Open Access
ARTICLE
Ali Mirarab1,∗, Seyedeh Leili Mirtaheri2,†, Seyed Amir Asghari3,‡
Computer Systems Science and Engineering, Vol.35, No.2, pp. 69-79, 2020, DOI:10.32604/csse.2020.35.069
Abstract Value creation is a major factor not only in the sustainability of organizations but also in the maximization of profit, customer retention, business goals
fulfillment, and revenue. When the value is intended to be created from Big Data scenarios, value creation entails being understood over a broader range
of complexity. A question that arises here is how organizations can use this massive quantity of data and create business value? The present study seeks to
provide a model for creating organizational value using Big Data Analytics (BDA). To this end, after reviewing the related literature and interviewing experts,
the BDA-based organizational… More >
Open Access
ARTICLE
Marius Becherer∗, Michael Zipperle†, Achim Karduck‡
Computer Systems Science and Engineering, Vol.35, No.2, pp. 81-89, 2020, DOI:10.32604/csse.2020.35.081
Abstract Machines are serviced too often or only when they fail. This can result in high costs for maintenance and machine failure. The trend of Industry 4.0 and
the networking of machines opens up new possibilities for maintenance. Intelligent machines provide data that can be used to predict the ideal time of
maintenance. There are different approaches to create a forecast. Depending on the method used, appropriate conditions must be created to improve the
forecast. In this paper, results are compiled to give a state of the art of predictive maintenance. First, the different types of maintenance and economic
relationships are… More >
Open Access
ARTICLE
Feiying Xia1, Shenghong Huang2,*
Computer Systems Science and Engineering, Vol.35, No.2, pp. 91-98, 2020, DOI:10.32604/csse.2020.35.098
Abstract Color is one of the primary elements of artistic expression. Its design and collocation play a very important role in image processing. While the number of
people using the Internet is increasing, more attention is being paid to the user’s experience including the color design and matching of the Internet web
interface, in order to reach the color design of the web interface with image processing as the core. This thesis firstly discusses the importance of web
interface color design and matching in image processing from the image processing appeal of the web interface and the color characteristics of the… More >
Open Access
ARTICLE
Masood Niazi Torshiz1,∗, Azadeh Salehi Esfaji1,†, Haleh Amintoosi2,‡
Computer Systems Science and Engineering, Vol.35, No.2, pp. 99-112, 2020, DOI:10.32604/csse.2020.35.099
Abstract With the growth of information technology and computer networks, there is a vital need for optimal design of distributed databases with the aim of performance
improvement in terms of minimizing the round-trip response time and query transmission and processing costs. To address this issue, new fragmentation,
data allocation, and replication techniques are required. In this paper, we propose enhanced vertical fragmentation, allocation, and replication schemes
to improve the performance of distributed database systems. The proposed fragmentation scheme clusters highly-bonded attributes (i.e., normally accessed
together) into a single fragment in order to minimize the query processing cost. The allocation scheme is… More >
Open Access
ARTICLE
Bing Xu1,∗, Darong Huang2,†, Bo Mi3,‡
Computer Systems Science and Engineering, Vol.35, No.2, pp. 113-121, 2020, DOI:10.32604/csse.2020.35.113
Abstract In this paper, according to the information classification algorithm in data mining, data in the network payment system of e-commerce is mined, forming an
effective evaluation of the security of the network payment system. Firstly, the method of network security risk prediction is discussed. Secondly, according
to the characteristics of network payment system, the system security index system is analyzed in detail, and the specific application process of the C4.5
Classification Algorithm in security evaluation is discussed. Finally, the data mining process is designed in detail and the corresponding code established. In
this paper, data mining theory is applied to… More >