Pub Date : 2023-03-01DOI: 10.26599/IJCS.2022.9100032
Anting Zhang;Bin Wu;Yinsheng Li
Obtaining a high-precision risk warning service, which can improve trading efficiency and legality, by reducing sampling proportion and customs clearance time dramatically is critical for cross-border trades. However, existing anti-fraudulent services are weak either in the precision or the mining capacity of discovering hidden risks. Among the reasons are incomplete data, untrustworthy resources, and old analysis models. On the basis of these observations, this article makes a combined technical solution for a risk warning service to address data resource, integrity, and mining capacity issues. The provided risk warning service is featured with a correlation analysis approach, which is advanced and efficient at addressing multisource and heterogeneous data to identify deep-seated risks with cross-border products, such as fake documents, price concealment, epidemic events, and ingredient pollution. To reveal the hidden correlation risks in cross-border clearance, a set of correlation-oriented data models and multi-attribute, multi-object, and multi-level methods are developed. The involved data sources and objects can be collected from inside businesses and public resources. Data are further structured to depict the whole portrait of a trade. The correlation analysis approach proves to be feasible and efficient in processing multisource and heterogeneous data to discover deep-seated risks with cross-border products. The risk warning service and the used correlation analysis approach have been studied and developed on the basis of a pilot project at an exit-and-entry port in Shanghai.
{"title":"A Correlation Analysis Based Risk Warning Service for Cross-Border Trading","authors":"Anting Zhang;Bin Wu;Yinsheng Li","doi":"10.26599/IJCS.2022.9100032","DOIUrl":"10.26599/IJCS.2022.9100032","url":null,"abstract":"Obtaining a high-precision risk warning service, which can improve trading efficiency and legality, by reducing sampling proportion and customs clearance time dramatically is critical for cross-border trades. However, existing anti-fraudulent services are weak either in the precision or the mining capacity of discovering hidden risks. Among the reasons are incomplete data, untrustworthy resources, and old analysis models. On the basis of these observations, this article makes a combined technical solution for a risk warning service to address data resource, integrity, and mining capacity issues. The provided risk warning service is featured with a correlation analysis approach, which is advanced and efficient at addressing multisource and heterogeneous data to identify deep-seated risks with cross-border products, such as fake documents, price concealment, epidemic events, and ingredient pollution. To reveal the hidden correlation risks in cross-border clearance, a set of correlation-oriented data models and multi-attribute, multi-object, and multi-level methods are developed. The involved data sources and objects can be collected from inside businesses and public resources. Data are further structured to depict the whole portrait of a trade. The correlation analysis approach proves to be feasible and efficient in processing multisource and heterogeneous data to discover deep-seated risks with cross-border products. The risk warning service and the used correlation analysis approach have been studied and developed on the basis of a pilot project at an exit-and-entry port in Shanghai.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"7 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/10091494/10091500.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46708647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.26599/IJCS.2022.9100028
{"title":"Erratum to “Ratemaking Model of Usage Based Insurance Based on Driving Behaviors Classification” by Zhishuo Liu, Mengjun Hao, and Fang Tian","authors":"","doi":"10.26599/IJCS.2022.9100028","DOIUrl":"10.26599/IJCS.2022.9100028","url":null,"abstract":"","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"230-230"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969554.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47759416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.26599/IJCS.2022.9100022
Zhishuo Liu;Yinan Cheng;Fang Tian
Crowd intelligence based transaction network (CIbTN) is a new generation of e-commerce. In a CIbTN, buyers, sellers, and other institutions are all independent and intelligent agents. Each agent stores the commodity information in a local node. The agents interconnect through a circle of friends and construct an unstructured network. To conduct the commodity search task in a network more efficiently and in an energy-saving manner when a buyer presents a commodity demand, a hybrid breadth-depth search algorithm (HBDA) is proposed, which combines the search logic of the breadth-first search algorithm and the depth-first search algorithm. We defined the correlation degree of nodes in a network, optimized the rules of search and forwarding paths using the correlation degree between a node and its neighboring nodes in the circle of friends, and realized the HBDA based on the PeerSim simulation tool and Java. Experimental results show that, in general, the proposed HBDA has a better search success rate, search time, commodity matching degree, and search network consumption over the two blind search algorithms. The HBDA also has good expansibility, thus allowing it to be used for commodity search efficiently with a high success rate in large-scale networks.
{"title":"Commodity Search Based on the Hybrid Breadth-Depth Algorithm in the Crowd Intelligence Based Transaction Network","authors":"Zhishuo Liu;Yinan Cheng;Fang Tian","doi":"10.26599/IJCS.2022.9100022","DOIUrl":"10.26599/IJCS.2022.9100022","url":null,"abstract":"Crowd intelligence based transaction network (CIbTN) is a new generation of e-commerce. In a CIbTN, buyers, sellers, and other institutions are all independent and intelligent agents. Each agent stores the commodity information in a local node. The agents interconnect through a circle of friends and construct an unstructured network. To conduct the commodity search task in a network more efficiently and in an energy-saving manner when a buyer presents a commodity demand, a hybrid breadth-depth search algorithm (HBDA) is proposed, which combines the search logic of the breadth-first search algorithm and the depth-first search algorithm. We defined the correlation degree of nodes in a network, optimized the rules of search and forwarding paths using the correlation degree between a node and its neighboring nodes in the circle of friends, and realized the HBDA based on the PeerSim simulation tool and Java. Experimental results show that, in general, the proposed HBDA has a better search success rate, search time, commodity matching degree, and search network consumption over the two blind search algorithms. The HBDA also has good expansibility, thus allowing it to be used for commodity search efficiently with a high success rate in large-scale networks.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"167-177"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969549.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49117123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.26599/IJCS.2022.9100025
Yutao Yang;Yuxuan Shi;Tianmei Wang
With the deepening application of blockchain technology, exaggerating its empowering effects has become common. In recent years, the rational assessment of the maturity of blockchain technology applications in digital projects in different fields has been the focus of attention and identified as the key to improving the implementation effect of various digital projects. Although some studies have obtained substantial research results on technology maturity and its derivative applications, which can be used to predict the overall trend of a technology or guide the implementation of the technology on the ground, few studies have evaluated the maturity of blockchain technology in combination with different application scenarios. Our study combines application scenarios and the technical characteristics of blockchain technology and proposes an evaluation system for blockchain technology application maturity consisting of five primary indicators, that is, key application requirements, data security, process complexity, application ecological completeness, and technical performance requirements, and their corresponding secondary indicators. In addition, we take digital government public service projects as application scenarios and use the analytic hierarchy process (AHP) entropy method and expert scoring method to determine the weights corresponding to each index in the assessment system and construct a blockchain technology application maturity assessment model. Moreover, we apply the model to ten typical digital government public service projects to conduct a comprehensive assessment and analysis. By comparing the indicator scores of the different projects, we analyze the project characteristics influencing blockchain technology application maturity and provide suggestions for applying “blockchain + digital government public services”.
{"title":"Blockchain Technology Application Maturity Assessment Model for Digital Government Public Service Projects","authors":"Yutao Yang;Yuxuan Shi;Tianmei Wang","doi":"10.26599/IJCS.2022.9100025","DOIUrl":"https://doi.org/10.26599/IJCS.2022.9100025","url":null,"abstract":"With the deepening application of blockchain technology, exaggerating its empowering effects has become common. In recent years, the rational assessment of the maturity of blockchain technology applications in digital projects in different fields has been the focus of attention and identified as the key to improving the implementation effect of various digital projects. Although some studies have obtained substantial research results on technology maturity and its derivative applications, which can be used to predict the overall trend of a technology or guide the implementation of the technology on the ground, few studies have evaluated the maturity of blockchain technology in combination with different application scenarios. Our study combines application scenarios and the technical characteristics of blockchain technology and proposes an evaluation system for blockchain technology application maturity consisting of five primary indicators, that is, key application requirements, data security, process complexity, application ecological completeness, and technical performance requirements, and their corresponding secondary indicators. In addition, we take digital government public service projects as application scenarios and use the analytic hierarchy process (AHP) entropy method and expert scoring method to determine the weights corresponding to each index in the assessment system and construct a blockchain technology application maturity assessment model. Moreover, we apply the model to ten typical digital government public service projects to conduct a comprehensive assessment and analysis. By comparing the indicator scores of the different projects, we analyze the project characteristics influencing blockchain technology application maturity and provide suggestions for applying “blockchain + digital government public services”.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"184-194"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969575.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50407173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.26599/IJCS.2022.9100021
