Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable techniques to extract meaningful insights… More >

  • Open Access

    ARTICLE

    A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce

    Tsung-Yin Ou1, Chen-Yang Cheng2, Chun Hsiung Lai3, Hsin-Pin Fu1,*

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 895-911, 2022, DOI:10.32604/csse.2022.018432

    Abstract This paper proposes a solution to the open vehicle routing problem with time windows (OVRPTW) considering third-party logistics (3PL). For the typical OVRPTW problem, most researchers consider time windows, capacity, routing limitations, vehicle destination, etc. Most researchers who previously investigated this problem assumed the vehicle would not return to the depot, but did not consider its final destination. However, by considering 3PL in the B2B e-commerce, the vehicle is required back to the nearest 3PL location with available space. This paper formulates the problem as a mixed integer linear programming (MILP) model with the objective of minimizing the total travel… More >

  • Open Access

    ARTICLE

    Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System

    Chia-Nan Wang1, Chien-Chang Chou2, Yu-Chi Chung1,*, Nguyen Ky Phuc Phan3, Van Thanh Nguyen4, Viet Tinh Nguyen4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1059-1072, 2022, DOI:10.32604/csse.2022.018259

    Abstract With the continuous development of technology, traditional manual work has been becoming more and more automated. Most large or medium-sized companies have applied Enterprise Resource Planning (ERP) software into their business and production activities. However, since many small firms cannot afford ERP because of its expensive cost, they often still employ manual work for the same tasks this software resolves, especially for scheduling. This paper aims to provide a possible solution for small businesses to try automated scheduling and discover whether it can help much. There are two main ways to make this determination: a mathematical model and a heuristic… More >

  • Open Access

    ARTICLE

    Model of a Composite Energy Storage System for Urban Rail Trains

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1145-1152, 2022, DOI:10.32604/csse.2022.017744

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Adaptive Fuzzy Control Model for Multi-Joint Manipulators

    Yanzan Han1,*, Huawen Zhang1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1043-1057, 2022, DOI:10.32604/csse.2022.017742

    Abstract Multi-joint manipulator systems are subject to nonlinear influences such as frictional characteristics, random disturbances and load variations. To account for uncertain disturbances in the operation of manipulators, we propose an adaptive manipulator control method based on a multi-joint fuzzy system, in which the upper bound information of the fuzzy system is constant and the state variables of the manipulator control system are measurable. The control algorithm of the system is a MIMO (multi-input-multi-output) fuzzy system that can approximate system error by using a robust adaptive control law to eliminate the shadow caused by approximation error. It can ensure the stability… More >

  • Open Access

    ARTICLE

    Adaptive Sliding Mode Control Method for Onboard Supercapacitors System

    Yanzan Han1,*, Hang Zhou1, Zengfang Shi1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1099-1108, 2022, DOI:10.32604/csse.2022.017741

    Abstract Urban rail trains have undergone rapid development in recent years due to their punctuality, high capacity and energy efficiency. Urban trains require frequent start/stop operations and are, therefore, prone to high energy losses. As trains have high inertia, the energy that can be recovered from braking comes in short bursts of high power. To effectively recover such braking energy, an onboard supercapacitor system based on a radial basis function neural network-based sliding mode control system is proposed, which provides robust adaptive performance. The supercapacitor energy storage system is connected to a bidirectional DC/DC converter to provide traction energy or absorb… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we… More >

  • Open Access

    ARTICLE

    Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data

    Jialin Ma1,*, Zhaojun Wang2, Hai Guo3, Qian Xie1,4, Tao Wang4, Bolun Chen5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 979-993, 2022, DOI:10.32604/csse.2022.016759

    Abstract Syndrome differentiation-based treatment is one of the key characteristics of Traditional Chinese Medicine (TCM). The process of syndrome differentiation is difficult and challenging due to its complexity, diversity and vagueness. Analyzing syndrome principles from historical records of TCM using data mining (DM) technology has been of high interest in recent years. Nevertheless, in most relevant studies, existing DM algorithms have been simply developed for TCM mining, while the combination of TCM theories or its characteristics with DM algorithms has rarely been reported. This paper presents a novel Symptom-Syndrome Topic Model (SSTM), which is a supervised probabilistic topic model with three-tier… More >

  • Open Access

    ARTICLE

    VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records

    Azza Abdullah Alnssayan, Mohammad Mahdi Hassan*, Suliman A. Alsuhibany

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 927-945, 2022, DOI:10.32604/csse.2022.016734

    Abstract The digitalization of healthcare-related information service systems has become a trend across the world. However, several crucial services are still provided manually due to a lack of trust in digital solutions. One such service is keeping records of children’s vaccination, which still relies on a paper-based file system in most parts of the world. This approach causes serious data integrity problems. Recently, healthcare has become a potential application area of the blockchain, as it can preserve and protect highly sensitive private medical records while sharing these records in a decentralized manner without losing personal ownership. Therefore, we propose a new… More >

  • Open Access

    ARTICLE

    A Tradeoff Between Accuracy and Speed for K-Means Seed Determination

    Farzaneh Khorasani1, Morteza Mohammadi Zanjireh1,*, Mahdi Bahaghighat1, Qin Xin2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1085-1098, 2022, DOI:10.32604/csse.2022.016003

    Abstract With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected… More >

Displaying 10791-10800 on page 1080 of 22233. Per Page