This book covers cutting-edge and advanced research on data processing techniques and applications for Cyber-Physical Sy
197 88
English Pages 2083 [1971] Year 2020
Table of contents :
Contents
Impact of Smart Cities on Resource Conservation Based on Big Data Analysis
1 Introduction
2 The Connotation of the Big Data Period and Smart Urbanization Requirements
2.1 The Connotation of the Big Data Period
2.2 Smart Urbanization Requirements Based on Big Data Analysis
3 The Impact of Big Data Analysis on Resource Saving in Smart City Construction
3.1 Impact of Government Resources
3.2 Impact of Educational Resources
3.3 Impact of Logistics Resources
3.4 Impact of Medical Resources
3.5 Impact of Traffic Resources
4 Summary
References
Water Level Measurement Device
1 Introduction
2 System Struct
3 Main Working Principles and Techniques
3.1 Basic Principle of Capacitance Sensing
3.2 Working Principle of Water Level Detection
4 Software Flow Chart and Main Technologies
4.1 Software Flow Chart
4.2 Software Filtering Algorithm
5 Test
6 Conclusion
References
Optimization of Urban Transportation Network Path
1 Introduction
2 Multi-source Traffic Information
3 Overview of Real-Time Traffic Information
4 Optimization of Urban Transportation Network Path Problem
4.1 Multi-objective Factors to Be Considered in Optimal Path Planning
4.2 Network Shortest Path Problem Optimization
5 Conclusion
References
Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data
1 Introduction
1.1 The Importance of Using Big Data Technology to Identify and Warn College Students’ Psychological Crisis
1.2 Analysis on the Current Situation of Identification, Early Warning and Suicide Prevention of College Students’ Psychological Crisis
2 Construct the Emergency Management Mechanism of College Students’ Psychological Crisis Under the Background of Big Data
2.1 Construct a Six-Tier System for Emergency Management of Psychological Crisis in Schools
2.2 Construct a Psychological Crisis Treatment System
2.3 Construct a Psychological Crisis Relief System
3 Summary
References
Application of VR Technology in Intangible Cultural Heritage Protection
1 Introduction
2 The Concept and Application of VR Technology in the Protection of Intangible Cultural Heritage
2.1 Environmental Modeling Technology
2.2 Stereo Synthesis and Stereo Display Technology
2.3 Human-Computer Interaction Techniques
2.4 System Integration Technique
3 Case Study: Application of VR Technology in the Protection of Intangible Culture Heritage
3.1 The Significance of the Application of VR Technology in the Protection of Intangible Culture Heritage in Jiangxi Province
3.2 Application of VR Technology in the Protection of Nuo Culture in Jiangxi Province
4 Summary
References
Construction of Ultimate Video Experience and Application Innovation System Based on 5G and 8K
1 Introduction
2 5G and 8K
2.1 5G
2.2 8K
3 5G+8K, They Were Born to Create the Ultimate Video Experience
4 5G+8K: From Quantitative Change to Qualitative Change
4.1 Production of Plane 8K Video Content
4.2 Video Content Production for VR 8K
4.3 OTT/IPTV Content Service
4.4 AI Content Service
5 Peroration
References
Cost of Kidney Transplantation on the Base of Data Mining Technology
1 Introduction
2 The Current Status and Existing Problems
3 Statistical Description
4 Construction of Data Mining System
4.1 To Standardize Electronic Data
4.2 To Establish Files of Transplant Patients
4.3 Mining Approach Combined with Fuzzy Association Rules
5 Conclusion
References
Public Service of Retired Personnel in Colleges and Universities in the Internet Era
1 Introduction
2 The Present Situation and Problems of Public Service for Retired Personnel in Colleges and Universities
2.1 Retired Personnel in Colleges and Universities Need Superior Service
2.2 Retired Personnel Need Pluralistic Cultural Life
3 Suggestions on Improving the Public Service for Retired Personnel of Colleges and Universities in the Internet Era
3.1 To Set Up Network Communication Platform Based on the Internet
3.2 To Implement the Political Life Treatment of Veteran Cadres
3.3 To Promote the Construction of Cultural Old-Age Service in Order to Meet Their Needs of Pluralistic Spirit and Culture
4 Summary
References
Application Research of Accounting Archives Informatization Based on Big Data
1 Introduction
2 Brief Introduction of Accounting Archives Informatization Based on Big Data
2.1 Definition of Big Data
2.2 The Application Significance of Big Data Era in Accounting Archives Informatization
2.3 The Status Quo of Accounting File Management Informationization
3 Insufficient in the Accounting Informationization
3.1 Accounting File Information Management Is Relatively Lagging Behind
3.2 Accounting Macro Management Work Neglects Electronic Accounting File Management
3.3 Accounting File Information Management Software and Hardware Facilities and Lack of Development and Utilization
4 Measures to Strengthen the Accounting Information Management Information
4.1 Enhance the Importance of Leaders
4.2 Enhance the Importance of Accounting Staff
4.3 Cultivate Compound Talents to Ensure Safety
5 Conclusion
References
Construction of Vocational Education Information Platform Under the Background of Big Data
1 Introduction
2 Vocational Education Informatization Platform Under the Background of Big Data
2.1 Development of Internet Technology in Big Data Era
2.2 The Connotation of Vocational Education Informatization Platform Under the Background of Big Data
2.3 Necessity of Vocational Education Informatization Platform
3 Analysis of the Current Situation of the Development of Vocational Education Informatization in China
3.1 Progress in the Development and Application of Digital Teaching Resources
3.2 Continuous Promotion of Digital Resources and Management Platform Construction
3.3 Teachers’ Information Application Level Continuously Improves
4 Accelerating the Construction of Vocational Education Informatization Platform
4.1 Evaluation and Acceptance of Information Platform Construction
4.2 Operation Mode of Vocational Education Informatization Platform
4.3 Establishment of Information Platform Guarantee Mechanism
4.4 Promoting the Basic Ability of Vocational Education Informatization
5 Summary
References
Language Conversion and Cultural Communication in Nobrock’s Translation—Taking Xunzi’s Persuasion of Learning as an Example
1 Introduction
2 Differences in the Connotation of Character Images
3 Semantic Differences in Word-Splitting Translation
4 Differences in the Understanding of Word Meanings
5 Cultural Differences in Amplification in Translation
6 Conclusion
References
Design and Manufacture of Moxibustion Bed Control System
1 Introduction
2 The Overall Framework of the Control System
3 Hardware Circuit Design
4 Software Design
4.1 Software Design of Client Computer
4.2 Software Design of Host Computer
5 Conclusions
References
Development of a New Computer-Aided Algorithm for Three-Layered Seale Wire Strand Geometric Design
1 Introduction
2 Design Process of Geometry Structure
3 Numerical Example
4 Conclusion
References
Designing of Postgraduate Medical English Class in Smart Learning Environment
1 Research Background of Smart Education
2 Postgraduate English Teaching
3 Research Significance
4 Designing of Postgraduate Medical English Class in Smart Education Environment
5 Summary
References
An Improvement Method of Power Energy Utilization Rate Based on DEA Model
1 Introduction
2 DEA Model
2.1 The Optimal Decision-Making Unit Selection Method with Constant Scale of Returns
2.2 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Input-Oriented BCC Model
2.3 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Output-Oriented BCC Mode
3 Power Energy Utilization Rate
4 Conclusion
References
“Blended Learning” in Construction Cost Network Course
1 Introduction
2 Learner Analysis
2.1 Characteristic
2.2 Motivation
3 Design of Network Course
3.1 Blended Learning Model
3.2 Course Organization
4 Effect Analysis
5 Conclusion
References
Data Mining of Privacy Preserving Based on Secret Sharing Technology
1 Introduction
2 Secret Sharing Threshold Scheme
3 Privacy-Preserving Distributed Association Rule Data Mining Based on Secret Sharing Technology
3.1 Definition of Problem
3.2 Privacy-Preserving Vertical Distributed Association Rules Data Mining Algorithms
3.3 Item Set Counting C.Countprivacy-Preserving Algorithms
3.4 Item Set Counting C.Count Privacy-Preserving Algorithms Analysis
4 Conclusion
References
Application Status and Development Prospect of Artificial Intelligence in Clinical Medicine
1 Introduction
2 Artificial Intelligence Introduction
3 The Application Status of Artificial Intelligence in Clinical Medicine
3.1 Artificial Intelligence and Medical Imaging
3.2 Artificial Intelligence and Drug Development
3.3 Artificial Intelligence and Medical Robots
4 The Development Prospect of Artificial Intelligence in the Field of Clinical Medicine
5 Conclusion
References
Core Index System of Provincial Power Grid Company’s Economic Activity Analysis
1 Introduction
2 Gray Relational Analysis
2.1 Theoretical Basis
2.2 Calculation Process
3 Factor Analysis
3.1 Theoretical Basis
3.2 Calculation Process
4 Determination of Initial Indicators
5 Core Indicator Selection
5.1 Gray Relational Analysis Index Selection
5.2 Factor Analysis Indicator Selection
5.3 Core Indicator System Construction
6 Core Indicator Selection
References
Application Research of Smart Education in Flipped Classroom of College English
1 Introduction of Smart Education
2 Introduction of Flipped Classroom
3 Application of Flipped Classroom in Smart Education of College English
4 Inadequacies of Flipped Classroom Application and Relevant Causes
5 Research Suggestions for the Teaching Mode of Flipped Classroom
6 Conclusion
References
Multi-objective Enterprise Partner Selection Model with Different Relative Superiority Parameters Based on Particle Swarm Optimization
1 Introduction
2 Partner Selection Model
3 Multi-objective Optimization
4 Particle Swarm Optimization
5 Numerical Example
6 Conclusion
References
Vehicle Path Optimization with Time Window Based on Improved Ant Colony Algorithm
1 Introduction
2 Dynamic Adaptive Ant Colony Algorithm
2.1 Ant Colony Algorithm
2.2 Ant Colony System Model
2.3 Optimal Selection of Ant Colony Algorithm Parameters
2.4 Ant Colony Improvement Algorithm Based on Dynamic Adaptive Adjustment of Pheromone
3 Vehicle Path Problem with Time Window
3.1 VRPTW Model
3.2 Ant Colony Algorithm for Solving VRPTW
4 Simulation
4.1 Analysis of Results
5 Conclusion
References
Cultivation of Innovative Talents in Higher Education Based on Big Data
1 Introduction
2 Raising of the Issue
3 The Advantages of Cultivating Innovative Talents in Higher Education Under the Background of Data
4 Training Paths for Innovative Talents in Higher Education Under the Background of Data
5 Summary
References
Reform of Ideological and Political Teaching in Colleges and Universities Under the Background of Big Data
1 Introduction
2 The “Micro-Era” Environment Provides a Favorable Opportunity for the Development of IaPE
2.1 It Adapts to the Characteristics of the Times and the Development Direction of Modern IaPE
2.2 It Helps Expand and Innovate the New Teaching Mode of Ideological and Political Course
3 Problems Existing in the Teaching Mode Reform of IaPE Under “Micro-Era”
3.1 Lack of Professional Teachers
3.2 Insufficient Emphasis on the Teaching Mode Reform
3.3 Imperfect Reform System
4 Strategies for the Teaching Mode Reform of Ideological and Political Course Under the Background of “Micro-Era”
4.1 To Introduce Professional Teachers of Ideological and Political Course
4.2 To Strengthen the Emphasis on the Teaching Mode Reform of Ideological and Political Course
4.3 To Improve the Reform System of the Ideological and Political Teaching Mode Under the Background of “Micro-Era”
5 Summary
References
Influence Factors of Consumer Satisfaction Based on SEM
1 Introduction
2 Evaluation Model
3 Evaluation Result
4 Conclusion
References
Overview of Underground Space Utilization and Standardization Suggestions
1 Introduction
2 The Classification of Underground Space
3 The Value of Underground Space Exploitation
4 Domestic Underground Space Utilization Practice
4.1 The Case of Zhejiang Province
4.2 The Case of Xiongan New Area
5 The Overview Abroad
6 Laws, Regulations and Standards Related to Domestic and Foreign Underground Space
6.1 Laws and Regulations
6.2 Standards
7 Recommendations for Standardization of Underground Space Exploitation
References
Application of Decision-Making Management and Information Management System Based on Big Data
1 Introduction
2 The Application of Decision-Making Management System
2.1 Big Data’s Influence on Decision-Making Management
2.2 The Framework of Enterprise Decision-Making Management System
3 Application of Information Management System
3.1 Information Subsystem of Government Governance Under Big Data
3.2 Disaster Information Management Under Big Data
4 Summary
References
Aluminum Foil Surface Defect Recognition Method Based on CNN
1 Introduction
2 RPCA for Aluminum Foil Image Defect Detection
3 RPCA-Based Extraction of Defect Areas on Aluminum Foil Surface
4 Surface Defect Recognition Experiment of Aluminum Foil Based on CNN
5 Conclusion
References
How to Build Hadoop in the Field of Transportation by Cloud Computing
1 Introduction
2 Analysis of Traffic Big Data and Cloud Computing Technology
2.1 Traffic Big Data
2.2 Cloud Computing Technology
3 The Advantages of Big Data and Cloud Computing
3.1 Improve Traffic Safety
3.2 Improve the Efficiency of Information Combination
3.3 Quickly Configure Transportation Resources
3.4 Providing Environmental Monitoring Methods
4 Construction of Hadoop in the Field of Transportation by Cloud Computing
4.1 Traffic Big Data Platform Architecture Design
4.2 Implementation of the Traffic Big Data Platform
5 Conclusion
References
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral Data Using Grey Relational Analysis
1 Introduction
2 Methodology
3 Results and Analysis
4 Conclusions
References
Financial Auditing Accounting Method Based on Computer Network
1 Introduction
2 The Basic Meaning of Financial Audit in Financial Supervision
3 Accounting Methods in Accounting Auditing
3.1 Check the Relationship and Check Method
3.2 Account Correspondence and Account Analysis
3.3 Process Analysis
4 Accounting Methods in Information Age
4.1 Fair Value Measurement
4.2 Moving Weighted Average Method
5 Measures to Improve Accounting Level
5.1 To Ensure the Independent Accounting Work
5.2 To Improve the Supervision Level of Accounting Work
6 Conclusion
References
Wireless Temperature Control System of Big Grain Depot
1 Introduction
2 Design of the Monitoring System
3 The Overall Design of the Extension Project
3.1 Temperature Data Acquisition
3.2 Wireless Data Communication
4 Master Design
4.1 Overall Design
4.2 Centralized Display and Processing of Data
5 Conclusion
References
Springback Modification for Biaxial Bending Plate and Its Validation in Multi-point Forming
1 Introduction
1.1 Precision Forming by Springback Modification Method
1.2 Some Research on Springback Modification and Precision Controlling
1.3 Establishing Springback Modification Algorithm for Biaxial Bending Plate
2 Springback Compensation and Modification Algorithm
2.1 Algorithm for Curvature Before Springback
2.2 Modification Algorithm for the Construction of Biaxial Bending Surface