Fatima Isiaka;Zainab Adamu;Muhammad A. Adamu
In a video game review, the main focus is the narratives, characters, graphics, and mechanics in the gameplay. Some recent research mentions the user interface only when it comes into light as a creative platform for simple interactive narratives from a technical point of view; this narrative is mainly a software tool that requires traditionally modernized inputs from the user. The user needs to interact with the navigational controls or menus in order to start a basic game play. A complex game interface as stimulus is generally considered as having a feeling of immersion that allows for visual tracking of user behavioural patterns and use it to predict the next strategy of the user using robust computational models. A number of users have limited sensory perception in a gameplay and hence rely on complex game stimulus and an adaptive model is paramount when considering behavioural expectations that place the user in a digital environment with more expressive perceptions. We developed a custom based eye tracking and 3D object detection algorithm which was utilised by recruiting users to interact with visual 3D objects and trace their eye movement behaviour to generated data. We then applied the use of recurrent neural network (RNN) for direct tracing of user behavioural activities in a sequential manner to predict their behaviour for interface adaptation. Result indicates that redundant user attributes are flexible and flawless for identifying predicted response of the user in a controlled environment. This would lead to prototypical representation of user behavioural analytics as an embedded platform in the confined digital environment. One of the limitations of the project is its inability to basically specify the 3D gaze point at the inner boundaries of the visual field. Data visualisation is strictly based on combined object flow detection. The originality of the work is its ability to redefine fixation point to a rendered cascaded 3D gaze point and space-defined saccade which is indicated by the distance between one gaze points to the other. The 3D gaze point would be well suited for fixation generalisation on 3D as well as on 2D digital oriented environment.
{"title":"User Experience Adaptation of Complex Game Interface for User Behaviour Modeling Using RNN","authors":"Fatima Isiaka;Zainab Adamu;Muhammad A. Adamu","doi":"10.26599/IJCS.2022.9100021","DOIUrl":"10.26599/IJCS.2022.9100021","url":null,"abstract":"In a video game review, the main focus is the narratives, characters, graphics, and mechanics in the gameplay. Some recent research mentions the user interface only when it comes into light as a creative platform for simple interactive narratives from a technical point of view; this narrative is mainly a software tool that requires traditionally modernized inputs from the user. The user needs to interact with the navigational controls or menus in order to start a basic game play. A complex game interface as stimulus is generally considered as having a feeling of immersion that allows for visual tracking of user behavioural patterns and use it to predict the next strategy of the user using robust computational models. A number of users have limited sensory perception in a gameplay and hence rely on complex game stimulus and an adaptive model is paramount when considering behavioural expectations that place the user in a digital environment with more expressive perceptions. We developed a custom based eye tracking and 3D object detection algorithm which was utilised by recruiting users to interact with visual 3D objects and trace their eye movement behaviour to generated data. We then applied the use of recurrent neural network (RNN) for direct tracing of user behavioural activities in a sequential manner to predict their behaviour for interface adaptation. Result indicates that redundant user attributes are flexible and flawless for identifying predicted response of the user in a controlled environment. This would lead to prototypical representation of user behavioural analytics as an embedded platform in the confined digital environment. One of the limitations of the project is its inability to basically specify the 3D gaze point at the inner boundaries of the visual field. Data visualisation is strictly based on combined object flow detection. The originality of the work is its ability to redefine fixation point to a rendered cascaded 3D gaze point and space-defined saccade which is indicated by the distance between one gaze points to the other. The 3D gaze point would be well suited for fixation generalisation on 3D as well as on 2D digital oriented environment.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"159-166"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969550.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46567670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.26599/IJCS.2022.9100027
Wengxiang Dong;H. Vicky Zhao
In this paper, we provide a detailed review of two categories of the literature: the spontaneous protective behaviors of individuals during disease spread and the mandatory measures to control the disease spread. In the literature, the models of individual protective behaviors can be divided into two parts: the environment-induced protective behaviors and the information-induced protective behaviors. And the mandatory measures of disease control can be divided into two parts: the macro-based control methods and the micro-based control methods. We provide a detailed review to the various categories of research. Then we compare the effects of different control methods through simulation. Among the micro-based control methods, the method based on minimizing the largest eigenvalue has the best effect. This review is of crucial importance to summarize the studies of the spontaneous protective behaviors during disease spread and the mandatory measures to control the disease spread.
