A
  • Access Structure Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Algorithm A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
  • Artificial Life (A-Life) Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2016]
  • Average-Case Running Time A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
B
  • Bus Controller A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
C
  • Cellular Automata Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • CMOS Analog Circuits A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2016]
  • Computational Complexity A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
  • Convex Optimization A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2016]
  • CRC Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Cryptography Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
D
E
F
  • Fake Profile A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2016]
  • Fault injection Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2016]
  • Fluid Stochastic Petri-Net (FSPN) A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
  • Folded-Cascode Operational Amplifier A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2016]
  • FPGA Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Fuzzy logic Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2016]
G
  • Gap-Greedy Spanner Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
  • Geometric Spanners Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
  • Greedy Spanner Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
I
  • ICA A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2016]
  • Independent Gate FinFET FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Intelligent Agent Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2016]
  • Intelligent Transportation Systems (ITS) A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
L
  • LFSR Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Localization A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2016]
  • Low-power design FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
M
  • Mobil Bus Station (MBS) A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
  • Mobile Bus Rapid Transit (MBRT) A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
  • Modified Cuckoo Optimization Algorithm A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2016]
  • Modulo Squarer Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2016]
  • Multi-Agent Environment Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2016]
  • Multiplier Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2016]
  • Multi-Secret Sharing Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Multi-VDD FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Multi-VT FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • MVL Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
O
  • Online Social Network A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2016]
P
  • Popular Users A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2016]
Q
  • Quaternary Operator Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
R
  • Range Free A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2016]
  • Rare Events Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2016]
  • Residue Arithmetic Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2016]
  • Residue Number System Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2016]
S
  • Secret Sharing Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Single-Supply Level Converter FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Stone-Age Ecosystem Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2016]
T
  • Transition Probability Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2016]
  • Trojan Detection Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2016]
  • Two-Stage Method A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2016]
  • Two-Stage Operational Amplifier A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2016]
W
  • Well-Separated Pair Decomposition Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
  • Wireless Sensor Network A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2016]
  • Worst-Case Analysis A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]