


default search action
Computers & Electrical Engineering, Volume 77
Volume 77, July 2019
- Djalal Hedjazi

, Fateh Layachi, Djallel Eddine Boubiche
:
A multi-agent system for distributed maintenance scheduling. 1-11
- Shivi Garg

, Niyati Baliyan:
A novel parallel classifier scheme for vulnerability detection in Android. 12-26
- Borut Zalik, Krista Rizman Zalik, Eva Zupancic, Niko Lukac

, Mitja Zalik, Domen Mongus
:
Chain code compression with modified interpolative coding. 27-36 - Tomas Skovranek

, Vladimir Despotovic
, Zoran Peric
:
Two-dimensional fractional linear prediction. 37-46 - Kyoungsoo Bok, Chunghui Lee, Jaesoo Yoo

:
Recommending similar users using moving patterns in mobile social networks. 47-60 - Natal Henrique Cordeiro

, Emerson Carlos Pedrino:
A new methodology applied to dynamic object detection and tracking systems for visually impaired people. 61-71 - Hemant Ahuja

, Pawan Kumar
:
A novel approach for coordinated operation of variable speed wind energy conversion in smart grid applications. 72-87 - Eduardo Camponogara

, Laio Oriel Seman
, Luiz Carlos Gili:
Mixed-integer bilinear and piecewise-linear models for designing switching strategies of multilevel power converters. 88-108
- M. Safdar Munir, Imran Sarwar Bajwa

, Sehrish Munawar Cheema
:
An intelligent and secure smart watering system using fuzzy logic and blockchain. 109-119
- Meng Xi, Nie Lingyu, Song Jiapeng:

Big data-based prediction of terrorist attacks. 120-127
- Hadi Nobahari

, Saeed Nasrollahi:
A terminal guidance algorithm based on ant colony optimization. 128-146
- Biji Nair

, Somasundaram Mary Saira Bhanu:
Overload prediction and avoidance for maintaining optimal working condition in a fog node. 147-162
- Christoforos Ntantogian

, Eleni Veroni
, Georgios Karopoulos, Christos Xenakis
:
A survey of voice and communication protection solutions against wiretapping. 163-178 - Ce Pang, Ganlin Shan:

Risk-based sensor scheduling for target detection. 179-190 - Mohammad Javad Kalani

, Mehdi Salay Naderi
, Gevork B. Gharehpetian
:
Power consumption control of LEDs considering their specific characteristics and ambient temperature variations. 191-204 - Samane Firouzi, Sepehr Tabrizchi

, Fazel Sharifi
, Abdel-Hameed A. Badawy:
High performance, variation-tolerant CNFET ternary full adder a process, voltage, and temperature variation-resilient design. 205-216
- Manoj Kumar Mishra

, Niranjan Kumar Ray, Amulya Ratna Swain, Ganga Bishnu Mund, Bhabani Shankar Prasad Mishra
:
An adaptive model for resource selection and allocation in fog computing environment. 217-229
- K. Shankar

, S. K. Lakshmanaprabu, Ashish Khanna
, Sudeep Tanwar
, Joel J. P. C. Rodrigues
, Nihar Ranjan Roy
:
Alzheimer detection using Group Grey Wolf Optimization based features with convolutional classifier. 230-243
- Xiaodong Sun

, Kaikai Diao
, Zebin Yang:
Performance improvement of a switched reluctance machine with segmental rotors for hybrid electric vehicles. 244-259
- Binbin Yong, Xin Liu

, Qingchen Yu, Liang Huang, Qingguo Zhou:
Malicious Web traffic detection for Internet of Things environments. 260-272 - Andrew Tzer-Yeu Chen

, Morteza Biglari-Abhari, Kevin I-Kai Wang
:
Investigating fast re-identification for multi-camera indoor person tracking. 273-288 - Wenjie Cai, Yufeng Wang, Ruheng Lv, Qun Jin

