Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Prediction and Abnormality Assertion on Emu Brake Pad Based on Multivariate Integrated Random Walk

    Hongsheng Su1,2,∗, Shuangshuang Wang1, Dengfei Wang2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 351-360, 2018, DOI:10.32604/csse.2018.33.351

    Abstract To better solve the issue with abnormal failure of electric motor unit (EMU) brake pad resulted from various random factors in the ever-changing operating environment, in this paper, a new evaluation method of performance prediction and abnormity decision is proposed based on the Multivariate integrated random walk (MIRW) model. In this method, the state space model of the EMU brake pad performance degradation is firstly established. And then based on the observed data, the brake pad performance degradation trend is extracted by the fixed interval forward - backward smoothing algorithm. Based on it, the future… More >

  • Open Access

    ARTICLE

    Liveness and Boundedness Preservations of Sharing Synthesis of Petri Net Based Representation for Embedded Systems

    Chuanliang Xia, Bin Shen, Hailin Zhang, Yigui Wang

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 345-350, 2018, DOI:10.32604/csse.2018.33.345

    Abstract Petri net based Representation for Embedded Systems (PRES+) is an outstanding methodology for analysis, modeling and verification of embedded systems. State space explosion is an awful problem for PRES+ to model and analyze large complex embedded systems. In order to solve this problem, we concern with a method for expending PRES+ model by using synthesis approach. A kind of sharing synthesis operation for PRES+ is proposed in this paper. Under some conditions liveness and boundedness will be preserved by using this sharing synthesis approach. An applicable example in the form of an embedded control system More >

  • Open Access

    ARTICLE

    Lateral Conflict Model of Training Flight Based on Subjective Factors

    Kaijun Xu, Yusheng Yao, Shanshan Li

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 335-344, 2018, DOI:10.32604/csse.2018.33.335

    Abstract The flight lateral conflict model which is based on human subjective factors has always been a research hotspot for training flight. In order to effectively evaluate the safety interval and lateral collision risk in training airspace, in this paper, pilot subjective factors were modeled. It was studied in lateral conflict risk of low altitude complex flight by flight performance shaping factor. By analyzing flight data of a flight training institution in China, it is pointed that the lateral collision risk in specific training airspace meets the requirement of safety target level of international civil aviation More >

  • Open Access

    ARTICLE

    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327

    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the… More >

  • Open Access

    ARTICLE

    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317

    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication More >

  • Open Access

    ARTICLE

    ADL-RAID: Energy-Saving Data Layout for Dynamic Loads

    Youxi Wu1,2, Shengyuan Shi1,2, Jingyu Liu1,2,*, Huaizhong Zhu1,2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 309-316, 2018, DOI:10.32604/csse.2018.33.309

    Abstract With the rapid development of information technology and the explosive growth of data, the scale of storage equipment is growing rapidly. The high energy consumption storage devices have become a serious problem for data centers. For data storage, the model of sequential data access a storage system is commonly used. Aiming at the characteristics of a sequential data storage system, this paper, we propose a structure, named Adapted to Dynamic Load based on Redundant Array Independent Disks (ADL-RAID) which is an effective energy-saving data layout for dynamic loads based on the existing Semi-Redundant Array Independent… More >

  • Open Access

    ARTICLE

    A Description Method for Formalizing Domain-Specific Modelling Language

    Tao Jiang

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 299-308, 2018, DOI:10.32604/csse.2018.33.299

    Abstract Many Domain-Specific Modelling Languages (DSML) can not formally define their semantics, which inevitably brings many problems, such as accurate description and automatic verification of model properties. In this paper, we propose a formal description method of the structural semantics of DSML for verifying consistency of models built based on DSML. Firstly, domain indicating structural semantics of DSML is formally defined based on algebra, and then, we briefly describe our framework for formalizing DSML and verifying consistency of DSML and its models and use a classic case to illustrate our approach; based on this, we construct More >

  • Open Access

    EDITORIAL

    SPECIAL ISSUE: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)

    Zheng Xu1, Kun Gao2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 297-298, 2018, DOI:10.32604/csse.2018.33.297

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Topic Evolution Analysis in Social Networking Services: Taking Sina Weibo as an Example

    Yuhui Wang

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 287-291, 2018, DOI:10.32604/csse.2018.33.287

    Abstract Event-related topics in social networking services are always the epitome of heated society issues, therefore determining the significance of analyzing its evolution patterns. In this paper, we present a comprehensive survey on the tweets about "ransomware" in Sina Weibo, a famous social networking service similar to twitter in China. The keyword corresponds to a global ransomware attack in May 2017, on which our example event-related topics are based. We collect text data from sina Weibo and vectorize each tweets, before using a dynamic topic model to discover the event-related topics. The results of the topic More >

  • Open Access

    ARTICLE

    Spectrum Allocation for Cognitive Radio Networks Using the Fireworks Algorithm

    Zhou Feng, Xue Weilian*

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 275-286, 2018, DOI:10.32604/csse.2018.33.275

    Abstract The fireworks algorithm features a small number of parameters, remarkable optimization ability, and resistance to a local optimum. Based on the graph coloring model, the fireworks algorithm is introduced for the first time to solve the spectrum allocation problem for cognitive radio networks, thus maximizing utility and fairness of spectrum allocation. Two-layer binary coding is adopted for individual fireworks. The first layer refers to the coding of cognitive users used to determine channels that can be connected with the user. The second layer refers to the auxiliary coding of channels responsible for addressing mutual interference More >

Displaying 1461-1470 on page 147 of 1494. Per Page