3 Simulation, Experiment Validation and Error Analysis
3.1 Finite Element Analysis Model
3.2 Simulation Results
3.3 Experimental Results and Analysis of Springback
4 Conclusion
References
E-crime Management System for Future Smart City
1 Introduction
2 Architecture
2.1 Citizen of Smart City
2.2 Internet
2.3 Server
2.4 Police Station
3 Implementation
4 Conclusion
References
System Dynamics-Based Simulation of E-commerce Industry of Ethnic Regions in China
1 Introduction
2 Research Status
3 The System Dynamics Model of E-commerce Industry
3.1 Systematic Framework of the E-commerce Industry
3.2 Causality Analysis of Subsystems
3.3 Variable Determination and Model Construction
3.4 Model Validity Test
4 Model Simulation Results and Policy Analysis
5 Conclusions
References
Vehicle Safety Reminder System Based on Single Chip Microcomputer
1 Introduction
2 System Hardware Design
2.1 Speed Measuring Module Unit
2.2 MCU Information Processing Unit
2.3 Safety Reminder Unit
2.4 Bluetooth Module Design and Implementation
3 System Principle and Implementation
3.1 System Working Principle
3.2 APP Design and Implementation
4 Conclusion
References
Regional Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Environment
1 Introduction
2 Research on the Regional Cooperative Strategic Environment of Social Public Service Led by Cloud Computing and Big Data
3 Regional Cooperative Strategy Framework of Social and Public Services Under the Background of Cloud Computing and Big Data
4 Realization Path of Rational Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data
5 Summary
References
Online Reputation Evaluation for Consumer Products Based on Analytic Hierarchy Process (AHP)
1 Introduction
2 Constructing an Online Reputation Evaluation Model for Consumer Products
2.1 The Basic Principles of the Construction of the Online Reputation Evaluation System for Consumer Products
2.2 Online Reputation Evaluation Indicator System for Consumer Products
2.3 Weight of Evaluation Indicators
2.4 Calculation Method of Online Reputation Evaluation of Consumer Products
3 Application Cases
4 Summary
References
Discussion on the Influence of Ambient Temperature Based on Big Data Technology on the Development of Asphalt Pavement
1 Introduction
2 Big Data Technology and Its Advantages
3 Formation Mechanism of Rut on Asphalt Pavement
4 Effect of Ambient Temperature on Rutting Development of Asphalt Pavement
5 Conclusion
References
Analysis on the Criminal Subject of Artificial Intelligence
1 Proposal of the Criminal Subject of Artificial Intelligence
2 Analysis of Artificial Narrow Intelligence Criminal Subject
3 Analysis of Artificial General Intelligence Criminal Subject
3.1 AGI Is Inadequate to Be Criminal Subject
3.2 AGI Is Adequate to Be Criminal Subject
4 My Views on the Subject of Artificial Intelligence Crime
5 Concluding Remarks
References
U.S. Air Force Target Knowledge Graph Construction Based on Multi-source Intelligence Analysis
1 Introduction
2 Knowledge Graph Construction Technology
3 Construction of Knowledge Graph of U.S. Army Target Based on Multi-source Intelligence
3.1 Knowledge Extraction
3.2 Knowledge Modeling and Representation
3.3 Knowledge Storage
3.4 Knowledge Query
4 Experimental Design and Result Analysis
4.1 Data Preparation
4.2 Constructing Target Knowledge Graph of U.S. Army
4.3 Knowledge Query Based on Constructed Knowledge Graph
4.4 Application Performance Assessment
5 Conclusion
References
Design of Virtual Experiment Platform Based on MATLAB Simulation Technology
1 Introduction
2 Application of MATLAB Simulation Technology in Experimental Teaching
3 Perfect Combination of MATLAB Simulation Technology and Virtual Reality Technology
4 Simulate the Experimental Environment with MATLAB /Simulink Simulation Software
References
Traditional Culture Teaching in Chinese Education Under Internet Thinking
1 Introduction
2 Research on the Teaching Theory of Traditional Culture
2.1 Importance of Traditional Culture Teaching
2.2 The Meaning of Cultural Factors
2.3 The Relationship Between Language and Culture in Chinese Education
3 Problems in the Teaching of Developing Chinese Traditional Culture
3.1 The Simplification of Teaching Methods in Teaching
3.2 Cultural Factors and Language Teaching Cannot Achieve Unity
3.3 Some Teachers’ Cultural Factors Are Insufficiently Understood
4 Coping Strategies in Traditional Culture Teaching
4.1 Reasonable Selection of Content in Traditional Culture Teaching
4.2 Combining Practice with Theory in Traditional Culture Teaching
4.3 Teachers Should Constantly Improve Their Self-quality in Traditional Culture Teaching
5 Conclusion
References
College Students’ Entrepreneurship Psychology Education System and Practice Based on Computer Network
1 Introduction
2 Computer Network and Background
3 Problems in the Psychological Education of Computer Network College Students’ Entrepreneurship
3.1 It Is Difficult to Screen Effective Information of Entrepreneurship
3.2 The Implementation Goals and Tasks of Entrepreneurial Psychology Education Are Not Clear
3.3 Less Publicity and Attention in Entrepreneurial Psychology Education
4 The Significance of Computer Network in College Students’ Psychological Guidance Education for Entrepreneurship
4.1 Enriched the Mode of Psychological Guidance for College Students’ Entrepreneurship
4.2 Increased Opportunities for College Students to Receive Guidance on Entrepreneurship
4.3 Stimulate the Enthusiasm of College Students’ Entrepreneurship Psychology
5 Strategic Thinking on College Students’ Entrepreneurship Psychology Education Under the Background of Computer Network
5.1 Building a Diversified Entrepreneurship Education Practice Platform
5.2 Actively Shaping the Entrepreneurial Personality of College Students
5.3 Strengthen the Learning of Relevant Entrepreneurial Psychological Knowledge and Broaden the Knowledge
6 Conclusion
References
Development Status and Trend of Internet of Vehicles Communication Technology
1 Introduction
2 Development Status of Internet of Vehicles Communication Technology
2.1 Vehicle Network Communication Type
2.2 Open and Intelligent Vehicle Terminal System Platform
2.3 Server-Side Computing and Service Integration Technologies
2.4 Internet Technology
3 Key Technologies and Development Trends of the Internet of Vehicles
3.1 Sensor Technology and Information Integration
3.2 Intelligent Vehicle Terminal Platform
3.3 Server-Side Computing and Service Integration Technologies
3.4 Development and Application of Communication Technology
3.5 Voice Recognition Technology
4 Conclusion
References
Temperature Controller Based on USB Interface
1 Introduction
2 System Functions
3 System Development Platform
4 Overall Diagram of the System
5 System Hardware Design
6 System Software Design
6.1 Software Design of the Lower Computer
6.2 Software Design for Host Computer
7 Description of the System Operation
References
Construction of Compound DDOS Network Security System Based on PKI and CA Authentication
1 Introduction
2 Research on DDoS Attack Detection and Defense Model in Network Security
3 Combination of Signature Scheme and Digital Certificate Based on Public Key Infrastructure
4 Construction of Compound DDOS Network Security System Based on PKI and CA Authentication
5 Conclusion
References
Agricultural Sprayer Based on Drip Performance Monitoring System Design and Analysis
1 Introduction
1.1 Working Principle of Agricultural Sprayer
1.2 Effect of Drip Performance on Pesticide Control
1.3 Factors Affecting the Performance of Drip
1.4 Monitoring Factor Analysis
2 Agricultural Sprayer Monitoring System Design
2.1 The Overall Design of the System
2.2 Variable Control Design
2.3 System Control Adjustment Process
2.4 System Parameter Setting
3 System Hardware Design Summary
3.1 Hardware Design of PID Controller
3.2 Particle Size Detection Device—Laser Particle Size Sensor
3.3 Temperature and Humidity Detection Device—Temperature and Humidity Sensor
4 Analysis of Agricultural Sprayer Monitoring System
4.1 Environmental Adaptability of the Monitoring System
4.2 Stability and Reliability of the Monitoring System
4.3 Shortcomings and Deficiencies of the Monitoring System
References
Building Extraction Method in Remote Sensing Image
1 Introduction
2 Method
2.1 Choice and Analysis of Color Space
2.2 Retinex Shadow Removal Algorithm Based on HSV Color Space
3 Experimental Results and Analysis
4 Conclusion
References
Similarity Measures Between Type-2 Fuzzy Sets
1 Introduction
2 Research History and Status
3 Several Typical Definitions
3.1 Similarity Measures Between Interval Type-2 Fuzzy Sets
3.2 Similarity Measures Between Ordinary Type-2 Fuzzy Sets
4 Applications
4.1 Application Cases
4.2 Example and Verification
5 Conclusions
References
Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode
1 Introduction
2 Strategic Change Mode of Network Marketing in the Environment of New Media Marketing
3 Promotion of Channels and Strategies in the New Media Marketing Environment
4 Research on Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode
5 Conclusion
References
Reconstruction of Path of Mental Health Education of College Students Under the Background of “Internet+”
1 Introduction
2 Major Characteristics of “Internet+”
3 Problems Existed in Traditional Mental Health Education of College Students
3.1 Incomplete Working System of Mental Health Education [4]
3.2 The Bias Existed in the Goals of Mental Health Education
3.3 The Simple Form of Mental Health Education and the Narrow Implementation Paths [5]
3.4 Unreasonable Setting of Mental Health Education Course [6]
3.5 Deficiencies Existed in the Construction of Teacher Team of Mental Health Education
4 The Reconstruction of College Students’ Mental Health Education Path Under the Background of “Internet +”
4.1 Improve the Working Mechanism of Psychological Health Education for College Students
4.2 Build the Network Resource Platform and Construct the New Mode of Mental Health Education of College Students Under the Background of “Internet+”
4.3 Strengthening the Construction of Teachers’ Team for Mental Health Education Under The Background of “Internet+” [10]
4.4 Improving Students’ Ability of Distinguishing the Illegal and Harmful Information in the Network Under The Background of “Internet+”
References
Implementation Plan on the Implementation Plan of the Linear Algebra Gold Course in Independent Colleges
1 Introduction
2 The Following Shortcomings Are Common in Linear Algebra Teaching in Independent Institutions
2.1 The Teaching Concept Is Outdated, the Student’s Subjective Consciousness Has Not Been Fully Exerted
2.2 The Classroom Atmosphere Is Not Strong
2.3 The Teaching Model Needs Further Improvement
2.4 Less Teaching Time
3 Wuhan Donghu University Has Carried Out Teaching Reforms in the Following Directions
4 Through the Hard Work of All the Teachers of the Linear Algebra Course Group of Wuhan Donghu University, This Kind of Professional Learning-Oriented Mixed Learning Based on the Online Education Platform Has Achieved Gratifying Results in Our School
5 Summary
References
Search Strategy of Shipborne Satellite Communication Servo with Changing Heading
1 Introduction
2 Deck Angle Calculation of Ship-Borne Satellite Station
3 Search Strategy of Satellite Communications with Changing Heading
4 System Testing and Analysis
5 Conclusion
References
Hybrid Teaching of College English Under the Background of Big Data
1 Introduction
2 The Concept of Big Data and the Meaning of Hybrid Teaching
2.1 Big Data Concept
2.2 The Meaning of Hybrid Teaching
3 Framework of the Hybrid Teaching of College English Under the Background of Big Data
4 Roads to College English Hybrid Teaching Cased on Big Data
4.1 Innovation of Teaching Idea
4.2 Innovation of Teaching Resources
4.3 Innovation of Teaching Evaluation
5 Summary
References
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle
1 Introduction
2 USV Plane Motion Model
3 Sliding Mode Control for USV
4 Intelligent Control Method for USV
4.1 Fuzzy RBF Neural Network
4.2 Approximation Algorithm of the Network
5 Simulation
5.1 Simulation Object
5.2 Condition Setting
5.3 Simulation Results and Analysis
6 Conclusion
References
Feasibility Study on Using Seawater in Ship Pressure Water Mist Fire Extinguishing System
1 Introduction
2 Application of Fine Water Mist Fire Extinguishing Technology
2.1 Water Mist Definition
2.2 Principle of Water Mist Fire Extinguishing
2.3 Requirements for Ship Water Mist Fire Extinguishing System
3 Analysis of Experimental Results of Feasibility of Seawater Fog Fire Extinguishing
3.1 Experimental Effect of Seawater Fog on the Feasibility of Fire Extinguishing
3.2 Experimental Effect of Seawater Fog on the Feasibility of Wire Fire Extinguishing
3.3 Experimental Effect of Seawater Fog on the Feasibility of Oil Pool Fire Extinguishing
4 Exploration and Analysis of Seawater Fog Fire Extinguishing Experiment Results
4.1 Feasibility Comparison of Seawater Fog Fire Extinguishing
4.2 Fire Extinguishing Mechanism of Ship Pressure Water Mist Fire Extinguishing System
4.3 Suggestions on the Optimization of Nozzles in Marine Pressure Water Mist Fire Extinguishing System
5 Conclusion
References
Application Sharing Mode of University Information Resources in (IOT) Internet of Things
1 Introduction
2 Relevant Technologies of Internet of Things and Information Resources Sharing in Colleges and Universities
2.1 Application of Internet of Things Technology
2.2 Characteristics of Information Resources Sharing Service in Colleges and Universities
2.3 University Information Resources Sharing Service Model Based on Internet of Things Technology
3 Specific Measures to Strengthen the Construction of Information Resources Sharing in Colleges and Universities Based on Internet of Things Technology
3.1 The Necessity of Strengthening the Information Resource Sharing Model of Colleges and Universities Based on Internet of Things
3.2 Constructing Informatization Infrastructure
3.3 Establish a Perfect Operation Mechanism by Adopting a Collaborative Service Model
4 Concluding Remarks
References
Information Reconstruction Strategy for a Ship Power Distribution System
1 Introduction
2 Implementation of Distribution Network Reconstruction Based on the CI Algorithm
3 Case Analysis of Ship Distribution Network Reconstruction
3.1 Reconstruction Instance 1—Bus1 Failure
4 Conclusion
References
Design and Experiment of a Flexible Array Tactile Sensor
1 Introduction
1.1 Robot Tactile Sensor
1.2 Working Principle
2 Sensor Design
2.1 Microstructure Design of Sensor Unit
2.2 The Array Design of Sensor
3 Experimental Results
References
Design of Street Lamp Management Information System
1 Introduction
2 System Overall Design
3 Hardware Circuit Design
3.1 Minimum System of STM32F103RD6
3.2 Power and Program Download
3.3 GPRS
3.4 ZigBee
3.5 Electrical Detection
3.6 Design of Light Detection
4 Software Design
5 Conclusion
References
Application of Big Data Technology to Ideological and Political Education in Institutions of Higher Learning
1 Introduction
2 Research Overview
3 Method and Content of Constructing Big Data Platform
4 Value and Function of Applying Big Data Technology
4.1 Big Data Technology Subverting the Research Paradigm of Ideological and Political Education in Institutions of Higher Learning and Realizing Quantitative Research
4.2 Big Data Technology Helping Obtain the Full Sample Data and Greatly Improving the Accuracy of the Research
