Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,442)
  • Open Access

    ARTICLE

    A Model to Create Organizational Value with Big Data Analytics

    Ali Mirarab1,∗, Seyedeh Leili Mirtaheri2,†, Seyed Amir Asghari3,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 69-79, 2020, DOI:10.32604/csse.2020.35.069

    Abstract Value creation is a major factor not only in the sustainability of organizations but also in the maximization of profit, customer retention, business goals fulfillment, and revenue. When the value is intended to be created from Big Data scenarios, value creation entails being understood over a broader range of complexity. A question that arises here is how organizations can use this massive quantity of data and create business value? The present study seeks to provide a model for creating organizational value using Big Data Analytics (BDA). To this end, after reviewing the related literature and… More >

  • Open Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051

    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange More >

  • Open Access

    ARTICLE

    Impact of Fuzzy Normalization on Clustering Microarray Temporal Datasets Using Cuckoo Search

    Swathypriyadharsini P1,∗, K.Premalatha2,†

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 39-50, 2020, DOI:10.32604/csse.2020.35.039

    Abstract Microarrays have reformed biotechnological research in the past decade. Deciphering the hidden patterns in gene expression data proffers a prodigious preference to strengthen the understanding of functional genomics. The complexity of biological networks with larger volume of genes also increases the challenges of comprehending and interpretation of the resulting mass of data. Clustering addresses these challenges, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. The clustering of gene expression data has been proven to be useful in making known the natural structure inherent… More >

  • Open Access

    ARTICLE

    Enhanced GPU-Based Anti-Noise Hybrid Edge Detection Method

    Sa’ed Abed, Mohammed H. Ali, Mohammad Al-Shayeji

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 21-37, 2020, DOI:10.32604/csse.2020.35.021

    Abstract Today, there is a growing demand for computer vision and image processing in different areas and applications such as military surveillance, and biological and medical imaging. Edge detection is a vital image processing technique used as a pre-processing step in many computer vision algorithms. However, the presence of noise makes the edge detection task more challenging; therefore, an image restoration technique is needed to tackle this obstacle by presenting an adaptive solution. As the complexity of processing is rising due to recent high-definition technologies, the expanse of data attained by the image is increasing dramatically.… More >

  • Open Access

    ARTICLE

    Developing an Adaptation Process for Real-Coded Genetic Algorithms

    Ridvan Saraçoğlu*, Ahmet Fatih Kazankaya

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 13-19, 2020, DOI:10.32604/csse.2020.35.013

    Abstract The genetic algorithm (GA) is a metaheuristic method which simulates the life cycle and the survival of the fittest in the nature for solving optimization problems. This study aimed to develop enhanced operation by modifying the current GA. This development process includes an adaptation method that contains certain developments and adds a new process to the classic algorithm. Individuals of a population will be trialed to adapt to the current solution of the problem by taking them separately for each generation. With this adaptation method, it is more likely to get better results in a More >

  • Open Access

    ARTICLE

    An Internet of Things Platform for Air Station Remote Sensing and Smart Monitoring

    David Corral-Plaza1, Juan Boubeta-Puig1, Guadalupe Ortiz1, Alfonso Garcia-de-Prado2,*

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 5-12, 2020, DOI:10.32604/csse.2020.35.005

    Abstract Air pollution is currently receiving more attention by international governments and organizations. Nevertheless, current systems for air quality monitoring lack essential requirements which are key in order to be effective concerning users’ access to the information and efficient regarding real-time monitoring and notification. This paper presents an Internet of Things platform for air station remote sensing and smart monitoring that combines Big Data and Cloud Computing paradigms to process and correlate air pollutant concentrations coming from multiple remote stations, as well as to trigger automatic and personalized alerts when a health risk for their particular More >

  • Open Access

    ARTICLE

    Application Layer Scheduling in Cloud: Fundamentals, Review and Research Directions

    Vaibhav Pandey, Poonam Saini

    Computer Systems Science and Engineering, Vol.34, No.6, pp. 357-376, 2019, DOI:10.32604/csse.2019.34.357

    Abstract The cloud computing paradigm facilitates a finite pool of on-demand virtualized resources on a pay-per-use basis. For large-scale heterogeneous distributed systems like a cloud, scheduling is an essential component of resource management at the application layer as well as at the virtualization layer in order to deliver the optimal Quality of Services (QoS). The cloud scheduling, in general, is an NP-hard problem due to large solution space, thus, it is difficult to find an optimal solution within a reasonable time. In application layer scheduling, the tasks are mapped to logical resources (i.e., virtual machines), aiming… More >

  • Open Access

    ARTICLE

    Improving Initial Flattening of Convex-Shaped Free-Form Mesh Surface Patches Using a Dynamic Virtual Boundary

    Erdem Yavuz1,∗, Rıfat Yazıcı2, Mustafa Cem Kasapba¸sı2, Turgay Tugay Bilgin1

    Computer Systems Science and Engineering, Vol.34, No.6, pp. 339-355, 2019, DOI:10.32604/csse.2019.34.339

    Abstract This study proposes an efficient algorithm for improving flattening result of triangular mesh surface patches having a convex shape. The proposed approach, based on barycentric mapping technique, incorporates a dynamic virtual boundary, which considerably improves initial mapping result. The dynamic virtual boundary approach is utilized to reduce the distortions for the triangles near the boundary caused by the nature of convex combination technique. Mapping results of the proposed algorithm and the base technique are compared by area and shape accuracy metrics measured for several sample surfaces. The results prove the success of the proposed approach More >

  • Open Access

    ARTICLE

    Using Spatial Relations for Qualitative Specification of Gestures

    Giuseppe Della Penna1,∗, Sergio Orefice2,†

    Computer Systems Science and Engineering, Vol.34, No.6, pp. 325-338, 2019, DOI:10.32604/csse.2019.34.325

    Abstract In this paper we present a qualitative spatial relation formalism capable to represent spatio-temporal knowledge. To this aim, we have added the notion of time within the formalisation of spatial relations in order to describe moving graphical objects. As a case study, we exploited this augmented formalism to support a qualitative specification of gestures, which are an increasingly relevant issue in the human-computer interaction field. The resulting technique provides gesture specification with a systematic and formal foundation. More >

  • Open Access

    ARTICLE

    Computer Network Assisted Test of Spoken English

    Lu Zuo*

    Computer Systems Science and Engineering, Vol.34, No.6, pp. 319-323, 2019, DOI:10.32604/csse.2019.34.319

    Abstract With the development of computer network technology, the means of foreign language teaching have changed. Computer aided spoken English test is a new test method, and there is a great advantage compared with the traditional oral test. In order to further understand the superiority of the computer aided spoken English test, this study took the sophomores of Foreign Language Department in Henan University of Chinese Medicine, China, as the subjects and carried out the traditional interview-type spoken English test and computer-assisted spoken English test. The score system based on Hidden Markov Model (HMM) was used,… More >

Displaying 1361-1370 on page 137 of 1442. Per Page