Click to open the HelpDesk interface
AECE - Front page banner



JCR Impact Factor: 1.221
JCR 5-Year IF: 0.961
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: Feb 2022
Next issue: May 2022
Avg review time: 78 days
Avg accept to publ: 48 days
APC: 300 EUR


Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


1,890,660 unique visits
Since November 1, 2009

Robots online now

SCOPUS CiteScore

SCOPUS CiteScore


SCImago Journal & Country Rank


Anycast DNS Hosting


Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

Clarivate Analytics published the InCites Journal Citations Report for 2019. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.102 (1.023 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.734.

Starting on the 15th of June 2020 we wiil introduce a new policy for reviewers. Reviewers who provide timely and substantial comments will receive a discount voucher entitling them to an APC reduction. Vouchers (worth of 25 EUR or 50 EUR, depending on the review quality) will be assigned to reviewers after the final decision of the reviewed paper is given. Vouchers issued to specific individuals are not transferable.

Read More »


Enter one or more keywords to search for.
For exact phrase matching use quotation marks (e.g. "speed controller").
Note that '*' and '?' wildcards are supported.

Search for:

Results per page:

Match: any search words all search words

Search results for: network

607 results found.

61 pages of results.
Sorted by relevance / Sort by date
Year: 2014, Volume: 14, Number: 1
... access patterns Index Terms €” cache memory, fuzzy neural networks, with a filtering effect. Furthermore, LRU ... , FIFO demonstrates the best advantages with regard to neural network (NN) and poor performance as shown in ... . S. R. Jang, "ANFIS: adaptive-network-based fuzzy inference ...
Terms matched: 4  -  Score: 18  -  707k
Year: 2014, Volume: 14, Number: 3
... 1 Abstract €” Web browsing on mobile networks is slow in packet communications slow down the overall ... fields. But, most of the WAN and mobile network. Since the traffic for the connection header field ... the proxy server adds HTTP header fields to HTTP and Networking, vol. 4, pp. 2495 €“ ...
Terms matched: 3  -  Score: 287  -  1,318k
Year: 2014, Volume: 14, Number: 3
... calculating the most confident combined trust values security. Trust networks are widely used to formalize trust [3] ... , Number 3, 2014 On the Optimality of Trust Network Analysis with Subjective Logic Yongsu PARK Division of Computer ... entities using subjective logic and aspects in e-commerce, social networking and computer finding/calculating the most confident combined ...
Terms matched: 3  -  Score: 267  -  812k
Year: 2018, Volume: 18, Number: 3
... the flexibility to guide them to User profiling in computer networks is a very common decide the next move. ... addition, most of the IoT studies either concentrate on network topologies or power consumption, communicates by means of ... data and voice. For while in this study, dynamicity and exact location estimation instance, Chang,Yi ...
Terms matched: 3  -  Score: 255  -  869k
Year: 2013, Volume: 13, Number: 1
... obtained at the outputs of each network are The neural networks are architectures that use several processed by using analysis ... Effect of Noise in Printed Character Recognition System Using Neural Network Sandel GHEORGHITA1, Radu MUNTEANU1, Adrian GRAUR2 1 ... been designed, marked with RNA1 and RNA2. The network's architecture contains an Digital Object Identifier 10.4316/AECE.2013.01011 ...
Terms matched: 3  -  Score: 228  -  689k
Year: 2011, Volume: 11, Number: 1
... Delay-bound Admission Control for Real-time Traffic in Fourth Generation IMT-Advanced Networks based on 802.16m Neeraj POUDYAL1, Ha Cheol LEE2 ... requirements. Our paper presents a novel IMT €“ advanced network by considering the effects of various measurement-based admission control ... wireless networks has been quite limited. such as all-IP networking, seamless handovers, location- Unlike processors which ...
Terms matched: 3  -  Score: 215  -  781k
Year: 2013, Volume: 13, Number: 1
... presented for the first time by present, the convolutional networks are the best techniques for Fukushima [1] ... Segmentation of Bone Structure in X-ray Images using Convolutional Neural Network Cosmin CERNAZANU-GLAVAN, Stefan HOLBAN Politehnica University of Timisoara ... report, University of Toronto, Aug. 2010. Network-based Processing, pp. 317-324, 2010. [ ...
Terms matched: 3  -  Score: 211  -  1,239k
Year: 2022, Volume: 22, Number: 1
... A Hybrid Deep Learning Approach for Intrusion Detection in IoT Networks Murat EME‡, Mehmet Hilal -ZCANHAN Department of Computer ... . With increasing mission- every IoT device on the network. Therefore, IoT devices are critical IoT data ... collecting traffic data on the Amazon AWS LAN focused on computer-network traffic anomaly detection network by the Canadian Cyber Security ...
Terms matched: 3  -  Score: 206  -  1,415k
Year: 2011, Volume: 11, Number: 2
... : ƒ P(k) ƒ starting from non-robust networks to the nearest free-scale, robust network. Starting ... dynamics 8], and it has been the scale-free network is found, the real network must be enlarged ... has to other nodes. Note that the smaller the network's N node number, the- The degree distribution ...
Terms matched: 3  -  Score: 197  -  641k
Year: 2013, Volume: 13, Number: 4
... , 2013 Fountain-code Aided File Transfer in Vehicular Delay Tolerant Networks Seyed Masoud Mousavi LANGARI1, Saleh YOUSEFI2, Sam ... other neighboring nodes, it DTN routing algorithm in the network layer. It is assumed that files are coded ... Urban Vanet," EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, ...
Terms matched: 3  -  Score: 179  -  878k
Result Pages: << Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next >>

Search took 0.256 seconds

The search engine database includes all papers published after 2007, including titles, author names, abstracts, keywords, full papers text, references and citations. For papers published between 2001 and 2006, please visit the Archive section.

We invite you to try the most frequently used search terms:

system - power - control - fault - network - load - model - frequency - converter - transformer - harmonic - computer - algorithm - cancer - simulation - computer - estimate - optimal control - expert system - electromagnetic - interference - data transmission - neural network - electrocardiogram signal - model - cluster - design - wavelet - antenna - wireless sensor - coupling - robust - noise - signal processing - system identification - translation - nonlinear systems - induction motor - speed controller - shape optimization - fuzzy network - wireless sensor network

Website loading speed and performance optimization powered by: