


default search action
International Journal of Computational Science and Engineering, Volume 28
Volume 28, Number 1, 2025
- Meijiao Zhang, Lan Yang, Weiping Jiang, Gejing Xu, Guoliang Hu:

A novel fertility intention prediction scheme based on Naive Bayes. 1-9 - Sharad Nigam

, Divya Kumar:
A predictive model based on the LSTM technique for the maintenance of railway track system. 10-20 - Hua Yin, Zhiquan Chen:

A new binary tagging-based model integrated with unsupervised tree hierarchy for relational triple extraction. 21-31 - Himansu Das, Muskan, Hrishikesh Kumar

:
Feature selection using Tasmanian devil optimisation algorithm for software fault prediction. 32-55 - Vaishnavee Vijay Rathod, Dipti P. Rana, Rupa G. Mehta:

Black widow optimisation with deep learning-based feature fusion model for remote sensing image analysis. 56-70 - Meng Cai, Xichao Wang, Baojiang Li, Haiyan Wang, XiangQing Dong, Guochu Chen:

Behaviour recognition system of underground drilling operators based on MA-STGCN. 71-86 - Philip Oluwaseun Adejumobi, John Adedapo Ojo, Israel Oluwamayowa Adejumobi, Oluwadare Adepeju Adebisi, Samson Oladayo Ayanlade:

Development of a sorting system for mango fruit varieties using convolutional neural network. 87-99 - Himanshu B. Patel, Devesh C. Jinwala:

Robust link-assessment-based approach for detection and isolation of blackhole attacker in resource constraint internet of things. 100-113 - Haoran Chen, Jiafan Wang, Hongwei Tao, Yinghui Hu, Yanan Du:

A food safety traceability system based on trusted double chain. 114-125
Volume 28, Number 2, 2025
- Soumen Ghosh, Satish Chander:

A precise deep learning-based ECG arrhythmia classification scheme using deep bidirectional capsule network classifier. 127-141 - Samar Ali Shaabeth

, Amina Kadhem, Hassanain Ali Lafta:
Finite element analysis of the liver subjected to non-invasive indirect mechanical loading. 142-150 - Shourya Chambial, Tanisha Pandey, Rishabh Budhia, Balakrushna Tripathy, Anurag Tripathy:

Unlocking the potential of deepfake generation and detection with a hybrid approach. 151-165 - Ye Han, Xiaojie Guo, Tong Li, Xiaotao Liu:

Privacy-preserving SQL queries on cross-organisation databases. 166-171 - S. B. Gurumurthy, Ajit Danti:

Secured forensic image analysis by optimised iterative model with random consensus approaches. 172-184 - C. Ravisheker, Manmohan Sharma

, Santosh Kumar Henge
:
Detection of abusive text on online social networks using ensemble clustering algorithm with heuristic strategy. 185-203 - T. Kanimozhi

, S. Belina V. J. Sara:
Modified glowworm swarm optimisation-based cluster head selection and enhanced energy-efficient clustering protocol for IoT-WSN. 204-218 - Guofeng He, Jianghua Zhu, Yinong Shi, Ke Yan, Xu Zheng:

An explainable botnet detection model based on lightweight graph neural networks. 219-231 - Monika Yadav, Prachi Ahlawat, Vijendra Singh:

A transfer learning approach for adverse drug reactions detection in bio-medical domain based on knowledge graph. 232-245 - Swathi Mummadi, Bhawana Rudra:

Optimisation of quantum circuits using cost effective quantum gates. 246-253
Volume 28, Number 3, 2025
- Houssem Turki

, Mohamed Elleuch, Monji Kherallah, Alima Damak:
Scene text detection using robust masks and cascaded classifiers. 255-266 - Hervé Ducloux:

Solving overhead transmission line engineering problems with elastic catenary equations. 267-277 - Niteesh Kempusagara Ramesh, Vijayakumar Kadappa, Rajeshwari Devi Doddapoojari Veerabhaskar, Divijendranatha Reddy Sirigiri, Pooja Tekal Sreedhar:

Deep learning architectures for detection of acute myeloid leukemia. 278-291 - Shunxiang Zhang, Longhui Hu, Shuyu Li, Wenjie Duan, Xiaolong Wang:

