Journal: IJCSE

Volume 22, Issue 4

365 -- 375Christophe Guyeux, Jean-Claude Charr, Jacques Bou Abdo, Jacques Demerjian. Advances in the enumeration of foldable self-avoiding walks
376 -- 382Yanli Wang, Yanyan Feng. A new transmission strategy to achieve energy balance and efficiency in wireless sensor networks
383 -- 393Ting-Ting Xia, Juan Lin, Chin-Chen Chang 0001, Tzu-Chuen LuJuan Lin. Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding
394 -- 403Jiayin Zhao, Yong Lu, Hao Ban, Ying Chen 0013. E-commerce satisfaction based on synthetic evaluation theory and neural networks
404 -- 419Wangdong Jiang, Yushan Luo, Ying Cao, Guang Sun, Chunhong Gong. On the build and application of bank customer churn warning model
420 -- 430Shengsheng Wang, Chunshang Xing, Dong Liu. Efficient deep convolutional model compression with an active stepwise pruning approach
431 -- 436Maojun Zhang, Hao Li. Forecasting the yield of Chinese corporate bonds
437 -- 444Wei Chen 0036, Kun Zhou, Weidong Fang, Ke Wang, Fangming Bi, Biruk Assefa. Review on blockchain technology and its application to the simple analysis of intellectual property protection
445 -- 453Jin Liu 0009, Xin Zhang, Xiaohu Tian, Jin Wang 0001, Arun Kumar Sangaiah. A novel domain adaption approach for neural machine translation
454 -- 465Mengmeng Song, Lin Qiao, Rob Law. Formation path of customer engagement in virtual brand community based on back propagation neural network algorithm
466 -- 476Jamilson Dantas, Eltton Araujo, Paulo R. M. Maciel, Rúbens de Souza Matos Júnior, Jean Teixeira. Estimating capacity-oriented availability in cloud systems

Volume 22, Issue 2/3

171 -- 180Ping He, Zheng Huo. Data grouping scheme for multi-request retrieval in MIMO wireless communication
181 -- 189Na Liu 0002, Ying Lu, Xiao-jun Tang, Ming xia Li, Chunli Wang. Improved user-based collaborative filtering algorithm with topic model and time tag
190 -- 199Yuqing Lin, Jiawen Lin, Yuzhen Niu, Haifeng Zhang. Accumulative energy-based seam carving for image resizing
200 -- 210Iulia Stirb. Improving runtime performance and energy consumption through balanced data locality with NUMA-BTLP and NUMA-BTDM static algorithms for thread classification and thread type-aware mapping
211 -- 220Keyao Chen, Guizhi Wang, Jibo Chen, Shuai Yuan, Guo Wei. Impact of climate changes on manufacturing: Hodrick-Prescott filtering and a partial least squares regression model
221 -- 232Xue Lu, Dezhi Han, Letian Duan, Qiuting Tian. Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network
233 -- 242Tienan Zhang. MLIM-Cloud: a flexible information monitoring middleware in large-scale cloud environments
243 -- 251Jinqiao Dai, Shibin Zhang, Jinyue Xia. A multi-group e-commerce signature scheme based on quantum teleportation
252 -- 261Ken Ming Tu, Kuo Ann Yih, Fu-I Chou, Jyh-Horng Chou. Numerical solution and Taguchi experimental method for variable viscosity and non-Newtonian fluids effects on heat and mass transfer by natural convection in porous media
262 -- 269Yanning Cao, Xiaoshu Zhang, Jin Wang. Case data-mining analysis for patients with oesophageal cancer
270 -- 279Dongwei Gao, Hefeng Chen, Chinchen Chang 0001. Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption
280 -- 296Thiago Roberto Lima Lopes, Lucas Pfeiffer Salomão Dias, Cristiano André da Costa, Igor Fontana De Nardin, Rodrigo Da Rosa Righi. Collaborative humanless model for automatic pothole detection and driver notification
297 -- 304Yue Zhao 0013, Xiaona Xu, Jianjian Yue, Wei Song, Xiali Li, Licheng Wu, Qiang Ji. An open speech resource for Tibetan multi-dialect and multitask recognition
305 -- 312Zhijuan Wang, Wenguang Fang, Xiaobing Zhao, Wei Song, Yinghui Feng, Yining Chang. Transliteration recognition of Tibetan person name based on Tibetan cultural knowledge
313 -- 319Wenbin Yu 0002, Zijia Xiong, Shanshan Rong, Yang Liu, Siyao Wang, Yinsong Xu, Alex X. Liu. Unambiguous discrimination of binary coherent states
320 -- 327Jianbin Wu, Chuwei Luo, Ziyang Kang, Shuangkui Ge, Yemin Xin. A coverless information hiding algorithm based on gradient matrix
328 -- 334Wen Gu, Cao Yang, Ying Yi. An access model under cloud computing environment
335 -- 345Leila Hamdad, Zakaria Ournani, Karima Benatchba, Ahcène Bendjoudi. Two-level parallel CPU/GPU-based genetic algorithm for association rule mining
346 -- 354Yonghui Dai, Ying Wang, Bo Xu, Yingyi Wu, Jin Xian. Research on image of enterprise after-sales service based on text sentiment analysis
355 -- 363Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang. Face spoof detection using feature map superposition and CNN

