default search action
Computers & Electrical Engineering, Volume 38
Volume 38, Number 1, January 2012
- Weichuan Yu, Zheng-Hua Tan, Yi Wan:
Guest Editors' Introduction to the Special Issue on "New Trends in Signal Processing and Biomedical Engineering". 1-2 - Lei Chen, Guangnan Xing, Yingjie Xu, Xiaoxiang Liu, Tuanjie Zhao, Junyi Gai:
Identification of major responding proteins of abnormal leaf and flower in soybean with an integrative "omics" strategy. 3-10 - Kun-Li Wen, Ya-Ting Lee:
Applying rough set theory in the function group analysis for phenolic amide compounds. 11-18 - Wenchao Jiang, Matthias Baumgarten, Qingyun Dai, Yanhong Zhou:
The deployment and evaluation of a bioinformatics grid platform - The HUST_Bio_Grid. 19-34 - Boyu Wang, Chiman Wong, Feng Wan, Peng Un Mak, Pui-In Mak, Mang I Vai:
Trial pruning based on genetic algorithm for single-trial EEG classification. 35-44 - Guang-zheng Yu, Bo-sun Xie, Xiang-xu Chen:
Analysis on minimum-phase characteristics of measured head-related transfer functions affected by sound source responses. 45-51 - Elias Aboutanios, Yannis Kopsinis, Denis Rubtsov:
Instantaneous frequency based spectral analysis of nuclear magnetic resonance spectroscopy data. 52-67 - Rajarshi Gupta, Jitendranath Bera, Madhuchhanda Mitra:
A bi-phase enabled serial acquisition system for remote processing of digitized ECG. 68-74 - Orhan Er, A. Çetin Tanrikulu, Abdurrahman Abakay, Feyzullah Temurtas:
An approach based on probabilistic neural network for diagnosis of Mesothelioma's disease. 75-81
- Mohammad Reza Seifi, Mohammad Eshghi:
Clustered NOC, a suitable design for group communications in Network on Chip. 82-95 - Yamin Wen, Fangguo Zhang, Lingling Xu:
Secret handshakes from ID-based message recovery signatures: A new generic approach. 96-104 - Prabagarane Nagaradjane, Lakshmi Krishnan, Arvind Sai Sarathi Vasan:
Performance analysis of multicell multiuser MIMO MC DS/CDMA system with MMSE user-ordered SIC technique. 105-115 - Mande Xie, Guiyi Wei, Yujia Ge, Yun Ling:
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks. 116-127 - D. P. Torres, Evelio M. García Fernández, Eduardo Parente Ribeiro, Vitalio Alfonso Reguera, C. de Oliveira:
On the impact of adaptive RED in IP networks transporting H.264/MPEG-4 AVC video streams. 128-139 - M. J. Lengare, Rajan H. Chile, Laxman M. Waghmare:
Design of decentralized controllers for MIMO processes. 140-147 - Paris Kitsos, Nicolas Sklavos, Maria Parousi, Athanassios N. Skodras:
A comparative study of hardware architectures for lightweight block ciphers. 148-160 - Servet Soyguder, Hasan Alli:
Computer simulation and dynamic modeling of a quadrupedal pronking gait robot with SLIP model. 161-174 - Jing Guo, Xiaoping Zeng, Zhishun She:
Blind source separation based on high-resolution time-frequency distributions. 175-184
Volume 38, Number 2, March 2012
- Shu-Chung Yi:
A new construction adder based on Chinese abacus algorithm. 185-193 - Xianfu Meng, Wenqing Cui:
Research on the immune strategy for the polluted file propagation in structured P2P networks. 194-205 - Fotis Plessas, Efthimios Davrazos, Alexis Alexandropoulos, Michael K. Birbas, John C. Kikidis:
A 1 GHz, DDR2/3 SSTL driver with On-Die Termination, strength calibration, and slew rate control. 206-216 - Yang Zhou, Gangyi Jiang, Mei Yu, Zongju Peng, Feng Shao:
Region-based error concealment of right-view frames for stereoscopic video transmission. 217-230 - George Lagogiannis, Nikos A. Lorentzos:
Partially persistent B-trees with constant worst-case update time. 231-242 - Krishna M. Kavi, Izuchukwu Nwachukwu, Ademola Fawibe:
