Emerging Trends in Intelligent and Interactive Systems and Applications: Proceedings of the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020) 1st Edition Madjid Tavana instant download
Emerging Trends in Intelligent and Interactive Systems and Applications: Proceedings of the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020) 1st Edition Madjid Tavana instant download
https://textbookfull.com/product/intelligent-systems-and-
applications-proceedings-of-the-2020-intelligent-systems-
conference-intellisys-volume-2-kohei-arai/
https://textbookfull.com/product/intelligent-systems-and-
applications-proceedings-of-the-2020-intelligent-systems-
conference-intellisys-volume-3-kohei-arai/
https://textbookfull.com/product/intelligent-interactive-
multimedia-systems-and-services-2016-1st-edition-giuseppe-de-
pietro/
Madjid Tavana
Nadia Nedjah
Reda Alhajj Editors
Emerging Trends
in Intelligent and
Interactive Systems
and Applications
Proceedings of the 5th International
Conference on Intelligent, Interactive
Systems and Applications (IISA2020)
Advances in Intelligent Systems and Computing
Volume 1304
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by SCOPUS, DBLP, EI Compendex, INSPEC, WTI Frankfurt eG,
zbMATH, Japanese Science and Technology Agency (JST), SCImago.
All books published in the series are submitted for consideration in Web of
Science.
Reda Alhajj
Editors
Emerging Trends
in Intelligent and Interactive
Systems and Applications
Proceedings of the 5th International
Conference on Intelligent, Interactive Systems
and Applications (IISA2020)
123
Editors
Madjid Tavana Nadia Nedjah
The Business Systems and Analytics Departamento de Engenharia Eletrônica e
Department Telecomunicações, Faculdade de Engenharia
La Salle University Universidade do Estado do Rio de Janeiro
Philadelphia, PA, USA Rio de Janeiro, Brazil
Reda Alhajj
Department of Computer Science
University of Calgary
Calgary, AB, Canada
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
IISA 2020, the 5th International Conference on Intelligent, Interactive Systems and
Applications, provides a forum for presenting new results and developments, but—
maybe even more—a forum for vivid discussions among international specialists
from diverse areas and backgrounds. All submissions have been subjected to a
rigorous and tough peer-review process. The program committee has selected over
100 full papers. The proceedings are organized into nine topics on different sys-
tems’ orientations, such as analytical systems, database management systems,
electronics systems, energy systems, intelligent systems, network systems, opti-
mization systems, and pattern recognition systems and applications. It is note-
worthy to point out that several special issues will be published based on extended
versions of some of the best accepted and presented papers.
Research works on analytics systems investigate utility predominant to systems
in daily routines. They apply to many real-world applications, such as health care
systems and business-oriented systems. Analytic systems come at the intersections
of many computer science fields, such as information infrastructures, data analytics,
decision support systems, text analytics, and persuasive technologies. These sys-
tems are based mainly on analytic databases, which are at the heart of business
intelligence and big data analytics, and usually function as part of more extensive
data warehouses. They are popular because they offer faster query times, simpler
maintenance, and easier scalability due to their less volatile nature. Analytic sys-
tems usually consider metrics such as effectiveness, efficiency, usability, portability,
interpretability to determine the system’s impact. Nowadays, these systems collect
measurements from daily practices instead of only computational experiments. This
requires a significant software engineering effort before determining the analytic
system’s utility. Strategic research in the development of analytic systems consists
of improving transparency in the decision-making process. This proceedings reports
29 research works related to analytic systems.
Database management systems are essential to the development of efficient
information systems. Data management is the process of preparing, storing, orga-
nizing, and maintaining the data collected by an organization. Effective data
management is fundamental to run business applications and provide analytical
v
vi Preface
Network systems are all about automating the transfer of information from one
computer to another or from one part of the system to another. A fundamental shift
in technology and concepts made networking systems possible. They explore a
wide range of technology, specifically regarding software and hardware supporting
different kinds of network topology configurations, such as LANs, WANs, and Wi-
Fi networks. It is also noteworthy to point out the wireless sensor networks that
allow developing solutions for many engineering problems that are distributed by
their nature. Networked systems can also be regarded as high-performance com-
puting systems, wherein many cores and multicores complex architectures form the
foundation of the proposed solutions. This proceedings reports 16 research papers
on network systems.
