Computers & Electrical Engineering

Papers
(The TQCC of Computers & Electrical Engineering is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Anti-occlusion face recognition algorithm based on a deep convolutional neural network294
Low power design methodology in quantum-dot cellular automata277
Guest editorial: Introduction to the special section on recent advances and challenges in quantum-dot cellular automata (VSI-QCA)172
Autonomous prediction of Type 2 Diabetes with high impact of glucose level169
Distributed subgraph query for RDF graph data based on MapReduce168
Editorial Board154
An efficient optimization approach with mobility management for enhanced QoS and secure communication in flying adhoc networks138
Opposition African vultures optimization based NFOPID controller for frequency stabilization of multi-microgrid network134
A new two-stage wire rope leakage signal noise reduction method126
Devising a hybrid approach for near real-time DDoS detection in IoT123
From interpretation to explanation: An analytical examination of deep neural network with linguistic rule-based model112
Power loss reduction and voltage enhancement via distributed photovoltaic generation: Case study in North Cyprus107
A cross-scale framework for low-light image enhancement using spatial–spectral information106
IoT-powered deep learning brain network for assisting quadriplegic people106
Performance analysis of the dynamic trust model algorithm using the fuzzy inference system for access control105
Neutral-point voltage control of the three-level inverter in permanent magnet synchronous motor based direct-drive belt conveyor102
A fault ride-through strategy for accurate energy optimization of offshore wind VSC HVDC system without improved fault ride-through strategy of wind turbines98
Servo motor sliding mode control based on fuzzy power index method95
Multi-oriented scene text detection by fixed-width multi-ratio rotation anchors91
Automated training of location-specific edge models for traffic counting90
Object extraction from image with big size based on bilateral grid89
A lightweight-X-authentication protocol over automotive gateway85
An adaptive bilateral impedance control based on nonlinear disturbance observer for different flexible targets grasping84
A lightweight temporal attention-based convolution neural network for driver's activity recognition in edge82
Cascaded multi-3D-view fusion for 3D-oriented object detection81
Mixture lightweight transformer for scene understanding80
VTion-PatchTST: Elevated PatchTST model for network security situation prediction79
Malaria parasite detection using deep learning algorithms based on (CNNs) technique77
The coupled Kaplan–Yorke-Logistic map for the image encryption applications76
BlockGuard: Advancing digital copyright integrity with blockchain technique75
Open-set security authentication: A novel CAN-bus recognition algorithm based on metric learning75
FIDO-enabled universal authenticator with Web usability and privacy preservation74
Robust load frequency control in interval power systems via reduced-order generalized active disturbance rejection control74
LHTAM: Low-power and high-speed approximate multiplier for tiny inexact computing systems74
Enhancing voltage stability in photovoltaic and wind micro grids with a hybrid optimization approach72
Editorial Board72
An IDBO-optimized CNN-BiLSTM model for load forecasting in regional integrated energy systems70
Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm70
A novel prediction method for vulnerability outbreak trend70
Distribution network forecasting and expansion planning with optimal location and sizing of solar photovoltaic-based distributed generation68
Extraction and analysis algorithms for Sanxingdui cultural relics based on hyperspectral imaging66
Operator-centric joystick mapping for intuitive manual operation of differential drive robots65
Remote reconfiguration of FPGA-based wireless sensor nodes for flexible Internet of Things☆65
Non-bias self-attention learning for weakly supervised semantic segmentation65
A multi-perturbation consistency framework for semi-supervised person re-identification64
Route recommendation based on temporal–spatial metric64
Deep learning-based risk management of financial market in smart grid64
A coloring and timing brain-computer interface for the nursing bed robot64
Deep learning techniques for securing cyber-physical systems in supply chain 4.064
Power management strategy based on Elman neural network for grid-connected photovoltaic-wind-battery hybrid system64
Evaluating sustainable wind energy sources with multiple criteria decision-making (MCDM) techniques63
An optimization-based EVA-VCAS for effective voltage sag management63
Inverter Open Circuit fault diagnosis method based on ISMO for Improved Efficiency63
An optimized ensemble classifier for mammographic mass classification62
Highly accurate map construction and deep Q-network for autonomous driving and smart transportation62
Modeling and control design for half electric vehicle with wheel BLDC actuator and Pacejka's tire62
Intelligent deep learning-enabled autonomous small ship detection and classification model61
Quantum-dot cellular automata based design of multifunction binary right shifter circuit61
Emotion-aware mobile edge computing system: A case study60
A current-based algorithm for one-end fault location in series capacitor compensated double-circuit transmission lines60
A short-term traffic flow prediction method based on spatial–temporal correlation using edge computing59
Measurement framework for the consistent and fast measurement of conducted grid emissions in the 9-500 kHz range59
Frequency response models and control in smart power systems with high penetration of renewable energy sources59
Low-light robust face super resolution via morphological transformation based locality-constrained representation59
MOOC dropout prediction using a fusion deep model based on behaviour features57
