​
Login / Signup
IJHCR
2017
2017
2017
Keyphrases
Publications
volume 8, number 1, 2017
Ali K. Jaber
,
Ikhlas Abdel-Qader
A Hybrid Feature Extraction Framework for Face Recognition: HOG and Compressive Sensing.
IJHCR
8 (1) (2017)
Osamah Ali Abdullah
,
Ikhlas Abdel-Qader
,
Bradley J. Bazuin
Convex Optimization Via Jensen-Bregman Divergence for WLAN Indoor Positioning System.
IJHCR
8 (1) (2017)
Caterina Lazaro Martinez
,
Erdal Oruklu
,
Mert Sevil
,
Kamuran Turksoy
,
Ali Cinar
Hardware and Software Implementation of an Artificial Pancreas System on a Mobile Device.
IJHCR
8 (1) (2017)
Greg Gogolin
,
Erin Gogolin
The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications.
IJHCR
8 (1) (2017)
volume 8, number 2, 2017
Gregory Bock
,
Ryan Hendrickson
,
Jared Lamkin
,
Brittany Dhall
,
Jing Wang
,
In Soo Ahn
Experimental Validation of Distributed Cooperative Control of Multiple Mobile Robots via Local Information Exchange.
IJHCR
8 (2) (2017)
Ziad Hunaiti
Digital Learning Technologies: Subjective and Objective Effectiveness Evaluation in Higher Education Settings.
IJHCR
8 (2) (2017)
Hongyu Guo
,
Amjad Nusayr
,
Wen-Chen Hu
Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps.
IJHCR
8 (2) (2017)
volume 8, number 3, 2017
Sara Nouh
,
Nada Elgaml
,
Ahmed K. F. Khattab
,
Samy S. Soliman
,
Ramez M. Daoud
,
Hassanein H. Amer
WSN Lifetime and Reliability Analysis From the Death Criterion Perspective.
IJHCR
8 (3) (2017)
Jing Wang
,
In Soo Ahn
,
Yufeng Lu
,
Tianyu Yang
,
Gennady Staskevich
A Distributed Least-Squares Algorithm in Wireless Sensor Networks With Unknown and Limited Communications.
IJHCR
8 (3) (2017)
Ashraf Mostafa
,
Manohar Das
A Study of Recursive Techniques for Robust Identification of Time-Varying Electrical Equivalent Circuit Models of Li-Ion Batteries.
IJHCR
8 (3) (2017)
Dongfeng Fang
,
Feng Ye
,
Yi Qian
,
Hamid Sharif
A Cloud-Based Incentive Mechanism for Sensing in Mobile Sensor Networks.
IJHCR
8 (3) (2017)
volume 8, number 4, 2017
P. Victer Paul
,
Duggineni Veeraiah
Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop.
IJHCR
8 (4) (2017)
Rajaguru Dayalan
,
Puviyarasi T.
,
T. Vengattaraman
A Review on Edge Connectivity Framework for Handheld Computing.
IJHCR
8 (4) (2017)
Rajaguru Dayalan
,
Puviyarasi T.
,
T. Vengattaraman
Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System.
IJHCR
8 (4) (2017)
Shailesh Pancham Khapre
,
Vishakha Chauhan
,
Vinam Tomar
,
P. R. Mahapatra
,
Nidhi Bansal
A Method of Identifying User Identity Based on Username Features.
IJHCR
8 (4) (2017)
Balakrishnan Natarajan
,
Shantharajah S. Periyasamy
,
Shrinivas S. G.
Image Visual Improvement on Handheld Devices Using Linear Mapping Function.
IJHCR
8 (4) (2017)
Manimaran Aridoss
Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications.
IJHCR
8 (4) (2017)