


default search action
Computers & Electrical Engineering, Volume 71
Volume 71, October 2018
- Priyanka Singh

, Partha Pratim Roy
, Balasubramanian Raman:
Writer identification using texture features: A comparative study. 1-12 - Nirmala Paramanandham, Kishore Rajendiran

:
Multi - focus image fusion using self - resemblance measure. 13-27 - Nalini Subramanian, Andrews Jeyaraj:

Recent security challenges in cloud computing. 28-42 - Saman Mohammadi Mohaghegh, Reza Sabbaghi-Nadooshan, Majid Mohammadi:

Designing ternary quantum-dot cellular automata logic circuits based upon an alternative model. 43-59 - Ehsan Khodadad

, Reza Akbar, Farshad Safaei:
A novel adaptive congestion-aware and load-balanced routing algorithm in networks-on-chip. 60-76 - Ashraf A. Zaher

:
Duffing oscillators for secure communication. 77-92 - Chuan-Jun Su, Shi-Feng Huang:

Real-time big data analytics for hard disk drive predictive maintenance. 93-101 - Antônio Sousa Vieira de Carvalho Junior, Edson Damasceno Carvalho

, Antonio Oseas de Carvalho Filho, Alcilene Dalília de Sousa, Aristófanes Corrêa Silva, Marcelo Gattass:
Automatic methods for diagnosis of glaucoma using texture descriptors based on phylogenetic diversity. 102-114 - Ch. Durga Prasad, Paresh Kumar Nayak

:
Performance assessment of swarm-assisted mean error estimation-based fault detection technique for transmission line protection. 115-128 - Liu Yangxi, Zhang Xiangle:

Fuzzy self organizing map ellipse patch evaluation model for technical systems. 129-136 - Kishwer Abdul Khaliq

, Syed Muddasar Raza, Omer Chughtai
, Amir Qayyum
, Jürgen Pannek
:
Experimental validation of an accident detection and management application in vehicular environment. 137-150 - Arthur D. L. Lima

, Luiz Felipe Q. Silveira
, Samuel Xavier de Souza
:
Spectrum sensing with a parallel algorithm for cyclostationary feature extraction. 151-161 - Danjiang Zhu, Huobin Tan, Shuzhen Yao:

Petri Nets-based method to elicit component-interaction related safety requirements in safety-critical systems. 162-172 - Önder Polat

, Sema Koç Kayhan:
High-speed FPGA implementation of orthogonal matching pursuit for compressive sensing signal reconstruction. 173-190 - Mohammad H. Alshayeji

, Mohammad A. Al-Rousan, Hanem Ellethy
, Sa'ed Abed
:
An efficient multiple sclerosis segmentation and detection system using neural networks. 191-205 - Jiming Wang, Aiqun Wang:

Data envelope analysis on capital allocation efficiency using hybrid fuzzy method. 206-211 - Mazin Abed Mohammed

, Mohd Khanapi Abd Ghani, Arunkumar N.
, Omar Ibrahim Obaid
, Salama A. Mostafa
, Mustafa Musa Jaber
, Burhanuddin Mohd Aboobaider, Bilal Mohammed Matar, Saif khalid abdullatif, Dheyaa Ahmed Ibrahim:
Genetic case-based reasoning for improved mobile phone faults diagnosis. 212-222 - Shaoyong Li

, Yaping Liu, Zhihong Liu, Ning Hu:
Springbok: An App deployment accelerator for Android smart devices. 223-236 - Sheng-Chuan Wang, Chun-Cheng Lin, Ta-Cheng Chen

, Han C. W. Hsiao:
Multi-objective competitive location problem with distance-based attractiveness for two facilities. 237-250 - Eaglekumar G. Tarpara

, V. H. Patankar
:
Lossless and lossy modeling of ultrasonic imaging system for immersion applications: Simulation and experimentation. 251-264 - Hyang-Won Lee

, Woohyuk Chang, Bang Chul Jung
:
Optimal power allocation and allowable interference shaping in cognitive radio networks. 265-272 - Ye Yu, Jun Wang, Jingting Lu, Yang Xie, Zhenxing Nie:

Vehicle logo recognition based on overlapping enhanced patterns of oriented edge magnitudes. 273-283 - Triwiyanto Triwiyanto

, Oyas Wahyunggoro
, Hanung Adi Nugroho
, Herianto Herianto
:
Muscle fatigue compensation of the electromyography signal for elbow joint angle estimation using adaptive feature. 284-293 - S. Ezhilarasi, P. T. V. Bhuvaneswari:

Region splitting-based resource partitioning to enhance throughput in long term evolution - Advanced networks. 294-308 - K. Thilagavathi

, S. Sivanantham
:
Two-stage low power test data compression for digital VLSI circuits. 309-320 - Eunmi Chu

