Browse issues Vol. 4 2018 Vol. 4 No. 1 Vol. 3 2017 Vol. 3 No. 4 2017 Vol. 3 No. 3 2017 Vol. 3 No. 1/2 Vol. 2 2016 Vol. 2 No. 4 2016 Vol. 2 No. 3 2015 Vol. 2 No. 2 2015 Vol. 2 No. 1 Vol. 1 2013 Vol. 1 No. 4 2013 Vol. 1 No. 3 2012 Vol. 1 No. 2 2012 Vol. 1 No. 1 International Journal of Computational Systems Engineering2015 Vol. 2 No. 2 PagesTitle and authors61-65Data security in DNA using complementary rule techniqueShipra Jain; Vishal Bhatnagar DOI: 10.1504/IJCSYSE.2015.07704766-75Software credibility assessment model based on back propagation networkMingxun Zhu; Xiaohong Chen; Xinxing Luo; Fujun LiuDOI: 10.1504/IJCSYSE.2015.07706976-84Natural language processing systems and Big Data analyticsLidong Wang; Guanghui Wang; Cheryl Ann AlexanderDOI: 10.1504/IJCSYSE.2015.07705285-93Triangular fuzzy soft set and its application in MADMSujit Das; Priyanka Kumari; Archna Kumari VermaDOI: 10.1504/IJCSYSE.2015.07705394-97Fuzzy interior and fuzzy closure of fuzzy set with extended definition of fuzzy setBhimraj BasumataryDOI: 10.1504/IJCSYSE.2015.07705498-106A fuzzy Markovian model for graph-based clusteringParthajit Roy; J.K. MandalDOI: 10.1504/IJCSYSE.2015.077055107-111Rough topology on covering-based rough sets Setenay Akduman; Ahmet Zemci Özçelik; Cenap ÖzelDOI: 10.1504/IJCSYSE.2015.077056112-120Efficient heuristic for very large 0/1 multiple knapsack problemsYacine Laalaoui; Hedi MhallaDOI: 10.1504/IJCSYSE.2015.077065