Open Access
ARTICLE
Peng Tang∗, Yu Wang, Ning Shen
Computer Systems Science and Engineering, Vol.35, No.4, pp. 237-246, 2020, DOI:10.32604/csse.2020.35.237
Abstract In today’s modern society, the physical fitness of college students is gradually declining. In this paper, a prediction model for college students’ physical
fitness is established, in which support vector regression (SVR) and k-means clustering are combined together for the prediction of college students’ fitness.
Firstly, the physical measurement data of college students are classified according to gender and class characteristics. Then, the k-means clustering method
is used to classify the physical measurement data of college students. Next, the physical characteristics of college students are extracted by SVR to establish
the prediction model of physical indicators, and the model for… More >
Open Access
ARTICLE
Xianzhe Zhang1,3,∗, Sheng Zhou2,†, Jun Fang1,‡, Yanling Ni3,§
Computer Systems Science and Engineering, Vol.35, No.4, pp. 247-256, 2020, DOI:10.32604/csse.2020.35.247
Abstract Bidding for construction projects is a very important and representative field in the industry. The system of bidding for construction projects has made
considerable progress over the years due to the accumulation of experience and many contributions to the field. Nowadays, with the rapid development of
information technology and the intellectualization of the bidding system for construction projects, the accumulation and processing of data has become an
essential element of its development. In order to manage the bidding system of construction engineering reasonably, this paper proposes a system based
on image processing and pattern recognition technology, which can recognize patterns… More >
Open Access
ARTICLE
S. Green∗
Computer Systems Science and Engineering, Vol.35, No.4, pp. 257-269, 2020, DOI:10.32604/csse.2020.35.257
Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to
demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness
has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces
a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims
to elevate staff performance, customer service and provide qualification between financial statements, asset management and alignment with… More >
Open Access
ARTICLE
Aleksandar Kelec∗, Zoran Djuric†
Computer Systems Science and Engineering, Vol.35, No.4, pp. 271-282, 2020, DOI:10.32604/csse.2020.35.271
Abstract One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code
dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed
during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that
using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be… More >
Open Access
ARTICLE
Muhammed Enes Bayrakdar∗
Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283
Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution
monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications.
The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially
in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried out
through a human surveillance… More >
Open Access
ARTICLE
Yulan Zheng∗
Computer Systems Science and Engineering, Vol.35, No.4, pp. 293-298, 2020, DOI:10.32604/csse.2020.35.293
Abstract With the development of e-commerce, more and more enterprises attach importance to precision marketing for network channels. This study adopted the
decision tree algorithm in data mining to achieve precision marketing. Firstly, precision marketing and C4.5 decision tree algorithm were briefly introduced.
Then e-commerce enterprise A was taken as an example. The data from January to June 2018 were collected. Four attributes including age, income,
occupation and educational background were selected for calculation and decision tree was established to extract classification rules.The results showed
that the consumers of the products of the company were high-income young and middle-aged people, middle-income… More >
Open Access
ARTICLE
Zheng Fang1,∗, Junyun Cai1, Lifang Tian2
Computer Systems Science and Engineering, Vol.35, No.4, pp. 299-305, 2020, DOI:10.32604/csse.2020.35.299
Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank
card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk
features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card
remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. In terms of security testing,… More >