Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Modeling and Analysis of Leftover Issues and Release Time Planning in Multi-Release Open Source Software Using Entropy Based Measure

    Meera Sharma1, H. Pham2, V.B. Singh3

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 33-46, 2019, DOI:10.32604/csse.2019.34.033

    Abstract In Open Source Software (OSS), users report different issues on issues tracking systems. Due to time constraint, it is not possible for developers to resolve all the issues in the current release. The leftover issues which are not addressed in the current release are added in the next release issue content. Fixing of issues result in code changes that can be quantified with a measure known as complexity of code changes or entropy. We have developed a 2-dimensional entropy based mathematical model to determine the leftover issues of different releases of five Apache open source products. A model for release… More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice that some text has been… More >

  • Open Access

    ARTICLE

    TSLBS: A Time-Sensitive and Load Balanced Scheduling Approach to Wireless Sensor Actor Networks

    Morteza Okhovvat, Mohammad Reza Kangavari*

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 13-21, 2019, DOI:10.32604/csse.2019.34.013

    Abstract Existing works on scheduling in Wireless Sensor Actor Networks (WSANs) are mostly concerned with energy savings and ignore time constraints and thus increase the make-span of the network. Moreover, these algorithms usually do not consider balance of workloads on the actor nodes and hence, sometimes some of the actors are busy when some others are idle. These problem causes the actors are not utilized properly and the actors’ lifetime is reduced. In this paper we take both time awareness and balance of workloads on the actor in WSANs into account and propose a convex optimization model (TAMMs) to minimize make-span.… More >

  • Open Access

    ARTICLE

    A Mathematical Task Dispatching Model in Wireless Sensor Actor Networks

    Morteza Okhovvat, Mohammad Reza Kangavari*

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 5-12, 2019, DOI:10.32604/csse.2019.34.005

    Abstract In this paper, we propose a mathematical task dispatching model to reduce the total tasks completion time, i.e. make-span, in Wireless Sensor Actor Networks (WSANs). The proposed approach minimizes the completion time of tasks that have been allocated to actors but have not yet been dispatched to actors for execution in the networks. We calculate the best rate of dispatching of tasks by the network sink to allocated actors through a steady state analysis of our proposed model to solve equations and inequalities. It is shown that this dispatching rate improves the network lifetime too. Experimental results with a prototyped… More >

  • Open Access

    ARTICLE

    Reliable Approximated Number System with Exact Bounds and Three-Valued Logic

    Reeseo Cha1, Wonhong Nam2,*, Jin-Young Choi1

    Computer Systems Science and Engineering, Vol.33, No.6, pp. 447-455, 2018, DOI:10.32604/csse.2018.33.447

    Abstract Many programming languages provides mechanism to guarantee the error ranges of exact numbers and intervals. However, when they are integrated with unreliable approximated numbers, we cannot rely on the error-ranges anymore. Such unreliable error-ranges may cause serious errors in programs, and especially in safety critical systems they cost us huge amount of money and/or threaten human’s life. Hence, in this paper, we propose a novel number system to safely perform arithmetic operations with guaranteed error ranges. In the number system, exact numbers are separated from approximated numbers, and approximated numbers with strictly guaranteed error-ranges are again separated from unwarranted numbers… More >

  • Open Access

    ARTICLE

    A Phoneme-Based Approach for Eliminating Out-of-vocabulary Problem Turkish Speech Recognition Using Hidden Markov Model

    Erdem Yavuz1,∗, Vedat Topuz2

    Computer Systems Science and Engineering, Vol.33, No.6, pp. 429-445, 2018, DOI:10.32604/csse.2018.33.429

    Abstract Since Turkish is a morphologically productive language, it is almost impossible for a word-based recognition system to be realized to completely model Turkish language. Due to the fact that it is difficult for the system to recognize words not introduced to it in a word-based recognition system, recognition success rate drops considerably caused by out-of-vocabulary words. In this study, a speaker-dependent, phoneme-based word recognition system has been designed and implemented for Turkish Language to overcome the problem. An algorithm for finding phoneme-boundaries has been devised in order to segment the word into its phonemes. After the segmentation of words into… More >

  • Open Access

    ARTICLE

    Energy Aware Routing Algorithm in Manet Using Linear Programming

    Hany Ramadan1,∗, Ben Bella S. Tawfik2, Alaa El Din M. Riad3

    Computer Systems Science and Engineering, Vol.33, No.6, pp. 421-428, 2018, DOI:10.32604/csse.2018.33.421

    Abstract Mobile ad hoc networks (MANET) are wireless network without infrastructure and suffering from low power battery. Therefore the main objective in finding a route for traffic transfer from a given source to a given destination is to minimize the node energy consumption. This paper solves the problem of finding a route satisfying the main objective of minimum energy consumption and other QoS requirements such as minimum delay and maximum packet delivery ratio by using linear programming technique. Two cases are considered: 1. The traffic amount of a given request is transmitted into single path, and 2. The traffic amount of… More >

  • Open Access

    ARTICLE

    Improving Support Vector Domain Description by Maximizing the Distance Between Negative Examples and The Minimal Sphere Center's

    Mohamed EL Boujnouni1, Mohamed Jedra2

    Computer Systems Science and Engineering, Vol.33, No.6, pp. 409-420, 2018, DOI:10.32604/csse.2018.33.409

    Abstract Support Vector Domain Description (SVDD) is an effective kernel-based method used for data description. It was motivated by the success of Support Vector Machine (SVM) and thus has inherited many of its attractive properties. It has been extensively used for novelty detection and has been applied successfully to a variety of classification problems. This classifier aims to find a sphere with minimal volume including the majority of examples that belong to the class of interest (positive) and excluding the most of examples that are either outliers or belong to other classes (negatives). In this paper we propose a new approach… More >

  • Open Access

    ARTICLE

    Research on the Clustering Analysis and Similarity in Factor Space

    Sha-Sha Li1,2,∗, Tie-Jun Cui1,2,3,†, Jian Liu1,2,‡

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 397-404, 2018, DOI:10.32604/csse.2018.33.397

    Abstract In this paper, we study the in uence of multiple domain attributes on the clustering analysis of object based on factor space. The representation method of graphical domain attribute is proposed for the object, which is called attribute circle. An attribute circle can represent infinite domain attributes. The similarity analysis of objects is first based on the concept of attribute circle, and the definition of graphical similarity is transformed into the definition of numerical similarity, and then the clustering analysis method of object set is studied and improved. Considering three kinds of graphical overlap, the analytic solution of similarity is… More >

  • Open Access

    ARTICLE

    Evaluation of Industry Eco-Industrialization: Case Study of Shaanxi, China

    Shuru Liu1, Ping He1, Jiqiang Dang2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 389-395, 2018, DOI:10.32604/csse.2018.33.389

    Abstract The rapid development of industry brings great pressure on resource and environment, forcing people to explore the road of ecological development. In China, the level of regional industry ecological development differs from each other due to different economic level of regions. This paper establishes ecoindustrialization index system from aspects of resource consumption, pollution emission, pollution abatement, economic and social development to reveal the connotation and characteristics of industry eco-industrialization, taking Shaanxi Province as an example, and adopts the principal component analysis to evaluate the industry eco-industrialization level of 2001-2015 in Shaanxi. The study shows that the level of industry eco-industrialization… More >

Displaying 1361-1370 on page 137 of 1407. Per Page