


default search action
Computer Systems: Science & Engineering, Volume 35
Volume 35, Number 1, January 2020
- David Corral-Plaza, Juan Boubeta-Puig, Guadalupe Ortiz, Alfonso García de Prado:

An Internet of things platform for Air Station remote sensing and smart monitoring. - Ridvan Saraçoglu, Ahmet Fatih Kazankaya:

Developing an adaptation process for real-coded genetic algorithms. - Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:

Enhanced GPU-based anti-noise hybrid edge detection method. - P. Swathypriyadharsini, Kandhasamy Premalatha:

Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search. - C. T. Poomagal, G. A. Sathish Kumar, Deval Mehta:

Multi level key exchange and encryption protocol for internet of things (IoT).
Volume 35, Number 2, March 2020
- Ali Mirarab, Seyedeh Leili Mirtaheri, Seyed Amir Asghari:

A model to create organizational value with big data analytics. - Marius Becherer

, Michael Zipperle, Achim Karduck:
Intelligent choice of machine learning methods for predictive maintenance of intelligent machines. - Feiying Xia, Shenghong Huang:

Application research of color design and collocation in image processing. - Masood Niazi Torshiz, Azadeh Salehi Esfaji, Haleh Amintoosi:

Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems. - Bing Xu, Darong Huang, Bo Mi:

Research on e-commerce transaction payment system basedf on C4.5 decision tree data mining algorithm.
Volume 35, Number 3, May 2020
- Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou

, Yan Hui, Na Sun:
Analysis of factors affecting the profits of closed-loop supply chain members under different subsidy objects. - Shuo He, Jianbin Zheng, Jiale Lin, Tao Tang, Jintao Zhao, Hongbao Liu:

Classification-based fraud detection for payment marketing and promotion. - Jing-Hua Zhao, Da-Lin Zeng, Ting-Wei Zhou

, Ze-Chao Zhu:
Data mining of urban new energy vehicles in an intelligent government subsidy environment using closed-loop supply chain pricing model. - Yuan Min, Fengxiang Xu, Junhao Wu, Xuefeng Zheng:

Injury analysis of vehicle-pedestrian collision based on orthogonal experiments. - Lini Cai:

Japanese teaching quality satisfaction analysis with improved apriori algorithms under cloud computing platform. - He Ping:

Study of assessment method based on coupling factor of casualty in earthquake disasters in Guangdong area. - Jing Chen, Yuchen Luo, Ruiqi Du:

The impact of privacy seal on users? perception in network transactions. - Ye Zhang:

The implementation of an English word learning system feedback system and smartphone app. - Shenghong Huang:

The influence ofdigital multimedia communication forms on graphic design. - Guangli Zhu, Wenting Liu, Shunxiang Zhang, Xiang Chen, Chang Yin:

The method for extracting new login sentiment words from Chinese micro-blog basedf on improved mutual information.
Volume 35, Number 4, July 2020
- Peng Tang, Yu Wang, Ning Shen:

Prediction of college students' physical fitness based on K-means clustering and SVR. - Xianzhe Zhang, Sgheng Zhou, Jun Fang, Yanling Ni:

Pattern recognition of construction bidding system based on image processing. - Stuart Green:

A digital start-up project ? CARM tool as an innovative approach to digital government transformation. - Aleksandar Kelec, Zoran Djuric:

A proposal for addressing security issues related to dynamic code loading on Android platform. - Muhammed Enes Bayrakdar:

Cost effective smart system for water pollution control with underwater wireless sensor networks: a simulation study. - Yulan Zheng:

Decision tree algorithm for precision marketing via network channel. - Zheng Fang, Junyun Cai, Lifang Tian:

Security of chip bank card in remote payment based on risk feature.
Volume 35, Number 5, 2020
- Tao Liao, Weicheng Fu, Shunxiang Zhang, Zongtian Liu:

Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application. 311-319 - Tharam S. Dillon, Yi-Ping Phoebe Chen

, Elizabeth Chang
, Mukesh K. Mohania, Vish Ramakonar:
Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems. 321-334 - Gundala Swathi:

A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network. 335-345 - Anar A. Hady:

Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks. 347-355 - Sivaranjani Balakrishnan

, D. Surendran:
Secure Information Access Strategy for a Virtual Data Centre. 357-366 - Mohammad Behrouzian Nejad:

Parametric Evaluation of Routing Algorithms in Network on Chip Architecture. 367-375 - Zheng Zeng:

Implementation of Embedded Technology-Based English Speech Identification and Translation System. 377-383 - Garladinne Ravikanth

, K. V. N. Sunitha, B. Eswara Reddy:
Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method. 385-393
Volume 35, Number 6, 2020
- Hai Yang Zhu, Xiaobo Yin, Shunxiang Zhang, Zhongliang Wei, Guangli Zhu, Meng-Yen Hsieh:

A Discovery Method for New Words From Mobile Product Comments. 399-410 - Vankamamidi Srinivasa Naresh

, Suryateja S. Pericherla
, Pilla Sita Rama Murty
, Reddi Sivaranjani:
Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions. 411-421 - Morteza Okhovvat, Mohsen Sharifi

, Behrouz Minaei-Bidgoli:
An Accurate Persian Part-of-Speech Tagger. 423-430 - Özkan Inik, Erkan Ülker, Ismail Kox:

B-Spline Curve Approximation by Utilizing Big Bang-Big Crunch Method. 431-440 - Ahmed A. M. Jamel

, Bahriye Akay
:
Human Activity Recognition Based on Parallel Approximation Kernel K-Means Algorithm. 441-456 - Vankamamidi Srinivasa Naresh

, Reddi Sivaranjani:
Multiparty Quantum Key Agreement With Strong Fairness Property. 457-465 - Umid Suleymanov, Behnam Kiani Kalejahi

, Elkhan Amrahov, Rashid Badirkhanli:
Text Classification for Azerbaijani Language Using Machine Learning. 467-475 - Shayesteh Tabatabaei

:
A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs). 477-494 - Belal Abdullah Hezam Murshed

, Hasib Daowd Esmail Al-Ariki, Suresha Mallappa:
Semantic Analysis Techniques using Twitter Datasets on Big Data: Comparative Analysis Study. 495-512 - Jian Li, Yang Lv, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Zheng:

Video Source Identification Algorithm Based on 3D Geometric Transformation. 513-521 - Jin Wang, Yaqiong Yang, Jingyu Zhang, Xiaofeng Yu, Osama Alfarraj, Amr Tolba

:
A Data-Aware Remote Procedure Call Method for Big Data Systems. 523-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














