scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2014"


Journal ArticleDOI
TL;DR: The objective is to provide a generic introduction to variable elimination which can be applied to a wide array of machine learning problems and focus on Filter, Wrapper and Embedded methods.

3,517 citations


Journal ArticleDOI
TL;DR: A new underwater model to compensate the attenuation discrepancy along the propagation path, and a fast joint trigonometric filtering dehazing algorithm are proposed, which are comparable to higher quality than the state-of-the-art methods by assuming in the latest image evaluation systems.

391 citations


Journal ArticleDOI
TL;DR: A public auditing scheme with third party auditor (TPA), who performs data auditing on behalf of user(s) is proposed, which is proved secure in the random oracle model and the performance analysis shows the scheme is efficient.

131 citations


Journal ArticleDOI
TL;DR: It is illustrated that Chang et al.'s scheme violates the purpose of dynamic-identity contrary to authors' claim, and an improved remote user authentication scheme with the session key agreement is come-up, showing its robustness over related schemes.

116 citations


Journal ArticleDOI
TL;DR: Trust aware Collaborative Learning Automata based Intrusion Detection System (T-CLAIDS) for VANETs is proposed and results obtained show that T-CLAIDs performs better than the other existing schemes with respect to parameters such as false alarm ratio, detection ratio and overhead generated.

111 citations


Journal ArticleDOI
TL;DR: A Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack and an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node.

102 citations


Journal ArticleDOI
TL;DR: A simple and efficient new method for QRS detection in Electrocardiogram (ECG) is proposed in this paper and it is shown that the detection sensitivity and positive predictivity of CSE measurement database, MIT/BIH Arrhythmia database, European ST-T database and QT database are high.

89 citations


Journal ArticleDOI
TL;DR: A method for detecting this kind of image tampering based on circular pattern matching using Polar Harmonic Transform and lexicographically sorting the forged regions are detected by finding the similar block pairs after proper post-processing.

83 citations


Journal ArticleDOI
TL;DR: Theoretical analysis and simulation results show that the proposed ECDC (Energy and Coverage-aware Distributed Clustering Protocol) protocol is effective in improving network coverage performance, reducing nodes energy dissipation and extending the network lifetime.

79 citations


Journal ArticleDOI
TL;DR: A data hiding technique based on the concepts of scrambling and pseudorandom data hiding is presented to provide a data hiding system with two layer security to the embedded data, and good perceptual transparency of the stego images.

73 citations


Journal ArticleDOI
TL;DR: Simulation results confirm that the proposed approach outperforms with size based Hilbert Curve in terms of network coverage, packet delivery ratio and average energy consumption.

Journal ArticleDOI
TL;DR: This paper surveys SI-based job scheduling algorithms for bag-of-tasks applications (such as PSEs) on distributed computing environments, and uniformly compares them based on a derived comparison framework.

Journal ArticleDOI
TL;DR: The novelty of the proposed scheme is to integrate timing analysis, queuing theory, integer programming, and control theory techniques to achieve energy efficiency and desired service level agreements in cloud data centers.

Journal ArticleDOI
TL;DR: The novelty of AIEBHE is its flexibility in choosing the clipping limit that automatically selects the smallest value among histogram bins, mean, and median values, resulting in the conservation of a greater amount of information in the image.

Journal ArticleDOI
Bo Zhou1, Wei Wang1, Hao Ye1
TL;DR: Consensus tracking problem in multi-agent systems with both outage and partial loss of effectiveness types of actuator faults is investigated and a distributed control strategy is developed by using locally available information.

Journal ArticleDOI
TL;DR: This paper demonstrates how to construct a bridge between SoS and Data Analytics to develop reliable models for such systems, using data analytics to generate a model to forecast produced photovoltaic energy to assist in the optimization of a micro grid SoS.

Journal ArticleDOI
TL;DR: The proposed EFDR technique is capable of detecting and managing the faulty nodes in an efficient manner and the simulation results show 86% improvement in the rate of energy loss compared to an existing algorithm.

Journal ArticleDOI
TL;DR: An overview of available simulation techniques to support the analysis of smart grid communications with a particular focus on the co-simulation frameworks and their enabling technologies is provided.

Journal ArticleDOI
TL;DR: The user's adaptation on brain-controlled systems and the ability to control brain-generated events in a closed neuro-feedback loop are identified and the user experience is quantified for the further understanding of brain-computer interfacing.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a novel method to detect edge on clear or noisy images based on neutrosophic set and a new directional α-mean operation is defined, which performs well on images without noise or with different levels of noise.

Journal ArticleDOI
TL;DR: The modified Gini index-Gaussian fuzzy decision tree algorithm is proposed and is tested with Pima Indian Diabetes (PID) clinical data set for accuracy and this algorithm outperforms other decision tree algorithms.

Journal ArticleDOI
TL;DR: A modified unsharp masking framework is applied to control the effectiveness of sharpness by constructing a sigmoid function adaptively and the main advantage of the proposed approach compared with others is its higher speed.

Journal ArticleDOI
TL;DR: In this paper, an effective fault detection strategy for sludge volume index (SVI) sensor is proposed and tested on an experimental hardware setup in waste water treatment process (WWTP).

Journal ArticleDOI
TL;DR: A novel feature aggregation based visual saliency detection mechanism and its usage for extracting key frames and the experimental results demonstrate that the proposed scheme extracts semantically significant key frames.

Journal ArticleDOI
Tudor Barbu1
TL;DR: A robust human tracking method using a Histogram of Oriented Gradient based template matching process is introduced and determines what moving image objects represent pedestrian people, by testing several conditions related to human bodies and detecting the skin regions from the movie frames.

Journal ArticleDOI
TL;DR: The results indicate that the proposed novel approach is very effective in predicting the stator winding fault and the best running parameters for the induction motor are also reported.

Journal ArticleDOI
TL;DR: A survey that provides a broad picture of the state-of-the-art energy-efficient NoC architectures and techniques, such as the routing algorithms, buffered and bufferless router architectures, fault tolerance, switching techniques, voltage islands, and voltage-frequency scaling.

Journal ArticleDOI
TL;DR: A novel multimode process monitoring approach based on PCA mixture model, which is derived for fault detection of multimode processes and the Bayesian Ying-Yang incremental EM algorithm is adopted to automatically optimize the number of mixture components.

Journal ArticleDOI
TL;DR: An advanced Secure scheme based on Clustering and Key Distribution (SCKD) among members and cluster-heads in VANET preserves security requirements including authentication, confidentiality, data-integrity, non-repudiation, and unforgeability.

Journal ArticleDOI
TL;DR: This paper overviews recent research in optical communications and focuses on the topics of modulation, switching, add-drop multiplexer, coding schemes, detection schemes, orthogonal frequency-division multiplexing, system analysis, cross-layer design, control and management, free space optics, and optics in data center networks.