


default search action
International Journal of Computational Science and Engineering, Volume 19
Volume 19, Number 1, 2019
- Lijun Dou, Rui Yan, Qiaolin Ye:

Simultaneous multiple low-dimensional subspace dimensionality reduction and classification. 1-14 - Ningsheng Zhao, Zhili Zhou, Lingzhi Liao:

Partial-duplicate image retrieval based on HSV colour space for coverless information hiding. 15-24 - M. V. Rahul, Rajashree Shettar, K. N. Subramanya:

An adaptive model for traffic flow optimisation in dynamic environments. 25-35 - Yali Lv, Jiye Liang

, Yuhua Qian, Jiajie Wu, Suqin Ji:
Sign fusion of multiple QPNs based on qualitative mutual information. 36-45 - Yinxia Sun, Limin Shen:

Pairing-free certificateless signature with revocation. 46-52 - Wei Zhou, Hong Zhang, Hui Wang, Yun Wang:

Designing scrubbing strategy for memories suffering MCUs through the selection of optimal interleaving distance. 53-63 - Zhendong Liu, Daming Zhu, Qionghai Dai:

Improved predicting algorithm of RNA pseudoknotted structure. 64-70 - Xiaomei Yu, Jun Zhao, Hong Wang, Xiangwei Zheng, Xiaoyan Yan:

A model of mining approximate frequent itemsets using rough set theory. 71-82 - Shu-zhi Li, Qin Hu, Xiao-hong Deng, Zhao-Quan Cai:

Reversible image watermarking based on texture analysis of grey level co-occurrence matrix. 83-92 - Li Chen, Hong Liu, Philip Moore:

A semantic recommender algorithm for 3D model retrieval based on deep belief networks. 93-103 - Dingcai Shen, Longyin Zhu:

Differential evolution with spatially neighbourhood best search in dynamic environment. 104-111 - Yifang Liu, Renfu Li, Shuquan Wang:

Optimal anti-interception orbit design based on genetic algorithm. 112-120 - Hong Wang, Xiaomei Yu, Jun Zhao, Yuanjie Zheng:

Detecting sparse rating spammer for accurate ranking of online recommendation. 121-131 - Lingyun Xiang, Xiao Yang, Jiahe Zhang, Weizheng Wang:

A word-frequency-preserving steganographic method based on synonym substitution. 132-139 - Guo Sun, Yiqiao Cai:

Differential evolution with dynamic neighbourhood learning strategy-based mutation operators. 140-151
Volume 19, Number 2, 2019
- Osama Hosam, Muhammad Hammad Ahmad:

Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. 153-161 - Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin:

CSCAC: one constant-size CPABE access control scheme in trusted execution environment. 162-168 - Huan Zhao, Xiaoxiao Zhou, Yufeng Xiao:

Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment. 169-176 - Zeyu Sun, Guozeng Zhao, Xiaoyan Pan:

PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks. 177-188 - Fang Wang, Renjun Feng, Haiyan Chen, Wen Wu, Fei Zhu:

An information network security policy learning algorithm based on Sarsa with optimistic initial values. 189-196 - Sen Zhang, Yuping Hu, Chunmei Wang:

Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network. 197-205 - Guo-Sheng Zhou, Wei Du, Han-Chao Lin, Xiao-Wei Yan:

An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators. 206-214 - Dongfang Li, Qiuyan Zhu, Hong Wang, Wenchao Liu, Zhihua Feng, Jianwei Zhang:

A novel computational model for SRAM PUF min-entropy estimation. 215-222 - Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin:

Design of DDoS attack detection system based on intelligent bee colony algorithm. 223-232 - Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu:

LWE-based multi-authority attribute-based encryption scheme with hidden policies. 233-241 - Wei Zhu, Osama Hosam, Xiaodong Zheng:

A secure hierarchical community detection algorithm. 242-250 - Bo Deng:

Efficient security credential management for named data networking. 251-258 - Xin Su, Yi Zheng, Jiuchuan Lin, Xuchong Liu:

A network traffic-aware mobile application recommendation system based on network traffic cost consideration. 259-273 - Soundes Belkacem, Larbi Guezouli, Samir Zidat:

Pseudo Zernike moments-based approach for text detection and localisation from lecture videos. 274-283 - Chuanrong Wu, Evgeniya Zapevalova, Deming Zeng:

Optimisation model of price changes after knowledge transfer in the big data environment. 284-292 - Xiao-Zhang Liu, Hang-Yu Ruan:

Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition. 293-300 - Qingtang Su:

A blind image watermarking algorithm based on amalgamation domain method. 301-310
Volume 19, Number 3, 2019
- Hui-Juan Zhu, Tong-Hai Jiang, Yi Wang, Li Cheng, Bo Ma, Fan Zhao:

A data cleaning method for heterogeneous attribute fusion and record linkage. 311-324 - Shengxiang Gao, Dewei Kong, Zhengtao Yu, Yang Luo, Jianyi Guo, Yantuan Xian:

Chinese question speech recognition integrated with domain characteristics. 325-333 - Ahmed Fawzi Otoom

, Doaa Al-Shdaifat, Maen Hammad, Emad E. Abdallah
, Ashraf Hamdan Aljammal:
Automated labelling and severity prediction of software bug reports. 334-342 - Borong Ma, Zhixin Ma, Dagan Nie, Xianbo Li:

IFOA: an improved forest algorithm for continuous nonlinear optimisation. 343-353 - Zhen Chen, Limin Shen, Dianlong You, Chuan Ma, Feng Li:

A location-aware matrix factorisation approach for collaborative web service QoS prediction. 354-367 - Yun-Ming Wang, Cheng-Sheng Pan, Bo Chen, Duoping Zhang:

Method of key node identification in command and control networks based on level flow betweenness. 368-375 - Enting Dong, Jianfeng Wang

, Zhenhua Liu, Hua Ma:
Large universe multi-authority attribute-based PHR sharing with user revocation. 376-386 - Shengsheng Wang, Ruyi Dong

:
Feature selection with improved binary artificial bee colony algorithm for microarray data. 387-399 - Shufang Wu, Jie Zhu, Jianmin Xu:

Context discriminative dictionary construction for topic representation. 400-406 - Duaa Elsarraj, Maha Al Qisi, Ali Rodan, Nadim Obeid, Ahmad Abdel-Aziz Sharieh, Hossam Faris:

Demystifying echo state network with deterministic simple topologies. 407-417 - Imene Bensetira, Djamel-Eddine Saïdouni, Mahfud Al-la Alamin:

A state space distribution approach based on system behaviour. 418-429 - Tianhang Liu, Jianping Yin, Long Gao, Wei Chen, Minghui Qiu:

Consensus RNA secondary structure prediction using information of neighbouring columns and principal component analysis. 430-439 - Naser S. Al Madi, Javed I. Khan:

Is a picture worth a thousand words? A computational investigation of the modality effect. 440-451
Volume 19, Number 4, 2019
- S. A. Sundararaman, T. SubbuLakshmi

:
Execution of scientific workflows on IaaS cloud by PBRR algorithm. 455-463 - Nawel Kortas, Anis Ben Arbia:

Development and evaluation of the cloudlet technology within the Raspberry Pi. 464-473 - Manikandan Narayanan

, Srinivasan Subha:
Parallel data processing approaches for effective intensive care units with internet of things. 474-482 - Imed Eddine Bennour, Monia Ettouil

, Rim Zarrouk
, Abderrazak Jemai
:
Study of runtime performance for Java-multithread PSO on multicore machines. 483-493 - Gaofeng Zhang, Yingnan Yan, Yunsheng Tian, Yang Liu, Yan Li, Qingguo Zhou, Rui Zhou, Kuan-Ching Li

:
Water contamination monitoring system based on big data: a case study. 494-505 - Rui Zhou, Xue Li, Binbin Yong, Zebang Shen, Chen Wang, Qingguo Zhou, Yunshan Cao, Kuan-Ching Li

:
Arrhythmia recognition and classification through deep learning-based approach. 506-517 - Jianghua Li, Chen Qiu:

A personalised ontology ranking model based on analytic hierarchy process. 518-526 - Yi Zhao, Zhao Li, Bitao Li, Keqing He, Junfei Guo:

Collective intelligence value discovery based on citation of science article. 527-537 - Gang Liu, Cong Wu:

Differential evolution with k-nearest-neighbour-based mutation operator. 538-545 - Meng Pan, Jie Zhang:

Genetic or non-genetic prognostic factors for colon cancer classification. 546-553 - Ren Kanehira, Hideo Hori, Kazinori Kawaguchi, Hideo Fujimoto:

A medical training system for the operation of heart-lung machine. 554-561 - Yujie Li, Huiliang Xu, Yun Li, Huimin Lu, Seiichi Serikawa:

Underwater image segmentation based on fast level set method. 562-569 - Wenmin Huang, Jiquan Ma:

Using Gaussian mixture model to fix errors in SFS approach based on propagation. 570-580 - Bolin Yu, Zengkai Wang, Fahong Yu, Longhua Ma, Xiaoyun Xia, Feng He:

Estimation of distribution algorithms based on increment clustering for multiple optima in dynamic environments. 581-589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














