Vol.35, No.4, 2020-Table of Contents
- OPEN ACCESS ARTICLE
- Prediction of College Students’ Physical Fitness Based on K-Means Clustering and SVR
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 237-246, 2020, DOI:10.32604/csse.2020.35.237
- Abstract In today’s modern society, the physical fitness of college students is gradually declining. In this paper, a prediction model for college students’ physical fitness is established, in which support vector regression (SVR) and k-means clustering are combined together for the prediction of college students’ fitness. Firstly, the physical measurement data of college students are classified according to gender and class characteristics. Then, the k-means clustering method is used to classify the physical measurement data of college students. Next, the physical characteristics of college students are extracted by SVR to establish the prediction model of physical indicators, and the model for… More
-
Views:1551
Downloads:1311
Cited by:4
Download PDF
- OPEN ACCESS ARTICLE
- Pattern Recognition of Construction Bidding System Based on Image Processing
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 247-256, 2020, DOI:10.32604/csse.2020.35.247
- Abstract Bidding for construction projects is a very important and representative field in the industry. The system of bidding for construction projects has made considerable progress over the years due to the accumulation of experience and many contributions to the field. Nowadays, with the rapid development of information technology and the intellectualization of the bidding system for construction projects, the accumulation and processing of data has become an essential element of its development. In order to manage the bidding system of construction engineering reasonably, this paper proposes a system based on image processing and pattern recognition technology, which can recognize patterns… More
-
Views:2061
Downloads:1942
Cited by:3
Download PDF
- OPEN ACCESS ARTICLE
- A Digital Start-up Project – CARM Tool as an Innovative Approach to Digital Government Transformation
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 257-269, 2020, DOI:10.32604/csse.2020.35.257
- Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims to elevate staff performance, customer service and provide qualification between financial statements, asset management and alignment with… More
-
Views:1299
Downloads:1026
Cited by:1
Download PDF
- OPEN ACCESS ARTICLE
- A Proposal for Addressing Security Issues Related to Dynamic Code Loading on Android Platform
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 271-282, 2020, DOI:10.32604/csse.2020.35.271
- Abstract One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be… More
-
Views:1033
Downloads:769
Cited by:5
Download PDF
- OPEN ACCESS ARTICLE
- Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283
- Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried out through a human surveillance… More
-
Views:1214
Downloads:860
Cited by:5
Download PDF
- OPEN ACCESS ARTICLE
- Decision Tree Algorithm for Precision Marketing via Network Channel
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 293-298, 2020, DOI:10.32604/csse.2020.35.293
- Abstract With the development of e-commerce, more and more enterprises attach importance to precision marketing for network channels. This study adopted the decision tree algorithm in data mining to achieve precision marketing. Firstly, precision marketing and C4.5 decision tree algorithm were briefly introduced. Then e-commerce enterprise A was taken as an example. The data from January to June 2018 were collected. Four attributes including age, income, occupation and educational background were selected for calculation and decision tree was established to extract classification rules.The results showed that the consumers of the products of the company were high-income young and middle-aged people, middle-income… More
-
Views:1083
Downloads:917
Cited by:1
Download PDF
- OPEN ACCESS ARTICLE
- Security of Chip Bank Card in Remote Payment Based on Risk Feature
- Computer Systems Science and Engineering, Vol.35, No.4, pp. 299-305, 2020, DOI:10.32604/csse.2020.35.299
- Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. In terms of security testing,… More
-
Views:944
Downloads:823
Cited by:4
Download PDF