Volume 22, Issue 1

1 -- 14Yan Yuan, Bolun Chen, Yongtao Yu, Ying Jin. An influence maximisation algorithm based on community detection
15 -- 29Mohammed Amine Benmahdjoub, Abdelkader Mezouar, Larbi Boumediene, Youcef Saidi. Smart embarked electrical network based on embedded system and monitoring camera
30 -- 38Shu Chen, Nanxi Chen, Jiayi Tang, Xu Wang. Cognitive fog for health: a distributed solution for smart city
39 -- 49Wei Fang, Tianxiao Jiang, Ke Jiang, Feihong Zhang, Yewen Ding, Jack Sheng. A method of automatic text summarisation based on long short-term memory
50 -- 61Raghavendra Achar, P. Santhi Thilagam, Shreenath Acharya. Broker-based mechanism for cloud provider selection
62 -- 73Zhiqiang Ruan, Dan Yang. Self-organised resource assignment for on-demand services in the cloud platform
74 -- 83Min Yang, Shibin Zhang, Yang Zhao, Qirun Wang. Dynamic negotiation of user behaviour via blockchain technology in federated system
84 -- 95Ce Li, Tan He, Yingheng Wang, Liguo Zhang, Ruili Liu, Jing Zheng. Pipeline image haze removal system using dark channel prior on cloud processing platform
96 -- 106Xiufang Qian, Huamei Shi, Chunpeng Ge, Honghui Fan, Xiaorong Zhao, Yijun Liu. Application research on service innovation and entrepreneurship education in university libraries and archives
107 -- 113Weidong Fang, Wuxiong Zhang, Lianhai Shan, Biruk Assefa, Wei Chen. Hierarchical routing protocol in wireless sensor network: a state-of-the-art review
114 -- 123Jianhua Chen 0008, Jiaohua Qin, Xuyu Xiang, Yun Tan. A new encrypted image retrieval method based on feature fusion in cloud computing
124 -- 134Jingzhao Li, Zhi Xu. Research on network layout strategy of mobile opportunity perception in coal mines
135 -- 145Jiang-Yi Lin, Yu Chen, Chin-Chen Chang 0001, Yu-Chen Hu. A novel high capacity turtle shell-based data hiding with location table free
146 -- 153Pei Yang, Wei Song, Xiaobing Zhao, Rui Zheng, Letu Qingge. An improved Otsu threshold segmentation algorithm
154 -- 161Neena Aloysius, M. Geetha. A scale space model of weighted average CNN ensemble for ASL fingerspelling recognition
162 -- 169Jiao Yao, Yaxuan Dai, Yiling Ni, Jin Wang, Jing Zhao. Deep characteristics analysis on travel time of emergency traffic