![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Signal Processing Systems, Volume 96
Volume 96, Number 1, January 2024
- Joe Gould
, Keshab K. Parhi
:
Backpropagation Computation for Training Graph Attention Networks. 1-14 - Yu Yuan
, Kushal Virupakshappa, Erdal Oruklu
:
Accelerating a Meta Learning Model for Ultrasonic Non-Destructive Testing Applications Using Model Compression and FPGA Hardware. 15-29 - N. S. Sathyavathi
, P. Augusta Sophy Beulet:
Deca-Rounding Methods for Floating Point Numbers: Error Analysis & Hardware Implementation. 31-50 - C. Santhiya, S. Padmavathi:
Bio-Inspired Crossover Cosine Swarm Optimization Algorithm Based Task Scheduling for Quality of Service Improvement Under Cloud Environment. 51-65 - Hyeonjun Shin, Jooheung Lee
:
Hardware Multi-Threaded System for High-Performance JPEG Decoding. 67-79 - Dorsaf Sebai
, Maryem Sehli, Faouzi Ghorbel
:
End-to-End Variable-Rate Learning-Based Depth Compression Guided by Deep Correlation Features. 81-97
Volume 96, Number 2, February 2024
- Peng Su, Hui Zhao
, Ying Wang:
A Novel Model Based on Big Data Environment for Text Content Security Recognition. 99-112 - Zhian Yang, Hao Jiang, Lingyue Huang, Yiming Liu:
Multi Feature Extraction and Trend Prediction for Weibo Topic Dissemination Network. 113-129 - Zhian Yang, Hao Jiang, Aobo Deng, Yang Li:
Topic-Oriented Controlled Text Generation for Social Networks. 131-151 - Xueming Zhang, Haitao Deng, Zenggang Xiong
, Yanchao Liu, Ying Rao, Yuanlin Lyu
, Yuan Li, Delin Hou
, Youfeng Li:
Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks. 153-168 - Min Deng, Songhao Jiang, Fang Xu, Chunmeng Yang, Na Yang, Yuanlin Lyu
, Zenggang Xiong, Manzoor Ahmed:
Energy and Cache Aware Routing for Socially Aware Networking in the Big Data Environment. 169-178
Volume 96, Number 3, March 2024
- Sungdae Baek, Jonghong Kim, Junwon Lee, Minho Lee
:
Implementation of a Virtual Assistant System Based on Deep Multi-modal Data Integration. 179-189 - Ju O. Kim, Jieun Kim, Deokwoo Lee:
Calibrating a Three-Viewpoints Thermal Camera with Few Correspondences. 191-202 - Vaishanth Ramaraj
, Atharva Paralikar, Eung-Joo Lee, Syed Muhammad Anwar, Reza Monfaredi:
Development of a Modular Real-time Shared-control System for a Smart Wheelchair. 203-214 - Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen, Zhihong Tian:
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS. 215-237 - Xuan You, Changsong Zhou, Zeng Chen, Rui Han, Yu Gu, Guozi Sun
:
Large File Security Outsourcing and Sharing Method Based on Blockchain. 239-256 - Tarek Frikha
, Jalel Ktari
, Nader Ben Amor
, Faten Chaabane
, Monia Hamdi
, Fehmi Denguir, Habib Hamam
:
Low Power Blockchain in Industry 4.0 Case Study: Water Management in Tunisia. 257-271
Volume 96, Number 4-5, May 2024
- Tarik Ayabakan
, Feza Kerestecioglu
:
Fault Tolerant Indoor Positioning Based on Federated Kalman Filter. 273-285 - Martí Caro
, Jaume Abella:
Energy-Efficient Object Detection: Impact of Weight Clustering for Different Arithmetic Representations. 287-300 - Hussein M. H. Al-Rikabi
, Balázs Renczes
:
Floating-Point Quantization Analysis of Multi-Layer Perceptron Artificial Neural Networks. 301-312 - John Bob Gali
, Priyadip Ray, Goutam Das:
GLRT Based Adaptive-Thresholding for CFAR-Detection of Pareto-Target in Pareto-Distributed Clutter. 313-326 - Alexander Stotsky:
Kaczmarz Projection Algorithms with Rank Two Gain Update. 327-332
Volume 96, Number 6-7, July 2024
- Elham Shamsinejad
, Touraj Banirostam
, Mir Mohsen Pedram
, Amir Masoud Rahmani
:
Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering. 333-356 - Yinghao Zhuang, Yue Zhang, Yibin Li
, Tianze Zhang, Yan Song:
Intelligent AUV Surfacing Control in Network Attack Scenario. 357-368 - Xuemin Zhang, Haitao Deng, Zenggang Xiong
