Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Efficient Concurrent L1-Minimization Solvers on GPUs

    Xinyue Chu1, Jiaquan Gao1,*, Bo Sheng2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 305-320, 2021, DOI:10.32604/csse.2021.017144

    Abstract Given that the concurrent L1-minimization (L1-min) problem is often required in some real applications, we investigate how to solve it in parallel on GPUs in this paper. First, we propose a novel self-adaptive warp implementation of the matrix-vector multiplication (Ax) and a novel self-adaptive thread implementation of the matrix-vector multiplication (ATx), respectively, on the GPU. The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size. Second, based on the above proposed kernels, the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from the perspective of the… More >

  • Open Access

    ARTICLE

    Reverse Engineering of Mobile Banking Applications

    Syeda Warda Asher1, Sadeeq Jan1,*, George Tsaramirsis2, Fazal Qudus Khan3, Abdullah Khalil1, Muhammad Obaidullah4

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 265-278, 2021, DOI:10.32604/csse.2021.016787

    Abstract Software reverse engineering is the process of analyzing a software system to extract the design and implementation details. Reverse engineering provides the source code of an application, the insight view of the architecture and the third-party dependencies. From a security perspective, it is mostly used for finding vulnerabilities and attacking or cracking an application. The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics. Nowadays, reverse engineering is widely used for mobile applications and is considered a security risk. The Open Web Application Security Project (OWASP), a leading security research… More >

  • Open Access

    ARTICLE

    UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques

    Kundan Kumar*, Rajeev Arya

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 321-337, 2021, DOI:10.32604/csse.2021.016748

    Abstract Great strides have been made to realistically deploy multiple Unmanned Aerial Vehicles (UAVs) within the commercial domain, which demands a proper coordination and reliable communication among the UAVs. UAVs suffer from limited time of flight. Conventional techniques suffer from high delay, low throughput, and early node death due to aerial topology of UAV networks. To deal with these issues, this paper proposes a UAV parameter vector which considers node energy, channel state information and mobility of UAVs. By intelligently estimating the proposed parameter, the state of UAV can be predicted closely. Accordingly, efficient clustering may be achieved by using suitable… More >

  • Open Access

    ARTICLE

    Exploration on the Load Balancing Technique for Platform of Internet of Things

    Donglei Lu1, Dongjie Zhu2,*, Yundong Sun3, Haiwen Du3, Xiaofang Li4, Rongning Qu4, Yansong Wang3, Ning Cao1, Helen Min Zhou5

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 339-350, 2021, DOI:10.32604/csse.2021.016683

    Abstract In recent years, the Internet of Things technology has developed rapidly, and smart Internet of Things devices have also been widely popularized. A large amount of data is generated every moment. Now we are in the era of big data in the Internet of Things. The rapid growth of massive data has brought great challenges to storage technology, which cannot be well coped with by traditional storage technology. The demand for massive data storage has given birth to cloud storage technology. Load balancing technology plays an important role in improving the performance and resource utilization of cloud storage systems. Therefore,… More >

  • Open Access

    ARTICLE

    Speech Enhancement via Residual Dense Generative Adversarial Network

    Lin Zhou1,*, Qiuyue Zhong1, Tianyi Wang1, Siyuan Lu1, Hongmei Hu2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 279-289, 2021, DOI:10.32604/csse.2021.016524

    Abstract Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which can extract rich local features… More >

  • Open Access

    ARTICLE

    External Incentive Mechanism Research on Knowledge Cooperation-Sharing in the Chinese Creative Industry Cluster

    Changchun Gao1, Shiyu Liu1,*, Chenhui Yu1, Peng Guo2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 365-379, 2021, DOI:10.32604/csse.2021.016506

    Abstract The creative industry is a knowledge-based industry, but it is difficult and complex to create knowledge for enterprises. The principle of cooperation-sharing posits that companies’ limited resources prohibit them from gaining a competitive advantage in all business areas. Therefore, cooperation-sharing can help businesses overcome this hurdle. Cooperation-sharing expedites economic development, breaks the barrier of independent knowledge creation, and enhances resource utilization. However, the effectiveness and stability of knowledge cooperation-sharing are key problems facing governments and other regulators. This study can help regulators promote honesty in enterprise cooperation-sharing. Based on the hypothesis of bounded rationality, the evolutionary game theory was used… More >

