


default search action
Computers & Electrical Engineering, Volume 69
Volume 69, July 2018
- Ricardo Augusto Borsoi
, Julio Cesar Ceballos Aya, Guilherme Holsbach Costa
, José Carlos Moreira Bermudez
:
Super-resolution reconstruction of electrical impedance tomography images. 1-13 - Dilbag Singh
, Vijay Kumar
:
A novel dehazing model for remote sensing images. 14-27 - Bokka Krishna Chaitanya
, Anamika Yadav
:
An intelligent fault detection and classification scheme for distribution lines integrated with distributed generators. 28-40 - Aleena Swetapadma, Anamika Yadav
:
A novel single-ended fault location scheme for parallel transmission lines using k-nearest neighbor algorithm. 41-53 - Fadi Al-Turjman
:
Fog-based caching in software-defined information-centric networks. 54-67 - Talal Ashraf Butt
, Razi Iqbal
, Sayed Chhattan Shah
, Tariq Umar
:
Social Internet of Vehicles: Architecture and enabling technologies. 68-84 - Shiva Geraee, Hamed Mohammadbagherpoor, Mehdi Shafiei, Majid Valizadeh
, Farshad Montazeri, Mohammad Reza Feyzi:
Regenerative braking of electric vehicle using a modified direct torque control and adaptive control theory. 85-97 - Mahmoud Hasanloo, Mehdi Kargahi
:
Harvesting-aware charge management in embedded systems equipped with a hybrid electrical energy storage. 98-114 - Susana De León-Aldaco
, Hugo Calleja
, Jesús Aguayo
, Carlos Correa, Eligio Flores
:
Enhancement of the survival probability of a photovoltaic converter-An optimization approach. 115-128 - Kavaskar Sekar
, Nalin Kant Mohanty
:
Data mining-based high impedance fault detection using mathematical morphology. 129-141 - Ebrahim Abiri, Abdolreza Darabi, Sanaz Salem:
Design of multiple-valued logic gates using gate-diffusion input for image processing applications. 142-157 - Vladimir Despotovic
, Tomas Skovranek
, Zoran Peric
:
One-parameter fractional linear prediction. 158-170 - Amir Sharifian, Samaneh Fathi Sasansara, M. Jabbari Ghadi, Sahand Ghavidel, Li Li
, Jiangfeng Zhang
:
Dynamic performance improvement of an ultra-lift Luo DC-DC converter by using a type-2 fuzzy neural controller. 171-182 - J. M. Trejo-Arellano, J. Vazquez Castillo
, Omar Humberto Longoria-Gandara, Roberto Carrasco-Alvarez
, Carlos A. Gutiérrez
, Alejandro Castillo Atoche
:
Adaptive segmentation methodology for hardware function evaluators. 194-211 - Marwa F. Mohamed
, Mahmoud El-Gayyar, Abd El Rahman Shabayek
, Hamed M. Nassar
:
Data reduction in a cloud-based AMI framework with service-replication. 212-223 - Daniel Migault, Marcos A. Simplício Jr.
, Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade
, Tereza Cristina M. B. Carvalho
:
A framework for enabling security services collaboration across multiple domains. 224-239 - Anis Yazidi, Frederik Ung, Hårek Haugerud
, Kyrre M. Begnum:
Effective live migration of virtual machines using partitioning and affinity aware-scheduling. 240-255 - Warley Junior, Bruno Silva
, Kelvin Lopes Dias
:
A systematic mapping study on mobility mechanisms for cloud service provisioning in mobile cloud ecosystems. 256-273 - Thouraya Gouasmi
, Wajdi Louati, Ahmed Hadj Kacem:
Exact and heuristic MapReduce scheduling algorithms for cloud federation. 274-286 - Getzi Jeba Leelipushpam Paulraj
, Sharmila Anand John Francis
, J. Dinesh Peter
, Immanuel John Raja Jebadurai
:
A combined forecast-based virtual machine migration in cloud data centers. 287-300 - S. Kirthica
, Rajeswari Sridhar
:
Horizontal scaling and aggregation across heterogeneous clouds for resource provisioning. 301-316 - Bilkisu Larai Muhammad-Bello
, Masayoshi Aritsugi
:
A transparent approach to performance analysis and comparison of infrastructure as a service providers. 317-333 - Anurag Satpathy
, Sourav Kanti Addya
, Ashok Kumar Turuk
, Banshidhar Majhi, Gadadhar Sahoo
:
Crow search based virtual machine placement strategy in cloud data centers with live migration. 334-350 - K. R. Remesh Babu
, Philip Samuel:
Interference aware prediction mechanism for auto scaling in cloud. 351-363 - David A. Monge, Elina Pacini, Cristian Mateos
, Carlos García Garino:
Meta-heuristic based autoscaling of cloud-based parameter sweep experiments with unreliable virtual machines instances. 364-377 - Henrique Yoshikazu Shishido, Júlio Cezar Estrella, Claudio Fabiano Motta Toledo, Márcio da Silva Arantes:
Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds. 378-394 - Mohit Kumar
, Subhash C. Sharma:
Deadline constrained based dynamic load balancing algorithm with elasticity in cloud environment. 395-411 - Shimaa S. Ali, Abdallah Hammad, Adly S. Tag Eldien:
FastSLAM 2.0 tracking and mapping as a Cloud Robotics service. 412-421 - Zhigao Zheng
, Zunxin Zheng:
Towards an improved heuristic genetic algorithm for static content delivery in cloud storage. 422-434 - Saravana Balaji B.
, Karthikeyan N. K, Raj Kumar R. S:
Fuzzy service conceptual ontology system for cloud service recommendation. 435-446 - Gyan Singh Yadav, Aparajita Ojha:
Chaotic system-based secure data hiding scheme with high embedding capacity. 447-460 - Gaurang Panchal, Debasis Samanta:
A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security. 461-478 - Atanu Mondal, Sulata Mitra:
Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks. 479-496 - Mehran Alidoost Nia
, Antonio Ruiz-Martínez
:
Systematic literature review on the state of the art and future research work in anonymous communications systems. 497-520 - Feng Wang, Li Xu, Huaqun Wang, Zhide Chen:
Identity-based non-repudiable dynamic provable data possession in cloud storage. 521-533 - Sravani Challa, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Saru Kumari
, Muhammad Khurram Khan
, Athanasios V. Vasilakos
:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. 534-554 - Deepa Das, Susmita Das
:
An intelligent resource management scheme for SDF-based cooperative spectrum sensing in the presence of primary user emulation attack. 555-571 - Issam W. Damaj, Safaa J. Kasbah:
An analysis framework for hardware and software implementations with applications from cryptography. 572-584 - Vandana Jha
, Savitha R, P. Deepa Shenoy, K. R. Venugopal, Arun Kumar Sangaiah
:
A novel sentiment aware dictionary for multi-domain sentiment classification. 585-597 - Surya Kant
, Tripti Mahara
, Vinay Kumar Jain, Deepak Kumar Jain, Arun Kumar Sangaiah
:
LeaderRank based k-means clustering initialization method for collaborative filtering. 598-609 - Jian Sun, Siyu Sun, Ke Li, Dan Liao, Arun Kumar Sangaiah
, Victor I. Chang
:
Efficient algorithm for traffic engineering in Cloud-of-Things and edge computing. 610-627 - Anand Gachhadar, Mohammad Nour Hindia, Faizan Qamar
