Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks

    Sadia Husain1, Fouad A. Abolaban2, Ali Ahmad1, Muhammad Ahsan Asim1, Yasir Ahmad1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 835-850, 2022, DOI:10.32604/csse.2022.018534

    Abstract Due to the combinatorial nature of graphs they are used easily in pure sciences and social sciences. The dynamical arrangement of vertices and their associated edges make them flexible (like liquid) to attain the shape of any physical structure or phenomenon easily. In the field of ICT they are used to reflect distributed component and communication among them. Mathematical chemistry is another interesting domain of applied mathematics that endeavors to display the structure of compounds that are formed in result of chemical reactions. This area attracts the researchers due to its applications in theoretical and organic chemistry. It also inspires… More >

  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge… More >

  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable techniques to extract meaningful insights… More >

  • Open Access

    ARTICLE

    A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce

    Tsung-Yin Ou1, Chen-Yang Cheng2, Chun Hsiung Lai3, Hsin-Pin Fu1,*

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 895-911, 2022, DOI:10.32604/csse.2022.018432

    Abstract This paper proposes a solution to the open vehicle routing problem with time windows (OVRPTW) considering third-party logistics (3PL). For the typical OVRPTW problem, most researchers consider time windows, capacity, routing limitations, vehicle destination, etc. Most researchers who previously investigated this problem assumed the vehicle would not return to the depot, but did not consider its final destination. However, by considering 3PL in the B2B e-commerce, the vehicle is required back to the nearest 3PL location with available space. This paper formulates the problem as a mixed integer linear programming (MILP) model with the objective of minimizing the total travel… More >

  • Open Access

    ARTICLE

    Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System

    Chia-Nan Wang1, Chien-Chang Chou2, Yu-Chi Chung1,*, Nguyen Ky Phuc Phan3, Van Thanh Nguyen4, Viet Tinh Nguyen4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1059-1072, 2022, DOI:10.32604/csse.2022.018259

    Abstract With the continuous development of technology, traditional manual work has been becoming more and more automated. Most large or medium-sized companies have applied Enterprise Resource Planning (ERP) software into their business and production activities. However, since many small firms cannot afford ERP because of its expensive cost, they often still employ manual work for the same tasks this software resolves, especially for scheduling. This paper aims to provide a possible solution for small businesses to try automated scheduling and discover whether it can help much. There are two main ways to make this determination: a mathematical model and a heuristic… More >

  • Open Access

    ARTICLE

    Model of a Composite Energy Storage System for Urban Rail Trains

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1145-1152, 2022, DOI:10.32604/csse.2022.017744

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Adaptive Fuzzy Control Model for Multi-Joint Manipulators

    Yanzan Han1,*, Huawen Zhang1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1043-1057, 2022, DOI:10.32604/csse.2022.017742

    Abstract Multi-joint manipulator systems are subject to nonlinear influences such as frictional characteristics, random disturbances and load variations. To account for uncertain disturbances in the operation of manipulators, we propose an adaptive manipulator control method based on a multi-joint fuzzy system, in which the upper bound information of the fuzzy system is constant and the state variables of the manipulator control system are measurable. The control algorithm of the system is a MIMO (multi-input-multi-output) fuzzy system that can approximate system error by using a robust adaptive control law to eliminate the shadow caused by approximation error. It can ensure the stability… More >

  • Open Access

    ARTICLE

    Adaptive Sliding Mode Control Method for Onboard Supercapacitors System

    Yanzan Han1,*, Hang Zhou1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1099-1108, 2022, DOI:10.32604/csse.2022.017741

    Abstract Urban rail trains have undergone rapid development in recent years due to their punctuality, high capacity and energy efficiency. Urban trains require frequent start/stop operations and are, therefore, prone to high energy losses. As trains have high inertia, the energy that can be recovered from braking comes in short bursts of high power. To effectively recover such braking energy, an onboard supercapacitor system based on a radial basis function neural network-based sliding mode control system is proposed, which provides robust adaptive performance. The supercapacitor energy storage system is connected to a bidirectional DC/DC converter to provide traction energy or absorb… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we… More >

  • Open Access

    ARTICLE

    Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data

    Jialin Ma1,*, Zhaojun Wang2, Hai Guo3, Qian Xie1,4, Tao Wang4, Bolun Chen5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 979-993, 2022, DOI:10.32604/csse.2022.016759

    Abstract Syndrome differentiation-based treatment is one of the key characteristics of Traditional Chinese Medicine (TCM). The process of syndrome differentiation is difficult and challenging due to its complexity, diversity and vagueness. Analyzing syndrome principles from historical records of TCM using data mining (DM) technology has been of high interest in recent years. Nevertheless, in most relevant studies, existing DM algorithms have been simply developed for TCM mining, while the combination of TCM theories or its characteristics with DM algorithms has rarely been reported. This paper presents a novel Symptom-Syndrome Topic Model (SSTM), which is a supervised probabilistic topic model with three-tier… More >

Displaying 10781-10790 on page 1079 of 22225. Per Page