default search action
Computer Systems: Science & Engineering, Volume 38
Volume 38, Number 1, 2021
- Ibrahim M. Almanjahie, Amer Ibrahim Al-Omari, Emmanuel J. Ekpenyong, Mir Subzar:
Generalized Class of Mean Estimators with Known Measures for Outliers Treatment. 1-15 - Bassm H. Abed, Jaber H. Majeed, Najma Abed Habeeb:
Optimization of Bio-Implantable Power Transmission Efficiency Based on Input Impedance. 17-24 - Mohammed Ibrahim Ahmed Al-Mashhadani, Theyazn H. H. Aldhyani, Mosleh Hmoud Al-Adhaileh, Alwi M. Bamhdi, Mohammed Yahya Alzahrani, Fawaz Waselallah Alsaade, Hasan Alkahtani:
Human-Animal Affective Robot Touch Classification Using Deep Neural Network. 25-37 - Ming Li, Zhong Fang, Wanwan Cao, Yong Ma, Shang Wu, Yang Guo, Yu Xue, Romany Fouad Mansour:
Residential Electricity Classification Method Based On Cloud Computing Platform and Random Forest. 39-46 - Muhammad Asghar Khan, Fazal Noor, Insaf Ullah, Sajjad Ur Rehman, Shibli Nisar, Mohaira Ahmad:
An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks. 47-63 - Aiyun Hu, Sunli Cong, Jian Ding, Yao Cheng, Enock Mpofu:
Differential Evolution Algorithm Based Self-adaptive Control Strategy for Fed-batch Cultivation of Yeast. 65-77 - Mi Zichuan, Saddam Hussain, Zubair Ahmad, Omid Kharazmi, Zahra Almaspoor:
A New Generalized Weibull Model: Classical and Bayesian Estimation. 79-92 - Leena S. Alotaibi, Sultan S. Alshamrani:
Smart Contract: Security and Privacy. 93-101 - Hui Wang, Chuanhan Zhu, Zihao Shen, Dengwei Lin, Kun Liu, Mengyao Zhao:
A Network Security Risk Assessment Method Based on a B_NAG Model. 103-117 - Rahmat Hidayat, Iwan Tri Riyadi Yanto, Azizul Azhar Ramli, Mohd Farhan Md Fudzee, Ansari Saleh Ahmar:
Generalized Normalized Euclidean Distance Based Fuzzy Soft Set Similarity for Data Classification. 119-130
Volume 38, Number 2, 2021
- Shakeel Ahmed, Munazza Ambreen, Muneer Ahmad, Abdulellah A. Alaboudi, Roobaea Alroobaea, N. Z. Jhanjhi:
An Effective Online Collaborative Training in Developing Listening Comprehension Skills. 131-140 - Hashem Alyami, Mohd Faizan, Wael Alosaimi, Abdullah Alharbi, Abhishek Kumar Pandey, Md Tarique Jamal Ansari, Alka Agrawal, Raees Ahmad Khan:
An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services. 141-149 - Rabbani Rasha, Mohammad Monirujjaman Khan, Mehedi Masud, Mohammed A. Alzain:
Investigain: A Productive Asset Management Web Application. 151-164 - Jun Wang, Tingjuan Zhang, Yong Cheng, Najla Al-Nabhan:
Deep Learning for Object Detection: A Survey. 165-182 - Ayodele Lasisi, Ali M. Aseere:
A Cuckoo Search Detector Generation-based Negative Selection Algorithm. 183-195 - Shun-Yuan Wang, Yun-Jung Hsu, Sung-Jung Hsiao, Wen-Tsai Sung:
A Sensor Network Web Platform Based on WoT Technology. 197-214 - Nandhini Jembu Mohanram, Gnanasekaran Thangavel, N. M. Jothi Swaroopan:
Fault Aware Dynamic Resource Manager for Fault Recognition and Avoidance in Cloud. 215-228 - Kazeem Oyeyemi Oyebode, Shengzhi Du, Barend Jacobus van Wyk:
Leveraging Graph Cut's Energy Function for Context Aware Facial Recognition in Indoor Environments. 229-238 - Chia-Nan Wang, Zhao-Hong Cheng, Phan Nguyen Ky Phuc, Van Thanh Nguyen:
Scheduling Optimization Modelling: A Case Study of a Woven Label Manufacturing Company. 239-249 - Mosleh M. Abu-Alhaj, AbdelRahman H. Hussein, Qasem Kharma, Qusai Shambour:
Multi-indicator Active Queue Management Method. 251-263
Volume 38, Number 3, 2021
- Syeda Warda Asher, Sadeeq Jan, George Tsaramirsis, Fazal Qudus Khan, Abdullah Khalil, Muhammad Obaidullah:
Reverse Engineering of Mobile Banking Applications. 265-278 - Lin Zhou, Qiuyue Zhong, Tianyi Wang, Siyuan Lu, Hongmei Hu:
Speech Enhancement via Residual Dense Generative Adversarial Network. 279-289 - Li Li, Chen Cui, Jianfeng Lu, Shanqing Zhang, Ching-Chun Chang:
A Holographic Diffraction Label Recognition Algorithm Based on Fusion Double Tensor Features. 291-303 - Xinyue Chu, Jiaquan Gao, Bo Sheng:
Efficient Concurrent L1-Minimization Solvers on GPUs. 305-320 - Kundan Kumar, Rajeev Kr. Arya:
UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques. 321-337 - Donglei Lu, Dongjie Zhu, Yundong Sun, Haiwen Du, Xiaofang Li, Rongning Qu, Yansong Wang, Ning Cao, Helen Min Zhou:
Exploration on the Load Balancing Technique for Platform of Internet of Things. 339-350 - Md Sadikur Rahman, Emad E. Mahmoud, Ali Akbar Shaikh, Abdel-Haleem Abdel-Aty, Asoke Kumar Bhunia:
Saddle Point Optimality Criteria of Interval Valued Non-Linear Programming Problem. 351-364 - Changchun Gao, Shiyu Liu, Chenhui Yu, Peng Guo:
External Incentive Mechanism Research on Knowledge Cooperation-Sharing in the Chinese Creative Industry Cluster. 365-379 - Harsh Tripathi, Amer Ibrahim Al-Omari, Mahendra Saha, Ayed Rheal A. Alanzi:
Improved Attribute Chain Sampling Plan for Darna Distribution. 381-392 - Yang Liu, Shan Zhao, Wenhan Chen, Xuran Ge, Fang Liu, Shuo Li, Nong Xiao:
NVM Storage in IoT Devices: Opportunities and Challenges. 393-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.