Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,470)
  • Open Access

    ARTICLE

    Implementation of Embedded Technology-Based English Speech Identification and Translation System

    Zheng Zeng

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 377-383, 2020, DOI:10.32604/csse.2020.35.377

    Abstract Due to the increase in globalization, communication between different countries has become more and more frequent. Language barriers are the most important issues in communication. Machine translation is limited to texts, and cannot be an adequate substitute for oral communication. In this study, a speech recognition and translation system based on embedded technology was developed for the purpose of English speech recognition and translation. The system adopted the Hidden Markov Model (HMM) and Windows CE operating system. Experiments involving English speech recognition and EnglishChinese translation found that the accuracy of the system in identifying English More >

  • Open Access

    ARTICLE

    Parametric Evaluation of Routing Algorithms in Network on Chip Architecture

    Mohammad Behrouzian Nejad

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 367-375, 2020, DOI:10.32604/csse.2020.35.367

    Abstract Considering that routing algorithms for the Network on Chip (NoC) architecture is one of the key issues that determine its ultimate performance, several things have to be considered for developing new routing algorithms. This includes examining the strengths, capabilities, and weaknesses of the commonly proposed algorithms as a starting point for developing new ones.
    Because most of the algorithms presented are based on the well-known algorithms that are studied and evaluated in this research. Finally, according to the results produced under different conditions, better decisions can be made when using the aforementioned algorithms as well as… More >

  • Open Access

    ARTICLE

    Secure Information Access Strategy for a Virtual Data Centre

    Sivaranjani Balakrishnan1,∗, D. Surendran2,†

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 357-366, 2020, DOI:10.32604/csse.2020.35.357

    Abstract With the arrival of on-demand computing, data centre requirements are extensive, with fluid boundaries. Loaded Internet applications, service-oriented architectures, virtualization and security provisioning are the major operations of a data centre. Security is an absolute necessity of any network architecture, and the virtual IT data centre is no exception. At the boundary, security is focused on securing the terminals of the data centre from external threats and providing a secure gateway to the Internet. The paradigm shift towards a new computing environment makes communications more complicated for Infrastructure Providers (InP). This complexity includes the security… More >

  • Open Access

    ARTICLE

    Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks

    Anar A. Hady

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 347-355, 2020, DOI:10.32604/csse.2020.35.347

    Abstract In this paper, a Duty Cycling Centralized Hierarchical Protocol (DCCHP) has been proposed for wireless sensor networks. DCCHP is an energy efficient protocol that prolongs the lifetime of the network by applying a duty cycling mechanism named DCM that chooses the nodes that send unimportant data in a certain epoch to be candidates to be put to sleep. But if the proposed equations for choosing the cluster head nodes put any of them in a high priority it works in the active mode. When comparing DCCHP to the previously proposed LEACH-CS, LEACH-C protocols, using a More >

  • Open Access

    ARTICLE

    A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network

    Gundala Swathi*

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 335-345, 2020, DOI:10.32604/csse.2020.35.335

    Abstract Researches in wireless mobile ad hoc networks have an inherent challenge of vulnerable diagnosis due to the diverse behaviour pattern of the vulnerable nodes causing heterogeneous vtype1, vtype2, vtupe3 and vtype4 faults. This paper proposes a protocol for the diagnosis of vulnerability nodes with threephases of clustering, vulnerable detection and vulnerable fault classification in wireless networks. This protocol employs the technique of probabilistic neural network for classification of vulnerable nodes and detects vulnerable nodes through timeout mechanism and vtype3, vtype4, vtype1, vtype2 nodes through the method of analysis variance. Network simulator NS-2.3.35 is employed for More >

  • Open Access

    ARTICLE

    Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems

    Tharam S. Dillon1,2,∗, Yi-Ping Phoebe Chen1,†, Elizabeth Chang2,‡, Mukesh Mohania3,§, Vish Ramakonar4

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 321-334, 2020, DOI:10.32604/csse.2020.35.321

    Abstract In Digital Enterprises Structured Data and Semi/Unstructured Content are normally stored in two different repositories, with the first often being stored in relational Databases and the second in a content manager which is frequently at an external outsourcer. This storage of complementary information in two different silos has led to the information being processed and data mined separately which is undesirable. Effective knowledge and information use requires seamless access and intelligent analysis of information in its totality to allow enterprises to gain enhanced insights. In this paper, we develop techniques to carry out correlation of More >

  • Open Access

    ARTICLE

    Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application

    Tao Liao1,‡, Weicheng Fu1,†, Shunxiang Zhang1,*, Zongtian Liu2,§

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 311-319, 2020, DOI:10.32604/csse.2020.35.311

    Abstract Event trigger recognition is a sub-task of event extraction, which is important for text classification, topic tracking and so on. In order to improve the effectiveness of using word features as a benchmark, a new event trigger recognition method based on positive and negative weight computing is proposed. Firstly, the associated word feature, the part-of-speech feature and the dependency feature are combined. Then, the combination of these three features with positive and negative weight computing is used to identify triggers. Finally, the text classification is carried out based on the event triggers. Findings from our More >

  • Open Access

    ARTICLE

    Security of Chip Bank Card in Remote Payment Based on Risk Feature

    Zheng Fang1,∗, Junyun Cai1, Lifang Tian2

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 299-305, 2020, DOI:10.32604/csse.2020.35.299

    Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. More >

  • Open Access

    ARTICLE

    Decision Tree Algorithm for Precision Marketing via Network Channel

    Yulan Zheng

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 293-298, 2020, DOI:10.32604/csse.2020.35.293

    Abstract With the development of e-commerce, more and more enterprises attach importance to precision marketing for network channels. This study adopted the decision tree algorithm in data mining to achieve precision marketing. Firstly, precision marketing and C4.5 decision tree algorithm were briefly introduced. Then e-commerce enterprise A was taken as an example. The data from January to June 2018 were collected. Four attributes including age, income, occupation and educational background were selected for calculation and decision tree was established to extract classification rules.The results showed that the consumers of the products of the company were high-income More >

  • Open Access

    ARTICLE

    Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study

    Muhammed Enes Bayrakdar

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283

    Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried More >

Displaying 1361-1370 on page 137 of 1470. Per Page