Journal: IJCSE

Volume 19, Issue 4

455 -- 463S. A. Sundararaman, T. Subbulakshmi. Execution of scientific workflows on IaaS cloud by PBRR algorithm
464 -- 473Nawel Kortas, Anis Ben Arbia. Development and evaluation of the cloudlet technology within the Raspberry Pi
474 -- 482Manikandan Narayanan, Srinivasan Subha. Parallel data processing approaches for effective intensive care units with internet of things
483 -- 493Imed Eddine Bennour, Monia Ettouil, Rim Zarrouk, Abderrazak Jemai. Study of runtime performance for Java-multithread PSO on multicore machines
494 -- 505Gaofeng Zhang, Yingnan Yan, Yunsheng Tian, Yang Liu, Yan Li, Qingguo Zhou, Rui Zhou 0005, Kuan-Ching Li. Water contamination monitoring system based on big data: a case study
506 -- 517Rui Zhou 0005, Xue Li, Binbin Yong, Zebang Shen, Chen Wang, Qingguo Zhou, Yunshan Cao, Kuan-Ching Li. Arrhythmia recognition and classification through deep learning-based approach
518 -- 526Jianghua Li, Chen Qiu. A personalised ontology ranking model based on analytic hierarchy process
527 -- 537Yi Zhao, Zhao Li, Bitao Li, Keqing He, Junfei Guo. Collective intelligence value discovery based on citation of science article
538 -- 545Gang Liu, Cong Wu. Differential evolution with k-nearest-neighbour-based mutation operator
546 -- 553Meng Pan, Jie Zhang. Genetic or non-genetic prognostic factors for colon cancer classification
554 -- 561Ren Kanehira, Hideo Hori, Kazinori Kawaguchi, Hideo Fujimoto. A medical training system for the operation of heart-lung machine
562 -- 569Yujie Li, Huiliang Xu, Yun Li 0010, Huimin Lu, Seiichi Serikawa. Underwater image segmentation based on fast level set method
570 -- 580Wenmin Huang, Jiquan Ma. Using Gaussian mixture model to fix errors in SFS approach based on propagation
581 -- 589Bolin Yu, Zengkai Wang, Fahong Yu, Longhua Ma, Xiaoyun Xia, Feng He. Estimation of distribution algorithms based on increment clustering for multiple optima in dynamic environments

Volume 19, Issue 3

311 -- 324Hui-Juan Zhu, Tong-Hai Jiang, Yi Wang, Li Cheng, Bo Ma 0004, Fan Zhao. A data cleaning method for heterogeneous attribute fusion and record linkage
325 -- 333Shengxiang Gao, Dewei Kong, Zhengtao Yu 0001, Yang Luo, Jianyi Guo, Yantuan Xian. Chinese question speech recognition integrated with domain characteristics
334 -- 342Ahmed Fawzi Otoom, Doaa Al-Shdaifat, Maen Hammad, Emad E. Abdallah, Ashraf Hamdan Aljammal. Automated labelling and severity prediction of software bug reports
343 -- 353Borong Ma, Zhixin Ma, Dagan Nie, Xianbo Li. IFOA: an improved forest algorithm for continuous nonlinear optimisation
354 -- 367Zhen Chen 0007, Limin Shen, Dianlong You, Chuan Ma, Feng Li. A location-aware matrix factorisation approach for collaborative web service QoS prediction
368 -- 375Yun-Ming Wang, Cheng-Sheng Pan, Bo Chen 0007, Duoping Zhang. Method of key node identification in command and control networks based on level flow betweenness
376 -- 386Enting Dong, Jianfeng Wang, Zhenhua Liu, Hua Ma. Large universe multi-authority attribute-based PHR sharing with user revocation
387 -- 399Shengsheng Wang, Ruyi Dong. Feature selection with improved binary artificial bee colony algorithm for microarray data
400 -- 406Shufang Wu, Jie Zhu, Jianmin Xu. Context discriminative dictionary construction for topic representation
407 -- 417Duaa Elsarraj, Maha Al Qisi, Ali Rodan, Nadim Obeid, Ahmad Sharieh, Hossam Faris. Demystifying echo state network with deterministic simple topologies
418 -- 429Imene Bensetira, Djamel-Eddine Saidouni, Mahfud Al-la Alamin. A state space distribution approach based on system behaviour
430 -- 439Tianhang Liu, Jianping Yin, Long Gao, Wei Chen, Minghui Qiu. Consensus RNA secondary structure prediction using information of neighbouring columns and principal component analysis
440 -- 451Naser S. Al Madi, Javed I. Khan. Is a picture worth a thousand words? A computational investigation of the modality effect

