for Journals by Title or ISSN
for Articles by Keywords
  Subjects -> COMPUTER SCIENCE (Total: 1988 journals)
    - ANIMATION AND SIMULATION (29 journals)
    - AUTOMATION AND ROBOTICS (100 journals)
    - COMPUTER ARCHITECTURE (9 journals)
    - COMPUTER ENGINEERING (9 journals)
    - COMPUTER GAMES (16 journals)
    - COMPUTER PROGRAMMING (23 journals)
    - COMPUTER SCIENCE (1153 journals)
    - COMPUTER SECURITY (45 journals)
    - DATA BASE MANAGEMENT (13 journals)
    - DATA MINING (32 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (27 journals)
    - IMAGE AND VIDEO PROCESSING (40 journals)
    - INFORMATION SYSTEMS (104 journals)
    - INTERNET (92 journals)
    - SOCIAL WEB (50 journals)
    - SOFTWARE (33 journals)
    - THEORY OF COMPUTING (8 journals)

COMPUTER SCIENCE (1153 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 14)
Abakós     Open Access   (Followers: 3)
Academy of Information and Management Sciences Journal     Full-text available via subscription   (Followers: 68)
ACM Computing Surveys     Hybrid Journal   (Followers: 22)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 9)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 13)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 6)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 11)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 4)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 12)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 3)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 1)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 20)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 9)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 8)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 11)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 21)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 11)
Advanced Engineering Materials     Hybrid Journal   (Followers: 26)
Advanced Science Letters     Full-text available via subscription   (Followers: 7)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 16)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15)
Advances in Computer Science : an International Journal     Open Access   (Followers: 13)
Advances in Computing     Open Access   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 54)
Advances in Engineering Software     Hybrid Journal   (Followers: 25)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 10)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 26)
Advances in Human-Computer Interaction     Open Access   (Followers: 20)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 37)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access   (Followers: 1)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Air, Soil & Water Research     Open Access   (Followers: 7)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 6)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 11)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 4)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 7)
American Journal of Sensor Technology     Open Access   (Followers: 2)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 5)
Analysis in Theory and Applications     Hybrid Journal   (Followers: 1)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 9)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 6)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annual Reviews in Control     Hybrid Journal   (Followers: 6)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 2)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 14)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Clinical Informatics     Hybrid Journal   (Followers: 2)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Computer Systems     Open Access   (Followers: 1)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 32)
Applied Medical Informatics     Open Access   (Followers: 10)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 16)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4)
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 4)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 123)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Artifact     Hybrid Journal   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 6)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Computer Science and Information Technology     Open Access  
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access  
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 3)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 9)
Automation in Construction     Hybrid Journal   (Followers: 6)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Basin Research     Hybrid Journal   (Followers: 5)
Behaviour & Information Technology     Hybrid Journal   (Followers: 52)
Bioinformatics     Hybrid Journal   (Followers: 292)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 13)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 17)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 32)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 45)
British Journal of Educational Technology     Hybrid Journal   (Followers: 124)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 2)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal  
Cell Communication and Signaling     Open Access   (Followers: 1)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
CERN IdeaSquare Journal of Experimental Innovation     Open Access  
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 7)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Full-text available via subscription   (Followers: 12)
Circuits and Systems     Open Access   (Followers: 16)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 4)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 13)
Communication Methods and Measures     Hybrid Journal   (Followers: 11)
Communication Theory     Hybrid Journal   (Followers: 19)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 3)
Communications of the ACM     Full-text available via subscription   (Followers: 53)
Communications of the Association for Information Systems     Open Access   (Followers: 18)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access  
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Computación y Sistemas     Open Access  
Computation     Open Access  
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 2)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access   (Followers: 1)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 12)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access  
