


default search action
Journal of Computational Science, Volume 25
Volume 25, March 2018
- Zhou He
, Jichang Dong, Lean Yu:
An agent-based model for investigating the impact of distorted supply-demand information on China's resale housing market. 1-15 - Ji Lin
, Chein-Shan Liu, Wen Chen, Linlin Sun
:
A novel Trefftz method for solving the multi-dimensional direct and Cauchy problems of Laplace equation in an arbitrary domain. 16-27 - Rajeev Kumar Goel, Raman Maini
:
A hybrid of ant colony and firefly algorithms (HAFA) for solving vehicle routing problems. 28-37 - Zijian Cao, Lei Wang, Xinhong Hei:
A global-best guided phase based optimization algorithm for scalable optimization problems and its application. 38-49
- Zhuqing Jiao, Kai Ma, Yiling Rong, Peng Wang, Hongkai Zhang, Shuihua Wang
:
A path planning method using adaptive polymorphic ant colony algorithm for smart wheelchairs. 50-57 - Ching-Hsue Cheng
, You-Shyang Chen, Arun Kumar Sangaiah
, Jieh-Ren Chang, Ting-Yu Wang:
Lessoning travelers' motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model. 58-75 - Mónica Denham, Karina Laneri
:
Using efficient parallelization in Graphic Processing Units to parameterize stochastic fire propagation models. 76-88 - Jifu Tan
, Talid Sinno
, Scott L. Diamond:
A parallel fluid-solid coupling model using LAMMPS and Palabos based on the immersed boundary method. 89-100 - Marco Viceconti
, Simone Bnà
, Daniele Tartarini, Stelios Sfakianakis
, James A. Grogan
, Dawn C. Walker, Samuel Gamble, Debora Testi:
VPH-HF: A software framework for the execution of complex subject-specific physiology modelling workflows. 101-114
- Pawel S. Jung
, Katarzyna Rutkowska
, Miroslaw A. Karpierz
:
Evanescent field boundary conditions for modelling of light propagation. 115-121 - Mohammad Sattari, Kamran Zamanifar:
A cascade information diffusion based label propagation algorithm for community detection in dynamic social networks. 122-133 - Jorge González-Domínguez
, Christian Hundt, Bertil Schmidt
:
parSRA: A framework for the parallel execution of short read aligners on compute clusters. 134-139 - Sandra Catalán
, José R. Herrero, Francisco D. Igual
, Rafael Rodríguez-Sánchez
, Enrique S. Quintana-Ortí
, Chris Adeniyi-Jones:
Multi-threaded dense linear algebra libraries for low-power asymmetric multicore processors. 140-151 - Shadi A. Aljawarneh
, Monther Aldwairi
, Muneer O. Bani Yassein
:
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. 152-160 - Yanhui Zhai, Deyu Li
, Jing Zhang:
Variable decision knowledge representation: A logical description. 161-169 - Fan Min
, Zhi-Heng Zhang, Ji Dong:
Ant colony optimization with partial-complete searching for attribute reduction. 170-182 - Yongquan Yan, Ping Guo
, Bin Cheng, Zhigao Zheng:
An experimental case study on the relationship between workload and resource consumption in a commercial web server. 183-192 - Xiao Sun
, Chen Zhang, Guoqiang Li, Daniel Sun, Fuji Ren, Albert Y. Zomaya
, Rajiv Ranjan
:
Detecting users' anomalous emotion using social media for business intelligence. 193-200
- Shishir Kumar, Prabhat Mahanti, Su-Jing Wang:
Intelligent computational techniques. 201-203 - Surya Kant
, Tripti Mahara
:
Nearest biclusters collaborative filtering framework with fusion. 204-212 - Nidhi Gupta
, Pushpraj Bhatele, Pritee Khanna
:
Identification of Gliomas from brain MRI through adaptive segmentation and run length of centralized patterns. 213-220 - Abir Smiti, Zied Elouedi:
SCBM: soft case base maintenance method based on competence model. 221-227 - Thin Nguyen
, Svetha Venkatesh, Dinh Q. Phung
:
Academia versus social media: A psycho-linguistic analysis. 228-237 - Om Prakash Verma
