100% found this document useful (1 vote)
2 views

Emerging Trends in Intelligent and Interactive Systems and Applications: Proceedings of the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020) 1st Edition Madjid Tavana instant download

The document is a collection of proceedings from the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020), featuring over 100 peer-reviewed papers across various topics such as analytical systems, database management, electronics, energy, and intelligent systems. It highlights the importance of intelligent systems in addressing real-world challenges and emphasizes the rapid dissemination of research findings. The series aims to cover significant advancements in intelligent systems and computing, with contributions from international experts in the field.

Uploaded by

mqlyinwc235
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2 views

Emerging Trends in Intelligent and Interactive Systems and Applications: Proceedings of the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020) 1st Edition Madjid Tavana instant download

The document is a collection of proceedings from the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020), featuring over 100 peer-reviewed papers across various topics such as analytical systems, database management, electronics, energy, and intelligent systems. It highlights the importance of intelligent systems in addressing real-world challenges and emphasizes the rapid dissemination of research findings. The series aims to cover significant advancements in intelligent systems and computing, with contributions from international experts in the field.

Uploaded by

mqlyinwc235
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Emerging Trends in Intelligent and Interactive

Systems and Applications: Proceedings of the 5th


International Conference on Intelligent,
Interactive Systems and Applications (IISA2020)
1st Edition Madjid Tavana download
https://textbookfull.com/product/emerging-trends-in-intelligent-
and-interactive-systems-and-applications-proceedings-of-the-5th-
international-conference-on-intelligent-interactive-systems-and-
applications-iisa2020-1st-edition-mad/

Download full version ebook from https://textbookfull.com


We believe these products will be a great fit for you. Click
the link to download now, or visit textbookfull.com
to discover even more!

Advances in Intelligent Systems and Interactive


Applications: Proceedings of the 2nd International
Conference on Intelligent and Interactive Systems and
Applications (IISA2017) 1st Edition Fatos Xhafa
https://textbookfull.com/product/advances-in-intelligent-systems-
and-interactive-applications-proceedings-of-the-2nd-
international-conference-on-intelligent-and-interactive-systems-
and-applications-iisa2017-1st-edition-fatos-xhafa/

Intelligent Systems and Applications: Proceedings of


the 2020 Intelligent Systems Conference (IntelliSys)
Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-systems-and-
applications-proceedings-of-the-2020-intelligent-systems-
conference-intellisys-volume-2-kohei-arai/

Intelligent Systems and Applications: Proceedings of


the 2020 Intelligent Systems Conference (IntelliSys)
Volume 3 Kohei Arai

https://textbookfull.com/product/intelligent-systems-and-
applications-proceedings-of-the-2020-intelligent-systems-
conference-intellisys-volume-3-kohei-arai/

Intelligent Systems Design and Applications 19th


International Conference on Intelligent Systems Design
and Applications ISDA 2019 held December 3 5 2019 Ajith
Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-19th-international-conference-on-intelligent-
systems-design-and-applications-isda-2019-held-
Intelligent Systems Design and Applications 16th
International Conference on Intelligent Systems Design
and Applications ISDA 2016 held in Porto Systems and
Computing 557 Band 557 Ana Maria Madureira (Editor)
https://textbookfull.com/product/intelligent-systems-design-and-
applications-16th-international-conference-on-intelligent-
systems-design-and-applications-isda-2016-held-in-porto-systems-
and-computing-557-band-557-ana-maria-madureira/

Intelligent Interactive Multimedia Systems and Services


2016 1st Edition Giuseppe De Pietro

https://textbookfull.com/product/intelligent-interactive-
multimedia-systems-and-services-2016-1st-edition-giuseppe-de-
pietro/

Research and Development in Intelligent Systems XXX


Incorporating Applications and Innovations in
Intelligent Systems XXI Proceedings of AI 2013 The
Thirty third SGAI International Conference on
Innovative Techniques and Applications of Artificial
https://textbookfull.com/product/research-and-development-in-
intelligent-systems-xxx-incorporating-applications-and-
Intel 1st Edition Sebastian Peter
innovations-in-intelligent-systems-xxi-proceedings-of-
ai-2013-the-thirty-third-sgai-international-conference-on-innov/

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design
and Applications (ISDA 2018) held in Vellore, India,
December 6-8, 2018, Volume 1 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-
systems-design-and-applications-isda-2018-held-in-vellore-india-
december-6-8-2018-volume-1-ajith-abraham/

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design
and Applications (ISDA 2018) held in Vellore, India,
December 6-8, 2018, Volume 2 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-
systems-design-and-applications-isda-2018-held-in-vellore-india-
Advances in Intelligent Systems and Computing 1304

Madjid Tavana
Nadia Nedjah
Reda Alhajj Editors

Emerging Trends
in Intelligent and
Interactive Systems
and Applications
Proceedings of the 5th International
Conference on Intelligent, Interactive
Systems and Applications (IISA2020)
Advances in Intelligent Systems and Computing

Volume 1304

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by SCOPUS, DBLP, EI Compendex, INSPEC, WTI Frankfurt eG,
zbMATH, Japanese Science and Technology Agency (JST), SCImago.
All books published in the series are submitted for consideration in Web of
Science.

More information about this series at http://www.springer.com/series/11156


Madjid Tavana Nadia Nedjah
• •

Reda Alhajj
Editors

Emerging Trends
in Intelligent and Interactive
Systems and Applications
Proceedings of the 5th International
Conference on Intelligent, Interactive Systems
and Applications (IISA2020)

123
Editors
Madjid Tavana Nadia Nedjah
The Business Systems and Analytics Departamento de Engenharia Eletrônica e
Department Telecomunicações, Faculdade de Engenharia
La Salle University Universidade do Estado do Rio de Janeiro
Philadelphia, PA, USA Rio de Janeiro, Brazil

Reda Alhajj
Department of Computer Science
University of Calgary
Calgary, AB, Canada

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-63783-5 ISBN 978-3-030-63784-2 (eBook)
https://doi.org/10.1007/978-3-030-63784-2
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