Computational Ecology and Software     Open Access   (Followers: 8)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Geosciences     Hybrid Journal   (Followers: 14)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 13)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 29)
Computer     Full-text available via subscription   (Followers: 84)
Computer Aided Surgery     Hybrid Journal   (Followers: 3)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 6)
Computer Communications     Hybrid Journal   (Followers: 10)
Computer Engineering and Applications Journal     Open Access   (Followers: 5)
Computer Journal     Hybrid Journal   (Followers: 7)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 22)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in the Geosciences     Full-text available via subscription   (Followers: 1)
Computer Music Journal     Hybrid Journal   (Followers: 14)
Computer Physics Communications     Hybrid Journal   (Followers: 6)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 17)
Computer Science and Information Technology     Open Access   (Followers: 11)
Computer Science Education     Hybrid Journal   (Followers: 12)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Master Research     Open Access   (Followers: 10)

        1 2 3 4 5 6 | Last

Journal Cover Automatic Control and Computer Sciences
  [SJR: 0.23]   [H-I: 7]   [3 followers]  Follow
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 1558-108X - ISSN (Online) 0146-4116
   Published by Springer-Verlag Homepage  [2353 journals]
  • Estimation of stability of oscillations of linear time-varying systems
           with one time-varying parameter with calculation of influence of higher
           frequency motions
    • Authors: A. V. Mandrik
      Pages: 141 - 148
      Abstract: Abstract The paper reveals a new method for estimation of stability of oscillations of linear time invariant systems with one time-varying parameter given by a harmonic function. The suggested approach includes building a matrix of transfer functions, which calculates interference of the highfrequency oscillations of the output of the linear time-invariant part of the system. Suggested approach makes possible to build equivalent of the Nyquist criterion for linear systems with a single time-varying parameter. The application of the suggested approach is shown by numerical examples. Results of the present article may be used for control systems of cranes and other lifting mechanisms.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030075
      Issue No: Vol. 51, No. 3 (2017)
  • Detection of abnormal traffic video images based on high-dimensional fuzzy
    • Authors: Lei Huang; Zhongsheng Li; Benliang Wang
      Pages: 149 - 158
      Abstract: Abstract Detection of abnormal video images of transportation is to find out video images that contain abnormities among all images of transportation using video and image processing and analyzing techniques. It is an important component of intelligent transportation system, which can not only reduce the workload of traffic managers, but also effectively improve the efficiency of traffic management. However, video images of transportation in practice usually have complex backgrounds, and current detecting algorithms of traffic abnormity sometimes become ineffective due to interference factors such as noises and affine transformation (illumination variation, target occlusion, scale changes and view changes, etc.). In order to overcome these interference factors and fuzzy uncertainties in image representation, as well as improve the accuracy of traffic images representation, this study explored the representation methods of traffic images using fuzzy geometry theory on the basis of fuzzy uncertainties occurring during the process of imaging, transmission and processing of images; moreover, this study also put forward two kinds of representation algorithms of traffic images, and analyzed and verified effectiveness of representation algorithms based on theories and experiments.
      PubDate: 2017-05-01
      DOI: 10.3103/s014641161703004x
      Issue No: Vol. 51, No. 3 (2017)
  • Efficient key insulated attribute based signature without bilinear
           pairings for mobile communications
    • Authors: Hanshu Hong; Zhixin Sun
      Pages: 159 - 166
      Abstract: Abstract Attribute based signature (ABS) is a significant cryptographic notion providing secure authentication during data sharing. A signer can sign a message using the private keys he processes. However, user’s private key exposure may happen from time to time and this will bring potential threat to the whole system. Thus, key evolving mechanism should be introduced into ABS schemes. Besides, the efficiency of existing ABS schemes can be further improved since the process of signing and verification require massive bilinear pairings, which occupies costly computing resources on mobile terminal devices. To better tackle the above problems and provides a more secure data authentication method in mobile communication systems, in this paper, we firstly propose a key insulated attribute based signature scheme without pairings (KI-ABS-WP). Then we give the formalized definition as well as the concreted constructions of our scheme. In our KI-ABS-WP, uses needn’t run any bilinear pairings, thus the total computation cost has been reduced to a large extent. If key exposure occurs, key insulation mechanism guarantees system’s both backward and forward security. Finally, by security proof and efficiency comparison, our KI-ABS-WP is shown to be more superior for data authentication in mobile communication systems.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030038
      Issue No: Vol. 51, No. 3 (2017)
  • Error correction of digital signal processing devices using non-positional
           modular codes
    • Authors: D. I. Kaplun; D. M. Klionskiy; D. V. Bogaevskiy; V. V. Gulvanskiy; A. V. Veligosha; I. A. Kalmykov
      Pages: 167 - 173
      Abstract: Abstract The paper discusses an algorithm for correcting code errors of the residue number system using a positional characteristic. Application of parallel-pipeline computations of this positional characteristic allows us to reduce hardware costs by 7.2% for processing 2-byte data represented in a residue number system code. The main properties of codes allow us to provide the required fault-tolerance for multi-rate DSP devices. The results provided in the paper can be applied to hydroacoustic monitoring tasks.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030051
