Home / Journals / CSSE / Vol.35, No.4, 2020
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Prediction of College Students’ Physical Fitness Based on K-Means Clustering and SVR

    Peng Tang, Yu Wang, Ning Shen
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 237-246, 2020, DOI:10.32604/csse.2020.35.237
    Abstract In today’s modern society, the physical fitness of college students is gradually declining. In this paper, a prediction model for college students’ physical fitness is established, in which support vector regression (SVR) and k-means clustering are combined together for the prediction of college students’ fitness. Firstly, the physical measurement data of college students are classified according to gender and class characteristics. Then, the k-means clustering method is used to classify the physical measurement data of college students. Next, the physical characteristics of college students are extracted by SVR to establish the prediction model of physical indicators, and the model for… More >

  • Open AccessOpen Access

    ARTICLE

    Pattern Recognition of Construction Bidding System Based on Image Processing

    Xianzhe Zhang1,3,∗, Sheng Zhou2,†, Jun Fang1,‡, Yanling Ni3,§
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 247-256, 2020, DOI:10.32604/csse.2020.35.247
    Abstract Bidding for construction projects is a very important and representative field in the industry. The system of bidding for construction projects has made considerable progress over the years due to the accumulation of experience and many contributions to the field. Nowadays, with the rapid development of information technology and the intellectualization of the bidding system for construction projects, the accumulation and processing of data has become an essential element of its development. In order to manage the bidding system of construction engineering reasonably, this paper proposes a system based on image processing and pattern recognition technology, which can recognize patterns… More >

  • Open AccessOpen Access

    ARTICLE

    A Digital Start-up Project – CARM Tool as an Innovative Approach to Digital Government Transformation

    S. Green
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 257-269, 2020, DOI:10.32604/csse.2020.35.257
    Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims to elevate staff performance, customer service and provide qualification between financial statements, asset management and alignment with… More >

  • Open AccessOpen Access

    ARTICLE

    A Proposal for Addressing Security Issues Related to Dynamic Code Loading on Android Platform

    Aleksandar Kelec, Zoran Djuric
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 271-282, 2020, DOI:10.32604/csse.2020.35.271
    Abstract One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be… More >

  • Open AccessOpen Access

    ARTICLE

    Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study

    Muhammed Enes Bayrakdar
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283
    Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried out through a human surveillance… More >

  • Open AccessOpen Access

    ARTICLE

    Decision Tree Algorithm for Precision Marketing via Network Channel

    Yulan Zheng
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 293-298, 2020, DOI:10.32604/csse.2020.35.293
    Abstract With the development of e-commerce, more and more enterprises attach importance to precision marketing for network channels. This study adopted the decision tree algorithm in data mining to achieve precision marketing. Firstly, precision marketing and C4.5 decision tree algorithm were briefly introduced. Then e-commerce enterprise A was taken as an example. The data from January to June 2018 were collected. Four attributes including age, income, occupation and educational background were selected for calculation and decision tree was established to extract classification rules.The results showed that the consumers of the products of the company were high-income young and middle-aged people, middle-income… More >

  • Open AccessOpen Access

    ARTICLE

    Security of Chip Bank Card in Remote Payment Based on Risk Feature

    Zheng Fang1,∗, Junyun Cai1, Lifang Tian2
    Computer Systems Science and Engineering, Vol.35, No.4, pp. 299-305, 2020, DOI:10.32604/csse.2020.35.299
    Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. In terms of security testing,… More >

Per Page:

Share Link