Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,480)
  • Open Access

    ARTICLE

    Preface of Special Issue: Future Internet

    Xiulong Liu1, Mianxiong Dong2, Xiaobo Zhou3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 233-234, 2018, DOI:10.32604/csse.2018.33.233

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Integrating a Decision Tree Perspective at the Operational-Level of BPM+

    Ahmad Alomari1,∗, Alain April1, Carlos Monsalve2, Amjad Gawanmeh3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 219-227, 2018, DOI:10.32604/csse.2018.33.219

    Abstract Decision trees are among the best-known decision-making techniques and have been used extensively for both data analysis and predictive modeling. BPM+ is a novel process modeling approach that helps represent business process models in a consistent and structured way to meet different stakeholders’ process representation needs. This paper reports on the outcomes of an ontological analysis of the potential use of decision-tree representations as a new BPM+ perspective for the operational level of abstraction. This new perspective effectively demonstrates how a specialized/operational BPM stakeholder perspective can be used to improve the existing organizational business process More >

  • Open Access

    ARTICLE

    Forensic Investigation Through Data Remnants on Hadoop Big Data Storage System

    Myat Nandar Oo1, Sazia Parvin2, Thandar Thein3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 203-217, 2018, DOI:10.32604/csse.2018.33.203

    Abstract Forensic examiners are in an uninterrupted battle with criminals in the use of Big Data technology. The underlying storage system is the main scene to trace the criminal activities. Big Data Storage System is identified as an emerging challenge to digital forensics. Thus, it requires the development of a sound methodology to investigate Big Data Storage System. Since the use of Hadoop as Big Data Storage System continues to grow rapidly, investigation process model for forensic analysis on Hadoop Storage and attached client devices is compulsory. Moreover, forensic analysis on Hadoop Big Data Storage System More >

  • Open Access

    ARTICLE

    Sentiment Analysis System in Big Data Environment

    Wint Nyein Chan1, Thandar Thein2

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 187-202, 2018, DOI:10.32604/csse.2018.33.187

    Abstract Nowadays, Big Data, a large volume of both structured and unstructured data, is generated from Social Media. Social Media are powerful marketing tools and social big data can offer the business insights. The major challenge facing social big data is attaining efficient techniques to collect a large volume of social data and extract insights from the huge amount of collected data. Sentiment Analysis of social big data can provide business insights by extracting the public opinions. The traditional analytic platforms need to be scaled up for analyzing a large volume of social big data. Social… More >

  • Open Access

    ARTICLE

    A Risk Poker Based Testing Model for Scrum

    Siti Noor Hasanah Ghazali1, Siti Salwah Salim1,*, Irum Inayat2, Siti Hafizah Ab Hamid1

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 169-185, 2018, DOI:10.32604/csse.2018.33.169

    Abstract In agile software development, project estimation often depends on group discussion and expert opinions. Literature claims that group discussion in risk analysis helps to identify some of the crucial issues that might affect development, testing, and implementation. However, risk prioritization often relies on individual expert judgment. Therefore, Risk Poker, a lightweight risk-based testing methodology in which risk analysis is performed through group discussion that outperforms the individual analyst’s estimation is introduced in agile methods. Keeping in view aforementioned benefits Risk Poker can offer, unfortunately, no study has been conducted to empirically prove its ability to… More >

  • Open Access

    ARTICLE

    Online And Offline Scheduling Schemes to Maximize the Weighted Delivered Video Packets Towards Maritime Cpss

    Tingting Yang1, Hailong Feng1, Chengming Yang2, Ge Guo3, Tieshan Li1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 157-164, 2018, DOI:10.32604/csse.2018.33.157

    Abstract In this paper, the online and offline scheduling schemes towards maritime Cyber Physical Systems (CPSs), to transmit video packets generating from the interior of vessel. During the sailing from the origin port to destination port, the video packets could be delivered via the infostations shoreside. The video packets have their respective release times, deadlines, weights and processing time. The video packets only could be successfully transmitted before their deadlines. A mathematic job-machine problem is mapped. Facing distinguished challenges with unique characteristics imposed in maritime scenario, we focus on the heterogeneous networking and resource optimal scheduling More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

  • Open Access

    ARTICLE

    Human Movement Detection and Gait Periodicity Analysis via Channel State Information

    Wenyuan Liu1,2, Zijuan Liu1,*, Lin Wang1, Binbin Li1, Nan Jing1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 137-147, 2018, DOI:10.32604/csse.2018.33.137

    Abstract In recent years, movement detection and gait recognition methods using different techniques emerge in an endless stream. On the one hand, wearable sensors need be worn by the detecting target and the method based on camera requires line of sight. On the other hand, radio frequency signals are easy to be impaired. In this paper, we propose a novel multi-layer filter of channel state information (CSI) to capture moving individuals in dynamic environments and analyze his/her gait periodicity. We design and evaluate an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal More >

  • Open Access

    ARTICLE

    MapReduce Implementation of an Improved Xml Keyword Search Algorithm

    Yong Zhang1,2, Jing Cai1, Quanlin Li1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 125-135, 2018, DOI:10.32604/csse.2018.33.125

    Abstract Extensible Markup Language (XML) is commonly employed to represent and transmit information over the Internet. Therefore, how to effectively search for keywords of massive XML data becomes a new issue. In this paper, we first present four properties to improve the classical ILE algorithm. Then, a kind of parallel XML keyword search algorithm, based on intelligent grouping to calculate SLCA, is proposed and realized under MapReduce programming model. At last, a series of experiments are implemented on 7 datasets of different sizes. The obtained results indicate that the proposed algorithm has high execution efficiency and More >

  • Open Access

    ARTICLE

    Effective Piecewise Linear Skeletonization of Sparse Shapes

    Wenyu Qu1, Zhiyang Li2,*, Junfeng Wu2, Yinan Wu3, Zhaobin Liu2

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 115-123, 2018, DOI:10.32604/csse.2018.33.115

    Abstract Conventional image skeletonization techniques implicitly assume the pixel level connectivity. However, noise inside the object regions destroys the connectivity and exhibits sparseness in the image. We present a skeletonization algorithm designed for these kinds of sparse shapes. The skeletons are produced quickly by using three operations. First, initial skeleton nodes are selected by farthest point sampling with circles containing the maximum effective information. A skeleton graph of these nodes is imposed via inheriting the neighborhood of their associated pixels, followed by an edge collapse operation. Then a skeleton tting process based on feature-preserving Laplacian smoothing More >

Displaying 1461-1470 on page 147 of 1480. Per Page