


default search action
International Journal of Computational Science and Engineering, Volume 28
Volume 28, Number 1, 2025
- Meijiao Zhang, Lan Yang, Weiping Jiang, Gejing Xu, Guoliang Hu:
A novel fertility intention prediction scheme based on Naive Bayes. 1-9 - Sharad Nigam
, Divya Kumar:
A predictive model based on the LSTM technique for the maintenance of railway track system. 10-20 - Hua Yin, Zhiquan Chen:
A new binary tagging-based model integrated with unsupervised tree hierarchy for relational triple extraction. 21-31 - Himansu Das, Muskan, Hrishikesh Kumar
:
Feature selection using Tasmanian devil optimisation algorithm for software fault prediction. 32-55 - Vaishnavee Vijay Rathod, Dipti P. Rana, Rupa G. Mehta:
Black widow optimisation with deep learning-based feature fusion model for remote sensing image analysis. 56-70 - Meng Cai, XiChao Wang, Baojiang Li, Haiyan Wang, XiangQing Dong, Guochu Chen:
Behaviour recognition system of underground drilling operators based on MA-STGCN. 71-86 - Philip Oluwaseun Adejumobi, John Adedapo Ojo, Israel Oluwamayowa Adejumobi, Oluwadare Adepeju Adebisi, Samson Oladayo Ayanlade:
Development of a sorting system for mango fruit varieties using convolutional neural network. 87-99 - Himanshu B. Patel, Devesh C. Jinwala:
Robust link-assessment-based approach for detection and isolation of blackhole attacker in resource constraint internet of things. 100-113 - Haoran Chen, Jiafan Wang, Hongwei Tao, Yinghui Hu, Yanan Du:
A food safety traceability system based on trusted double chain. 114-125
Volume 28, Number 2, 2025
- Soumen Ghosh, Satish Chander:
A precise deep learning-based ECG arrhythmia classification scheme using deep bidirectional capsule network classifier. 127-141 - Samar Ali Shaabeth
, Amina Kadhem, Hassanain Ali Lafta:
Finite element analysis of the liver subjected to non-invasive indirect mechanical loading. 142-150 - Shourya Chambial, Tanisha Pandey, Rishabh Budhia, Balakrushna Tripathy, Anurag Tripathy:
Unlocking the potential of deepfake generation and detection with a hybrid approach. 151-165 - Ye Han, Xiaojie Guo, Tong Li, Xiaotao Liu:
Privacy-preserving SQL queries on cross-organisation databases. 166-171 - S. B. Gurumurthy, Ajit Danti:
Secured forensic image analysis by optimised iterative model with random consensus approaches. 172-184 - C. Ravisheker, Manmohan Sharma, Santosh Kumar Henge
:
Detection of abusive text on online social networks using ensemble clustering algorithm with heuristic strategy. 185-203 - T. Kanimozhi, S. Belina V. J. Sara:
Modified glowworm swarm optimisation-based cluster head selection and enhanced energy-efficient clustering protocol for IoT-WSN. 204-218 - Guofeng He, Jianghua Zhu, Yinong Shi, Ke Yan, Xu Zheng:
An explainable botnet detection model based on lightweight graph neural networks. 219-231 - Monika Yadav, Prachi Ahlawat, Vijendra Singh:
A transfer learning approach for adverse drug reactions detection in bio-medical domain based on knowledge graph. 232-245 - Swathi Mummadi, Bhawana Rudra:
Optimisation of quantum circuits using cost effective quantum gates. 246-253
Volume 28, Number 3, 2025
- Houssem Turki, Mohamed Elleuch, Monji Kherallah, Alima Damak:
Scene text detection using robust masks and cascaded classifiers. 255-266 - Hervé Ducloux:
Solving overhead transmission line engineering problems with elastic catenary equations. 267-277 - Niteesh Kempusagara Ramesh, Vijayakumar Kadappa, Rajeshwari Devi Doddapoojari Veerabhaskar, Divijendranatha Reddy Sirigiri, Pooja Tekal Sreedhar:
Deep learning architectures for detection of acute myeloid leukemia. 278-291 - Shunxiang Zhang, Longhui Hu, Shuyu Li, Wenjie Duan, Xiaolong Wang:
Image-text multimodal sentiment analysis method integrating multi-themes and multi-labels. 292-302 - Afroze Rahman, Anindita Kundu, Sumanta Banerjee:
IQ-RRT*: a path planning algorithm based on informed-RRT* and quick-RRT. 303-313 - Guobing Zou, Chunhua Zeng, Yue Zhu, Pengtao Li, Song Yang, Shengxiang Hu:
MFA: Web API recommendation based on service multiple feature aggregation. 314-328 - Muthalaguraja Venugopal, Kalavathi Palanisamy, Punitha Viswanathan:
Near-lossless medical image compression using wavelet subband thresholding and convolutional autoencoder. 329-345 - Geocey Shejy, Pallavi Vijay Chavan:
Agreement window algorithm for user controlled and utility supported personal data privacy. 346-357 - Chaoyang Shi, Zhen Zhang:
Design of exercise recommendation model based on clustering collaborative filtering adaptability. 358-370
Volume 28, Number 7, 2025
- Zaka Ul-Mustafa, Muhammad Amir, Manal Mustafa, Muhammad Adnan Anwar:
Harmony amidst division: leveraging genetic algorithms to counteract polarisation in online platforms. 1-17
Volume 28, Number 8, 2025
- Zhizhong Chen, Zhihang Wang, Xue Hui Xing, Tao Kuai:
Rotation-invariant 3D convolutional neural networks for 6D object pose estimation. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.