


default search action
Computers & Electrical Engineering, Volume 77
Volume 77, July 2019
- Djalal Hedjazi, Fateh Layachi, Djallel Eddine Boubiche
:
A multi-agent system for distributed maintenance scheduling. 1-11
- Shivi Garg
, Niyati Baliyan:
A novel parallel classifier scheme for vulnerability detection in Android. 12-26
- Borut Zalik, Krista Rizman Zalik, Eva Zupancic, Niko Lukac
, Mitja Zalik, Domen Mongus
:
Chain code compression with modified interpolative coding. 27-36 - Tomas Skovranek
, Vladimir Despotovic
, Zoran Peric
:
Two-dimensional fractional linear prediction. 37-46 - Kyoungsoo Bok, Chunghui Lee, Jaesoo Yoo
:
Recommending similar users using moving patterns in mobile social networks. 47-60 - Natal Henrique Cordeiro
, Emerson Carlos Pedrino:
A new methodology applied to dynamic object detection and tracking systems for visually impaired people. 61-71 - Hemant Ahuja
, Pawan Kumar
:
A novel approach for coordinated operation of variable speed wind energy conversion in smart grid applications. 72-87 - Eduardo Camponogara
, Laio Oriel Seman
, Luiz Carlos Gili:
Mixed-integer bilinear and piecewise-linear models for designing switching strategies of multilevel power converters. 88-108
- M. Safdar Munir, Imran Sarwar Bajwa
, Sehrish Munawar Cheema
:
An intelligent and secure smart watering system using fuzzy logic and blockchain. 109-119
- Meng Xi, Nie Lingyu, Song Jiapeng:
Big data-based prediction of terrorist attacks. 120-127
- Hadi Nobahari
, Saeed Nasrollahi:
A terminal guidance algorithm based on ant colony optimization. 128-146
- Biji Nair
, Somasundaram Mary Saira Bhanu:
Overload prediction and avoidance for maintaining optimal working condition in a fog node. 147-162
- Christoforos Ntantogian, Eleni Veroni
, Georgios Karopoulos, Christos Xenakis
:
A survey of voice and communication protection solutions against wiretapping. 163-178 - Ce Pang, Ganlin Shan:
Risk-based sensor scheduling for target detection. 179-190 - Mohammad Javad Kalani
, Mehdi Salay Naderi
, Gevork B. Gharehpetian
:
Power consumption control of LEDs considering their specific characteristics and ambient temperature variations. 191-204 - Samane Firouzi, Sepehr Tabrizchi
, Fazel Sharifi
, Abdel-Hameed A. Badawy:
High performance, variation-tolerant CNFET ternary full adder a process, voltage, and temperature variation-resilient design. 205-216
- Manoj Kumar Mishra
, Niranjan Kumar Ray, Amulya Ratna Swain, Ganga Bishnu Mund, Bhabani Shankar Prasad Mishra
:
An adaptive model for resource selection and allocation in fog computing environment. 217-229
- K. Shankar
, S. K. Lakshmanaprabu, Ashish Khanna
, Sudeep Tanwar
, Joel J. P. C. Rodrigues
, Nihar Ranjan Roy
:
Alzheimer detection using Group Grey Wolf Optimization based features with convolutional classifier. 230-243
- Xiaodong Sun
, Kaikai Diao
, Zebin Yang:
Performance improvement of a switched reluctance machine with segmental rotors for hybrid electric vehicles. 244-259
- Binbin Yong, Xin Liu
, Qingchen Yu, Liang Huang, Qingguo Zhou:
Malicious Web traffic detection for Internet of Things environments. 260-272 - Andrew Tzer-Yeu Chen
, Morteza Biglari-Abhari, Kevin I-Kai Wang
:
Investigating fast re-identification for multi-camera indoor person tracking. 273-288 - Wenjie Cai, Yufeng Wang, Ruheng Lv, Qun Jin