Optimization is a well-established discipline. Many of the real-world engineer-
ing problems can be rendered as optimization problems of a cost function that
models all the behavior of the problem variables. In this case, one or several optimal
or pseudo-optimal solutions of the defined cost function are sought. The problems
considered are usually hard problems and cannot be solved using well-known
analytical techniques. Thus, researchers usually exploit iterative exploratory pro-
cesses to reach a good feasible solution to the problem at hand. Evolutionary and
swarm-based computationally intelligent methods are used for each goal. Also,
there is a lot of research work oriented toward finding good strategies to form the
core of the techniques that help in the optimization process. This proceedings
includes seven research works related to optimization systems.
Pattern recognition is the process of identifying patterns mostly by using
machine learning. Pattern recognition can be defined as the classification of data
based on prior knowledge about patterns that have their classes known. It is based
on recognizing some regularities in the presented data and attempting to configure a
model to recognize new patterns that have not been seen by the model. Pattern
recognition is a technique at the heart of many smart systems. Pattern recognition
systems are usually trained from known training data aiming at a general model that
is able to recognize unknown data. Machine learning is a fundamental tool for
pattern recognition. Computational vision is one of the fields that profits a large
spectrum from pattern recognition to advance the state-of-the-art regarding smart
system engineering. This proceedings reports four research papers on pattern
recognition systems.
All the aforementioned research topics are applied to engineers leading to better
and more efficient systems to advance the state-of-the-art toward a smarter human
life. Thus, this proceedings also bring forth many reports on successful applications,
ranging from abstract ones to more practical systems. This proceedings includes 24
applied research papers.
Besides the presentations of all the included diverse research works, the con-
ference program also features some interesting cutting-edges keynote presentations.
The plenary talks will focus on crucial topics that have recently attracted much
attention and will be presented by outstanding experts from the area. We believe all
participants will enjoy and benefit from the rich program.
viii Preface
It is a privilege and honor for us to participate in this edition of IISA 2020, and
we hope we will be with you once again next year for IISA 2021. It has also been a
rewarding experience, and we express our sincere thanks to all program committee
members for their cooperation in shaping the conference and running the refereeing
process. We highly appreciate the hard work and timely feedback from the
reviewers who did an excellent job. Last but not least, we would like to thank all the
authors, organizers, and participants for supporting IISA 2020. Thank you for your
time and effort in preparing and submitting your papers and your patience through
the long process. Your work is the backbone of the conference.
We wish you all a pleasant and fruitful meeting, and we look forward to your
submission to and participation in IISA 2021.
Madjid Tavana
Nadia Nedjah
Reda Alhajj
Contents
Analytical Systems
Consumer’s Optimal Decision and the Role of Insurance
in the Risk State—An Analytical Perspective Based on the Expected
Utility Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Wenting Cao
Correlation Analysis of Children’s Stroller Information . . . . . . . . . . . . 11
Liu Xia, Chen Qianwen, Qiao Feng, and Pei Fei
Game on the Tacit Collusion of the Telecom Market Under
the Full-Business Operating Environment . . . . . . . . . . . . . . . . . . . . . . . 20
Qiming Tang, Yongyao Chen, and Meijuan Li
Discussion on the Training Mode of Data Capability for Economics
and Management Majors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Guihua Han, Mintyu Lin, and Cuilin Li
Research on Service Quality Evaluation System of Automobile
Maintenance Enterprises Based on AHP . . . . . . . . . . . . . . . . . . . . . . . . 33
Xiao Juan Yang, Shu Quan Xv, Fu Jia Liu, and Guo Fang Wu
A Method of Determining Membership Function in Fuzzy
Comprehensive Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Guoliang Dong, Chaozhou Chen, and Guofang Wu
Analysis of Computer Software Technology under Big
Data Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Lei Guiping
Research on ShadowsocksR Traffic Identification Based
on Xgboost Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Ji Qingbing, Deng Xiaoyan, Ni Lulin, and Lei Haijun
ix
x Contents
Application
Study on the Attention Degree of Consumer Endowments