Technical assessment framework for cost-sharing agreements in transactive energy systems57
Time series analysis and anomaly detection for trustworthy smart homes56
Indoor localization by projecting magnetic field signals onto images with vision transformer56
HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection56
Galactic swarm optimization with deep transfer learning driven colorectal cancer classification for image guided intervention56
IoT-based disease prediction using machine learning56
A new voltage sensitivity-based distributed feedback online optimization for voltage control in active distribution networks55
Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments54
An advanced approach for cloud enabled energy efficient ventilation control of multiple main fans in underground coal mines54
STI-TP: A Spatio-temporal interleaved model for multi-modal trajectory prediction of heterogeneous traffic agents54
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles53
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface53
Supraharmonic estimation by polyphase DFT filter bank53
A comprehensive intrusion detection framework using boosting algorithms53
Efficient prediction of coronary artery disease using machine learning algorithms with feature selection techniques53
Resnet-based modified red deer optimization with DLCNN classifier for plant disease identification and classification52
Leveraging MPPT capability for solar irradiance estimation: H-INC-IBS-based assessment of explicit models under real-world climatic conditions51
A machine learning-based adaptive heuristic for vessel scheduling problem under uncertainty via chance-constrained programming50
Scalable COVID-19 classification using map reduce framework and deep learning enabled hunter Jaya African vultures optimization50
Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks50
Intelligent algorithms for incident detection and management in smart transportation systems49
Obstacle detection and tracking for intelligent agricultural machinery49
ISAFusionNet: Involution and soft attention based deep multi-modal fusion network for multi-label skin lesion classification49
Modified deep attractor neural networks for variability compensation in recognition tasks48
Design of mobile robot navigation controller using neuro-fuzzy logic system48
Task prediction on tablet based deep learning method48
An efficient diagnosis of heart disease using optimized cross-layer Densenet121 pyramid mutual attention network48
Artificial intelligence-based smart agricultural systems for saffron cultivation with integration of Unmanned Aerial Vehicle imagery and deep learning approaches47
Editorial Board47
Integrated energy storage systems with the Jordanian electrical power grid47
Introduction To The Special Section On Autonomic Computing And Its Applications for self organizing networks (VSI-acson)47
Energy and delay aware routing model for smart crop monitoring application using internet of things46
A brain-like navigation method inspired by the spatial cells’ cognitive mechanism46
Multi-modal graph reasoning for structured video text extraction46
Editorial Board45
Joint detection and localization of False Data Injection Attacks in smart grids: An enhanced state estimation approach45
A heterogeneous graph neural recommendation model with hierarchical social trust45
ANFIS-SA-based design of a hybrid reconfigurable antenna for l-Band, C-band, 5G and ISM band applications44
Estimating Botnet Impact on IoT/IoE networks using Traffic flow Features44
EcoWatch: Region of interest-based multi-quantization resource-efficient framework for migratory bird surveillance using wireless sensor networks and environmental context awareness44
Locally enhanced denoising self-attention networks and decoupled position encoding for sequential recommendation44
Multiclass vulnerability and clone detection in Ethereum smart contracts using Block-wise Abstract Syntax Tree based Federated Graph Neural Networks44
Spatio-temporal photovoltaic prediction via a convolutional based hybrid network43
A novel pairing free certificateless aggregate signcryption scheme for IoMT43
Effective phase utilization and efficiency improvement of high power interleaved DC–DC converter using modified rotating phase shedding control42
Xray-Net: Self-supervised pixel stretching approach to improve low-contrast medical imaging42
Memristor-based in-memory processor for high precision semantic text classification42
SCHEISB: Design of a high efficiency IoMT security model based on sharded chains using bio-inspired optimizations42
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model42
Secure lightweight digital twin (DT) technology for seamless wireless communication in vehicular ad hoc network42
Design of novel differential power processing scheme for small-scale PV array application operating under partial shading conditions: modelling and experimental validation41
A flexible and privacy-preserving federated learning framework based on logistic regression41
The sound of intrusion: A novel network intrusion detection system41
Unsupervised domain adaptation through adversarial enhancement and gradient discrepancy minimization40
Nonlinear integral backstepping control based on particle swarm optimization for a grid-connected variable wind energy conversion system during voltage dips40
Efficient and lightweight protocol for anti-jamming communications in wireless body area networks40
Adopting effective hierarchal IoMTs computing with K-efficient clustering to control and forecast COVID-19 cases40
A novel hybrid machine learning algorithm for detection in smart cities40
3D placement of UAVs with optimal beamforming for multi-user communications39
Secure deduplication for big data with efficient dynamic ownership updates39
Optimal heterogeneous domain adaptation for text classification in transfer learning39
