Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Pseudonym Mutable Based Privacy for 5G User Identity

    Rashid A. Saeed1, Mamoon M. Saeed2,3, Rania A. Mokhtar1, Hesham Alhumyani1, S. Abdel-Khalek4,*

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 1-14, 2021, DOI:10.32604/csse.2021.015593 - 10 June 2021

    Abstract Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards’ bodies should ensure users’ identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure.… More >

  • Open Access

    ARTICLE

    Extended Rama Distribution: Properties and Applications

    Khaldoon M. Alhyasat1,*, Kamarulzaman Ibrahim1, Amer Al-Omari2, Mohd Aftar Abu Bakar1

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 55-67, 2021, DOI:10.32604/csse.2021.014909 - 10 June 2021

    Abstract In this paper, the Rama distribution (RD) is considered, and a new model called extended Rama distribution (ERD) is suggested. The new model involves the sum of two independent Rama distributed random variables. The probability density function (pdf) and cumulative distribution function (cdf) are obtained and analyzed. It is found that the new model is skewed to the right. Several mathematical and statistical properties are derived and proved. The properties studied include moments, coefficient of variation, coefficient of skewness, coefficient of kurtosis and moment generating function. Some simulations are undertaken to illustrate the behavior of More >

  • Open Access

    ARTICLE

    Quantifying the Mechanical Properties of White Sandstone Based on Computer Fractal Theory

    Yong Wang, Yongyan Wang*, Nan Qin, Sa Huang, Le Chang, Shunzheng Hou

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 121-131, 2021, DOI:10.32604/csse.2021.014464 - 10 June 2021

    Abstract The work presented in this paper was conducted to quantify the relationship between the pore characteristics and mechanical properties of white sandstone. The study include tests carried out under the coupling effects of chemical corrosion, temperature, nuclear magnetic resonance, and mechanical tests. Computer fractal theory was employed to describe and quantify the characteristics of the growth of pores in white sandstone under the same coupling effect. A custom developed program code, in the MATLAB software platform, was used for calculating the growths of the pores in white sandstone when subjected to coupling effects. The correlation… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224 - 19 May 2021

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper More >

  • Open Access

    ARTICLE

    Efficient Concurrent L1-Minimization Solvers on GPUs

    Xinyue Chu1, Jiaquan Gao1,*, Bo Sheng2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 305-320, 2021, DOI:10.32604/csse.2021.017144 - 19 May 2021

    Abstract Given that the concurrent L1-minimization (L1-min) problem is often required in some real applications, we investigate how to solve it in parallel on GPUs in this paper. First, we propose a novel self-adaptive warp implementation of the matrix-vector multiplication (Ax) and a novel self-adaptive thread implementation of the matrix-vector multiplication (ATx), respectively, on the GPU. The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size. Second, based on the above proposed kernels, the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from More >

  • Open Access

    ARTICLE

    Reverse Engineering of Mobile Banking Applications

    Syeda Warda Asher1, Sadeeq Jan1,*, George Tsaramirsis2, Fazal Qudus Khan3, Abdullah Khalil1, Muhammad Obaidullah4

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 265-278, 2021, DOI:10.32604/csse.2021.016787 - 19 May 2021

    Abstract Software reverse engineering is the process of analyzing a software system to extract the design and implementation details. Reverse engineering provides the source code of an application, the insight view of the architecture and the third-party dependencies. From a security perspective, it is mostly used for finding vulnerabilities and attacking or cracking an application. The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics. Nowadays, reverse engineering is widely used for mobile applications and is considered a security risk. The Open Web Application Security Project… More >

  • Open Access

    ARTICLE

    UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques

    Kundan Kumar*, Rajeev Arya

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 321-337, 2021, DOI:10.32604/csse.2021.016748 - 19 May 2021

    Abstract Great strides have been made to realistically deploy multiple Unmanned Aerial Vehicles (UAVs) within the commercial domain, which demands a proper coordination and reliable communication among the UAVs. UAVs suffer from limited time of flight. Conventional techniques suffer from high delay, low throughput, and early node death due to aerial topology of UAV networks. To deal with these issues, this paper proposes a UAV parameter vector which considers node energy, channel state information and mobility of UAVs. By intelligently estimating the proposed parameter, the state of UAV can be predicted closely. Accordingly, efficient clustering may… More >

  • Open Access

    ARTICLE

    Exploration on the Load Balancing Technique for Platform of Internet of Things

    Donglei Lu1, Dongjie Zhu2,*, Yundong Sun3, Haiwen Du3, Xiaofang Li4, Rongning Qu4, Yansong Wang3, Ning Cao1, Helen Min Zhou5

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 339-350, 2021, DOI:10.32604/csse.2021.016683 - 19 May 2021

    Abstract In recent years, the Internet of Things technology has developed rapidly, and smart Internet of Things devices have also been widely popularized. A large amount of data is generated every moment. Now we are in the era of big data in the Internet of Things. The rapid growth of massive data has brought great challenges to storage technology, which cannot be well coped with by traditional storage technology. The demand for massive data storage has given birth to cloud storage technology. Load balancing technology plays an important role in improving the performance and resource utilization… More >

  • Open Access

    ARTICLE

    Speech Enhancement via Residual Dense Generative Adversarial Network

    Lin Zhou1,*, Qiuyue Zhong1, Tianyi Wang1, Siyuan Lu1, Hongmei Hu2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 279-289, 2021, DOI:10.32604/csse.2021.016524 - 19 May 2021

    Abstract Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which… More >

  • Open Access

    ARTICLE

    External Incentive Mechanism Research on Knowledge Cooperation-Sharing in the Chinese Creative Industry Cluster

    Changchun Gao1, Shiyu Liu1,*, Chenhui Yu1, Peng Guo2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 365-379, 2021, DOI:10.32604/csse.2021.016506 - 19 May 2021

    Abstract The creative industry is a knowledge-based industry, but it is difficult and complex to create knowledge for enterprises. The principle of cooperation-sharing posits that companies’ limited resources prohibit them from gaining a competitive advantage in all business areas. Therefore, cooperation-sharing can help businesses overcome this hurdle. Cooperation-sharing expedites economic development, breaks the barrier of independent knowledge creation, and enhances resource utilization. However, the effectiveness and stability of knowledge cooperation-sharing are key problems facing governments and other regulators. This study can help regulators promote honesty in enterprise cooperation-sharing. Based on the hypothesis of bounded rationality, the… More >

Displaying 1271-1280 on page 128 of 1494. Per Page