      Issue No: Vol. 51, No. 3 (2017)
  • The detection of Udpstorm attacks based on model checking linear temporal
    • Authors: Miaolei Deng; Kai Nie; Weijun Zhu; Chunyan Zhang
      Pages: 174 - 179
      Abstract: Abstract The intrusion detection based on model checking temporal logic is effective in detecting the complicated and variable network attacks. However, certain types of attacks remain undetected due to the lack of formal models. To solve this problem, a linear temporal logic is employed to model the variable patterns of Udpstorm attacks. First, an analysis of the principles of Udpstorm attacks is given and the details of these attacks are transformed into atomic actions. The atomic actions are then transformed into action sequence. Finally, this type of attacks is expressed in Linear Temporal Logic (LTL) formulas. With the formula thus obstained used as one input of the model checker and the automaton, which expresses the log, used as the other input of the model checker, the results of intrusion detection can be obtained by conducting the LTL model checking algorithm. The effectiveness and the comparative advantages of the new algorithm are verified by the simulation experiments.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030026
      Issue No: Vol. 51, No. 3 (2017)
  • Scene-specific pedestrian detection based on transfer learning and
           saliency detection for video surveillance
    • Authors: Weiwei Xing; Pingping Bai; Shunli Zhang; Peng Bao
      Pages: 180 - 192
      Abstract: Abstract Pedestrian detection is a fundamental problem in video surveillance and has achieved great progress in recent years. However the performance of a generic pedestrian detector trained on some public datasets drops significantly when it is applied to some specific scenes due to the difference between source training samples and pedestrian samples in target scenes. We propose a novel transfer learning framework, which automatically transfers a generic detector to a scene-specific pedestrian detector without manually labeling training samples from target scenes. In our method, we get initial detected results and several cues are used to filter target templates whose labels we are sure about from the initial detected results. Gaussian mixture model (GMM) is used to get the motion areas in each video frame and some other target samples. The relevancy between target samples and target templates and the relevancy between source samples and target templates are estimated by sparse coding and later used to calculate the weights for source samples and target samples. Saliency detection is an essential work before the relevancy computing between source samples and target templates for eliminating interference of non-salient region. We demonstrate the effectiveness of our scene-specific detector on a public dataset, and compare with the generic detector. Detection rates improves significantly, and also it is comparable with the detector trained by a lot of manually labeled samples from the target scene.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030099
      Issue No: Vol. 51, No. 3 (2017)
  • Multi-cue based moving hand segmentation for gesture recognition
    • Authors: Jia Lin; Xiaogang Ruan; Naigong Yu; Jianxian Cai
      Pages: 193 - 203
      Abstract: Abstract This paper proposes a novel moving hand segmentation approach using skin color, grayscale, depth, and motion cues for gesture recognition. The proposed approach does not depend on unreasonable restrictions, and it can solve the problem of hand-over-face occlusion. First, an online updated skin color histogram (OUSCH) model is built to robustly represent skin color; second, according to the variance information of grayscale and depth optical flow, a motion region of interest (MRoI) is adaptively extracted to locate the moving body part (MBP) and reduce the impact of noise; then, Harris-Affine corners that satisfy skin color and adaptive motion constraints are adopted as skin seed points in the MRoI; next, the skin seed points are grown to obtain a candidate hand region utilizing skin color, depth and motion criteria; finally, boundary depth gradient, skeleton extraction, and shortest path search are employed to segment the moving hand region from the candidate hand region. Experimental results demonstrate that the proposed approach can accurately segment moving hand regions under different situations, especially when the face is occluded by a hand. Furthermore, this approach achieves higher segmentation accuracy than other state-of-the-art approaches.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030063
      Issue No: Vol. 51, No. 3 (2017)
  • Development and realization of embedded car networking vehicle terminal
           software system
    • Authors: Feng Tan
      Pages: 204 - 213
      Abstract: Abstract As China’s economy develops vigorously, people’s living quality has been greatly improved and its car ownership has been increasing day by day. Consequently, traffic jams and safety problems become more and more severe. To solve these problems, the idea of car networking system construction has been put forward based on the improvement of Internet of Things and computer technologies. However, the vehicle terminals produced by many automobile manufacturers has disadvantages, such as incomplete functions, incompatible interface and exorbitant costs, etc. Therefore, based on the concept of car networking as well as the new 4G network technique, this study designed a kind of embedded car networking vehicle terminal and analyzed its hardware structure and installation problems. Moreover, its function of boot load program was extended and a software development platform of the embedded vehicle terminal based on Linux core was constructed. On the basis of the software and hardware environment construction, the global position system (GPS) and ZigBee wireless transmission software of the vehicle terminal were designed. In addition, the realization of the function of serial port communication was elaborated, and the development and realization of the embedded car networking vehicle terminal software system were explored.