Image-text multimodal sentiment analysis method integrating multi-themes and multi-labels. 292-302 - Afroze Rahman, Anindita Kundu, Sumanta Banerjee:

IQ-RRT*: a path planning algorithm based on informed-RRT* and quick-RRT. 303-313 - Guobing Zou, Chunhua Zeng, Yue Zhu, Pengtao Li, Song Yang, Shengxiang Hu:

MFA: Web API recommendation based on service multiple feature aggregation. 314-328 - Muthalaguraja Venugopal, Kalavathi Palanisamy, Punitha Viswanathan:

Near-lossless medical image compression using wavelet subband thresholding and convolutional autoencoder. 329-345 - Geocey Shejy, Pallavi Vijay Chavan:

Agreement window algorithm for user controlled and utility supported personal data privacy. 346-357 - Chaoyang Shi, Zhen Zhang:

Design of exercise recommendation model based on clustering collaborative filtering adaptability. 358-370
Volume 28, Number 4, 2025
- Ahmed Abdelreheem Khalil, Zaiming Liu:

Hybrid predictive modelling for insurance premium retention: integrating statistical and AI techniques. 371-382 - Farah Abdmeziem, Saïda Boukhedouma, Mourad Chabane Oussalah:

A green pattern-based data encryption solution in the cloud. 383-400 - Dilip Yadav, Nidhi Singh:

Performance analysis and comparison of jelly-fish optimisation-based maximum power point tracking controller for partial shading condition. 401-418 - Razvan Stoleriu, Catalin Negru, Bogdan-Costel Mocanu, Emil-Andrei Constantinescu, Alexandra-Elena Mocanu, Florin Pop:

Scalable malicious URL detection technique for smishing attacks. 419-433 - Huifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li:

EIUAPA: an efficient and imperceptible universal adversarial attack on audio classification models. 434-445 - Jinyuan Li, Linkai Luo:

Constructing stock portfolio with transformer. 446-457 - Xiuju Gao, Chenxing Xia, Xia Chen, Jianhua Cui:

MECNet: multi-modal edge co-guidance network for RGB-D salient object detection. 458-470 - Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang:

A verifiable and secure DNN classification model over encrypted data. 471-485
Volume 28, Number 5, 2025
- Youke Wu:

Social network perspective on false information detection in vehicular ad hoc networks: combining spatial inference with historical behaviour analysis. 487-497 - B. Aarthi, Balika J. Chelliah:

Multilingual language classification model for offensive comments categorisation in social media using HAMMC tree search with enhanced optimisation technique. 498-514 - Aditya Kumar, Jainath Yadav:

Enhancing multi-view ensemble learning with zig-zag pattern-based feature set partitioning. 515-529 - Meng Li, Xinqiao Su, Lu Jia, Rongbo You:

GraphBiGRU model for anti-money laundering based on preference-based reinforcement learning via the label filtering loop mechanism. 530-542 - Arundhati Sahoo, Asis Kumar Tripathy:

Efficient traffic management in the internet of vehicles through enhanced routing and deep learning. 543-553 - M. Kavitha, M. Kasthuri:

ADBSCSL: adaptive DBSCAN-SMOTE with cost-sensitive learning to enhance diagnostic accuracy for imbalanced medical datasets. 554-570 - Yousra Angague, Hadil Sahraoui, Chahrazed Benrebbouh, Houssem Mansouri, Al-Sakib Khan Pathan

:
A secure consensus mechanism for IoT-based energy internet using post-quantum blockchain. 571-584 - Qinghua Xu, Jiankang Shen, Meng Gao:

Air pollution prediction by using long-short-term memory neural network. 585-594
Volume 28, Number 7, 2025
- Zaka Ul-Mustafa, Muhammad Amir, Manal Mustafa, Muhammad Adnan Anwar

:
Harmony amidst division: leveraging genetic algorithms to counteract polarisation in online platforms. 1-17
Volume 28, Number 8, 2025
- Zhizhong Chen, Zhihang Wang, Xue Hui Xing, Tao Kuai:

Rotation-invariant 3D convolutional neural networks for 6D object pose estimation. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