, Hoyoung Yoo
, Bang Chul Jung
:
Resource usage of LTE networks for machine-to-Machine group communications: Modeling and analysis. 321-330 - Mukul Dixit

, Prasanta Kundu, Hitesh R. Jariwala:
Optimal integration of shunt capacitor banks in distribution networks for assessment of techno-economic asset. 331-345 - Alaa Tharwat, Tarek Gaber

, Aboul Ella Hassanien
, Mohamed Elhoseny
:
Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. 346-358 - Ferroudja Zidani, Fouzi Semchedine

, Marwane Ayaida:
Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. 359-371 - Mazin Abed Mohammed

, Mohd Khanapi Abd Ghani, Arunkumar N.
, Salama A. Mostafa
, Mohamad Khir Abdullah
, Burhanuddin Mohd Aboobaider:
Trainable model for segmenting and identifying Nasopharyngeal carcinoma. 372-387 - Jafar Albadarneh, Yaser Jararweh, Mahmoud Al-Ayyoub, Ramon dos Reis Fontes

, Mohammad Al-Smadi
, Christian Esteve Rothenberg
:
Cooperative mobile edge computing system for VANET-based software-defined content delivery. 388-397 - Solon Alves Peixoto

, Pedro Pedrosa Rebouças Filho
:
Neurologist-level classification of stroke using a Structural Co-Occurrence Matrix based on the frequency domain. 398-407 - Shanshan Dong, Chang Liu:

Performance evaluation research on social capital improving the livelihood economy in West China. 408-415 - Kavita Sharma

, Brij B. Gupta
:
Mitigation and risk factor analysis of android applications. 416-430 - Camila Loiola Brito Maia, Elizabeth Sucupira Furtado

:
Using psychophysiological measures to estimate dimensions of emotion in hedonic experiences. 431-439 - Pedro Pedrosa Rebouças Filho

, Navar Medeiros M. e Nascimento
, Igor Rocha de Sousa, Cláudio Marques de Sá Medeiros, Victor Hugo C. de Albuquerque
:
A reliable approach for detection of incipient faults of short-circuits in induction generators using machine learning. 440-451 - Xuebin Qin, Yizhe Zhang, Wang Mei, Gang Dong, Jun Gao, Pai Wang, Jun Deng, Hongguang Pan:

A cable fault recognition method based on a deep belief network. 452-464 - Richard Jumar

, Heiko Maaß
, Veit Hagenmeyer:
Comparison of lossless compression schemes for high rate electrical grid time series for smart grid monitoring and analysis. 465-476 - Ye Zhao, Ting Wang, Wen Qin, Xinghua Zhang:

Improved Rao-Blackwellised particle filter based on randomly weighted particle swarm optimization. 477-484 - Wu Xuan, Zeng Fanquan:

Design of electro-hydraulic servo loading controlling system based on fuzzy intelligent water drop fusion algorithm. 485-491 - S. Sethi, Rahul Upadhyay, Hari Shankar Singh:

Stockwell-common spatial pattern technique for motor imagery-based Brain Computer Interface design. 492-504 - Roi Herman

, Binyamin Frankel
, Shmuel Wimer:
Optimal queuing-based memory refreshing algorithm for energy efficient processors. 505-514 - S. Graceline Jasmine

, V. Pattabiraman
:
Improved pure pixel identification algorithms to determine the endmembers in hyperspectral images. 515-532 - Edwin Bojaca, John Anzola

, Andrés Camilo Jiménez, Vicente García-Díaz
:
A vision-based measurement model for instruments without internet connectivity. 533-545 - Sandeep Pirbhulal

, Peng Shang, Wanqing Wu
, Arun Kumar Sangaiah
, Oluwarotimi Williams Samuel, Guanglin Li
:
Fuzzy vault-based biometric security method for tele-health monitoring systems. 546-557 - Tian Sun, Lingxiang Zheng

, Ao Peng, Biyu Tang, Gang Ou:
Building information aided Wi-Fi fingerprinting positioning system. 558-568 - Akshi Kumar

, Himanshu Ahuja, Nikhil Kumar Singh, Deepak Gupta
, Ashish Khanna
, Joel J. P. C. Rodrigues
:
Supported matrix factorization using distributed representations for personalised recommendations on twitter. 569-577 - Kathiresh Mayilsamy

, Neelaveni Ramachandran, Vismitha Sunder Raj:
An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air. 578-593 - Seyed Morteza Nabavinejad, Maziar Goudarzi, Saeed Abedi

:
MapReduce service provisioning for frequent big data jobs on clouds considering data transfers. 594-610 - Ruchika Malhotra:

An extensive analysis of search-based techniques for predicting defective classes. 611-626 - Songning Shi, Dazhi Wang:

Hybrid multilevel modelling of axial permanent magnet drivers. 627-636 - Hicham Lhachimi, Yassine Sayouti

