Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,307)
  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

  • Open Access

    ARTICLE

    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327

    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the… More >

  • Open Access

    ARTICLE

    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317

    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication More >

  • Open Access

    EDITORIAL

    SPECIAL ISSUE: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)

    Zheng Xu1, Kun Gao2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 297-298, 2018, DOI:10.32604/csse.2018.33.297

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

  • Open Access

    ARTICLE

    Human Movement Detection and Gait Periodicity Analysis via Channel State Information

    Wenyuan Liu1,2, Zijuan Liu1,*, Lin Wang1, Binbin Li1, Nan Jing1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 137-147, 2018, DOI:10.32604/csse.2018.33.137

    Abstract In recent years, movement detection and gait recognition methods using different techniques emerge in an endless stream. On the one hand, wearable sensors need be worn by the detecting target and the method based on camera requires line of sight. On the other hand, radio frequency signals are easy to be impaired. In this paper, we propose a novel multi-layer filter of channel state information (CSI) to capture moving individuals in dynamic environments and analyze his/her gait periodicity. We design and evaluate an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal More >

  • Open Access

    ARTICLE

    Automated and Precise Event Detection Method for Big Data in Biomedical Imaging with Support Vector Machine

    Lufeng Yuan, Erlin Yao, Guangming Tan

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 105-113, 2018, DOI:10.32604/csse.2018.33.105

    Abstract This paper proposes a machine learning based method which can detect certain events automatically and precisely in biomedical imaging. We detect one important and not well-defined event, which is called flash, in fluorescence images of Escherichia coli. Given a time series of images, first we propose a scheme to transform the event detection on region of interest (ROI) in images to a classification problem. Then with supervised human labeling data, we develop a feature selection technique to utilize support vector machine (SVM) to solve this classification problem. To reduce the time in training SVM model,… More >

  • Open Access

    ARTICLE

    A Dynamic Independent Component Analysis Approach To Fault Detection With New Statistics

    M. Teimoortashloo1, A. Khaki Sedigh2,*

    Computer Systems Science and Engineering, Vol.33, No.1, pp. 5-20, 2018, DOI:10.32604/csse.2018.33.005

    Abstract This paper presents a fault detection method based on Dynamic Independent Component Analysis (DICA) with new statistics. These new statistics are statistical moments and first characteristic function that surrogate the norm operator to calculate the fault detection statistics to determine the control limit of the independent components (ICs). The estimation of first characteristic function by its series is modified such that the effect of series remainder on estimation is reduced. The advantage of using first characteristic function and moments, over second characteristic function and cumulants, as fault detection statistics is also presented. It is shown More >

  • Open Access

    ARTICLE

    Hybrid Architecture for Autonomous Load Balancing in Distributed Systems Based on Smooth Fuzzy Function

    Moazam Ali, Susmit Bagchi*

    Intelligent Automation & Soft Computing, Vol.24, No.4, 2018, DOI:10.31209/2018.100000043

    Abstract Due to the rapid advancements and developments in wide area networks and powerful computational resources, the load balancing mechanisms in distributed systems have gained pervasive applications covering wired as well as mobile distributed systems. In large-scale distributed systems, sharing of distributed resources is required for enhancing overall resource utilization. This paper presents a comprehensive study and detailed comparative analysis of different load balancing algorithms employing fuzzy logic and mobile agents. We have proposed a hybrid architecture for integrated load balancing and monitoring in distributed computing systems employing fuzzy logic and autonomous mobile agents. Furthermore, we More >

  • Open Access

    ARTICLE

    An Efficient Optimized Handover in Cognitive Radio Networks Using Cooperative Spectrum Sensing

    H. Anandakumara, K. Umamaheswarib

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 843-849, 2018, DOI:10.1080/10798587.2017.1364931

    Abstract Cognitive radio systems necessitate the incorporation of cooperative spectrum sensing among cognitive users to increase the reliability of detection. We have found that cooperative spectrum sensing is not only advantageous, but is also essential to avoid interference with any primary users. Interference by licensed users becomes a chief concern and issue, which affects primary as well as secondary users leading to restrictions in spectrum sensing in cognitive radios. When the number of cognitive users increases, the overheads of the systems, which are meant to report the sensing results to the common receiver, which becomes massive.… More >

Displaying 2991-3000 on page 300 of 3307. Per Page