Advanced Search
Displaying 1-10 on page 1 of 103. Per Page  
  • Security of Chip Bank Card in Remote Payment Based on Risk Feature
  • Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. In terms of security testing,…
  • More
  •   Views:113       Downloads:87        Download PDF
  • Decision Tree Algorithm for Precision Marketing via Network Channel
  • Abstract With the development of e-commerce, more and more enterprises attach importance to precision marketing for network channels. This study adopted the decision tree algorithm in data mining to achieve precision marketing. Firstly, precision marketing and C4.5 decision tree algorithm were briefly introduced. Then e-commerce enterprise A was taken as an example. The data from January to June 2018 were collected. Four attributes including age, income, occupation and educational background were selected for calculation and decision tree was established to extract classification rules.The results showed that the consumers of the products of the company were high-income young and middle-aged people, middle-income…
  • More
  •   Views:77       Downloads:89        Download PDF
  • Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study
  • Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried out through a human surveillance…
  • More
  •   Views:80       Downloads:84        Download PDF
  • A Proposal for Addressing Security Issues Related to Dynamic Code Loading on Android Platform
  • Abstract One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be…
  • More
  •   Views:72       Downloads:76        Download PDF
  • A Digital Start-up Project – CARM Tool as an Innovative Approach to Digital Government Transformation
  • Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims to elevate staff performance, customer service and provide qualification between financial statements, asset management and alignment with…
  • More
  •   Views:78       Downloads:74        Download PDF
  • Pattern Recognition of Construction Bidding System Based on Image Processing
  • Abstract Bidding for construction projects is a very important and representative field in the industry. The system of bidding for construction projects has made considerable progress over the years due to the accumulation of experience and many contributions to the field. Nowadays, with the rapid development of information technology and the intellectualization of the bidding system for construction projects, the accumulation and processing of data has become an essential element of its development. In order to manage the bidding system of construction engineering reasonably, this paper proposes a system based on image processing and pattern recognition technology, which can recognize patterns…
  • More
  •   Views:135       Downloads:98        Download PDF
  • Prediction of College Students’ Physical Fitness Based on K-Means Clustering and SVR
  • Abstract In today’s modern society, the physical fitness of college students is gradually declining. In this paper, a prediction model for college students’ physical fitness is established, in which support vector regression (SVR) and k-means clustering are combined together for the prediction of college students’ fitness. Firstly, the physical measurement data of college students are classified according to gender and class characteristics. Then, the k-means clustering method is used to classify the physical measurement data of college students. Next, the physical characteristics of college students are extracted by SVR to establish the prediction model of physical indicators, and the model for…
  • More
  •   Views:82       Downloads:85        Download PDF
  • The Method for Extracting New Login Sentiment Words from Chinese Micro-Blog Basedf on Improved Mutual Information
  • Abstract The current method of extracting new login sentiment words not only ignores the diversity of patterns constituted by new multi-character words (the number of words is greater than two), but also disregards the influence of other new words co-occurring with a new word connoting sentiment. To solve this problem, this paper proposes a method for extracting new login sentiment words from Chinese micro-blog based on improved mutual information. First, micro-blog data are preprocessed, taking into consideration some nonsense signals such as web links and punctuation. Based on preprocessed data, the candidate strings are obtained by applying the N-gram segmentation method.…
  • More
  •   Views:86       Downloads:76        Download PDF
  • The Influence of Digital Multimedia Communication Forms on Graphic Design
  • Abstract Today, highly sophisticated technology has changed the lives of most individuals worldwide. In the field of graphic design, the emergence and development of digital multimedia communication forms have had a crucial impact on the creative process of graphic design and even the process of communication, offering more opportunities and more exciting challenges to this domain. And with the continuous improvement of people’s material culture and spiritual culture, the digital age has enriched people’s production and life. Especially in the application of digital multimedia in graphic design, the changes caused by the emergence of digital multimedia focus mainly on the visual…
  • More
  •   Views:68       Downloads:77        Download PDF
  • The Implementation of an English Word Learning System Feedback System and Smartphone App
  • Abstract Considering the issue of Chinese college students that are not interested in learning English and have a lack of enthusiasm for learning overall, a feedback and motivation application based on cloud computing to teach English vocabulary to Chinese college students has been developed. The mobile application can collect and analyze the problems that users encounter in the process of learning English through the cloud server in real-time, and advise on how to resolve these problems. The feedback system also allows users to access this data. In the case of uploading to designated teachers, teachers can adjust their teaching methods and…
  • More
  •   Views:85       Downloads:73        Download PDF
Displaying 1-10 on page 1 of 103. Per Page