


default search action
International Journal of Embedded Systems, Volume 13
Volume 13, Number 1, 2020
- Tingting Shao, Xuening Chen:

Hash-based and privacy-aware movie recommendations in a big data environment. 1-8 - Juan Huan, Weijian Cao, Yuwan Gu, Yilin Qin:

A hybrid model of empirical wavelet transform and extreme learning machine for dissolved oxygen forecasting. 9-17 - Yuwan Gu, Yaru Wang, Juan Huan, Yuqiang Sun, Shoukun Xu:

An improved TFIDF algorithm based on dual parallel adaptive computing model. 18-27 - Amit Kumar, Yugal Kumar, Ashima Kukkar

:
A feature selection model for prediction of software defects. 28-39 - Brij B. Gupta, Megha Quamara

:
Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications. 40-49 - Hitesh Yadav, A. Charan Kumari, Rita Rana Chhikara:

Feature selection optimisation of software product line using metaheuristic techniques. 50-64 - Guangyi Ma, Hui Xu, Xijie Zhou, Wei Sun:

Home security alarm system for middle-aged people living alone. 65-73 - Virendra P. Vishwakarma

, Varsha Sisaudia:
Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy. 74-84 - Srichandan Sobhanayak

, Kavita Jaiswal, Ashok Kumar Turuk
, Bibhudatta Sahoo
, Bhabendu Kumar Mohanta
, Debasish Jena:
Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm. 85-100 - Baohua Huang, Sheng Liang, Dongdong Xu, Zhuohao Wan:

A homomorphic range searching scheme for sensitive data in internet of things. 101-112 - Qi Wang, Chang-song Yang, Shaoen Wu:

RFID aided SINS integrated navigation system for lane applications. 113-120 - Qi Wang, Chang-song Yang, Shaoen Wu:

Application of vision aided strapdown integrated navigation in lane vehicles. 121-127
Volume 13, Number 2, 2020
- Haitao Wu, Tianming Yang, Ping Huang, Wen-Kuang Chou:

Extending the lifetime of NAND flash-based SSD through compacted write. 129-135 - Mohammad Reza Heidari Iman, Pejman Yaghmaie:

A software control flow checking technique in multi-core processors. 136-147 - Hong Xiao, Rongyue Zhang, Zhigang Chen, Yingshuang Liu, Yubin Zhou:

Maintenance cycle optimisation of multi-component systems under the constraints of overall cost and reliability. 148-157 - Wei Zhuang, Suyun Xu, Yue Han, Jian Su

, Chunming Gao, Dan Yang:
The design and implementation of a wearable human activity recognition system based on IMU. 158-168 - Wei Zhuang, Yi Zhan, Yue Han, Jian Su

, Chunming Gao, Dan Yang:
Design of a hand gesture recognition system based on forearm surface electromyography feedback. 169-179 - Haibo Luo, Zhiqiang Ruan:

Release and collection method of residual energy for one-dimensional linear-zone internet of things. 180-187 - Amin Danial Asham:

A new upper bound of the completion time of the background task in a foreground-background system. 188-199 - Xiangqian Wang, Huizong Li, Jie Yang

, Chaoyu Yang, Haixia Gui:
Optimal path selection for logistics transportation based on an improved ant colony algorithm. 200-208 - Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long:

A robust error control coding-based watermarking algorithm for FPGA IP protection. 209-220 - Vincenzo Conti, Andrea Ziggiotto, Mauro Migliardi

, Salvatore Vitabile:
Bio-inspired security analysis for IoT scenarios. 221-235 - João Gabriel Reis, Antônio Augusto Fröhlich:

Towards deterministic FPGA reconfiguration. 236-253
Volume 13, Number 3, 2020
- Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma:

A sparse system identification algorithm based on fractional order LMS. 255-263 - Hassun Vakilian Zand, Mohsen Raji, Hossein Pedram, Hossein Heidari SharifAbadi:

A genetic algorithm-based tasks scheduling in multicore processors considering energy consumption. 264-273 - Yinxiang Qu, Yifei Wei, Mei Song, Dan Liu, Xiaojun Wang:

A new software-defined network architecture to solve energy balance problems in wireless sensor networks. 274-282 - Jianfeng Lu, Xuanyuan Yang:

Localisation algorithm based on weighted semi-definite programming. 283-291 - Jiaqi Zhen, Boshen Liu, Yanwei Wang, Yong Liu:

An improved method for indoor positioning based on ZigBee technique. 292-299 - Jiaqi Zhen, Yanwei Wang, Yong Liu:

DOA estimation of wideband sources by sparse recovery based on uniform circle array. 300-307 - Ning Chen, Xiaohu Ding, Hongyi Zhang:

Improved Faster R-CNN identification method for containers. 308-317 - Jing Wang, Dezhi Han:

Design of network intrusion detection system based on parallel DPC clustering algorithm. 318-327 - Shao Wen, Tao Zui, Xie Yong, John J. Qu, Huan Hai, Tian Chuan Yang:

Based on the GF1 and GF4 radiation calibration analysis. 328-340 - Lina Wang, Chaoyao Shen, Sheng Yuan, Yongjun Ren, Yong Wang, Jinyue Xia:

Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde. 341-351 - Weiwei Liu, Yang Tang, Fei Yang, Yi Dou, Jin Wang:

Research on urban transport network topology vulnerability identification under rainfall conditions. 352-359
Volume 13, Number 4, 2020
- Nunzio Cecere, Massimo Tipaldi, Davide De Pasquale:

Applying analytical and empirical schedulability analysis techniques to a real spacecraft flight software. 361-371 - Wenbin Yu, Zijia Xiong, Yang Liu, Shanshan Rong, Siyao Wang, Yinsong Xu, Alex X. Liu:

Zero-error channel capacity of quantum 5-symbol obfuscation model. 372-379 - Fengchang Xue, Juan Tian, Xiaoyi Song, Yan Yan:

Urban waterlogging monitoring and early warning based on video images. 380-386 - Guojun Yang, Xiaohu Zhou, Zhiyao Liang:

Enterprise internationalisation performance evaluation model based on artificial neural network. 387-397 - Chungen Xu

, Yingying Zhang, Lin Mei, Lei Xu, Cong Zuo:
Attacking the Niederreiter-type cryptosystem based on rank metric. 398-404 - Xiaoli Li, Guomei Song, Shuailing Zhou, Yujia Yan, Zhenlong Du:

Rainfall runoff prediction via a hybrid model of neighbourhood rough set with LSTM. 405-413 - Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu:

Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices. 414-421 - Demin Gao

, Jie Xin, Fuquan Zhang:
A decision tree algorithm for forest fire prediction based on wireless sensor networks. 422-430 - Abhishek Nag

, Subhajit Das, Sambhu Nath Pradhan
:
Low power transistor level synthesis of finite state machines using a novel dual gating technique. 431-438 - Lili Pan, Cong Li, Yan Zhou, Rongyu Chen, Bing Xiong:

A combinational convolutional neural network of double subnets for food-ingredient recognition. 439-448 - Jing Zhang, Dan Yang:

Time-aware parallel collaborative filtering movie recommendation based on Spark. 449-458 - Hangjun Zhou, Xingxing Zhou, Jing Liu, KeZhuo Chen:

Factor analysis and evaluation of China's higher education development in big data era. 459-465 - Md. Al Maruf, Akramul Azim:

A software-based calibration approach to increase the robustness of embedded systems. 466-475 - Yonghui Dai

, Tao Wang, Ziyi Wang, Bo Xu:
Effect of the crowdfunding description on investment decisions from the perspective of prosocial behaviour. 476-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














