Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Forensic Investigation Through Data Remnants on Hadoop Big Data Storage System

    Myat Nandar Oo1, Sazia Parvin2, Thandar Thein3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 203-217, 2018, DOI:10.32604/csse.2018.33.203

    Abstract Forensic examiners are in an uninterrupted battle with criminals in the use of Big Data technology. The underlying storage system is the main scene to trace the criminal activities. Big Data Storage System is identified as an emerging challenge to digital forensics. Thus, it requires the development of a sound methodology to investigate Big Data Storage System. Since the use of Hadoop as Big Data Storage System continues to grow rapidly, investigation process model for forensic analysis on Hadoop Storage and attached client devices is compulsory. Moreover, forensic analysis on Hadoop Big Data Storage System may take additional time without… More >

  • Open Access

    ARTICLE

    Sentiment Analysis System in Big Data Environment

    Wint Nyein Chan1, Thandar Thein2

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 187-202, 2018, DOI:10.32604/csse.2018.33.187

    Abstract Nowadays, Big Data, a large volume of both structured and unstructured data, is generated from Social Media. Social Media are powerful marketing tools and social big data can offer the business insights. The major challenge facing social big data is attaining efficient techniques to collect a large volume of social data and extract insights from the huge amount of collected data. Sentiment Analysis of social big data can provide business insights by extracting the public opinions. The traditional analytic platforms need to be scaled up for analyzing a large volume of social big data. Social data are by nature shorter… More >

  • Open Access

    ARTICLE

    A Risk Poker Based Testing Model for Scrum

    Siti Noor Hasanah Ghazali1, Siti Salwah Salim1,*, Irum Inayat2, Siti Hafizah Ab Hamid1

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 169-185, 2018, DOI:10.32604/csse.2018.33.169

    Abstract In agile software development, project estimation often depends on group discussion and expert opinions. Literature claims that group discussion in risk analysis helps to identify some of the crucial issues that might affect development, testing, and implementation. However, risk prioritization often relies on individual expert judgment. Therefore, Risk Poker, a lightweight risk-based testing methodology in which risk analysis is performed through group discussion that outperforms the individual analyst’s estimation is introduced in agile methods. Keeping in view aforementioned benefits Risk Poker can offer, unfortunately, no study has been conducted to empirically prove its ability to improve the testing process to… More >

  • Open Access

    ARTICLE

    Online And Offline Scheduling Schemes to Maximize the Weighted Delivered Video Packets Towards Maritime Cpss

    Tingting Yang1, Hailong Feng1, Chengming Yang2, Ge Guo3, Tieshan Li1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 157-164, 2018, DOI:10.32604/csse.2018.33.157

    Abstract In this paper, the online and offline scheduling schemes towards maritime Cyber Physical Systems (CPSs), to transmit video packets generating from the interior of vessel. During the sailing from the origin port to destination port, the video packets could be delivered via the infostations shoreside. The video packets have their respective release times, deadlines, weights and processing time. The video packets only could be successfully transmitted before their deadlines. A mathematic job-machine problem is mapped. Facing distinguished challenges with unique characteristics imposed in maritime scenario, we focus on the heterogeneous networking and resource optimal scheduling technology to provide valuable insights… More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open Access

    ARTICLE

    Human Movement Detection and Gait Periodicity Analysis via Channel State Information

    Wenyuan Liu1,2, Zijuan Liu1,*, Lin Wang1, Binbin Li1, Nan Jing1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 137-147, 2018, DOI:10.32604/csse.2018.33.137

    Abstract In recent years, movement detection and gait recognition methods using different techniques emerge in an endless stream. On the one hand, wearable sensors need be worn by the detecting target and the method based on camera requires line of sight. On the other hand, radio frequency signals are easy to be impaired. In this paper, we propose a novel multi-layer filter of channel state information (CSI) to capture moving individuals in dynamic environments and analyze his/her gait periodicity. We design and evaluate an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal component analysis (PCA) and discrete… More >

  • Open Access

    ARTICLE

    MapReduce Implementation of an Improved Xml Keyword Search Algorithm

    Yong Zhang1,2, Jing Cai1, Quanlin Li1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 125-135, 2018, DOI:10.32604/csse.2018.33.125

    Abstract Extensible Markup Language (XML) is commonly employed to represent and transmit information over the Internet. Therefore, how to effectively search for keywords of massive XML data becomes a new issue. In this paper, we first present four properties to improve the classical ILE algorithm. Then, a kind of parallel XML keyword search algorithm, based on intelligent grouping to calculate SLCA, is proposed and realized under MapReduce programming model. At last, a series of experiments are implemented on 7 datasets of different sizes. The obtained results indicate that the proposed algorithm has high execution efficiency and is applicable to keyword search… More >

  • Open Access

    ARTICLE

    Effective Piecewise Linear Skeletonization of Sparse Shapes

    Wenyu Qu1, Zhiyang Li2,*, Junfeng Wu2, Yinan Wu3, Zhaobin Liu2

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 115-123, 2018, DOI:10.32604/csse.2018.33.115

    Abstract Conventional image skeletonization techniques implicitly assume the pixel level connectivity. However, noise inside the object regions destroys the connectivity and exhibits sparseness in the image. We present a skeletonization algorithm designed for these kinds of sparse shapes. The skeletons are produced quickly by using three operations. First, initial skeleton nodes are selected by farthest point sampling with circles containing the maximum effective information. A skeleton graph of these nodes is imposed via inheriting the neighborhood of their associated pixels, followed by an edge collapse operation. Then a skeleton tting process based on feature-preserving Laplacian smoothing is applied. Finally, a re… More >

  • Open Access

    ARTICLE

    Automated and Precise Event Detection Method for Big Data in Biomedical Imaging with Support Vector Machine

    Lufeng Yuan, Erlin Yao, Guangming Tan

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 105-113, 2018, DOI:10.32604/csse.2018.33.105

    Abstract This paper proposes a machine learning based method which can detect certain events automatically and precisely in biomedical imaging. We detect one important and not well-defined event, which is called flash, in fluorescence images of Escherichia coli. Given a time series of images, first we propose a scheme to transform the event detection on region of interest (ROI) in images to a classification problem. Then with supervised human labeling data, we develop a feature selection technique to utilize support vector machine (SVM) to solve this classification problem. To reduce the time in training SVM model, a parallel version of SVM… More >

  • Open Access

    ARTICLE

    Research on Tourist Routes Recommendation Based on the User Preference Drifting Over Time

    Chunjing Xiao1,∗, Yongwei Qiao2, Kewen Xia1, Yuxiang Zhang3

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 95-103, 2018, DOI:10.32604/csse.2018.33.095

    Abstract Tourist routes recommendation is a way to improve the tourist experience and the efficiency of tourism companies. Session-based methods divide all users’ interaction histories into the same number sessions with fixed time window and treat the user preference as time sequences. There have few or even no interaction in some sessions for some users because of the high sparsity and temporal characteristics of tourist data. That lead to many session-based methods can not be applied to routes recommendation due to aggravate the sparsity. In order to better adapt and apply the characteristics of tourism data and alleviate the sparsity, a… More >

Displaying 14261-14270 on page 1427 of 22360. Per Page