Home / Journals / CSSE / Vol.38, No.3, 2021
  • Open Access

    ARTICLE

    Reverse Engineering of Mobile Banking Applications

    Syeda Warda Asher1, Sadeeq Jan1,*, George Tsaramirsis2, Fazal Qudus Khan3, Abdullah Khalil1, Muhammad Obaidullah4
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 265-278, 2021, DOI:10.32604/csse.2021.016787
    Abstract Software reverse engineering is the process of analyzing a software system to extract the design and implementation details. Reverse engineering provides the source code of an application, the insight view of the architecture and the third-party dependencies. From a security perspective, it is mostly used for finding vulnerabilities and attacking or cracking an application. The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics. Nowadays, reverse engineering is widely used for mobile applications and is considered a security risk. The Open Web Application Security Project (OWASP), a leading security research… More >

  • Open Access

    ARTICLE

    Speech Enhancement via Residual Dense Generative Adversarial Network

    Lin Zhou1,*, Qiuyue Zhong1, Tianyi Wang1, Siyuan Lu1, Hongmei Hu2
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 279-289, 2021, DOI:10.32604/csse.2021.016524
    Abstract Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which can extract rich local features… More >

  • Open Access

    ARTICLE

    A Holographic Diffraction Label Recognition Algorithm Based on Fusion Double Tensor Features

    Li Li1, Chen Cui1,2, Jianfeng Lu1, Shanqing Zhang1,*, Ching-Chun Chang3
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 291-303, 2021, DOI:10.32604/csse.2021.016340
    Abstract As an efficient technique for anti-counterfeiting, holographic diffraction labels has been widely applied to various fields. Due to their unique feature, traditional image recognition algorithms are not ideal for the holographic diffraction label recognition. Since a tensor preserves the spatiotemporal features of an original sample in the process of feature extraction, in this paper we propose a new holographic diffraction label recognition algorithm that combines two tensor features. The HSV (Hue Saturation Value) tensor and the HOG (Histogram of Oriented Gradient) tensor are used to represent the color information and gradient information of holographic diffraction label, respectively. Meanwhile, the tensor… More >

  • Open Access

    ARTICLE

    Efficient Concurrent L1-Minimization Solvers on GPUs

    Xinyue Chu1, Jiaquan Gao1,*, Bo Sheng2
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 305-320, 2021, DOI:10.32604/csse.2021.017144
    Abstract Given that the concurrent L1-minimization (L1-min) problem is often required in some real applications, we investigate how to solve it in parallel on GPUs in this paper. First, we propose a novel self-adaptive warp implementation of the matrix-vector multiplication (Ax) and a novel self-adaptive thread implementation of the matrix-vector multiplication (ATx), respectively, on the GPU. The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size. Second, based on the above proposed kernels, the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from the perspective of the… More >

  • Open Access

    ARTICLE

    UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques

    Kundan Kumar*, Rajeev Arya
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 321-337, 2021, DOI:10.32604/csse.2021.016748
    (This article belongs to this Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract Great strides have been made to realistically deploy multiple Unmanned Aerial Vehicles (UAVs) within the commercial domain, which demands a proper coordination and reliable communication among the UAVs. UAVs suffer from limited time of flight. Conventional techniques suffer from high delay, low throughput, and early node death due to aerial topology of UAV networks. To deal with these issues, this paper proposes a UAV parameter vector which considers node energy, channel state information and mobility of UAVs. By intelligently estimating the proposed parameter, the state of UAV can be predicted closely. Accordingly, efficient clustering may be achieved by using suitable… More >

  • Open Access

    ARTICLE

    Exploration on the Load Balancing Technique for Platform of Internet of Things

    Donglei Lu1, Dongjie Zhu2,*, Yundong Sun3, Haiwen Du3, Xiaofang Li4, Rongning Qu4, Yansong Wang3, Ning Cao1, Helen Min Zhou5
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 339-350, 2021, DOI:10.32604/csse.2021.016683
    Abstract In recent years, the Internet of Things technology has developed rapidly, and smart Internet of Things devices have also been widely popularized. A large amount of data is generated every moment. Now we are in the era of big data in the Internet of Things. The rapid growth of massive data has brought great challenges to storage technology, which cannot be well coped with by traditional storage technology. The demand for massive data storage has given birth to cloud storage technology. Load balancing technology plays an important role in improving the performance and resource utilization of cloud storage systems. Therefore,… More >

  • Open Access

    ARTICLE

    Saddle Point Optimality Criteria of Interval Valued Non-Linear Programming Problem

    Md Sadikur Rahman1, Emad E. Mahmoud2, Ali Akbar Shaikh1,*, Abdel-Haleem Abdel-Aty3,4, Asoke Kumar Bhunia1
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 351-364, 2021, DOI:10.32604/csse.2021.015451
    Abstract The present paper aims to develop the Kuhn-Tucker and Fritz John criteria for saddle point optimality of interval-valued nonlinear programming problem. To achieve the study objective, we have proposed the definition of minimizer and maximizer of an interval-valued non-linear programming problem. Also, we have introduced the interval-valued Fritz-John and Kuhn Tucker saddle point problems. After that, we have established both the necessary and sufficient optimality conditions of an interval-valued non-linear minimization problem. Next, we have shown that both the saddle point conditions (Fritz-John and Kuhn-Tucker) are sufficient without any convexity requirements. Then with the convexity requirements, we have established that… More >

  • Open Access

    ARTICLE

    External Incentive Mechanism Research on Knowledge Cooperation-Sharing in the Chinese Creative Industry Cluster

    Changchun Gao1, Shiyu Liu1,*, Chenhui Yu1, Peng Guo2
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 365-379, 2021, DOI:10.32604/csse.2021.016506
    Abstract The creative industry is a knowledge-based industry, but it is difficult and complex to create knowledge for enterprises. The principle of cooperation-sharing posits that companies’ limited resources prohibit them from gaining a competitive advantage in all business areas. Therefore, cooperation-sharing can help businesses overcome this hurdle. Cooperation-sharing expedites economic development, breaks the barrier of independent knowledge creation, and enhances resource utilization. However, the effectiveness and stability of knowledge cooperation-sharing are key problems facing governments and other regulators. This study can help regulators promote honesty in enterprise cooperation-sharing. Based on the hypothesis of bounded rationality, the evolutionary game theory was used… More >

  • Open Access

    ARTICLE

    Improved Attribute Chain Sampling Plan for Darna Distribution

    Harsh Tripathi1, Amer Ibrahim Al-Omari2, Mahendra Saha1, Ayed R. A. Alanzi3,*
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 381-392, 2021, DOI:10.32604/csse.2021.015624
    Abstract Recently, the Darna distribution has been introduced as a new lifetime distribution. The two-parameter Darna distribution represents is a mixture of two well-known gamma and exponential distributions. A manufacturer or an engineer of products conducts life testing to examine whether the quality level of products meets the customer’s requirements, such as reliability or the minimum lifetime. In this article, an attribute modified chain sampling inspection plan based on the time truncated life test is proposed for items whose lifetime follows the Darna distribution. The plan parameters, including the sample size, the acceptance number, and the past lot result of the… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1
    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224
    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

Share Link

WeChat scan