  • Open Access

    ARTICLE

    A Holographic Diffraction Label Recognition Algorithm Based on Fusion Double Tensor Features

    Li Li1, Chen Cui1,2, Jianfeng Lu1, Shanqing Zhang1,*, Ching-Chun Chang3

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 291-303, 2021, DOI:10.32604/csse.2021.016340

    Abstract As an efficient technique for anti-counterfeiting, holographic diffraction labels has been widely applied to various fields. Due to their unique feature, traditional image recognition algorithms are not ideal for the holographic diffraction label recognition. Since a tensor preserves the spatiotemporal features of an original sample in the process of feature extraction, in this paper we propose a new holographic diffraction label recognition algorithm that combines two tensor features. The HSV (Hue Saturation Value) tensor and the HOG (Histogram of Oriented Gradient) tensor are used to represent the color information and gradient information of holographic diffraction label, respectively. Meanwhile, the tensor… More >

  • Open Access

    ARTICLE

    Improved Attribute Chain Sampling Plan for Darna Distribution

    Harsh Tripathi1, Amer Ibrahim Al-Omari2, Mahendra Saha1, Ayed R. A. Alanzi3,*

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 381-392, 2021, DOI:10.32604/csse.2021.015624

    Abstract Recently, the Darna distribution has been introduced as a new lifetime distribution. The two-parameter Darna distribution represents is a mixture of two well-known gamma and exponential distributions. A manufacturer or an engineer of products conducts life testing to examine whether the quality level of products meets the customer’s requirements, such as reliability or the minimum lifetime. In this article, an attribute modified chain sampling inspection plan based on the time truncated life test is proposed for items whose lifetime follows the Darna distribution. The plan parameters, including the sample size, the acceptance number, and the past lot result of the… More >

  • Open Access

    ARTICLE

    Saddle Point Optimality Criteria of Interval Valued Non-Linear Programming Problem

    Md Sadikur Rahman1, Emad E. Mahmoud2, Ali Akbar Shaikh1,*, Abdel-Haleem Abdel-Aty3,4, Asoke Kumar Bhunia1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 351-364, 2021, DOI:10.32604/csse.2021.015451

    Abstract The present paper aims to develop the Kuhn-Tucker and Fritz John criteria for saddle point optimality of interval-valued nonlinear programming problem. To achieve the study objective, we have proposed the definition of minimizer and maximizer of an interval-valued non-linear programming problem. Also, we have introduced the interval-valued Fritz-John and Kuhn Tucker saddle point problems. After that, we have established both the necessary and sufficient optimality conditions of an interval-valued non-linear minimization problem. Next, we have shown that both the saddle point conditions (Fritz-John and Kuhn-Tucker) are sufficient without any convexity requirements. Then with the convexity requirements, we have established that… More >

  • Open Access

    ARTICLE

    Mixed Convection in a Two-Sided Lid-Driven Square Cavity Filled with Different Types of Nanoparticles: A Comparative Study Assuming Nanoparticles with Different Shapes

    Mostafa Zaydan1, Mehdi Riahi1,2,*, Fateh Mebarek-Oudina3, Rachid Sehaqui1

    FDMP-Fluid Dynamics & Materials Processing, Vol.17, No.4, pp. 789-819, 2021, DOI:10.32604/fdmp.2021.015422

    Abstract Steady, laminar mixed convection inside a lid-driven square cavity filled with nanofluid is investigated numerically. We consider the case where the right and left walls are moving downwards and upwards respectively and maintained at different temperatures while the other two horizontal ones are kept adiabatic and impermeable. The set of nonlinear coupled governing mass, momentum, and energy equations are solved using an extensively validated and a highly accurate finite difference method of fourth-order. Comparisons with previously conducted investigations on special configurations are performed and show an excellent agreement. Meanwhile, attention is focused on the heat transfer enhancement when different nano-particles:… More >

Displaying 11911-11920 on page 1192 of 22248. Per Page