INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

[1]  Ahlam Fadhil Mahmood,et al.  An FPGA Implementation of Secured Steganography Communication System , 2014 .

[2]  Sabih H. Gerez,et al.  Algorithms for VLSI design automation , 1998 .

[3]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[4]  Ashwani Kumar,et al.  Electricity price forecasting in deregulated markets: A review and evaluation , 2009 .

[5]  A. D. Parekh,et al.  Thermodynamic Analysis of R 507 A-R 23 Cascade Refrigeration System , 2011 .

[6]  M. Dohler,et al.  MIMO systems with adaptive modulation , 2005, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).

[7]  Andrea J. Goldsmith,et al.  Adaptive coded modulation for fading channels , 1998, IEEE Trans. Commun..

[8]  S. M. Bin Gadhi,et al.  Thermal behaviour of adobe and concrete houses in Yemen , 1992 .

[9]  Tsong Yueh Chen,et al.  Performance and Area Optimization of VLSI Systems Using Genetic Algorithms , 1995, VLSI Design.

[10]  Deyi Kong,et al.  MEMS based sensors for explosive detection: Development and discussion , 2008, 2008 3rd IEEE International Conference on Nano/Micro Engineered and Molecular Systems.

[11]  B. Miller Thayer The magic of solar adobe , 1996 .

[12]  Syed M. Zubair,et al.  Second-law-based thermodynamic analysis of two-stage and mechanical-subcooling refrigeration cycles , 1996 .

[13]  Jamal Shahrabi,et al.  Supply Chain Demand Forecasting; A Comparison of Machine Learning Techniques and Traditional Methods , 2009 .

[14]  Huosheng Hu,et al.  Application of wearable inertial sensors in stroke rehabilitation , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[15]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[16]  Greg Knowles,et al.  Are adobe walls optimal phase-shift filters? , 1980 .

[17]  Radha Jagadeesan,et al.  Towards a Theory of Accountability and Audit , 2009, ESORICS.

[18]  Donald F. Towsley,et al.  A study of the coverage of large-scale sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[19]  Jirí Kubalík,et al.  Layout Problem Optimization Using Genetic Algorithms , 2002, BASYS.

[20]  Evangeline F. Y. Young,et al.  Slicing floorplans with boundary constraints , 1999, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[21]  Xiao Liu,et al.  On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems , 2011, J. Parallel Distributed Comput..

[22]  Stephan ten Brink,et al.  Achieving near-capacity on a multiple-antenna channel , 2003, IEEE Trans. Commun..

[23]  José Fernández-Seara,et al.  Experimental evaluation of a cascade refrigeration system prototype with CO2 and NH3 for freezing process applications , 2011 .

[24]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[25]  Debmalya Panigrahi,et al.  Provenance views for module privacy , 2010, PODS.

[26]  Rustam M. Vahidov,et al.  Forecasting Supply Chain Demand Using Machine Learning Algorithms , 2009 .

[27]  M. P. Sunil,et al.  Minimization of Floorplanning Area and Wire Length Interconnection Using Particle Swarm Optimization , 2013 .

[28]  S. Sathiamoorthy,et al.  Hybrid Genetic Algorithm for VLSI Macro Cell Layout , 2002 .

[29]  Yu Guo,et al.  An open framework for foundational proof-carrying code , 2007, TLDI '07.

[30]  Giancarlo Ruffo,et al.  Reasoning about Accountability within Delegation , 2001, ICICS.

[31]  Gongde Guo,et al.  A Comparative Study of Machine Learning Algorithms Applied to Predictive Toxicology Data Mining , 2007, Alternatives to laboratory animals : ATLA.

[32]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[33]  Hong Ying,et al.  iSANLA: Intelligent Sensor and Actuator Network for Life science Applications , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[34]  Wen-Guey Tzeng,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.

[35]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[36]  XiaoFeng Wang,et al.  Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.

[37]  Dariush Divsalar,et al.  A soft-input soft-output APP module for iterative decoding of concatenated codes , 1997, IEEE Communications Letters.

[38]  Dennis Goeckel,et al.  Adaptive coding for time-varying channels using outdated fading estimates , 1999, IEEE Trans. Commun..

[39]  P. Boissy,et al.  In-home telerehabilitation for geriatric patients , 2008, IEEE Engineering in Medicine and Biology Magazine.

[40]  Hamid R. S. Mojaveri,et al.  Validation and Selection between Machine Learning Technique and Traditional Methods to Reduce Bullwhip Effects: a Data Mining Approach , 2009 .

[41]  Achmad Arifin,et al.  Ankle and Knee Joint Angle Measurements during Gait with Wearable Sensor System for Rehabilitation , 2009 .

[42]  Michiya Suzuki,et al.  The estimation of energy consumption and amount of pollutants due to the construction of buildings , 1993 .

[43]  Tricia J. Willink,et al.  Iterative tree search detection for MIMO wireless systems , 2005, IEEE Transactions on Communications.

[44]  Andrew J. Viterbi,et al.  An Intuitive Justification and a Simplified Implementation of the MAP Decoder for Convolutional Codes , 1998, IEEE J. Sel. Areas Commun..