to Children’s Clothing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Xia Liu, Shihong Duan, Yanhong Hu, Fei Pei, Bisong Liu, Qianwen Chen,
and Feng Qiao
Application-Oriented Talent Cultivation to Meet the Needs
of Cross-Border E-Commerce Positions—Take the Customer
Service Position as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Yi Jing
Research and Design of Stream Computing Framework Based
on Storm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Huanbin Wang and Yangjun Gao
xii Contents
Electronics Systems
Research on Component Level Test System of TCAS Circuit Board
Fault Diagnosis System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Xiaomin Xie, Kun Hu, Ying Hong, and Jianghuai Du
Development of a HoloLens Mixed Reality Training System
for Drop-Out Fuse Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Chibing Gong, Deyun Ye, and Ruiling Xie
Comparative Study of Theoretical Analysis and Physical Analysis
of Single Tube Amplifier Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Hanhong Tan, Zhoulin Chang, and Yanfei Teng
Design of the Bus Support Capacitor in Servo Drive Controller
Based on PMSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Yao Yao, Dawei Gu, Yebing Cui, Shuwei Song, and Fanquan Zeng
Effect of Distributed Generation Grid-Connection on Line Loss
in Low-Voltage Courts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Weiru Wang, Xincong Shi, Jie Hao, Mengzan Li, Xinyuan Liu,
Yifan Zhang, and Jun Pi
Design and Realization of a GNSS Receiver Test Equipment . . . . . . . . . 499
Wenquan Zhang, Ying Li, Zhe Li, and Yuhai Li
Resonance Suppression of Position Servo System Based on Improved
Notch Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Shuheng Chen, Wei Feng, Fanquan Zeng, Yaoyao Wang,
and Jiangxianfeng Tian
Design and Implementation of Digital DC Servo System Hardware . . . . 513
Rui Zhang, Zhixin Cheng, Baomei Xu, and Xuebing Liao
A Small-Scale Current Sensor Scheme of Single-Loop Double-
Winding Fluxgate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Xin Zhang, Aiming Zhao, Yawei Shi, Ronghui Hu, and Shuaishuai Zhao
ADRC-Based Wind Turbine Pitch Control Strategy . . . . . . . . . . . . . . . 529
Jiabao He and Jianguo Li
Research on Terminal Overvoltage Protection of Direct Drive
Permanent Magnet Wind Turbine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
Linzhao Hao, Xia Liu, Chuan Jiang, Qinghua Zheng, and Wen Jing Li
Energy Systems
Analysis of Vehicle Energy Storage Brake Energy Recovery System . . . 547
Zhiqiang Xu
Contents xv
Intelligent Systems
Research on Intelligent Fault Diagnosis of Board Circuit Based
on Expert Case Reasoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Xiaomin Xie, Kun Hu, Ying Hong, Boli Yu, and Jianghuai Du
Analysis of Key Technical Problems in Internet of Vehicles
and Autopilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Yongqiu Liu
Research and Development Housing Rental System with
Recommendation System Based on SpringBoot . . . . . . . . . . . . . . . . . . . 619
Yaozhang Li, Sheng Gao, Weisheng Wu, Peifeng Xie, and Hao Xia
Design of Intelligent Recommendation System of Smart Library
Under Big Data Environment and Its Application Research
in Applied University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Weining Huang
A top-N Recommendation Approach Based on Reliable Users . . . . . . . . 635
Dongyan Jia, Shengnan Gao, Jiayin Feng, Jinling Song, and Gang Wang
A Safety Distance Automatic Control Algorithm for Intelligent
Driver Assistance System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Guiru Liu and Lulin Wang
Emotional Cues Recognition in Natural Speech
by Chinese Speakers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Yifei Wang
xvi Contents
Network Systems
A Multi-factor Reputation Evaluation Model of Vehicular Network . . . 763
Huang Yue, Qin Guihe, Liu Tong, Huang Wei, and Meng Chengxun
Design of Network Information System Equipment Health
Management Software based on Combat Readiness . . . . . . . . . . . . . . . . 771
Yuwen Liu, Hongtu Cai, Pengfei Ma, Yonghui Xu, and Yaoze Han
A Network Attack Recognition Method Based on Probability
Target Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
Ying Liu and Yuefeng Zheng
A Systematic Review Study on Research Challenges, Opportunities,
Threats and Limitations in Underwater Wireless Sensor
Networks (UWSNs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Syed Agha Hassnain Mohsan, Sardar Shan Ali Naqvi, Farhad Banoori,
Muhammad Irbaz Siddique, Muhammad Muntazir Mehdi,
Frederick Nii Ofie Bruce, and Alireza Mazinani
Synchronization Behavior of a Class of Oscillator Networks
with Weighting Exponent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Junqing Feng, Guohong Liang, and Lixin Yang
Impact of Circular Field in Underwater Wireless Sensor Networks . . . . 803
Syed Agha Hassnain Mohsan, Muhammad Hammad Akhtar,
Md. Israq Aziz, Md. Mehedi Hasan, Maryam Pervez, Asad Islam,
and Farhad Banoori
Investigation and Design of Multi-wavelength LED Based Optical
Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Syed Agha Hassnain Mohsan, Mirha Malik, Shanzay Khan, Asad Islam,
Hammad Akhtar, Laraba Selsabil Rokia, and Muzammil Zubair
Research on High-Speed Data Acquisition System Based on PCIE . . . . 826
Xinxin Sun, Jun Yang, Juan Li, Fenxian Tian, and Shengkai Wang
Impact of Transmission Power Control Mechanism in Underwater
Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Syed Agha Hassnain Mohsan, Asad Islam, Syed Basharat Hussain,
Alireza Mazinani, E. L. Hacen Alioune, Md. Israq Aziz, and Naqeeb Ullah
Design and Implementation of Deep-Sea Emergency
Response System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Wei Cong
Research on Component Classification Strategy Based
on Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Mei Guo, Min Xiao, and Wenfen Zhang
xviii Contents
Optimization Systems
Scheme to Optimize and Improve the Stepped Structured Sleeve
Hydraulic Cylinder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Taiping Xie and Zhiqiang Zhao
Optimization Algorithm of Pigeon Flight Path Location Based
on Least Square . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
Cong Wen, Zhenping Lan, Yijie Zhang, Ping Li, and Yuru Wang
Multi-Colony Ant Algorithm Applied to the Yangtze Gorges Ship
Lock Arrangement Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
Ruijie Liu, Qiang Lin, Lijuan Wang, Lin Li, and Can Wang
Infrared and Visible Image Fusion Based on Multi-scale
Decomposition and Gradient Optimization . . . . . . . . . . . . . . . . . . . . . . . 932
Siyan Zhang, Guangming Zhou, and Di Chen
Novel Bayesian Network Incremental Learning Method Based
on Particle Swarm Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . 941
Yunnan Ling, Neng Yang, Haitao Yu, and Yungang Zhu
Feed Formulation Cost Optimization Based on the Improved
Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
Yao Juan, Xu Wang, Zhang Cheng, and Tian Fang
Vehicle Disposition and Routing Optimization of Reverse Logistics
Based on Improved Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 957
Shengping Zhao, Jingrui Li, and Jing Wang
Contents xix
Wenting Cao1,2(&)
1
School of Economics and Management, Yunnan Normal University,
Kunming 650500, China
[email protected]
2
School of Economics, Sichuan University, Chengdu 610065, China
Abstract. This paper starting from the hypothesis of “rational economic man”,
establishes a simple insurance decision model and combines the expected utility
function to analyze the function and social value of insurance. The conclusion is
as follows: Since the utility of definite income is greater than the utility of
expected income under uncertain conditions, the purchase of insurance can
enhance the welfare of the individual. Risk averse consumer purchases insur-
ance is a rational economic behavior, there is a promotion in utility for indi-
viduals, and an improvement in welfare for society. Insurance companies should
fully diversify risks and reduce the moral hazard of insurance contracts, so as to
promote the effective operation of the insurance market.
1 Introduction
(2) The expected utility function of a risk preference person, if a person is a risk
preference consumer in an uncertain event, the utility of his expected value is less
than his expected utility, that is: U ½pW1 þ ð1 pÞW2 \pU ðW1 Þ þ ð1 pÞ
U ðW2 Þ. The expected utility function at this time is strictly convex. that is
d 2 U dW 2 [ 0, The consumer is a risk preference person.
(3) The expected utility function of a risk neutral person. For a risk neutral consumer,
the utility of his expected value is equal to his expected utility, that is:
U ½pW1 þ ð1 pÞW2 ¼ pU ðW1 Þ þ ð1 pÞU ðW2 Þ. The utility function at this
time is a linear function, that is d 2 U dW 2 ¼ 0.
there are n consumers insured, the profit of the insurance company is n ðcK pK Þ.
Since there are many insurance companies in the insurance market, assuming that there
is no threshold to restrict the entry and exit of the insurance industry, the insurance
market can be approximated as a perfect competition market. Competition transfers
capital from the department with low profit to the department with high profit. Finally,
the economic profit of each enterprise in the perfect competition market is zero. The
profit of the insurance company is zero, that is n ðcK pK Þ ¼ 0, And then introduce
c ¼ p, That is, the insurance premium rate is equal to the probability that the insured
person will suffer a total loss. This means that insurance company provides customers
with a completely “fair” insurance premium rate under intense competitive pressure. In
fact, this hypothesis has also been verified in reality. Many insurance companies with
strong strengths, wide business and cross-regional spread their risks sufficiently, and
the insurance premium rates they provide are very close to “fair” rates.