4.3 Big Data Technology Equipping Ideological and Political Education with Predictive Function
4.4 Big Data Technology Providing Diversified Choices for Educational and Teaching Methods
5 Problems of Applying Big Data Technology
5.1 Shortage of Interdisciplinary Talents
5.2 The Imperfection of Data Sharing Platform Causing the Incompleteness of Data
5.3 Untrue Data
5.4 Not Advanced Technology of Data Analysis
5.5 Insufficient Data Security
6 Ways to Meet Challenges and Solve Problems
6.1 Cultivating Interdisciplinary Talents with Big Data Technology and Profound Educational Theory
6.2 Strengthening Top-Level Design, Coordinating and Integrating Resources, and Getting Through “Data Island”
6.3 Establishing a Data Analysis Model of Ideological and Political Education
6.4 Improving the Effectiveness of Big Data Analysis by Applying Feasible Data Processing Technology
6.5 Improve Laws and Rules, Formulating Strict Management System, and Regulating the Research and Use of Big Data in Ideological and Political Education
7 Conclusion
References
Based on Computer Software to Analysis the Influence of Geometry Parameters of Herringbone Plate Heat Exchanger Plate on Heat Exchange Performance
1 Introduction
2 Evaluation Factors
3 Model Design
3.1 Simulation Model Design
3.2 Creating a Runner Model
4 Computational Fluid Dynamics Simulation
4.1 Conditional Parameters
4.2 Iterative Solution
4.3 Numerical Simulation Results
5 Conclusion
References
Analysis of Working Characteristics of Buck Converter in Artificial Intelligence Background
1 Introduction
2 Characteristics of Buck Converter
3 Buck Converter Simulation and Result Analysis
4 Conclusion
References
Under the Background of Internet +, the Practical Research of Mobile Learning Model in Vocational Practice Teaching Guidance
1 Introduction of Mobile Learning Mode in the Context of Internet +
2 Analysis of the Current Situation of Post Practice in Higher Vocational Colleges
2.1 The Management Method of Post-training Practice Is Backward
2.2 Students’ Internship Assessment Is Not in Place
2.3 The Questions and Answers in the Internship Process Are Poorly Targeted
3 The Organization Form of on-the-Job Practice Teaching in Mobile Learning Mode
3.1 The Construction of Fragmented “Micro Course” Guides the Post Practice
3.2 “Rain Classroom” Guides the Post Practice
4 The Effect Achieved
4.1 Forms of Post Management
4.2 In Terms of Professional Construction and Resource Construction
5 Conclusion
References
Exploration and Practice of Collaborative Education Mode Based on Informatization
1 Introduction
2 Main Teaching Problems in Environmental Design Major
2.1 Implicit Professional Training Objectives
2.2 Obsolete Teaching Mode
3 Difficulties Encountered in Current Collaborative Education Mode of the Environmental Design Major
3.1 Lack of Corresponding Economic and Policy Support
3.2 Unsatisfactory Enterprise Participation
3.3 Talents Cultivated by Colleges Unable to Match the Needs of Enterprises
4 The Role of Informatization in the Collaborative Education Mode
4.1 Accelerating the Process of Modern Education Reform, Strengthening the Application of Modern Education Informatization Among Teachers and Students, and Improving the Quality of Talent Cultivation
4.2 Accelerating the Combination of Production and Education, Establishing the Goal of Cultivating Talents Together with Enterprises, and Promoting the Realization of Win-Win Between Schools and Enterprises
4.3 Improving Existing Teaching Resources, Cultivating Students’ Active Learning Ability, and Promoting More Professional Development
4.4 The Practical Results of Informatization in Teaching to Promote the Development of the Overall Teaching Level and Comprehensive Strength
5 Practice of Information Integration into the Collaborative Education Mode of Environmental Design
5.1 Establishing an Information-Based Teaching Resource Library
5.2 Enhancing the Interaction
5.3 Improving the Evaluation and Management Mechanism
6 Conclusion
References
Analysis of Diabetic Association Rules Based on Apriori Algorithms
1 Introduction
2 Association Rules and Their Abstract Description
3 Association Rule Brute Force Algorithm
4 Apriori Algorithm
4.1 The Algorithm’s Basic Idea
4.2 Algorithm Description
4.3 Example of the Algorithm
5 Conclusion
References
Design and Practice of Basic Physical Experiment Teaching Based on Combination of Virtual and Real
1 Introducing Virtual Instrument Technology into the Physical Experiment Course
2 The Hierarchical Teaching System of Physical Experiment Teaching Combining Virtual and Real
3 Design of Physical Experiment Content Combining Virtual and Real
3.1 Learning and Development of Virtual Experiments
3.2 Analysis and Modification of Existing Experimental Instruments Using Virtual Instruments
3.3 Flexible Use of Virtual Instrument Technology for Experimental Design and Development
4 Conclusion
References
Automatic Detection of Cloth Defects Based on Gabor Filtering
1 Introduction
2 Gabor Filter
2.1 One-Dimensional Gabor Filter
2.2 Two-Dimensional Gabor Filter
2.3 Application and Adaptability of Gabor Filter
3 Support Vector Machine Classification
4 Flow Chart of Algorithm
5 Experimental Design
5.1 Composition of Experimental Data
5.2 Recognition Algorithm in This Paper
5.3 Comparison of SVM Results with Different Kernel Functions
6 Conclusion
References
Improved GA-SVM Algorithm and Its Application of NIR Spectroscopy in Orange Growing Location Identification
1 Introduction
2 Origin Identification Model Based on GA-SVM
2.1 GA-SVM
2.2 GA-SVM Parameter Setting and Discussion
2.3 GA-SVM Experimental Results
3 Conclusion
References
Condition Monitoring of Fire Water Supply System Based on LoRa Wireless Network
1 Introduction
2 Preliminary Work
3 Research Work
3.1 System Design
3.2 Monitoring Terminal Design
3.3 流程设计Process Design
4 Experiments
5 Conclusion
References
Application Design and Implementation of Intelligent Bracelet in Wisdom Campus Construction
1 Introduction
2 System Design
3 System Overall Architecture
4 Technologies of System Implementation
4.1 Hardware Design of Intelligent Bracelet
4.2 Definition of Hardware Data Acquisition Interface
4.3 Network Communication Framework
5 System Operation Effect
6 Summary and Prospect
References
Development and Implementation of Education Information Platform Based on Cloud Computing
1 Introduction
1.1 Background and Significance of the Paper
2 Requirements Analysis
2.1 System Functional Requirements
2.2 Teaching System Based on Cloud Computing Resources Required
3 System Architecture
3.1 The Overall Logic Architecture Platform
3.2 Cloud Computing Platform’s Core Management Module Software Architecture
3.3 Construction of Teaching System Cloud Architecture
4 System Network and the Control Flow
4.1 Cloud Based Teaching System Required Software and Hardware
4.2 Cloud Computing Management Platform Deployment
5 Summary
References
Application of Information Processing Technology in Garment Enterprises
1 Introduction
1.1 Comparisons and Development Trends of Information Processing Technologies at Home and Abroad
2 Major Problems in Information Construction of Garment Enterprises
2.1 Technical Issues
2.2 Management Problem
2.3 Talent Problem
3 Measures and Suggestions on the Application of ERP in High Domestic Garment Enterprises
3.1 Choosing the Right ERP System
3.2 Establishment of Networked Distribution System and Reorganization of Enterprise’s Existing Business Processes
3.3 Strengthen the Long-Term Training of Compound Talents
4 Conclusion
References
Application of E-Commerce Network Security Technology
1 Introduction
2 Current Situation of E-Commerce Security
2.1 Encryption Technology Layer
2.2 Security Authentication Layer
2.3 Transaction Protocol Layer
3 Analysis of Data Encryption Technology in Electronic Commerce Information Security Management System
3.1 Analysis of Symmetric Key Cryptosystem
3.2 Asymmetric Cryptosystem
3.3 Hash Function
4 Summary
References
Construction and Analysis of a Foreign Language Learning Model Based on the Classroom Network Environment
1 Introduction
2 Construction and Analysis of Foreign Language Learning Model
2.1 Problem Description of Foreign Language Learning
2.2 Selection of the Characteristics of the Network Environment in the Classroom
3 An Analysis of the Foreign Language Learning Model in the Classroom Network Environment
3.1 Process of Foreign Language Learning in the Classroom Network Environment
3.2 Theoretical Analysis of the Network Environment in the Classroom
4 Experiment and Analysis
4.1 Time Analysis of Foreign Language Learning
4.2 Effectiveness of Foreign Language Learning
5 Conclusion
References
Reform and Practice of Advanced Mathematics Course in the Context of New Engineering
1 Introduction
2 Current Status of Teaching Advanced Mathematics at Private Colleges
2.1 Students Have Varying Degrees of Mathematics
2.2 There Are Few Teaching Hours
2.3 Teaching Methods Are Relatively Fixed and Single
3 Reform of Advanced Mathematics Course at Private Colleges
3.1 Reform of the Curriculum Teaching System
3.2 Reform of Teaching Contents
3.3 Integrate the Thought of Mathematical Modelling in Teaching Advanced Mathematics
3.4 Reform of Methods to Teach Advanced Mathematics at Private Colleges
3.5 Implement Group Cooperative Teaching Strategies to Develop Students’ Ability to Cooperate Independently
3.6 Change the Assessment Methods
4 Conclusions
References
Innovation of Real Estate Marketing Strategies Based on “Internet+”
1 Introduction
2 The Necessity of “Internet +” Real Estate Marketing Mode
2.1 Changes in Consumer Subjects and Demands
2.2 High Permeability of Internet in Social Economy
3 Problems Existing in Real Estate Marketing Under the Environment of “Internet +”
3.1 Real Estate Marketing Brand Building
3.2 Real Estate Marketing Channel Construction
3.3 Design of Real Estate Promotion Strategy
4 Innovation of Real Estate Marketing Strategy Under the Environment of “Internet”
4.1 Enhance the Value of the “Internet” Brand of Real Estate
4.2 Optimizing the Marketing Channels of Real Estate in “Internet +” Era
4.3 Innovating the Promotion Strategy of Real Estate Mobile Platform
5 Summary
References
Load Balance of Cloud Computing Center Based on Energy Awareness
1 Introduction
2 Energy Consumption Model of Cloud Computing Center
2.1 Energy Consumption in Activation State
2.2 Energy Consumption in Suspended State
2.3 Energy Consumption During Switching Process
2.4 System Energy Consumption
3 Load Balance Method
4 Experiment Analysis
4.1 Environment of Simulation Experiment
4.2 Experiment Results
5 Conclusions
References
Express Internet of Things: Concept, Architecture and Frontier Outlook
1 Introduction
2 The Concept of Express Internet of Things
2.1 Definition of Express Internet of Things
2.2 Characteristics of Express Internet of Things
3 Development Concept of Express Internet of Things
4 The Architecture of Express Internet of Things
4.1 Perceptual Interaction Layer
4.2 Network Transport Layer
4.3 Technical Support Layer
4.4 Business Operations Layer
4.5 Integrated Application Layer
5 Future Prospect of Express Internet of Things
5.1 Digitalization
5.2 Platformization
5.3 Intelligentization
5.4 Ecologization
5.5 Universal Service
6 Summary
References
Multi-dimensional Similarity Personalized Recommendation Model in Deep Learning Mode
1 Introduction
2 Existing Research Work
2.1 Data Sparsity Problem
2.2 Cold-Start Problem
2.3 Deep Learning
3 Multi-dimensional Similarity Personalized Recommendation Model Design
3.1 Pearson Correlation Coefficient Similarity Calculation
3.2 Euclidean Distance Similarity Calculation
3.3 Cosine Similarity Calculation
3.4 Multi-dimensional Similarity Calculation Model
3.5 Parameter Adjustment in Deep Learning Mode
4 Simulation
5 Conclusion
References
Teaching Curriculum System and Its Construction on the Course of “Stamping Forming Process and Die Design” Under the Background of Big Data
1 Introduction
2 The Construction Thought of the Curriculum System of the “Stamping Forming Process and Die Design” Course Teaching
3 Construction Strategies of the Curriculum System of the “Stamping Forming Process and Die Design” Teaching
3.1 The Teaching Implementation of the Theoretical Part
3.2 The Teaching Implementation of the Dice Dismounting and Assembling Part
3.3 The Teaching Implementation of the Post Internship Part
3.4 The Teaching Implementation of the Vocational Teaching Part
4 Summary
References
Drug Abuse Prediction Model Based on Relevance Analysis
1 Introduction
2 Index Screening
3 Multivariate Regression and Polynomial Regression
3.1 Multivariate Regression Prediction
3.2 Polynomial Regression Prediction
4 Optimal Weight Allocation
5 Model Test
6 Conclusion
References
Design of Temperature and Humidity Detection System for Bacteria Package
1 Introduction
2 Introduction to the Temperature and Humidity Detection System of Bacteria Package
3 Hardware Design of Temperature and Humidity Detection System for Bacteria Package
3.1 Single Chip Selection
3.2 Sensor Selection
3.3 Buzzer Circuit
3.4 LCD Display Module
3.5 Circuit Diagram
4 Temperature and Humidity Data Processing
5 Procedures and Inspection
5.1 Program Section
5.2 Experiments and Tests
6 The Conclusion
References
Interference Analysis of Mobile Communication Multi-system
1 Introduction
2 LTE Spectrum Division
3 Causes and Classification of Interference
3.1 Spurious Interference
3.2 Blocking Interference
3.3 Intermodulation Interference
4 Interference Analysis of LTE Indoor Distribution System
4.1 Permissible Interference Tolerance for Each System
4.2 Sspurious Interference Analysis
4.3 Blocking Interference Analysis
4.4 System Total Isolation Requirements
5 Summary
References
Flipped Classroom Teaching of College English Based on “Rain Classroom”
1 Introduction
2 Interpretation of Flipped Classroom
2.1 Introduction of “Flipped Classroom”
2.2 Advantages of “Rain Classroom” and “Flipped Classroom”
3 Construction of the Flipped Classroom Teaching Mode Based on Rain Classroom of College English
3.1 Analysis and Application for the Stages of the Teaching Mode of “Flipped Classroom” and “Rain Classroom”
3.2 Teaching Effect on of “Flipped Classroom” and “Rain Classroom” Teaching Mode of College English
3.3 Teaching Advantages of “Flipped Classroom” and “Rain Classroom” Teaching Mode of College English
3.4 Problems Existing in the “Flipped Classroom” and “Rain Classroom” Teaching Mode of College English
4 Summary
References
Application of Information Technology to Promote the Practice of Medical Education Teaching
1 Introduction
2 Construction of Diversified Medical Resources
2.1 Excellent Speech Resources
2.2 Literacy Resources
2.3 Integrity of the Clinical Skills and Resources
2.4 Formative Resources
2.5 Distance Medical Education Resources
2.6 International Resources
2.7 Mobile Resources
3 Using Information Technology to Optimize Clinical Teaching Strategies
3.1 Innovation of Teaching Training Mode
3.2 The Support Platform of Informatization
4 Conclusion
References
Analysis of Rock Fracture Deformation of Urban Informatization in China’s Modernization Drive by DDARF Software
1 Introduction
2 DDARF
3 DDARF’s Modeling Based on CAD
4 Displacement Convergence Criterion of the DDARF
5 Rock Fracture Deformation and Stress Rupture Characteristics Under the Conditions of Single Axle Stress
References
Enterprise Information Security in the Process of Informatization
