International Journal of Computational Science and Engineering, Volume 18 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 18, Number 1, 2019

Yang Sun, Lin Teng
, Shoulin Yin
, Hang Li:
A new wolf colony search algorithm based on search strategy for solving travelling salesman problem. 1-11

Jing Yu, Hang Li, Shoulin Yin
:
New intelligent interface study based on K-means gaze tracking. 12-20

Xiao-Yu Huang, Xian-Hong Xiang:
The wisdom of the few: a provable approach. 21-28

Yu Ma, Zhikui Chen, Xiru Qiu, Liang Zhao:
Robust and graph regularised non-negative matrix factorisation for heterogeneous co-transfer clustering. 29-38

Jianyong Xue, Kehe Wu, Yan Zhou:
A risk analysis and prediction model of electric power GIS based on deep learning. 39-43

Weiyang Wang, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre. 44-53

Huaping Guo, Tao Wei:
Logistic regression for imbalanced learning based on clustering. 54-64

Zhonghe He, Zhongcheng Zhou, Liang Gan, Jiuming Huang, Yan Zeng:
Chinese entity attributes extraction based on bidirectional LSTM networks. 65-71

Yasser Moussa Berghout, Hammadi Bennoui:
Distributed diagnosis based on distributed probability propagation nets. 72-79

Ahlem Melouah, Soumia Layachi:
Novel automatic seed selection approach for mass detection in mammograms. 80-88

Yanan Zhang, Guisheng Yin, Deyun Chen:
A dynamic cold-start recommendation method based on incremental graph pattern matching. 89-100
Volume 18, Number 2, 2019

V. Tejaswi, P. V. Bindu, P. Santhi Thilagam
:
Influence maximisation in social networks. 103-117

Anjali Gautam, Punam Bedi
:
FS-CARS: fast and scalable context-aware news recommender system using tensor factorisation. 118-129

Sujay Saha, Anupam Ghosh
, Saikat Bandopadhyay
, Kashi Nath Dey:
Missing value imputation in DNA microarray gene expression data: a comparative study of an improved collaborative filtering method with decision tree based approach. 130-139

Sourav Pramanik, Debotosh Bhattacharjee
, Mita Nasipuri:
Breast abnormality detection using combined texture and vascular features. 140-153

Sambit Kumar Mishra
, Md Akram Khan, Sampa Sahoo
, Bibhudatta Sahoo
:
Allocation of energy-efficient task in cloud using DVFS. 154-163

Cheng-Huang Tung, Wei-Jyun Syu, Wei-Cheng Huang:
Hough transform-based cubic spline recognition for natural shapes. 164-175

Xiaona Xia, Zheng Qin, Jiguo Yu, Lianyong Qi:
Personalised service recommendation process based on service clustering. 176-185

Xinyan Zhang, Keqiu Li, Yong Zhang:
Optimising data access latencies of virtual machine placement based on greedy algorithm in datacentre. 186-194

Chiung-Lin Chiu, You-Shyang Chen:
An empirical study of disclosure effects in listed biotechnology and medicine industry using MLR model. 195-200

Jingjin Li, Qingkui Chen, Bocheng Liu:
A static analytical performance model for GPU kernel. 201-210
Volume 18, Number 3, 2019

Bo Liu, Xi Huang, Xiaoguang Liu, Gang Wang, Ming Xu:
A universal compression strategy using sorting transformation. 211-216

Yuanyuan Fan, Qingzhong Liang, Yunsong Chen, Xuesong Yan:
Executing time and cost-aware task scheduling in hybrid cloud using a modified DE algorithm. 217-226

Lingge Sui, Lan Huang
:
Modelling and simulation research of vehicle engines based on computational intelligence methods. 227-239

Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Institution-based UML activity diagram transformation with semantic preservation. 240-251

Jiali Lin, Jiachen Li, Dazhi Jiang, Kangshun Li:
A novel rural microcredit decision model and solving via binary differential evolution algorithm. 252-260

Xiaoyun Xia
, Xinsheng Lai, Chenfu Yi:
The analysis of evolutionary optimisation on the TSP(1, 2) problem. 261-268

Yunxia Liu, Zhaobin Liu, Zhiyang Li:
Q-grams-imp: an improved q-grams algorithm aimed at edit similarity join. 269-278

Qingzhong Liang, Yuanyuan Fan, Xuesong Yan, Ye Yan:
An algorithm based on differential evolution for satellite data transmission scheduling. 279-285

Mingqiang Yin, Dan Sun, Hui Sun:
Dynamic load balance strategy for parallel rendering based on deferred shading. 286-293

Fang Huang, Zhili Zhou, Ching-Nung Yang, Xiya Liu, Tao Wang:
Original image tracing with image relational graph for near-duplicate image elimination. 294-304

Yangen Liu, Zhangjie Fu:
Secure search service based on word2vec in the public cloud. 305-313

Yonghui Dai
, Guowei Li, Bo Xu:
Study on learning resource authentication in MOOCs based on blockchain. 314-320
Volume 18, Number 4, 2019

Yu Zhang, Yan-ping Bai, Manchao He, Zhao-Yong Lv, Yongzhen Li:
Big data automatic analysis system and its applications in rockburst experiment. 321-331

Hui Shen, Dehua Li, Hong Wu, Zhaoxiang Zang:
Training auto-encoders effectively via eliminating task-irrelevant input variables. 332-339

Ming-Yu Huang, Yu-Mei Liu:
Model checking software product lines based on feature slicing. 340-348

Yubin Zhang, Zhengying Wei, Lei Zhang, Jun Du:
Applicability evaluation of different algorithms for daily reference evapotranspiration model in KBE system. 361-374

Shan Pang, Xinyi Yang:
Multi hidden layer extreme learning machine optimised with batch intrinsic plasticity. 375-382

Zhaolu Guo, Jinxiao Shi, Xiaofeng Xiong, Xiaoyun Xia, Xiaosheng Liu:
Chaotic artificial bee colony with elite opposition-based learning. 383-390

Hui Li, Xifang Zhu, Chang-bo Liu:
Numerical simulations of electromagnetic wave logging instrument response based on self-adaptive hp finite element method. 391-403

Soumaya Cherichi, Rim Faiz:
Upgrading event and pattern detection to big data. 404-412

Sharon Moses J, M. Nirmala, Ebin Deni Raj:
A security ensemble framework for securing the file in cloud computing environments. 413-423

Wassila Guendouzi, Abdelmadjid Boukra:
A Manhattan distance-based binary bat algorithm vs. integer ant colony optimisation for intrusion detection in the audit trails. 424-437

Noorkholis Luthfil Hakim
, Shih-Wei Sun, Mu-Hsen Hsu, Timothy K. Shih, Shih-Jung Wu:
Virtual guitar: using real-time finger tracking for musical instruments. 438-450

Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto
, Carlos Henrique Gomes Ferreira, Bruno Guazzelli Batista, Danilo Costa Marim Segura, Marcos José Santana, Regina Helena Carlucci Santana:
A cloud computing price model based on virtual machine performance degradation. 451-463

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







