Journal: Comput. Syst. Sci. Eng.

Volume 35, Issue 6

399 -- 410Hai-Yang Zhu, Xiaobo Yin, Shunxiang Zhang, Zhongliang Wei, Guangli Zhu, Meng-Yen Hsieh. A Discovery Method for New Words From Mobile Product Comments
411 -- 421Vankamamidi Srinivasa Naresh, Suryateja S. Pericherla, Pilla Sita Rama Murty, Reddi Sivaranjani. Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions
423 -- 430Morteza Okhovvat, Mohsen Sharifi, Behrouz Minaei-Bidgoli. An Accurate Persian Part-of-Speech Tagger
431 -- 440Özkan Inik, Erkan Ülker, Ismail Kox. B-Spline Curve Approximation by Utilizing Big Bang-Big Crunch Method
441 -- 456Ahmed A. M. Jamel, Bahriye Akay. Human Activity Recognition Based on Parallel Approximation Kernel K-Means Algorithm
457 -- 465Vankamamidi Srinivasa Naresh, Reddi Sivaranjani. Multiparty Quantum Key Agreement With Strong Fairness Property
467 -- 475Umid Suleymanov, Behnam Kiani Kalejahi, Elkhan Amrahov, Rashid Badirkhanli. Text Classification for Azerbaijani Language Using Machine Learning
477 -- 494Shayesteh Tabatabaei. A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs)
495 -- 512Belal Abdullah Hezam Murshed, Hasib Daowd Esmail Al-Ariki, Suresha Mallappa. Semantic Analysis Techniques using Twitter Datasets on Big Data: Comparative Analysis Study
513 -- 521Jian Li 0034, Yang Lv, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Zheng. Video Source Identification Algorithm Based on 3D Geometric Transformation
523 -- 532Jin Wang 0001, Yaqiong Yang, Jingyu Zhang, Xiaofeng Yu, Osama Alfarraj, Amr Tolba. A Data-Aware Remote Procedure Call Method for Big Data Systems

Volume 35, Issue 5

311 -- 319Tao Liao, Weicheng Fu, Shunxiang Zhang, Zongtian Liu. Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application
321 -- 334Tharam S. Dillon, Yi-Ping Phoebe Chen, Elizabeth Chang 0001, Mukesh K. Mohania, Vish Ramakonar. Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems
335 -- 345Gundala Swathi. A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network
347 -- 355Anar A. Hady. Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks
357 -- 366Sivaranjani Balakrishnan, D. Surendran. Secure Information Access Strategy for a Virtual Data Centre
367 -- 375Mohammad Behrouzian Nejad. Parametric Evaluation of Routing Algorithms in Network on Chip Architecture
377 -- 383Zheng Zeng. Implementation of Embedded Technology-Based English Speech Identification and Translation System
385 -- 393Garladinne Ravikanth, K. V. N. Sunitha, B. Eswara Reddy. Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method

Volume 35, Issue 4

0 -- 0Zheng Fang, Junyun Cai, Lifang Tian. Security of chip bank card in remote payment based on risk feature
0 -- 0S. Green. A digital start-up project ? CARM tool as an innovative approach to digital government transformation
0 -- 0Xianzhe Zhang, Sgheng Zhou, Jun Fang, Yanling Ni. Pattern recognition of construction bidding system based on image processing
0 -- 0Peng Tang, Yu Wang, Ning Shen. Prediction of college students' physical fitness based on K-means clustering and SVR
0 -- 0Yulan Zheng. Decision tree algorithm for precision marketing via network channel
0 -- 0Aleksandar Kelec, Zoran Djuric. A proposal for addressing security issues related to dynamic code loading on Android platform
0 -- 0Muhammed Enes Bayrakdar. Cost effective smart system for water pollution control with underwater wireless sensor networks: a simulation study

Volume 35, Issue 3

0 -- 0Guangli Zhu, Wenting Liu, Shunxiang Zhang, Xiang Chen, Chang Yin. The method for extracting new login sentiment words from Chinese micro-blog basedf on improved mutual information
0 -- 0Shenghong Huang. The influence ofdigital multimedia communication forms on graphic design
0 -- 0Jinghua Zhao, Da-Lin Zeng, Ting-Wei Zhou, Ze-Chao Zhu. Data mining of urban new energy vehicles in an intelligent government subsidy environment using closed-loop supply chain pricing model
0 -- 0Jinghua Zhao, Da-Lin Zeng, Ting-Wei Zhou, Yan-hui, Na Sun. Analysis of factors affecting the profits of closed-loop supply chain members under different subsidy objects
0 -- 0Shuo He, Jianbin Zheng, Jiale Lin, Tao Tang, Jintao Zhao, Hongbao Liu. Classification-based fraud detection for payment marketing and promotion
0 -- 0Jing Chen, YuChen Luo, Ruiqi Du. The impact of privacy seal on users? perception in network transactions
0 -- 0Ye Zhang. The implementation of an English word learning system feedback system and smartphone app
0 -- 0Lini Cai. Japanese teaching quality satisfaction analysis with improved apriori algorithms under cloud computing platform
0 -- 0Yuan Min, Fengxiang Xu, Junhao Wu, Xuefeng Zheng. Injury analysis of vehicle-pedestrian collision based on orthogonal experiments
0 -- 0He Ping. Study of assessment method based on coupling factor of casualty in earthquake disasters in Guangdong area

Volume 35, Issue 2

0 -- 0Ali Mirarab, Seyedeh Leili Mirtaheri, Seyed Amir Asghari. A model to create organizational value with big data analytics
0 -- 0Marius Becherer, Michael Zipperle, Achim Karduck. Intelligent choice of machine learning methods for predictive maintenance of intelligent machines
0 -- 0Feiying Xia, Shenghong Huang. Application research of color design and collocation in image processing
0 -- 0Bing Xu, Darong Huang, Bo Mi. Research on e-commerce transaction payment system basedf on C4.5 decision tree data mining algorithm
0 -- 0Masood Niazi Torshiz, Azadeh Salehi Esfaji, Haleh Amintoosi. Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems

Volume 35, Issue 1

0 -- 0Ridvan Saraçoglu, Ahmet Fatih Kazankaya. Developing an adaptation process for real-coded genetic algorithms
0 -- 0C. T. Poomagal, G. A. Sathish Kumar, Deval Mehta. Multi level key exchange and encryption protocol for internet of things (IoT)
0 -- 0Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji. Enhanced GPU-based anti-noise hybrid edge detection method
0 -- 0David Corral-Plaza, Juan Boubeta-Puig, Guadalupe Ortiz, Alfonso García de Prado. An Internet of things platform for Air Station remote sensing and smart monitoring
0 -- 0P. Swathypriyadharsini, Kandhasamy Premalatha. Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search