Benchmarking feed-forward randomized neural networks for vessel trajectory prediction39
Mitigation of electric field near overhead transmission lines using electromechanical compensation based on genetic algorithm39
A novel Distributed Denial of Service attack defense scheme for Software-Defined Networking using Packet-In message and frequency domain analysis39
A hybrid BERT-CPSO model for multi-class depression detection using pure hindi and hinglish multimodal data on social media39
Realtime single-stage instance segmentation network based on anchors38
An improved method for image de-blurring based on a multi-scale neural network38
SDN-assisted technique for traffic control and information execution in vehicular adhoc networks38
Prediction of wind farm reactive power fast variations by adaptive one-dimensional convolutional neural network38
Modal-aware prompt tuning with deep adaptive feature enhancement38
Combining hybrid metaheuristic algorithms and reinforcement learning to improve the optimal control of nonlinear continuous-time systems with input constraints38
Handwritten keyword spotting using deep neural networks and certainty prediction38
Generic Edge Computing System for Optimization and Computation Offloading of Unmanned Aerial Vehicle38
C3E: A framework for chart classification and content extraction38
Quick detection of product quality based on clustering hypersphere model38
A synergistic reinforcement learning-based framework design in driving automation38
Performance evaluation method for different clustering techniques37
RestormGAN: Restormer with generative facial prior towards real-world blind face restoration37
Quantum inspired meta-heuristic approach for optimization of genetic algorithm37
Load frequency control based on reinforcement learning for microgrids under false data attacks37
MIMO auto-regressive modeling-based generalized predictive control for grid-connected hybrid systems37
Integrating individualised and similar group in knowledge tracing37
No-reference quality assessment for underwater images36
A Q-learning-based hierarchical routing protocol in underwater acoustic sensor networks36
A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques36
An improved YOLOv5-based approach to soybean phenotype information perception36
Multi-type energy conversion for managing the consumption by enhancing the resiliency of electrical distribution networks36
An efficient consortium blockchain privacy protection scheme based on group signatures and bulletproofs36
Quasi-Z-source on-board charger based on reducing the size of the DC-Side active power buffer for electric vehicle applications36
Market power assessment in electricity markets based on social network analysis36
Design, analysis and implementation of electronically interfaced photovoltaic system using ARM Cortex-M4 microcontroller36
Distance learning quality assessment of universities based on interval monotonic decision tree algorithm36
Hybrid Optimization Algorithm for VM Migration in Cloud Computing36
Studies on energy efficient techniques for agricultural monitoring by wireless sensor networks35
Digital twins and artificial intelligence in transportation infrastructure: Classification, application, and future research directions35
Multivariate variational mode decomposition & phase space reconstruction based motor imagery EEG classification35
A reliability framework for NB-IoT devices: Addressing transient faults and silent data corruptions35
An ensemble learning model for hardware Trojan detection in integrated circuit design35
Golden ratio based deep fake video detection system with fusion of capsule networks35
Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition35
A short-term wind power prediction approach based on ensemble empirical mode decomposition and improved long short-term memory35
A routing approach based on combination of gray wolf clustering and fuzzy clustering and using multi-criteria decision making approaches for WSN-IoT34
Optimization driven model and segmentation network for skin cancer detection34
Development of secure Internet of Vehicle Things (IoVT) for smart transportation system34
Secure Frequency Regulation of Electric Vehicle-connected Microgrid System under Multiple Latency Attacks34
Fault diagnosis of mine asynchronous motor based on MEEMD energy entropy and ANN33
Single and multi-threaded power flow algorithm for integrated transmission-distribution-residential networks33
Intelligent transportation system for internet of vehicles based vehicular networks for smart cities33
Blockchain-enabled distributed learning for enhanced smart grid security and efficiency33
CorrFormer: Context-aware tracking with cross-correlation and transformer33
Novel Enhanced-Grey Wolf Optimization hybrid machine learning technique for biomedical data computation33
BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing32
Study and investigate perceptions of Jordanian college students on the golden ratio proportions32
Customized deep neural network model for autonomous and efficient surveillance of wildlife in national parks32
Hybrid ant colony and intelligent water drop algorithm for route planning of unmanned aerial vehicles32
Effective scheduling mechanism for a mixture of 5G multimedia use cases32
Semi-supervised cross-modal retrieval with graph-based semantic alignment network32
A multilevel network-assisted congestion feedback mechanism for network congestion control32
A gradient deconvolutional network for side-channel attacks32
Extendable multilevel inverter for renewable energy sources with fuzzy-PI controller for single phase induction motors32
A semidefinite relaxation approach for the offloading problem in edge computing31
Convolutional neural network and sensor fusion for obstacle classification in the context of powered prosthetic leg applications31
LPCHISEL: Automatic power intent generation for a chisel-based ASIC design31