, Ying Rao, Yanchao Liu, Yuan Li, Delin Hou
:
Self-Organizing Key Security Management Algorithm in Socially Aware Networking. 369-383 - Muath AlShaikh
:
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption. 385-399 - Caiyun Liu, Jun Li, Yan Sun
:
Deep Learning-based Privacy-preserving Publishing Method for Location Big Data in Vehicular Networks. 401-414
Volume 96, Number 8-9, September 2024
- Hoang-Yang Lu, Mao-Hsu Yen, Yi-Jang Li, Guang-Yan Li:
VLSI-Implementation-Based Fast Symbol Detector for PQSM MIMO Systems. 415-429 - Sushmitha Sajeevu, Sakthivel Vellaisamy:
Hardware Efficient Reconfigurable Digital Hearing aid using Pascal Structure. 431-447 - Haifeng Sang, Yumeng Liu:
Supernode Fusion Model Based on Bimodal Action Recognition. 449-462 - Wenrui Xu, Keshab K. Parhi:
Multi-Class Classification of Abnormal Heartbeat Detection using Hyperdimensional Computing. 463-477 - Grégoire de Broglie, Louis Morge-Rollet, Denis Le Jeune, Frédéric Le Roy, Christian Roland, Charles Canaff, Jean-Philippe Diguet:
New LTE-A Low-Latency Detectors for Cognitive Radio on Low-Cost FPGA SoC. 479-493 - Roselin Clara Angel, PL. Chithra:
Complexity Reduction in Intra Prediction of HEVC Using a Modified Convolutional Neural Network Model Incorporating Depth Map and RGB Texture. 495-507 - Lulu Ge, Aaron N. McInnes, Alik S. Widge, Keshab K. Parhi:
Determining the Number of Clusters in Clinical Response of TMS Treatment using Hyperdimensional Computing. 509-523 - Hamid Banirostam, Touraj Banirostam, Mir Mohsen Pedram, Amir Masoud Rahmani:
Correction: A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data. 525
Volume 96, Number 10, October 2024
- Sheikh Faizan Qureshi, Stefan A. Damjancevic, Emil Matús, Pieter van der Wolf, Dmitry Utyansky, Gerhard P. Fettweis:
Efficient Handover Mode Synchronization for NR-REDCAP on a Vector DSP. 527-539 - Mingjun Feng, Caiyun Liu, Yan Sun, Yidong Wu, Bo Li:
Distribution Network Anomaly Detection Based on Graph Contrastive Learning. 541-554 - Binbin Ge, Jingru Bao, Bo Li, Xudong Mou, Jun Zhao, Xudong Liu:
IMG: Deep Representation Graph Learning for Anomaly Detection in Industrial Control System. 555-567 - Laxmi Kantham Durgam, Ravi Kumar Jatoth:
Age Estimation from Speech Using Tuned CNN Model on Edge Devices. 569-585 - Diba Das, Mehdi Hasan Chowdhury, Aditta Chowdhury, Quazi Delwar Hossain, Ray C. C. Cheung:
EOG Signal Processor: An SVM-based Multiclass Classifier to Detect Eye Movements. 587-600 - Bahram Rashidi:
An Image Encryption Method Based on a High-performance and Efficient Block Cipher. 601-615 - Friedrich R. Münke, Manuel Schenk, Sandra Murr, Markus Reischl:
Adaptable Accelerometer Signal Processing Pipelines for Smartphone based Evenness Estimation. 617-626
Volume 96, Number 11, November 2024
- Fabian Stuckmann, Moritz Weißbrich, Guillermo Payá-Vayá:
Energy-Aware Register Allocation for VLIW Processors. 627-650 - André Bannwart Perina, Jürgen Becker, Vanderlei Bonato:
Memory Aware Design Optimisation for High-Level Synthesis. 651-671 - Tao Wu:
Fast RNS Implementation of Elliptic Curve Point Multiplication on FPGAs. 673-684 - Sai Sanjay Balaji, Keshab K. Parhi:
Graph Convolution Network Based Classification of Subjects with Prefrontal Cortex Lesion via Information-theoretic Brain Network Features. 685-696 - Pawan Kumar, Karan Nathwani:
Exploiting Compress Sensing in Training of Deep Neural Network for Self-Noise Cancellation in Underwater Acoustics. 697-715 - Harith H. Thannoon, Ivan A. Hashim:
A Novel Design of Combined Systolic and Convex Architectures for Efficient High-Speed Adaptive Filter. 717-745 - Yujun Liao, Yan Wu, Yujian Mo, Yufei He, Yinghao Hu, Junqiao Zhao:
SAPT: Saliency Augmentation and Unsupervised Pre-trained Model Fusion for Few-Shot Object Detection. 747-762
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.