Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Mixed Attention Densely Residual Network for Single Image Super-Resolution

    Jingjun Zhou1,2, Jing Liu3, Jingbing Li1,2,*, Mengxing Huang1,2, Jieren Cheng4, Yen-Wei Chen5, Yingying Xu3,6, Saqib Ali Nawaz1

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 133-146, 2021, DOI:10.32604/csse.2021.016633

    Abstract Recent applications of convolutional neural networks (CNNs) in single image super-resolution (SISR) have achieved unprecedented performance. However, existing CNN-based SISR network structure design consider mostly only channel or spatial information, and cannot make full use of both channel and spatial information to improve SISR performance further. The present work addresses this problem by proposing a mixed attention densely residual network architecture that can make full and simultaneous use of both channel and spatial information. Specifically, we propose a residual in dense network structure composed of dense connections between multiple dense residual groups to form a very deep network. This structure… More >

  • Open Access

    ARTICLE

    Output Feedback Robust H Control for Discrete 2D Switched Systems

    Wenjun Gao1, Yang Yang1,*, Hongtao Duan1, Mingsheng Li1, Jinrong Ma1, Songwei Jin2

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 69-85, 2021, DOI:10.32604/csse.2021.016475

    Abstract The two-dimensional (2-D) system has a wide range of applications in different fields, including satellite meteorological maps, process control, and digital filtering. Therefore, the research on the stability of 2-D systems is of great significance. Considering that multiple systems exist in switching and alternating work in the actual production process, but the system itself often has external perturbation and interference. To solve the above problems, this paper investigates the output feedback robust H stabilization for a class of discrete-time 2-D switched systems, which the Roesser model with uncertainties represents. First, sufficient conditions for exponential stability are derived via the average… More >

  • Open Access

    ARTICLE

    An Improved Q-RRT* Algorithm Based on Virtual Light

    Chengchen Zhuge1,2,3,*, Qun Wang1,2,3, Jiayin Liu1,2,3, Lingxiang Yao4

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 107-119, 2021, DOI:10.32604/csse.2021.016273

    Abstract The Rapidly-exploring Random Tree (RRT) algorithm is an efficient path-planning algorithm based on random sampling. The RRT* algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solution. However, it has been proven to take an infinite time to do so. An improved Quick-RRT* (Q-RRT*) algorithm based on a virtual light source is proposed in this paper to overcome this problem. The virtual light-based Q-RRT* (LQ-RRT*) takes advantage of the heuristic information generated by the virtual light on the map. In this way, the tree can find the initial solution quickly. Next, the LQ-RRT* algorithm… More >

  • Open Access

    ARTICLE

    Pseudonym Mutable Based Privacy for 5G User Identity

    Rashid A. Saeed1, Mamoon M. Saeed2,3, Rania A. Mokhtar1, Hesham Alhumyani1, S. Abdel-Khalek4,*

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 1-14, 2021, DOI:10.32604/csse.2021.015593

    Abstract Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards’ bodies should ensure users’ identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed… More >

  • Open Access

    ARTICLE

    Extended Rama Distribution: Properties and Applications

    Khaldoon M. Alhyasat1,*, Kamarulzaman Ibrahim1, Amer Al-Omari2, Mohd Aftar Abu Bakar1

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 55-67, 2021, DOI:10.32604/csse.2021.014909

    Abstract In this paper, the Rama distribution (RD) is considered, and a new model called extended Rama distribution (ERD) is suggested. The new model involves the sum of two independent Rama distributed random variables. The probability density function (pdf) and cumulative distribution function (cdf) are obtained and analyzed. It is found that the new model is skewed to the right. Several mathematical and statistical properties are derived and proved. The properties studied include moments, coefficient of variation, coefficient of skewness, coefficient of kurtosis and moment generating function. Some simulations are undertaken to illustrate the behavior of these properties. In addition, the… More >

  • Open Access

    ARTICLE

    Quantifying the Mechanical Properties of White Sandstone Based on Computer Fractal Theory

    Yong Wang, Yongyan Wang*, Nan Qin, Sa Huang, Le Chang, Shunzheng Hou

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 121-131, 2021, DOI:10.32604/csse.2021.014464

    Abstract The work presented in this paper was conducted to quantify the relationship between the pore characteristics and mechanical properties of white sandstone. The study include tests carried out under the coupling effects of chemical corrosion, temperature, nuclear magnetic resonance, and mechanical tests. Computer fractal theory was employed to describe and quantify the characteristics of the growth of pores in white sandstone under the same coupling effect. A custom developed program code, in the MATLAB software platform, was used for calculating the growths of the pores in white sandstone when subjected to coupling effects. The correlation between the computer fractal dimension… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

  • Open Access

    ARTICLE

    Efficient Concurrent L1-Minimization Solvers on GPUs

    Xinyue Chu1, Jiaquan Gao1,*, Bo Sheng2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 305-320, 2021, DOI:10.32604/csse.2021.017144

    Abstract Given that the concurrent L1-minimization (L1-min) problem is often required in some real applications, we investigate how to solve it in parallel on GPUs in this paper. First, we propose a novel self-adaptive warp implementation of the matrix-vector multiplication (Ax) and a novel self-adaptive thread implementation of the matrix-vector multiplication (ATx), respectively, on the GPU. The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size. Second, based on the above proposed kernels, the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from the perspective of the… More >

  • Open Access

    ARTICLE

    Reverse Engineering of Mobile Banking Applications

    Syeda Warda Asher1, Sadeeq Jan1,*, George Tsaramirsis2, Fazal Qudus Khan3, Abdullah Khalil1, Muhammad Obaidullah4

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 265-278, 2021, DOI:10.32604/csse.2021.016787

    Abstract Software reverse engineering is the process of analyzing a software system to extract the design and implementation details. Reverse engineering provides the source code of an application, the insight view of the architecture and the third-party dependencies. From a security perspective, it is mostly used for finding vulnerabilities and attacking or cracking an application. The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics. Nowadays, reverse engineering is widely used for mobile applications and is considered a security risk. The Open Web Application Security Project (OWASP), a leading security research… More >

  • Open Access

    ARTICLE

    UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques

    Kundan Kumar*, Rajeev Arya

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 321-337, 2021, DOI:10.32604/csse.2021.016748

    Abstract Great strides have been made to realistically deploy multiple Unmanned Aerial Vehicles (UAVs) within the commercial domain, which demands a proper coordination and reliable communication among the UAVs. UAVs suffer from limited time of flight. Conventional techniques suffer from high delay, low throughput, and early node death due to aerial topology of UAV networks. To deal with these issues, this paper proposes a UAV parameter vector which considers node energy, channel state information and mobility of UAVs. By intelligently estimating the proposed parameter, the state of UAV can be predicted closely. Accordingly, efficient clustering may be achieved by using suitable… More >

Displaying 1181-1190 on page 119 of 1407. Per Page