scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2015"


Journal ArticleDOI
TL;DR: A fully automatic system, able to detect slices that include tumor and, to delineate the tumor area, is presented and the experimental results on single contrast mechanism demonstrate the efficacy of the proposed technique in successfully segmenting brain tumor tissues with high accuracy and low computational complexity.

212 citations


Journal ArticleDOI
TL;DR: An implementation of Sensor Web node as a part of IoT using a Raspberry Pi - inexpensive, fully customizable and programmable small computer with support for a large number of peripherals and network communication is proposed.

204 citations


Journal ArticleDOI
TL;DR: This survey presents a high level taxonomy of energy management in WSNs and recommends taking into account recent energy provisioning advancements in parallel with the traditional energy conservation approaches for a sensor network while designing energy efficient schemes.

202 citations


Journal ArticleDOI
TL;DR: The proposed energy aware routing algorithm is based on a clever strategy of cluster head (CH) selection, residual energy of the CHs and the intra-cluster distance for cluster formation and achieves constant message and linear time complexity.

176 citations


Journal ArticleDOI
TL;DR: This study presents a comprehensive review of RM techniques and elaborates their extensive taxonomy based on the distinct features, and highlights evaluation parameters and platforms that are used to evaluate RM techniques.

161 citations


Journal ArticleDOI
TL;DR: The proposed distributed clustering and routing algorithms jointly referred as DFCR is shown to be energy efficient and fault tolerant and compared with the existing algorithms to demonstrate the strength of the algorithm in terms of various performance metrics.

151 citations


Journal ArticleDOI
TL;DR: An accurate and lightweight intrusion detection framework that aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network, called AECFV is designed and implemented.

139 citations


Journal ArticleDOI
TL;DR: This paper proposes a fuzzy logic based mechanism that determine the sleeping time of field devices in a home automation environment based on BLE, and results reveal that using the proposed approach the device lifetime is increased by 30% with respect to the use of fixed sleeping time.

114 citations


Journal ArticleDOI

[...]

TL;DR: The experimental results demonstrate that QoS metric based resource provisioning technique is efficient in reducing execution time and execution cost of cloud workloads along with other QoS parameters.

107 citations


Journal ArticleDOI
TL;DR: The presented method can extract the edges of an image accurately and enhance them while preserving smooth areas and weak textures; these improvements can be particularly helpful to doctors' diagnoses.

106 citations


Journal ArticleDOI
TL;DR: The results of simulations using Cloudsim simulator validates the applicability of the proposed policies which shows up to 46, 99, and 95% reductions in energy consumption, SLA violation, and number of VM migrations, respectively in comparison with state of the arts.

Journal ArticleDOI
TL;DR: A new three-factor remote authentication scheme based on ECC is presented and it is proved secure with a formal proof and analysis and is more practical for application due to the security and efficiency.

Journal ArticleDOI
TL;DR: A new fast integer-based algorithm to convert the RGB color representation to HSV and vice versa and the use of only integer operations increases performance and portability.

Journal ArticleDOI
TL;DR: A composition model that takes both QoS of services and cloud network environment into consideration and a genetic algorithm based on genetic algorithm for geo-distributed cloud and service providers who want to minimize the SLA violations are proposed.

Journal ArticleDOI
TL;DR: A web application model is proposed to capture the behavioral patterns of different user profiles and to support analysis and simulation of resources utilization in cloud environments to tackle workload modeling challenges.

Journal ArticleDOI
TL;DR: A greedy algorithm called Greedy-W SC and an ant colony optimization based algorithm called ACO-WSC are presented, which attempt to select cloud combinations that are feasible and use the minimum number of clouds, and experimental results show that the proposed ant colonies optimization method can effectively and efficiently find cloud combinations with a minimal number of Clouds.

Journal ArticleDOI
TL;DR: A two-stage selection algorithm combining IG and BPSO for foreign fiber data and results show that the proposed algorithm can efficiently find the feature subsets with smaller size and higher accuracy than other algorithms.

Journal ArticleDOI
TL;DR: A new lightweight key management protocol based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity and shows that its security properties are ensured.

Journal ArticleDOI
TL;DR: This paper takes into account the cooling and network structure of the datacenter host ing the physical machines when consolidating the VMs so that fewer racks and routers are employed, without compromising the service-level agreements; consequently, idle routing and cooling equipment can be turned off in order to reduce the energy consumption.

Journal ArticleDOI
TL;DR: A real-time adaptive lighting scheme, which detects the presence of vehicles and pedestrians and dynamically adjusts their brightness to the optimal level improves the energy efficiency of street lighting and its usefulness; a streetlight utility model is presented to evaluate this.

Journal ArticleDOI
TL;DR: In this paper, an adaptive genetic algorithm for robot motion planning in 2D complex environments is proposed, and a novel selection operator is designed to overcome the local-trap problem and avoid premature convergence.

Journal ArticleDOI
TL;DR: An overview of relevant Software Defined Networking (SDN) related approaches is provided, and an architecture based on OpenFlow that establishes different types of flows according to their needs and the network status is described.

Journal ArticleDOI
TL;DR: A high payload image steganographic scheme based on an extended interpolating method that maximizes the difference values between neighboring pixels and improves the capacity and has low complexity and retains good image quality.

Journal ArticleDOI
TL;DR: A pipelined approach including color channel stretching, histogram averaging and re-mapping is developed, which shows that image brightness is preserved while image contrast is enhanced.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed watermarking scheme achieves better performance of robustness against both common signal operations and geometric attacks compared to other existing schemes.

Journal ArticleDOI
TL;DR: A hybrid unequal clustering with layering protocol (HUCL) is proposed, a hybrid of static and dynamic clustering approaches that balances energy and achieves a good distribution of clusters, extends the lifetime of the network and avoid the energy hole problem.

Journal ArticleDOI
TL;DR: A novel COMbinatorial optimization algorithm for cloud service COMposition (COM2) that can efficiently utilize multiple clouds and ensures that the cloud with the maximum number of services will always be selected before other clouds, which increases the possibility of fulfilling service requests with minimal overhead.

Journal ArticleDOI
TL;DR: A new image retrieval technique is presented, which retrieves similar images in three stages, which eliminates the need of fusion and normalization techniques, which are commonly used to calculate final similarity scores.

Journal ArticleDOI
TL;DR: The Quantum dot Cellular Automata (QCA) can be such an architecture at nano-scale and thus emerges as a viable alternative for the current CMOS VLSI and its effectiveness is further established through synthesis of configurable logic block (CLB) for field programmable gate arrays (FPGAs).

Journal ArticleDOI
TL;DR: The experimental results demonstrate the ability of the proposed resource allocation approach to manage the trade-off between time and energy comparing to traditional algorithms.