal leaf and flower in soybean with an integrative "omics" strategy. 3-10 - Kun-Li Wen, Ya-Ting Lee:

Applying rough set theory in the function group analysis for phenolic amide compounds. 11-18 - Wenchao Jiang, Matthias Baumgarten, Qingyun Dai, Yanhong Zhou:

The deployment and evaluation of a bioinformatics grid platform - The HUST_Bio_Grid. 19-34 - Boyu Wang

, Chiman Wong, Feng Wan
, Peng Un Mak
, Pui-In Mak
, Mang I Vai:
Trial pruning based on genetic algorithm for single-trial EEG classification. 35-44 - Guang-zheng Yu, Bo-sun Xie, Xiang-xu Chen:

Analysis on minimum-phase characteristics of measured head-related transfer functions affected by sound source responses. 45-51 - Elias Aboutanios

, Yannis Kopsinis, Denis Rubtsov:
Instantaneous frequency based spectral analysis of nuclear magnetic resonance spectroscopy data. 52-67 - Rajarshi Gupta

, Jitendranath Bera
, Madhuchhanda Mitra
:
A bi-phase enabled serial acquisition system for remote processing of digitized ECG. 68-74 - Orhan Er, A. Çetin Tanrikulu, Abdurrahman Abakay, Feyzullah Temurtas

:
An approach based on probabilistic neural network for diagnosis of Mesothelioma's disease. 75-81
- Mohammad Reza Seifi, Mohammad Eshghi:

Clustered NOC, a suitable design for group communications in Network on Chip. 82-95 - Yamin Wen, Fangguo Zhang

, Lingling Xu:
Secret handshakes from ID-based message recovery signatures: A new generic approach. 96-104 - Prabagarane Nagaradjane, Lakshmi Krishnan, Arvind Sai Sarathi Vasan:

Performance analysis of multicell multiuser MIMO MC DS/CDMA system with MMSE user-ordered SIC technique. 105-115 - Mande Xie, Guiyi Wei, Yujia Ge, Yun Ling:

Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks. 116-127 - D. P. Torres, Evelio M. García Fernández

, Eduardo Parente Ribeiro
, Vitalio Alfonso Reguera
, C. de Oliveira:
On the impact of adaptive RED in IP networks transporting H.264/MPEG-4 AVC video streams. 128-139 - M. J. Lengare, Rajan H. Chile, Laxman M. Waghmare

:
Design of decentralized controllers for MIMO processes. 140-147 - Paris Kitsos

, Nicolas Sklavos
, Maria Parousi, Athanassios N. Skodras
:
A comparative study of hardware architectures for lightweight block ciphers. 148-160 - Servet Soyguder, Hasan Alli:

Computer simulation and dynamic modeling of a quadrupedal pronking gait robot with SLIP model. 161-174 - Jing Guo, Xiaoping Zeng, Zhishun She:

Blind source separation based on high-resolution time-frequency distributions. 175-184
Volume 38, Number 2, March 2012
- Shu-Chung Yi:

A new construction adder based on Chinese abacus algorithm. 185-193 - Xianfu Meng, Wenqing Cui:

Research on the immune strategy for the polluted file propagation in structured P2P networks. 194-205 - Fotis Plessas, Efthimios Davrazos, Alexis Alexandropoulos, Michael K. Birbas, John C. Kikidis:

A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control. 206-216 - Yang Zhou, Gangyi Jiang, Mei Yu, Zongju Peng, Feng Shao:

Region-based error concealment of right-view frames for stereoscopic video transmission. 217-230 - George Lagogiannis, Nikos A. Lorentzos:

Partially persistent B-trees with constant worst-case update time. 231-242 - Krishna M. Kavi, Izuchukwu Nwachukwu, Ademola Fawibe:

A comparative analysis of performance improvement schemes for cache memories. 243-257 - Jorge González-Domínguez

, Guillermo L. Taboada
, Basilio B. Fraguela
, María J. Martín
, Juan Touriño
:
Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite. 258-269 - Feiyang Liu, Huaxi Gu

, Yintang Yang:
DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip. 270-281 - Mohamed Reda Lakehal

