


default search action
International Journal of Computational Science and Engineering, Volume 23
Volume 23, Number 1, 2020
- Xiaoyan Guo, Ming Zhang:

Image of plant disease segmentation model based on improved pulse-coupled neural network. 1-9 - Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin:

An improved Sudoku-based data hiding scheme using greedy method. 10-21 - Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:

DDoS attack detection method based on network abnormal behaviour in big data environment. 22-30 - Wencong Lai, Abdul A. Khan:

A parallel adaptive-resolution hydraulic flood inundation model for flood hazard mapping. 31-41 - Yuan Chen, Dongmei Han, Lihua Xia

:
A hidden Markov model to characterise motivation level in MOOCs learning. 42-49 - Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:

Greedy algorithm for image quality optimisation based on turtle-shell steganography. 50-62 - Yuhui Liu, Hecheng Li, Huafei Chen, Jing Huang:

An efficient memetic algorithm using approximation scheme for solving nonlinear integer bilevel programming problems. 63-73 - Ze Zheng, Xiangfeng Luo, Hao Wang:

MESRG: multi-entity summarisation in RDF graph. 74-81 - Xiaoxue Ma, Pengliang Shi:

Dynamic multiple copies adaptive audit scheme based on DITS. 82-90 - Gustavo Mendes Platt, Fran Sérgio Lobato, Gustavo Barbosa Libotte, Francisco Duarte Moura Neto:

Basins of attraction and critical curves for Newton-type methods in a phase equilibrium problem. 91-102
Volume 23, Number 2, 2020
- Qingqing Chang:

The sentiments of open financial information, public mood and stock returns: an empirical study on Chinese growth enterprise market. 103-114 - Zhongliang Wei, Guangli Zhu, Xingzhu Liang

, Wenjuan Liu:
An image fusion dehazing algorithm based on dark channel prior and retinex. 115-123 - Kensaku Hayashi, Alexander Vazhenin, Andrey Marchuk:

Distributed nested streamed models of tsunami waves. 124-135 - Huan Zhao, Jian Lu, Jie Cao:

A short text conversation generation model combining BERT and context attention mechanism. 136-144 - Ying Xie, Guohua Tian, Haoran Yuan, Chong Jiang

, Jianfeng Wang
:
Client-side ciphertext deduplication scheme with flexible access control. 145-157 - Guobing Zou, Hao Wu, Song Yang, Ming Jiang, Bofeng Zhang, Yanglan Gan:

LMA: label-based multi-head attentive model for long-tail web service classification. 158-168 - Zeyu Chen, Xiangfeng Luo, Yan Sun:

Synthetic data augmentation rules for maritime object detection. 169-176 - Guang Sun, Hongzhang Lv

, Wangdong Jiang, Fenghua Li:
General process of big data analysis and visualisation. 177-184 - Kui Gao, Yang Liu, Heyang Xu, Tingting Han:

Design and implementation of food supply chain traceability system based on Hyperledger Fabric. 185-193 - Xiaohong Shi, Xiangping Chen, Yongsheng Rao, Kaiyuan Li, Zhensheng Xu, Jingzhong Zhang:

Automatic recommendation of user interface examples for mobile app development. 194-204
Volume 23, Number 3, 2020
- Guangli Zhu, Qiaoyun Wang, Hanran Liu, Shunxiang Zhang:

The mining method of trigger word for food nutrition matching. 205-213 - Zhuoyi Tan

, Yuping Hu, Dongjun Luo, Man Hu, Kaihang Liu:
The clothing image classification algorithm based on the improved Xception model. 214-223 - Zhaohui Ma, Bohong Li:

A DDoS attack detection method based on SVM and K-nearest neighbour in SDN environment. 224-234 - Maria Rizzi, Matteo D'Aloia, Annalisa Longo:

Digital watermarking for healthcare: a survey of ECG watermarking methods in telemedicine. 235-249 - Hongfan Ye, Buqing Cao, Jinkun Geng, Yiping Wen:

Web services classification via combining Doc2Vec and LINE model. 250-261 - Alekha Kumar Mishra, Maitreyee Sinha, Asis Kumar Tripathy

:
A sinkhole prevention mechanism for RPL in IoT. 262-270 - Yusha Zhang, Xiaoming Lu, Yingwen Fu, Shengyi Jiang:

A comparative linguistic analysis of English news headlines in China, USA, UK, and ASEAN countries. 271-285 - Arko Banerjee

, Arun K. Pujari, Bibudhendu Pati, Chhabi Rani Panigrahi:
A new unsupervised method for boundary perception and word-like segmentation of sequence. 286-295 - Gaifang Xin, Jun Zhu, Chengming Luo, Jing Tang, Wei Li:

Wireless energy consumption optimisation using node coverage controlling in linear-type network. 296-305
Volume 23, Number 4, 2020
- Hao Guo, Shengsheng Wang, Yinan Lu:

Real-time segmentation of weeds in cornfields based on depthwise separable convolution residual network. 307-318 - Anil Kumar

, Basavaraj Talawar:
ELBA-NoC: ensemble learning-based accelerator for 2D and 3D network-on-chip architectures. 319-335 - Ji-Hwei Horng

, Xiao-Zhu Xie, Chin-Chen Chang:
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix. 336-340 - Yifan Wang, Yunling Wang, Jianfeng Wang

:
Efficient self-adaptive access control for personal medical data in emergency setting. 341-351 - Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo

, Sokol Kosta
, Francisco Airton Silva:
Edge servers placement in mobile edge computing using stochastic Petri nets. 352-366 - Muthusamy Boopathi, Sujatha Ramalingam, Senthil Kumar Chandran:

Application of particle swarm optimisation for coverage estimation in software testing. 367-380 - Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi

:
Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme. 381-395 - Arati Mohapatro, S. K. Mahendran, Tapan Kumar Das:

A knowledge elicitation framework in ranking healthcare providers using rough set with formal concept analysis. 396-407

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














