Computer Systems Science and Engineering

About the Journal

The Computer Systems Science and Engineering journal is devoted to the publication of high quality papers on theoretical developments in computer systems science, and their applications in computer systems engineering. Original research papers, state-of-the-art reviews and technical notes are invited for publication. Computer Systems Science and Engineering is published monthly by Tech Science Press.

Indexing and Abstracting

Science Citation Index (Web of Science): 2019 Impact Factor 0.278; Scopus Cite Score (Impact per Publication 2019): 1.2; SNIP (Source Normalized Impact per Paper 2019): 0.897; ACM Digital Library;

Previously published by CRL Publishing (, Computer Systems Science and Engineering starts to be published by Tech Science Press from the fifth issue of 2020 and supports Open Access Policy.

  • An Effective Online Collaborative Training in Developing Listening Comprehension Skills
  • Abstract The COVID-19 outbreak severely affected formal face-to-face classroom teaching and learning. ICT-based online education and training can be a useful measure during the pandemic. In the Pakistani educational context, the use of ICT-based online training is generally sporadic and often unavailable, especially for developing English-language instructors’ listening comprehension skills. The major factors affecting availability include insufficient IT resources and infrastructure, a lack of proper online training for speech and listening, instructors with inadequate academic backgrounds, and an unfavorable environment for ICT-based training for listening comprehension. This study evaluated the effectiveness of ICT-based training for developing secondary-level English-language instructors’ listening comprehension… More
  •   Views:187       Downloads:136        Download PDF
  • An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services
  • Abstract The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online. The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it. To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets, this paper has proposed an automated technique employing ensemble machine learning models to detect the firearms listings on cryptomarkets. In this work, we have used part-of-speech (PoS) tagged features in conjunction with n-gram models to construct the feature set for the ensemble model. We studied the effectiveness of the proposed… More
  •   Views:103       Downloads:102        Download PDF
  • Investigain: A Productive Asset Management Web Application
  • Abstract The Investigain is a progressive web application to make mutual funds investments through a Systematic Investment Plan. The application utilizes the web’s modern capabilities, such as Asynchronous JavaScript and XML (AJAX), JavaScript, and Hypertext Marker Language (HTML5). The application also uses a powerful relational database management system, such as MySQL, to display asset management information. The application has two portals, one for investors and one for a particular asset manager or asset management company. Each investor has an account in the investor portal. The investor can view his/her profile, current balance, balance history, dividends, the units of mutual funds bought,… More
  •   Views:148       Downloads:95        Download PDF
  • Deep Learning for Object Detection: A Survey
  • Abstract Object detection is one of the most important and challenging branches of computer vision, which has been widely applied in people s life, such as monitoring security, autonomous driving and so on, with the purpose of locating instances of semantic objects of a certain class. With the rapid development of deep learning algorithms for detection tasks, the performance of object detectors has been greatly improved. In order to understand the main development status of target detection, a comprehensive literature review of target detection and an overall discussion of the works closely related to it are presented in this paper. This… More
  •   Views:96       Downloads:87        Download PDF
  • A Cuckoo Search Detector Generation-based Negative Selection Algorithm
  • Abstract The negative selection algorithm (NSA) is an adaptive technique inspired by how the biological immune system discriminates the self from non-self. It asserts itself as one of the most important algorithms of the artificial immune system. A key element of the NSA is its great dependency on the random detectors in monitoring for any abnormalities. However, these detectors have limited performance. Redundant detectors are generated, leading to difficulties for detectors to effectively occupy the non-self space. To alleviate this problem, we propose the nature-inspired metaheuristic cuckoo search (CS), a stochastic global search algorithm, which improves the random generation of detectors… More
  •   Views:90       Downloads:80        Download PDF
  • A Sensor Network Web Platform Based on WoT Technology
  • Abstract This study proposes a Web platform, the Web of Things (WoT), whose Internet of Things (IoT) architecture is used to develop the technology behind a new standard Web platform. When a remote sensor passes data to a microcontroller for processing, the protocol is often not known. This study proposes a WoT platform that enables the use of a browser in a mobile device to control a remote hardware device. An optimized code is written using an artificial intelligence-based algorithm in a microcontroller. Digital data convergence technology is adopted to process the packets of different protocols and place them on the… More
  •   Views:91       Downloads:86        Download PDF
  • Fault Aware Dynamic Resource Manager for Fault Recognition and Avoidance in Cloud
  • Abstract Fault tolerance (FT) schemes are intended to work on a minimized and static amount of physical resources. When a host failure occurs, the conventional FT frequently proceeds with the execution on the accessible working hosts. This methodology saves the execution state and applications to complete without disruption. However, the dynamicity of open cloud assets is not seen when taking scheduling choices. Existing optimization techniques are intended in dealing with resource scheduling. This method will be utilized for distributing the approaching tasks to the VMs. However, the dynamic scheduling for this procedure doesn’t accomplish the objective of adaptation of internal failure.… More
  •   Views:127       Downloads:77        Download PDF
  • Leveraging Graph Cut’s Energy Function for Context Aware Facial Recognition in Indoor Environments
  • Abstract Context-aware facial recognition regards the recognition of faces in association with their respective environments. This concept is useful for the domestic robot which interacts with humans when performing specific functions in indoor environments. Deep learning models have been relevant in solving facial and place recognition challenges; however, they require the procurement of training images for optimal performance. Pre-trained models have also been offered to reduce training time significantly. Regardless, for classification tasks, custom data must be acquired to ensure that learning models are developed from other pre-trained models. This paper proposes a place recognition model that is inspired by the… More
  •   Views:74       Downloads:79        Download PDF
  • Scheduling Optimization Modelling: A Case Study of a Woven Label Manufacturing Company
  • Abstract Production scheduling involves all activities of building production schedules, including coordinating and assigning activities to each person, group of people, or machine and arranging work orders in each workplace. Production scheduling must solve all problems such as minimizing customer wait time, storage costs, and production time; and effectively using the enterprise’s human resources. This paper studies the application of flexible job shop modelling on scheduling a woven labelling process. The labelling process includes several steps which are handled in different work-stations. Each workstation is also comprised of several identical parallel machines. In this study, job splitting is allowed so that… More
  •   Views:136       Downloads:73        Download PDF
  • Multi-indicator Active Queue Management Method
  • Abstract A considerable number of applications are running over IP networks. This increased the contention on the network resource, which ultimately results in congestion. Active queue management (AQM) aims to reduce the serious consequences of network congestion in the router buffer and its negative effects on network performance. AQM methods implement different techniques in accordance with congestion indicators, such as queue length and average queue length. The performance of the network is evaluated using delay, loss, and throughput. The gap between congestion indicators and network performance measurements leads to the decline in network performance. In this study, delay and loss predictions… More
  •   Views:81       Downloads:70        Download PDF