Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,480)
  • Open Access

    ARTICLE

    Injury Analysis of Vehicle-Pedestrian Collision Based on Orthogonal Experiments

    Yuan Min1,†, Xu Fengxiang2,3,*, Wu Junhao1, Zheng Xuefeng1

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 173-181, 2020, DOI:10.32604/csse.2020.35.173

    Abstract This paper studies the influence of different factors on pedestrian head injury in vehicle-pedestrian collisions. PC-Crash software is used to construct simulation experiments under ten factors. The research shows that the injury to pedestrians in reverse impact is greater than that to pedestrians in forward impact. With the acceleration of vehicle speed, the HIC value of pedestrians will increase with the increase of the height of the front hood from the ground. When the vehicle speed is less than 40 km/h, the injury to pedestrians in a forward-leaning emergency posture is smaller, and the injury More >

  • Open Access

    ARTICLE

    "Data Mining of Urban New Energy Vehicles in an Intelligent Government Subsidy Environment Using Closed-Loop Supply Chain Pricing Model"

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Ze-Chao Zhu1,§

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 151-172, 2020, DOI:10.32604/csse.2020.35.151

    Abstract Given the government subsidies for new energy vehicles, this study is conducted to study the closed-loop supply chain comprising individual manufacturers, individual retailers and individual third-party recyclers. In this paper, combine the reality of new energy vehicles with the relevant research of game theory, and establish an no government subsidy model (Model N), a government subsidized consumer model (Model C), a government subsidized manufacturer model (Model M), a government subsidized third party recycler model (Model T), and a government subsidized retailer model (Model R) for quantitative research. Then, numerical examples are used to simulate the More >

  • Open Access

    ARTICLE

    Classification-Based Fraud Detection for Payment Marketing and Promotion

    Shuo He1,∗, Jianbin Zheng1,†, Jiale Lin2,‡, Tao Tang1,§, Jintao Zhao1,¶, Hongbao Liu1,ll

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 141-149, 2020, DOI:10.32604/csse.2020.35.141

    Abstract Nowadays, many payment service providers use the discounts and other marketing strategies to promote their products. This also raises the issue of people who deliberately take advantage of such promotions to reap financial benefits. These people are known as ‘scalper parties’ or ‘econnoisseurs’ which can constitute an underground industry. In this paper, we show how to use machine learning to assist in identifying abnormal scalper transactions. Moreover, we introduce the basic methods of Decision Tree and Boosting Tree, and show how these classification methods can be applied in the detection of abnormal transactions. In addition,… More >

  • Open Access

    ARTICLE

    Analysis of Factors Affecting the Profits of Closed-Loop Supply Chain Members Under Different Subsidy Objects

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Yan Hui3,§, Na Sun1,¶

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 127-139, 2020, DOI:10.32604/csse.2020.35.127

    Abstract Based on the research hypothesis in a fully competitive closed-loop supply chain for mixed recycling channels, different closed-loop supply chain pricing models are established for the government’s strategy of adopting different subsidies (consumers, retailers, manufacturers or third-party recyclers). In this work, we use game theory to establish a price formula, and identify the factors affecting the profit of five closed-loop supply chain members. Through solution verification, the sales channel pricing, the recycling channel pricing and the channel member profit change of the closed-loop supply chain under different subsidy objects are compared after changing only one More >

  • Open Access

    ARTICLE

    Research on E-Commerce Transaction Payment System Basedf on C4.5 Decision Tree Data Mining Algorithm

    Bing Xu1,∗, Darong Huang2,†, Bo Mi3,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 113-121, 2020, DOI:10.32604/csse.2020.35.113

    Abstract In this paper, according to the information classification algorithm in data mining, data in the network payment system of e-commerce is mined, forming an effective evaluation of the security of the network payment system. Firstly, the method of network security risk prediction is discussed. Secondly, according to the characteristics of network payment system, the system security index system is analyzed in detail, and the specific application process of the C4.5 Classification Algorithm in security evaluation is discussed. Finally, the data mining process is designed in detail and the corresponding code established. In this paper, data More >

  • Open Access

    ARTICLE

    Enhanced Schemes for Data Fragmentation, Allocation, and Replication in Distributed Database Systems

    Masood Niazi Torshiz1,∗, Azadeh Salehi Esfaji1,†, Haleh Amintoosi2,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 99-112, 2020, DOI:10.32604/csse.2020.35.099

    Abstract With the growth of information technology and computer networks, there is a vital need for optimal design of distributed databases with the aim of performance improvement in terms of minimizing the round-trip response time and query transmission and processing costs. To address this issue, new fragmentation, data allocation, and replication techniques are required. In this paper, we propose enhanced vertical fragmentation, allocation, and replication schemes to improve the performance of distributed database systems. The proposed fragmentation scheme clusters highly-bonded attributes (i.e., normally accessed together) into a single fragment in order to minimize the query processing More >

  • Open Access

    ARTICLE

    Application Research of Color Design and Collocation in Image Processing

    Feiying Xia1, Shenghong Huang2,*

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 91-98, 2020, DOI:10.32604/csse.2020.35.098

    Abstract Color is one of the primary elements of artistic expression. Its design and collocation play a very important role in image processing. While the number of people using the Internet is increasing, more attention is being paid to the user’s experience including the color design and matching of the Internet web interface, in order to reach the color design of the web interface with image processing as the core. This thesis firstly discusses the importance of web interface color design and matching in image processing from the image processing appeal of the web interface and More >

  • Open Access

    ARTICLE

    Intelligent Choice of Machine Learning Methods for Predictive Maintenance of Intelligent Machines

    Marius Becherer, Michael Zipperle, Achim Karduck

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 81-89, 2020, DOI:10.32604/csse.2020.35.081

    Abstract Machines are serviced too often or only when they fail. This can result in high costs for maintenance and machine failure. The trend of Industry 4.0 and the networking of machines opens up new possibilities for maintenance. Intelligent machines provide data that can be used to predict the ideal time of maintenance. There are different approaches to create a forecast. Depending on the method used, appropriate conditions must be created to improve the forecast. In this paper, results are compiled to give a state of the art of predictive maintenance. First, the different types of More >

  • Open Access

    ARTICLE

    A Model to Create Organizational Value with Big Data Analytics

    Ali Mirarab1,∗, Seyedeh Leili Mirtaheri2,†, Seyed Amir Asghari3,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 69-79, 2020, DOI:10.32604/csse.2020.35.069

    Abstract Value creation is a major factor not only in the sustainability of organizations but also in the maximization of profit, customer retention, business goals fulfillment, and revenue. When the value is intended to be created from Big Data scenarios, value creation entails being understood over a broader range of complexity. A question that arises here is how organizations can use this massive quantity of data and create business value? The present study seeks to provide a model for creating organizational value using Big Data Analytics (BDA). To this end, after reviewing the related literature and… More >

  • Open Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051

    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange More >

Displaying 1391-1400 on page 140 of 1480. Per Page