IISA 2020, the 5th International Conference on Intelligent, Interactive Systems and
Applications, provides a forum for presenting new results and developments, but—
maybe even more—a forum for vivid discussions among international specialists
from diverse areas and backgrounds. All submissions have been subjected to a
rigorous and tough peer-review process. The program committee has selected over
100 full papers. The proceedings are organized into nine topics on different sys-
tems’ orientations, such as analytical systems, database management systems,
electronics systems, energy systems, intelligent systems, network systems, opti-
mization systems, and pattern recognition systems and applications. It is note-
worthy to point out that several special issues will be published based on extended
versions of some of the best accepted and presented papers.
Research works on analytics systems investigate utility predominant to systems
in daily routines. They apply to many real-world applications, such as health care
systems and business-oriented systems. Analytic systems come at the intersections
of many computer science fields, such as information infrastructures, data analytics,
decision support systems, text analytics, and persuasive technologies. These sys-
tems are based mainly on analytic databases, which are at the heart of business
intelligence and big data analytics, and usually function as part of more extensive
data warehouses. They are popular because they offer faster query times, simpler
maintenance, and easier scalability due to their less volatile nature. Analytic sys-
tems usually consider metrics such as effectiveness, efficiency, usability, portability,
interpretability to determine the system’s impact. Nowadays, these systems collect
measurements from daily practices instead of only computational experiments. This
requires a significant software engineering effort before determining the analytic
system’s utility. Strategic research in the development of analytic systems consists
of improving transparency in the decision-making process. This proceedings reports
29 research works related to analytic systems.
Database management systems are essential to the development of efficient
information systems. Data management is the process of preparing, storing, orga-
nizing, and maintaining the data collected by an organization. Effective data
management is fundamental to run business applications and provide analytical

v
vi Preface

information that assets in guiding executive decision-making and strategic planning


business managers. Databases are the most common platform used to store cor-
porate data. They contain a collection of data that is structured so that it can be
managed, updated, and maintained effectively, yet efficiently. They are used in
transaction processing systems that create operational data, such as customer
records and sales orders, and data warehouses, which store consolidated data sets
from business systems for data analytics. Three research papers related to analytic
systems are included in this proceedings.
Electronics systems can be defined as a set of physical components that are
connected in a way that implements the prescribed functionality. In general, the
system relies on some input devices such as sensors to obtain information about the
situation, processes the collected data via electronic gates, to yield results in the
form of signals to be used to trigger some output actuators, such motors, to achieve
the intended function. Electronic control systems are also viewed as a process that
transforms one signal into another in order to give the desired system response.
Electronic systems may be analog using continuous signals in time or digital
handling only discrete signals in time. Of course, it is possible to have a hybrid
electronic system based on both continuous and digital signals and components.
Many real-world devices rely on an electronic control system. Related to electronic
systems, the reader may enjoy eleven papers reported in this proceedings.
Efficient solutions to energy-related problems form a significant challenge for
humanity in this century worldwide. Energy systems usually encompass power
systems and their optimization, power generation, power trading, electricity risk
management, among many other related aspects. Modeling is the best tool for
designing effective yet efficient energy systems, including issues such as process
optimization, synthesis, design, and operation. Nowadays, most of the research
efforts regarding energy systems focus on new and clean energy, such as photo-
voltaic and wind systems. Such power systems are engineered to supply
usable solar power by means of photovoltaics. They are composed of several such
components, including solar panels to absorb and convert sunlight into electricity,
a solar inverter to convert the output from direct to alternating current, as well
as mounting, cabling, and other electrical accessories to set up an overall system.
There are also research initiatives regarding electric car designs. This proceedings
includes seven research papers related to efficient energy solutions.
Engineering concentrates mainly on finding and developing a new efficient
solution to real-world problems. Engineering intelligent systems are one way to find
these solutions. It is based on computing and artificial intelligence. In most solu-
tions, an intelligent system senses and reacts to their environments. This type of
system usually includes a processing unit, such a general-purpose processor and/or
a dedicated one, to infer from the sensed data the right actions that should be
applied to the environment in order to achieve what the system is supposed to do.
Most intelligent systems are powered by a computational intelligence technique to
solve the hard problem at hand. There are many such techniques, such as artificial
neural networks, fuzzy logic, evolutionary computation, swarm intelligence, among
others. This proceedings reports 19 research papers on intelligent systems.
Preface vii

Network systems are all about automating the transfer of information from one
computer to another or from one part of the system to another. A fundamental shift
in technology and concepts made networking systems possible. They explore a
wide range of technology, specifically regarding software and hardware supporting
different kinds of network topology configurations, such as LANs, WANs, and Wi-
Fi networks. It is also noteworthy to point out the wireless sensor networks that
allow developing solutions for many engineering problems that are distributed by
their nature. Networked systems can also be regarded as high-performance com-
puting systems, wherein many cores and multicores complex architectures form the
foundation of the proposed solutions. This proceedings reports 16 research papers
on network systems.
Optimization is a well-established discipline. Many of the real-world engineer-
ing problems can be rendered as optimization problems of a cost function that
models all the behavior of the problem variables. In this case, one or several optimal
or pseudo-optimal solutions of the defined cost function are sought. The problems
considered are usually hard problems and cannot be solved using well-known
analytical techniques. Thus, researchers usually exploit iterative exploratory pro-
cesses to reach a good feasible solution to the problem at hand. Evolutionary and
swarm-based computationally intelligent methods are used for each goal. Also,
there is a lot of research work oriented toward finding good strategies to form the
core of the techniques that help in the optimization process. This proceedings
includes seven research works related to optimization systems.
Pattern recognition is the process of identifying patterns mostly by using
machine learning. Pattern recognition can be defined as the classification of data
based on prior knowledge about patterns that have their classes known. It is based
on recognizing some regularities in the presented data and attempting to configure a
model to recognize new patterns that have not been seen by the model. Pattern
recognition is a technique at the heart of many smart systems. Pattern recognition
systems are usually trained from known training data aiming at a general model that
is able to recognize unknown data. Machine learning is a fundamental tool for
pattern recognition. Computational vision is one of the fields that profits a large
spectrum from pattern recognition to advance the state-of-the-art regarding smart
system engineering. This proceedings reports four research papers on pattern
recognition systems.
All the aforementioned research topics are applied to engineers leading to better
and more efficient systems to advance the state-of-the-art toward a smarter human
life. Thus, this proceedings also bring forth many reports on successful applications,
ranging from abstract ones to more practical systems. This proceedings includes 24
applied research papers.
Besides the presentations of all the included diverse research works, the con-
ference program also features some interesting cutting-edges keynote presentations.
The plenary talks will focus on crucial topics that have recently attracted much
attention and will be presented by outstanding experts from the area. We believe all
participants will enjoy and benefit from the rich program.
viii Preface

It is a privilege and honor for us to participate in this edition of IISA 2020, and
we hope we will be with you once again next year for IISA 2021. It has also been a
rewarding experience, and we express our sincere thanks to all program committee
members for their cooperation in shaping the conference and running the refereeing
process. We highly appreciate the hard work and timely feedback from the
reviewers who did an excellent job. Last but not least, we would like to thank all the
authors, organizers, and participants for supporting IISA 2020. Thank you for your
time and effort in preparing and submitting your papers and your patience through
the long process. Your work is the backbone of the conference.
We wish you all a pleasant and fruitful meeting, and we look forward to your
submission to and participation in IISA 2021.

Madjid Tavana
Nadia Nedjah
Reda Alhajj
Contents

Analytical Systems
Consumer’s Optimal Decision and the Role of Insurance
in the Risk State—An Analytical Perspective Based on the Expected
Utility Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Wenting Cao
Correlation Analysis of Children’s Stroller Information . . . . . . . . . . . . 11
Liu Xia, Chen Qianwen, Qiao Feng, and Pei Fei
Game on the Tacit Collusion of the Telecom Market Under
the Full-Business Operating Environment . . . . . . . . . . . . . . . . . . . . . . . 20
Qiming Tang, Yongyao Chen, and Meijuan Li
Discussion on the Training Mode of Data Capability for Economics
and Management Majors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Guihua Han, Mintyu Lin, and Cuilin Li
Research on Service Quality Evaluation System of Automobile
Maintenance Enterprises Based on AHP . . . . . . . . . . . . . . . . . . . . . . . . 33
Xiao Juan Yang, Shu Quan Xv, Fu Jia Liu, and Guo Fang Wu
A Method of Determining Membership Function in Fuzzy
Comprehensive Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Guoliang Dong, Chaozhou Chen, and Guofang Wu
Analysis of Computer Software Technology under Big
Data Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Lei Guiping
Research on ShadowsocksR Traffic Identification Based
on Xgboost Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Ji Qingbing, Deng Xiaoyan, Ni Lulin, and Lei Haijun

ix
x Contents

Research on the Relevance and VaR of GEM Market Based


on Vine Copula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Zhang Xin and Zou Yumei
Analysis of Internet Public Opinion on “Delayed Retirement
Age”–Based on Latent Dirichlet Allocation . . . . . . . . . . . . . . . . . . . . . . 70
Luo Yuting and Zhao Mingqing
Research on Service Evaluation of Automobile Inspection and Testing
Based on AHP - Fuzzy Comprehensive Evaluation Method . . . . . . . . . . 77
Chen Chaozhou, Xu Shuquan, and Liu Fujia
Analysis of Acoustic Features of Mongolian Long Tone . . . . . . . . . . . . . 86
Shuzhen Ma, Gegen Tana, and Axu Hu
Research on the Application of Fine Execution of Big Data
Empowering Court . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Jiejing Yao and Peng Hui
A Dynamic Correlation Method of Fragmented Web Resources . . . . . . 101
Haibo Hou, Qiurong Zhu, Yu Zhang, and Jiangbing Yang
A Robust Predictive Current Control for SPMSM Based
on Internal Model Disturbance Observer . . . . . . . . . . . . . . . . . . . . . . . . 111
Xiaoning Mu, Fanquan Zeng, Yang Zhou, Yebing Cui, and Yao Yao
Mathematical Model of Ship Collision Avoidance in Narrow Channel
Overtaking Situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Keyin Miao, Renqiang Wang, Jianming Sun, and Hua Deng
Prediction and Analysis of Air Ticket Based on ARIMA Model . . . . . . 128
Qingyun Chi, Menglin Liu, and Bin Yang
A General Model for Publicly Verifiable Secret Sharing . . . . . . . . . . . . 136
Wei Zhao and Feng Li
Popularity Prediction of Food Safety Internet Public Opinion Using
LSTM and Attention Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Bo Song, Xiaofen Gu, Junliang He, Wei Yan, and Tianjiao Zhang
A Monitoring Method of Power Wireless Private Network Based
on Distributed Big Data Stream Processing . . . . . . . . . . . . . . . . . . . . . . 153
Weijun Zheng, Junyu Liu, Zhe Liu, Jinghui Fang, Weiwu Qi,
and Quan Xiao
Research on Online Reputation of Goods Based
on Emotional Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Xiaotong Yan, Zhijie Zhao, Xiaowei Han, Zhipeng Fan, and Jialin Zhang
Contents xi

Feature Selection Method Based on Chi-Square Test


and Minimum Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Yuxian Wang and Changyin Zhou
An Approach to Stock Price Prediction Based on News
Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Xiao Huang
A Stock Prediction Method Based on LSTM . . . . . . . . . . . . . . . . . . . . . 186
Sijie Zhou
Research on DTC Fuzzy PID Control of Permanent Magnet
Synchronous Motor Based on SVPWM . . . . . . . . . . . . . . . . . . . . . . . . . 194
Menglin Ma and Mengda Li
The Research on Stock Price Prediction Based on Machine
Learning Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Shulue Xu
Research on Evaluation Model and Method of Comprehensive
Benefits for Multi-station Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Chen Jing, Zhang Yuyuan, Jin Qiang, Cui Kai, Yuan Fusheng,
and Zou Ying
Research on the Teaching Mode of Software Engineering in Colleges
and Universities Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . 223
Huanqin Wu and Rucheng Ma
Application of Information Technology in New Energy Vehicles . . . . . . 229
Qing-an Li

Application
Study on the Attention Degree of Consumer Endowments
to Children’s Clothing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Xia Liu, Shihong Duan, Yanhong Hu, Fei Pei, Bisong Liu, Qianwen Chen,
and Feng Qiao
Application-Oriented Talent Cultivation to Meet the Needs
of Cross-Border E-Commerce Positions—Take the Customer
Service Position as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Yi Jing
Research and Design of Stream Computing Framework Based
on Storm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Huanbin Wang and Yangjun Gao
xii Contents

Research on the Comprehensive Performance Evaluation of Large-


Scale Event_Cases of China Chengdu International Intangible
Cultural Heritage Festival . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Xing Zeng
Review on the Application of Machine Vision Algorithms in Fruit
Grading Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Lin Kaiyan, Liu Chang, Si Huiping, Wu Junhui, and Chen Jie
Empirical Investigation on the Construction of E-Government
Performance Evaluation Model Based on BSC . . . . . . . . . . . . . . . . . . . 281
Fang Du, Yongming Cao, and Fei Du
Analysis the Promotion of Computer to the Development
of Garment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Zhong Nana
Design of Positioning Orientation Movement APP Based on BDS . . . . . 296
Xi Zhang, Wenquan Zhang, Ying Li, Pengfei Liu, and Guangyue Li
A Comparative Study of Yes/No Question Intonation in Chinese
and English Speakers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Qing Guo, Hongyan Wang, and Jeroen van de Weijer
Design of Virtual Training and Maintenance System for
Communication Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Deyi Sang, Xuepeng Jiang, Fuqiang Zong, and Xiao Zhang
The Status and Strategy of Rebuilding the Library Space Under
the “Internet+” Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Dong Na
Research of Blockchain-Based “Edge-Cloud” Collaborative Model,
System Architecture and Overall Layout for Railway Application . . . . . 321
Ma Jianjun, Wang Wanqi, Shen Haiyan, and Duan Jiaying
Study on the Special Vocalization Characteristics of Mongolian
Long Tone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Menghuan Wang, Shuzhen Ma, and Axu Hu
Experimental Study on Citation Tone of Dingxi Dialect
in Gansu Province . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Menghuan Wang, Shuzhen Ma, and Axu Hu
The Study on the Role of Phonetic and Shape Information
on Mongolian Students’ Recognition of a Chinese Word . . . . . . . . . . . . 346
Axu Hu, Menghuan Wang, and Gegen Tana
Contents xiii

Value Added and Socialized Science Information Service


Based on Sci-Tech Novelty Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Meilong Ju, Qing Zhang, Sumin Sun, Jian Xue, Lina Lou,
and Chengguo Xin
A Secure ECC-Based Authentication Scheme to Resist Replay
Attacks for the IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Yuxiang Feng and Wei Liu
Application Integration Using Context Model Based on CIM . . . . . . . . 371
Wang Liyan, Chen Lei, Du Jian, and Lin Haili
Analysis of Laser-Induced Saturated Interferences on a Thermal
Imager at Different Incident Angles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Li Shengpeng and Xia Min
Demand Analysis and Application Prospect of 3D Video Fusion
Technology in Waterway Traffic Management . . . . . . . . . . . . . . . . . . . . 384
Zhaohui Wu, Haihua Wang, Changxing Ren, Jing Deng, and Xiaobo Wu
Development Strategies of Tianjin’s Cultural and Creative Industry
(CCI) Based on the Beijing-Tianjin-Hebei Coordinated
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Nan Zhang and Xugao Qi
Application Research of Interaction Design in Human-Machine
Interface of Automobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Caizhong Zhang
Architecture Design and Application Prospect of Predictive
Maintenance Based on Multi-station Integration Edge Computing
in Power Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Fusheng Yuan, Qiang Li, Xian Sun, Zhuo Huang, Jing Chen,
and Ying Zou
Application Research of a New Practical Transmission Device . . . . . . . 426
Weiwen Ye

Database Management Systems


Research on Information Management of Gas Engineering Project
in Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Jing Wan
A New Accountable Data Sharing Scheme . . . . . . . . . . . . . . . . . . . . . . . 442
Jia Fan, Yunfei Cao, and Yili Luo
The Automated Operation and Maintenance Solution for Cloud
Data Centers Based on Multi-station Integration . . . . . . . . . . . . . . . . . . 450
Qiang Li, Fusheng Yuan, Jing Chen, Shengxi Shi, and Shilong Xu
xiv Contents

Electronics Systems
Research on Component Level Test System of TCAS Circuit Board
Fault Diagnosis System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Xiaomin Xie, Kun Hu, Ying Hong, and Jianghuai Du
Development of a HoloLens Mixed Reality Training System
for Drop-Out Fuse Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Chibing Gong, Deyun Ye, and Ruiling Xie
Comparative Study of Theoretical Analysis and Physical Analysis
of Single Tube Amplifier Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Hanhong Tan, Zhoulin Chang, and Yanfei Teng
Design of the Bus Support Capacitor in Servo Drive Controller
Based on PMSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Yao Yao, Dawei Gu, Yebing Cui, Shuwei Song, and Fanquan Zeng
Effect of Distributed Generation Grid-Connection on Line Loss
in Low-Voltage Courts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Weiru Wang, Xincong Shi, Jie Hao, Mengzan Li, Xinyuan Liu,
Yifan Zhang, and Jun Pi
Design and Realization of a GNSS Receiver Test Equipment . . . . . . . . . 499
Wenquan Zhang, Ying Li, Zhe Li, and Yuhai Li
Resonance Suppression of Position Servo System Based on Improved
Notch Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Shuheng Chen, Wei Feng, Fanquan Zeng, Yaoyao Wang,
and Jiangxianfeng Tian
Design and Implementation of Digital DC Servo System Hardware . . . . 513
Rui Zhang, Zhixin Cheng, Baomei Xu, and Xuebing Liao
A Small-Scale Current Sensor Scheme of Single-Loop Double-
Winding Fluxgate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Xin Zhang, Aiming Zhao, Yawei Shi, Ronghui Hu, and Shuaishuai Zhao
ADRC-Based Wind Turbine Pitch Control Strategy . . . . . . . . . . . . . . . 529
Jiabao He and Jianguo Li
Research on Terminal Overvoltage Protection of Direct Drive
Permanent Magnet Wind Turbine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
Linzhao Hao, Xia Liu, Chuan Jiang, Qinghua Zheng, and Wen Jing Li

Energy Systems
Analysis of Vehicle Energy Storage Brake Energy Recovery System . . . 547
Zhiqiang Xu
Contents xv

Discussion on Human Body Energy Collection


and Power Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
Libo Yang
DIY Parallel Corpora for Petroleum Production Engineering
and Its Academic Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Pengpeng Gao
Two-Speed Pure Electric Vehicle AMT Transmission . . . . . . . . . . . . . . 563
Liu Wenguang, Bi Shanshan, and Su Zhaorui
Study on Urban Energy Internet and Its Influence Factor
Analysis Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Yifan Zhang, Jie Hao, Weiru Wang, Yunfeng Zhao, and Danyang Chen
Discussion on Safety Performance of Pressure Resistant Fuel Tank . . . . 584
He Yongao and Yin Wei
Analysis on Vibration Characteristics of Spring Passive Valve
High-Pressure Long-Distance Slime Paste Pipeline Transportation . . . . 596
Lyu Fuyan, Xiaohui Hou, Li Sun, Li Chunzhi, and Jia Xuankai

Intelligent Systems
Research on Intelligent Fault Diagnosis of Board Circuit Based
on Expert Case Reasoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Xiaomin Xie, Kun Hu, Ying Hong, Boli Yu, and Jianghuai Du
Analysis of Key Technical Problems in Internet of Vehicles
and Autopilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Yongqiu Liu
Research and Development Housing Rental System with
Recommendation System Based on SpringBoot . . . . . . . . . . . . . . . . . . . 619
Yaozhang Li, Sheng Gao, Weisheng Wu, Peifeng Xie, and Hao Xia
Design of Intelligent Recommendation System of Smart Library
Under Big Data Environment and Its Application Research
in Applied University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Weining Huang
A top-N Recommendation Approach Based on Reliable Users . . . . . . . . 635
Dongyan Jia, Shengnan Gao, Jiayin Feng, Jinling Song, and Gang Wang
A Safety Distance Automatic Control Algorithm for Intelligent
Driver Assistance System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Guiru Liu and Lulin Wang
Emotional Cues Recognition in Natural Speech
by Chinese Speakers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Yifei Wang
xvi Contents

Research on Fault Diagnosis Expert System of On-board Radio


of a Certain Armored Vehicle Based on CLIPS . . . . . . . . . . . . . . . . . . . 660
Changhong Gong, Xiao Ming, and Lingxiang Xia
Research on Course Recommendation System Based
on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Fuqiang Zong, Deyi San, and Weicheng Cui
Design of ZigBee-Based Control System of Urban Intelligent
Street Light . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Fan Gao and Hua Jin
Intelligent University Identity Identification System Based
on FaceNet and FSRNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Zewen Zheng, Yinghuai Yu, and Chengkun Song
A Novel Group Key Management Protocol Based on Secure Key
Calculation Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Lijun Zhang and Cheng Tan
Personalized Custom Clothing for Intelligent Interaction Design . . . . . . 698
Yanxue Wang and Zhengdong Liu
Application of Automatic Text-Classification Algorithm Based
on Feature Extraction for Intelligent System of Transportation
Knowledge Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Li Zhang, Han Zhang, Peihong Yang, and Zhaoqiang Cai
Research on Intelligent Decision Support System Framework
for Deep-Sea Emergency Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Kun Lang and Mingming Zhang
An Intelligent TEV Sensor for Partial Discharge Detection of Cable
Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Chen Shen, Xiaochun Bai, Yan Jing, Jiangang Ma, Ming Ren,
Tianxin Zhuang, and Changjie Xia
The Remote Voice Detector Design by a Laser Monitor . . . . . . . . . . . . 733
Tongliang Fan and Yandong Sun
GDA-Based Tutor Module of an Intelligent Tutoring System
for the Personalization of Pedagogic Strategies . . . . . . . . . . . . . . . . . . . 742
Adán Gómez, Laura Márquez, Heider Zapa, and María Florez
Automatic Lane Recognition for Surveillance at Road Intersections . . . 751
Fanlei Min, Guan Wang, Liantao Wang, and Jing Liu
Contents xvii

Network Systems
A Multi-factor Reputation Evaluation Model of Vehicular Network . . . 763
Huang Yue, Qin Guihe, Liu Tong, Huang Wei, and Meng Chengxun
Design of Network Information System Equipment Health
Management Software based on Combat Readiness . . . . . . . . . . . . . . . . 771
Yuwen Liu, Hongtu Cai, Pengfei Ma, Yonghui Xu, and Yaoze Han
A Network Attack Recognition Method Based on Probability
Target Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
Ying Liu and Yuefeng Zheng
A Systematic Review Study on Research Challenges, Opportunities,
Threats and Limitations in Underwater Wireless Sensor
Networks (UWSNs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Syed Agha Hassnain Mohsan, Sardar Shan Ali Naqvi, Farhad Banoori,
Muhammad Irbaz Siddique, Muhammad Muntazir Mehdi,
Frederick Nii Ofie Bruce, and Alireza Mazinani
Synchronization Behavior of a Class of Oscillator Networks
with Weighting Exponent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Junqing Feng, Guohong Liang, and Lixin Yang
Impact of Circular Field in Underwater Wireless Sensor Networks . . . . 803
Syed Agha Hassnain Mohsan, Muhammad Hammad Akhtar,
Md. Israq Aziz, Md. Mehedi Hasan, Maryam Pervez, Asad Islam,
and Farhad Banoori
Investigation and Design of Multi-wavelength LED Based Optical
Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Syed Agha Hassnain Mohsan, Mirha Malik, Shanzay Khan, Asad Islam,
Hammad Akhtar, Laraba Selsabil Rokia, and Muzammil Zubair
Research on High-Speed Data Acquisition System Based on PCIE . . . . 826
Xinxin Sun, Jun Yang, Juan Li, Fenxian Tian, and Shengkai Wang
Impact of Transmission Power Control Mechanism in Underwater
Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Syed Agha Hassnain Mohsan, Asad Islam, Syed Basharat Hussain,
Alireza Mazinani, E. L. Hacen Alioune, Md. Israq Aziz, and Naqeeb Ullah
Design and Implementation of Deep-Sea Emergency
Response System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Wei Cong
Research on Component Classification Strategy Based
on Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Mei Guo, Min Xiao, and Wenfen Zhang
xviii Contents

Research on Multi-label Clothing Image Classification Based


on Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Ying Hong
Partition-Based Energy Efficient Routing Protocol for Wireless
Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Jia Yanfei, Xing Liyun, Guo Shuaichao, and Zhao Liquan
Design of Remote Control Signal Hijacking Device Based
on Microcomputer System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Tongliang Fan and Yandong Sun
Design and Implementation of Simple Radio Signal Transmitter . . . . . . 885
Yandong Sun and Tongliang Fan
Multi-station Integration-Based Coordinated Control for Voltage
Support in Active Distribution Network . . . . . . . . . . . . . . . . . . . . . . . . . 893
Ma Weijing, Jin Qiang, Li Qiang, Chen Jing, Yuan Fusheng, Xu Jian,
and Chen Yufeng

Optimization Systems
Scheme to Optimize and Improve the Stepped Structured Sleeve
Hydraulic Cylinder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Taiping Xie and Zhiqiang Zhao
Optimization Algorithm of Pigeon Flight Path Location Based
on Least Square . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
Cong Wen, Zhenping Lan, Yijie Zhang, Ping Li, and Yuru Wang
Multi-Colony Ant Algorithm Applied to the Yangtze Gorges Ship
Lock Arrangement Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
Ruijie Liu, Qiang Lin, Lijuan Wang, Lin Li, and Can Wang
Infrared and Visible Image Fusion Based on Multi-scale
Decomposition and Gradient Optimization . . . . . . . . . . . . . . . . . . . . . . . 932
Siyan Zhang, Guangming Zhou, and Di Chen
Novel Bayesian Network Incremental Learning Method Based
on Particle Swarm Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . 941
Yunnan Ling, Neng Yang, Haitao Yu, and Yungang Zhu
Feed Formulation Cost Optimization Based on the Improved
Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
Yao Juan, Xu Wang, Zhang Cheng, and Tian Fang
Vehicle Disposition and Routing Optimization of Reverse Logistics
Based on Improved Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 957
Shengping Zhao, Jingrui Li, and Jing Wang
Contents xix

Pattern Recognition Systems


Two-Stage Fusion of Local Binary Pattern and Discrete Cosine
Transform for Infrared and Visible Face Recognition . . . . . . . . . . . . . . 967
Zhihua Xie, Ling Shi, and Yi Li
Illustration and Identification of Skin Lesions in Dermoscopic
Dataset Using Pattern Recognition Techniques . . . . . . . . . . . . . . . . . . . 976
Syeda Tooba Haider, Syed Basharat Hussain, Amreen Batool,
Laraba Selsabil Rokia, Syed Agha Hassnain Mohsan,
Muhammad Abubakar Sadiq, and Mazahir Saleem
Cartoon Zero-Watermark Method Based on Edge Contourlet
Feature and Visual Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Dongxing Li, De Li, and Hua Jin
Removing Cloud from Remote Sensing Digital Images Based
on Anisotropic Kernel Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
Guohong Liang and Junqing Feng

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997


Analytical Systems
Consumer’s Optimal Decision and the Role
of Insurance in the Risk State—An Analytical
Perspective Based on the Expected Utility
Function

Wenting Cao1,2(&)
1
School of Economics and Management, Yunnan Normal University,
Kunming 650500, China
[email protected]
2
School of Economics, Sichuan University, Chengdu 610065, China

Abstract. This paper starting from the hypothesis of “rational economic man”,
establishes a simple insurance decision model and combines the expected utility
function to analyze the function and social value of insurance. The conclusion is
as follows: Since the utility of definite income is greater than the utility of
expected income under uncertain conditions, the purchase of insurance can
enhance the welfare of the individual. Risk averse consumer purchases insur-
ance is a rational economic behavior, there is a promotion in utility for indi-
viduals, and an improvement in welfare for society. Insurance companies should
fully diversify risks and reduce the moral hazard of insurance contracts, so as to
promote the effective operation of the insurance market.

Keywords: Expected utility function  Risk averse  Insurers’ behavior 


Policyholders’ behavior  Insurance decision

1 Introduction

Insurance is a financial system arrangement based on economic security. Currently, the


insurance industry manages risk by using engineering models and actuarial experience
(Weimin Dong [1]). The purpose of insurance is to diversify and reduce risk. (Kun-
reuther H [2]). Insurance is sometimes compared to gambling, but from an economic
point of view, the two functions are completely opposite. Gambling creates new risks,
and insurance eliminates or greatly reduces existing risks. Just as architects can play an
important role in helping society become more resilient (Roaf, S., Crichton, D. &
Nicol, F [3]), so do insurance companies (Crichton, D [4]). The insurance industry has
an increasingly important role in helping society to adapt and become more resilient
(Crichton, D [5]). Currently, some ways in which insurers can help are: Assistance with
identifying areas at risk; Catastrophe modelling; Economic incentives to discourage
construction in the flood plain etc. (Crichton D [6]). From an individual’s point of
view, consumers replace large uncertain losses with small costs (insurance fees), and
such losses will exist without insurance. In general, Insurance has the macro social
utility and the micro utility of economic compensation. Based on the assumption of a

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021


M. Tavana et al. (Eds.): IISA 2020, AISC 1304, pp. 3–10, 2021.
https://doi.org/10.1007/978-3-030-63784-2_1
4 W. Cao

rational economic person, this paper establishes a simple insurance decision-making


model, combines the expected utility function to analyze the function and social value
of insurance, and obtains relevant inspirations on how to promote the efficient opera-
tion of the insurance market.

2 Overview of Expected Utility Functions


2.1 Expression of Expected Utility Function
The economy consists of a group of economic participants (individual, family, enter-
prise, government, etc.). A participant’s economic needs are described by his prefer-
ence for different consumption plans (The consumption plan refers to the possible
consumption choices of consumers. It depends on the future state of the economy and
thus contains different realization values), which is the participant’s ranking of all
possible consumption plans. Another way of expressing preferences is the utility
function. The utility function U depends on the probability of future states and the
preference for consumption in different states. The expected utility function is the
expected value of utility of different consumption paths (Consumption path refers to a
specific realization value of a consumption plan, such as (c0 , c1w ) called a consumption
path), that is, the utility of uncertain consumption plans. Since each consumption path
corresponds to a possible state, and each state is mutually exclusive, the occurrence of
one state means that the other states have not occurred. Therefore, the expected utility
function has a very intuitive explanation: the utility obtained by consumption in an
uncertain state is the weighted average of the utility obtained by the consumption path
in each possible state, and the weight is the probability of the occurrence of the
corresponding state. The expected utility function can be simply expressed as:
E ½U ðW Þ ¼ U ðp; W1 ; W2 Þ ¼ pU ðW1 Þ þ ð1  pÞU ðW2 Þ. If the uncertain event has n
uncertain results: W1 ; W2 ; . . .Wn , And there are n corresponding probabilities:
p1 ; p2 ; . . .pn , The expected utility function can be written as: E ½U ðW Þ ¼
P
n
U ðp1 ; p2 ; . . .pn ; W1 ; W2 ; . . .Wn Þ ¼ pi  U ðWi Þ.
i¼1

2.2 Expected Utility Functions for Different Risk Preferences


In reality, people have different attitudes towards risk. Some people are very cautious in
their work and will take some risk management measures (such as purchasing insur-
ance) for future uncertain events. Some people have a strong tolerance for risk and are
willing to participate in various forms of gambling. Still others have an indifferent
attitude towards risk, neither have a preference nor aversion.
(1) The expected utility function of a risk averse buyer. If a person is a risk consumer
in an uncertain event, the utility of his expected value is greater than his expected
utility, that is: U ½pW1 þ ð1  pÞW2  [ pU ðW1 Þ þ ð1  pÞU  ðW2 Þ. The expected
utility function at this time is strictly concave, that is, d U dW 2 \0, The con-
2

sumer is a risk averse person.


Consumer’s Optimal Decision and the Role of Insurance in the Risk State 5

(2) The expected utility function of a risk preference person, if a person is a risk
preference consumer in an uncertain event, the utility of his expected value is less
than his expected utility, that is: U ½pW1 þ ð1  pÞW2 \pU ðW1 Þ þ ð1  pÞ
U ðW2 Þ. The expected utility function at this time is strictly convex. that is
d 2 U dW 2 [ 0, The consumer is a risk preference person.
(3) The expected utility function of a risk neutral person. For a risk neutral consumer,
the utility of his expected value is equal to his expected utility, that is:
U ½pW1 þ ð1  pÞW2  ¼ pU ðW1 Þ þ ð1 pÞU ðW2 Þ. The utility function at this
time is a linear function, that is d 2 U dW 2 ¼ 0.

3 Analysis of Insurance Decision Based on Expected Utility


Function

In economics, risk averse buyer is considered a typical feature of human beings.


A normative model of choice, such as expected utility theory, implies that risk averse
consumers should value insurance, as it protects them against large losses relative to
their wealth (Kunreuther H [2]). Does buying insurance improve the level of welfare
for individuals? First, establish a simple insurance decision model, analyze how the
premium rate and insurance amount are determined from the perspective of the
insurance company (insurer) and consumer (policyholder), and then place it in the
expected utility function of risk averse buyer, comparing the utility brought by different
decision results.

3.1 Simple Insurance Decision Model


First, define the meaning of each variable in the simple insurance decision model.
Suppose someone has a family wealth of W. If there is a risk (such as fire, theft, car
accident, etc.), his wealth will suffer losses. Assume that the loss of wealth due to a risk
is L, and the probability of such loss (risk) occurring is p. If the consumer has not
purchased insurance in advance, his expected utility is E ðU Þ ¼ ð1  pÞ  U ðW Þ þ
p  U ðW  LÞ. If the consumer has purchased insurance in advance (the insurance
amount is K, the premium rate is c, and the premium paid is cK), the consumer will get
two results: No risk encountered (no loss occurred), his property is W1 ¼ W  cK;
Risk occurred (loss suffered) and his property is W2 ¼ W  L þ K  cK.
(1) Insurer Decision: How to Determine Premium Rates c
As a rational economic entity, insurance company still follows the principle of profit
maximization when making decisions. The profit of insurance company mainly comes
from premium income, and the pricing of insurance products is a key issue in the
decision-making process of insurance company. No matter whether the policyholder is
out of insurance or not, the insurance company can always get the premium income of
cK. Suppose there are a large number of consumers insured in the society, and the risks
faced by each consumer are independent of each other. The insurance company’s
expected profit from each consumer is p  ðcK  K Þ þ ð1  pÞ  cK ¼ cK  pK. If
6 W. Cao

there are n consumers insured, the profit of the insurance company is n  ðcK  pK Þ.
Since there are many insurance companies in the insurance market, assuming that there
is no threshold to restrict the entry and exit of the insurance industry, the insurance
market can be approximated as a perfect competition market. Competition transfers
capital from the department with low profit to the department with high profit. Finally,
the economic profit of each enterprise in the perfect competition market is zero. The
profit of the insurance company is zero, that is n  ðcK  pK Þ ¼ 0, And then introduce
c ¼ p, That is, the insurance premium rate is equal to the probability that the insured
person will suffer a total loss. This means that insurance company provides customers
with a completely “fair” insurance premium rate under intense competitive pressure. In
fact, this hypothesis has also been verified in reality. Many insurance companies with
strong strengths, wide business and cross-regional spread their risks sufficiently, and
the insurance premium rates they provide are very close to “fair” rates.
(2) Policyholder Decision: How to Determine the Amount of Insurance K
As a rational economic person, the policyholder still follows the principle of profit
maximization when making decisions. The policyholder’s expected utility function is
E ðU Þ ¼ ð1  pÞ  U ðW  cK Þ þ p  U ðW  L þ K  cK Þ. In order to maximize the
expected utility of the policyholder, let @E ðU Þ=@K ¼ 0. get cð1  pÞU 0 ðW  cK Þ þ
ð1  cÞpU 0 ðW  L þ K  cK Þ ¼ 0. Since insurance company uses “fair” insurance
premium rate (c ¼ p), get U 0 ðW  cK Þ ¼ U 0 ðW  L þ K  cK Þ. As a risk averse
person, his expected utility function is concave, the second derivative is negative, and
the expected utility function is monotone with diminishing marginal utility. Since it is a
monotonic form of function, equal marginal utility means that the amount of property
on both sides of the equation is also equal, that is W  cK ¼ W  L þ K  cK, Thus
introduce K ¼ L. This means that when insurance company is pricing at “fair”
insurance premium rate, risk averse buyer fully insures the property that may suffer
losses (insurance amount = loss amount).

3.2 Insurance Decision Analysis Based on Expected Utility Function


A large number of statistics show that most people are risk averse consumers in most
cases. Suppose a consumer is a risk averse buyer, and his expected utility function is
shown in Fig. 1. Suppose the consumer has two different income W1 and W2 , his
expected value is EðW Þ ¼ pW1 þ ð1  pÞW2 , and the corresponding utility value is
U ½E ðW Þ ¼ C, this is a level of utility at a risk-free income. At the same time, the
expected utility corresponding to the two incomes W1 and W2 is U ðW Þ ¼ pU ðW1 Þ þ
ð1  pÞU ðW2 Þ, this is a level of utility at risk, and the expected utility is some linear
combination of U ðW1 Þ and U ðW2 Þ. The value of the linear combination (the value of
the expected utility) must be located at a point on the line AB (such as the T point). No
matter where it is located, the corresponding utility value (S point) is lower than
U ½E ðW Þ (the utility value corresponding to the C point). Figure 1 clearly shows that
line AB is located below the utility function. The expected utility of W1 and W2 is
U ðW Þ ¼ pU ðW1 Þ þ ð1  pÞU ðW2 Þ, which always corresponds to a certain income CE.
Simultaneously the income of E ðW Þ ¼ pW1 þ ð1  pÞW2 can also be regarded as a
Consumer’s Optimal Decision and the Role of Insurance in the Risk State 7

certain value. The risk premium is regarded as the difference between EðW Þ and CE
(P ¼ EðW Þ  CE), which can be seen as the price paid by consumer for risk.

Fig. 1. Risk premium for risk averse buyer

For a consumer, if he does not encounter any risk after the insurance application,
the premium already paid is cK and his property is W  cK. If he encounters risks after
he insures, his property is W  L þ K  cK ¼ W  cK (because K ¼ L). Therefore,
regardless of whether or not the consumer encounters risks after insurance, his property
is W  cK. If the consumer refuses to buy insurance, the loss due to risk is L, and the
probability of risk occurring is p(p ¼ c). The expected income of the person who is not
willing to buy insurance is W  pL ¼ W  cK. Although the number is the same as the
consumer who bought the insurance, W  cK is the expected value under an uncertain
condition. For a risk averse person, the expected utility function is strictly concave. The
utility corresponding to W  cK under certain conditions is greater than the utility
under uncertain conditions, that is U ðW  cK Þ [ pU ðW  LÞ þ ð1  pÞU ðW Þ. So for
individuals, purchasing insurance can increase their benefits (Fig. 2).

Fig. 2. Comparison of insurance decisions based on expected utility function


Random documents with unrelated
content Scribd suggests to you:
were thrown at him. This roused his ire, and he said,
"Waal, Mister Speaker, I don't know whether we be votin' fer or agin the
sentiments of my brethern here; but you and me, I reckon, are in the
minority."

ART INFLUENCE.

This pretty picture on the


wall,
With billows rolling free,
Is full of white clouds in the
sky
And white sails on the sea.

And so I'll sit upon the rug


With pail and spade in
hand,
And dream that on the silver
shore
I'm digging in the sand.

R
. K. M.

During a speech at a political dinner in a small Western city, not long ago, a
Jingo orator, to the great amusement of his hearers, remarked that "The
British lion, whether he is roaming the deserts of India or climbing the forests
of Canada, will not draw in his horns nor retire into his shell."

A RAINY DAY MEANS NO BALL.

Cameron. "Papa, I'm saving up for a fine day."


Papa. "Why are you doing that?"
Cameron. "So that I can go to a ball match when I have saved up enough."

THEIR ONLY TROUBLE.

"There's only one trouble about blowing bubbles, mamma," said little Conrad,
the other day, "and that is that they always blow out."

An Irish laborer boarded a street-car, and handed to the conductor a rather


dilapidated-looking coin in payment of his fare. The conductor looked at it
critically, and handed it back.
"That's tin," he said.
"Shure, I thought it was foive," answered the Irishman, complacently, as he
put the piece back in his pocket and produced a nickel.

The magazine containing Mrs. Reynolds's first story lay on the sitting-room
table.
Her son, who was at an age to be seriously afflicted with the big head, took
it up, and glanced over it rather contemptuously.
"Mamma," he said, "why don't you write for a first-class magazine? I see that
this thing is entered through the mails as second-class matter."

A QUESTION IN NATURAL HISTORY.

"The cat is a little tiger,


I know very well," said
Willie.
"But how is it that the cat-tail
Is never a tiger-lily?"

NOT GENUINE.

Tommy. "This new spaniel won't go near the water!"


Papa. "I wonder what's the matter with him?"
Tommy. "I guess he isn't waterproof."

"Talking about treacle," said the old salt, as he hoisted himself off the
molasses barrel to make way for the grocer to supply a customer's wants,
"thet reminds me of a little scrimmage we had with a pirate slaver in '42.
"We had the coast-line of Africy a blue streak off to the starboard, and we
were er spankin' along with every blessed stitch of canvas drawin' when we
sighted one er them pirate slavers er bearin' down on us. Capen took a
squint through the glass and whistled. 'We'll give him er run fer it,' said he.
"Waal, that chap kep' after us all day, and we tried to slip his lights during
the night, but 'twarn't no use. He made up his mind to foller, and he did, day
after day. At last we got well down to the cape when er blow came up, and,
great guns! it wuz er blow fer certain. It caught us, and drove us plumb into
the antarctic circle, with that pirate right after us. That made the Captain
mad, and as we had er cargo of molasses on board, he gave the order to
uncover the rear hatch and hoist the barrels on deck.
"Blow me if he didn't broach those barrels thet night, and empty them over
the starn. The nest day there wuz that pirate stuck fast in the centre of the
molasses, where he had sailed. It had froze during the night, and he was
anchored in it just the same as if he wuz nipped in an ice-floe. Then we
squared around and headed for the cape. As we passed him the Captain
shouts out:
"'Ahoy, there! Cold weather fer merlasses, ain't it?' and they shook their fists
and yelled, but we left them, and I guess they're there yet."
FOOTNOTES:
[1] Begun in Harper's Round Table No. 857.
*** END OF THE PROJECT GUTENBERG EBOOK HARPER'S ROUND
TABLE, MAY 12, 1896 ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like