, Gaurav Manik
, Vinay Kumar Jain:
Simulation and control of a complex nonlinear dynamic behavior of multi-stage evaporator using PID and Fuzzy-PID controllers. 238-251 - Deepak Kumar Jain, Surendra Bilouhan Dubey, Rishin Kumar Choubey, Amit Sinhal
, Siddharth Kumar Arjaria
, Amar Jain, Haoxiang Wang:
An approach for hyperspectral image classification by optimizing SVM using self organizing map. 252-259 - Yiannis Kokkinos, Konstantinos G. Margaritis:
Simulating parallel scalable probabilistic neural networks via exemplar selection and EM in a ring pipeline. 260-279 - Isma Hamid, Yu Wu, Qamar Nawaz, Runqian Zhao:
A fast heuristic detection algorithm for visualizing structure of large community. 280-288 - Xitong Jia, Xianye Ben, Hui Yuan, Kidiyo Kpalma, Weixiao Meng:
Macro-to-micro transformation model for micro-expression recognition. 289-297 - Srikanth Reddy K, Lokesh Kumar Panwar, Bijaya K. Panigrahi, Rajesh Kumar
:
Solution to unit commitment in power system operation planning using binary coded modified moth flame optimization algorithm (BMMFOA): A flame selection based computational technique. 298-317 - Wen-Jing Yan, Yu-Hsin Chen:
Measuring dynamic micro-expressions via feature extraction methods. 318-326 - Yee Ming Chen, Chi-Shun Hsueh, Chu-Kai Wang, Tai-Yi Wu:
Decision fusion using fuzzy threshold scheme for target detection in sensor networks. 327-338 - Mohamed Elhoseny
, Alaa Tharwat, Aboul Ella Hassanien
:
Bezier Curve Based Path Planning in a Dynamic Field using Modified Genetic Algorithm. 339-350 - O. K. Sikha, S. Sachin Kumar
, K. P. Soman
:
Salient region detection and object segmentation in color images using dynamic mode decomposition. 351-366 - Sapan Kumar Das, S. A. Edalatpanah
, Tarni Mandal:
A proposed model for solving fuzzy linear fractional programming problem: Numerical Point of View. 367-375 - Ahmed M. Anter
, Aboul Ella Hassenian:
Computational intelligence optimization approach based on particle swarm optimizer and neutrosophic set for abdominal CT liver tumor segmentation. 376-387 - Amit Kumar Srivastava, Shishir Kumar:
An effective computational technique for taxonomic position of security vulnerability in software development. 388-396 - Deepak Kumar Jain, Neha Jain, Shishir Kumar, Amit Kumar, Raj Kumar
, Haoxiang Wang:
An approach for behavior analysis using correlation spectral embedding method. 397-405 - Vinay Kumar Jain, Shishir Kumar:
Effective surveillance and predictive mapping of mosquito-borne diseases using social media. 406-415
- Gerhard-Wilhelm Weber
, Pandian Vasant, Jose Antonio Marmolejo Saucedo
:
Computer science and engineering. 416-418 - Ivan A. Matveev
, Vladimir P. Novik, Igor S. Litvinchev
:
Influence of degrading factors on the optimal spatial and spectral features of biometric templates. 419-424 - Helio Yochihiro Fuchigami, Socorro Rangel
:
A survey of case studies in production scheduling: Analysis and perspectives. 425-436 - Ivan Zelinka
, Lukas Tomaszek
, Pandian Vasant
, Tran Trong Dao
, Duy Võ Hoàng:
A novel approach on evolutionary dynamics analysis - A progress report. 437-445 - Laurent Beaudou, Kaoutar Ghazi, Giacomo Kahn, Olivier Raynaud, Eric Thierry:
Encoding partial orders through modular decomposition. 446-455 - Laith Mohammad Abualigah
, Ahamad Tajudin Khader, Essam Said Hanandeh:
A new feature selection method to improve the document clustering using particle swarm optimization algorithm. 456-466 - Abdulghani Ali Ahmed, Mohammed Falah Mohammed
:
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network. 467-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.