default search action
Computers & Electrical Engineering, Volume 71
Volume 71, October 2018
- Priyanka Singh, Partha Pratim Roy, Balasubramanian Raman:
Writer identification using texture features: A comparative study. 1-12 - Nirmala Paramanandham, Kishore Rajendiran:
Multi - focus image fusion using self - resemblance measure. 13-27 - Nalini Subramanian, Andrews Jeyaraj:
Recent security challenges in cloud computing. 28-42 - Saman Mohammadi Mohaghegh, Reza Sabbaghi-Nadooshan, Majid Mohammadi:
Designing ternary quantum-dot cellular automata logic circuits based upon an alternative model. 43-59 - Ehsan Khodadad, Reza Akbar, Farshad Safaei:
A novel adaptive congestion-aware and load-balanced routing algorithm in networks-on-chip. 60-76 - Ashraf A. Zaher:
Duffing oscillators for secure communication. 77-92 - Chuan-Jun Su, Shi-Feng Huang:
Real-time big data analytics for hard disk drive predictive maintenance. 93-101 - Antônio Sousa Vieira de Carvalho Junior, Edson Damasceno Carvalho, Antonio Oseas de Carvalho Filho, Alcilene Dalília de Sousa, Aristófanes Corrêa Silva, Marcelo Gattass:
Automatic methods for diagnosis of glaucoma using texture descriptors based on phylogenetic diversity. 102-114 - Ch. Durga Prasad, Paresh Kumar Nayak:
Performance assessment of swarm-assisted mean error estimation-based fault detection technique for transmission line protection. 115-128 - Liu Yangxi, Zhang Xiangle:
Fuzzy self organizing map ellipse patch evaluation model for technical systems. 129-136 - Kishwer Abdul Khaliq, Syed Muddasar Raza, Omer Chughtai, Amir Qayyum, Jürgen Pannek:
Experimental validation of an accident detection and management application in vehicular environment. 137-150 - Arthur D. L. Lima, Luiz Felipe Q. Silveira, Samuel Xavier de Souza:
Spectrum sensing with a parallel algorithm for cyclostationary feature extraction. 151-161 - Danjiang Zhu, Huobin Tan, Shuzhen Yao:
Petri Nets-based method to elicit component-interaction related safety requirements in safety-critical systems. 162-172 - Önder Polat, Sema Koç Kayhan:
High-speed FPGA implementation of orthogonal matching pursuit for compressive sensing signal reconstruction. 173-190 - Mohammad H. Alshayeji, Mohammad A. Al-Rousan, Hanem Ellethy, Sa'ed Abed:
An efficient multiple sclerosis segmentation and detection system using neural networks. 191-205 - Jiming Wang, Aiqun Wang:
Data envelope analysis on capital allocation efficiency using hybrid fuzzy method. 206-211 - Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Arunkumar N., Omar Ibrahim Obaid, Salama A. Mostafa, Mustafa Musa Jaber, Burhanuddin Mohd Aboobaider, Bilal Mohammed Matar, Saif khalid abdullatif, Dheyaa Ahmed Ibrahim:
Genetic case-based reasoning for improved mobile phone faults diagnosis. 212-222 - Shaoyong Li, Yaping Liu, Zhihong Liu, Ning Hu:
Springbok: An App deployment accelerator for Android smart devices. 223-236 - Sheng-Chuan Wang, Chun-Cheng Lin, Ta-Cheng Chen, Han C. W. Hsiao:
Multi-objective competitive location problem with distance-based attractiveness for two facilities. 237-250 - Eaglekumar G. Tarpara, V. H. Patankar:
Lossless and lossy modeling of ultrasonic imaging system for immersion applications: Simulation and experimentation. 251-264 - Hyang-Won Lee, Woohyuk Chang, Bang Chul Jung:
Optimal power allocation and allowable interference shaping in cognitive radio networks. 265-272 - Ye Yu, Jun Wang, Jingting Lu, Yang Xie, Zhenxing Nie:
Vehicle logo recognition based on overlapping enhanced patterns of oriented edge magnitudes. 273-283 - Triwiyanto Triwiyanto, Oyas Wahyunggoro, Hanung Adi Nugroho, Herianto Herianto:
Muscle fatigue compensation of the electromyography signal for elbow joint angle estimation using adaptive feature. 284-293 - S. Ezhilarasi, P. T. V. Bhuvaneswari:
Region splitting-based resource partitioning to enhance throughput in long term evolution - Advanced networks. 294-308 - K. Thilagavathi, S. Sivanantham:
Two-stage low power test data compression for digital VLSI circuits. 309-320 - Eunmi Chu, Hoyoung Yoo, Bang Chul Jung:
Resource usage of LTE networks for machine-to-Machine group communications: Modeling and analysis. 321-330 - Mukul Dixit, Prasanta Kundu, Hitesh R. Jariwala:
Optimal integration of shunt capacitor banks in distribution networks for assessment of techno-economic asset. 331-345 - Alaa Tharwat, Tarek Gaber, Aboul Ella Hassanien, Mohamed Elhoseny:
Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. 346-358 - Ferroudja Zidani, Fouzi Semchedine, Marwane Ayaida:
Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. 359-371 - Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Arunkumar N., Salama A. Mostafa, Mohamad Khir Abdullah, Burhanuddin Mohd Aboobaider:
Trainable model for segmenting and identifying Nasopharyngeal carcinoma. 372-387 - Jafar Albadarneh, Yaser Jararweh, Mahmoud Al-Ayyoub, Ramon dos Reis Fontes, Mohammad Al-Smadi, Christian Esteve Rothenberg:
Cooperative mobile edge computing system for VANET-based software-defined content delivery. 388-397 - Solon Alves Peixoto, Pedro Pedrosa Rebouças Filho:
Neurologist-level classification of stroke using a Structural Co-Occurrence Matrix based on the frequency domain. 398-407 - Shanshan Dong, Chang Liu:
Performance evaluation research on social capital improving the livelihood economy in West China. 408-415 - Kavita Sharma, Brij B. Gupta:
Mitigation and risk factor analysis of android applications. 416-430 - Camila Loiola Brito Maia, Elizabeth Sucupira Furtado:
Using psychophysiological measures to estimate dimensions of emotion in hedonic experiences. 431-439 - Pedro Pedrosa Rebouças Filho, Navar Medeiros M. e Nascimento, Igor Rocha de Sousa, Cláudio Marques de Sá Medeiros, Victor Hugo C. de Albuquerque:
A reliable approach for detection of incipient faults of short-circuits in induction generators using machine learning. 440-451 - Xuebin Qin, Yizhe Zhang, Wang Mei, Gang Dong, Jun Gao, Pai Wang, Jun Deng, Hongguang Pan:
A cable fault recognition method based on a deep belief network. 452-464 - Richard Jumar, Heiko Maaß, Veit Hagenmeyer:
Comparison of lossless compression schemes for high rate electrical grid time series for smart grid monitoring and analysis. 465-476 - Ye Zhao, Ting Wang, Wen Qin, Xinghua Zhang:
Improved Rao-Blackwellised particle filter based on randomly weighted particle swarm optimization. 477-484 - Wu Xuan, Zeng Fanquan:
Design of electro-hydraulic servo loading controlling system based on fuzzy intelligent water drop fusion algorithm. 485-491 - S. Sethi, Rahul Upadhyay, Hari Shankar Singh:
Stockwell-common spatial pattern technique for motor imagery-based Brain Computer Interface design. 492-504 - Roi Herman, Binyamin Frankel, Shmuel Wimer:
Optimal queuing-based memory refreshing algorithm for energy efficient processors. 505-514 - S. Graceline Jasmine, V. Pattabiraman:
Improved pure pixel identification algorithms to determine the endmembers in hyperspectral images. 515-532 - Edwin Bojaca, John Anzola, Andrés Camilo Jiménez, Vicente García-Díaz:
A vision-based measurement model for instruments without internet connectivity. 533-545 - Sandeep Pirbhulal, Peng Shang, Wanqing Wu, Arun Kumar Sangaiah, Oluwarotimi Williams Samuel, Guanglin Li:
Fuzzy vault-based biometric security method for tele-health monitoring systems. 546-557 - Tian Sun, Lingxiang Zheng, Ao Peng, Biyu Tang, Gang Ou:
Building information aided Wi-Fi fingerprinting positioning system. 558-568 - Akshi Kumar, Himanshu Ahuja, Nikhil Kumar Singh, Deepak Gupta, Ashish Khanna, Joel J. P. C. Rodrigues:
Supported matrix factorization using distributed representations for personalised recommendations on twitter. 569-577 - Kathiresh Mayilsamy, Neelaveni Ramachandran, Vismitha Sunder Raj:
An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air. 578-593 - Seyed Morteza Nabavinejad, Maziar Goudarzi, Saeed Abedi:
MapReduce service provisioning for frequent big data jobs on clouds considering data transfers. 594-610 - Ruchika Malhotra:
An extensive analysis of search-based techniques for predicting defective classes. 611-626 - Songning Shi, Dazhi Wang:
Hybrid multilevel modelling of axial permanent magnet drivers. 627-636 - Hicham Lhachimi, Yassine Sayouti, Youssef El Kouari:
Optimal improvement of direct power control strategy based on sliding mode controllers. 637-656 - Mingwei Cao, Wei Jia, Yujie Li, Zhihan Lv, Lin Li, Liping Zheng, Xiaoping Liu:
Fast and robust local feature extraction for 3D reconstruction. 657-666 - M. Nanda Kumar, T. Shanmuganantham:
Division shaped substrate integrated waveguide slot antenna for millimeter wireless/automotive radar applications. 667-675 - Fatemeh Khodaparast, Midia Reshadi, Nader Bagherzadeh:
Application partitioning and mapping for bypass channel based NoC. 676-691 - Bhavneet Kaur, Meenakshi Sharma, Mamta Mittal, Amit Verma, Lalit Mohan Goyal, D. Jude Hemanth:
An improved salient object detection algorithm combining background and foreground connectivity for brain image analysis. 692-703 - M. Ángeles Simarro, Beatriz Puig, Francisco-Jose Martínez-Zaldívar, Alberto González:
Combined precoding for multiuser Multiple-Input Multiple-Output satellite communications. 704-713 - Qing Liu, Anfeng Liu:
On the hybrid using of unicast-broadcast in wireless sensor networks. 714-732 - Leila Chelouah, Fouzi Semchedine, Louiza Bouallouche-Medjkoune:
Localization protocols for mobile wireless sensor networks: A survey. 733-751 - Bernardo C. V. Camilo, Rodrigo S. Couto, Luís Henrique M. K. Costa:
Assessing the impacts of IPsec cryptographic algorithms on a virtual network embedding problem. 752-767 - Yin Long, Zhi Chen:
Full-duplex massive multiple input multiple output systems under hardware impairments. 768-781 - S. N. Deepa, I. Baranilingesan:
Optimized deep learning neural network predictive controller for continuous stirred tank reactor. 782-797 - Sahil Garg, Shalini Batra:
Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection. 798-817 - Marko Kos, Matej Rojc, Andrej Zgank, Zdravko Kacic, Damjan Vlaj:
A speech-based distributed architecture platform for an intelligent ambience. 818-832 - Arun Kumar Sangaiah, Oluwarotimi Williams Samuel, Xiong Li, Mohamed Abdel-Basset, Haoxiang Wang:
Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm. 833-846 - Mounir Meddah, Abderrahmane Amrouche, Abdelmalik Taleb-Ahmed:
Speech enhancement using Rao-Blackwellized particle filtering of complex DFT coefficients. 847-861 - Ching-Ta Lu, Mu-Yen Chen, Jun-Hong Shen, Ling-Ling Wang, Chih-Chan Hsu:
Removal of salt-and-pepper noise for X-ray bio-images using pixel-variation gain factors. 862-876 - Vikas Acharya, Somesh Kumar Sharma, Sunand Kumar Gupta:
Analyzing the factors in industrial automation using analytic hierarchy process. 877-886 - A. Sairam, C. Suresh Gnana Dhas:
Optimizined skyline queries over uncertain data using improved scalable framework. 887-900 - Sai Krishna Mothku, Rashmi Ranjan Rout:
Adaptive buffering using Markov Decision Process in tree-based Wireless Sensor and Actor Networks. 901-914 - D. Shamia, D. Abraham Chandy:
Intelligent system for cross-spectral and cross-distance face matching. 915-924 - H. Anandakumar, K. Umamaheswari:
A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. 925-937 - Arumugam Palanivel, Sutha Padmanabhan:
Software-based performance estimation and real-time thermal analysis of brushless direct current motor with corroded permanent magnets. 938-952 - Govinda Kumar E., Arunshankar J.:
Control of nonlinear two-tank hybrid system using sliding mode controller with fractional-order PI-D sliding surface. 953-965 - S. Maheswari, G. R. Karpagam:
Performance evaluation of semantic based service selection methods. 966-977 - Mingming Chen, Ning Wang, Haibo Zhou, Yuzhi Chen:
FCM technique for efficient intrusion detection system for wireless networks in cloud environment. 978-987 - Kaustubh Nabar, Govind R. Kadambi:
Affinity Propagation-driven Distributed clustering approach to tackle greedy heuristics in Mobile Ad-hoc Networks. 988-1011 - Khac-Hoai Nam Bui, Jason J. Jung:
Cooperative game-theoretic approach to traffic flow optimization for multiple intersections. 1012-1024 - Geng Sun, Yanheng Liu, Han Li, Aimin Wang, Shuang Liang, Ying Zhang:
A novel connectivity and coverage algorithm based on shortest path for wireless sensor networks. 1025-1039 - Joaquín García, Gregorio Martínez Pérez:
Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition). 1040-1042
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.