1 Introduction
2 The Current Situation and Development Trend of Information Security
2.1 The Current Situation of Information Security
2.2 Development Trend of Information Security
3 The Response Strategies of Enterprise Information Security
3.1 Building the Security System of Enterprise Network
3.2 Strengthening the Hard Power of Enterprise Information Security Technology
3.3 Raising Employees’ Awareness of Information Security
4 Prospect of Enterprise Information Security
5 Conclusion
References
Meta-cognitive Strategies Application in MOOC Environment—A Case of Integrated English Course
1 Introduction
2 Literature Review
3 Methodology
3.1 Research Subjects
3.2 Research Questions
3.3 Research Methods
4 Data Collection and Analysis
4.1 Students’ Knowledge About Meta-cognitive Strategies and Learning Abilities
4.2 Overall Situation of the Application of Meta-cognitive Strategies
4.3 Contrastive Study Between the High-Score Group and the Low-Score Group on Application of Meta-cognitive Strategies
4.4 Interview
5 Conclusion
References
Training Mode of Individualized Skilled Talents Based on Electronic Communication Specialty
1 Introduction
2 The Theory of Individualized Personnel Training in Electronic Communication
2.1 Electronic Communication Professional Personalized Talent Training Background
2.2 Personalized Learning Characteristics of College Students
2.3 The Purpose of Individualized Personnel Training
3 Problems in the Training of Electronic Communication Professionals in Colleges and Universities
3.1 The Goal of College Electronic Communication Professional Education Is Not Clear Enough
3.2 The Shortage of Teaching Resources for College Electronic Communication Majors
3.3 The Teaching Practicality of Electronic Communication Specialty in Colleges and Universities Is Not Strong
4 Personalized Training Strategies for Electronic Communication Professionals
4.1 Pay Attention to the Construction of Teaching Situation
4.2 Innovation of Teaching Mode for Electronic Communication Major
4.3 Development of Personalized Training Course for Electronic Communication Major
4.4 Vigorously Implementing Individualized Teaching Evaluation System
5 Conclusion
References
Calculating the Pore Fractal Dimension of Porous Media by Using Pore Size Distribution
1 Introduction
2 Method
3 Results and Discussions
4 Conclusions
References
RETRACTED CHAPTER: Application of Weighted Gene Co-expression Network Analysis in Biomedicine
1 Introduction
2 Method
3 Experiment
4 Conclusion
References
Design of Enterprise Network Information System Based on Industrial Interconnection
1 Introduction
2 Developing Data-Centered Design
2.1 Data Flow in Existing System Architecture
2.2 System Flattening Promotes Data-Centered Architecture Implementation
3 Implementing New Architectural Ideas in System Reconfiguration
3.1 Process Management Business Reconfiguration
3.2 Data Service Business Construction
4 Innovative System Architecture Design
4.1 Enterprise Data System Architecture Based on Industrial Interconnection
4.2 Function Realization of Enterprise Data System
5 Construction of Enterprise Data System
5.1 Cloud Data Platform Architecture
5.2 Data Service
6 Conclusion
References
Discussion on the Construction of Computer Software Specialty in Private Institutions
1 Question Raised
2 The Present Situation of Computer Software Specialization in Private Colleges and Universities
2.1 The Curriculum Is Unreasonable
2.2 The Course Content Lags Behind
2.3 Practical Teaching Is Not Strong Enough
2.4 Students’ Enthusiasm Is Not High
2.5 Lack of Teachers
3 Some Thoughts on Professional Construction
3.1 Implement School-Enterprise Cooperation and Internship
3.2 Participated in the Competition and Obtained the Qualification Certificate
3.3 Build the Course Teaching System to Meet the Needs of the Industry
3.4 Strengthen Practical Teaching and Innovate Teaching Methods and Means
3.5 Change Ideas and Create an Atmosphere of Innovation and Entrepreneurship
3.6 Strengthen the Construction of Teachers and Improve Their Professional Skills
4 Conclusion
References
Design and Implementation of Cow Chewing Behavior Recognition Based on Sound Sensor
1 Introduction
2 Basic Principle of Cow Chewing Behavior Recognition Based on Sound Sensor
2.1 Ruminant Ruminance of Dairy Cows
2.2 Design Principle
3 Test Results and Analysis
3.1 Training Process of Neural Networks
3.2 Results and Analysis
4 Conclusions
References
Design and Application of Distribution Automation System in Intelligent Power Supply System Management
1 Introduction
2 Intelligent Power Supply System Management
3 Distribution Automation System Based on Intelligent Power Supply System Management
3.1 Intelligent Power Supply System Management Method
3.2 Implementation of Algorithm Program
4 Simulation Analysis
5 Conclusion
References
A Framework for Occupational Risk Assessment in Power Grid Using AHP Method
1 Introduction
2 The Analytic Hierarchy Process (AHP)
3 Method
4 Results
5 Conclusions
References
Digital Media Copyright Protection Technology in the Age of All Media
1 Introduction
2 Digital Media in the Era of All Media
2.1 The Trend of Digital Copyright in the Era of All Media
2.2 The Meaning of Digital Copyright Protection in the Era of All Media
2.3 Necessity of Digital Copyright Protection in the Age of All Media
3 Key Technologies of Digital Copyright Protection
3.1 Content Encryption and Decryption
3.2 Digital Signature
3.3 Digital Watermarking Technology
3.4 Permission Expression Language REL
4 Digital Media Copyright Guarantor System Architecture
4.1 Server Centralized Control
4.2 Client Centralized Control
4.3 Collaborative Control Between Server and Client
5 To Sum Up
References
Realistic Dilemma and Breakthrough Path of “Innovation and Entrepreneurship” Education in Private Colleges and Universities Under the Background of Informatization
1 Realistic Dilemma of “Innovation and Entrepreneurship” Education in Private Colleges and Universities
1.1 Difficulty of the Integration of “Innovation and Entrepreneurship” and the Traditional Education System
1.2 Lack of “Innovation and Entrepreneurship” Education Resources in Private Colleges and Universities
1.3 Insufficient Teacher Team of “Innovation and Entrepreneurship” Major
1.4 “Innovation and Entrepreneurship” Education Lacks Effective Implementation Institutes
2 Outlet of “Innovation and Entrepreneurship” Education in the Private Colleges and Universities
2.1 Promote the Reform of the Course System of “Entrepreneurial and Innovative” Education
2.2 Set Up the Implementation Platform of “Entrepreneurial and Innovative” Education Through Multiple Channels
2.3 Strengthen the Construction of “Entrepreneurial and Innovative” Teacher Team
2.4 Teaching Management Department Should Become the Implementation Unit of “Entrepreneurial and Innovative” Education
3 Conclusion
References
Construction of Foreign Language Curriculum Resources Under the Background of Big Data
1 Introduction
2 Important Concepts
2.1 The Concept and Characteristics of Big Data
2.2 Curriculum Resources
3 The Opportunities Brought by Big Data Era for the Construction of Foreign Language Curriculum Resources
3.1 Enrich the Curriculum Resources
3.2 Promote the Sharing of Curriculum Resources with High Quality
3.3 Make the Integration of Curriculum Resources Come True
3.4 Improve the Level of Curriculum Resource Construction
4 Ideas on the Construction of Foreign Language Curriculum Resources Under the Background of Big Data
4.1 Identify Talent Training Objectives and Course Content
4.2 Participants in the Construction of Curriculum Resources
4.3 The Content of Curriculum Resources
5 Supporting Measures for the Construction of Foreign Language Curriculum Resources
5.1 Policy Support
5.2 Financial Support
5.3 Technical Support
5.4 Teacher Training
6 Conclusion
References
Intelligent Computation of Bubble Group Motion in Mesoscale Simulation
1 Introduction
2 Numerical Method
3 Numerical Results and Analysis
3.1 Side-by-Side Double Bubble Motion Process
3.2 Side-by-Side 3 Bubble Motion Process
3.3 Symmetrical Placement 4 Bubble Motion Process
4 Conclusion
References
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud
1 Introduction
2 Related Works
2.1 Cross-Domain Access Control Mechanism
2.2 Secure Roaming Authentication
3 Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud
3.1 Cross-Domain Access Data Flow Model in Cloud
3.2 Pre-authorization Usage Control Mechanism for Attribute Updates in Access Execution (UCONpreA2)
3.3 Attribute Mapping Mechanism
4 Deployment and Implementation of Cross-Domain Access Control in Cloud
4.1 Deployment of Cross-Domain Access Control in Cloud
4.2 Implementation of Local Access Control
4.3 Implementation of Cross-Domain Access Control
5 Use Case and Performance Analysis
6 Future and Prospect
References
Situation and Suggestion of Geology and Mineral Resources Standardization
1 Introduction
2 Status of Standardization of Geology and Mineral Resources at Home and Abroad
2.1 Domestic Situation
2.2 Overseas Situation
3 Relevant Policies of Geology and Mineral Industry in China
3.1 Jiangsu Province
3.2 Qinghai Province
4 Suggestions on Standardization of Geology and Mineral Resources
4.1 Establish an Applicable Standard System of Geology and Mineral Resources to Support the High-Quality Development of Geology and Mineral Industry
4.2 Carrying Out the Standardization Work of Geological and Mineral Associations to Inspire the Role of Associations
4.3 Participating in or Leading International Standardization Activities in the Field of Geology and Mineral Resources Actively and Enhancing the Voice and Influence of International Standards in the Field of Geology and Minerals in China
4.4 Making Strategic Planning for Standardization of Geology and Mineral Resources
References
Commodity Sales Data Analysis Based on Qoo10 Platform
1 Introduction
2 Current Situation of Cross-Border E-commerce in Singapore
3 Qoo10 Brief Introduction and Common Promotion Tools
4 Operation Planning of Dehumidifier in Qoo10
4.1 Selection Suggestions
4.2 Operational Planning
4.3 Results Analysis
5 Proposal
6 Conclusion
References
Design of Temperature Detection Systems Based on Wireless Transmission
1 Introduction
2 System Structure
3 Design of Hardware Circuit
3.1 STC89C52 Minimal System Design of Single Chip Microcomputer
3.2 Wireless Communication Module Design
3.3 LCD Display Module Design
3.4 Temperature Detection Module Design
4 Design of System Software
4.1 Lower Computer Software Design
4.2 Upper Computer Software Design
5 System Integration and Implementation
5.1 Monitoring Platform Based on Single Chip Microcomputer
5.2 Wireless Communication Test
5.3 Upper Computer Communication Test
6 Conclusion
References
Status Quo and Countermeasures of Students’ Learning Behaviors in Higher Vocational Colleges Under the Internet Age—Based on the Questionnaire Survey of 1248 Vocational College Students
1 Introduction
2 Internet Age Learning Characteristics
2.1 The Difference Between the Environment of the Internet Society and the Traditional Era
2.2 The Internet Environment Has Injected New Features and New Advantages into Learning
3 The Status Quo and Characteristics of Students’ Learning Behavior in Higher Vocational Colleges
3.1 The Status Quo of Students’ Learning Behavior in Higher Vocational Colleges
3.2 Analysis of the Characteristics and Causes of Students’ Learning Behaviors in Higher Vocational Colleges
4 Thinking and Countermeasures
4.1 Enhance Learning Motivation, Improve Self-Learning Ability, and Use Internet Resources to Learn and Develop Good Habits
4.2 Rebuilding the “Organic Solidarity” Education Group by Using the Internet
4.3 Combining Internet Technology to Improve the Rational Science of Real-Time Interaction Between the Subject and Object of Education
4.4 From a Single Professional Standard to a Comprehensive Education Learning Environment for Building a Comprehensive Quality
5 Conclusion
References
Structural Design of Snapping Machine of Brittle Materials and Its Virtual Development
1 Introduction
1.1 Structure Design Process of Brittle Material Snapping Machine
1.2 Theoretical Basis of Bar Snapping Design
1.3 Structural Design
2 Virtual Development of Brittle Material Snapping Machine
2.1 Establish a Virtual Model of Brittle Material Snapping Machine
2.2 Dynamic Analysis of Brittle Material Snapping Machine
3 Conclusion
References
Design Idea of Professional Talent Evaluation System Based on Mobile Internet
1 Introduction
2 Design and Composition of Professional Talent Evaluation System
3 System Function Analysis
4 System Reliability and Security
5 Professional Talent Evaluation System Test
6 Conclusion
References
Research and Practice on Diagnosis of Civil Engineering Majors Based on EFQM Excellence Model Analysis
1 Introduction
2 Model Establishment and Analysis
2.1 Evaluation Model Based on EFQM Excellent Model
2.2 Quantification
3 Conclusions and Conclusions
3.1 Conclusion
3.2 Summary
References
Application of Network Score System for Sports Achievements
1 Introduction
2 Application Computer to Calculate and Manage Sports Scores
2.1 Method of Using Computer to Calculate and Manage Student Sports Performance
2.2 Application of Excel to Realize the Calculation and Management Method of College Students’ Sports Achievements
3 Sports Performance Network Scoring System
4 Student Online Rating Implementation
4.1 System Maintenance
4.2 Evaluation of Results, Entry
4.3 Statistics and Inquiries of Results
5 Summary
References
Forecast and Model Establishment of Urban Rail—Transit Passenger Flow
1 Introduction
2 Method
2.1 Grey Model Method
2.2 Artificial Neural Network Prediction Method
3 Experiment
4 Results and Discussion
5 Conclusion
References
Innovation and Entrepreneurship Education in Higher Vocational Colleges Under Big Data
1 Introduction
1.1 The Problems Existing in Students’ Innovation and Entrepreneurship
1.2 Transform Ideas of Innovation and Entrepreneurship Education
2 Establish the Application Framework of Big Data in Innovation and Entrepreneurship Education
3 Determine the Application Content and Process of Big Data in the Innovation and Entrepreneurship Education
4 Summary
References
Using Computer Information High Technology to Improve Waterproofing and Drainage of Panel Bulk Dam
1 Introduction
2 Building Information Modeling
3 Analysis of Existing Problems in Prevention and Drainage Optimization of Surface Piles
4 Optimization Measures
4.1 Reasonable Design of Fill Soil
4.2 Use of BIM Technology
4.3 Construction of WBS in the Face Pile Dam
4.4 Construction of the BIM 3D Model for the Face Rockfill Dam
5 Conclusion
References
Establishment of a Data Mining System for Estimating the Medical Cost of Renal Transplantation
1 Introduction
2 Construction of Data Mining System
2.1 Statistical Description
2.2 Data Mining Model
2.3 System Application
2.4 System Development
3 Conclusion
References
Application and Innovation of Computer Internet of Things Technology in Logistics
1 Introduction
2 The Relation Between Computer Internet of Things Technology and Logistics Application
2.1 The Impact of Internet of Things on Logistics
2.2 Implications of Internet of Things and Logistics Industry
2.3 Three Levels of Logistics Industry Integration Based on Internet of Things
3 Problems of Internet of Things in Logistics
3.1 Internet of Things Technology Needs to Be Improved
3.2 Internet of Things Technology Enhances Information Security
3.3 The Quality of Logistics Managers Is Low
4 Application and Innovation of Computer Internet of Things Technology in Logistics
4.1 Innovation of Computer Internet of Things Technological Level
4.2 Strengthen the Construction of Logistics Information Security
4.3 Training of Internet of Things Professional and Technical Talents
4.4 Formulating Normative Logistics Management Ideas
5 Conclusion
References
Significance of Embedded Linux to the Development of Internet of Things Under the Background of New Science
1 Introduction
2 The Current Situation and Trend of the Development of Internet of Things by Embedded Linux at Home and Abroad
2.1 Status Quo Abroad
2.2 Current Situation in China
2.3 Development Trends at Home and Abroad
3 Application of Embedded Linux in Internet of Things Under the Background of New Science
3.1 Application of Embedded Intelligent Sensor in Internet of Things
3.2 Application of Embedded RFID Technology in Internet of Things
3.3 Application of Embedded Intelligent Technology in Internet of Things
4 The Significance of Embedded Linux to the Development of Internet of Things
4.1 Determine the Knowledge System, Curriculum System and Curriculum Standard of Linux Course
4.2 Innovating the Teaching Method and Classroom Organization Form of “Linux Operating System” Course of Engineering Internet of Things
4.3 Integrated Training of Linux-Related Courses Serving Industry
5 Summary
References
Platform of Examination Information Resources in Colleges and Universities Based on Big Data Deep Mining Technology
1 Introduction
2 Changes of Examination Information Resources in Colleges and Universities in Big Data Era
2.1 Quantification of Examination Information Resources Data in Colleges and Universities
2.2 Deep Mining of Examination Information Resources in Colleges and Universities
2.3 Visualization of the Examination Information Resources Push in Colleges and Universities
3 Key Technologies of Mining Deeply the Examination Information Resources of Colleges and Universities in Big Data Era
3.1 Distributed Processing Technology of Big Data
3.2 Vector Space Model
3.3 Clustering Algorithm
4 Realization of Examination Information Resource Platform in Colleges and Universities Based on Big Data Deep Mining Technology
4.1 Physical Layer
4.2 Cloud Platform Layer
4.3 Application Layer
5 Summary
References
The Impact Factors of International Navigation Talents Based on AHP
1 Background
2 The Impact Factors of International Navigation Management Talents
3 Principles of Establishing Evaluation Index System for International Maritime Management Talents
4 Analytic Hierarchy Process (AHP)
5 Establish Judgment Matrices
6 Conclusion
References
Application of Information Technology in the Problems and Countermeasures of Kindergarten Science Education
1 Introduction
2 Problems Existing in Science Education in Kindergartens
2.1 Science Education Is Equated with Knowledge Education
2.2 Science Education Is Considered to Shorten Childhood Education as Much as Possible
2.3 Science Education Is Regarded as Adult Educator-Led Education
3 Strategies to Change the Current Situation of Science Education in Kindergartens: “Children-Oriented”
3.1 Children-Oriented Goals of Science Education in Kindergartens
3.2 Children-Oriented Content of Science Education in Kindergartens
3.3 Children-Oriented Approach to Science Education in Kindergartens
3.4 Children-Oriented Evaluation of Science Education in Kindergartens
References
Construction of University’s Innovation and Entrepreneurship Education Ecosystem Based on Computer Network Platform
1 Introduction
2 University I-E Education Ecosystem Based on Computer Network Platform
2.1 Overview of Computer Network Platforms and Educational Ecosystems
2.2 Constructing the Connotation of University’s I-E Education Ecosystem Based on Computer Network Platform
2.3 The Significance of Constructing the Ecosystem of I-E Education
3 Problems in the Ecosystem of I-E Education in Colleges and Universities
3.1 Strengthening Innovation, Entrepreneurship Education and Entrepreneurship Training
3.2 The Government’s Effective Support Is not Enough
3.3 Weak Awareness of Entrepreneurship and Inadequate Publicity and Education
4 Construction and Practice of I-E Education Ecosystem Platform
4.1 The Construction Process of Internal Integration
4.2 Construction Process of External Assistance
4.3 Construction Model of Internal and External Integration Mechanism
5 Conclusion
References
A Unified Unstructured Data Storage System Under Cloud Computing Environment
1 Introduction
2 The Overall Structure of USN
3 System Design
3.1 File Service
3.2 Application-Level Storage
3.3 USN Unified Storage
4 System Evaluation
4.1 Testing Environment
4.2 Functional Test
4.3 Performance Test
5 Conclusion and Prospect
References
Classification and Pruning Strategy of Knowledge Data Decision Tree Based on Rough Set
1 Introduction
2 Classification Accuracy and Branch Shear Theory Based on Decision Tree Method
3 Mining Method of Association Rules in Decision Tree Classification
4 Classification and Pruning Strategy of Knowledge Data Decision Tree Based on Rough Set
5 Conclusion
References
Teaching Strategies of Literature Courses in the New Media Technology Environment
1 Introduction
2 Analysis of the Current Situation of Literature Course Teaching
2.1 The Practicability of Teaching Content Based on Theoretical Courses Is Low
2.2 The Content of Teaching Neglects the Development Needs of Students
3 Opportunities and Challenges of the Development of New Media Technology to the Teaching of Literature Courses
3.1 Opportunities for the Development of Literature Course Teaching in the New Media Technology Environment
3.2 Challenges of New Media Technology to the Teaching of Literature Courses
4 The Innovative Path of Literature Course Teaching Under the New Media Technology Environment
4.1 Constructing the Innovative Teaching Model Combining Virtual and Reality in the New Media Environment
4.2 Establishing Professional Courses of New Media Literature
4.3 Building a Platform for Online Interactive Learning
5 Conclusions
References
On the Teaching Reform of Mathematics Course in Independent Colleges
1 Introduction
2 Team Settings and Course Features
3 Innovative Reform Measures
3.1 Transformation of Educational Philosophy
3.2 Integrating Mathematical Modeling Ideas and Increasing Mathematics Practice Projects
3.3 Innovating the Teaching Mode of Flipping Classroom
3.4 Implementing Case-Driven Teaching Methods to Improve Teaching Effectiveness
3.5 Promote the Development of “Online and Offline” Teaching Methods with the Support of Networked Teaching Construction
3.6 Transformation of Assessment Methods
4 Resource Construction
4.1 Construction of Micro-curricular Resource Library
4.2 Teaching Material Construction
4.3 Online and Offline Course Resources Construction
4.4 Construction of Courseware Resource Library
4.5 Boutique Online Open Courses and Question Bank
5 Conclusion
References
Adaptive Sliding Mode Control for Unmanned Surface Vehicle with Fuzzy Switching
1 Introduction
2 USV Plane Motion Model
3 Designing Adaptive Sliding Mode Control of USV Based on Fuzzy Switching
3.1 Designing Sliding Mode Switching Function
3.2 Sliding Mode Adaptive Control Design Based on Fuzzy Approximation
4 Simulation
4.1 Simulation Object
4.2 Condition Setting
4.3 Simulation Results and Analysis
5 Conclusion
References
Application and Strategy of Internet of Things (IOT) in College Education Informationization
1 Introduction
2 Research on University Education Informatization and IOT Technology
2.1 The Concept of Informatization of Higher Education
2.2 IOT Technology
3 The Application Status of IOT in the Informationization of University Education
3.1 University Teaching Informationization Based on IOT Technology
3.2 Intelligent Library Based on IOT Technology
3.3 Information Management Based on IOT Technology
4 Application Strategy of University Informationization Based on IOT Technology
4.1 Build an Information Environment for Universities and Colleges Based on IOT Technology Vigorously
4.2 Vigorously Strengthen the Construction of Educational Information Based on IOT Technology
4.3 Strengthen Personalized Services Based on IOT Technology Vigorously
5 Conclusion
References
Influence of Inductance Parameters on Intelligent Control of Buck Converter
1 Introduction
2 The Basic Principle of Buck Converter
3 Simulation Model of the Buck Converter
4 Analysis of Simulation Results
5 Conclusion
References
Research and Development of Remote Monitoring System for High-Speed Rail Protective Fence Gate
1 Introduction
2 System Design
2.1 Design Plan
2.2 Research and Design of Gate Condition Monitoring Device
2.3 Design of Transmitting Module and Receiving Module
3 Design of PC Software
4 Conclusion
References
Integration of Information Technology and Three-Dimensional Teaching Mode
1 Introduction
2 Overview of Information Technology Concepts
3 Main Problems in the Three-Dimensional Teaching in Environmental Design
3.1 Teacher Construction Method in Traditional Model Falling Behind Social Development
3.2 Insufficient Links Between Universities and Enterprises
3.3 Absence and Dismal Effect of Evaluation Mechanism in the Internship Process
3.4 Insufficient Satisfaction for Students
3.5 Inadequate Cognition of Teachers Toward the Three-Dimensional Teaching
3.6 Waste of Three-Dimensional Teaching Resources
4 The Application of Information Means in the Three-Dimensional Teaching Process in Environmental Design Major
4.1 Strengthening the Connection Among Colleges and Universities, as Well as Their Connection with Enterprises, to Exchange Resources and Information and Jointly Build a Teaching Resource Library
4.2 Enhancing Teaching Level by Information Means
4.3 Improving the Internship Platform Mechanism and Supervision Measures
4.4 Improving Requirements in Major Practice by Combining Virtual Technology with Teaching Laboratory
5 Summary
References
Research and Practice of Laboratory Safety Management Mode
1 Problems in Laboratory Management
1.1 The Management Model Is Lagging Behind, and the Management System Is Flawed
1.2 The Laboratory Has Certain Safety Hazards, and the Specific Health Conditions Are Poor
2 Objectives of Laboratory Management
2.1 Standardization of Management System
2.2 Daily Safety Management
2.3 Electronic Management of Laboratory Equipment
2.4 Networking of Experimental Teaching Content Management
3 Conclusion
References
Dynamic Model Average for Stock Index Return
1 Introduction
2 eDMA Framework
2.1 DMA Framework
2.2 eDMA Framework
2.3 Output of eDMA
3 Empirical Analysis
3.1 Predictor Selection and Model Establishment
3.2 Experimental Result
3.3 Comparison of Results
4 Conclusion
References
Challenges and Countermeasures of Intellectual Property Rights in Network Environment
1 Introduction
2 Challenges of Intellectual Property Rights in the Network Environment
2.1 The Author Are Unaware of Information Embezzlement and Infringement by Using Network Technology
2.2 The Identification of Intellectual Property Rights Infringement Is More Difficult, the Harm of Crime Is Greater and the Difficulty of Protection Is Increased
2.3 Lack of Laws and Weak Awareness of Intellectual Property Protection
3 Countermeasures of Intellectual Property Rights in Network Environment
3.1 Build Network Protection System
3.2 Legislative Protection
3.3 Administrative Protection
3.4 Raise Awareness of Intellectual Property Protection
3.5 Technical Protection Measures
4 Summary
References
Personalized Distribution Recommendation Model of Dormitory Based on Deep Learning
1 Introduction
2 Existing Research Work
3 Deep Learning Model Construction
3.1 Artificial Intelligence
3.2 Deep Learning
3.3 Model Building
4 Design of Recommendation Model for Dormitory Personalization
4.1 Similarity
4.2 Pearson Coefficient
4.3 Feature Analysis and Matrix Construction
5 Experimental Design and Analysis
6 Conclusion
References
Time-Limited Tour Planning Based on Ant Colony Optimization Algorithm
1 Introduction
2 Shortest Path Specification Model Based on Ant Colony Optimization Algorithm
2.1 Model Principle
2.2 Modification
2.3 Modeling Steps
3 Times Allocation Based on Shortest Path Specification Model
3.1 Case Background
4 Conclusion
References
Fungus Bacteria Bag Density Detection System Based on Image Processing Technology
1 Introduction
2 Fungus Bacteria Bag Density Detection System
2.1 Fungus Bacteria Bag Mass Measurement System
2.2 Digital Image Processing Technology
2.3 Image Processing
2.4 Measurement of the Geometrical Dimensions of the Bacteria Package
3 Experimental Results and Analysis
4 Conclusion
References
Application of Information Technology in Clinical Education
1 Introduction
2 Suggestions
2.1 Comprehensive Integration of Teaching Informatization and Teaching Process
2.2 Stimulation of Students’ Interest in Learning
3 Problems and Analysis of the Application of Information Technology in Clinical Teaching
3.1 Ignorance of Students’ Initiative
3.2 Improvement of Clinical Teachers’ Information Literacy
3.3 Construction of Teaching Network Resources
4 Conclusion
References
Optimization of Fermentation Medium of Camphor Lucidum Based on Artificial Neural Network and Genetic Algorithm
1 Introduction
2 Materials and Methods
3 Results and Analysis
4 Conclusion
References
Design and Implementation of Speech Recognition System Based on Gesture Control
1 Introduction
2 Basic Principles of Speech Recognition System Based on Gesture Control
2.1 System Hardware Circuit Design
2.2 System Software Design
3 Training Results and Analysis of Neural Network
3.1 Training Process of Neural Networks Results
3.2 Results and Analysis
4 Conclusions
References
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective
1 Introduction
1.1 Research on Effects of Electromagnetic Field Exposure
1.2 Biological Effects of Electromagnetic Field Exposure
2 Epidemiologic Studies
2.1 Association with Neurodegenerative Disease
2.2 The Effect on Mental Behavior
3 Volunteer Studies
4 Animal Studies
4.1 Effects on Cognitive Function and Behavioral Changes
4.2 Effects on Cell Viability
5 Conclusions and Suggestions
References
Digital Watermarking Hiding Technology for Copyright Information
1 Introduction
2 Basic Principles of Information Hiding
2.1 Information Hiding Model
2.2 Classification of Information Hiding Technology
2.3 Specific Application of Information Hiding
2.4 Information Hiding Characteristics
3 Classification of Digital Watermarking Technology
3.1 Watermarking Classification on Vectors
3.2 Watermarking Classification on Loading Method
3.3 Classification from Watermarking Characteristics
4 Rms of Digital Copyright Information Randomization of
4.1 Digital Watermarking
4.2 Digital Watermark Amplitude Shaping
4.3 Digital Watermarking Whitening Filter
5 To Sum Up
References
English Teacher Information Resource Affordances in the Context of Big Data
1 Introduction
2 Important Concepts
2.1 The Concept and Characteristics of Big Data
2.2 Information Resource
2.3 Affordance
3 Analysis of the Characteristics of the Foreign Language Teaching in Colleges and Universities in the Era of Big Data
4 Information Resources and Foreign Language Teachers in the Era of Big Data
5 Analysis of English Teachers’ Information Resources in the Era of Big Data
6 Conclusion
References
How Does SEW Drive Innovation in an Internet Family Firm?
