Open Access
EDITORIAL
Zheng Xu1, Kun Gao2
Computer Systems Science and Engineering, Vol.33, No.5, pp. 297-298, 2018, DOI:10.32604/csse.2018.33.297
Abstract This article has no abstract. More >
Open Access
ARTICLE
Tao Jiang
Computer Systems Science and Engineering, Vol.33, No.5, pp. 299-308, 2018, DOI:10.32604/csse.2018.33.299
Abstract Many Domain-Specific Modelling Languages (DSML) can not formally define their semantics, which inevitably brings many problems, such as accurate
description and automatic verification of model properties. In this paper, we propose a formal description method of the structural semantics of DSML for
verifying consistency of models built based on DSML. Firstly, domain indicating structural semantics of DSML is formally defined based on algebra, and
then, we briefly describe our framework for formalizing DSML and verifying consistency of DSML and its models and use a classic case to illustrate our
approach; based on this, we construct an automatic translator for formalizing… More >
Open Access
ARTICLE
Youxi Wu1,2, Shengyuan Shi1,2, Jingyu Liu1,2,*, Huaizhong Zhu1,2
Computer Systems Science and Engineering, Vol.33, No.5, pp. 309-316, 2018, DOI:10.32604/csse.2018.33.309
Abstract With the rapid development of information technology and the explosive growth of data, the scale of storage equipment is growing rapidly. The high
energy consumption storage devices have become a serious problem for data centers. For data storage, the model of sequential data access a storage
system is commonly used. Aiming at the characteristics of a sequential data storage system, this paper, we propose a structure, named Adapted to Dynamic
Load based on Redundant Array Independent Disks (ADL-RAID) which is an effective energy-saving data layout for dynamic loads based on the existing
Semi-Redundant Array Independent Disks (S-RAID). ADL-RAID inherits the… More >
Open Access
ARTICLE
Xuejun Tian, Jianliang Li, Lihua Luo
Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317
Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end
CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by
CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant;
then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless
communication technology in greenhouse is quite… More >
Open Access
ARTICLE
Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*
Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327
Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex
grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the
main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex
polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the data set of MIT
single… More >
Open Access
ARTICLE
Kaijun Xu∗, Yusheng Yao, Shanshan Li
Computer Systems Science and Engineering, Vol.33, No.5, pp. 335-344, 2018, DOI:10.32604/csse.2018.33.335
Abstract The flight lateral conflict model which is based on human subjective factors has always been a research hotspot for training flight. In order to effectively
evaluate the safety interval and lateral collision risk in training airspace, in this paper, pilot subjective factors were modeled. It was studied in lateral conflict
risk of low altitude complex flight by flight performance shaping factor. By analyzing flight data of a flight training institution in China, it is pointed that the
lateral collision risk in specific training airspace meets the requirement of safety target level of international civil aviation organization. The collision risk of… More >
Open Access
ARTICLE
Chuanliang Xia∗, Bin Shen, Hailin Zhang, Yigui Wang
Computer Systems Science and Engineering, Vol.33, No.5, pp. 345-350, 2018, DOI:10.32604/csse.2018.33.345
Abstract Petri net based Representation for Embedded Systems (PRES+) is an outstanding methodology for analysis, modeling and verification of embedded systems.
State space explosion is an awful problem for PRES+ to model and analyze large complex embedded systems. In order to solve this problem, we concern
with a method for expending PRES+ model by using synthesis approach. A kind of sharing synthesis operation for PRES+ is proposed in this paper. Under
some conditions liveness and boundedness will be preserved by using this sharing synthesis approach. An applicable example in the form of an embedded
control system illustrates the useful of our… More >
Open Access
ARTICLE
Hongsheng Su1,2,∗, Shuangshuang Wang1, Dengfei Wang2
Computer Systems Science and Engineering, Vol.33, No.5, pp. 351-360, 2018, DOI:10.32604/csse.2018.33.351
Abstract To better solve the issue with abnormal failure of electric motor unit (EMU) brake pad resulted from various random factors in the ever-changing operating
environment, in this paper, a new evaluation method of performance prediction and abnormity decision is proposed based on the Multivariate integrated
random walk (MIRW) model. In this method, the state space model of the EMU brake pad performance degradation is firstly established. And then based on
the observed data, the brake pad performance degradation trend is extracted by the fixed interval forward - backward smoothing algorithm. Based on it, the
future degradation state can be predicted… More >
Open Access
ARTICLE
Junfeng Xu†, Linna Zhou
Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361
Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices.
Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in
the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real
codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology
for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >
Open Access
ARTICLE
Wang Qi∗
Computer Systems Science and Engineering, Vol.33, No.5, pp. 369-378, 2018, DOI:10.32604/csse.2018.33.369
Abstract With the continuous development of database technology, the data volume that can be stored and processed by the database is increasing. How to dig out
information that people are interested in from the massive data is one of the important issues in the field of database research. This article starts from the
user demand analysis, and makes an in-depth study of various query expansion problems of skylines. Then, according to different application scenarios,
this paper proposes efficient and targeted solutions to effectively meet the actual needs of people. Based on k- representative skyline query problem in the
data stream environment,… More >
Open Access
ARTICLE
Shixiong Wang1,∗, Jianhua He1, Chen Wang2, Xitong Li1
Computer Systems Science and Engineering, Vol.33, No.5, pp. 379-387, 2018, DOI:10.32604/csse.2018.33.379
Abstract Many Engineering Problems could be mathematically described by FinalValue Problem, which is the inverse problem of InitialValue Problem. Accordingly,
the paper studies the final value problem in the field of ODE problems and analyses the differences and relations between initial and final value problems.
The more general new concept of the endpoints-value problem which could describe both initial and final problems is proposed. Further, we extend the
concept into inner-interval value problem and arbitrary value problem and point out that both endpoints-value problem and inner-interval value problem are
special forms of arbitrary value problem. Particularly, the existence and uniqueness of… More >
Open Access
ARTICLE
Shuru Liu1, Ping He1, Jiqiang Dang2
Computer Systems Science and Engineering, Vol.33, No.5, pp. 389-395, 2018, DOI:10.32604/csse.2018.33.389
Abstract The rapid development of industry brings great pressure on resource and environment, forcing people to explore the road of ecological development. In
China, the level of regional industry ecological development differs from each other due to different economic level of regions. This paper establishes ecoindustrialization index system from aspects of resource consumption, pollution emission, pollution abatement, economic and social development to reveal
the connotation and characteristics of industry eco-industrialization, taking Shaanxi Province as an example, and adopts the principal component analysis
to evaluate the industry eco-industrialization level of 2001-2015 in Shaanxi. The study shows that the level of industry eco-industrialization… More >
Open Access
ARTICLE
Sha-Sha Li1,2,∗, Tie-Jun Cui1,2,3,†, Jian Liu1,2,‡
Computer Systems Science and Engineering, Vol.33, No.5, pp. 397-404, 2018, DOI:10.32604/csse.2018.33.397
Abstract In this paper, we study the in uence of multiple domain attributes on the clustering analysis of object based on factor space. The representation method
of graphical domain attribute is proposed for the object, which is called attribute circle. An attribute circle can represent infinite domain attributes. The
similarity analysis of objects is first based on the concept of attribute circle, and the definition of graphical similarity is transformed into the definition of
numerical similarity, and then the clustering analysis method of object set is studied and improved. Considering three kinds of graphical overlap, the analytic
solution of similarity is… More >