, Youcef Ferdi
, Abdelmalik Taleb-Ahmed:
On the self-similarity of 1/fβ sequences synthesized by recursive filtering. 282-293 - George N. Korres, Nikolaos M. Manousakis

:
A state estimator including conventional and synchronized phasor measurements. 294-305 - Chao Wu, Yike Guo

, Bo Zhou:
Social networking federation: A position paper. 306-329 - Basel A. Mahafzah

, Mohammad Aref Alshraideh
, Tasneem M. Abu-Kabeer, Elham F. Ahmad, Nesreen A. Hamad
:
The Optical Chained-Cubic Tree interconnection network: Topological structure and properties. 330-345 - Pedro Martinez-Julia, Antonio Fernandez Gómez-Skarmeta

:
Using identities to achieve enhanced privacy in future content delivery networks. 346-355 - Nooshin Bigdeli, Yousef Farid, Karim Afshar:

A robust hybrid method for image encryption based on Hopfield neural network. 356-369 - Fuchun Guo

, Yi Mu, Willy Susilo
:
Efficient and secure stored-value cards with leakage resilience. 370-380 - Fengtong Wen

, Xuelei Li
:
An improved dynamic ID-based remote user authentication with key agreement scheme. 381-387 - Sa'ed Abed

, Ashraf Hasan Bqerat
, Sahel Alouneh
, Bassam Jamil Mohd:
A novel approach to enhance distributed virtual memory. 388-398 - Mohammed Amoon

:
A fault-tolerant scheduling system for computational grids. 399-412 - Fagen Li

, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi:
Further improvement of an identity-based signcryption scheme in the standard model. 413-421 - Mohamed A. Mohandes

, Mohamed A. Deriche
, Umar Johar
, S. Ilyas:
A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model. 422-433 - Pandya Lakshman:

Combining deblurring and denoising for handheld HDR imaging in low light conditions. 434-443 - Servet Soyguder, Hasan Alli:

Kinematic and dynamic analysis of a hexapod walking-running-bounding gaits robot and control actions. 444-458 - Tao Wu, Kun Qin:

Image data field for homogeneous region based segmentation. 459-470
Volume 38, Number 3, May 2012
- Mehdi Shadaram, David Akopian

, Glaucio H. S. Carvalho:
Guest Editors' Introduction to the Special Issue on The design and analysis of wireless systems: New inspirations. 471-472 - Lei Guo

, Lincong Zhang, Yuhuai Peng, Jingjing Wu, Xiao-Ying Zhang, Weigang Hou, Jun Zhao:
Multi-path routing in Spatial Wireless Ad Hoc networks. 473-491 - Tatiana G. Bonifácio, Rodrigo Palucci Pantoni, Dennis Brandão

:
SMAC multi-hop mesh routing protocol using IEEE 802.15.4. 492-509 - B. Q. Kan, J. H. Fan, J. Y. Wang, Z. Y. Lu, J. Cheng, Q. Wu:

Jamming aware routing for MHWN with dynamic measurement. 510-521 - S. Smys, G. Josemin Bala:

Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). 522-532 - Zhaolong Ning

, Lei Guo
, Yuhuai Peng, Xiaojie Wang
:
Joint scheduling and routing algorithm with load balancing in wireless mesh network. 533-550 - Wei Wang, Guosun Zeng, Jing Yao, Hanli Wang, Daizhong Tang:

Towards reliable self-clustering Mobile Ad Hoc Networks. 551-562 - Hua Guo, Chang Xu

, Yi Mu, Zhoujun Li:
A provably secure authenticated key agreement protocol for wireless communications. 563-572 - Hu Xiong, Zhong Chen, Fagen Li:

Efficient and multi-level privacy-preserving communication protocol for VANET. 573-581 - Rong Geng, Lei Guo

, Xingwei Wang:
A new adaptive MAC protocol with QoS support based on IEEE 802.11 in ad hoc networks. 582-590 - Fotis Foukalas, George T. Karetsos, Lazaros F. Merakos

:
Spectral efficiency of cognitive radio networks under interference constraint and QoS guarantees. 591-602 - Catalin Lacatus, David Akopian

, Mehdi Shadaram:
Reduced complexity crosscorrelation interference mitigation in GPS-enabled collaborative ad-hoc wireless networks - Theory. 603-615 - Raksha Upadhyay

, Sanjiv Tokekar
, Prakash D. Vyavahare:
Performance analysis of WLAN physical layers using Markov channel model. 616-625 - Sheikh Tahir Bakhsh

, Halabi Hasbullah, Sabeen Tahir
:
Dynamic relay management protocol for efficient inter-piconet scheduling in Bluetooth scatternet. 626-642 - Gengzhong Zheng, Sanyang Liu, Xiaogang Qi

:
Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. 643-651 - Huanqing Cui, Yinglong Wang:

Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks. 652-661 - Aimin Wang, Dailiang Yang, Dayang Sun:

A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. 662-671 - Murad Abusubaih:

Joint RTS/CTS and time slotting for interference mitigation in multi-BSS 802.11 wireless LANs. 672-680 - Chih-Peng Lin, Hsing-Lung Chen, Jenq-Shiou Leu:

A predictive handover scheme to improve service quality in the IEEE 802.21 network. 681-693 - De-gan Zhang, Chen-peng Zhao, Yan-pin Liang, Zhao-jing Liu:

A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. 694-702 - Yunsheng Liu, Zheng Wang:

Maximizing energy utilization routing scheme in wireless sensor networks based on minimum hops algorithm. 703-721
- Fangyang Shen, Mei Yang, Maurizio Palesi

:
Guest Editors' Introduction to the Special Issue on "Emerging Computing Architectures and Systems". 722-723 - C. Christopher Columbus, Sishaj P. Simon:

Profit based unit commitment: A parallel ABC approach using a workstation cluster. 724-745 - Yijun Liu, Anthony S. Fong, Fangyang Shen:

HISC: A computer architecture using operand descriptor. 746-755 - Eduard Fernandez-Alonso

, David Castells-Rufas
, Jaume Joven, Jordi Carrabina
:
Development process for clusters on a reconfigurable chip. 756-771 - Yuan Tian, Weikuan Yu

, Jeffrey S. Vetter:
RXIO: Design and implementation of high performance RDMA-capable GridFTP. 772-784 - Xiongli Gu, Peng Liu, Mei Yang, Jie Yang, Cheng Li, Qingdong Yao:

An efficient scheduler of RTOS for multi/many-core system. 785-800 - Yiou Chen, Jianhao Hu, Xiang Ling, Tingting Huang:

A novel 3D NoC architecture based on De Bruijn graph. 801-810
Volume 38, Number 4, July 2012
- Shu-Nung Yao, Timothy Collins

, Peter Jancovic:
Hybrid method for designing digital Butterworth filters. 811-818 - Kabir Chakraborty, Abhinandan De

, Abhijit Chakrabarti
:
Voltage stability assessment in power network using self organizing feature map and radial basis function. 819-826 - Saeed Parsa

, Reza Entezari-Maleki
:
A queuing network model for minimizing the total makespan of computational grids. 827-839 - Jianxin Liao, Qi Qi, Zhaoyong Xun, Tonghong Li

, Yufei Cao, Jingyu Wang
:
A linear chained approach for service invocation in IP Multimedia Subsystem. 840-852 - Yaobin Zou, Hong Liu, Enmin Song, Zhiyong Huang:

Image bilevel thresholding based on multiscale gradient multiplication. 853-861 - Kostas Tsagkaris

, Aimilia Bantouna
, Panagiotis Demestichas
:
Self-Organizing Maps for advanced learning in cognitive radio systems. 862-881 - Fan Zhang, Xinhong Zhang, Kui Cao, Rui Li:

Contour extraction of gait recognition based on improved GVF Snake model. 882-890 - Chun-Chuan Yang, Yi-Ting Mai, Jeng-Yueng Chen, Yu-Shiuan Shen, Yu-Chen Kuo:

LBPS: Load-Based Power Saving in the IEEE 802.16e Network. 891-905 - Yancang Chen, Zhonghai Lu, Lunguo Xie, Jinwen Li, Minxuan Zhang:

A single-cycle output buffered router with layered switching for Networks-on-Chips. 906-916 - Fengcai Li, Guanghua Gu, Chengru Wang:

Scene categorization based on integrated feature description and local weighted feature mapping. 917-925 - Carlos Restrepo

, Carlos Andrés Ramos-Paja
, Roberto Giral
, Javier Calvente
, Alfonso Romero
:
Fuel cell emulator for oxygen excess ratio estimation on power electronics applications. 926-937 - Mohamed Djendi:

An efficient stabilized fast Newton adaptive filtering algorithm for stereophonic acoustic echo cancellation SAEC. 938-952 - Sheng-Shih Wang

, Chan-Ying Lien, Wen-Hwa Liao
, Kuei-Ping Shih:
LASER: A load-aware spectral-efficient routing metric for path selection in IEEE 802.16j multi-hop relay networks. 953-962 - Melika Tinati

, Ahmad Khademzadeh, Ali Afzali-Kusha, Majid Janidarmian:
HACS: A novel cost aware paradigm promising fault tolerance on mesh-based network on chip architecture. 963-974 - Puwen Wei, Xiaoyun Wang, Yuliang Zheng

:
Public key encryption without random oracle made truly practical. 975-985 - Ali Massoud, Abdalla Osman, Aboelmagd Noureldin

:
DOA estimation based on fourth order cumulant beamforming for nonuniform linear array of DIFAR sonobuoys. 986-993 - Peter James Vial, Beata J. Wysocki, Tadeusz A. Wysocki, Montserrat Ros

, David Stirling
:
On the effect of Multiple Access Interference in a Space Time Spreading Time Hopping PPM UWB system. 994-1009 - Mohammed Saeed Jawad, Widad Ismail, Badrul Hisham Ahmad

:
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures. 1010-1022 - Liang Cheng, Manchun Li

, Yongxue Liu
, Wenting Cai, Yanming Chen, Kang Yang:
Remote sensing image matching by integrating affine invariant feature extraction and RANSAC. 1023-1032
Volume 38, Number 5, September 2012
- Gregorio Martínez Pérez

, Félix Gómez Mármol, José M. Alcaraz Calero
:
Introduction to Recent Advances in Security and Privacy in Distributed Communications. 1033-1034 - Yuan Mei, Guo Cao, Huaijiang Sun, Rongtao Hou:

A systematic gradient-based method for the computation of fingerprint's orientation field. 1035-1046 - Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:

Pulse quarantine strategy of internet worm propagation: Modeling and analysis. 1047-1061 - Carlos Adrián Catania, Carlos García Garino:

Automatic network intrusion detection: Current techniques and open issues. 1062-1072 - Imad M. Abbadi, Muntaha Alawneh:

A framework for establishing trust in the Cloud. 1073-1087 - Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:

Modeling access control for cyber-physical systems using reputation. 1088-1101 - Verónica Mateos Lanchas, Víctor A. Villagrá

, Francisco Romero Bueno, Julio Berrocal:
Definition of response metrics for an ontology-based Automated Intrusion Response Systems. 1102-1114 - Husameldin Mukhtar

, Khaled Salah
, Youssef Iraqi
:
Mitigation of DHCP starvation attack. 1115-1128 - Farhan Siddiqui, Sherali Zeadally, Thabet Kacem

, Scott Fowler
:
Zero Configuration Networking: Implementation, performance, and security. 1129-1145 - Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera:

A cyber-physical experimentation environment for the security analysis of networked industrial control systems. 1146-1161
- Ferat Sahin:

Introduction to Special Issue on Image Processing. 1162-1163 - Gaurav Bhatnagar

, Q. M. Jonathan Wu, Balasubramanian Raman:
Robust gray-scale logo watermarking in wavelet domain. 1164-1176 - Bin Huang, Guohui Tian, Fengyu Zhou:

Human typical action recognition using gray scale image of silhouette sequence. 1177-1185 - Wei Ji, Dean Zhao, Fengyi Cheng, Bo Xu, Ying Zhang, Jinjing Wang:

Automatic recognition vision system guided for apple harvesting robot. 1186-1195 - Xiangzhi Bai, Fugen Zhou, Bindang Xue:

Toggle and top-hat based morphological contrast operators. 1196-1204 - Huanghui Shen, Zhensong Wang, Weimin Zheng:

Corner turn of SAR data based on multi-FPGAs parallel system. 1205-1212 - Weiping Yang, Xuezhi Wang, William Moran, Ashley Wheaton, Nicola Cooley:

Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation. 1213-1221 - Dongil Han, Jongho Choi, Byungwhan Kim, Jae Il Cho:

Design and VLSI implementation of a high-performance face detection engine. 1222-1239 - Lili Liu, Qiang Zhang

, Xiaopeng Wei:
A RGB image encryption algorithm based on DNA encoding and chaos map. 1240-1248 - Xinwei Li, Baolong Guo, Long Chen, Xianxiang Wu, Lei-Da Li

:
A high capacity and strong robust fingerprinting for compressed images. 1249-1261 - Jidesh Pacheeripadikkal

, Santhosh George
:
Shock coupled fourth-order diffusion for image enhancement. 1262-1277 - Amit Phadikar, Santi P. Maity

:
On protection of compressed image in fading channel using data hiding. 1278-1298 - Hamit Soyel

, Hasan Demirel:
Localized discriminative scale invariant feature transform based facial expression recognition. 1299-1309 - Hong Shen, Bo Chen:

From single watermark to dual watermark: A new approach for image watermarking. 1310-1324 - Syed Mahfuzul Aziz

, Minh Duc Pham:
Efficient parallel architecture for multi-level forward discrete wavelet transform processors. 1325-1335 - Jinzheng Lu, Qiheng Zhang, Zhiyong Xu, Zhenming Peng

:
Image super-resolution by dictionary concatenation and sparse representation with approximate L0 norm minimization. 1336-1345 - Cailing Wang, Xiao-Yuan Jing, Chunxia Zhao:

Local Upsampling Fourier Transform for accurate 2D/3D image registration. 1346-1357 - Sherin M. Youssef

:
ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval. 1358-1376
Volume 38, Number 6, November 2012
- Degan Zhang, Dan-chao Dong, Hong-tao Peng:

Research on development of embedded uninterruptable power supply system for IOT-based mobile service. 1377-1387 - Tien Van Do

, Hyotaek Lim, Ram Chakka:
An efficient model for dimensioning an ATA-based virtual storage system. 1388-1398 - Jhih-Chung Chang:

Combining GA and iterative MVDR for DOA estimation in space-time CDMA systems. 1399-1408 - Alireza Poshtkohi, M. B. Ghaznavi-Ghoushchi

:
The xDotGrid native, cross-platform, high-performance xDFS file transfer framework. 1409-1432 - Mou Dasgupta

, G. P. Biswas:
Design of multi-path data routing algorithm based on network reliability. 1433-1443 - Chia Yee Ooi, Jia Pao Sua, Siaw Chen Lee:

Power-aware system-on-chip test scheduling using enhanced rectangle packing algorithm. 1444-1455 - Xianfu Meng, Yalin Ding:

A dynamic load balancing strategy with the push and pull approaches in DHT networks. 1456-1466 - Khaled Daqrouq

, Khalooq Y. Al Azzawi:
Average framing linear prediction coding with wavelet transform for text-independent speaker identification system. 1467-1479 - Sajaa Kh. Sadon, Norashidah Md. Din, Mohammed Hayder Al-Mansoori

, Nurul Asyikin Mohamed Radzi
, Intan Shafinaz Mustafa, M. Yaacob, Mohd. Shahmi Abdul Majid:
Dynamic hierarchical bandwidth allocation using Russian Doll Model in EPON. 1480-1489 - Haibo Miao, Liusheng Huang, Zhili Chen, Wei Yang, Ammar Al-hawbani:

A new scheme for covert communication via 3G encoded speech. 1490-1501 - Francisco Javier López-Martínez

, Eduardo Martos-Naya, José T. Entrambasaguas
:
Low complexity cell search scheme for LTE and LTE-advanced mobile technologies. 1502-1512 - Tomaz Nahtigal, Primoz Puhar, Andrej Zemva:

A systematic approach to configurable functional verification of HW IP blocks at transaction level. 1513-1523 - Iván Alhama Manteca

, Francisco Alhama
, Antonio Soto Meca:
The network method for a fast and reliable solution of ordinary differential equations: Applications to non-linear oscillators. 1524-1533 - Santosh Biswas:

Diagnosability of discrete event systems for temporary failures. 1534-1549 - Hassan A. Salamy:

Minimizing address arithmetic instructions in embedded applications on DSPs. 1550-1563 - Adem Tuncer

, Mehmet Yildirim
:
Dynamic path planning of mobile robots with improved genetic algorithm. 1564-1572 - K. S. Bhatia, Tara Singh Kamal, R. S. Kaler:

An adaptive compensation scheme-based coded direct detection optical-orthogonal frequency division multiplex (OFDM) system. 1573-1578 - Mohamed Djendi, Aouda Bounif:

Performance analysis of under-modelling stereophonic acoustic echo cancellation by adaptive filtering LMS algorithm. 1579-1594 - Amir Hooshang Mazinan, A. Amir-Latifi:

Improvement of mean shift tracking performance using a convex kernel function and extracting motion information. 1595-1615 - Monobrata Debnath, Wei-Ming Lin, Eugene John

:
Adaptive instruction dispatching techniques for Simultaneous Multi-Threading (SMT) processors. 1616-1626 - Umut Altinisik

, Mehmet Yildirim
:
A new fault tolerant control approach for the three-tank system using data mining. 1627-1635 - Jianming Wang, Ming Zhu, Ling Ding:

Noise-robust software based R/D conversion methods using over-sample technique. 1636-1646 - Chun-Hui Wu, Xiaofeng Chen, Qin Li

, Dongyang Long:
Efficient ID-based non-malleable trapdoor commitment. 1647-1657 - Sesham Srinu

, Samrat L. Sabat
:
FPGA implementation and performance study of spectrum sensing based on entropy estimation using cyclic features. 1658-1669 - Kunihiko Fujita, Yasuyuki Tsukada

:
An approach to the formal analysis of license interoperability. 1670-1686 - Ali Mahdoum:

Combined heuristics for synthesis of SOCs with time and power constraints. 1687-1702 - Abdoreza Pishvaie, Ghassem Jaberipur, Ali Jahanian

:
Improved CMOS (4; 2) compressor designs for parallel multipliers. 1703-1716 - Adel Soudani, Thierry Divoux, Rached Tourki:

Data traffic load balancing and QoS in IEEE 802.11 network: Experimental study of the signal strength effect. 1717-1730 - Osamah S. Badarneh, Haythem Bany Salameh

:
Probabilistic quality-aware routing in cognitive radio networks under dynamically varying spectrum opportunities. 1731-1744 - Hugh L. Kennedy

, William Scott, Stephen C. Cook:
Data association and geolocation for electronic support systems. 1745-1759 - Jhih-Chung Chang:

Robust blind multiuser detection based on PSO algorithm in the mismatch environment of receiver spreading codes. 1760-1767 - Zhenglin Liu, Qidi Zhao, Dongfang Li, Xuecheng Zou:

Memory monitor module for embedded systems. 1768-1776 - Ihsan Pehlivan

, Yilmaz Uyaroglu
:
A new 3D chaotic system with golden proportion equilibria: Analysis and electronic circuit realization. 1777-1784 - P. Salini, S. Kanmani:

Survey and analysis on Security Requirements Engineering. 1785-1797 - M. Hariharan

, C. Y. Fook, R. Sindhu, Bukhari Ilias, Sazali Yaacob:
A comparative study of wavelet families for classification of wrist motions. 1798-1807 - Adnan Idris, Muhammad Rizwan, Asifullah Khan

:
Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies. 1808-1819 - Damjan Vlaj

, Zdravko Kacic, Marko Kos
:
Voice activity detection algorithm using nonlinear spectral weights, hangover and hangbefore criteria. 1820-1836

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