, M. Hassam Shakil Siddiqui, Kamarul Ariffin Noordin
, Iraj Sadegh Amiri
:
Modified genetic algorithm based power allocation scheme for amplify-and-forward cooperative relay network. 628-641 - Muthukumaran K
, K. Chitra
, C. Selvakumar:
An energy efficient clustering scheme using multilevel routing for wireless sensor network. 642-652 - Neelamadhab Padhy
, R. P. Singh, Suresh Chandra Satapathy
:
Software reusability metrics estimation: Algorithms, models and optimization techniques. 653-668 - Rushi Lan, Huadeng Wang
, Si Zhong, Zhenbing Liu, Xiaonan Luo:
An integrated scattering feature with application to medical image retrieval. 669-675 - T. C. Subramanyam, S. S. Tulasi Ram, J. B. V. Subrahmanyam:
Dual stage approach for optimal sizing and siting of fuel cell in distributed generation systems. 676-689 - Faisal Riaz, Sohail Jabbar
, Muhammad Sajid
, Mudassar Ahmad
, Muhammad Kashif Naseer, Nouman Ali
:
A collision avoidance scheme for autonomous vehicles inspired by human social norms. 690-704 - Rizk Masoud Rizk-Allah, Aboul Ella Hassanien
, Mohamed Elhoseny
:
A multi-objective transportation model under neutrosophic environment. 705-719 - Saif Nalband
, C. A. Valliappan, A. Amalin Prince
, Anita Agrawal:
Time-frequency based feature extraction for the analysis of vibroarthographic signals. 720-731 - Ting Wang, Ryad Chellai:
A novel adaptive control of a human musculoskeletal arm model. 732-739 - Zhuqing Jiao
, Zhengwang Xia, Min Cai, Ling Zou, Jianbo Xiang, Shuihua Wang
:
Hub recognition for brain functional networks by using multiple-feature combination. 740-752 - Y. Nagaraj, C. S. Asha
, Hema Sai Teja A., A. V. Narasimhadhan:
Carotid wall segmentation in longitudinal ultrasound images using structured random forest. 753-767 - Tayyab Ateeq
, Muhammad Nadeem Majeed, Syed Muhammad Anwar, Muazzam Maqsood
, Zahoor-Ur Rehman
, Jong Weon Lee
, Khan Muhammad
, Shuihua Wang
, Sung Wook Baik, Irfan Mehmood
:
Ensemble-classifiers-assisted detection of cerebral microbleeds in brain MRI. 768-781 - Justin Joseph
, R. Periyasamy:
An image driven bilateral filter with adaptive range and spatial parameters for denoising Magnetic Resonance Images. 782-795 - Yen-Ching Chang
:
A flexible contrast enhancement method with visual effects and brightness preservation: Histogram planting. 796-807 - Hsien-Cheng Lin, Yenming J. Chen
, Chia-Chen Chen, Wen-Hsien Ho:
Expectations of social networking site users who share and acquire health-related information. 808-814 - Ing-Jr Ding, Rui-Zhi Lin, Zong-Yi Lin:
Service robot system with integration of wearable Myo armband for specialized hand gesture human-computer interfaces for people with disabilities with mobility problems. 815-827 - Zahoor-Ur Rehman
, Sidra Nasim Khan, Khan Muhammad
, Jong Weon Lee, Zhihan Lv
, Sung Wook Baik
, Peer Azmat Shah
, Khalid Mahmood Awan
, Irfan Mehmood
:
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. 828-841 - YuLong Ying, Jingchao Li, Zhimin Chen, Jian Guo:
Study on rolling bearing on-line reliability analysis based on vibration information processing. 842-851 - Norhazlina Hamid, Victor I. Chang
, Robert John Walters, Gary Brian Wills
:
A Multi-core architecture for a hybrid information system. 852-864 - Xuan Chen
:
A new signal reconstruction method in compressed sensing. 865-880 - Xiaojun Bi, Tiewen Pan, Yun Lin
:
Hybrid optimization strategy of 'Network-in-Network' model for image recognition. 881-892 - He Yu
, Guohui Yang, Maoliu Lin, Fanyi Meng, Qun Wu:
Application of rough set theory for NVNA phase reference uncertainty analysis in hybrid information system. 893-906 - Jingmei Li, Qiao Tian, Guoyin Zhang, Fangyuan Zheng, Chao Lv, Jiaxiang Wang:
Research on hybrid information recognition algorithm and quality of golf swing. 907-919 - Guanglu Sun, Lili Liang, Teng Chen, Feng Xiao, Fei Lang
:
Network traffic classification based on transfer learning. 920-927

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.