      PubDate: 2017-05-01
      DOI: 10.3103/s0146411617030087
      Issue No: Vol. 51, No. 3 (2017)
  • Guaranteed-result strategy to synthesize a decentralized control for
           systems under parametric perturbations
    • Authors: V. N. Shashihin
      Pages: 75 - 84
      Abstract: Abstract This paper describes a technique to synthesize robust control for a large-scale system under parametric perturbations. The control law designed provides the guaranteed quality of transient processes under the worst parametric perturbation admissible. The problem is solved based on the required minimax conditions. A modified performance criterion is employed that allows the computational cost of decentralized control synthesis to be reduced significantly.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020079
      Issue No: Vol. 51, No. 2 (2017)
  • The effect of attribute normalization factors in attribute distance
           weighted average
    • Authors: Gang Xiong; Jiming Lan; Haiyan Zhang; Tian-Huai Ding
      Pages: 85 - 96
      Abstract: Abstract Attribute distance weighted average (ADWA) is a new filtering paradigm, which can progressively alleviate the denoising contradiction between the noise removal and feature preservation by introducing new attributes. As the key control parameters in ADWA, the attribute normalization factors play an important role in the final filtering result. An in-depth study is necessary to exam the effect the attribute normalization factors have on the filtering performance and the rules they follow, which can then serve as a guide for the determination and optimization of attribute normalization factors. For this purpose, the three attributes of a signal, “Location,” “Value,” and “Gradient,” are studied as an example in this paper. Experimental results indicate that the normalization factors directly determine the strength of the effect the corresponding attributes have on the filtering result. If the normalization factor increases, ADWA’s ability in noise removal becomes stronger and meanwhile its ability in feature preservation becomes weaker. Therefore, the denoising contradiction still exists for ADWA of a specific attribute rank. However, since different attributes contribute to the filtering performance independently in different regions of a signal, the denoising contradiction can be further alleviated by introducing new attributes, and thus a more satisfactory outcome can be obtained.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020031
      Issue No: Vol. 51, No. 2 (2017)
  • Deep learning in pharmacy: The prediction of aqueous solubility based on
           deep belief network
    • Authors: Hong Li; Long Yu; Shengwei Tian; Li Li; Mei Wang; Xueyuan Lu
      Pages: 97 - 107
      Abstract: Abstract The aqueous solubility of a drug is a significant factor for its bioavailability. Since many drugs on the market are the oral drugs, their absorption and metabolism in organisms are closely related to its aqueous solubility. As one of the most important properties of drug, the molecule aqueous solubility has received increasing attentions in drug discovery field. The methods of shallow machine learning have been applied to the field of pharmacy, with some success. In this paper, we established a multilayer deep belief network based on semi-supervised learning model to predict the aqueous solubility of compounds. This method can be used for recognizing whether compounds are soluble or not. Firstly, we discussed the influence of feature dimension to predict accuracy. Secondly, we analyzed the parameters of model in predicting aqueous solubility of drugs and contrasted the shallow machine learning with the similar deep architecture. The results showed that the model we proposed can predict aqueous solubility accurately, the accuracy of DBN reached 85.9%. The stable performance on the evaluation metrics confirms the practicability of our model. Moreover, the DBN model could be applied to reduce the cost and time of drug discovery by predicting aqueous solubility of drugs.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020043
      Issue No: Vol. 51, No. 2 (2017)
  • SABC-SBC: a hybrid ontology based image and webpage retrieval for datasets
    • Authors: C. Deepa
      Pages: 108 - 113
      Abstract: Abstract In the recent days, web mining is the one of the most widely used research area for finding the patterns from the web page. Similarly, web content mining is defined as the process of extracting some useful information from the web pages. For this mining, a Block Acquiring Page Segmentation (BAPS) technique is proposed in the existing work, which removes the irrelevant information by retrieving the contents. Also, the Tag-Annotation-Demand (TAD) re-ranking methodology is employed to generate the personalized images. The major disadvantage of these techniques is that it fails to retrieve both the images and web page contents. In order to overcome this issue, this paper focused to integrate the TAD and BAPS techniques for the image and web page content retrieval. There are two important steps are involved in this paper, which includes, server database upload and content extraction from the database. Furthermore, the databases are applied on the Semantic Annotation Based Clustering (SABC) for image and Semantic Based Clustering (SBC) for webpage content. The main intention of the proposed work is to accurately retrieve both the images and web pages. In experiments, the performance of the proposed SABC technique is evaluated and analyzed in terms of computation time, precision and recall.