A comparative analysis of performance improvement schemes for cache memories. 243-257 - Jorge González-Domínguez, Guillermo L. Taboada, Basilio B. Fraguela, María J. Martín, Juan Touriño:
Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite. 258-269 - Feiyang Liu, Huaxi Gu, Yintang Yang:
DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip. 270-281 - Mohamed Reda Lakehal, Youcef Ferdi, Abdelmalik Taleb-Ahmed:
On the self-similarity of 1/fβ sequences synthesized by recursive filtering. 282-293 - George N. Korres, Nikolaos M. Manousakis:
A state estimator including conventional and synchronized phasor measurements. 294-305 - Chao Wu, Yike Guo, Bo Zhou:
Social networking federation: A position paper. 306-329 - Basel A. Mahafzah, Mohammad Aref Alshraideh, Tasneem M. Abu-Kabeer, Elham F. Ahmad, Nesreen A. Hamad:
The Optical Chained-Cubic Tree interconnection network: Topological structure and properties. 330-345 - Pedro Martinez-Julia, Antonio Fernandez Gómez-Skarmeta:
Using identities to achieve enhanced privacy in future content delivery networks. 346-355 - Nooshin Bigdeli, Yousef Farid, Karim Afshar:
A robust hybrid method for image encryption based on Hopfield neural network. 356-369 - Fuchun Guo, Yi Mu, Willy Susilo:
Efficient and secure stored-value cards with leakage resilience. 370-380 - Fengtong Wen, Xuelei Li:
An improved dynamic ID-based remote user authentication with key agreement scheme. 381-387 - Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd:
A novel approach to enhance distributed virtual memory. 388-398 - Mohammed Amoon:
A fault-tolerant scheduling system for computational grids. 399-412 - Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi:
Further improvement of an identity-based signcryption scheme in the standard model. 413-421 - Mohamed A. Mohandes, Mohamed A. Deriche, Umar Johar, S. Ilyas:
A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model. 422-433 - Pandya Lakshman:
Combining deblurring and denoising for handheld HDR imaging in low light conditions. 434-443 - Servet Soyguder, Hasan Alli:
Kinematic and dynamic analysis of a hexapod walking-running-bounding gaits robot and control actions. 444-458 - Tao Wu, Kun Qin:
Image data field for homogeneous region based segmentation. 459-470
Volume 38, Number 3, May 2012
- Mehdi Shadaram, David Akopian, Glaucio H. S. Carvalho:
Guest Editors' Introduction to the Special Issue on The design and analysis of wireless systems: New inspirations. 471-472 - Lei Guo, Lincong Zhang, Yuhuai Peng, Jingjing Wu, Xiao-Ying Zhang, Weigang Hou, Jun Zhao:
Multi-path routing in Spatial Wireless Ad Hoc networks. 473-491 - Tatiana G. Bonifácio, Rodrigo Palucci Pantoni, Dennis Brandão:
SMAC multi-hop mesh routing protocol using IEEE 802.15.4. 492-509 - B. Q. Kan, J. H. Fan, J. Y. Wang, Z. Y. Lu, J. Cheng, Q. Wu:
Jamming aware routing for MHWN with dynamic measurement. 510-521 - S. Smys, G. Josemin Bala:
Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). 522-532 - Zhaolong Ning, Lei Guo, Yuhuai Peng, Xiaojie Wang:
Joint scheduling and routing algorithm with load balancing in wireless mesh network. 533-550 - Wei Wang, Guosun Zeng, Jing Yao, Hanli Wang, Daizhong Tang:
Towards reliable self-clustering Mobile Ad Hoc Networks. 551-562 - Hua Guo, Chang Xu, Yi Mu, Zhoujun Li:
A provably secure authenticated key agreement protocol for wireless communications. 563-572 - Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. 573-581 - Rong Geng, Lei Guo, Xingwei Wang:
A new adaptive MAC protocol with QoS support based on IEEE 802.11 in ad hoc networks. 582-590 - Fotis Foukalas, George T. Karetsos, Lazaros F. Merakos:
