Open Access
ARTICLE
Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Yan Hui3,§, Na Sun1,¶
Computer Systems Science and Engineering, Vol.35, No.3, pp. 127-139, 2020, DOI:10.32604/csse.2020.35.127
Abstract Based on the research hypothesis in a fully competitive closed-loop supply chain for mixed recycling channels, different closed-loop supply chain pricing
models are established for the government’s strategy of adopting different subsidies (consumers, retailers, manufacturers or third-party recyclers). In this
work, we use game theory to establish a price formula, and identify the factors affecting the profit of five closed-loop supply chain members. Through
solution verification, the sales channel pricing, the recycling channel pricing and the channel member profit change of the closed-loop supply chain under
different subsidy objects are compared after changing only one influencing factor. By providing a… More >
Open Access
ARTICLE
Shuo He1,∗, Jianbin Zheng1,†, Jiale Lin2,‡, Tao Tang1,§, Jintao Zhao1,¶, Hongbao Liu1,ll
Computer Systems Science and Engineering, Vol.35, No.3, pp. 141-149, 2020, DOI:10.32604/csse.2020.35.141
Abstract Nowadays, many payment service providers use the discounts and other marketing strategies to promote their products. This also raises the issue of people
who deliberately take advantage of such promotions to reap financial benefits. These people are known as ‘scalper parties’ or ‘econnoisseurs’ which can
constitute an underground industry. In this paper, we show how to use machine learning to assist in identifying abnormal scalper transactions. Moreover,
we introduce the basic methods of Decision Tree and Boosting Tree, and show how these classification methods can be applied in the detection of abnormal
transactions. In addition, we introduce a graph computing… More >
Open Access
ARTICLE
Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Ze-Chao Zhu1,§
Computer Systems Science and Engineering, Vol.35, No.3, pp. 151-172, 2020, DOI:10.32604/csse.2020.35.151
Abstract Given the government subsidies for new energy vehicles, this study is conducted to study the closed-loop supply chain comprising individual manufacturers,
individual retailers and individual third-party recyclers. In this paper, combine the reality of new energy vehicles with the relevant research of game theory,
and establish an no government subsidy model (Model N), a government subsidized consumer model (Model C), a government subsidized manufacturer
model (Model M), a government subsidized third party recycler model (Model T), and a government subsidized retailer model (Model R) for quantitative
research. Then, numerical examples are used to simulate the impact of government subsidies on… More >
Open Access
ARTICLE
Yuan Min1,†, Xu Fengxiang2,3,*, Wu Junhao1, Zheng Xuefeng1
Computer Systems Science and Engineering, Vol.35, No.3, pp. 173-181, 2020, DOI:10.32604/csse.2020.35.173
Abstract This paper studies the influence of different factors on pedestrian head injury in vehicle-pedestrian collisions. PC-Crash software is used to construct
simulation experiments under ten factors. The research shows that the injury to pedestrians in reverse impact is greater than that to pedestrians in forward
impact. With the acceleration of vehicle speed, the HIC value of pedestrians will increase with the increase of the height of the front hood from the ground.
When the vehicle speed is less than 40 km/h, the injury to pedestrians in a forward-leaning emergency posture is smaller, and the injury to a standing
emergency posture… More >
Open Access
ARTICLE
Lini Cai∗
Computer Systems Science and Engineering, Vol.35, No.3, pp. 183-189, 2020, DOI:10.32604/csse.2020.35.183
Abstract In this paper, we use modern education concept and satisfaction theory to study the construction of a system used to evaluate Japanese teaching quality
based on a satisfaction model. We use a cloud computing platform to mine the rules of Japanese teaching quality satisfaction by using an improved Apriori
algorithm to explore the impact of measurement indicators of teaching objectives, processes and results on overall satisfaction with Japanese teaching
practices, so as to improve Japanese teaching in the future. Scientific decision-making, improvement of teaching practices, transformation and innovation
of students’ learning methods provide data reference and theoretical support. More >
Open Access
ARTICLE
He Ping∗
Computer Systems Science and Engineering, Vol.35, No.3, pp. 191-199, 2020, DOI:10.32604/csse.2020.35.191
Abstract In this paper, the rapid assessment method of casualties in earthquake disasters is studied and a casualty assessment model based on coupling factors
is established from the perspective of factors affecting casualties in earthquake disasters. Taking Guangdong area as an example, the spatialization and
quantification of casualty coupling factors in earthquake disasters are analyzed in detail. A software system is developed based on ARC Engine 10.1 platform.
For the same earthquake case, different algorithms (algorithm model based on coupling factor and algorithm model based on building seismic vulnerability)
are used to calculate the number of casualties in order to compare… More >
Open Access
ARTICLE
Jing Chen∗,Yuchen Luo2,†, Ruiqi Du3,‡
Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199
Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system
for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual
trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal
which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing
information and purchasing data. According to… More >
Open Access
ARTICLE
Ye Zhang∗
Computer Systems Science and Engineering, Vol.35, No.3, pp. 207-214, 2020, DOI:10.32604/csse.2020.35.207
Abstract Considering the issue of Chinese college students that are not interested in learning English and have a lack of enthusiasm for learning overall, a feedback
and motivation application based on cloud computing to teach English vocabulary to Chinese college students has been developed. The mobile application
can collect and analyze the problems that users encounter in the process of learning English through the cloud server in real-time, and advise on how
to resolve these problems. The feedback system also allows users to access this data. In the case of uploading to designated teachers, teachers can adjust
their teaching methods and… More >
Open Access
ARTICLE
Shenghong Huang
Computer Systems Science and Engineering, Vol.35, No.3, pp. 215-222, 2020, DOI:10.32604/csse.2020.35.215
Abstract Today, highly sophisticated technology has changed the lives of most individuals worldwide. In the field of graphic design, the emergence and development
of digital multimedia communication forms have had a crucial impact on the creative process of graphic design and even the process of communication,
offering more opportunities and more exciting challenges to this domain. And with the continuous improvement of people’s material culture and spiritual
culture, the digital age has enriched people’s production and life. Especially in the application of digital multimedia in graphic design, the changes caused
by the emergence of digital multimedia focus mainly on the visual… More >
Open Access
ARTICLE
Guangli Zhu, Wenting Liu, Shunxiang Zhang*, Xiang Chen , Chang Yin
Computer Systems Science and Engineering, Vol.35, No.3, pp. 223-232, 2020, DOI:10.32604/csse.2020.35.223
Abstract The current method of extracting new login sentiment words not only ignores the diversity of patterns constituted by new multi-character words (the number
of words is greater than two), but also disregards the influence of other new words co-occurring with a new word connoting sentiment. To solve this
problem, this paper proposes a method for extracting new login sentiment words from Chinese micro-blog based on improved mutual information. First,
micro-blog data are preprocessed, taking into consideration some nonsense signals such as web links and punctuation. Based on preprocessed data, the
candidate strings are obtained by applying the N-gram segmentation method.… More >