:
An efficient location recommendation scheme based on clustering and data fusion. 289-299 - Xiaoming Li

, Guanquan Xu, Litao Jiao, Yinan Zhou, Wei Yu:
Multi-layer network community detection model based on attributes and social interaction intensity. 300-313 - Ayman Noor, Karan Mitra, Ellis Solaiman, Arthur Souza, Devki Nandan Jha, Umit Demirbaga

, Prem Prakash Jayaraman
, Nélio Cacho
, Rajiv Ranjan:
Cyber-physical application monitoring across multiple clouds. 314-324
- V. Vanitha

, P. Krishnan, R. Elakkiya
:
Collaborative optimization algorithm for learning path construction in E-learning. 325-338
- Liang Liu, Jingxiu Yang, Weizhi Meng

:
Detecting malicious nodes via gradient descent and support vector machine in Internet of Things. 339-353
- Dhanya Sreedharan, Varghese Paul, Rani Thottungal

:
Mathematical modelling of polymer electrolyte membrane fuel cell and fuzzy-based intelligent controllers for performance enhancement. 354-365
- Jungho Kang

, Sejun Jang, Shuyu Li, Young-Sik Jeong, Yunsick Sung:
Long short-term memory-based Malware classification method for information security. 366-375 - Xiwen Zhang, Hui Jiang:

Application of Copula function in financial risk analysis. 376-388
- Samir Elmougy

, Laura Pezza, Luca G. Tallini, Abdullah Al-Dhelaan, Bella Bose:
Diversity Combining Type I-Hybrid ARQ protocol over m-ary Asymmetric Varshamov channels. 389-397 - Shengyu Lu

, Beizhan Wang, Hongji Wang, Lihao Chen, Ma Linjian, Xiaoyan Zhang:
A real-time object detection algorithm for video. 398-408
- Chaker Abdelaziz Kerrache, Safdar Hussain Bouk

, Rasheed Hussain
, Syed Hassan Ahmed
:
Introduction to the Special Section on Recent Advancements in Flying ad hoc Networks. 409-411
- Guanglong Du, Corrado Guarino Lo Bianco

, Jing Qin
:
Introduction to the Special Section on Human-Computer Interaction and Robotics. 412-413
- Pawan Kumar

, Srete Nikolovski, Ikbal Ali
:
Introduction to the Special Section on Innovative Technologies for Microgrid and Smart-grid Systems. 414-415
- Reza Akbar, Farshad Safaei, Ehsan Khodadad:

Corrigendum to 'A novel adaptive congestion-aware and load-balanced routing algorithm in networks-on-chip' [Computers & Electrical Engineering, 71 (2018) 60-76]. 416
- Victor Hugo C. de Albuquerque, Deepak Gupta

, Alkinoos Athanasiou
:
Special Section on Computational Methods in Neuroscience - Challenges and Future Trends. 417-419
- Deepak Puthal, Suraj Sharma

:
Introduction to the Special Section on Secure and Scalable Fog/Edge Computing. 420-422
- Ravinder Kaur

, Mamta Juneja
, Arup Kumar Mandal:
Computer-aided diagnosis of renal lesions in CT images: A comprehensive survey and future prospects. 423-434
- Mário W. L. Moreira

, Joel J. P. C. Rodrigues
, Vasco Furtado
, Neeraj Kumar
, Valery V. Korotaev:
Averaged one-dependence estimators on edge devices for smart pregnancy data analysis. 435-444
- Xinxin Zhang, Zhigang Hu, Meiguang Zheng, Jia Li, Liu Yang:

A novel cloud model based data placement strategy for data-intensive application in clouds. 445-456
- Erfan Babaee Tirkolaee

, Mehdi Alinaghian, Ali Asghar Rahmani Hosseinabadi
, Mani Bakhshi Sasi, Arun Kumar Sangaiah
:
An improved ant colony optimization for the multi-trip Capacitated Arc Routing Problem. 457-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














