Click to open the HelpDesk interface
AECE - Front page banner



JCR Impact Factor: 1.221
JCR 5-Year IF: 0.961
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: Feb 2022
Next issue: May 2022
Avg review time: 78 days
Avg accept to publ: 48 days
APC: 300 EUR


Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


1,890,633 unique visits
Since November 1, 2009

No robots online now

SCOPUS CiteScore

SCOPUS CiteScore


SCImago Journal & Country Rank


Anycast DNS Hosting


Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

Clarivate Analytics published the InCites Journal Citations Report for 2019. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.102 (1.023 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.734.

Starting on the 15th of June 2020 we wiil introduce a new policy for reviewers. Reviewers who provide timely and substantial comments will receive a discount voucher entitling them to an APC reduction. Vouchers (worth of 25 EUR or 50 EUR, depending on the review quality) will be assigned to reviewers after the final decision of the reviewed paper is given. Vouchers issued to specific individuals are not transferable.

Read More »


Enter one or more keywords to search for.
For exact phrase matching use quotation marks (e.g. "speed controller").
Note that '*' and '?' wildcards are supported.

Search for:

Results per page:

Match: any search words all search words

Search results for: network

607 results found.

61 pages of results.
Sorted by relevance / Sort by date
Year: 2013, Volume: 13, Number: 4
... A Novel MAC Protocol to Alleviate Congestion in Wireless Sensor Networks Lili QIAN1, Chen FANG1, Octavia A. ... on which the sensor nodes go to sleep periodically. network topology is simple, a strong congestion can take ... Traffic adaptive mac protocol for wireless sensor network," Networking and Mobile experiments show that the proposed protocol provides ...
Terms matched: 4  -  Score: 221  -  789k
Year: 2007, Volume: 7, Issue: 2
... (28), 2007 Security of Mobile ad-hoc Wireless Networks. A Brief Survey Doru E. TILIUTE " ... most present issues of computer the overall cost of the network. Bandwidth is narrow wireless networks is the security ... delays in packet delivery. application layer, with no network-level multicast support Therefore, any key management scheme should ...
Terms matched: 4  -  Score: 220  -  432k
Year: 2012, Volume: 12, Number: 1
... 1, 2012 Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks Weiwei FANG, Shengxin LI, Xiangmin LIANG, ... , the locomotive of the train formed in the whole network through contention-based cluster freight. The many-to-one traffic pattern ... Proc. 7th Annual International Conference on Mobile Computing and Networking (MobiCom), network characteristics and limitations, ...
Terms matched: 4  -  Score: 216  -  670k
Year: 2021, Volume: 21, Number: 3
... to Authoritative Name Server network-based system is proposed on live networks to prevent the common DNS tunneling threats over DNS ... in Fig. 1. Networks trained with various deep network topologies by 4. To ensure efficient address resolution ... Xie, "An empirical analysis of data Conference on Networking, Embedded and Wireless Systems, India, preprocessing ...
Terms matched: 4  -  Score: 198  -  3,986k
Year: 2020, Volume: 20, Number: 4
... Number 4, 2020 Latency-Rate Downlink Packet Scheduler for LTE Networks Fabian Maurice MALHEIROS FRANCO, Augusto FORONDA, and ... station, which does resource scheduling through a multiple access network discipline, which consists in managing the packet technology ... traffic scheduling algorithms," IEEE/ACM Trans. Networking, vol. 6, no. 5, ...
Terms matched: 4  -  Score: 194  -  1,306k
Year: 2012, Volume: 12, Number: 2
... , 2012 Performance Analysis of Cell-Phone Worm Spreading in Cellular Networks through Opportunistic Communications Yahui WU1, Su DENG1, ... . Communication by these technologies is opportunistic topology of the network formed by the short-range radio and has very close ... not believe the data coming from others easily, the networking applications, where end-to-end connectivity can worms may bring ...
Terms matched: 4  -  Score: 189  -  703k
Year: 2012, Volume: 12, Number: 2
... Number 2, 2012 Optimized Simulation Framework for Spiking Neural Networks using GPU's Radu MIRSU, Sebastian MICUT, Catalin ... the output u. Further model of a spiking neural network implemented in CUDA C. It information on I ... Performance Computing, 11x11x11 x4.96 x6.07 x5.97 x5,76 Networking, Storage and Analysis, Nov. 2007, ...
Terms matched: 4  -  Score: 176  -  633k
Year: 2013, Volume: 13, Number: 4
... , including the microphone clustering, cluster selecting, BP networks for position estimation, and €( x j ... 13, Number 4, 2013 Microphone Clustering and BP Network based Acoustic Source Localization in Distributed Microphone Arrays Qiaoling ... . 2. Figure 3. Microphone clustering and BP network-based acoustic source localization method As shown in Fig. ...
Terms matched: 4  -  Score: 171  -  793k
Year: 2017, Volume: 17, Number: 4
... network is represented as an undirected graph and it Social networks have gained popularity among people reveals much useful information ... , Number 4, 2017 k-Degree Anonymity Model for Social Network Data Publishing Kamalkumar R. MACWAN, Sankita J ... for social anonymization via clustering, graph modification approach, networking has gained special attraction because of its easy and ...
Terms matched: 4  -  Score: 167  -  1,420k
Year: 2016, Volume: 16, Number: 1
... HIGH: A Hexagon-based Intelligent Grouping Approach in Wireless Sensor Networks Chung-Shuo FAN Department of Computer Science, National Chiao ... a satisfactory coverage ratio, energy consumption and maximize the network lifetime of balances the energy consumption among sensor nodes ... on Software Engineering, in all schemes Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 139-144 ...
Terms matched: 4  -  Score: 165  -  1,201k
Result Pages: << Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next >>

Search took 0.266 seconds

The search engine database includes all papers published after 2007, including titles, author names, abstracts, keywords, full papers text, references and citations. For papers published between 2001 and 2006, please visit the Archive section.

We invite you to try the most frequently used search terms:

system - power - control - fault - network - load - model - frequency - converter - transformer - harmonic - computer - algorithm - cancer - simulation - computer - estimate - optimal control - expert system - electromagnetic - interference - data transmission - neural network - electrocardiogram signal - model - cluster - design - wavelet - antenna - wireless sensor - coupling - robust - noise - signal processing - system identification - translation - nonlinear systems - induction motor - speed controller - shape optimization - fuzzy network - wireless sensor network

Website loading speed and performance optimization powered by: