Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access


    The Definition and Numerical Method of Final Value Problem and Arbitrary Value Problem

    Shixiong Wang1,∗, Jianhua He1, Chen Wang2, Xitong Li1

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 379-387, 2018, DOI:10.32604/csse.2018.33.379

    Abstract Many Engineering Problems could be mathematically described by FinalValue Problem, which is the inverse problem of InitialValue Problem. Accordingly, the paper studies the final value problem in the field of ODE problems and analyses the differences and relations between initial and final value problems. The more general new concept of the endpoints-value problem which could describe both initial and final problems is proposed. Further, we extend the concept into inner-interval value problem and arbitrary value problem and point out that both endpoints-value problem and inner-interval value problem are special forms of arbitrary value problem. Particularly, the existence and uniqueness of… More >

  • Open Access


    Research on K Maximum Dominant Skyline and E-GA Algorithm Based on Data Stream Environment

    Wang Qi

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 369-378, 2018, DOI:10.32604/csse.2018.33.369

    Abstract With the continuous development of database technology, the data volume that can be stored and processed by the database is increasing. How to dig out information that people are interested in from the massive data is one of the important issues in the field of database research. This article starts from the user demand analysis, and makes an in-depth study of various query expansion problems of skylines. Then, according to different application scenarios, this paper proposes efficient and targeted solutions to effectively meet the actual needs of people. Based on k- representative skyline query problem in the data stream environment,… More >

  • Open Access


    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open Access


    Prediction and Abnormality Assertion on Emu Brake Pad Based on Multivariate Integrated Random Walk

    Hongsheng Su1,2,∗, Shuangshuang Wang1, Dengfei Wang2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 351-360, 2018, DOI:10.32604/csse.2018.33.351

    Abstract To better solve the issue with abnormal failure of electric motor unit (EMU) brake pad resulted from various random factors in the ever-changing operating environment, in this paper, a new evaluation method of performance prediction and abnormity decision is proposed based on the Multivariate integrated random walk (MIRW) model. In this method, the state space model of the EMU brake pad performance degradation is firstly established. And then based on the observed data, the brake pad performance degradation trend is extracted by the fixed interval forward - backward smoothing algorithm. Based on it, the future degradation state can be predicted… More >

  • Open Access


    Liveness and Boundedness Preservations of Sharing Synthesis of Petri Net Based Representation for Embedded Systems

    Chuanliang Xia, Bin Shen, Hailin Zhang, Yigui Wang

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 345-350, 2018, DOI:10.32604/csse.2018.33.345

    Abstract Petri net based Representation for Embedded Systems (PRES+) is an outstanding methodology for analysis, modeling and verification of embedded systems. State space explosion is an awful problem for PRES+ to model and analyze large complex embedded systems. In order to solve this problem, we concern with a method for expending PRES+ model by using synthesis approach. A kind of sharing synthesis operation for PRES+ is proposed in this paper. Under some conditions liveness and boundedness will be preserved by using this sharing synthesis approach. An applicable example in the form of an embedded control system illustrates the useful of our… More >

  • Open Access


    Lateral Conflict Model of Training Flight Based on Subjective Factors

    Kaijun Xu, Yusheng Yao, Shanshan Li

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 335-344, 2018, DOI:10.32604/csse.2018.33.335

    Abstract The flight lateral conflict model which is based on human subjective factors has always been a research hotspot for training flight. In order to effectively evaluate the safety interval and lateral collision risk in training airspace, in this paper, pilot subjective factors were modeled. It was studied in lateral conflict risk of low altitude complex flight by flight performance shaping factor. By analyzing flight data of a flight training institution in China, it is pointed that the lateral collision risk in specific training airspace meets the requirement of safety target level of international civil aviation organization. The collision risk of… More >

  • Open Access


    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327

    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the data set of MIT single… More >

  • Open Access


    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317

    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication technology in greenhouse is quite… More >

  • Open Access


    ADL-RAID: Energy-Saving Data Layout for Dynamic Loads

    Youxi Wu1,2, Shengyuan Shi1,2, Jingyu Liu1,2,*, Huaizhong Zhu1,2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 309-316, 2018, DOI:10.32604/csse.2018.33.309

    Abstract With the rapid development of information technology and the explosive growth of data, the scale of storage equipment is growing rapidly. The high energy consumption storage devices have become a serious problem for data centers. For data storage, the model of sequential data access a storage system is commonly used. Aiming at the characteristics of a sequential data storage system, this paper, we propose a structure, named Adapted to Dynamic Load based on Redundant Array Independent Disks (ADL-RAID) which is an effective energy-saving data layout for dynamic loads based on the existing Semi-Redundant Array Independent Disks (S-RAID). ADL-RAID inherits the… More >

  • Open Access


    A Description Method for Formalizing Domain-Specific Modelling Language

    Tao Jiang

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 299-308, 2018, DOI:10.32604/csse.2018.33.299

    Abstract Many Domain-Specific Modelling Languages (DSML) can not formally define their semantics, which inevitably brings many problems, such as accurate description and automatic verification of model properties. In this paper, we propose a formal description method of the structural semantics of DSML for verifying consistency of models built based on DSML. Firstly, domain indicating structural semantics of DSML is formally defined based on algebra, and then, we briefly describe our framework for formalizing DSML and verifying consistency of DSML and its models and use a classic case to illustrate our approach; based on this, we construct an automatic translator for formalizing… More >

Displaying 1371-1380 on page 138 of 1407. Per Page