Review of Computer Engineering Research
2014 - 2025
From Conscientia Beam Bibliographic data for series maintained by Dim Michael (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 2, 2021
- Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection pp. 27-40

- S Priya and R Manavalan
- Real-Time Car Parking System Using Arduino Control pp. 41-63

- Ahmed Raza Moshin, Maira Khalid, Muhammad Awais and Kinza Ahmad
- Automatic Gas Leakage Monitoring System Using MQ-5 Sensor pp. 64-75

- Muhammad Ahmad Baballe, Usman Yusuf Magashi, Bello Ibrahim Garko, Abubakar Abdullahi Umar, Yunusa Rabiu Magaji and Munzali Surajo
- A Simple and Effective Methodology for Generating Bounded Solutions for the Set K-Covering and Set Variable K-Covering Problems: A Guide for or Practitioners pp. 76-95

- Bryan McNally, Yun Lu, Emre Shively-Ertas, Myung Soon Song and Francis J Vasko
- A Smart Shelf Design for Retail Store Real Time Inventory Management Automation pp. 96-102

- Ozgur Tamer and Tunca Koklu
Volume 8, issue 1, 2021
- Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio pp. 1-7

- Muhammad Owais Raza, Nazia Pathan, Aqsa Umar and Raheem Bux
- Developing a Software Application for the Study and Learning of Linear a Script pp. 8-13

- Argyro Mavridaki, Eleni Galiotou and Evangelos C Papakitsos
- Detection of Crossed Walls Security Alarm System against Invasion pp. 14-26

- Muhammad Ahmad Baballe
Volume 7, issue 2, 2020
- Investigating Factors Affecting the Adoption of Smartphone Technology by Elderly People In Iraq pp. 47-53

- Fouad Abdulameer Salman and Aziz Bin Deraman
- Quality Assessment and Monitoring of Networks Using Passive Technique pp. 54-61

- Abiola Olawale Ilori, Omoniyi Ajoke Gbadamosi and Oluwafemi Clement Adeusi
- Mobile Commerce Model Taking Advantage of a Near Field Communication (NFC) pp. 62-72

- Akinyede Raphael Olufemi, Rotimi Abiodun Boluwade, Famodimu Oluwasefunmi Busola and Balogun Temitayo Elijah
- LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel pp. 73-85

- Farrukh Arslan
- An Overview of Advances in Image Colorization Using Computer Vision and Deep Learning Techniques pp. 86-95

- Rashi Dhir, Meghna Ashok and Shilpa Gite
Volume 7, issue 1, 2020
- Exploration of Intellectual Software Systems and Development of Conceptual Model pp. 1-11

- Shafagat Mahmudova
- Cloud Security Vulnerabilities and Solution Model pp. 12-19

- Shouket Ahmad Kouchay
- Dynamic Modelling of 3-RUS Spatial Parallel Robot Manipulator pp. 20-26

- Nguyen Hong Quang, Nguyen Van Quyen, Do Trung Hai and Nguyen Nhu Hien
- Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders pp. 27-37

- Tochukwu Arinze Ikwunne and Samuel Obiora Okide
- Smart Feature Fusion and Model for Human Detection pp. 38-46

- Htet Htet Lin
Volume 6, issue 2, 2019
- Stability Analysis of Type-2 Fuzzy Process Control Using LMI pp. 57-63

- Manivasagam Rajendran and Prabhu Aruchunan
- A Review of Machine Learning Models for Software Cost Estimation pp. 64-75

- Farrukh Arslan
- Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking pp. 76-83

- Adeniji Kehinde, Awosika Olawoyin, Ajibade Adedayo and Onibonoje Moses
- A Survey on Sentiment Analysis Algorithms and Datasets pp. 84-91

- Reena G Bhati
- Intensive Patient Monitoring Using LabVIEW pp. 92-96

- Manivasagam Rajendran
Volume 6, issue 1, 2019
- Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link pp. 1-11

- Kalu Constance
- Classification Ensemble Based Anomaly Detection in Network Traffic pp. 12-23

- Ramiz M Alıguliyev and Makrufa Sh Hajirahimova
- Design of Automated Departmental Lecture Timetable System pp. 24-34

