Keyword Index

A

  • Anti-Spoofing Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Architectural Style A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Asymmetric Encryption Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Atrial Fibrillation Arrhythmia A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Attack Parameters Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Authenticated Encryption JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Authorship Attribution A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Auto-Scaling A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

B

  • Big Data A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
  • Blind Steganalysis Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

C

  • CAESAR JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Cloud Computing A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
  • Cloud Computing Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Cloudlet Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Cloudsim Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • CNFET A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Cognitive Radio Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Cohesion A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Collaborative Business Process Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Context-Aware Adaptation A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Correctness Verification Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Coupling A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

D

  • Data Outsourcing Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

E

  • ECG Segmentation A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Electrocardiogram A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Exploration and Exploitation New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

F

  • Face Recognition Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Facial Expression Recognition Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Fuzzy Inference System Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

G

H

  • Heuristic Search Algorithm New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Human Stylome A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

I

  • Image Halftoning Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Integrity JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Interval Type-2 Fuzzy Sets Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

J

  • Jump Index Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

L

  • Learning Automata A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • LFSR Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Longest Common Substring A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

M

  • Maintainability A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Mass Calculation New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Migration to Cloud A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Mixed Radix Conversion A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Model-Driven Transformation Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Modulo Adder A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Multi-Secret Sharing Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

N

  • Nano electronic A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Neuro-Fuzzy Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

O

  • Object retrieval Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Ontology Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • OWL-S Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

P

  • Payload A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Period Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Primary User Emulation Attack Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Privacy JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Provable Security JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

R

  • Real-Time Audio Watermarking A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Reflective-State Framework A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Regular Expression A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Residue Arithmetic A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Residue Number System A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Residue-to-Binary Converter A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Resource Freeing Attack Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • RNS A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Robustness A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

S

  • Scaling Functions New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Scene Texture Analysis Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Searchable Encryption Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Secure Cloud Storage Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Security Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Self-Adaptive System A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Self-Healing System A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Semantic Web Service Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Service-Based Application A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Service Choreography Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Signal Processing Attacks A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Spectrum Sensing Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Speeded Up Robust Features (SURF) Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Steganography Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Storage Service A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
  • Stream Ciphers Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

T

  • Training-Free Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Transient Workload A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Transparency A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

U

  • UML State Machine Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

V

  • Verification Object Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Virtualization Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

W

  • Web Service Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Web Service Matchmaking Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Writeprint A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Writing Style A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • WSMO Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]