


default search action
International Journal of Computational Science and Engineering, Volume 22
Volume 22, Number 1, 2020
- Yan Yuan, Bolun Chen, Yongtao Yu, Ying Jin:

An influence maximisation algorithm based on community detection. 1-14 - Mohammed Amine Benmahdjoub

, Abdelkader Mezouar
, Larbi Boumediene, Youcef Saidi:
Smart embarked electrical network based on embedded system and monitoring camera. 15-29 - Shu Chen, Nanxi Chen, Jiayi Tang, Xu Wang:

Cognitive fog for health: a distributed solution for smart city. 30-38 - Wei Fang

, TianXiao Jiang, Ke Jiang, Feihong Zhang, Yewen Ding, Jack Sheng:
A method of automatic text summarisation based on long short-term memory. 39-49 - Raghavendra Achar, P. Santhi Thilagam

, Shreenath Acharya:
Broker-based mechanism for cloud provider selection. 50-61 - Zhiqiang Ruan, Dan Yang:

Self-organised resource assignment for on-demand services in the cloud platform. 62-73 - Min Yang, Shibin Zhang, Yang Zhao, Qirun Wang:

Dynamic negotiation of user behaviour via blockchain technology in federated system. 74-83 - Ce Li, Tan He, Yingheng Wang, Liguo Zhang, Ruili Liu, Jing Zheng:

Pipeline image haze removal system using dark channel prior on cloud processing platform. 84-95 - Xiufang Qian, Huamei Shi, Chunpeng Ge, Honghui Fan, Xiaorong Zhao, Yijun Liu:

Application research on service innovation and entrepreneurship education in university libraries and archives. 96-106 - Weidong Fang, Wuxiong Zhang, Lianhai Shan, Biruk Assefa, Wei Chen:

Hierarchical routing protocol in wireless sensor network: a state-of-the-art review. 107-113 - Jianhua Chen, Jiaohua Qin, Xuyu Xiang, Yun Tan:

A new encrypted image retrieval method based on feature fusion in cloud computing. 114-123 - Jingzhao Li, Zhi Xu:

Research on network layout strategy of mobile opportunity perception in coal mines. 124-134 - Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:

A novel high capacity turtle shell-based data hiding with location table free. 135-145 - Pei Yang

, Wei Song, Xiaobing Zhao, Rui Zheng, Letu Qingge:
An improved Otsu threshold segmentation algorithm. 146-153 - Neena Aloysius

, Madathilkulangara Geetha:
A scale space model of weighted average CNN ensemble for ASL fingerspelling recognition. 154-161 - Jiao Yao, Yaxuan Dai, Yiling Ni, Jin Wang, Jing Zhao

:
Deep characteristics analysis on travel time of emergency traffic. 162-169
Volume 22, Numbers 2/3, 2020
- Ping He, Zheng Huo:

Data grouping scheme for multi-request retrieval in MIMO wireless communication. 171-180 - Na Liu, Ying Lu, Xiao-Jun Tang, Ming-Xia Li, Chunli Wang:

Improved user-based collaborative filtering algorithm with topic model and time tag. 181-189 - Yuqing Lin, Jiawen Lin, Yuzhen Niu, Haifeng Zhang:

Accumulative energy-based seam carving for image resizing. 190-199 - Iulia Stirb:

Improving runtime performance and energy consumption through balanced data locality with NUMA-BTLP and NUMA-BTDM static algorithms for thread classification and thread type-aware mapping. 200-210 - Keyao Chen, Guizhi Wang, Jibo Chen, Shuai Yuan, Guo Wei:

Impact of climate changes on manufacturing: Hodrick-Prescott filtering and a partial least squares regression model. 211-220 - Xue Lu, Dezhi Han, Letian Duan, Qiuting Tian:

Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network. 221-232 - Tienan Zhang:

MLIM-Cloud: a flexible information monitoring middleware in large-scale cloud environments. 233-242 - Jinqiao Dai, Shibin Zhang, Jinyue Xia:

A multi-group e-commerce signature scheme based on quantum teleportation. 243-251 - Ken Ming Tu, Kuo Ann Yih, Fu-I Chou, Jyh-Horng Chou:

Numerical solution and Taguchi experimental method for variable viscosity and non-Newtonian fluids effects on heat and mass transfer by natural convection in porous media. 252-261 - Yanning Cao, Xiaoshu Zhang, Jin Wang:

Case data-mining analysis for patients with oesophageal cancer. 262-269 - Dongwei Gao, Hefeng Chen, Chinchen Chang:

Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption. 270-279 - Thiago Roberto Lima Lopes, Lucas Pfeiffer Salomão Dias, Cristiano André da Costa

, Igor Fontana De Nardin
, Rodrigo da Rosa Righi:
Collaborative humanless model for automatic pothole detection and driver notification. 280-296 - Yue Zhao, Xiaona Xu, Jianjian Yue, Wei Song, Xiali Li

, Licheng Wu, Qiang Ji:
An open speech resource for Tibetan multi-dialect and multitask recognition. 297-304 - Zhijuan Wang, Wenguang Fang, Xiaobing Zhao, Wei Song, Yinghui Feng, Yining Chang:

Transliteration recognition of Tibetan person name based on Tibetan cultural knowledge. 305-312 - Wenbin Yu, Zijia Xiong, Shanshan Rong, Yang Liu, Siyao Wang, Yinsong Xu, Alex X. Liu:

Unambiguous discrimination of binary coherent states. 313-319 - Jianbin Wu, Chuwei Luo, Ziyang Kang, Shuangkui Ge, Yemin Xin:

A coverless information hiding algorithm based on gradient matrix. 320-327 - Wen Gu, Cao Yang, Ying Yi:

An access model under cloud computing environment. 328-334 - Leila Hamdad, Zakaria Ournani, Karima Benatchba, Ahcène Bendjoudi:

Two-level parallel CPU/GPU-based genetic algorithm for association rule mining. 335-345 - Yonghui Dai

, Ying Wang, Bo Xu, Yingyi Wu, Jin Xian:
Research on image of enterprise after-sales service based on text sentiment analysis. 346-354 - Fei Gu, Zhihua Xia

, Jianwei Fei, Chengsheng Yuan, Qiang Zhang:
Face spoof detection using feature map superposition and CNN. 355-363
Volume 22, Number 4, 2020
- Christophe Guyeux, Jean-Claude Charr, Jacques Bou Abdo, Jacques Demerjian:

Advances in the enumeration of foldable self-avoiding walks. 365-375 - Yanli Wang, Yanyan Feng:

A new transmission strategy to achieve energy balance and efficiency in wireless sensor networks. 376-382 - Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:

Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding. 383-393 - Jiayin Zhao, Yong Lu, Hao Ban, Ying Chen:

E-commerce satisfaction based on synthetic evaluation theory and neural networks. 394-403 - Wangdong Jiang, Yushan Luo, Ying Cao, Guang Sun, Chunhong Gong:

On the build and application of bank customer churn warning model. 404-419 - Shengsheng Wang, Chunshang Xing, Dong Liu

:
Efficient deep convolutional model compression with an active stepwise pruning approach. 420-430 - Maojun Zhang, Hao Li:

Forecasting the yield of Chinese corporate bonds. 431-436 - Wei Chen, Kun Zhou, Weidong Fang, Ke Wang, Fangming Bi, Biruk Assefa:

Review on blockchain technology and its application to the simple analysis of intellectual property protection. 437-444 - Jin Liu

, Xin Zhang, Xiaohu Tian, Jin Wang, Arun Kumar Sangaiah
:
A novel domain adaption approach for neural machine translation. 445-453 - Mengmeng Song, Lin Qiao, Rob Law:

Formation path of customer engagement in virtual brand community based on back propagation neural network algorithm. 454-465 - Jamilson Dantas, Eltton Araujo, Paulo R. M. Maciel, Rúbens de Souza Matos Júnior, Jean Teixeira

:
Estimating capacity-oriented availability in cloud systems. 466-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














