Home / Journals / CSSE / Vol.35, No.3, 2020
  • Open Access

    ARTICLE

    Analysis of Factors Affecting the Profits of Closed-Loop Supply Chain Members Under Different Subsidy Objects

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Yan Hui3,§, Na Sun1,¶
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 127-139, 2020, DOI:10.32604/csse.2020.35.127
    Abstract Based on the research hypothesis in a fully competitive closed-loop supply chain for mixed recycling channels, different closed-loop supply chain pricing models are established for the government’s strategy of adopting different subsidies (consumers, retailers, manufacturers or third-party recyclers). In this work, we use game theory to establish a price formula, and identify the factors affecting the profit of five closed-loop supply chain members. Through solution verification, the sales channel pricing, the recycling channel pricing and the channel member profit change of the closed-loop supply chain under different subsidy objects are compared after changing only one influencing factor. By providing a… More >

  • Open Access

    ARTICLE

    Classification-Based Fraud Detection for Payment Marketing and Promotion

    Shuo He1,∗, Jianbin Zheng1,†, Jiale Lin2,‡, Tao Tang1,§, Jintao Zhao1,¶, Hongbao Liu1,ll
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 141-149, 2020, DOI:10.32604/csse.2020.35.141
    Abstract Nowadays, many payment service providers use the discounts and other marketing strategies to promote their products. This also raises the issue of people who deliberately take advantage of such promotions to reap financial benefits. These people are known as ‘scalper parties’ or ‘econnoisseurs’ which can constitute an underground industry. In this paper, we show how to use machine learning to assist in identifying abnormal scalper transactions. Moreover, we introduce the basic methods of Decision Tree and Boosting Tree, and show how these classification methods can be applied in the detection of abnormal transactions. In addition, we introduce a graph computing… More >

  • Open Access

    ARTICLE

    "Data Mining of Urban New Energy Vehicles in an Intelligent Government Subsidy Environment Using Closed-Loop Supply Chain Pricing Model"

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Ze-Chao Zhu1,§
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 151-172, 2020, DOI:10.32604/csse.2020.35.151
    Abstract Given the government subsidies for new energy vehicles, this study is conducted to study the closed-loop supply chain comprising individual manufacturers, individual retailers and individual third-party recyclers. In this paper, combine the reality of new energy vehicles with the relevant research of game theory, and establish an no government subsidy model (Model N), a government subsidized consumer model (Model C), a government subsidized manufacturer model (Model M), a government subsidized third party recycler model (Model T), and a government subsidized retailer model (Model R) for quantitative research. Then, numerical examples are used to simulate the impact of government subsidies on… More >

  • Open Access

    ARTICLE

    Injury Analysis of Vehicle-Pedestrian Collision Based on Orthogonal Experiments

    Yuan Min1,†, Xu Fengxiang2,3,*, Wu Junhao1, Zheng Xuefeng1
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 173-181, 2020, DOI:10.32604/csse.2020.35.173
    Abstract This paper studies the influence of different factors on pedestrian head injury in vehicle-pedestrian collisions. PC-Crash software is used to construct simulation experiments under ten factors. The research shows that the injury to pedestrians in reverse impact is greater than that to pedestrians in forward impact. With the acceleration of vehicle speed, the HIC value of pedestrians will increase with the increase of the height of the front hood from the ground. When the vehicle speed is less than 40 km/h, the injury to pedestrians in a forward-leaning emergency posture is smaller, and the injury to a standing emergency posture… More >

  • Open Access

    ARTICLE

    Japanese Teaching Quality Satisfaction Analysis with Improved Apriori Algorithms under Cloud Computing Platform

    Lini Cai
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 183-189, 2020, DOI:10.32604/csse.2020.35.183
    Abstract In this paper, we use modern education concept and satisfaction theory to study the construction of a system used to evaluate Japanese teaching quality based on a satisfaction model. We use a cloud computing platform to mine the rules of Japanese teaching quality satisfaction by using an improved Apriori algorithm to explore the impact of measurement indicators of teaching objectives, processes and results on overall satisfaction with Japanese teaching practices, so as to improve Japanese teaching in the future. Scientific decision-making, improvement of teaching practices, transformation and innovation of students’ learning methods provide data reference and theoretical support. More >

  • Open Access

    ARTICLE

    Study of Assessment Method Based on Coupling Factor of Casualty in Earthquake Disasters in Guangdong Area

    He Ping
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 191-199, 2020, DOI:10.32604/csse.2020.35.191
    Abstract In this paper, the rapid assessment method of casualties in earthquake disasters is studied and a casualty assessment model based on coupling factors is established from the perspective of factors affecting casualties in earthquake disasters. Taking Guangdong area as an example, the spatialization and quantification of casualty coupling factors in earthquake disasters are analyzed in detail. A software system is developed based on ARC Engine 10.1 platform. For the same earthquake case, different algorithms (algorithm model based on coupling factor and algorithm model based on building seismic vulnerability) are used to calculate the number of casualties in order to compare… More >

  • Open Access

    ARTICLE

    The Impact of Privacy Seal on Users’ Perception in Network Transactions

    Jing Chen,Yuchen Luo2,†, Ruiqi Du3,‡
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199
    Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing information and purchasing data. According to… More >

  • Open Access

    ARTICLE

    The Implementation of an English Word Learning System Feedback System and Smartphone App

    Ye Zhang
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 207-214, 2020, DOI:10.32604/csse.2020.35.207
    Abstract Considering the issue of Chinese college students that are not interested in learning English and have a lack of enthusiasm for learning overall, a feedback and motivation application based on cloud computing to teach English vocabulary to Chinese college students has been developed. The mobile application can collect and analyze the problems that users encounter in the process of learning English through the cloud server in real-time, and advise on how to resolve these problems. The feedback system also allows users to access this data. In the case of uploading to designated teachers, teachers can adjust their teaching methods and… More >

  • Open Access

    ARTICLE

    The Influence of Digital Multimedia Communication Forms on Graphic Design

    Shenghong Huang
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 215-222, 2020, DOI:10.32604/csse.2020.35.215
    Abstract Today, highly sophisticated technology has changed the lives of most individuals worldwide. In the field of graphic design, the emergence and development of digital multimedia communication forms have had a crucial impact on the creative process of graphic design and even the process of communication, offering more opportunities and more exciting challenges to this domain. And with the continuous improvement of people’s material culture and spiritual culture, the digital age has enriched people’s production and life. Especially in the application of digital multimedia in graphic design, the changes caused by the emergence of digital multimedia focus mainly on the visual… More >

  • Open Access

    ARTICLE

    The Method for Extracting New Login Sentiment Words from Chinese Micro-Blog Basedf on Improved Mutual Information

    Guangli Zhu, Wenting Liu, Shunxiang Zhang*, Xiang Chen , Chang Yin
    Computer Systems Science and Engineering, Vol.35, No.3, pp. 223-232, 2020, DOI:10.32604/csse.2020.35.223
    Abstract The current method of extracting new login sentiment words not only ignores the diversity of patterns constituted by new multi-character words (the number of words is greater than two), but also disregards the influence of other new words co-occurring with a new word connoting sentiment. To solve this problem, this paper proposes a method for extracting new login sentiment words from Chinese micro-blog based on improved mutual information. First, micro-blog data are preprocessed, taking into consideration some nonsense signals such as web links and punctuation. Based on preprocessed data, the candidate strings are obtained by applying the N-gram segmentation method.… More >

Share Link

WeChat scan