[45]  I-Ming Chen,et al.  A low cost wearable wireless sensing system for upper limb home rehabilitation , 2010, 2010 IEEE Conference on Robotics, Automation and Mechatronics.

[46]  H. Harada Software defined radio prototype toward cognitive radio communication systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[47]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[48]  Wenliang Du,et al.  Privacy-MaxEnt: integrating background knowledge in privacy quantification , 2008, SIGMOD Conference.

[49]  Yasuo Hirata,et al.  High-Rate Punctured Convolutional Codes for Soft Decision Viterbi Decoding , 1984, IEEE Trans. Commun..

[50]  Y. P. Singh,et al.  Comparative assessment of energy requirements for different types of residential buildings in India , 1995 .

[51]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[52]  Sanjeev Khanna,et al.  On provenance and privacy , 2010, ICDT '11.

[53]  Karin Kandananond Consumer Product Demand Forecasting based on Artificial Neural Network and Support Vector Machine , 2012 .

[54]  R. J. Duffin,et al.  Temperature control of buildings by adobe wall design , 1981 .

[55]  Majid Sarrafzadeh,et al.  An Introduction To VLSI Physical Design , 1996 .

[56]  Oliver Vornberger,et al.  An Adaptive Parallel Genetic Algorithm for VLSI-Layout Optimization , 1996, PPSN.

[57]  Andy C. Bavier,et al.  Decentralized trust management and accountability in federated systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[58]  Sushil Jajodia,et al.  Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.

[59]  Andrew H. Buchanan,et al.  Energy and carbon dioxide implications of building construction , 1994 .

[60]  Xingming Sun,et al.  Steganalysis Based on Neighbourhood Node Degree Histogram for LSB Matching Steganography , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[61]  Xin Yao,et al.  A Memetic Algorithm for VLSI Floorplanning , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[62]  Mili Majumdar,et al.  Energy Efficient Buildings in India , 2009 .

[63]  Rosenberg J. Romero,et al.  Experimental thermodynamic evaluation for a single stage heat transformer prototype build with commercial PHEs , 2015 .

[64]  Branka Vucetic,et al.  Design of adaptive modulation using imperfect CSI in MIMO systems , 2004 .

[65]  F. H. Mischgofsky,et al.  Direct microscopy of alloy nucleation, solidification and ageing (coarsening) during stir casting , 1986 .

[66]  K. B. Ren,et al.  Upgrading the durability of mud bricks by impregnation , 1995 .

[67]  M. N. Bodur,et al.  Thermal isolation and mechanical properties of fibre reinforced mud bricks as wall materials , 2007 .

[68]  Pradeep Bansal,et al.  Thermodynamic analysis of an R744-R717 cascade refrigeration system , 2008 .

[69]  Indranil Gupta,et al.  Making cloud intermediate data fault-tolerant , 2010, SoCC '10.

[70]  Wen-Hwa Liao,et al.  Data aggregation in wireless sensor networks using ant colony algorithm , 2008, J. Netw. Comput. Appl..

[71]  Chinnakurli Suryanarayana Ramesh,et al.  Friction and wear behavior of Ni–P coated Si3N4 reinforced Al6061 composites , 2010 .

[72]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[73]  Özgür B. Akan,et al.  Cognitive radio sensor networks , 2009, IEEE Network.

[74]  Chi-Nan Lin,et al.  A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[75]  M.A.Eben Saleh Adobe as a thermal regulating material , 1990 .

[76]  Kjell Jørgen Hole,et al.  Adaptive multidimensional coded modulation over flat fading channels , 2000, IEEE Journal on Selected Areas in Communications.

[77]  Jinjun Chen,et al.  An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[78]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[79]  Andrea J. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..

[80]  Alexander A. Sawchuk,et al.  A customizable framework of body area sensor network for rehabilitation , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.

[81]  Wei Zhou,et al.  Casting of SiC reinforced metal matrix composites , 1997 .

[82]  Wenliang Du,et al.  Inference Analysis in Privacy-Preserving Data Re-publishing , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[83]  Peter Langhorne,et al.  Effects of Augmented Exercise Therapy Time After Stroke: A Meta-Analysis , 2004, Stroke.

[84]  S. A Khandekar Steganography for Text Messages Using Image , 2012 .

[85]  Branka Vucetic,et al.  Design of adaptive modulation in MIMO systems using outdated CSI , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[86]  M. S. Vijaya,et al.  Machine Learning Approach for Preoperative Anaesthetic Risk Prediction , 2009 .

[87]  A. Suresh Babu,et al.  Improvising Distributed Accountability by Using Fog Methodology , 2013 .

[88]  Liljana Ferbar,et al.  Demand forecasting methods in a supply chain: Smoothing and denoising , 2009 .

[89]  Miodrag Potkonjak,et al.  Sensor Network Architecture , 2004, Handbook of Sensor Networks.

[90]  Jerry den Hartog,et al.  A Logic for Auditing Accountability in Decentralized Systems , 2004, Formal Aspects in Security and Trust.