HAREDNet: A deep learning based architecture for autonomous video surveillance by recognizing human actions31
High-performance front end PFC controller design for light electric vehicle charger application31
User financial credit analysis for blockchain regulation31
Fault diagnosis of planetary gearboxes under variable operating conditions based on AWM-TCN31
Reconfigurable and hardware efficient adaptive quantization model-based accelerator for binarized neural network31
Efficient implementation of post quantum MLWR-based PKE scheme using NTT31
A visual cortex-inspired edge neuromorphic hardware architecture with on-chip multi-layer STDP learning31
ADCAS: Adversarial Deep Clustering of Android Streams30
Editorial Board30
Visual analysis of action using machine learning and distributed expectation-maximization algorithm30
Expanding the wrench feasible workspace of quadrotor-based mobile cable-driven parallel manipulators using multi-objective optimization and machine learning30
Two-stage computing offloading algorithm in cloud-edge collaborative scenarios based on game theory30
Modeling Drosophila vision neural pathways to detect weak moving targets from cluttered backgrounds30
Special Section on Resiliency techniques in cloud computing infrastructures and applications30
Design of cross-cultural teaching management system for international students based on cloud service platform30
Introduction to the special section on security and privacy in IoT and cloud (VSI-spiot)30
Adaptive few-shot learning with a fair priori distribution30
Cluster-based attacks prevention algorithm for autonomous vehicles using machine learning algorithms30
Introduction to the special section on developments in renewable energy generation and automation29
Unsupervised virtual view synthesis from monocular video with generative adversarial warping29
Global and local geometric constrained feature matching for high resolution remote sensing images29
LMCodec2: Ultra-low bit rate codec with causal multiple transformers29
Single-branch self-supervised learning with hybrid tasks29
A novel symmetric cryptographic method to design block complexity for data security29
A game theory approach for smart traffic management29
Resource-aware deep learning models for beyond-wave-length positioning accuracy in massive MIMO architecture29
Performance analysis of video data transmission for telemedicine applications with 5G enabled Internet of Things29
A hybrid Fifth Generation based approaches on extracting and analyzing customer requirement through online mode in healthcare industry28
A double-compression method for searchable network packets in network forensics and analysis28
Hierarchical integrated energy system management considering energy market, demand response and uncertainties: A robust optimization approach28
Texture and quality analysis for face spoofing detection28
MPPT controller improvement for a PEM fuel cell system based on Gaussian Process Regression with a digital twin28
Hybrid twin attention based convolutional stacked sparse autoencoder for classification of defected weld images28
A novel Laplacian vector directional filter designed for real-time removal of impulsive noise from color images28
Face recognition framework based on effective computing and adversarial neural network and its implementation in machine vision for social robots28
DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN28
Optimization of sensor selection problem in IoT systems using opposition-based learning in many-objective evolutionary algorithms28
Heuristic deep learning scheduling in cloud for resource-intensive internet of things systems28
Multi-label disaster text classification via supervised contrastive learning for social media data28
Study on eye-gaze input interface based on deep learning using images obtained by multiple cameras28
A robust unified spoofing audio detection scheme28
EfficientNet and multi-path convolution with multi-head attention network for brain tumor grade classification28
How rationals boost textual entailment modeling: Insights from large language models28
Trapezoidal reference-based single carrier pulse width modulation method for multilevel converters with novel FPGA implementation28
Joint multi-subspace feature learning with singular value decomposition for robust single-sample face recognition28
Feature mixing and self-training for source-free active domain adaptation27
Optimizing the LoRa network performance for industrial scenario using a machine learning approach27
A review on federated learning towards image processing27
K-nearest neighbour-based smart contract for internet of medical things security using blockchain27
A non-isolated buck-boost converter based on SEPIC topology for renewable energy applications27
A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation27
Human machine interaction-assisted smart educational system for rural children27
Developing a time-series speed prediction model using Transformer networks for freeway interchange areas27
Optimal LCL-filter design for a single-phase grid-connected inverter using metaheuristic algorithms27
A cooperation and decision-making framework in dynamic confrontation for multi-agent systems27
Bi-level planning and scheduling of electric vehicle charging stations for peak shaving and congestion management in low voltage distribution networks27
PTSRDet: End-to-End Super-Resolution and object-detection approach for small defect detection of power transmission lines27
Hyper spectral image classifications for monitoring harvests in agriculture using fly optimization algorithm26
Research on the core competitiveness of smart phone human-computer interaction26
Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 10820526
A dynamic analysis of UAV -based IoT networks for efficient communication using falcon optimization approach26
Conceptual metaphor quantum correlation and radial basis extreme learning for predicting chronic kidney disease26
0.06983494758606