(2) Policyholder Decision: How to Determine the Amount of Insurance K
As a rational economic person, the policyholder still follows the principle of profit
maximization when making decisions. The policyholder’s expected utility function is
E ðU Þ ¼ ð1 pÞ U ðW cK Þ þ p U ðW L þ K cK Þ. In order to maximize the
expected utility of the policyholder, let @E ðU Þ=@K ¼ 0. get cð1 pÞU 0 ðW cK Þ þ
ð1 cÞpU 0 ðW L þ K cK Þ ¼ 0. Since insurance company uses “fair” insurance
premium rate (c ¼ p), get U 0 ðW cK Þ ¼ U 0 ðW L þ K cK Þ. As a risk averse
person, his expected utility function is concave, the second derivative is negative, and
the expected utility function is monotone with diminishing marginal utility. Since it is a
monotonic form of function, equal marginal utility means that the amount of property
on both sides of the equation is also equal, that is W cK ¼ W L þ K cK, Thus
introduce K ¼ L. This means that when insurance company is pricing at “fair”
insurance premium rate, risk averse buyer fully insures the property that may suffer
losses (insurance amount = loss amount).
certain value. The risk premium is regarded as the difference between EðW Þ and CE
(P ¼ EðW Þ CE), which can be seen as the price paid by consumer for risk.
For a consumer, if he does not encounter any risk after the insurance application,
the premium already paid is cK and his property is W cK. If he encounters risks after
he insures, his property is W L þ K cK ¼ W cK (because K ¼ L). Therefore,
regardless of whether or not the consumer encounters risks after insurance, his property
is W cK. If the consumer refuses to buy insurance, the loss due to risk is L, and the
probability of risk occurring is p(p ¼ c). The expected income of the person who is not
willing to buy insurance is W pL ¼ W cK. Although the number is the same as the
consumer who bought the insurance, W cK is the expected value under an uncertain
condition. For a risk averse person, the expected utility function is strictly concave. The
utility corresponding to W cK under certain conditions is greater than the utility
under uncertain conditions, that is U ðW cK Þ [ pU ðW LÞ þ ð1 pÞU ðW Þ. So for
individuals, purchasing insurance can increase their benefits (Fig. 2).
ART INFLUENCE.
R
. K. M.
During a speech at a political dinner in a small Western city, not long ago, a
Jingo orator, to the great amusement of his hearers, remarked that "The
British lion, whether he is roaming the deserts of India or climbing the forests
of Canada, will not draw in his horns nor retire into his shell."
"There's only one trouble about blowing bubbles, mamma," said little Conrad,
the other day, "and that is that they always blow out."
The magazine containing Mrs. Reynolds's first story lay on the sitting-room
table.
Her son, who was at an age to be seriously afflicted with the big head, took
it up, and glanced over it rather contemptuously.
"Mamma," he said, "why don't you write for a first-class magazine? I see that
this thing is entered through the mails as second-class matter."
NOT GENUINE.
"Talking about treacle," said the old salt, as he hoisted himself off the
molasses barrel to make way for the grocer to supply a customer's wants,
"thet reminds me of a little scrimmage we had with a pirate slaver in '42.
"We had the coast-line of Africy a blue streak off to the starboard, and we
were er spankin' along with every blessed stitch of canvas drawin' when we
sighted one er them pirate slavers er bearin' down on us. Capen took a
squint through the glass and whistled. 'We'll give him er run fer it,' said he.
"Waal, that chap kep' after us all day, and we tried to slip his lights during
the night, but 'twarn't no use. He made up his mind to foller, and he did, day
after day. At last we got well down to the cape when er blow came up, and,
great guns! it wuz er blow fer certain. It caught us, and drove us plumb into
the antarctic circle, with that pirate right after us. That made the Captain
mad, and as we had er cargo of molasses on board, he gave the order to
uncover the rear hatch and hoist the barrels on deck.
"Blow me if he didn't broach those barrels thet night, and empty them over
the starn. The nest day there wuz that pirate stuck fast in the centre of the
molasses, where he had sailed. It had froze during the night, and he was
anchored in it just the same as if he wuz nipped in an ice-floe. Then we
squared around and headed for the cape. As we passed him the Captain
shouts out:
"'Ahoy, there! Cold weather fer merlasses, ain't it?' and they shook their fists
and yelled, but we left them, and I guess they're there yet."
FOOTNOTES:
[1] Begun in Harper's Round Table No. 857.
*** END OF THE PROJECT GUTENBERG EBOOK HARPER'S ROUND
TABLE, MAY 12, 1896 ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com