Home / Journals / CSSE / Vol.33, No.5, 2018
Special lssues
  • Open AccessOpen Access

    EDITORIAL

    SPECIAL ISSUE: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)

    Zheng Xu1, Kun Gao2
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 297-298, 2018, DOI:10.32604/csse.2018.33.297
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    ARTICLE

    A Description Method for Formalizing Domain-Specific Modelling Language

    Tao Jiang
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 299-308, 2018, DOI:10.32604/csse.2018.33.299
    Abstract Many Domain-Specific Modelling Languages (DSML) can not formally define their semantics, which inevitably brings many problems, such as accurate description and automatic verification of model properties. In this paper, we propose a formal description method of the structural semantics of DSML for verifying consistency of models built based on DSML. Firstly, domain indicating structural semantics of DSML is formally defined based on algebra, and then, we briefly describe our framework for formalizing DSML and verifying consistency of DSML and its models and use a classic case to illustrate our approach; based on this, we construct an automatic translator for formalizing… More >

  • Open AccessOpen Access

    ARTICLE

    ADL-RAID: Energy-Saving Data Layout for Dynamic Loads

    Youxi Wu1,2, Shengyuan Shi1,2, Jingyu Liu1,2,*, Huaizhong Zhu1,2
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 309-316, 2018, DOI:10.32604/csse.2018.33.309
    Abstract With the rapid development of information technology and the explosive growth of data, the scale of storage equipment is growing rapidly. The high energy consumption storage devices have become a serious problem for data centers. For data storage, the model of sequential data access a storage system is commonly used. Aiming at the characteristics of a sequential data storage system, this paper, we propose a structure, named Adapted to Dynamic Load based on Redundant Array Independent Disks (ADL-RAID) which is an effective energy-saving data layout for dynamic loads based on the existing Semi-Redundant Array Independent Disks (S-RAID). ADL-RAID inherits the… More >

  • Open AccessOpen Access

    ARTICLE

    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317
    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication technology in greenhouse is quite… More >

  • Open AccessOpen Access

    ARTICLE

    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327
    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the data set of MIT single… More >

  • Open AccessOpen Access

    ARTICLE

    Lateral Conflict Model of Training Flight Based on Subjective Factors

    Kaijun Xu, Yusheng Yao, Shanshan Li
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 335-344, 2018, DOI:10.32604/csse.2018.33.335
    Abstract The flight lateral conflict model which is based on human subjective factors has always been a research hotspot for training flight. In order to effectively evaluate the safety interval and lateral collision risk in training airspace, in this paper, pilot subjective factors were modeled. It was studied in lateral conflict risk of low altitude complex flight by flight performance shaping factor. By analyzing flight data of a flight training institution in China, it is pointed that the lateral collision risk in specific training airspace meets the requirement of safety target level of international civil aviation organization. The collision risk of… More >

  • Open AccessOpen Access

    ARTICLE

    Liveness and Boundedness Preservations of Sharing Synthesis of Petri Net Based Representation for Embedded Systems

    Chuanliang Xia, Bin Shen, Hailin Zhang, Yigui Wang
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 345-350, 2018, DOI:10.32604/csse.2018.33.345
    Abstract Petri net based Representation for Embedded Systems (PRES+) is an outstanding methodology for analysis, modeling and verification of embedded systems. State space explosion is an awful problem for PRES+ to model and analyze large complex embedded systems. In order to solve this problem, we concern with a method for expending PRES+ model by using synthesis approach. A kind of sharing synthesis operation for PRES+ is proposed in this paper. Under some conditions liveness and boundedness will be preserved by using this sharing synthesis approach. An applicable example in the form of an embedded control system illustrates the useful of our… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction and Abnormality Assertion on Emu Brake Pad Based on Multivariate Integrated Random Walk

    Hongsheng Su1,2,∗, Shuangshuang Wang1, Dengfei Wang2
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 351-360, 2018, DOI:10.32604/csse.2018.33.351
    Abstract To better solve the issue with abnormal failure of electric motor unit (EMU) brake pad resulted from various random factors in the ever-changing operating environment, in this paper, a new evaluation method of performance prediction and abnormity decision is proposed based on the Multivariate integrated random walk (MIRW) model. In this method, the state space model of the EMU brake pad performance degradation is firstly established. And then based on the observed data, the brake pad performance degradation trend is extracted by the fixed interval forward - backward smoothing algorithm. Based on it, the future degradation state can be predicted… More >

  • Open AccessOpen Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361
    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open AccessOpen Access

    ARTICLE

    Research on K Maximum Dominant Skyline and E-GA Algorithm Based on Data Stream Environment

    Wang Qi
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 369-378, 2018, DOI:10.32604/csse.2018.33.369
    Abstract With the continuous development of database technology, the data volume that can be stored and processed by the database is increasing. How to dig out information that people are interested in from the massive data is one of the important issues in the field of database research. This article starts from the user demand analysis, and makes an in-depth study of various query expansion problems of skylines. Then, according to different application scenarios, this paper proposes efficient and targeted solutions to effectively meet the actual needs of people. Based on k- representative skyline query problem in the data stream environment,… More >

  • Open AccessOpen Access

    ARTICLE

    The Definition and Numerical Method of Final Value Problem and Arbitrary Value Problem

    Shixiong Wang1,∗, Jianhua He1, Chen Wang2, Xitong Li1
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 379-387, 2018, DOI:10.32604/csse.2018.33.379
    Abstract Many Engineering Problems could be mathematically described by FinalValue Problem, which is the inverse problem of InitialValue Problem. Accordingly, the paper studies the final value problem in the field of ODE problems and analyses the differences and relations between initial and final value problems. The more general new concept of the endpoints-value problem which could describe both initial and final problems is proposed. Further, we extend the concept into inner-interval value problem and arbitrary value problem and point out that both endpoints-value problem and inner-interval value problem are special forms of arbitrary value problem. Particularly, the existence and uniqueness of… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluation of Industry Eco-Industrialization: Case Study of Shaanxi, China

    Shuru Liu1, Ping He1, Jiqiang Dang2
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 389-395, 2018, DOI:10.32604/csse.2018.33.389
    Abstract The rapid development of industry brings great pressure on resource and environment, forcing people to explore the road of ecological development. In China, the level of regional industry ecological development differs from each other due to different economic level of regions. This paper establishes ecoindustrialization index system from aspects of resource consumption, pollution emission, pollution abatement, economic and social development to reveal the connotation and characteristics of industry eco-industrialization, taking Shaanxi Province as an example, and adopts the principal component analysis to evaluate the industry eco-industrialization level of 2001-2015 in Shaanxi. The study shows that the level of industry eco-industrialization… More >

  • Open AccessOpen Access

    ARTICLE

    Research on the Clustering Analysis and Similarity in Factor Space

    Sha-Sha Li1,2,∗, Tie-Jun Cui1,2,3,†, Jian Liu1,2,‡
    Computer Systems Science and Engineering, Vol.33, No.5, pp. 397-404, 2018, DOI:10.32604/csse.2018.33.397
    Abstract In this paper, we study the in uence of multiple domain attributes on the clustering analysis of object based on factor space. The representation method of graphical domain attribute is proposed for the object, which is called attribute circle. An attribute circle can represent infinite domain attributes. The similarity analysis of objects is first based on the concept of attribute circle, and the definition of graphical similarity is transformed into the definition of numerical similarity, and then the clustering analysis method of object set is studied and improved. Considering three kinds of graphical overlap, the analytic solution of similarity is… More >

Per Page:

Share Link