default search action
International Journal of Computational Science and Engineering, Volume 19
Volume 19, Number 1, 2019
- Lijun Dou, Rui Yan, Qiaolin Ye:
Simultaneous multiple low-dimensional subspace dimensionality reduction and classification. 1-14 - Ningsheng Zhao, Zhili Zhou, Lingzhi Liao:
Partial-duplicate image retrieval based on HSV colour space for coverless information hiding. 15-24 - M. V. Rahul, Rajashree Shettar, K. N. Subramanya:
An adaptive model for traffic flow optimisation in dynamic environments. 25-35 - Yali Lv, Jiye Liang, Yuhua Qian, Jiajie Wu, Suqin Ji:
Sign fusion of multiple QPNs based on qualitative mutual information. 36-45 - Yinxia Sun, Limin Shen:
Pairing-free certificateless signature with revocation. 46-52 - Wei Zhou, Hong Zhang, Hui Wang, Yu Wang:
Designing scrubbing strategy for memories suffering MCUs through the selection of optimal interleaving distance. 53-63 - Zhendong Liu, Daming Zhu, Qionghai Dai:
Improved predicting algorithm of RNA pseudoknotted structure. 64-70 - Xiaomei Yu, Jun Zhao, Hong Wang, Xiangwei Zheng, Xiaoyan Yan:
A model of mining approximate frequent itemsets using rough set theory. 71-82 - Shu-zhi Li, Qin Hu, Xiao-hong Deng, Zhao-Quan Cai:
Reversible image watermarking based on texture analysis of grey level co-occurrence matrix. 83-92 - Li Chen, Hong Liu, Philip Moore:
A semantic recommender algorithm for 3D model retrieval based on deep belief networks. 93-103 - Dingcai Shen, Longyin Zhu:
Differential evolution with spatially neighbourhood best search in dynamic environment. 104-111 - Yifang Liu, Renfu Li, Shuquan Wang:
Optimal anti-interception orbit design based on genetic algorithm. 112-120 - Hong Wang, Xiaomei Yu, Jun Zhao, Yuanjie Zheng:
Detecting sparse rating spammer for accurate ranking of online recommendation. 121-131 - Lingyun Xiang, Xiao Yang, Jiahe Zhang, Weizheng Wang:
A word-frequency-preserving steganographic method based on synonym substitution. 132-139 - Guo Sun, Yiqiao Cai:
Differential evolution with dynamic neighbourhood learning strategy-based mutation operators. 140-151
Volume 19, Number 2, 2019
- Osama Hosam, Muhammad Hammad Ahmad:
Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. 153-161 - Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin:
CSCAC: one constant-size CPABE access control scheme in trusted execution environment. 162-168 - Huan Zhao, Xiaoxiao Zhou, Yufeng Xiao:
Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment. 169-176 - Zeyu Sun, Guozeng Zhao, Xiaoyan Pan:
PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks. 177-188 - Fang Wang, Renjun Feng, Haiyan Chen, Wen Wu, Fei Zhu:
An information network security policy learning algorithm based on Sarsa with optimistic initial values. 189-196 - Sen Zhang, Yuping Hu, Chunmei Wang:
Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network. 197-205 - Guo-Sheng Zhou, Wei Du, Han-Chao Lin, Xiao-Wei Yan:
An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators. 206-214 - Dongfang Li, Qiuyan Zhu, Hong Wang, Wenchao Liu, Zhihua Feng, Jianwei Zhang:
A novel computational model for SRAM PUF min-entropy estimation. 215-222 - Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin:
Design of DDoS attack detection system based on intelligent bee colony algorithm. 223-232 - Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu:
LWE-based multi-authority attribute-based encryption scheme with hidden policies. 233-241 - Wei Zhu, Osama Hosam, Xiaodong Zheng:
A secure hierarchical community detection algorithm. 242-250 - Bo Deng:
Efficient security credential management for named data networking. 251-258 - Xin Su, Yi Zheng, Jiuchuan Lin, Xuchong Liu:
A network traffic-aware mobile application recommendation system based on network traffic cost consideration. 259-273 - Soundes Belkacem, Larbi Guezouli, Samir Zidat:
Pseudo Zernike moments-based approach for text detection and localisation from lecture videos. 274-283 - Chuanrong Wu, Evgeniya Zapevalova, Deming Zeng:
Optimisation model of price changes after knowledge transfer in the big data environment. 284-292 - Xiao-Zhang Liu, Hang-Yu Ruan:
Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition. 293-300 - Qingtang Su:
A blind image watermarking algorithm based on amalgamation domain method. 301-310
Volume 19, Number 3, 2019
- Hui-Juan Zhu, Tong-Hai Jiang, Yi Wang, Li Cheng, Bo Ma, Fan Zhao:
A data cleaning method for heterogeneous attribute fusion and record linkage. 311-324 - Shengxiang Gao, Dewei Kong, Zhengtao Yu, Yang Luo, Jianyi Guo, Yantuan Xian:
Chinese question speech recognition integrated with domain characteristics. 325-333 - Ahmed Fawzi Otoom, Doaa Al-Shdaifat, Maen Hammad, Emad E. Abdallah, Ashraf Hamdan Aljammal:
Automated labelling and severity prediction of software bug reports. 334-342 - Borong Ma, Zhixin Ma, Dagan Nie, Xianbo Li:
IFOA: an improved forest algorithm for continuous nonlinear optimisation. 343-353 - Zhen Chen, Limin Shen, Dianlong You, Chuan Ma, Feng Li:
A location-aware matrix factorisation approach for collaborative web service QoS prediction. 354-367 - Yun-Ming Wang, Cheng-Sheng Pan, Bo Chen, Duoping Zhang:
Method of key node identification in command and control networks based on level flow betweenness. 368-375 - Enting Dong, Jianfeng Wang, Zhenhua Liu, Hua Ma:
Large universe multi-authority attribute-based PHR sharing with user revocation. 376-386 - Shengsheng Wang, Ruyi Dong:
Feature selection with improved binary artificial bee colony algorithm for microarray data. 387-399 - Shufang Wu, Jie Zhu, Jianmin Xu:
Context discriminative dictionary construction for topic representation. 400-406 - Duaa Elsarraj, Maha Al Qisi, Ali Rodan, Nadim Obeid, Ahmad Abdel-Aziz Sharieh, Hossam Faris:
Demystifying echo state network with deterministic simple topologies. 407-417 - Imene Bensetira, Djamel-Eddine Saïdouni, Mahfud Al-la Alamin:
A state space distribution approach based on system behaviour. 418-429 - Tianhang Liu, Jianping Yin, Long Gao, Wei Chen, Minghui Qiu:
Consensus RNA secondary structure prediction using information of neighbouring columns and principal component analysis. 430-439 - Naser S. Al Madi, Javed I. Khan:
Is a picture worth a thousand words? A computational investigation of the modality effect. 440-451
Volume 19, Number 4, 2019
- S. A. Sundararaman, T. SubbuLakshmi:
Execution of scientific workflows on IaaS cloud by PBRR algorithm. 455-463 - Nawel Kortas, Anis Ben Arbia:
Development and evaluation of the cloudlet technology within the Raspberry Pi. 464-473 - Manikandan Narayanan, Srinivasan Subha:
Parallel data processing approaches for effective intensive care units with internet of things. 474-482 - Imed Eddine Bennour, Monia Ettouil, Rim Zarrouk, Abderrazak Jemai:
Study of runtime performance for Java-multithread PSO on multicore machines. 483-493 - Gaofeng Zhang, Yingnan Yan, Yunsheng Tian, Yang Liu, Yan Li, Qingguo Zhou, Rui Zhou, Kuan-Ching Li:
Water contamination monitoring system based on big data: a case study. 494-505 - Rui Zhou, Xue Li, Binbin Yong, Zebang Shen, Chen Wang, Qingguo Zhou, Yunshan Cao, Kuan-Ching Li:
Arrhythmia recognition and classification through deep learning-based approach. 506-517 - Jianghua Li, Chen Qiu:
A personalised ontology ranking model based on analytic hierarchy process. 518-526 - Yi Zhao, Zhao Li, Bitao Li, Keqing He, Junfei Guo:
Collective intelligence value discovery based on citation of science article. 527-537 - Gang Liu, Cong Wu:
Differential evolution with k-nearest-neighbour-based mutation operator. 538-545 - Meng Pan, Jie Zhang:
Genetic or non-genetic prognostic factors for colon cancer classification. 546-553 - Ren Kanehira, Hideo Hori, Kazinori Kawaguchi, Hideo Fujimoto:
A medical training system for the operation of heart-lung machine. 554-561 - Yujie Li, Huiliang Xu, Yun Li, Huimin Lu, Seiichi Serikawa:
Underwater image segmentation based on fast level set method. 562-569 - Wenmin Huang, Jiquan Ma:
Using Gaussian mixture model to fix errors in SFS approach based on propagation. 570-580 - Bolin Yu, Zengkai Wang, Fahong Yu, Longhua Ma, Xiaoyun Xia, Feng He:
Estimation of distribution algorithms based on increment clustering for multiple optima in dynamic environments. 581-589
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.