Spectral efficiency of cognitive radio networks under interference constraint and QoS guarantees. 591-602 - Catalin Lacatus, David Akopian, Mehdi Shadaram:
Reduced complexity crosscorrelation interference mitigation in GPS-enabled collaborative ad-hoc wireless networks - Theory. 603-615 - Raksha Upadhyay, Sanjiv Tokekar, Prakash D. Vyavahare:
Performance analysis of WLAN physical layers using Markov channel model. 616-625 - Sheikh Tahir Bakhsh, Halabi Hasbullah, Sabeen Tahir:
Dynamic relay management protocol for efficient inter-piconet scheduling in Bluetooth scatternet. 626-642 - Gengzhong Zheng, Sanyang Liu, Xiaogang Qi:
Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. 643-651 - Huanqing Cui, Yinglong Wang:
Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks. 652-661 - Aimin Wang, Dailiang Yang, Dayang Sun:
A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. 662-671 - Murad Abusubaih:
Joint RTS/CTS and time slotting for interference mitigation in multi-BSS 802.11 wireless LANs. 672-680 - Chih-Peng Lin, Hsing-Lung Chen, Jenq-Shiou Leu:
A predictive handover scheme to improve service quality in the IEEE 802.21 network. 681-693 - De-gan Zhang, Chen-peng Zhao, Yan-pin Liang, Zhao-jing Liu:
A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. 694-702 - Yunsheng Liu, Zheng Wang:
Maximizing energy utilization routing scheme in wireless sensor networks based on minimum hops algorithm. 703-721
- Fangyang Shen, Mei Yang, Maurizio Palesi:
Guest Editors' Introduction to the Special Issue on "Emerging Computing Architectures and Systems". 722-723 - C. Christopher Columbus, Sishaj P. Simon:
Profit based unit commitment: A parallel ABC approach using a workstation cluster. 724-745 - Yijun Liu, Anthony S. Fong, Fangyang Shen:
HISC: A computer architecture using operand descriptor. 746-755 - Eduard Fernandez-Alonso, David Castells-Rufas, Jaume Joven, Jordi Carrabina:
Development process for clusters on a reconfigurable chip. 756-771 - Yuan Tian, Weikuan Yu, Jeffrey S. Vetter:
RXIO: Design and implementation of high performance RDMA-capable GridFTP. 772-784 - Xiongli Gu, Peng Liu, Mei Yang, Jie Yang, Cheng Li, Qingdong Yao:
An efficient scheduler of RTOS for multi/many-core system. 785-800 - Yiou Chen, Jianhao Hu, Xiang Ling, Tingting Huang:
A novel 3D NoC architecture based on De Bruijn graph. 801-810
Volume 38, Number 4, July 2012
- Shu-Nung Yao, Timothy Collins, Peter Jancovic:
Hybrid method for designing digital Butterworth filters. 811-818 - Kabir Chakraborty, Abhinandan De, Abhijit Chakrabarti:
Voltage stability assessment in power network using self organizing feature map and radial basis function. 819-826 - Saeed Parsa, Reza Entezari-Maleki:
A queuing network model for minimizing the total makespan of computational grids. 827-839 - Jianxin Liao, Qi Qi, Zhaoyong Xun, Tonghong Li, Yufei Cao, Jingyu Wang:
A linear chained approach for service invocation in IP Multimedia Subsystem. 840-852 - Yaobin Zou, Hong Liu, Enmin Song, Zhiyong Huang:
Image bilevel thresholding based on multiscale gradient multiplication. 853-861 - Kostas Tsagkaris, Aimilia Bantouna, Panagiotis Demestichas:
Self-Organizing Maps for advanced learning in cognitive radio systems. 862-881 - Fan Zhang, Xinhong Zhang, Kui Cao, Rui Li:
Contour extraction of gait recognition based on improved GVF Snake model. 882-890 - Chun-Chuan Yang, Yi-Ting Mai, Jeng-Yueng Chen, Yu-Shiuan Shen, Yu-Chen Kuo:
LBPS: Load-Based Power Saving in the IEEE 802.16e Network. 891-905 - Yancang Chen, Zhonghai Lu, Lunguo Xie, Jinwen Li, Minxuan Zhang:
A single-cycle output buffered router with layered switching for Networks-on-Chips. 906-916 - Fengcai Li, Guanghua Gu, Chengru Wang:
Scene categorization based on integrated feature description and local weighted feature mapping. 917-925 - Carlos Restrepo, Carlos Andrés Ramos-Paja, Roberto Giral, Javier Calvente, Alfonso Romero:
Fuel cell emulator for oxygen excess ratio estimation on power electronics applications. 926-937 - Mohamed Djendi:
An efficient stabilized fast Newton adaptive filtering algorithm for stereophonic acoustic echo cancellation SAEC. 938-952 - Sheng-Shih Wang, Chan-Ying Lien, Wen-Hwa Liao, Kuei-Ping Shih:
LASER: A load-aware spectral-efficient routing metric for path selection in IEEE 802.16j multi-hop relay networks. 953-962 - Melika Tinati, Ahmad Khademzadeh, Ali Afzali-Kusha, Majid Janidarmian:
HACS: A novel cost aware paradigm promising fault tolerance on mesh-based network on chip architecture. 963-974 - Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public key encryption without random oracle made truly practical. 975-985 - Ali Massoud, Abdalla Osman, Aboelmagd Noureldin:
DOA estimation based on fourth order cumulant beamforming for nonuniform linear array of DIFAR sonobuoys. 986-993 - Peter James Vial, Beata J. Wysocki, Tadeusz A. Wysocki, Montserrat Ros, David Stirling:
On the effect of Multiple Access Interference in a Space Time Spreading Time Hopping PPM UWB system. 994-1009 - Mohammed Saeed Jawad, Widad Ismail, Badrul Hisham Ahmad:
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures. 1010-1022 - Liang Cheng, Manchun Li, Yongxue Liu, Wenting Cai, Yanming Chen, Kang Yang:
Remote sensing image matching by integrating affine invariant feature extraction and RANSAC. 1023-1032
Volume 38, Number 5, September 2012
- Gregorio Martínez Pérez, Félix Gómez Mármol, José M. Alcaraz Calero:
Introduction to Recent Advances in Security and Privacy in Distributed Communications. 1033-1034 - Yuan Mei, Guo Cao, Huaijiang Sun, Rongtao Hou:
A systematic gradient-based method for the computation of fingerprint's orientation field. 1035-1046 - Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:
Pulse quarantine strategy of internet worm propagation: Modeling and analysis. 1047-1061 - Carlos Adrián Catania, Carlos García Garino:
Automatic network intrusion detection: Current techniques and open issues. 1062-1072 - Imad M. Abbadi, Muntaha Alawneh:
A framework for establishing trust in the Cloud. 1073-1087 - Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:
Modeling access control for cyber-physical systems using reputation. 1088-1101 - Verónica Mateos Lanchas, Víctor A. Villagrá, Francisco Romero Bueno, Julio Berrocal:
Definition of response metrics for an ontology-based Automated Intrusion Response Systems. 1102-1114 - Husameldin Mukhtar, Khaled Salah, Youssef Iraqi:
Mitigation of DHCP starvation attack. 1115-1128 - Farhan Siddiqui, Sherali Zeadally, Thabet Kacem, Scott Fowler:
Zero Configuration Networking: Implementation, performance, and security. 1129-1145 - Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera:
A cyber-physical experimentation environment for the security analysis of networked industrial control systems. 1146-1161
- Ferat Sahin:
Introduction to Special Issue on Image Processing. 1162-1163 - Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman:
Robust gray-scale logo watermarking in wavelet domain. 1164-1176 - Bin Huang, Guohui Tian, Fengyu Zhou:
Human typical action recognition using gray scale image of silhouette sequence. 1177-1185 - Wei Ji, Dean Zhao, Fengyi Cheng, Bo Xu, Ying Zhang, Jinjing Wang:
Automatic recognition vision system guided for apple harvesting robot. 1186-1195 - Xiangzhi Bai, Fugen Zhou, Bindang Xue:
Toggle and top-hat based morphological contrast operators. 1196-1204 - Huanghui Shen, Zhensong Wang, Weimin Zheng:
Corner turn of SAR data based on multi-FPGAs parallel system. 1205-1212 - Weiping Yang, Xuezhi Wang, William Moran, Ashley Wheaton, Nicola Cooley:
Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation. 1213-1221 - Dongil Han, Jongho Choi, Byungwhan Kim, Jae Il Cho:
Design and VLSI implementation of a high-performance face detection engine. 1222-1239 - Lili Liu, Qiang Zhang, Xiaopeng Wei:
A RGB image encryption algorithm based on DNA encoding and chaos map. 1240-1248 - Xin-Wei Li, Baolong Guo, Long Chen, Xianxiang Wu, Lei-Da Li:
A high capacity and strong robust fingerprinting for compressed images. 1249-1261 - Jidesh Pacheeripadikkal, Santhosh George:
Shock coupled fourth-order diffusion for image enhancement. 1262-1277 - Amit Phadikar, Santi P. Maity:
On protection of compressed image in fading channel using data hiding. 1278-1298 - Hamit Soyel, Hasan Demirel:
Localized discriminative scale invariant feature transform based facial expression recognition. 1299-1309 - Hong Shen, Bo Chen:
From single watermark to dual watermark: A new approach for image watermarking. 1310-1324 - Syed Mahfuzul Aziz, Minh Duc Pham:
Efficient parallel architecture for multi-level forward discrete wavelet transform processors. 1325-1335 - Jinzheng Lu, Qiheng Zhang, Zhiyong Xu, Zhenming Peng:
Image super-resolution by dictionary concatenation and sparse representation with approximate L0 norm minimization. 1336-1345 - Cailing Wang, Xiao-Yuan Jing, Chunxia Zhao:
Local Upsampling Fourier Transform for accurate 2D/3D image registration. 1346-1357 - Sherin M. Youssef:
ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval. 1358-1376
Volume 38, Number 6, November 2012
- Degan Zhang, Dan-chao Dong, Hong-tao Peng:
Research on development of embedded uninterruptable power supply system for IOT-based mobile service. 1377-1387 - Tien Van Do, Hyotaek Lim, Ram Chakka:
An efficient model for dimensioning an ATA-based virtual storage system. 1388-1398 - Jhih-Chung Chang:
Combining GA and iterative MVDR for DOA estimation in space-time CDMA systems. 1399-1408 - Alireza Poshtkohi, M. B. Ghaznavi-Ghoushchi:
The xDotGrid native, cross-platform, high-performance xDFS file transfer framework. 1409-1432 - Mou Dasgupta, G. P. Biswas:
Design of multi-path data routing algorithm based on network reliability. 1433-1443 - Chia Yee Ooi, Jia Pao Sua, Siaw Chen Lee:
Power-aware system-on-chip test scheduling using enhanced rectangle packing algorithm. 1444-1455 - Xianfu Meng, Yalin Ding:
A dynamic load balancing strategy with the push and pull approaches in DHT networks. 1456-1466 - Khaled Daqrouq, Khalooq Y. Al Azzawi:
Average framing linear prediction coding with wavelet transform for text-independent speaker identification system. 1467-1479 - Sajaa Kh. Sadon, Norashidah Md. Din, Mohammed Hayder Al-Mansoori, Nurul Asyikin Mohamed Radzi, Intan Shafinaz Mustafa, M. Yaacob, Mohd. Shahmi Abdul Majid:
Dynamic hierarchical bandwidth allocation using Russian Doll Model in EPON. 1480-1489 - Haibo Miao, Liusheng Huang, Zhili Chen, Wei Yang, Ammar Al-hawbani:
A new scheme for covert communication via 3G encoded speech. 1490-1501 - Francisco Javier López-Martínez, Eduardo Martos-Naya, José T. Entrambasaguas:
Low complexity cell search scheme for LTE and LTE-advanced mobile technologies. 1502-1512 - Tomaz Nahtigal, Primoz Puhar, Andrej Zemva:
A systematic approach to configurable functional verification of HW IP blocks at transaction level. 1513-1523 - Iván Alhama Manteca, Francisco Alhama, Antonio Soto Meca:
The network method for a fast and reliable solution of ordinary differential equations: Applications to non-linear oscillators. 1524-1533 - Santosh Biswas:
Diagnosability of discrete event systems for temporary failures. 1534-1549 - Hassan A. Salamy:
Minimizing address arithmetic instructions in embedded applications on DSPs. 1550-1563 - Adem Tuncer, Mehmet Yildirim:
Dynamic path planning of mobile robots with improved genetic algorithm. 1564-1572 - K. S. Bhatia, Tara Singh Kamal, R. S. Kaler:
An adaptive compensation scheme-based coded direct detection optical-orthogonal frequency division multiplex (OFDM) system. 1573-1578 - Mohamed Djendi, Aouda Bounif:
Performance analysis of under-modelling stereophonic acoustic echo cancellation by adaptive filtering LMS algorithm. 1579-1594 - Amir Hooshang Mazinan, A. Amir-Latifi:
Improvement of mean shift tracking performance using a convex kernel function and extracting motion information. 1595-1615 - Monobrata Debnath, Wei-Ming Lin, Eugene John:
Adaptive instruction dispatching techniques for Simultaneous Multi-Threading (SMT) processors. 1616-1626 - Umut Altinisik, Mehmet Yildirim:
A new fault tolerant control approach for the three-tank system using data mining. 1627-1635 - Jianming Wang, Ming Zhu, Ling Ding:
Noise-robust software based R/D conversion methods using over-sample technique. 1636-1646 - Chun-Hui Wu, Xiaofeng Chen, Qin Li, Dongyang Long:
Efficient ID-based non-malleable trapdoor commitment. 1647-1657 - Sesham Srinu, Samrat L. Sabat:
FPGA implementation and performance study of spectrum sensing based on entropy estimation using cyclic features. 1658-1669 - Kunihiko Fujita, Yasuyuki Tsukada:
An approach to the formal analysis of license interoperability. 1670-1686 - Ali Mahdoum:
Combined heuristics for synthesis of SOCs with time and power constraints. 1687-1702 - Abdoreza Pishvaie, Ghassem Jaberipur, Ali Jahanian:
Improved CMOS (4; 2) compressor designs for parallel multipliers. 1703-1716 - Adel Soudani, Thierry Divoux, Rached Tourki:
Data traffic load balancing and QoS in IEEE 802.11 network: Experimental study of the signal strength effect. 1717-1730 - Osamah S. Badarneh, Haythem Bany Salameh:
Probabilistic quality-aware routing in cognitive radio networks under dynamically varying spectrum opportunities. 1731-1744 - Hugh L. Kennedy, William Scott, Stephen C. Cook:
Data association and geolocation for electronic support systems. 1745-1759 - Jhih-Chung Chang:
Robust blind multiuser detection based on PSO algorithm in the mismatch environment of receiver spreading codes. 1760-1767 - Zhenglin Liu, Qidi Zhao, Dongfang Li, Xuecheng Zou:
Memory monitor module for embedded systems. 1768-1776 - Ihsan Pehlivan, Yilmaz Uyaroglu:
A new 3D chaotic system with golden proportion equilibria: Analysis and electronic circuit realization. 1777-1784 - P. Salini, S. Kanmani:
Survey and analysis on Security Requirements Engineering. 1785-1797 - M. Hariharan, C. Y. Fook, R. Sindhu, Bukhari Ilias, Sazali Yaacob:
A comparative study of wavelet families for classification of wrist motions. 1798-1807 - Adnan Idris, Muhammad Rizwan, Asifullah Khan:
Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies. 1808-1819 - Damjan Vlaj, Zdravko Kacic, Marko Kos:
Voice activity detection algorithm using nonlinear spectral weights, hangover and hangbefore criteria. 1820-1836
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.