{"title":"Individual Behavior Modeling and Transmission Control During Disease Spread: A Review","authors":"Wengxiang Dong;H. Vicky Zhao","doi":"10.26599/IJCS.2022.9100027","DOIUrl":"10.26599/IJCS.2022.9100027","url":null,"abstract":"In this paper, we provide a detailed review of two categories of the literature: the spontaneous protective behaviors of individuals during disease spread and the mandatory measures to control the disease spread. In the literature, the models of individual protective behaviors can be divided into two parts: the environment-induced protective behaviors and the information-induced protective behaviors. And the mandatory measures of disease control can be divided into two parts: the macro-based control methods and the micro-based control methods. We provide a detailed review to the various categories of research. Then we compare the effects of different control methods through simulation. Among the micro-based control methods, the method based on minimizing the largest eigenvalue has the best effect. This review is of crucial importance to summarize the studies of the spontaneous protective behaviors during disease spread and the mandatory measures to control the disease spread.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"223-229"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969551.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44523977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human society is evolving toward the future network information society. In this paper, we identify the interconnected level as the key factor driving the evolution of human society and incorporate it into our proposed evolutionary model of social formation. We show the entire process of social formation evolution at the interconnected level through theoretical analysis and simulation. Our result is consistent with what human beings have gone through. By contrast, the result presents the following four characteristics of the future network information society: the personalization of goods or services, the downsizing of enterprises or organizations, the decentralization of production or life, and the sharing of production or living tools. We regard the future network information society as a deeply interconnected “Primitive Society”.
{"title":"Future of Networked Information Society: A Deeply Interconnected “Primitive Society”","authors":"Xiao Sun;Jun Qian;Ziyang Wang;Jinwei Miao;Yueting Chai","doi":"10.26599/IJCS.2022.9100023","DOIUrl":"10.26599/IJCS.2022.9100023","url":null,"abstract":"Human society is evolving toward the future network information society. In this paper, we identify the interconnected level as the key factor driving the evolution of human society and incorporate it into our proposed evolutionary model of social formation. We show the entire process of social formation evolution at the interconnected level through theoretical analysis and simulation. Our result is consistent with what human beings have gone through. By contrast, the result presents the following four characteristics of the future network information society: the personalization of goods or services, the downsizing of enterprises or organizations, the decentralization of production or life, and the sharing of production or living tools. We regard the future network information society as a deeply interconnected “Primitive Society”.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"178-183"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969548.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46916710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the mutual interaction and dependence of several intelligent services, a crowd intelligence service network has been formed, and a service ecosystem has gradually emerged. Such a development produces an ever-increasing effect on our lives and the functioning of the whole society. These facts call for research on these phenomena with a new theory or perspective, including what a smart society looks like, how it functions and evolves, and where its boundaries and challenges are. However, the research on service ecosystems is distributed in many disciplines and fields, including computer science, artificial intelligence, complex theory, social network, biological ecosystem, and network economics, and there is still no unified research framework. The researchers always have a restricted view of the research process. Under this context, this paper summarizes the research status and future developments of service ecosystems, including their conceptual origin, evolutionary logic, research topic and scale, challenges, and opportunities. We hope to provide a roadmap for the research in this field and promote sound development.
{"title":"Research Roadmap of Service Ecosystems: A Crowd Intelligence Perspective","authors":"Xiao Xue;Guanding Li;Deyu Zhou;Yepeng Zhang;Lu Zhang;Yang Zhao;Zhiyong Feng;Lizhen Cui;Zhangbing Zhou;Xiao Sun;Xudong Lu;Shizhan Chen","doi":"10.26599/IJCS.2022.9100026","DOIUrl":"https://doi.org/10.26599/IJCS.2022.9100026","url":null,"abstract":"With the mutual interaction and dependence of several intelligent services, a crowd intelligence service network has been formed, and a service ecosystem has gradually emerged. Such a development produces an ever-increasing effect on our lives and the functioning of the whole society. These facts call for research on these phenomena with a new theory or perspective, including what a smart society looks like, how it functions and evolves, and where its boundaries and challenges are. However, the research on service ecosystems is distributed in many disciplines and fields, including computer science, artificial intelligence, complex theory, social network, biological ecosystem, and network economics, and there is still no unified research framework. The researchers always have a restricted view of the research process. Under this context, this paper summarizes the research status and future developments of service ecosystems, including their conceptual origin, evolutionary logic, research topic and scale, challenges, and opportunities. We hope to provide a roadmap for the research in this field and promote sound development.","PeriodicalId":32381,"journal":{"name":"International Journal of Crowd Science","volume":"6 4","pages":"195-222"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9736195/9969528/09969552.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50407174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}