      PubDate: 2017-03-01
      DOI: 10.3103/s014641161702002x
      Issue No: Vol. 51, No. 2 (2017)
  • A logic-based framework for the security analysis of Industrial Control
    • Authors: Laurens Lemaire; Jan Vossaert; Joachim Jansen; Vincent Naessens
      Pages: 114 - 123
      Abstract: Abstract Industrial Control Systems (ICS) are used for monitoring and controlling critical infrastructures such as power stations, waste water treatment facilities, traffic lights, and many more. Lately, these systems have become a popular target for cyber-attacks. Security is often an afterthought, leaving them vulnerable to all sorts of attacks. This article presents a formal approach for analysing the security of Industrial Control Systems, both during their design phase and while operational. A knowledge- based system is used to analyse a model of the control system and extract system vulnerabilities. The approach has been validated on an ICS in the design phase.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020055
      Issue No: Vol. 51, No. 2 (2017)
  • Determining PID controller coefficients for the moving motor of a welder
           robot using fuzzy logic
    • Authors: Alireza Rezaee
      Pages: 124 - 132
      Abstract: Abstract In this paper, a fuzzy algorithm was used for determining the coefficients of a PID controller using an online method. The plant used in this system is a welder robot, which is used for welding oil and gas pipelines. This robot rest on the pipe and weld it by moving around. The speed is adjusted using a motor moving the robot around the pipe. A digital controller also used for implementation. In this research, in order to choose the rules the skills transmit method and that how the PID response is required has been used. In this paper, the type of algorithms that continuously assigns PID coefficients using an online method depending on the characteristics of the system which is based on fuzzy logic was used. First, the rules associated to each output in relation to inputs are depicted in it. Using the mentioned method, simulation results and then implementation results were obtained and discussed.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020067
      Issue No: Vol. 51, No. 2 (2017)
  • Ultrasonic elastography optimization algorithm based on coded excitation
           and spatial compounding
    • Authors: Zhihong Zhang; Limiao Li; Huafu Liu
      Pages: 133 - 140
      Abstract: Abstract Traditional elasticity imaging systems use short pulses with low sound power, causing the signal to be attenuated severely in deep zones. On the basis of the coded excitation and spatial composition theorems, an ultrasonic elastography optimization algorithm is proposed in this paper. It takes advantage of coded excitation and spatial compounding such as high peak power and average sound power, suppresses speckle noise, and improves the imaging quality effectively. Specifically, a coded excitation system encodes the long pulses when transmitting, and then decodes the long pulses into short pulses upon receiving. This increases the average sound power of the beam without sacrificing the spatial resolution. A imaging system based on coded excitation can therefore achieve a good signal-to-noise ratio (SNR e ) and contrast-to-noise ratio (CNR e ) in deep zones below the detection surface. The proposed algorithm combines coded excitation with a filter-group based spatial compounding algorithm at the receiving terminal. Finally, experimental results show that the proposed algorithm yields a higher SNR e and CNR e than using chirp coded excitation or spatial compounding alone.
      PubDate: 2017-03-01
      DOI: 10.3103/s0146411617020080
      Issue No: Vol. 51, No. 2 (2017)
  • An approach for detecting and preventing DDoS attacks in campus
    • Authors: Mehdi Merouane
      Pages: 13 - 23
      Abstract: Abstract Nowadays, Denial of Service (DoS) attacks have become a major security threat to networks and the Internet. Therefore, even a naive hacker can launch a large-scale DoS attack to the victim from providing Internet services. This article deals with the evaluation of the Snort IDS in terms of packet processing performance and detection. This work describes the aspect involved in building campus network security system and then evaluates the campus network security risks and threats, mainly analyses the attacks DoS and DDoS, and puts forward new approach for Snort campus network security solutions. The objective is to analyze the functional advantages of the solution, deployment and configuration of the open source based on Snort intrusion detection system. The evaluation metrics are defined using Snort namely comparison between basic rules with new ones, available bandwidth, CPU loading and memory usage.