, Youssef El Kouari
:
Optimal improvement of direct power control strategy based on sliding mode controllers. 637-656 - Mingwei Cao, Wei Jia, Yujie Li, Zhihan Lv

, Lin Li, Liping Zheng, Xiaoping Liu:
Fast and robust local feature extraction for 3D reconstruction. 657-666 - M. Nanda Kumar

, T. Shanmuganantham:
Division shaped substrate integrated waveguide slot antenna for millimeter wireless/automotive radar applications. 667-675 - Fatemeh Khodaparast, Midia Reshadi, Nader Bagherzadeh

:
Application partitioning and mapping for bypass channel based NoC. 676-691 - Bhavneet Kaur, Meenakshi Sharma, Mamta Mittal

, Amit Verma, Lalit Mohan Goyal
, D. Jude Hemanth:
An improved salient object detection algorithm combining background and foreground connectivity for brain image analysis. 692-703 - M. Ángeles Simarro

, Beatriz Puig, Francisco-Jose Martínez-Zaldívar
, Alberto González
:
Combined precoding for multiuser Multiple-Input Multiple-Output satellite communications. 704-713 - Qing Liu, Anfeng Liu

:
On the hybrid using of unicast-broadcast in wireless sensor networks. 714-732 - Leila Chelouah, Fouzi Semchedine

, Louiza Bouallouche-Medjkoune
:
Localization protocols for mobile wireless sensor networks: A survey. 733-751 - Bernardo C. V. Camilo

, Rodrigo S. Couto
, Luís Henrique M. K. Costa
:
Assessing the impacts of IPsec cryptographic algorithms on a virtual network embedding problem. 752-767 - Yin Long

, Zhi Chen:
Full-duplex massive multiple input multiple output systems under hardware impairments. 768-781 - S. N. Deepa, I. Baranilingesan:

Optimized deep learning neural network predictive controller for continuous stirred tank reactor. 782-797 - Sahil Garg, Shalini Batra:

Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection. 798-817 - Marko Kos

, Matej Rojc, Andrej Zgank
, Zdravko Kacic, Damjan Vlaj
:
A speech-based distributed architecture platform for an intelligent ambience. 818-832 - Arun Kumar Sangaiah

, Oluwarotimi Williams Samuel, Xiong Li
, Mohamed Abdel-Basset, Haoxiang Wang:
Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm. 833-846 - Mounir Meddah, Abderrahmane Amrouche, Abdelmalik Taleb-Ahmed:

Speech enhancement using Rao-Blackwellized particle filtering of complex DFT coefficients. 847-861 - Ching-Ta Lu, Mu-Yen Chen

, Jun-Hong Shen, Ling-Ling Wang, Chih-Chan Hsu
:
Removal of salt-and-pepper noise for X-ray bio-images using pixel-variation gain factors. 862-876 - Vikas Acharya

, Somesh Kumar Sharma
, Sunand Kumar Gupta:
Analyzing the factors in industrial automation using analytic hierarchy process. 877-886 - A. Sairam

, C. Suresh Gnana Dhas:
Optimizined skyline queries over uncertain data using improved scalable framework. 887-900 - Sai Krishna Mothku

, Rashmi Ranjan Rout
:
Adaptive buffering using Markov Decision Process in tree-based Wireless Sensor and Actor Networks. 901-914 - D. Shamia

, D. Abraham Chandy:
Intelligent system for cross-spectral and cross-distance face matching. 915-924 - H. Anandakumar

, K. Umamaheswari
:
A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. 925-937 - Arumugam Palanivel, Sutha Padmanabhan:

Software-based performance estimation and real-time thermal analysis of brushless direct current motor with corroded permanent magnets. 938-952 - Govinda Kumar E., Arunshankar J.

:
Control of nonlinear two-tank hybrid system using sliding mode controller with fractional-order PI-D sliding surface. 953-965 - S. Maheswari

, G. R. Karpagam:
Performance evaluation of semantic based service selection methods. 966-977 - Mingming Chen, Ning Wang, Haibo Zhou, Yuzhi Chen:

FCM technique for efficient intrusion detection system for wireless networks in cloud environment. 978-987 - Kaustubh Nabar

, Govind R. Kadambi:
Affinity Propagation-driven Distributed clustering approach to tackle greedy heuristics in Mobile Ad-hoc Networks. 988-1011 - Khac-Hoai Nam Bui

, Jason J. Jung:
Cooperative game-theoretic approach to traffic flow optimization for multiple intersections. 1012-1024 - Geng Sun

, Yanheng Liu, Han Li, Aimin Wang, Shuang Liang, Ying Zhang:
A novel connectivity and coverage algorithm based on shortest path for wireless sensor networks. 1025-1039 - Joaquín García

, Gregorio Martínez Pérez:
Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition). 1040-1042

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