- Etuh Emmanuel, Ajodoh Onoja Friday and Yusuf Serah Omolola
- Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation pp. 35-44

- Muhammad Hamza, Muhammad Azeem Akbar, Muhammad Shafiq, Tahir Kamal and Ali Mahmoud Baddour
- An Examination of the Methods of Increasing Software Efficiency Based on Soft Computing Technology pp. 45-56

- Shafagat Mahmudova
Volume 5, issue 2, 2018
- Fault Tolerance in Real Time Distributed System pp. 20-24

- Gajendra Sharma and Ankita Yadav
- A Survey on Efficient Power Management Using Smart Socket and IoT pp. 25-30

- B Santhosh Kumar and R Cristin
- Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services pp. 31-48

- Ozuomba Simeon, Kalu Constance and Akpasam Joseph Ekanem
- Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model pp. 49-56

- Simeon Ozuomba, Enyenihi Johnson and Ngwu Chinyere Rosemary
- Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road pp. 57-63

- Umana Sylvester Isreal, Nnamonso O Akpbio and Samuel Etaruwak Mbong
- Development of Web Application for University of Uyo Post UTME Examination Timetable pp. 64-73

- Enyenihi Henry Johnson, Ngwu Chinyere Rosemary and Eduediuyai Dan
Volume 5, issue 1, 2018
- A Security Scheme for Protecting Agent Societies pp. 1-11

- Antonio Muñoz
- Survey of Image Processing Based Applications in AMR pp. 12-19

- K Karthick, M Premkumar, R Manikandan and R Cristin
Volume 4, issue 2, 2017
- PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM pp. 38-53

- Ali Kareem Nahar, Ahmed N Abdalla, Ali Y Jaber and Mohammed Moanes Ezzaldean
- Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data pp. 54-80

- Anand Nayyar and Vikram Puri
Volume 4, issue 1, 2017
- Computational Modeling of Multi-Purpose Amphibious Aircraft Be-103 pp. 1-10

- Iftikhar B Abbasov and V’iacheslav V Orekhov
- Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique pp. 11-29

- El-Shorbagy M.a, Mousa A.a and M Farag
- Perturbation Functions for Compact Database pp. 30-37

- Sergey I Vyatkin
Volume 3, issue 4, 2016
- Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador pp. 65-68

- Moisés Toapanta, Enrique Mafla and José Orizaga
- Path Loss Measurement and Modeling for Lagos State G.S.M Environments pp. 69-81

- Shoewu O, Salau N.o, Ogunlewe A.o and Oborkhale L.i
Volume 3, issue 3, 2016
- About the Calculation Method of the Coefficient that Shows Significance Extent of Geometric Characteristics in Determination of Racial and Ethnic Identity of Human pp. 47-54

- Tofig Kazimov and Shafagat Mahmudova
- A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring pp. 55-64

- Anand Nayyar, Vikram Puri and Dac-Nhuong Le
Volume 3, issue 2, 2016
- Lossless Image Compression and Decompression to Improve the PSNR and MSE Values Using Architecture pp. 35-40

- S Kannadhasan, B Naveen Lingaesh and R Alagumanikandan
- Co-Development of Process Planning and Structural Configurations Considering Machine’s Accessibility in a Reconfigurable Setup pp. 41-46

- Eram Asghar, Aamer Ahmad Baqai, Ramshah Ahmad Toor and Sara Ayub
Volume 3, issue 1, 2016
- High Isolation Microstrip Mimo Antennas for Wlan Systems pp. 1-6

- L Chouti, I Messaoudene, N Sahnoun, A Behloul and A Benghalia
- Generalized Quantum Key Distribution for WDM Router Applications pp. 7-12

- N Djeffal, M Benslama and I Messaoudene
- Web Service Composition for E-Commerce Web Application pp. 13-24

- Anis Ismail, Abd El Salam AL Hajjar and Abdel Karim Kassem
- To Convalesce Task Scheduling in a Decentralized Cloud Computing Environment pp. 25-34

- Arun Sangwan, Gaurav Kumar and Sorabh Gupta
| |