Journal: IJCSE

Volume 23, Issue 4

307 -- 318Hao Guo, Shengsheng Wang, Yinan Lu. Real-time segmentation of weeds in cornfields based on depthwise separable convolution residual network
319 -- 335Anil Kumar, Basavaraj Talawar. ELBA-NoC: ensemble learning-based accelerator for 2D and 3D network-on-chip architectures
336 -- 340Ji-Hwei Horng, Xiao-Zhu Xie, Chin-Chen Chang 0001. The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix
341 -- 351Yifan Wang, Yunling Wang, Jianfeng Wang. Efficient self-adaptive access control for personal medical data in emergency setting
352 -- 366Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo, Sokol Kosta, Francisco Airton Silva. Edge servers placement in mobile edge computing using stochastic Petri nets
367 -- 380Muthusamy Boopathi, Sujatha Ramalingam, Senthil Kumar Chandran. Application of particle swarm optimisation for coverage estimation in software testing
381 -- 395Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi. Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme
396 -- 407Arati Mohapatro, S. K. Mahendran, Tapan Kumar Das. A knowledge elicitation framework in ranking healthcare providers using rough set with formal concept analysis

Volume 23, Issue 3

205 -- 213Guangli Zhu, Qiaoyun Wang, Hanran Liu, Shunxiang Zhang. The mining method of trigger word for food nutrition matching
214 -- 223Zhuoyi Tan, Yuping Hu, Dongjun Luo, Man Hu, Kaihang Liu. The clothing image classification algorithm based on the improved Xception model
224 -- 234Zhaohui Ma, Bohong Li. A DDoS attack detection method based on SVM and K-nearest neighbour in SDN environment
235 -- 249Maria Rizzi, Matteo D'Aloia, Annalisa Longo. Digital watermarking for healthcare: a survey of ECG watermarking methods in telemedicine
250 -- 261Hongfan Ye, Buqing Cao, Jinkun Geng, Yiping Wen. Web services classification via combining Doc2Vec and LINE model
262 -- 270Alekha Kumar Mishra, Maitreyee Sinha, Asis Kumar Tripathy. A sinkhole prevention mechanism for RPL in IoT
271 -- 285Yusha Zhang, Xiaoming Lu, Yingwen Fu, Shengyi Jiang. A comparative linguistic analysis of English news headlines in China, USA, UK, and ASEAN countries
286 -- 295Arko Banerjee, Arun K. Pujari, Bibudhendu Pati, Chhabi Rani Panigrahi. A new unsupervised method for boundary perception and word-like segmentation of sequence
296 -- 305Gaifang Xin, Jun Zhu, Chengming Luo, Jing Tang, Wei Li. Wireless energy consumption optimisation using node coverage controlling in linear-type network

Volume 23, Issue 2

103 -- 114Qingqing Chang. The sentiments of open financial information, public mood and stock returns: an empirical study on Chinese growth enterprise market
115 -- 123Zhongliang Wei, Guangli Zhu, Xingzhu Liang, Wenjuan Liu. An image fusion dehazing algorithm based on dark channel prior and retinex
124 -- 135Kensaku Hayashi, Alexander Vazhenin, Andrey Marchuk. Distributed nested streamed models of tsunami waves
136 -- 144Huan Zhao, Jian Lu, Jie Cao. A short text conversation generation model combining BERT and context attention mechanism
145 -- 157Ying Xie, Guohua Tian, Haoran Yuan, Chong Jiang, Jianfeng Wang. Client-side ciphertext deduplication scheme with flexible access control
158 -- 168Guobing Zou, Hao Wu, Song Yang, Ming Jiang, Bofeng Zhang, Yanglan Gan. LMA: label-based multi-head attentive model for long-tail web service classification
169 -- 176Zeyu Chen, Xiangfeng Luo, Yan Sun. Synthetic data augmentation rules for maritime object detection
177 -- 184Guang Sun, Hongzhang Lv, Wangdong Jiang, FengHua Li. General process of big data analysis and visualisation
185 -- 193Kui Gao, Yang Liu 0168, Heyang Xu, Tingting Han. Design and implementation of food supply chain traceability system based on Hyperledger Fabric
194 -- 204Xiaohong Shi, Xiangping Chen, Yongsheng Rao, Kaiyuan Li, Zhensheng Xu, Jingzhong Zhang. Automatic recommendation of user interface examples for mobile app development

Volume 23, Issue 1

1 -- 9Xiaoyan Guo, Ming Zhang. Image of plant disease segmentation model based on improved pulse-coupled neural network
10 -- 21Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin. An improved Sudoku-based data hiding scheme using greedy method
22 -- 30Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu. DDoS attack detection method based on network abnormal behaviour in big data environment
31 -- 41Wencong Lai, Abdul A. Khan. A parallel adaptive-resolution hydraulic flood inundation model for flood hazard mapping
42 -- 49Yuan Chen, Dongmei Han, Lihua Xia. A hidden Markov model to characterise motivation level in MOOCs learning
50 -- 62Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang. Greedy algorithm for image quality optimisation based on turtle-shell steganography
63 -- 73Yuhui Liu, Hecheng Li, Huafei Chen, Jing Huang. An efficient memetic algorithm using approximation scheme for solving nonlinear integer bilevel programming problems
74 -- 81Ze Zheng, Xiangfeng Luo, Hao Wang. MESRG: multi-entity summarisation in RDF graph
82 -- 90Xiaoxue Ma, Pengliang Shi. Dynamic multiple copies adaptive audit scheme based on DITS
91 -- 102Gustavo Mendes Platt, Fran Sérgio Lobato, Gustavo Barbosa Libotte, Francisco Duarte Moura Neto. Basins of attraction and critical curves for Newton-type methods in a phase equilibrium problem