1 Introduction
2 Theoretical Research
2.1 SEW
2.2 SEW and Internet Family Firm Innovation
3 Empirical Research
3.1 Measurement of Main Variables
3.2 Model Analysis and Estimation Methods
4 Summary
References
Construction and Application of Information Management System in Road and Bridge Engineering Construction
1 Introduction
2 Theoretical Research on Information Management System of Way and Bridge Engineering Construction
2.1 Concept of Way and Bridge Engineering Project Information Management System
2.2 Supporting Technology for Engineering Construction Information Management
2.3 Characteristics of Road and Bridge Engineering Construction Information Management System
3 The Status Quo and Problems of Information Management Development in the Construction of Road and Bridge Engineering in China
3.1 Informatization Management System Function Is Not Comprehensive
3.2 Information Release and Update Are not Timely
3.3 Road and Bridge Engineering Project Construction Management Personnel Cannot Adapt to the Requirements of Informationization
4 Construction and Application of Way and Bridge Engineering Construction Management Information System
4.1 Establishment of Indicators for Information Management System of Way and Bridge Engineering Construction
4.2 Establishment of a Comprehensive Model of Engineering Construction Management Information System
4.3 Application of Construction Project Management Information System
5 Conclusion
References
Control Mechanism of Network Public Opinion on Emergencies in Big Data Era
1 Introduction
2 Emergencies in Big Data Era
2.1 The Representation of Network Public Opinion on Emergencies in Big Data Era
3 The Control Mechanism of Network Public Opinion on Emergencies in Big Data Era
3.1 Horizontal Dimensions—Improve Government Decision-Making Capacity
3.2 Vertical Dimension—Accurate Control of Public Opinion in the Network
4 Summary
References
Decision-Making Analysis of Prognosis of Renal Transplant Recipient on the Base of Data Mining
1 Data Mining Can Help Find New Prognostic Factors
1.1 Conventional Prognostic Factors
1.2 Problems Discovered by the New System
2 Data Preprocessing
3 Design of Temperature and Humidity Auto-Control System
3.1 Data Reduction
3.2 Data Cleaning
3.3 Data Transformation
3.4 Decision Tree Analysis of Renal Transplant Recipient Survival
3.5 System Application
4 Conclusion
References
Application of Virtual Technology in the Management of Computer Laboratories in Multi-campus Colleges and Universities
1 Introduction
2 Application of Virtualization Technology in Computer Laboratory
2.1 Virtualization Technology
2.2 Virtual Machine Software
2.3 Desktop Virtualization Technology
3 Advantages of Virtualization Technology in the Management of Computer Laboratories in Multi-campus Universities
3.1 Improve Management Efficiency
3.2 Reducing Management Cost
3.3 Management and Maintenance Work
3.4 Unified Desktop Environment
3.5 Data Information Security
3.6 Software Compatibility No Longer Limited
4 Application Exploration and Practice of Desktop Virtualization Technology
4.1 Desktop Virtualization Technology
4.2 Framework of Desktop Virtualization Technology
4.3 Application of Desktop Virtualization Technology in Computer Laboratory Construction
5 Summary
References
Construction of a New Home Decoration Design Network Sharing Platform
1 Introduction
2 New Home Decoration Design Network Sharing Platform
2.1 Definition of New Home Decoration Design Network Sharing Platform
2.2 New Home Decoration Design Network Sharing Platform Features
2.3 The Influence and Role of the New Home Decoration Sharing Platform
3 The Realization of the New Home Improvement Network Sharing Platform
3.1 Disadvantages of Traditional Home Improvement
3.2 The Necessity of Building a New Home Improvement Design Network Platform
3.3 Construction and Management of Information Sharing System
4 New Home Decoration Design Network Sharing Construction
4.1 Strengthening the Understanding of Information Construction in the New Decoration Sharing Platform
4.2 Establishment of LAN and External Promotion Website of the Platform
4.3 Developing Information Education to Train Information Talents
5 Conclusion
References
Dimension Reduction Algorithm of Big Data Based on Deep Neural Network
1 Introduction
2 Deep Learning Method Theory
2.1 Feature Transformation
2.2 Dimension Reduction
3 Dimensionality Reduction Model Based on DRBM
4 Simulation Experiment
4.1 Simulation Experiment
4.2 Simulation Analysis
5 Conclusion
References
Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree
1 Introduction
2 Research on Extraction Method of Association Rules Based on Data Mining
3 Application and Analysis of Tree Pruning Technology in Decision Tree Method
4 Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree
5 Conclusion
References
Influence of New Media Technology on the Transformation Path of Party Newspaper
1 Characteristics of Party Newspapers
1.1 Advantages of Party Newspapers
1.2 Disadvantages of Party Newspapers in the New Media Era
2 The Necessity of the Transformation and Development of Party Newspapers
2.1 Survival and Development Needs
2.2 Self Mission Responsibility
3 The Promoting Role of New Media Technology in the Transformation of Party Newspapers
3.1 The Role of Innovative Ideas
3.2 The Role of Technological Innovation
3.3 The Innovative Function of Operational Mode
4 Ways for Party Newspapers to Adapt to the Development of New Media Technology
4.1 King Content
4.2 Technical Support
4.3 Structural Reform
5 Conclusions
References
Application of NB Technology in IoT
1 Overview of the IoT
2 Application of NB-IoT Technology in Smart Manhole Cover
3 Application of NB-IoT Technology in Intelligent Streetlight
4 Application of NB-IoT Technology in Smart Home
5 Application of NB-IoT Technology in Intelligent Logistics
6 Conclusion and Prospect
References
Implementation of Medical Disputes Information System
1 Introduction
2 Medical Dispute Information
3 Existing Problems
3.1 Restrictions on Exchange of Information
3.2 Short of Capital and Technology Investment
3.3 Non-standard Information System
4 Solutions and Suggestion
4.1 Unified Platform
4.2 Combined with Practical Application
5 Main Principles of Technology
6 Conclusion
References
Research and Implementation of RSA IP Core Based on FPGA
1 Introduction
2 RSA Algorithm
3 Montgomery Fast Modular Multiplication Algorithms
4 Design
4.1 Module Control
4.2 Module Inverter
4.3 Module ModExp
5 Simulation
6 Synthesis
7 Conclusion
References
Innovation and Entrepreneurship Education in Higher Vocational Colleges Under the Background of “Internet+”
1 Introduction
2 Existing Circumstances of Innovation and Entrepreneurship Education
3 The Construction of the Innovation and Entrepreneurship Education System
3.1 Construction the Curriculum System
3.2 Constructing the Entrepreneurial Practice
3.3 Constructing Network Platform
4 Summary
References
Influencing Factors and Adaptive Strategies of Electric Power Demand in the “New Normal” Environment of Economy Operation
1 Introduction
2 Influencing Factors of Electric Power Demand in the “New Normal” Environment of Economy Operation
2.1 Demand-Side Factors
2.2 Supply-Side Factors
2.3 Energy Structure Adjustment
3 Adaptive Strategies of Electric Power Demand in the “New Normal” Environment of Economy Operation
3.1 Striving for Related Policies for Electric Power Substitution
3.2 Improving the Service Level of Electricity Consumption in the Tertiary Industry
3.3 Expanding the Electricity Market and Paying Attention to the Development Quality
4 Summary
References
Application of Intelligent Control in Medical Education
1 Introduction
2 Significance of Intelligent Control in Medical Education
2.1 Analysis of Teaching Effect
2.2 Cultivation of Students’ Ability of Scientific Research
3 Existing Problems and Solutions of Intelligent ECS
4 Simulation Teaching Integrates Knowledge and Professional Skills
5 Developing Comprehensive Teaching Programs
6 Academic Steering Committee
7 Conclusion
References
Network Security and Intelligence Analysis Based on Big Data
1 Introduction
2 Big Data Technology Applied in Network Security and Intelligence
2.1 Big Data Processing Technology
2.2 Big Data Analysis Technology
3 The Application of Big Data Technology in Network Security and Intelligence Analysis
3.1 Network Anomaly Detection
3.2 Network Security Situational Awareness
3.3 Cyber Threat Intelligence Analysis
4 Research Trends in Network Security and Intelligence Analysis
4.1 Research on Advanced Network Threat Discovery Methods
4.2 Research on Complex Network Attack Prediction
4.3 Research on Network Security Threat Situational Awareness Technology
4.4 Threat Intelligence Acquisition and Perception Issues
5 Conclusion
References
Conflict and Balance Between Big Data Investigation and Personal Information Protection
1 Introduction
2 Application Requirements for Investigative Measures in the Context of Big Data
2.1 Application Theory of Investigative Measures in the Context of Big Data
2.2 Feasibility of Application of Investigative Measures in the Context of Big Data
3 Reasons for Conflicts Between Big Data Investigation Mode and Citizens’ Personal Information Protection
3.1 The Lack of Law, the Protection of Personal Information Rights Is Difficult to Find Legal Basis
3.2 The Risk of Disclosure and Theft of Citizen Information Data in the Big Data Detection Mode
3.3 Investigator’s Ideological Cognition in the Big Data Investigation Mode
4 Protection of Citizens’ Personal Information Rights Under the Big Data Investigation Mode
4.1 Introduce Relevant Laws to Protect the Protection of Citizens’ Personal Information Rights
4.2 Strictly Regulate the System of Acquisition, Inspection and Use of Citizens’ Personal Information by Investigators
5 Conclusion
References
Influence of “Internet +” on the Development of Campus Baseball and the Countermeasure
1 Introduction
2 Problems Existing in Traditional Campus Baseball
2.1 Traditional Campus Baseball Teaching Is not Conducive to the Cultivation of Special Skills
2.2 Traditional Campus Baseball Teaching Is not Conducive to the Cultivation of Tactical Consciousness
3 The Development of Campus Baseball in the Era of “Internet +”
3.1 Establishment of Intelligent Baseball Teaching System on Campus
3.2 Application of Internet Teaching Methods
3.3 Establish a New Teaching Quality Assessment System
4 Conclusion
References
Application of the Computer Aided Drawing in the Wall Painting Artistic Creation
1 Characteristic and Connotation of the Computer Aided Drawing Technology
2 Application Background of the Computer Aided Drawing in the Art Creation of Wall Paintings
3 Application Method of the Computer Aided Drawing in the Wall Painting Art Creation
4 Application Strategy of the Computer Aided Drawing in the Wall Painting Art Creation
4.1 Application in the Descriptive Geometry
4.2 The Application in the Reading Combination Solid View
4.3 Design Steps
5 Conclusion
References
Accurate Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining
1 Definitions and Characteristics of the Multi-agent System and the Data Mining
1.1 Definition and Characteristics of the Multi-agent System
1.2 Definition and Characteristics of the Data Mining
2 Design Background of the Precise Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining
3 Key Points of the Accurate Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining
4 Precise Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining
4.1 Model Evaluation Criteria
4.2 Selection of the Test Data Sets
4.3 Model Evaluation and Comparison
5 Conclusion
References
Construction of the Integrated Network Service Platform for Smart City Community Home Care Under the Background of “Internet+”
1 Construction Background of the Comprehensive Network Service Platform for the Smart City Community Home Care Under the Background of the “Internet+”
1.1 Status Quo of the Internet + Home Care
1.2 The Dilemma of the Home Care for the Aged in the Era of the Internet+
2 Construction of the Integrated Network Service Platform for the Smart City Community Home Care Under the Background of the “Internet+”
3 Construction of the Integrated Network Service Platform for the Smart City Community Home Care Under the Background of the “Internet+”
3.1 Living Service Platform
3.2 Platform for Seeking Medical Advice
3.3 Community Announcement Platform
3.4 Technical Proposal
3.5 Operation Design
4 Conclusion
References
Mountain Monitoring System Based on the Digital Photogrammetry and the Component GIS
1 Design Background of the Mountain Monitoring System
2 GIS Overview
2.1 Significance of the GIS Data Updating
2.2 Main Contents of the GIS Data Updating
3 Principle of the Digital Photogrammetry
4 Mountain Monitoring System Based on the Digital Photogrammetry and the Component GIS
4.1 System Goals
4.2 Design of the Slope Monitoring Database
4.3 System Function Module
4.4 Key Technologies of the System Implementation
4.5 Component GIS Technology
5 Conclusion
References
Simulation Study on the Geographical Adaptability of the Large-Scale Cultural Buildings in Shanshui Cities Based on the VR Technology
1 Application of the VR Technology in the Geographical Adaptability Simulation of Large Cultural Buildings in Shanshui Cities
2 Geographical Adaptability Simulation of the Large-Scale Cultural Buildings in Shanshui Cities Based on the VR Technology—A Case Study of Chongqing Grand Theater
2.1 Basic Situation of Chongqing Grand Theatre
2.2 Architectural Design
2.3 Structure
2.4 Ventilation and Heat Dissipation
2.5 Lightning and Rain Protection
2.6 Seismic Resistance
3 Research on the Geographical Adaptability of the Large-Scale Cultural Buildings in Shanshui Cities Based on the VR Technology
4 Conclusion
References
The Innovation of the Mobile Intelligence Terminal in Foreign Language Teaching Under the Background of the Internet
1 Terminal Technologies in the Background of the Mobile Internet
1.1 Touch Screen Technology
1.2 Voice Processing Technology
2 The Application Background of the Mobile Intelligence Terminal in Foreign Language Teaching Under the Background of the Internet
3 Changes in the Application of the Mobile Intelligence Terminals in the Foreign Language Teaching Under the Background of the Internet
3.1 The Changes of Students’ Thinking and Behavioral Patterns
3.2 Increased Difficulty in the Classroom Teaching Management
3.3 Teaching Objectives and Tasks Are Difficult to Accomplish
3.4 Students’ Identity with Teachers Decreased
4 Innovation Strategies of the Mobile Intelligence Terminals in the Foreign Language Teaching Under the Background of the Internet
4.1 English Vocabulary Learning Based on the Mobile Internet
4.2 Creating English Contexts with Smart Phones
4.3 Socialize the English Teaching Methods
5 Conclusion
References
Design of the Ideological and Political Education Platform for College Students Based on the Mobile App
1 Design Background of the Ideological and Political Education Platform for College Students Based on the Mobile App
2 Design Necessity of the Ideological and Political Education Platform for College Students Based on the Mobile App
2.1 Campus APP Develops Rapidly
2.2 The Campus APP Meets the Requirements of the Carrier Construction of the Ideological and Political Education
3 Design of the Ideological and Political Education Platform for College Students Based on the Mobile App
3.1 Expanding the Time and Space of the Ideological and Political Education for College Students
3.2 Enriching the Contents of the Ideological and Political Education for College Students
4 Design Strategies of the Ideological and Political Education Platform for College Students Based on the Mobile App
4.1 Setting up the News Block in the Mobile App Platform
4.2 Establishing the Application Plate of Student’s Learning and Life
4.3 Setting up the Download Thematic Section
4.4 Establishment of the “Volunteer” Experience Plate
4.5 Establishing the Credit System of Reward and Achieving the Combination of the Teaching Practice
5 Conclusion
References
Application Effect of the Computer Remote Network System in the Comprehensive ICU Nursing Intervention Mode
1 The Method and Contents of the ICU Nursing Intervention Model
2 Application of the Computer Remote Network System in the Comprehensive ICU Nursing Intervention Model
2.1 Application of the Computer Remote Network System in the ICU Nursing Intervention Model
2.2 Design Ideas of the ICU Information Management System
2.3 Basic Framework of the ICU Information Management System
2.4 Application of the ICU Information Management System
3 Application Effect of the Computer Remote Network System in the Comprehensive ICU Nursing Intervention Mode
4 Conclusion
References
Application of the Computer Database Software in the ICU Nursing Medical Records Administration
1 Application Background of the Computer Database Software in the ICU Nursing Medical Record Administration
2 Application Value of the Computer Database Software in the ICU Nursing Record Administration
3 Application Measures of the Computer Database Software in the ICU Nursing Record Management
4 Discussion
References
Design and Research of the Intelligent Aquaculture Monitoring System Based on the Internet of Things
1 Intelligent Aquaculture Monitoring System Based on the Internet of Things
2 Design Function of the Intelligent Aquaculture Monitoring System Based on the Internet of Things
2.1 Monitoring Function of the Aquaculture Environment
2.2 Monitoring Function of the Growth Status of Aquaculture Animals
