


Остановите войну!
for scientists:


default search action
Computers & Electrical Engineering, Volume 71
Volume 71, October 2018
- Priyanka Singh, Partha Pratim Roy
, Balasubramanian Raman:
Writer identification using texture features: A comparative study. 1-12 - Nirmala Paramanandham, Kishore Rajendiran
:
Multi - focus image fusion using self - resemblance measure. 13-27 - Nalini Subramanian, Andrews Jeyaraj:
Recent security challenges in cloud computing. 28-42 - Saman Mohammadi Mohaghegh, Reza Sabbaghi-Nadooshan, Majid Mohammadi:
Designing ternary quantum-dot cellular automata logic circuits based upon an alternative model. 43-59 - Ehsan Khodadad, Reza Akbar, Farshad Safaei:
A novel adaptive congestion-aware and load-balanced routing algorithm in networks-on-chip. 60-76 - Ashraf A. Zaher
:
Duffing oscillators for secure communication. 77-92 - Chuan-Jun Su, Shi-Feng Huang:
Real-time big data analytics for hard disk drive predictive maintenance. 93-101 - Antônio Sousa Vieira de Carvalho Junior, Edson Damasceno Carvalho
, Antonio Oseas de Carvalho Filho, Alcilene Dalília de Sousa, Aristófanes Corrêa Silva, Marcelo Gattass:
Automatic methods for diagnosis of glaucoma using texture descriptors based on phylogenetic diversity. 102-114 - Ch. Durga Prasad, Paresh Kumar Nayak
:
Performance assessment of swarm-assisted mean error estimation-based fault detection technique for transmission line protection. 115-128 - Liu Yangxi, Zhang Xiangle:
Fuzzy self organizing map ellipse patch evaluation model for technical systems. 129-136 - Kishwer Abdul Khaliq
, Syed Muddasar Raza, Omer Chughtai
, Amir Qayyum
, Jürgen Pannek
:
Experimental validation of an accident detection and management application in vehicular environment. 137-150 - Arthur D. L. Lima
, Luiz Felipe Q. Silveira
, Samuel Xavier de Souza
:
Spectrum sensing with a parallel algorithm for cyclostationary feature extraction. 151-161 - Danjiang Zhu, Huobin Tan, Shuzhen Yao:
Petri Nets-based method to elicit component-interaction related safety requirements in safety-critical systems. 162-172 - Önder Polat
, Sema Koç Kayhan:
High-speed FPGA implementation of orthogonal matching pursuit for compressive sensing signal reconstruction. 173-190 - Mohammad H. Alshayeji, Mohammad A. Al-Rousan, Hanem Ellethy
, Sa'ed Abed
:
An efficient multiple sclerosis segmentation and detection system using neural networks. 191-205 - Jiming Wang, Aiqun Wang:
Data envelope analysis on capital allocation efficiency using hybrid fuzzy method. 206-211 - Mazin Abed Mohammed
, Mohd Khanapi Abd Ghani, Arunkumar N.
, Omar Ibrahim Obaid
, Salama A. Mostafa
, Mustafa Musa Jaber
, Burhanuddin Mohd Aboobaider, Bilal Mohammed Matar, Saif khalid abdullatif, Dheyaa Ahmed Ibrahim:
Genetic case-based reasoning for improved mobile phone faults diagnosis. 212-222 - Shaoyong Li
, Yaping Liu, Zhihong Liu, Ning Hu:
Springbok: An App deployment accelerator for Android smart devices. 223-236 - Sheng-Chuan Wang, Chun-Cheng Lin, Ta-Cheng Chen
, Han C. W. Hsiao:
Multi-objective competitive location problem with distance-based attractiveness for two facilities. 237-250 - Eaglekumar G. Tarpara
, V. H. Patankar
:
Lossless and lossy modeling of ultrasonic imaging system for immersion applications: Simulation and experimentation. 251-264 - Hyang-Won Lee
, Woohyuk Chang, Bang Chul Jung
:
Optimal power allocation and allowable interference shaping in cognitive radio networks. 265-272 - Ye Yu, Jun Wang, Jingting Lu, Yang Xie, Zhenxing Nie:
Vehicle logo recognition based on overlapping enhanced patterns of oriented edge magnitudes. 273-283 - Triwiyanto Triwiyanto
, Oyas Wahyunggoro
, Hanung Adi Nugroho
, Herianto Herianto:
Muscle fatigue compensation of the electromyography signal for elbow joint angle estimation using adaptive feature. 284-293 - S. Ezhilarasi, P. T. V. Bhuvaneswari:
Region splitting-based resource partitioning to enhance throughput in long term evolution - Advanced networks. 294-308 - K. Thilagavathi
, S. Sivanantham
:
Two-stage low power test data compression for digital VLSI circuits. 309-320 - Eunmi Chu
, Hoyoung Yoo
, Bang Chul Jung
:
Resource usage of LTE networks for machine-to-Machine group communications: Modeling and analysis. 321-330 - Mukul Dixit, Prasanta Kundu, Hitesh R. Jariwala:
Optimal integration of shunt capacitor banks in distribution networks for assessment of techno-economic asset. 331-345 - Alaa Tharwat, Tarek Gaber
, Aboul Ella Hassanien
, Mohamed Elhoseny
:
Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. 346-358 - Ferroudja Zidani, Fouzi Semchedine, Marwane Ayaida:
Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. 359-371 - Mazin Abed Mohammed
, Mohd Khanapi Abd Ghani, Arunkumar N.
