


default search action
International Journal of Computational Science and Engineering, Volume 18
Volume 18, Number 1, 2019
- Yang Sun, Lin Teng

, Shoulin Yin
, Hang Li:
A new wolf colony search algorithm based on search strategy for solving travelling salesman problem. 1-11 - Jing Yu, Hang Li, Shoulin Yin

:
New intelligent interface study based on K-means gaze tracking. 12-20 - Xiao-Yu Huang, Xian-Hong Xiang:

The wisdom of the few: a provable approach. 21-28 - Yu Ma, Zhikui Chen, Xiru Qiu, Liang Zhao:

Robust and graph regularised non-negative matrix factorisation for heterogeneous co-transfer clustering. 29-38 - Jianyong Xue, Kehe Wu, Yan Zhou:

A risk analysis and prediction model of electric power GIS based on deep learning. 39-43 - Weiyang Wang, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:

CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre. 44-53 - Huaping Guo, Tao Wei:

Logistic regression for imbalanced learning based on clustering. 54-64 - Zhonghe He, Zhongcheng Zhou, Liang Gan, Jiuming Huang, Yan Zeng:

Chinese entity attributes extraction based on bidirectional LSTM networks. 65-71 - Yasser Moussa Berghout, Hammadi Bennoui:

Distributed diagnosis based on distributed probability propagation nets. 72-79 - Ahlem Melouah, Soumia Layachi:

Novel automatic seed selection approach for mass detection in mammograms. 80-88 - Yanan Zhang, Guisheng Yin, Deyun Chen:

A dynamic cold-start recommendation method based on incremental graph pattern matching. 89-100
Volume 18, Number 2, 2019
- V. Tejaswi, P. V. Bindu, P. Santhi Thilagam

:
Influence maximisation in social networks. 103-117 - Anjali Gautam, Punam Bedi

:
FS-CARS: fast and scalable context-aware news recommender system using tensor factorisation. 118-129 - Sujay Saha, Anupam Ghosh

, Saikat Bandopadhyay
, Kashi Nath Dey:
Missing value imputation in DNA microarray gene expression data: a comparative study of an improved collaborative filtering method with decision tree based approach. 130-139 - Sourav Pramanik, Debotosh Bhattacharjee

, Mita Nasipuri:
Breast abnormality detection using combined texture and vascular features. 140-153 - Sambit Kumar Mishra, Md Akram Khan, Sampa Sahoo

, Bibhudatta Sahoo
:
Allocation of energy-efficient task in cloud using DVFS. 154-163 - Cheng-Huang Tung, Wei-Jyun Syu, Wei-Cheng Huang:

Hough transform-based cubic spline recognition for natural shapes. 164-175 - Xiaona Xia, Zheng Qin, Jiguo Yu, Lianyong Qi:

Personalised service recommendation process based on service clustering. 176-185 - Xinyan Zhang, Keqiu Li, Yong Zhang:

Optimising data access latencies of virtual machine placement based on greedy algorithm in datacentre. 186-194 - Chiung-Lin Chiu, You-Shyang Chen:

An empirical study of disclosure effects in listed biotechnology and medicine industry using MLR model. 195-200 - Jingjin Li, Qingkui Chen, Bocheng Liu:

A static analytical performance model for GPU kernel. 201-210
Volume 18, Number 3, 2019
- Bo Liu, Xi Huang, Xiaoguang Liu, Gang Wang, Ming Xu:

A universal compression strategy using sorting transformation. 211-216 - Yuanyuan Fan, Qingzhong Liang, Yunsong Chen, Xuesong Yan:

Executing time and cost-aware task scheduling in hybrid cloud using a modified DE algorithm. 217-226 - Lingge Sui, Lan Huang:

Modelling and simulation research of vehicle engines based on computational intelligence methods. 227-239 - Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

Institution-based UML activity diagram transformation with semantic preservation. 240-251 - Jiali Lin, Jiachen Li, Dazhi Jiang, Kangshun Li:

A novel rural microcredit decision model and solving via binary differential evolution algorithm. 252-260 - Xiaoyun Xia

, Xinsheng Lai, Chenfu Yi:
The analysis of evolutionary optimisation on the TSP(1, 2) problem. 261-268 - Yunxia Liu, Zhaobin Liu, Zhiyang Li:

Q-grams-imp: an improved q-grams algorithm aimed at edit similarity join. 269-278 - Qingzhong Liang, Yuanyuan Fan, Xuesong Yan, Ye Yan:

An algorithm based on differential evolution for satellite data transmission scheduling. 279-285 - Mingqiang Yin, Dan Sun, Hui Sun:

Dynamic load balance strategy for parallel rendering based on deferred shading. 286-293 - Fang Huang, Zhili Zhou, Ching-Nung Yang, Xiya Liu, Tao Wang:

Original image tracing with image relational graph for near-duplicate image elimination. 294-304 - Yangen Liu, Zhangjie Fu:

Secure search service based on word2vec in the public cloud. 305-313 - Yonghui Dai

, Guowei Li, Bo Xu:
Study on learning resource authentication in MOOCs based on blockchain. 314-320
Volume 18, Number 4, 2019
- Yu Zhang, Yan-ping Bai, Manchao He, Zhao-Yong Lv, Yongzhen Li:

Big data automatic analysis system and its applications in rockburst experiment. 321-331 - Hui Shen, Dehua Li, Hong Wu, Zhaoxiang Zang:

Training auto-encoders effectively via eliminating task-irrelevant input variables. 332-339 - Ming-Yu Huang, Yu-Mei Liu:

Model checking software product lines based on feature slicing. 340-348 - Xiang Yu, Hui Wang, Hui Sun:

Decomposition-based multi-objective comprehensive learning particle swarm optimisation. 349-360 - Yubin Zhang, Zhengying Wei, Lei Zhang, Jun Du:

Applicability evaluation of different algorithms for daily reference evapotranspiration model in KBE system. 361-374 - Shan Pang, Xinyi Yang:

Multi hidden layer extreme learning machine optimised with batch intrinsic plasticity. 375-382 - Zhaolu Guo, Jinxiao Shi, Xiaofeng Xiong, Xiaoyun Xia, Xiaosheng Liu:

Chaotic artificial bee colony with elite opposition-based learning. 383-390 - Hui Li, Xifang Zhu, Chang-bo Liu:

Numerical simulations of electromagnetic wave logging instrument response based on self-adaptive hp finite element method. 391-403 - Soumaya Cherichi, Rim Faiz:

Upgrading event and pattern detection to big data. 404-412 - Sharon Moses J, M. Nirmala, Ebin Deni Raj:

A security ensemble framework for securing the file in cloud computing environments. 413-423 - Wassila Guendouzi, Abdelmadjid Boukra:

A Manhattan distance-based binary bat algorithm vs. integer ant colony optimisation for intrusion detection in the audit trails. 424-437 - Noorkholis Luthfil Hakim

, Shih-Wei Sun, Mu-Hsen Hsu, Timothy K. Shih, Shih-Jung Wu:
Virtual guitar: using real-time finger tracking for musical instruments. 438-450 - Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto

, Carlos Henrique Gomes Ferreira, Bruno Guazzelli Batista, Danilo Costa Marim Segura, Marcos José Santana, Regina Helena Carlucci Santana:
A cloud computing price model based on virtual machine performance degradation. 451-463

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