Volume 19, Issue 2

153 -- 161Osama Hosam, Muhammad Hammad Ahmad. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
162 -- 168Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin. CSCAC: one constant-size CPABE access control scheme in trusted execution environment
169 -- 176Huan Zhao, Xiaoxiao Zhou, Yufeng Xiao. Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment
177 -- 188Zeyu Sun, Guozeng Zhao, Xiaoyan Pan. PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks
189 -- 196Fang Wang, Renjun Feng, Haiyan Chen, Wen Wu, Fei Zhu. An information network security policy learning algorithm based on Sarsa with optimistic initial values
197 -- 205Sen Zhang, Yuping Hu, Chunmei Wang. Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network
206 -- 214Guo-Sheng Zhou, Wei Du, Han-Chao Lin, Xiao-Wei Yan. An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators
215 -- 222Dongfang Li, Qiuyan Zhu, Hong Wang, Wenchao Liu, Zhihua Feng, Jianwei Zhang. A novel computational model for SRAM PUF min-entropy estimation
223 -- 232Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin. Design of DDoS attack detection system based on intelligent bee colony algorithm
233 -- 241Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu. LWE-based multi-authority attribute-based encryption scheme with hidden policies
242 -- 250Wei Zhu, Osama Hosam, Xiaodong Zheng. A secure hierarchical community detection algorithm
251 -- 258Bo Deng. Efficient security credential management for named data networking
259 -- 273Xin Su 0004, Yi Zheng, Jiuchuan Lin, Xuchong Liu. A network traffic-aware mobile application recommendation system based on network traffic cost consideration
274 -- 283Soundes Belkacem, Larbi Guezouli, Samir Zidat. Pseudo Zernike moments-based approach for text detection and localisation from lecture videos
284 -- 292Chuanrong Wu, Evgeniya Zapevalova, Deming Zeng. Optimisation model of price changes after knowledge transfer in the big data environment
293 -- 300Xiao-Zhang Liu, Hang-yu Ruan. Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition
301 -- 310Qingtang Su. A blind image watermarking algorithm based on amalgamation domain method

Volume 19, Issue 1

1 -- 14Lijun Dou, Rui Yan, Qiaolin Ye. Simultaneous multiple low-dimensional subspace dimensionality reduction and classification
15 -- 24Ningsheng Zhao, Zhili Zhou, Lingzhi Liao. Partial-duplicate image retrieval based on HSV colour space for coverless information hiding
25 -- 35M. V. Rahul, Rajashree Shettar, K. N. Subramanya. An adaptive model for traffic flow optimisation in dynamic environments
36 -- 45Yali Lv, Jiye Liang, Yuhua Qian, Jiajie Wu, Suqin Ji. Sign fusion of multiple QPNs based on qualitative mutual information
46 -- 52Yinxia Sun, Limin Shen. Pairing-free certificateless signature with revocation
53 -- 63Wei Zhou, Hong Zhang, Hui Wang, Yu Wang 0002. Designing scrubbing strategy for memories suffering MCUs through the selection of optimal interleaving distance
64 -- 70Zhendong Liu, Daming Zhu, Qionghai Dai. Improved predicting algorithm of RNA pseudoknotted structure
71 -- 82Xiaomei Yu, Jun Zhao, Hong Wang 0015, Xiangwei Zheng, Xiaoyan Yan. A model of mining approximate frequent itemsets using rough set theory
83 -- 92Shu-Zhi Li, Qin Hu, Xiao-hong Deng, Zhao-quan Cai. Reversible image watermarking based on texture analysis of grey level co-occurrence matrix
93 -- 103Li Chen, Hong Liu, Philip Moore. A semantic recommender algorithm for 3D model retrieval based on deep belief networks
104 -- 111Dingcai Shen, Longyin Zhu. Differential evolution with spatially neighbourhood best search in dynamic environment
112 -- 120Yifang Liu, Renfu Li, Shuquan Wang. Optimal anti-interception orbit design based on genetic algorithm
121 -- 131Hong Wang, Xiaomei Yu, Jun Zhao, Yuanjie Zheng. Detecting sparse rating spammer for accurate ranking of online recommendation
132 -- 139Lingyun Xiang, Xiao Yang, Jiahe Zhang, Weizheng Wang. A word-frequency-preserving steganographic method based on synonym substitution
140 -- 151Guo Sun, Yiqiao Cai. Differential evolution with dynamic neighbourhood learning strategy-based mutation operators