      PubDate: 2017-01-01
      DOI: 10.3103/s0146411616060043
      Issue No: Vol. 51, No. 1 (2017)
  • Shortwave spatial spectrum direction finding and positioning system based
           on software communication architecture
    • Authors: Yan He; Na Zhang
      Pages: 24 - 31
      Abstract: Abstract With the rapid advances in digital signal processing technology, spatial spectrum estimation theory and technology has been widely used in various fields and has become a new favorite in radio direction finding and passive positioning fields. This paper constructs a new shortwave spatial spectrum direction finding and positioning system, which establishes a standard interoperable platform based on software communication architecture (SCA). Meanwhile, a new shortwave co-location method is put forward, which realizes the flexible networking of the new shortwave spatial spectral direction finding system through the optical fiber or Ethernet. Besides, cyclic direction of arrival (DOA) estimation and weighted average method are applied to improve the positioning accuracy under complex environments. Simulation results show that this method has good positioning performance and stability.
      PubDate: 2017-01-01
      DOI: 10.3103/s0146411617010035
      Issue No: Vol. 51, No. 1 (2017)
  • Implementation of graphic vertex-coloring parallel synthesis algorithm
           based on genetic algorithm and compute unified device architecture
    • Authors: Fengxian Shen; Xu Jian; Xianjie Xi
      Pages: 32 - 41
      Abstract: Abstract Graphic vertex-coloring has long been a classical problem for combinatorial optimization in the field of science and technology. No algorithm can give an optimal solution for graphic vertex-coloring in polynomial time so far, though it plays an important role in the field of mathematical science and technology. Hence the problem has always been a non-deterministic polynomial (NP) complete problem. The current computer parallel technology based on compute unified device architecture (CUDA) is a hot spot in the relevant field. This study put forward a method integrating parallel genetic algorithm and CUDA to solve the problem of graphic vertex-coloring. First, color sequences were coded and parallel genetic operators were designed, which was beneficial to the improvement of algorithm efficacy. Then parallelization reformation was performed on the above integrated algorithm using CUDA. Experimental results demonstrated that, the newly developed algorithm improved the calculation efficiency and reduced the computation time compared to traditional algorithms based on central processing unit (CPU). Thus plenty of cases can be effectively solved if the minimum coloring number of a known graphics is found.
      PubDate: 2017-01-01
      DOI: 10.3103/s0146411617010060
      Issue No: Vol. 51, No. 1 (2017)
  • Face recognition Face2vec based on deep learning: Small database case
    • Authors: K. Sudars
      Pages: 50 - 54
      Abstract: Abstract Object classification is a common problem in artificial intelligence and now it is usually approached by deep learning. In the paper the artificial neural network (ANN) architecture is considered. According to described ANN architecture, the ANN models are trained and tested on a relatively small Color-FERET facial image database under different conditions. The best fine-tuned ANN model provides 94% face recognition accuracy on Color-FERET frontal images and 98% face recognition accuracy within 3 attempts. However, for improving recognition system accuracy large data sets are still necessary preferably consisting of millions of images.
      PubDate: 2017-01-01
      DOI: 10.3103/s0146411617010072
      Issue No: Vol. 51, No. 1 (2017)
  • On-line kernel clustering based on the general regression neural network
           and T. Kohonen’s self-organizing map
    • Authors: Ye. V. Bodyanskiy; A. O. Deineko; Ya. V. Kutsenko
      Pages: 55 - 62
      Abstract: Abstract The clustering system based on the evolving general regression neural network and self-organizing map of T.Kohonen, is proposed in the paper. The tuning of system is based on “lazy” learning and self-learning using the principle “Winner takes more” at the same time as neighborhood function the output signal of the hybrid network is used. The system’ implementation is characterized by numerical simplicity. The evolving neural network processes data in an online mode and doesn’t suffer from the curse of dimensionality.
      PubDate: 2017-01-01
      DOI: 10.3103/s0146411617010023
      Issue No: Vol. 51, No. 1 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016