Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks… More >

  • Open Access

    REVIEW

    An Evaluation of Value-Oriented Review for Software Requirements Specification

    Qiang Zhi1,*, Shuji Morisaki2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 443-461, 2021, DOI:10.32604/csse.2021.015157

    Abstract A software requirements specification (SRS) is a detailed description of a software system to be developed. This paper proposes and evaluates a lightweight review approach called value-oriented review (VOR) to detect defects in SRS. This approach comprises setting core values based on SRS and detecting the defects disturbing the core values. To evaluate the effectiveness of the proposed approach, we conducted a controlled experiment to investigate whether reviewers could identify and record the core values based on SRS and find defects disturbing the core values. Results of the evaluation with 56 software engineers showed that 91% of the reviewers identified… More >

  • Open Access

    ARTICLE

    Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia

    Abdulaziz Attaallah1, Sabita Khatri2, Mohd Nadeem2, Syed Anas Ansar2, Abhishek Kumar Pandey2, Alka Agrawal2,*

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 313-329, 2021, DOI:10.32604/csse.2021.014933

    Abstract A significant increase in the number of coronavirus cases can easily be noticed in most of the countries around the world. Inspite of the consistent preventive initiatives being taken to contain the spread of this virus, the unabated increase in the cases is both alarming and intriguing. The role of mathematical models in predicting and estimating the spread of the virus, and identifying various preventive factors dependencies has been found important and effective in most of the previous pandemics like Severe Acute Respiratory Syndrome (SARS) 2003. In this research work, authors have proposed the Susceptible-Infectected-Removed (SIR) model variation in order… More >

  • Open Access

    ARTICLE

    Chinese Relation Extraction on Forestry Knowledge Graph Construction

    Qi Yue, Xiang Li, Dan Li*

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 423-442, 2021, DOI:10.32604/csse.2021.014448

    Abstract Forestry work has long been weak in data integration; its initial state will inevitably affect the forestry project development and decision-quality. Knowledge Graph (KG) can provide better abilities to organize, manage, and understand forestry knowledge. Relation Extraction (RE) is a crucial task of KG construction and information retrieval. Previous researches on relation extraction have proved the performance of using the attention mechanism. However, these methods focused on the representation of the entire sentence and ignored the loss of information. The lack of analysis of words and syntactic features contributes to sentences, especially in Chinese relation extraction, resulting in poor performance.… More >

  • Open Access

    ARTICLE

    Optimal Solution of Fuzzy Transportation Problem Using Octagonal Fuzzy Numbers

    D. Gurukumaresan1,*, C. Duraisamy1, R. Srinivasan2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 415-421, 2021, DOI:10.32604/csse.2021.014130

    Abstract In this paper a fuzzy transportation problem under a fuzzy environment is solved using octagonal fuzzy numbers. The transportation problem is significant and has been widely studied in the field of applied mathematics to solve a system of linear equations in many applications in science. Systems of concurrent linear equations play a vital major role in operational research. The main perspective of this research paper is to find out the minimum amount of transportation cost of some supplies through a capacitated network formerly the availability and the demand notes are octagonal fuzzy numbers. Octagonal fuzzy numbers are used and showed… More >

  • Open Access

    ARTICLE

    Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System

    Jiayi Wang, Xinhui Liu, Jinshi Chen*, Tongjian Wang, Xin Wang

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 381-398, 2021, DOI:10.32604/csse.2021.014011

    Abstract

    With the development and improvement of the hydraulic steering system, the articulated steering system became the research focus of numerous domestic and foreign scholars. The full hydraulic steering system with a compact structure and ease of operation, is widely used in articulated steering mode. Furthermore, its performance can directly impact the steering sensitivity and stability. This paper studies the working principle and actual structure of the priority valve and the steering control valve, which are very important. By setting up a mathematic model, the system’s load-sensing characteristics and the impact of steering control valve bypass throttle damping on steering stability… More >

  • Open Access

    ARTICLE

    A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis

    V. Vidya Lakshmi1,*, J. S. Leena Jasmine2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 233-245, 2021, DOI:10.32604/csse.2021.015700

    Abstract Melanoma or skin cancer is the most dangerous and deadliest disease. As the incidence and mortality rate of skin cancer increases worldwide, an automated skin cancer detection/classification system is required for early detection and prevention of skin cancer. In this study, a Hybrid Artificial Intelligence Model (HAIM) is designed for skin cancer classification. It uses diverse multi-directional representation systems for feature extraction and an efficient Exponentially Weighted and Heaped Multi-Layer Perceptron (EWHMLP) for the classification. Though the wavelet transform is a powerful tool for signal and image processing, it is unable to detect the intermediate dimensional structures of a medical… More >

  • Open Access

    ARTICLE

    Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer

    Hegazy Rezk1,*, Mohamed A. Mohamed2, Ahmed A. Zaki Diab2, N. Kanagaraj1

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 219-231, 2021, DOI:10.32604/csse.2021.015543

    Abstract A reliable approach based on a multi-verse optimization algorithm (MVO) for designing load frequency control incorporated in multi-interconnected power system comprising wind power and photovoltaic (PV) plants is presented in this paper. It has been applied for optimizing the control parameters of the load frequency controller (LFC) of the multi-source power system (MSPS). The MSPS includes thermal, gas, and hydro power plants for energy generation. Moreover, the MSPS is integrated with renewable energy sources (RES). The MVO algorithm is applied to acquire the ideal parameters of the controller for controlling a single area and a multi-area MSPS integrated with RES.… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

Displaying 1221-1230 on page 123 of 1407. Per Page