default search action
Computer Systems: Science & Engineering, Volume 35
Volume 35, Number 1, January 2020
- David Corral-Plaza, Juan Boubeta-Puig, Guadalupe Ortiz, Alfonso García de Prado:
An Internet of things platform for Air Station remote sensing and smart monitoring. - Ridvan Saraçoglu, Ahmet Fatih Kazankaya:
Developing an adaptation process for real-coded genetic algorithms. - Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
Enhanced GPU-based anti-noise hybrid edge detection method. - P. Swathypriyadharsini, Kandhasamy Premalatha:
Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search. - C. T. Poomagal, G. A. Sathish Kumar, Deval Mehta:
Multi level key exchange and encryption protocol for internet of things (IoT).
Volume 35, Number 2, March 2020
- Ali Mirarab, Seyedeh Leili Mirtaheri, Seyed Amir Asghari:
A model to create organizational value with big data analytics. - Marius Becherer, Michael Zipperle, Achim Karduck:
Intelligent choice of machine learning methods for predictive maintenance of intelligent machines. - Feiying Xia, Shenghong Huang:
Application research of color design and collocation in image processing. - Masood Niazi Torshiz, Azadeh Salehi Esfaji, Haleh Amintoosi:
Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems. - Bing Xu, Darong Huang, Bo Mi:
Research on e-commerce transaction payment system basedf on C4.5 decision tree data mining algorithm.
Volume 35, Number 3, May 2020
- Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou, Yan Hui, Na Sun:
Analysis of factors affecting the profits of closed-loop supply chain members under different subsidy objects. - Shuo He, Jianbin Zheng, Jiale Lin, Tao Tang, Jintao Zhao, Hongbao Liu:
Classification-based fraud detection for payment marketing and promotion. - Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou, Ze-Chao Zhu:
Data mining of urban new energy vehicles in an intelligent government subsidy environment using closed-loop supply chain pricing model. - Yuan Min, Fengxiang Xu, Junhao Wu, Xuefeng Zheng:
Injury analysis of vehicle-pedestrian collision based on orthogonal experiments. - Lini Cai:
Japanese teaching quality satisfaction analysis with improved apriori algorithms under cloud computing platform. - He Ping:
Study of assessment method based on coupling factor of casualty in earthquake disasters in Guangdong area. - Jing Chen, Yuchen Luo, Ruiqi Du:
The impact of privacy seal on users? perception in network transactions. - Ye Zhang:
The implementation of an English word learning system feedback system and smartphone app. - Shenghong Huang:
The influence ofdigital multimedia communication forms on graphic design. - Guangli Zhu, Wenting Liu, Shunxiang Zhang, Xiang Chen, Chang Yin:
The method for extracting new login sentiment words from Chinese micro-blog basedf on improved mutual information.
Volume 35, Number 4, July 2020
- Peng Tang, Yu Wang, Ning Shen:
Prediction of college students' physical fitness based on K-means clustering and SVR. - Xianzhe Zhang, Sgheng Zhou, Jun Fang, Yanling Ni:
Pattern recognition of construction bidding system based on image processing. - Stuart Green:
A digital start-up project ? CARM tool as an innovative approach to digital government transformation. - Aleksandar Kelec, Zoran Djuric:
A proposal for addressing security issues related to dynamic code loading on Android platform. - Muhammed Enes Bayrakdar:
Cost effective smart system for water pollution control with underwater wireless sensor networks: a simulation study. - Yulan Zheng:
Decision tree algorithm for precision marketing via network channel. - Zheng Fang, Junyun Cai, Lifang Tian:
Security of chip bank card in remote payment based on risk feature.
Volume 35, Number 5, 2020
- Tao Liao, Weicheng Fu, Shunxiang Zhang, Zongtian Liu:
Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application. 311-319 - Tharam S. Dillon, Yi-Ping Phoebe Chen, Elizabeth Chang, Mukesh K. Mohania, Vish Ramakonar:
Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems. 321-334 - Gundala Swathi:
A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network. 335-345 - Anar A. Hady:
Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks. 347-355 - Sivaranjani Balakrishnan, D. Surendran:
Secure Information Access Strategy for a Virtual Data Centre. 357-366 - Mohammad Behrouzian Nejad:
Parametric Evaluation of Routing Algorithms in Network on Chip Architecture. 367-375 - Zheng Zeng:
Implementation of Embedded Technology-Based English Speech Identification and Translation System. 377-383 - Garladinne Ravikanth, K. V. N. Sunitha, B. Eswara Reddy:
Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method. 385-393
Volume 35, Number 6, 2020
- Hai Yang Zhu, Xiaobo Yin, Shunxiang Zhang, Zhongliang Wei, Guangli Zhu, Meng-Yen Hsieh:
A Discovery Method for New Words From Mobile Product Comments. 399-410 - Vankamamidi Srinivasa Naresh, Suryateja S. Pericherla, Pilla Sita Rama Murty, Reddi Sivaranjani:
Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions. 411-421 - Morteza Okhovvat, Mohsen Sharifi, Behrouz Minaei-Bidgoli:
An Accurate Persian Part-of-Speech Tagger. 423-430 - Özkan Inik, Erkan Ülker, Ismail Kox:
B-Spline Curve Approximation by Utilizing Big Bang-Big Crunch Method. 431-440 - Ahmed A. M. Jamel, Bahriye Akay:
Human Activity Recognition Based on Parallel Approximation Kernel K-Means Algorithm. 441-456 - Vankamamidi Srinivasa Naresh, Reddi Sivaranjani:
Multiparty Quantum Key Agreement With Strong Fairness Property. 457-465 - Umid Suleymanov, Behnam Kiani Kalejahi, Elkhan Amrahov, Rashid Badirkhanli:
Text Classification for Azerbaijani Language Using Machine Learning. 467-475 - Shayesteh Tabatabaei:
A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs). 477-494 - Belal Abdullah Hezam Murshed, Hasib Daowd Esmail Al-Ariki, Suresha Mallappa:
Semantic Analysis Techniques using Twitter Datasets on Big Data: Comparative Analysis Study. 495-512 - Jian Li, Yang Lv, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Zheng:
Video Source Identification Algorithm Based on 3D Geometric Transformation. 513-521 - Jin Wang, Yaqiong Yang, Jingyu Zhang, Xiaofeng Yu, Osama Alfarraj, Amr Tolba:
A Data-Aware Remote Procedure Call Method for Big Data Systems. 523-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.