Journal: ISSE

Volume 17, Issue 4

333 -- 342Gaurav Gambhir, Jyotsna Kumar Mandal. Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map
343 -- 353Mahesh Shirole, Rajeev Kumar 0004. Constrained permutation-based test scenario generation from concurrent activity diagrams
355 -- 379P. Suresh Kumar, Himansu Sekhar Behera, Janmenjoy Nayak, Bighnaraj Naik. Bootstrap aggregation ensemble learning-based reliable approach for software defect prediction by using characterized code feature
381 -- 405Arpita Dutta, Krishna Kunal, Saksham Sahai Srivastava, Shubham Shankar, Rajib Mall. FTFL: A Fisher's test-based approach for fault localization

Volume 17, Issue 3

185 -- 186Agostino Cortesi, Nabendu Chaki, Rituparna Chaki. Verifiability in Systems and Data Engineering: Preface by the Special Issue Editors
187 -- 204Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki. Requirement-oriented risk management for incremental software development
205 -- 217Santanu Roy, Bibekananda Shit, Soumya Sen, Agostino Cortesi. Construction and distribution of materialized views in Non-binary data space
219 -- 230Sabyasachee Banerjee, Soumendu Ghorui, Subhashis Majumder. Designing balanced wrapper chains in 3D SoC under constrained TSVs
231 -- 245Pushpita Roy, Ansuman Banerjee, Bhargab B. Bhattacharya. A framework for end-to-end verification for digital microfluidics
247 -- 259Gouri Kundu, Sankhayan Choudhury. A discrete genetic learning enabled PSO for targeted positive influence maximization in consumer review networks
261 -- 275Sunanda Jana, Anamika Dey, Arnab Kumar Maji, Rajat Kumar Pal. A novel hybrid genetic algorithm-based firefly mating algorithm for solving Sudoku
277 -- 288Mridul Ghosh, Himadri Mukherjee, Sk Md Obaidullah, Kaushik Roy 0004. STDNet: A CNN-based approach to single-/mixed-script detection
289 -- 307Srijoni Majumdar, Nachiketa Chatterjee, Partha Pratim Das, Amlan Chakrabarti. A mathematical framework for design discovery from multi-threaded applications using neural sequence solvers
309 -- 317Maciej Szymkowski, Piotr Jasinski, Khalid Saeed 0001. Iris-based human identity recognition with machine learning methods and discrete fast Fourier transform
319 -- 331Kamal Das, Amit Gurung, Rajarshi Ray 0001. Parallel simulation of cyber-physical systems

Volume 17, Issue 2

71 -- 0Somnath Mukhopadhyay. Editor's note: artificial reasoning inspired intelligent systems
73 -- 88Madhurima Das, Biswajit Jana, Suman Mitra, Sriyankar Acharyya. Estimation of resemblance and risk level of a breast cancer patient by prognostic variables using microarray gene expression data
89 -- 97Mahamuda Sultana, Ayan Chaudhuri, Diganta Sengupta, Debashis De, Atal Chaudhuri. Design of synchronous decimal counter using reversible Toffoli-Fredkin Netlist
99 -- 107Sayan Dutta, Tanishq Banerjee, Nilanjana Dutta Roy, Bappaditya Chowdhury, Arindam Biswas 0002. Development of a BCI-based gaming application to enhance cognitive control in psychiatric disorders
109 -- 120Romit S. Beed, Sunita Sarkar, Arindam Roy. Bayesian hierarchical multi-objective optimization for vehicle parking route discovery
121 -- 130Avijit Bose, Sannoy Mitra, Souham Ghosh, Raima Ghosh, Tiyash Patra, Satyajit Chakrabarti. Unsupervised Learning Based Evaluation of Player Performances
131 -- 139Pragna Labani Sikdar, Parag Kumar Guha Thakurta. An energy efficient street lighting framework: ANN-based approach
141 -- 156Partha Ghosh, Soumya Sen, Agostino Cortesi. Skyline computation over multiple points and dimensions
157 -- 166Goutam Sarker, Swagata Ghosh. Biometric-based unimodal and multimodal person identification with CNN using optimal filter set
167 -- 183Rajdeep Das, B. Uma Shankar, Tapan Chakraborty, Kuntal Ghosh. Automatic grain segmentation in cross-polarized photomicrographs of sedimentary rocks using psychophysics inspired models

Volume 17, Issue 1

1 -- 16Anu Bajaj, Om Prakash Sangwan. Tri-level regression testing using nature-inspired algorithms
17 -- 27Raghavendra Rao Althar, Debabrata Samanta. The realist approach for evaluation of computational intelligence in software engineering
29 -- 43A. Swathi, Aarti, Sandeep Kumar. A smart application to detect pupil for small dataset with low illumination
45 -- 52Soma Bandyopadhyay, S. S. Thakur 0004, J. K. Mandal 0001. Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society
53 -- 62Hridoy Jyoti Mahanta, Ajoy Kumar Khan, Somnath Mukhopadhyay. Resisting HODPA attacks in modular exponentiation using inner product with differential evolution
63 -- 70Parthajit Roy. A homomorphic computational model for Chinese remainder theorem-based secret sharing