scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2013"


Journal ArticleDOI
TL;DR: It is emphasized that although there are many technological approaches that can improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as service level agreements for security, as well as holistic mechanisms for ensuring accountability in the cloud.

340 citations


Journal ArticleDOI
TL;DR: The relationship between blood pressure and PTT is illustrated, the problems of calibration and re-calibration are discussed, and the multi-innovation recursive least square algorithm is employed to update the unknown parameter vector for the model and improve the results.

106 citations


Journal ArticleDOI
TL;DR: The modified color motif co-occurrence matrix (MCMCM) is presented for content-based image retrieval and shows a significant improvement in terms of average retrieval rate and average retrieval precision on DB1 database and average precision, average recall andaverage retrieval rate on DB2 database as compared to the state-of-art techniques on respective databases.

100 citations


Journal ArticleDOI
TL;DR: An ECG compression method based on beta wavelet using lossless encoding technique is presented, which shows the superiority of this technique in terms of compression ratio and a desirable signal quality.

89 citations


Journal ArticleDOI
TL;DR: An efficient data retrieval scheme using attribute-based encryption that provides rich expressiveness as regards access control and fast searches with simple comparisons of searching entities and guarantees data security and user privacy during the data retrieval process is proposed.

87 citations


Journal ArticleDOI
TL;DR: A noise reduction method for both computed tomography (CT) and magnetic resonance imaging (MRI) which fuses the images and extracts edge information from the noise residual of TV method by processing it through curvelet transform.

79 citations


Journal ArticleDOI
TL;DR: The experimental results suggest that the developed computer-aided diagnosis system has great potential and promise in the automatic diagnosis of both benign and malignant tumours of liver.

69 citations


Journal ArticleDOI
TL;DR: A filtering method called ''region-based'' is proposed in order to smooth the uniform and background areas of an image, the Sobel operator and morphological filtering to extract the vertical edges and the candidate regions respectively, and the plate region is segmented by considering some geometrical features.

68 citations


Journal ArticleDOI
TL;DR: This study proposes a new computing paradigm: Cyberinfrastructure as a Service (CaaS), i.e., providing a service to enable building a cyberinfrastructure on demand, and Experimental results justify the design of CaaS and the implementation of the Cyberaide Creative service.

65 citations


Journal ArticleDOI
TL;DR: This paper proposes a dependability evaluation tool for IoT applications, when hardware faults and permanent link faults are considered.

63 citations


Journal ArticleDOI
TL;DR: The results demonstrated that EEQR has prolonged the network and coverage lifetime, as well as has improved the other QoS routing parameters, such as delay, packet loss ratio, and throughput.

Journal ArticleDOI
TL;DR: The parametric study of the proposed Coplanar Waveguide fed double L slot antenna array shows that the features of the small antenna structure, good radiation characteristics are promising for multi input multi output operation.

Journal ArticleDOI
TL;DR: The effectiveness of non-weighing-based sampling technique, comparing the efficacy of sampling with and without replacement, in conjunction with several consensus algorithms have been invested in this paper.

Journal ArticleDOI
TL;DR: This paper presents an efficient spatial domain based image hiding scheme, using Particle Swarm Optimization (PSO), used to find the best pixel locations in a gray scale cover image where the secret gray scale image pixel data can be embedded.

Journal ArticleDOI
TL;DR: The simulations, performed by using the real drive cycle of the tramway, show that the proposed hybrid system and energy management system are suitable for its application in this tramway.

Journal ArticleDOI
TL;DR: An integrated segmentation method which combines the features of Fuzzy C-Mean (FCM) clustering and region-based active contour method, which yields the higher average values of the similarity indices.

Journal ArticleDOI
TL;DR: This paper presents an automatic video summarization technique based on motion analysis that defines motion metrics estimated from two optical flow algorithms, each using two different key frame selection criteria.

Journal ArticleDOI
TL;DR: A new kernel function for SVM called hyperhemispherically normalized polynomial (HNP) is proposed in this paper and its validity on the improvement of classification accuracy is theoretically proved and experimentally tested for face recognition.

Journal ArticleDOI
TL;DR: A system which characterizes HTTP traffic and discriminates between legitimate and other kinds of HTTP traffic, such as those generated by Botnets or distributed denial of service (DDoS) tools is discussed.

Journal ArticleDOI
TL;DR: The major contribution of this paper is that the classification algorithm is immune to the effects of fault inception angle, fault impedance, fault distance and power angle, which validate the efficacy of the proposed algorithm for real time smart grid operation.

Journal ArticleDOI
TL;DR: This paper proposes a new content-based image retrieval technique using color and texture information, which achieves higher retrieval efficiency and provides a robust feature set for color image retrieval.

Journal ArticleDOI
TL;DR: A PDCA (Plan, Do, Check, Act) method of improving web-based intelligent reports of an e-learning system as intelligent system, which was created and implemented at the Technical Faculty in Cacak, University of Kragujevac is presented.

Journal ArticleDOI
TL;DR: A router design supporting best effort and connection-oriented guaranteed service communication for simultaneous guaranteed service Communication flows is presented and an algorithm is presented that is used to establish guaranteed service connections according to the applications bandwidth requirements.

Journal ArticleDOI
TL;DR: An Anchor-Free Localization Algorithm is proposed, called AFLA, designed for active-restricted underwater sensor networks, which does not need anchor node's information, and makes use of the relationship of adjacent nodes.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed blind spot warning system (BSWS) is feasible for vehicle detection and collision warning in various daytime and nighttime road environments.

Journal ArticleDOI
TL;DR: This paper shows how INDL and NML are used as a basis for models used in three different applications: the CineGrid infrastructure, the Logical Infrastructure Composition Layer in the GEYSERS EU-FP7 project and the NOVI federation platform.

Journal ArticleDOI
TL;DR: An RDPC scheme based on homomorphic hashing is proposed that provides provable data possession and integrity protection and the security and performance analysis shows that the scheme is practical for real-world use.

Journal ArticleDOI
TL;DR: This paper designs an efficient deterministic dynamic clustering routing data gathering scheme for large-scale wireless sensor networks that prolongs nearly 2x network's lifetime compared with the state of the art compressive sensing based data gathering schemes, but also makes the network energy consumption very uniformly.

Journal ArticleDOI
TL;DR: The main goal of this paper is to analyze the security of a multiple-key agreement protocol and to show that this protocol is vulnerable to forgery attack and a new efficient multiple- key agreement protocol is proposed, based on bilinear pairings and utilizes a novel signature scheme without one-way hash functions.

Journal ArticleDOI
TL;DR: Simulation shows outstanding robustness of the proposed algorithm against most common image processing operations and geometric distortions.