:
An efficient location recommendation scheme based on clustering and data fusion. 289-299 - Xiaoming Li
, Guanquan Xu, Litao Jiao, Yinan Zhou, Wei Yu:
Multi-layer network community detection model based on attributes and social interaction intensity. 300-313 - Ayman Noor, Karan Mitra, Ellis Solaiman, Arthur Souza, Devki Nandan Jha, Umit Demirbaga
, Prem Prakash Jayaraman
, Nélio Cacho
, Rajiv Ranjan:
Cyber-physical application monitoring across multiple clouds. 314-324
- V. Vanitha
, P. Krishnan, R. Elakkiya
:
Collaborative optimization algorithm for learning path construction in E-learning. 325-338
- Liang Liu, Jingxiu Yang, Weizhi Meng
:
Detecting malicious nodes via gradient descent and support vector machine in Internet of Things. 339-353
- Dhanya Sreedharan, Varghese Paul, Rani Thottungal
:
Mathematical modelling of polymer electrolyte membrane fuel cell and fuzzy-based intelligent controllers for performance enhancement. 354-365
- Jungho Kang
, Sejun Jang, Shuyu Li, Young-Sik Jeong, Yunsick Sung:
Long short-term memory-based Malware classification method for information security. 366-375 - Xiwen Zhang, Hui Jiang:
Application of Copula function in financial risk analysis. 376-388
- Samir Elmougy
, Laura Pezza, Luca G. Tallini, Abdullah Al-Dhelaan, Bella Bose:
Diversity Combining Type I-Hybrid ARQ protocol over m-ary Asymmetric Varshamov channels. 389-397 - Shengyu Lu, Beizhan Wang, Hongji Wang, Lihao Chen, Ma Linjian, Xiaoyan Zhang:
A real-time object detection algorithm for video. 398-408
- Chaker Abdelaziz Kerrache, Safdar Hussain Bouk
, Rasheed Hussain
, Syed Hassan Ahmed
:
Introduction to the Special Section on Recent Advancements in Flying ad hoc Networks. 409-411
- Guanglong Du, Corrado Guarino Lo Bianco
, Jing Qin
:
Introduction to the Special Section on Human-Computer Interaction and Robotics. 412-413
- Pawan Kumar
, Srete Nikolovski, Ikbal Ali
:
Introduction to the Special Section on Innovative Technologies for Microgrid and Smart-grid Systems. 414-415
- Reza Akbar, Farshad Safaei, Ehsan Khodadad:
Corrigendum to 'A novel adaptive congestion-aware and load-balanced routing algorithm in networks-on-chip' [Computers & Electrical Engineering, 71 (2018) 60-76]. 416
- Victor Hugo C. de Albuquerque, Deepak Gupta
, Alkinoos Athanasiou
:
Special Section on Computational Methods in Neuroscience - Challenges and Future Trends. 417-419
- Deepak Puthal, Suraj Sharma
:
Introduction to the Special Section on Secure and Scalable Fog/Edge Computing. 420-422
- Ravinder Kaur
, Mamta Juneja
, Arup Kumar Mandal:
Computer-aided diagnosis of renal lesions in CT images: A comprehensive survey and future prospects. 423-434
- Mário W. L. Moreira
, Joel J. P. C. Rodrigues
, Vasco Furtado
, Neeraj Kumar
, Valery V. Korotaev:
Averaged one-dependence estimators on edge devices for smart pregnancy data analysis. 435-444
- Xinxin Zhang, Zhigang Hu, Meiguang Zheng, Jia Li, Liu Yang:
A novel cloud model based data placement strategy for data-intensive application in clouds. 445-456
- Erfan Babaee Tirkolaee
, Mehdi Alinaghian, Ali Asghar Rahmani Hosseinabadi
, Mani Bakhshi Sasi, Arun Kumar Sangaiah
:
An improved ant colony optimization for the multi-trip Capacitated Arc Routing Problem. 457-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.