, Salama A. Mostafa
, Mohamad Khir Abdullah
, Burhanuddin Mohd Aboobaider:
Trainable model for segmenting and identifying Nasopharyngeal carcinoma. 372-387 - Jafar Albadarneh, Yaser Jararweh, Mahmoud Al-Ayyoub, Ramon dos Reis Fontes
, Mohammad Al-Smadi
, Christian Esteve Rothenberg
:
Cooperative mobile edge computing system for VANET-based software-defined content delivery. 388-397 - Solon Alves Peixoto, Pedro Pedrosa Rebouças Filho
:
Neurologist-level classification of stroke using a Structural Co-Occurrence Matrix based on the frequency domain. 398-407 - Shanshan Dong, Chang Liu:
Performance evaluation research on social capital improving the livelihood economy in West China. 408-415 - Kavita Sharma
, Brij B. Gupta:
Mitigation and risk factor analysis of android applications. 416-430 - Camila Loiola Brito Maia, Elizabeth Sucupira Furtado
:
Using psychophysiological measures to estimate dimensions of emotion in hedonic experiences. 431-439 - Pedro Pedrosa Rebouças Filho
, Navar Medeiros M. e Nascimento, Igor Rocha de Sousa, Cláudio Marques de Sá Medeiros, Victor Hugo C. de Albuquerque
:
A reliable approach for detection of incipient faults of short-circuits in induction generators using machine learning. 440-451 - Xuebin Qin, Yizhe Zhang, Wang Mei, Gang Dong, Jun Gao, Pai Wang, Jun Deng, Hongguang Pan:
A cable fault recognition method based on a deep belief network. 452-464 - Richard Jumar
, Heiko Maaß
, Veit Hagenmeyer:
Comparison of lossless compression schemes for high rate electrical grid time series for smart grid monitoring and analysis. 465-476 - Ye Zhao, Ting Wang, Wen Qin, Xinghua Zhang:
Improved Rao-Blackwellised particle filter based on randomly weighted particle swarm optimization. 477-484 - Wu Xuan, Zeng Fanquan:
Design of electro-hydraulic servo loading controlling system based on fuzzy intelligent water drop fusion algorithm. 485-491 - S. Sethi, Rahul Upadhyay, Hari Shankar Singh:
Stockwell-common spatial pattern technique for motor imagery-based Brain Computer Interface design. 492-504 - Roi Herman
, Binyamin Frankel
, Shmuel Wimer:
Optimal queuing-based memory refreshing algorithm for energy efficient processors. 505-514 - S. Graceline Jasmine
, V. Pattabiraman
:
Improved pure pixel identification algorithms to determine the endmembers in hyperspectral images. 515-532 - Edwin Bojaca, John Anzola
, Andrés Camilo Jiménez, Vicente García-Díaz
:
A vision-based measurement model for instruments without internet connectivity. 533-545 - Sandeep Pirbhulal
, Peng Shang, Wanqing Wu
, Arun Kumar Sangaiah
, Oluwarotimi Williams Samuel, Guanglin Li
:
Fuzzy vault-based biometric security method for tele-health monitoring systems. 546-557 - Tian Sun, Lingxiang Zheng
, Ao Peng, Biyu Tang, Gang Ou:
Building information aided Wi-Fi fingerprinting positioning system. 558-568 - Akshi Kumar
, Himanshu Ahuja, Nikhil Kumar Singh, Deepak Gupta
, Ashish Khanna
, Joel J. P. C. Rodrigues
:
Supported matrix factorization using distributed representations for personalised recommendations on twitter. 569-577 - Kathiresh Mayilsamy
, Neelaveni Ramachandran, Vismitha Sunder Raj:
An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air. 578-593 - Seyed Morteza Nabavinejad, Maziar Goudarzi, Saeed Abedi
:
MapReduce service provisioning for frequent big data jobs on clouds considering data transfers. 594-610 - Ruchika Malhotra:
An extensive analysis of search-based techniques for predicting defective classes. 611-626 - Songning Shi, Dazhi Wang:
Hybrid multilevel modelling of axial permanent magnet drivers. 627-636 - Hicham Lhachimi, Yassine Sayouti
, Youssef El Kouari
:
Optimal improvement of direct power control strategy based on sliding mode controllers. 637-656 - Mingwei Cao, Wei Jia, Yujie Li, Zhihan Lv
, Lin Li, Liping Zheng, Xiaoping Liu:
Fast and robust local feature extraction for 3D reconstruction. 657-666 - M. Nanda Kumar, T. Shanmuganantham:
Division shaped substrate integrated waveguide slot antenna for millimeter wireless/automotive radar applications. 667-675 - Fatemeh Khodaparast, Midia Reshadi, Nader Bagherzadeh
:
Application partitioning and mapping for bypass channel based NoC. 676-691 - Bhavneet Kaur, Meenakshi Sharma, Mamta Mittal
, Amit Verma, Lalit Mohan Goyal
, D. Jude Hemanth:
An improved salient object detection algorithm combining background and foreground connectivity for brain image analysis. 692-703 - M. Ángeles Simarro
, Beatriz Puig, Francisco-Jose Martínez-Zaldívar
, Alberto González
:
Combined precoding for multiuser Multiple-Input Multiple-Output satellite communications. 704-713 - Qing Liu, Anfeng Liu
:
On the hybrid using of unicast-broadcast in wireless sensor networks. 714-732 - Leila Chelouah, Fouzi Semchedine, Louiza Bouallouche-Medjkoune
:
Localization protocols for mobile wireless sensor networks: A survey. 733-751 - Bernardo C. V. Camilo
, Rodrigo S. Couto
, Luís Henrique M. K. Costa
:
Assessing the impacts of IPsec cryptographic algorithms on a virtual network embedding problem. 752-767 - Yin Long
, Zhi Chen:
Full-duplex massive multiple input multiple output systems under hardware impairments. 768-781 - S. N. Deepa, I. Baranilingesan:
Optimized deep learning neural network predictive controller for continuous stirred tank reactor. 782-797 - Sahil Garg, Shalini Batra:
Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection. 798-817 - Marko Kos
, Matej Rojc, Andrej Zgank
, Zdravko Kacic, Damjan Vlaj
:
A speech-based distributed architecture platform for an intelligent ambience. 818-832 - Arun Kumar Sangaiah
, Oluwarotimi Williams Samuel, Xiong Li
, Mohamed Abdel-Basset, Haoxiang Wang:
Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm. 833-846 - Mounir Meddah, Abderrahmane Amrouche, Abdelmalik Taleb-Ahmed:
Speech enhancement using Rao-Blackwellized particle filtering of complex DFT coefficients. 847-861 - Ching-Ta Lu, Mu-Yen Chen, Jun-Hong Shen, Ling-Ling Wang, Chih-Chan Hsu
:
Removal of salt-and-pepper noise for X-ray bio-images using pixel-variation gain factors. 862-876 - Vikas Acharya, Somesh Kumar Sharma, Sunand Kumar Gupta:
Analyzing the factors in industrial automation using analytic hierarchy process. 877-886 - A. Sairam
, C. Suresh Gnana Dhas:
Optimizined skyline queries over uncertain data using improved scalable framework. 887-900 - Sai Krishna Mothku
, Rashmi Ranjan Rout
:
Adaptive buffering using Markov Decision Process in tree-based Wireless Sensor and Actor Networks. 901-914 - D. Shamia
, D. Abraham Chandy:
Intelligent system for cross-spectral and cross-distance face matching. 915-924 - H. Anandakumar
, K. Umamaheswari
:
A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. 925-937 - Arumugam Palanivel, Sutha Padmanabhan:
Software-based performance estimation and real-time thermal analysis of brushless direct current motor with corroded permanent magnets. 938-952 - Govinda Kumar E., Arunshankar J.
:
Control of nonlinear two-tank hybrid system using sliding mode controller with fractional-order PI-D sliding surface. 953-965 - S. Maheswari
, G. R. Karpagam:
Performance evaluation of semantic based service selection methods. 966-977 - Mingming Chen, Ning Wang, Haibo Zhou, Yuzhi Chen:
FCM technique for efficient intrusion detection system for wireless networks in cloud environment. 978-987 - Kaustubh Nabar
, Govind R. Kadambi:
Affinity Propagation-driven Distributed clustering approach to tackle greedy heuristics in Mobile Ad-hoc Networks. 988-1011 - Khac-Hoai Nam Bui
, Jason J. Jung:
Cooperative game-theoretic approach to traffic flow optimization for multiple intersections. 1012-1024 - Geng Sun
, Yanheng Liu, Han Li, Aimin Wang, Shuang Liang, Ying Zhang:
A novel connectivity and coverage algorithm based on shortest path for wireless sensor networks. 1025-1039 - Joaquín García
, Gregorio Martínez Pérez:
Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition). 1040-1042

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.