3 Design and Research of the Intelligent Aquaculture Monitoring System Based on the Internet of Things
3.1 Problems to Be Solved by the System
3.2 The Overall Design Objective of the System
3.3 Overall Composition of the Aquaculture Monitoring System
3.4 Information Monitoring of the Aquaculture Monitoring System
3.5 Intelligent Center of the Aquaculture Monitoring System
4 Test Results
5 Conclusion
References
Curative Effect Observation of the Computer-Controlled Rapid Three-Dimensional Traction for Prolapse of Lumbar Intervertebral Disc
1 Application of the Computer-Controlled Rapid Three-Dimensional Traction in the Treatment of Prolapse of Lumbar Intervertebral Disc
2 Treatment of the Prolapse of Lumbar Intervertebral Disc by the Computer Controlled Rapid Three-Dimensional Traction
2.1 Treatment Group
2.2 Control Group
2.3 Specific Preparation
3 Treatment of the Prolapse of Lumbar Intervertebral Disc with the Computer-Controlled Rapid Three-Dimensional Traction
4 Curative Effect Observation of the Computer-Controlled Rapid Three-Dimensional Traction for the Prolapse of Lumbar Intervertebral Disc
5 Conclusion
References
Computer Simulation Generation of the Humanized Music Timbre
1 Production Technology of Timbre
1.1 From the Wave Meter Timbre to the Sampled Timbre
1.2 From the Monotone Sampling to the Loop Sampling
1.3 Acquisition of the Accompanying Noise
1.4 From the Single Playing Method to the Multiple Playing Methods
2 Application of the MIDI Controller
2.1 Software MIDI Controllers
2.2 Hardware MIDI Controllers
2.3 Timbre Performance and Real-Time Control
3 Virtual Playing Tool
3.1 Playing Detection Tools
3.2 Application of the Humanized Effect Instrument
4 Conclusion
References
Application of the Japanese Teaching Methods Based on the Network Multimedia
1 The Application Background of the Japanese Teaching Method Based on the Network Multimedia
2 Advantages of the Network Multimedia in Japanese Teaching
3 Application Mechanism of the Japanese Teaching Method Based on the Network Multimedia
3.1 Using the Multimedia to Innovate the Teaching System
3.2 Make Full Use of the Multimedia Technology to Open up the Second Classroom
3.3 Using the Modern Information Technology to Develop the Networked Japanese Teaching
4 Conclusion
References
On the Network Security Prevention Under the Development of the Information Technology
1 The Background of the Network Security Prevention Under the Development of the Information Technology
2 Current Situation of the Network Security Under the Development of the Information Technology
3 Common Network Security Strategies Under the Development of the Information Technologies
3.1 Physical Security Policy
3.2 Access Control Strategy
3.3 Information Encryption Strategy
3.4 Network Security Management Strategy
4 Conclusion
References
Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of Rheumatoid Arthritis Based on the Computer Simulation
1 Introduction
2 Study on the Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of the Rheumatoid Arthritis Based on the Computer Simulation
2.1 Material Science
2.2 Experimental Method
2.3 Curative Effect Evaluation
2.4 Treatment Method
2.5 Observation Index
3 Discussion
4 Conclusion
References
Design and Teaching Reform of Interactive Multimedia Courseware for Mechanical Drawing
1 Basic Preparation of the Interactive Multimedia Courseware for Mechanical Drawing
1.1 Applicable Tool Software
1.2 Material Acquisition for the Courseware Use
1.3 Necessary Ancillary Tools
2 Design Principles and Requirements of the Interactive Multimedia Courseware for Mechanical Drawing
2.1 Design Principles
2.2 Courseware Interactive Design
2.3 Courseware Design
3 Design and Teaching Reform of the Interactive Multimedia Courseware for Mechanical Drawing
3.1 Teaching Reform of Mechanical Drawing
3.2 Design of the Interactive Multimedia Courseware for Mechanical Drawing
4 Conclusion
References
Design and Implementation of the News Practice Teaching Platform Based on JavaWeb
1 The Design Background of the News Practice Teaching Platform Based on JavaWeb
2 Design Contents of the News Practice Teaching Platform Based on JavaWeb
3 Design and Implementation Mechanism of the News Practice Teaching Platform Based on JavaWeb
3.1 Technical Introduction
3.2 Basic Characteristics of JSP
3.3 JSP Runnin Environment
3.4 System Development Requirements
3.5 System Development Environment
3.6 System Analysis and Design
4 Conclusion
References
Research on Wi-Fi Signal Coverage and Quality of Urban Rail Transit
1 Introduction
2 Kunming Urban Rail Transit Operating Platform
3 Conclusion
References
Design of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network
1 Design Contents of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network
1.1 Evaluation of the Students’ Learning
1.2 Evaluation of the Teachers’ Teaching
1.3 Evaluation of the Curriculum
2 Design Background of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network
2.1 Providing the Decision-Making Service for Sunshine Sports
2.2 Satisfying the Diversified Demand of the Students’ Participation in Sunshine Sports
2.3 Realizing the Optimal Allocation of the School Sports Resources
3 Design Thoughts of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network
3.1 Fuzzy Comprehensive Evaluation Theory
3.2 Establishment of a Fuzzy Evaluation Matrix for Each Evaluation Objective of a Scheme
3.3 Get the Result Set of the Evaluation Targets
3.4 Several Key Problems in the Application of the Fuzzy Comprehensive Evaluation Method
3.5 Management System of Sunshine Sports
4 Conclusion
References
The Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce
1 Validity Evaluation Direction of Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the Electronic Commerce
1.1 Entrepreneur Evaluation
1.2 Evaluation of the Entrepreneurship Projects
1.3 Entrepreneurial Environmental Assessment
2 Validity Research Indicators of Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the E-commerce
2.1 Research on the Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce
2.2 Effectiveness Index of the Computer Technologies Promoting College Students’ Entrepreneurship Education Based on the E-commerce
3 Computer Technology Based on the Electronic Commerce Promotes the Innovative Strategy of College Students’ Entrepreneurship Education
3.1 Take the Ideological Education as a Guide to Stimulate the Entrepreneurship Awareness
3.2 Promoting the Entrepreneurship Through the Extracurricular Activities
3.3 Taking the Base Construction as the Carrier to Strengthen the Entrepreneurship Ability
3.4 Correct Selection of the Entrepreneurship Project, Direction and Mode
4 Conclusion
References
Application of Internet of Things Technology in Industrial Automation Control
1 Application Background of the Internet of Things Technology in the Industrial Automation Control
2 Application of the Internet of Things Technology in the Industrial Automation
2.1 Industrial Application Direction of the Internet of Things Technology
2.2 Application of the Internet of Things Technology in the Energy Saving and the Emission Reduction
2.3 Application of the Internet of Things Technology in the Product Informatization
3 Application and Promotion of the Internet of Things Technology in the Industrial Automation Control
3.1 Application of the Internet of Things Technology in the Product Informatization
3.2 Application of the Internet of Things Technology in the Safe Production
3.3 Application of the Internet of Things Technology in the Production and Manufacturing
3.4 Application of the Internet of Things Technology in the Business Management
4 Conclusion
References
The Application of Transmission Technology in Information and Communication Engineering
1 Quote
2 A Comprehensive Interpretation of the Transmission Technology
2.1 Introduction to the Concept of Transmission Technology
2.2 Channel Classification
3 The Type of Channel Determines Its Scope of Application
4 Introduction to the Characteristics of Transmission Technology
5 Introduction of Communication Engineering Related Concepts
6 The Transmission Technology Included in the Communication Engineering Is Introduced in Detail
6.1 PDH and SDH Transmission Technology
6.2 WDM and ASON Transmission Technology
6.3 Short-Distance Transmission Technology
6.4 Long Distance Transmission Technology
6.5 Application of Transmission Technology in All-in-One Computers
7 The Future Development Direction of Transmission Technology Is Discussed
7.1 Development of Current Transmission Technology in the Future
7.2 Exploration of Optical Communication Technology
7.3 The Arrival of the Era of Big Data
8 Conclusion
References
The Financial Data Prediction System Based on the Recurrent Neural Network
1 The Connotation of the Recurrent Neural Network
2 Analysis of the Types and Characteristics of the Financial Data
3 Feature Extraction of the Financial Data
3.1 Construction of the Decision Tree
3.2 Data Visualization Technology
3.3 Data Crawler Technology
4 Financial Data Prediction System Based on the Recurrent Neural Network
4.1 Optimal Crawler Algorithm
4.2 Incremental Reptilian Strategy
4.3 Data Separation Algorithms Between the Window and the Target
5 Conclusion
References
Design of the “Studio System” Practical Teaching Platform for Advertising Major Based on the Network Resources
1 Design Background of the “Studio System” Practical Teaching Platform for Advertising Major
2 Design Concept of the “Studio System” Practical Teaching Platform for Advertising Majors
2.1 Ideas and Thoughts on the Practical Teaching of Advertising Majors
2.2 Contents and Methods of the Practical Teaching in Advertising Majors
3 Design Strategies of the “Studio System” Practical Teaching Platform for Advertising Majors Based on the Network Resources
3.1 Pay Attention to the “Three-Point Teaching” in the Classroom Teaching
3.2 Draft Comparison of the Simulated Proposals
3.3 “Replace Practice with Competitions” and Combine the Contents of the Courses with the Advertising Competitions
3.4 Actively Construct the “Second Classroom”
3.5 Strengthen the Teaching Operation and Management of the “Studio System” and Form a Long-Term Mechanism
4 Conclusion
References
The Transformer Substation Scenario Modeling and Visual Perception Visualization System
1 Application Background of the Substation Scenario Modeling and Visual Perception Visualization System
2 Intelligent Requirements of the Substations
3 Analysis of the Transformation Substation Scenario Modeling and Visual Perception Visualization System
3.1 Mathematical Model
3.2 Model Analysis
3.3 SAVM System of the Transformation Substation
4 Conclusion
References
Library Information Resources Sharing Model Resources Based on Network
1 An Overview of the Library Information Resource Sharing Model
1.1 Subordinate Information Sharing Model
1.2 Alliance Information Resource Sharing Model
1.3 Social Information Resource Sharing
2 The Problems of the Library Information Resource Sharing Model Resources Based on the Network
2.1 Concepts and Institutional Issues
2.2 Financial Problems
2.3 Obstacles to the Sharing of the Network Information Resources
3 Constructing Resource Mechanism of the Library Information Resource Sharing Model Based on the Network
3.1 Constructing the Socialized Guarantee System of the Information Resource Sharing in the Digital Libraries
3.2 Perfecting the Information Resource Sharing Guarantee System of Digital Libraries
3.3 Perfecting the Research and Application of Laws and Regulations
3.4 Perfecting the Technical Guarantee Mechanism
3.5 Paying Attention to Perfecting the Information Security Guarantee Mechanism
4 Conclusion
References
College Tennis Teaching Based on the Multimedia Platform
1 The Background of the Tennis Teaching Reform in Colleges and Universities Based on the Multimedia Platform
1.1 Deficiencies in the Teaching of the Tennis Course in Colleges and Universities
1.2 Teaching Value of the Tennis Course in Colleges and Universities Based on the Multimedia Platform
2 Teaching Requirements of the Tennis Course in Colleges and Universities Based on the Multimedia Platform
2.1 Determine the Technical Design Requirements of the Multimedia Teaching Platform
2.2 Principles of Developing the Multimedia Courseware for Tennis Courses
3 Teaching Mechanism of the Tennis Course in Colleges and Universities Based on the Multimedia Platform
3.1 The Overall Framework of the Design
3.2 Application of the Tennis Teaching Technology in Colleges and Universities Based on the Multimedia Platform
3.3 Constructing the Diversified Curriculum Content System
4 Conclusion
References
Application of the Internet-Based Remote Monitoring in Cardiac Nursing Patients
1 Materials and Methods
1.1 General Information
1.2 Methods
1.3 Criteria for Determination
1.4 Statistical Methods
2 Application of the Internet-Based Remote Monitoring in the Cardiac Nursing Patients
2.1 Overview of the Internet-Based Remote Monitoring System
2.2 Psychological Support
2.3 Respiratory Monitoring
2.4 Nursing Care of Patients with the Ventilator After the Operation
3 Conclusion
References
Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology
1 The Background of the Design of the Innovative Teaching Platform for College English Linguistics Based on the Network Technology
2 Design Value of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology
3 Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technologies
3.1 Functions of the Network Teaching Platform
3.2 Design of the Network Teaching Contents
3.3 Focus on the Teaching Research and Innovation
4 Conclusion
References
The Application of Big Data Analysis in College Computer Education
1 Big Data Characteristics
2 Application Values of the Big Data Analysis in College Computer Education
2.1 The Perfect Integration of “Teaching” and “Learning”: Construction and Sharing of the Educational Information Resources
2.2 High Efficiency and Facility of “Teaching” and “Learning”: Construction of the Digital Teaching Environment
2.3 Mutual Assistance of “Learning” and “Learning”: Construction of the Digital Learning Environment
3 Implementation Requirements of the University Computer Education in the Big Data Environment
4 Application Strategy of the Big Data Analysis in the College Computer Education
4.1 Strengthening the Construction of the Teaching Staff
4.2 Optimizing the Curriculum Setting of Subjects
4.3 Perfecting the Subject Teaching Methods
5 Conclusion
References
Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data
1 The Background of the Brand Cross-Border Cooperation from the Perspective of the Big Data
2 Common Types of the Brand Cross-Border Cooperation from the Perspective of the Big Data
2.1 A Model Oriented by the Audience Perception
2.2 Brand Communication Model from the Perspective of the Social Stakeholders
2.3 Brand Community Communication Model
3 Analysis of the Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data
4 Conclusion
References
Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era
1 Objects and Methods
1.1 Grouping Conditions
1.2 Diagnostic Criteria
1.3 Psychological Intervention
1.4 Observation Indicators
1.5 Tool
1.6 Research Method
1.7 Statistical Method
2 Results
2.1 Scores of the Scales Before and After the Intervention
2.2 Genus Analysis of the Interview Manuscripts
2.3 Outline of Results
3 Discussion
References
Interpretation Technology of the Risk Causes of Management Based on Eigenvalue Disturbance
1 Eigenvalue Perturbation
2 Management Data Mining Based on the Eigenvalue Disturbance
3 Operational Management Risks and Causes of the Operational Management Risks
4 Interpretation Technology of the Risk Causes of Management Based on the Eigenvalue Disturbance Combining Information Technology
4.1 The External Market Environment Is Constantly Changing, and the Internal Managers of Enterprises Do Not Pay Enough Attention to the Prevention of the Financial Risks
4.2 The Characteristics of the Enterprises’ Industry and the Financial Risks Caused by Their Decisions
4.3 Lack of the Perfect Internal Control Management System in the Industrial Enterprises
4.4 Lack of the Perfect Risk Prevention Mechanism in Enterprises
5 Conclusion
References
Design of the Art Education Platform Based on the Multimedia Network
1 Design Advantages of the Art Education Platform Based on the Multimedia Network
2 Design Requirements of the Art Education Platform Based on the Multimedia Network
2.1 The Model of the Network Teaching Platform
2.2 Framework Requirements of the Teaching Platform
3 Design Thoughts of the Art Education Platform Based on the Multimedia Network
3.1 Overall Design of the Network Teaching Platform
3.2 Database Design of the Network Teaching Platform
3.3 Security Design of the Network Teaching Platform
4 Conclusion
References
Implementation of Large-Scale English Speaking Test Based on P2P
1 Introduction
2 Methods and Materials
3 The Composition of Large-Scale Online English Speaking Test System Based on Computer Network
4 Networked English Speaking Test Implementation
5 Prospects for Oral Test in Computer Network Environment
6 Conclusion
References
Simulation Analysis of the Life Cycle of the Tire Industry Cluster Based on the Complex Network
1 Global Tire Industry and the Development Characteristics of China’s Tire Industry
2 Complex Network Model of the Industrial Cluster
3 Simulation Analysis of the Tire Industry Cluster Life Cycle Based on the Complex Network
4 Conclusion
References
Design of the Comprehensive Evaluation Model for Operating Risks of Power Grid Companies in Competitive Environment
