Computer Science Negative Results eJournal最新文献

筛选
英文 中文
Composites and Its Applications: A Review 复合材料及其应用综述
Computer Science Negative Results eJournal Pub Date : 2020-09-18 DOI: 10.2139/ssrn.3904471
Surbhi Bhati, Shruti Panwar, S. Loonker
{"title":"Composites and Its Applications: A Review","authors":"Surbhi Bhati, Shruti Panwar, S. Loonker","doi":"10.2139/ssrn.3904471","DOIUrl":"https://doi.org/10.2139/ssrn.3904471","url":null,"abstract":"The major advantages of composites are its relative stiffness, strength properties and its light weight. The key concepts of composites include its physical properties, material properties, tooling, design and repair. The use of composite materials has led to cost reduction, an increase in efficiency, and better utilization of available sources. Composite materials have been manufactured using different molding methods in different sectors. Composite materials have wide applications in the aerospace industry, automobile sector, manufacturing industries etc. This study illustrates the need of composite materials over common materials.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117241027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Impact of Social Media on Consumer’S Towards Hedonic Shopping (With Special Reference to Virudhunagar District) 社交媒体对消费者享乐购物的影响研究(以Virudhunagar地区为例)
Computer Science Negative Results eJournal Pub Date : 2019-10-11 DOI: 10.2139/ssrn.3904218
J. Mahamayi, S. Hemalatha
{"title":"A Study on Impact of Social Media on Consumer’S Towards Hedonic Shopping (With Special Reference to Virudhunagar District)","authors":"J. Mahamayi, S. Hemalatha","doi":"10.2139/ssrn.3904218","DOIUrl":"https://doi.org/10.2139/ssrn.3904218","url":null,"abstract":"Today, factors as internet and social media lead to changes in the way of life of individuals. Due to these factors, consumption has begun to be interpreted in different forms. Hedonic consumption that comes from consumption by gaining the emotional satisfaction from shopping has gained importance rather than physical necessity. Social media is another factor that influences the emotional satisfaction of individuals and their consumption behavior. This paper is an attempt to analyse the impact of social media on consumer towards hedonic shopping. Chunk sampling technique is used to collect data. Both primary and secondary data were used. 150 samples were collected through a structured questionnaire. Data were analysed through statistical tools like percentage, Descriptive statistics, Garrett ranking score.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130632462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Trust Management in Wireless Sensor Networks 一种无线传感器网络信任管理方法
Computer Science Negative Results eJournal Pub Date : 2018-11-01 DOI: 10.5121/IJSPTM.2018.7401
J. Górski, Alan Turower
{"title":"A Method of Trust Management in Wireless Sensor Networks","authors":"J. Górski, Alan Turower","doi":"10.5121/IJSPTM.2018.7401","DOIUrl":"https://doi.org/10.5121/IJSPTM.2018.7401","url":null,"abstract":"The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks target ingthe trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characteristic Specific Prioritized Dynamic Average Burst Round Robin Scheduling for Uniprocessor and Multiprocessor Environment 单处理机和多处理机环境下的特征优先化动态平均突发轮循调度
Computer Science Negative Results eJournal Pub Date : 2015-11-08 DOI: 10.5121/ijcsea.2015.5501
Amar Ranjan Dash, Sandipta Kumar Sahu, Sanjay Kumar Samantra, Sradhanjali Sabat
{"title":"Characteristic Specific Prioritized Dynamic Average Burst Round Robin Scheduling for Uniprocessor and Multiprocessor Environment","authors":"Amar Ranjan Dash, Sandipta Kumar Sahu, Sanjay Kumar Samantra, Sradhanjali Sabat","doi":"10.5121/ijcsea.2015.5501","DOIUrl":"https://doi.org/10.5121/ijcsea.2015.5501","url":null,"abstract":"CPU scheduling is one of the most crucial operations performed by operating systems. Different conventional algorithms like FCFS, SJF, Priority, and RR (Round Robin) are available for CPU Scheduling. The effectiveness of Priority and Round Robin scheduling algorithm completely depends on selection of priority features of processes and on the choice of time quantum. In this paper a new CPU scheduling algorithm has been proposed, named as CSPDABRR (Characteristic specific Prioritized Dynamic Average Burst Round Robin), that uses seven priority features for calculating priority of processes and uses dynamic time quantum instead of static time quantum used in RR. The performance of the proposed algorithm is experimentally compared with traditional RR and Priority scheduling algorithm in both uni-processor and multi-processor environment. The results of our approach presented in this paper demonstrate improved performance in terms of average waiting time, average turnaround time, and optimal priority feature.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Channel System Architecture for Banking 面向银行的多渠道系统架构
Computer Science Negative Results eJournal Pub Date : 2013-10-31 DOI: 10.2139/ssrn.3571389
C. Pavlovski
{"title":"A Multi-Channel System Architecture for Banking","authors":"C. Pavlovski","doi":"10.2139/ssrn.3571389","DOIUrl":"https://doi.org/10.2139/ssrn.3571389","url":null,"abstract":"Financial institutions have increased dependence upon the technology solutions that enable their financial products and services. The proliferation of Internet technologies, mobile devices, and competition from international commerce have placed increased pressure up banking and financial institutions to ensure that competitive leadership is maintained. A key challenge facing banking and finance is how to adopt the new Information and Communications Technologies (ICT) within the organization in a timely manner whilst not disrupting the embedded solutions that provide core banking capabilities to operate the business. In this paper we propose a multi-channel architecture for financial institutions such as banking. The architecture is based upon our industry experience in developing multi-channel solutions in similar industries and is refined further here based upon our experiences in banking. The proposed architecture may be used to facilitate decisions on how best to deploy new and emerging multi-channel technologies within the banking environment, providing a means for assessing how to ensure effective use of existing investments in systems and technologies. The solution may be used as a blueprint for banking institutions in developing their multi-channel strategies; addressing the incumbent, emerging, and future channels of banking distribution.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Isolation Forest and Local Outlier Factor for Credit Card Fraud Detection System 信用卡欺诈检测系统的隔离森林和局部离群因子
Computer Science Negative Results eJournal Pub Date : 1900-01-01 DOI: 10.35940/ijeat.d6815.049420
V. Vijayakumar, N. Divya, P. Sarojini, K. Sonika
{"title":"Isolation Forest and Local Outlier Factor for Credit Card Fraud Detection System","authors":"V. Vijayakumar, N. Divya, P. Sarojini, K. Sonika","doi":"10.35940/ijeat.d6815.049420","DOIUrl":"https://doi.org/10.35940/ijeat.d6815.049420","url":null,"abstract":"Fraud identification is a crucial issue facing large economic institutions, which has caused due to the rise in credit card payments. This paper brings a new approach for the predictive identification of credit card payment frauds focused on Isolation Forest and Local Outlier Factor. The suggested solution comprises of the corresponding phases: pre-processing of data-sets, training and sorting, convergence of decisions and analysis of tests. In this article, the behavior characteristics of correct and incorrect transactions are to be taught by two kinds of algorithms local outlier factor and isolation forest. To date, several researchers identified different approaches for identifying and growing such frauds. In this paper we suggest analysis of Isolation Forest and Local Outlier Factor algorithms using python and their comprehensive experimental results. Upon evaluating the dataset, we received Isolation Forest with high accuracy compared to Local Outlier Factor Algorithm","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"114 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书