INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
暂无分享,去创建一个
[1] Ahlam Fadhil Mahmood,et al. An FPGA Implementation of Secured Steganography Communication System , 2014 .
[2] Sabih H. Gerez,et al. Algorithms for VLSI design automation , 1998 .
[3] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[4] Ashwani Kumar,et al. Electricity price forecasting in deregulated markets: A review and evaluation , 2009 .
[5] A. D. Parekh,et al. Thermodynamic Analysis of R 507 A-R 23 Cascade Refrigeration System , 2011 .
[6] M. Dohler,et al. MIMO systems with adaptive modulation , 2005, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).
[7] Andrea J. Goldsmith,et al. Adaptive coded modulation for fading channels , 1998, IEEE Trans. Commun..
[8] S. M. Bin Gadhi,et al. Thermal behaviour of adobe and concrete houses in Yemen , 1992 .
[9] Tsong Yueh Chen,et al. Performance and Area Optimization of VLSI Systems Using Genetic Algorithms , 1995, VLSI Design.
[10] Deyi Kong,et al. MEMS based sensors for explosive detection: Development and discussion , 2008, 2008 3rd IEEE International Conference on Nano/Micro Engineered and Molecular Systems.
[11] B. Miller Thayer. The magic of solar adobe , 1996 .
[12] Syed M. Zubair,et al. Second-law-based thermodynamic analysis of two-stage and mechanical-subcooling refrigeration cycles , 1996 .
[13] Jamal Shahrabi,et al. Supply Chain Demand Forecasting; A Comparison of Machine Learning Techniques and Traditional Methods , 2009 .
[14] Huosheng Hu,et al. Application of wearable inertial sensors in stroke rehabilitation , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[15] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[16] Greg Knowles,et al. Are adobe walls optimal phase-shift filters? , 1980 .
[17] Radha Jagadeesan,et al. Towards a Theory of Accountability and Audit , 2009, ESORICS.
[18] Donald F. Towsley,et al. A study of the coverage of large-scale sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[19] Jirí Kubalík,et al. Layout Problem Optimization Using Genetic Algorithms , 2002, BASYS.
[20] Evangeline F. Y. Young,et al. Slicing floorplans with boundary constraints , 1999, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[21] Xiao Liu,et al. On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems , 2011, J. Parallel Distributed Comput..
[22] Stephan ten Brink,et al. Achieving near-capacity on a multiple-antenna channel , 2003, IEEE Trans. Commun..
[23] José Fernández-Seara,et al. Experimental evaluation of a cascade refrigeration system prototype with CO2 and NH3 for freezing process applications , 2011 .
[24] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[25] Debmalya Panigrahi,et al. Provenance views for module privacy , 2010, PODS.
[26] Rustam M. Vahidov,et al. Forecasting Supply Chain Demand Using Machine Learning Algorithms , 2009 .
[27] M. P. Sunil,et al. Minimization of Floorplanning Area and Wire Length Interconnection Using Particle Swarm Optimization , 2013 .
[28] S. Sathiamoorthy,et al. Hybrid Genetic Algorithm for VLSI Macro Cell Layout , 2002 .
[29] Yu Guo,et al. An open framework for foundational proof-carrying code , 2007, TLDI '07.
[30] Giancarlo Ruffo,et al. Reasoning about Accountability within Delegation , 2001, ICICS.
[31] Gongde Guo,et al. A Comparative Study of Machine Learning Algorithms Applied to Predictive Toxicology Data Mining , 2007, Alternatives to laboratory animals : ATLA.
[32] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[33] Hong Ying,et al. iSANLA: Intelligent Sensor and Actuator Network for Life science Applications , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[34] Wen-Guey Tzeng,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.
[35] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[36] XiaoFeng Wang,et al. Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.
[37] Dariush Divsalar,et al. A soft-input soft-output APP module for iterative decoding of concatenated codes , 1997, IEEE Communications Letters.
[38] Dennis Goeckel,et al. Adaptive coding for time-varying channels using outdated fading estimates , 1999, IEEE Trans. Commun..
[39] P. Boissy,et al. In-home telerehabilitation for geriatric patients , 2008, IEEE Engineering in Medicine and Biology Magazine.
[40] Hamid R. S. Mojaveri,et al. Validation and Selection between Machine Learning Technique and Traditional Methods to Reduce Bullwhip Effects: a Data Mining Approach , 2009 .
[41] Achmad Arifin,et al. Ankle and Knee Joint Angle Measurements during Gait with Wearable Sensor System for Rehabilitation , 2009 .
[42] Michiya Suzuki,et al. The estimation of energy consumption and amount of pollutants due to the construction of buildings , 1993 .
[43] Tricia J. Willink,et al. Iterative tree search detection for MIMO wireless systems , 2005, IEEE Transactions on Communications.
[44] Andrew J. Viterbi,et al. An Intuitive Justification and a Simplified Implementation of the MAP Decoder for Convolutional Codes , 1998, IEEE J. Sel. Areas Commun..
[45] I-Ming Chen,et al. A low cost wearable wireless sensing system for upper limb home rehabilitation , 2010, 2010 IEEE Conference on Robotics, Automation and Mechatronics.
[46] H. Harada. Software defined radio prototype toward cognitive radio communication systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[47] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[48] Wenliang Du,et al. Privacy-MaxEnt: integrating background knowledge in privacy quantification , 2008, SIGMOD Conference.
[49] Yasuo Hirata,et al. High-Rate Punctured Convolutional Codes for Soft Decision Viterbi Decoding , 1984, IEEE Trans. Commun..
[50] Y. P. Singh,et al. Comparative assessment of energy requirements for different types of residential buildings in India , 1995 .
[51] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[52] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[53] Karin Kandananond. Consumer Product Demand Forecasting based on Artificial Neural Network and Support Vector Machine , 2012 .
[54] R. J. Duffin,et al. Temperature control of buildings by adobe wall design , 1981 .
[55] Majid Sarrafzadeh,et al. An Introduction To VLSI Physical Design , 1996 .
[56] Oliver Vornberger,et al. An Adaptive Parallel Genetic Algorithm for VLSI-Layout Optimization , 1996, PPSN.
[57] Andy C. Bavier,et al. Decentralized trust management and accountability in federated systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[58] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[59] Andrew H. Buchanan,et al. Energy and carbon dioxide implications of building construction , 1994 .
[60] Xingming Sun,et al. Steganalysis Based on Neighbourhood Node Degree Histogram for LSB Matching Steganography , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[61] Xin Yao,et al. A Memetic Algorithm for VLSI Floorplanning , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[62] Mili Majumdar,et al. Energy Efficient Buildings in India , 2009 .
[63] Rosenberg J. Romero,et al. Experimental thermodynamic evaluation for a single stage heat transformer prototype build with commercial PHEs , 2015 .
[64] Branka Vucetic,et al. Design of adaptive modulation using imperfect CSI in MIMO systems , 2004 .
[65] F. H. Mischgofsky,et al. Direct microscopy of alloy nucleation, solidification and ageing (coarsening) during stir casting , 1986 .
[66] K. B. Ren,et al. Upgrading the durability of mud bricks by impregnation , 1995 .
[67] M. N. Bodur,et al. Thermal isolation and mechanical properties of fibre reinforced mud bricks as wall materials , 2007 .
[68] Pradeep Bansal,et al. Thermodynamic analysis of an R744-R717 cascade refrigeration system , 2008 .
[69] Indranil Gupta,et al. Making cloud intermediate data fault-tolerant , 2010, SoCC '10.
[70] Wen-Hwa Liao,et al. Data aggregation in wireless sensor networks using ant colony algorithm , 2008, J. Netw. Comput. Appl..
[71] Chinnakurli Suryanarayana Ramesh,et al. Friction and wear behavior of Ni–P coated Si3N4 reinforced Al6061 composites , 2010 .
[72] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[73] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[74] Chi-Nan Lin,et al. A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[75] M.A.Eben Saleh. Adobe as a thermal regulating material , 1990 .
[76] Kjell Jørgen Hole,et al. Adaptive multidimensional coded modulation over flat fading channels , 2000, IEEE Journal on Selected Areas in Communications.
[77] Jinjun Chen,et al. An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[78] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[79] Andrea J. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..
[80] Alexander A. Sawchuk,et al. A customizable framework of body area sensor network for rehabilitation , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.
[81] Wei Zhou,et al. Casting of SiC reinforced metal matrix composites , 1997 .
[82] Wenliang Du,et al. Inference Analysis in Privacy-Preserving Data Re-publishing , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[83] Peter Langhorne,et al. Effects of Augmented Exercise Therapy Time After Stroke: A Meta-Analysis , 2004, Stroke.
[84] S. A Khandekar. Steganography for Text Messages Using Image , 2012 .
[85] Branka Vucetic,et al. Design of adaptive modulation in MIMO systems using outdated CSI , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[86] M. S. Vijaya,et al. Machine Learning Approach for Preoperative Anaesthetic Risk Prediction , 2009 .
[87] A. Suresh Babu,et al. Improvising Distributed Accountability by Using Fog Methodology , 2013 .
[88] Liljana Ferbar,et al. Demand forecasting methods in a supply chain: Smoothing and denoising , 2009 .
[89] Miodrag Potkonjak,et al. Sensor Network Architecture , 2004, Handbook of Sensor Networks.
[90] Jerry den Hartog,et al. A Logic for Auditing Accountability in Decentralized Systems , 2004, Formal Aspects in Security and Trust.