default search action
International Journal of Computational Science and Engineering, Volume 23
Volume 23, Number 1, 2020
- Xiaoyan Guo, Ming Zhang:
Image of plant disease segmentation model based on improved pulse-coupled neural network. 1-9 - Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin:
An improved Sudoku-based data hiding scheme using greedy method. 10-21 - Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:
DDoS attack detection method based on network abnormal behaviour in big data environment. 22-30 - Wencong Lai, Abdul A. Khan:
A parallel adaptive-resolution hydraulic flood inundation model for flood hazard mapping. 31-41 - Yuan Chen, Dongmei Han, Lihua Xia:
A hidden Markov model to characterise motivation level in MOOCs learning. 42-49 - Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:
Greedy algorithm for image quality optimisation based on turtle-shell steganography. 50-62 - Yuhui Liu, Hecheng Li, Huafei Chen, Jing Huang:
An efficient memetic algorithm using approximation scheme for solving nonlinear integer bilevel programming problems. 63-73 - Ze Zheng, Xiangfeng Luo, Hao Wang:
MESRG: multi-entity summarisation in RDF graph. 74-81 - Xiaoxue Ma, Pengliang Shi:
Dynamic multiple copies adaptive audit scheme based on DITS. 82-90 - Gustavo Mendes Platt, Fran Sérgio Lobato, Gustavo Barbosa Libotte, Francisco Duarte Moura Neto:
Basins of attraction and critical curves for Newton-type methods in a phase equilibrium problem. 91-102
Volume 23, Number 2, 2020
- Qingqing Chang:
The sentiments of open financial information, public mood and stock returns: an empirical study on Chinese growth enterprise market. 103-114 - Zhongliang Wei, Guangli Zhu, Xingzhu Liang, Wenjuan Liu:
An image fusion dehazing algorithm based on dark channel prior and retinex. 115-123 - Kensaku Hayashi, Alexander Vazhenin, Andrey Marchuk:
Distributed nested streamed models of tsunami waves. 124-135 - Huan Zhao, Jian Lu, Jie Cao:
A short text conversation generation model combining BERT and context attention mechanism. 136-144 - Ying Xie, Guohua Tian, Haoran Yuan, Chong Jiang, Jianfeng Wang:
Client-side ciphertext deduplication scheme with flexible access control. 145-157 - Guobing Zou, Hao Wu, Song Yang, Ming Jiang, Bofeng Zhang, Yanglan Gan:
LMA: label-based multi-head attentive model for long-tail web service classification. 158-168 - Zeyu Chen, Xiangfeng Luo, Yan Sun:
Synthetic data augmentation rules for maritime object detection. 169-176 - Guang Sun, Hongzhang Lv, Wangdong Jiang, Fenghua Li:
General process of big data analysis and visualisation. 177-184 - Kui Gao, Yang Liu, Heyang Xu, Tingting Han:
Design and implementation of food supply chain traceability system based on Hyperledger Fabric. 185-193 - Xiaohong Shi, Xiangping Chen, Yongsheng Rao, Kaiyuan Li, Zhensheng Xu, Jingzhong Zhang:
Automatic recommendation of user interface examples for mobile app development. 194-204
Volume 23, Number 3, 2020
- Guangli Zhu, Qiaoyun Wang, Hanran Liu, Shunxiang Zhang:
The mining method of trigger word for food nutrition matching. 205-213 - Zhuoyi Tan, Yuping Hu, Dongjun Luo, Man Hu, Kaihang Liu:
The clothing image classification algorithm based on the improved Xception model. 214-223 - Zhaohui Ma, Bohong Li:
A DDoS attack detection method based on SVM and K-nearest neighbour in SDN environment. 224-234 - Maria Rizzi, Matteo D'Aloia, Annalisa Longo:
Digital watermarking for healthcare: a survey of ECG watermarking methods in telemedicine. 235-249 - Hongfan Ye, Buqing Cao, Jinkun Geng, Yiping Wen:
Web services classification via combining Doc2Vec and LINE model. 250-261 - Alekha Kumar Mishra, Maitreyee Sinha, Asis Kumar Tripathy:
A sinkhole prevention mechanism for RPL in IoT. 262-270 - Yusha Zhang, Xiaoming Lu, Yingwen Fu, Shengyi Jiang:
A comparative linguistic analysis of English news headlines in China, USA, UK, and ASEAN countries. 271-285 - Arko Banerjee, Arun K. Pujari, Bibudhendu Pati, Chhabi Rani Panigrahi:
A new unsupervised method for boundary perception and word-like segmentation of sequence. 286-295 - Gaifang Xin, Jun Zhu, Chengming Luo, Jing Tang, Wei Li:
Wireless energy consumption optimisation using node coverage controlling in linear-type network. 296-305
Volume 23, Number 4, 2020
- Hao Guo, Shengsheng Wang, Yinan Lu:
Real-time segmentation of weeds in cornfields based on depthwise separable convolution residual network. 307-318 - Anil Kumar, Basavaraj Talawar:
ELBA-NoC: ensemble learning-based accelerator for 2D and 3D network-on-chip architectures. 319-335 - Ji-Hwei Horng, Xiao-Zhu Xie, Chin-Chen Chang:
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix. 336-340 - Yifan Wang, Yunling Wang, Jianfeng Wang:
Efficient self-adaptive access control for personal medical data in emergency setting. 341-351 - Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo, Sokol Kosta, Francisco Airton Silva:
Edge servers placement in mobile edge computing using stochastic Petri nets. 352-366 - Muthusamy Boopathi, Sujatha Ramalingam, Senthil Kumar Chandran:
Application of particle swarm optimisation for coverage estimation in software testing. 367-380 - Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi:
Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme. 381-395 - Arati Mohapatro, S. K. Mahendran, Tapan Kumar Das:
A knowledge elicitation framework in ranking healthcare providers using rough set with formal concept analysis. 396-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.