1 Operating Status and Risks of the Power Grid Companies Under the Competitive Environment
2 What Is the Comprehensive Evaluation?
3 Establishment of the Comprehensive Evaluation Model for the Operating Risks of the Power Grid Companies Under the Competitive Environment
3.1 Power Generator Market Strength
3.2 Risk of Electricity Fee Recovery
3.3 Uncertainty Risk in the Load Forecasting
3.4 Risk of the Large User Direct Power Supply
3.5 Risk Analysis of the Electricity Purchase
4 Selection of the Comprehensive Evaluation Method for the Operating Risks of Power Grid Companies Under the Competitive Environment
5 Conclusion
References
The Coding Technology of Operation and Management Risk Characteristics Based on the In-Depth Learning
1 Research Background
2 Operation Supervision Center
2.1 The Impact of Disasters or Severe Weather on the Operation of the State Grid
2.2 Potential Risks from Major Holidays
3 Major Accident Risks in Daily Operation
3.1 Marketing Department
3.2 Finance Department Risks
3.3 External Operating Risks of Enterprises
4 Research Theory of the Characteristic Coding
5 Technical Proposal
6 Application Case
6.1 Practice Methods
6.2 Evaluation Methods and Effect
7 Conclusions
References
The Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media
1 Characteristics of the New Media CAI System
2 The Structure of the Computer Aided Instruction System Based on the New Media
2.1 The Overall Framework of ITS Based on the Network
2.2 System Flow
3 Research on the Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media
4 Conclusion
References
The Application of the Big Data Age and the Artificial Intelligence in the Computer Network Technology
1 Artificial Intelligence Technology and Its Development
1.1 Artificial Intelligence
1.2 Development Status of the Artificial Intelligence
1.3 Application Significance of the Artificial Intelligence
2 Big Data Era and the Application Direction of the Artificial Intelligence in the Computer Network Technology
2.1 Artificial Intelligence in the Network Security
2.2 The Agent Technology Promotes the Quality of the Computer Network Information Services
2.3 Overall Expansion in All Fields
2.4 Intelligent Reasoning and Intelligent Operation
3 Big Data Era and the Application of the Artificial Intelligence in the Computer Network Technology
3.1 Processing and Integration of the Multi-channel Information in the Computer Networks
3.2 Application of the Artificial Intelligence in the Network Management
3.3 Application of the Artificial Intelligence in the Enterprise Management and Teaching
3.4 Application of the Intrusion Detection Technology
4 Conclusion
References
Network Security Entity Recognition Methods Based on the Deep Neural Network
1 Connotation and Application of the Deep Neural Network
2 Process and Research Status of the Network Security Entity Recognition Based on the Deep Neural Network
2.1 Entity Recognition Process
2.2 Research on the Entity Recognition
3 Network Security Entity Recognition Method Based on the Deep Neural Network
3.1 Attention-Based
3.2 A Small Amount of the Labeled Data
3.3 A Method Based on the Deep Neural Network
4 Conclusion
References
Application of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation
1 The Characteristics and Connotation of the Internet of Things Technology
2 Application Background of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation
2.1 Urban Ecological Destruction and the Causes of the Environmental Pollution
2.2 Application Direction of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation
2.3 Experience of the Environmental Monitoring and Governance in Western Countries
3 Application of the Internet of Things Technology in the Urban Ecological Protection and Restoration
3.1 Application of the Internet of Things Technology in the Urban Ecosystem
3.2 Application of the Internet of Things Technology in the Land Use and the Water Ecology
3.3 Application of the Internet of Things Technology in the Energy Conservation, Energy Utilization and Atmospheric Pollution
4 Conclusion
References
Construction of Knowledge Mapping Computing Framework Under Big Data
1 Research Method
1.1 The Introduction of Research Software
1.2 Data Collection
2 Data Analysis
2.1 Hotspots Analysis
3 Chronological Analysis
4 The Situation of Research Cooperation
5 Discussion
5.1 It Is More Sensitive to Relevant Policies
5.2 Research Has Close Contact with the Disciplines of Their Own Disciplines
5.3 There Is Little Cooperation Among Researchers
References
Dynamic Information Management System of Agricultural Economy Based on WebGIS
1 Dynamic Information Management System of the Agricultural Economy Based on WebGIS
1.1 Communication Technology
1.2 Database Technology
1.3 Efficient Computing Technology
2 Application of the Dynamic Information Management System of Agricultural Economy Based on WebGIS
3 Design Mechanism of the Dynamic Information Management System for the Agricultural Economy Based on WebGIS
3.1 Overall Framework
3.2 Key Technologies
4 Conclusion
References
Application of the Cloud Real-Time Interactive Response System in College English Reading Teaching Platform
1 Current Situation of the College English Reading Teaching
2 Application Status of the Interactive Response System
3 Application of the Interactive Response System in the College English Reading Teaching Platform
3.1 “Voting Questionnaire” Causes Students’ Cognitive Conflict
3.2 Consideration of the Collective and the Individual Feedback
4 Conclusion
References
Service Products and App Design of Public Diocese in Colleges and Universities
1 Educational and Social Needs Promote Innovation of Public Diocese in Colleges and Universities
2 Service Status of Public Diocese in Colleges and Universities
3 Analysis of College Public Diocese Service Based on Systematic Whole Process Experience
3.1 Pre-experience Pre-service
3.2 Services in Experience
3.3 Experienced Services
4 Service Design of Public Diocese in Colleges and Universities
4.1 Basic Objectives of Service Design in Public Diocese
4.2 Public Diocese Service Blueprint
4.3 Design of Guidance System in Public Diocese
4.4 Public Product Design in Public Diocese
4.5 Public Diocese APP Design
5 Conclusion
References
Software Elderly-Oriented Interaction and UI Design from the Perspective of Service Design
1 Information Technology Drives the Development of Services
1.1 Changes in Service Form and Content
1.2 Pain Points and Needs of the Elderly
2 Analysis of Cognitive Perception of the Elderly
3 Comparisons of Design and Development of Elderly-Oriented Software and Service Design
4 Design Principles of Elderly-Oriented Software
4.1 User-Centered, User Experience-Based
4.2 Pay Attention to the System and the Whole Process
4.3 Expanding Resources and Integrating Innovation
5 Conclusion
References
Application of Fuzzy Algorithm’s Equal Flow Information Sampling Technique in Smoke Concentration Monitoring
1 Introduction
2 Research Method
3 Hardware System Construction
4 Monitoring Application
5 Conclusion
References
Design of Human Resource Management System in the Background of Computer Big Data
1 Introduction
2 Problems of Current Human Resource Management for Chinese Enterprises
2.1 Fossilization of Human Resource Management Model
2.2 Human Resource Managers Are Backward in Thinking
2.3 Human Resource Management in the Big Data Era Is Shocked
3 Design of Human Resource Management System in the Background of Big Data
3.1 Development Architecture Design
3.2 Design Scheme Based on SOA Architecture
3.3 The Characteristics and Advantages of Human Resource Management System
4 Conclusions
References
Research on Intellectual Property Protection of Industrial Innovation Under the Background of Big Data
1 Introduction
2 Analysis on Technological Innovation of Manufacturing Industry in China Under the Industrial Background
3 Suggestions on Intellectual Property Protection Under Big Data
3.1 Suggestions on Strengthening the Protection of Software Intellectual Property Rights
3.2 Suggestions on Improving Intellectual Property Protection of Internet of Things
3.3 Suggestions on Customization of Intellectual Property System
4 Conclusions
References
Foreign Language Teaching and Intercultural Communicative Based on Network Environment and Cloud Computing Platform
1 Introduction
2 Introduction to Intercultural Communication
3 The Importance of Intercultural Communication in College English Teaching
4 The Lack of Cultural Education in Language Teaching
5 Conclusion
References
Design of P2P English Teaching Platform Based on Network Technology and Streaming Media
1 Introduction
2 Methods and Materials
3 Analysis and Discussion
3.1 An Analysis of the Present Situation
3.2 Two System Design
4 Conclusion
References
Waterfront Recreational Landscape Planning and Ecological Protection Based on Cloud Computing and Neural Network Evaluation
1 Introduction
2 Principles and Strategies of Waterfront Recreational Landscape Planning
2.1 Design Principles
2.2 Design Strategy
3 BP Neural Network Model
3.1 BP Neural Network
3.2 LM Algorithm
4 Evaluation of Waterfront Recreational Landscape
4.1 Evaluation Method
4.2 Judgment Process
4.3 Standardization of Score Value
4.4 Result and Analysis
5 Conclusions
References
Analysis of Rural Labor Transfer Based on Network Data Mining and Financial Time Series Statistics
1 Introduction
2 Research Method
3 Analysis of Agricultural Labor Transfer
4 Analysis and Discussion
5 Conclusion
References
Technical Structure Factors of the Teams in the 2018 Russia World Cup Based on Cloud Computing Artificial Intelligence
1 Introduction
2 Sports Cloud Platform Overview
2.1 Performance Analysis
2.2 Construct the Sports Cloud Platform Based on Virtual Reality
3 Results and Discussion
3.1 Technical Factor Structure Analysis
3.2 Factor Analysis
4 Conclusion
References
3D Reconstruction Method of Waterfront Recreational Landscape Space Based on Artificial Intelligence and Fuzzy Algorithms
1 Introduction
2 Principle of Accurate Measurement and Modeling for Three-Dimensional Landscape
3 The Technique Basis for the Proposed Method
3.1 The Artificial Intelligence Technique
3.2 The Information Retrieval Model
4 Simulation Experiment
4.1 Establishment of Evaluation Index
4.2 Experimental Result
5 Conclusions
References
Research on Computer Network Information Security and Protection Countermeasure in Big Data Era
1 Introduction
2 Adaptive Network Security Situational Awareness Model Based on Large Data
2.1 Offline Module
2.2 Online Module
2.3 Data Stream Module
3 Experimental Results and Analysis
3.1 Main Steps and Procedures of the Experiment
3.2 Training Generation Template
3.3 Result Analysis
4 Conclusion
References
Intelligent Security Patrolling System of the Robot Based on Improved Encryption Algorithm
1 Introduction
2 The Overview
2.1 Research Status of Patrol System at Home and Abroad
2.2 Encryption Technology Status
3 Intelligent Security Patrol System Design
3.1 An Overview of the System
3.2 The Secure Design of Electronic Patrol System
3.3 Software Design of Patrol Terminal
4 Summary and Outlook
References
Integration of Information Technology and Teaching in Vocational Colleges Based on Computer Big Data System
1 Introduction
2 Optimal Model of Information Development of Education and Teaching Management in Colleges and Universities
3 Information Process of Education and Teaching Management in Colleges and Universities Based on Large Data Technology
3.1 Large Data Extraction Algorithm
3.2 Data Maintenance Algorithm of Teaching Management Information
3.3 A Sample Reconstruction Algorithm for Teaching Management Information Processing Center
3.4 The Optimal Updating Algorithm of Large Data in Teaching Management Information
4 Experiment and Result Analysis
5 Conclusion
References
Research on Private Cloud System Architecture and User Data Security Based on Simulation
1 Introduction
2 Construction Process of Data Security Risk Assessment Index System
2.1 Private Cloud Introduction
2.2 Optimization Training of Data Security Risk Assessment
3 Numerical Simulation Results and Analysis
4 Conclusion
References
Artificial Intelligence and Deep Learning Application in Evaluating the Descendants of Tubo Mgar Stong Btsan and Social Development
1 Introduction
2 Research and Introduction of Artificial Intelligence
2.1 Principles of Artificial Intelligence
2.2 Introduction of Artificial Intelligence
3 The Political Career of Gardongzan
4 The Decline of the Gar Family
5 Conclusion
References
Analysis of Digital Media Art Teaching Innovation Based on Network and Cloud Computing
1 Introduction
2 Digital Media Art Design Analysis
2.1 Digital Media Art Design
2.2 Digital Technology
3 Digital Media Art Design Evaluation System
3.1 Evaluation System Construction
3.2 Research Tools and Methods
4 Empirical Analysis
4.1 Digital Media Art Design Learning Evaluation
4.2 Improvement of Teaching Performance
5 Conclusion
References
Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control
1 Introduction
2 Risk Cycle Assessment Model
3 The Construction of Network Risk Automatic Identification System
3.1 Distribution and Representation of Experimental Data
3.2 Experimental Results and Analysis
4 Conclusion
References
Application of Network Cloud Resources in College English Listening Class
1 Introduction
2 Application Method Design of Network Resources in College English Listening Class
2.1 Choose Listening Teaching Materials
2.2 Establish Listening Teaching Strategies
2.3 Design the Listening Teaching Process
3 Experimental Demonstration and Analysis
3.1 Data Preparation
3.2 Comparison Test Results
4 Conclusions
References
Design of Japanese-Assisted Translation Teaching System Based on Cloud Computing and Intelligent System
1 Introduction
2 Overall Frame Model
2.1 Description of Development Environment of Japanese-Aided Instruction System
2.2 Description of Development Environment and Analysis of Function Structure
3 Algorithm Design of Japanese-Aided Instruction
4 Experimental Test Analysis
5 Conclusions
References
Risk Control System of Construction Engineering Based on Data Mining and Artificial Intelligence Technology
1 Introduction
2 Data Mining Technology
2.1 Concept of Data Mining
2.2 Rules of Data Mining Technology
3 Risk Control of Construction Engineering Based on Data Mining Technology
4 Experiment
4.1 Experimental Data and Algorithm Environment
4.2 Analysis of Results
5 Conclusion
References
Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network
1 Introduction
2 Cross-Border E-commerce Talent Training Organization System
3 Cross-Border E-commerce Talent Training System Construction
3.1 Cross-Border Electrical Business Talent Enterprise Training System
3.2 Cross-Border Electrical Business Talent Higher Education System
4 Training of Japanese Translation Talents in Enterprises
4.1 Characteristics of Japanese Translation
4.2 Training of Japanese Translation Talents
5 Conclusion
References
Application Research of Artificial Intelligence in Medical Information System
1 Introduction
2 The Status Quo and Development Trend of Hospital Information Construction
2.1 The Status Quo of Information Construction
2.2 Development Trend
3 Definition and Key Technologies of Artificial Intelligence
3.1 Basic Definition
3.2 Key Technology
4 Application of Information System
4.1 Before Diagnosis
4.2 In Diagnosis
4.3 After Diagnosis
5 Conclusion
References
Discussion on the Application of 5G Network UAV in Public Security of Smart Cities
1 5G Network Connected Drone
1.1 Introduction
1.2 5G Network Connected Drones Expected to Achieve the Function
2 5G Network Connected Drones in Smart City Applications
2.1 Description of the Application Scenario
2.2 Overall Plan
2.3 Communication Capability Requirements
3 Problems and Solutions
3.1 The Problem
3.2 Solution
4 Conclusions
References
Drug Management System Based on RFID
1 Introduction
2 Intelligent Monitoring Cabinet
2.1 Overview
2.2 Research and Development of Intelligent Monitoring Cabinet
2.3 Main Functions of Drug Management System
2.4 Feasibility and Benefit Analysis
3 Conclusions
References
Object Recognition and Content Abstraction of Surveillance Video
1 Introduction
2 Video Event Detection
3 Content Abstraction Implementation
4 Experiment and Results
5 Conclusion
References
Real-Time Image Processing System
1 Introduction
2 Intelligent Video Accelerated Retrieval
2.1 The Process of Target Detection Based on FPGA
2.2 Background Removal Algorithm
2.3 Real-Time Face Detection
2.4 Structured Description of Intelligent Information
3 Conclusions
References
Research on Data-Driven Safety Level Assessment System of Refining and Chemical Enterprises
1 Introduction
1.1 Problems with Traditional SLA Systems
1.2 Reasons for Studying Data-Driven Safety Level Assessment Techniques
1.3 The Aim, Contributions, and Framework of This Study
2 The Connotation and Establishment Process of Data-Driven SLA System
2.1 The Connotation of Data-Driven SLA System
2.2 Key Indicators of Safety Management Based on Accidents Data
2.3 Using the Entropy Weight Method to Establish the Indicator Weight
2.4 Improving the Indicator Weight Based on Page-Rank Method
3 Applications
4 Discussion on Limitations and Future Research Directions
4.1 Main Limitations
4.2 Directions for Future Research
5 Conclusions
References
Research on Evaluation Technology of Police Robot Video and Image Application
1 Introduction
2 Main Application Types
2.1 Face Detection and Recognition Algorithm
2.2 Object Detection Algorithm
3 Evaluation Indexes
3.1 Evaluation Indexes of Face Detection and Recognition Algorithm
3.2 Evaluation Indexes of Object Detection Algorithm
4 Conclusion
References
Study on Action Recognition of Drilling Overflow Detection Based on Deep Learning Algorithm
1 Technical Ideas
2 Establishment of Video Monitoring Layout Optimization Algorithm in Drilling Field
3 Human Behavior Detection Based on Deep Learning
3.1 Establishment of Deep Learning Model
3.2 Model Learning and Training
3.3 Model Performance Evaluation
3.4 Establishment of Alarm Rules
4 Test Result
5 Conclusion
References
Thoughts of Artificial Intelligence Enhanced Smart Community Management
1 Trends of Modern Smart Communities
2 Requirements of Community Comprehensive Management
2.1 Community Intelligence Safety Linkage and Preventive Ability
2.2 Community Active Management and Intelligent Emergency Response Capabilities
2.3 Community Smart Personality Service Model
3 Technology Ideas and Characteristics of Artificial Intelligence Smart Community Enhancement
3.1 Construction of Digital Twin Communities
3.2 Key Technologies of Artificial Intelligence Smart Community Enhancement
3.3 Artificial Intelligence Enhanced Smart Community Management Platform
4 Conclusion
References
Disk-Based High Dimensional Index Structure
1 Introduction
2 Technical Route
2.1 Memory Index Establishment
2.2 Disk Index Mapping
2.3 Index Structure Query
3 Experimental Result
3.1 Experimental Data Set
3.2 Experimental Result
References
Semantic Marking Method of Video Scene Based on 3D Convolutional Neural Network
1 Introduction
2 Background Details
2.1 Traditional Video Scenario Semantic Segmentation Method
2.2 Convolutional Neural Network
3 Semantic Marking of Video Scene Based on 3D Convolutional Neural Network
3.1 Overall Framework
3.2 Construct 3D Convolutional Neural Network
3.3 Supervoxels
4 Experiment and Conclusion
References
Research on Test Technology of Intelligent Algorithm for Police Robot Vision System
1 Introduction
2 Some Data Process Applications
2.1 Image Retrieval Algorithm
2.2 Behavior Detection and Recognition Model
3 Test Methods
3.1 Test Index of Image Retrieval Algorithm
3.2 Evaluation Index of Behavior Detection and Recognition Algorithm
4 Conclusion
References
Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology
1 Introduction
2 Prerequisite Knowledge
2.1 Diffie-Hellman Algorithm
2.2 RSA Algorithm
2.3 Blockchain Authentication Mechanism
3 System Scheme Design
3.1 Preset Information
3.2 Sender Validation Module (Fig. 1)
3.3 Receiver Validation Module (Fig. 2)
3.4 Key Exchange (Fig. 3)
3.5 Message Sending (Fig. 4)
4 Summary
References
Privacy Protection in Blockchain Systems: A Review
1 Introduction
2 Threats for Blockchain Privacy
2.1 Disclosure of User Identity
2.2 Disclosure of Transaction Data
3 Blockchain Privacy Protection Scheme
3.1 Data Distortion Technique
3.2 Data Encryption Technology
3.3 Data Off-Chain Technology
4 Conclusion
References
Model Selection and Estimation in INAR(P) Model Based on Lasso Class
1 Introduction
2 INAR(p) Model and Lasso
3 INAR(P) Based on Lasso Class
4 Real Count Data Example
4.1 The Data
4.2 Model Selection and Estimate in Lasso
4.3 Model Selection and Estimate in Adaptive Lasso
5 Conclusion
References
484442_1_En_243_Chapter_OnlinePDF.pdf
243 Retraction Note to: Application of Weighted Gene Co-expression Network Analysis in Biomedicine
Retraction Note to: Chapter “Application of Weighted Gene Co-expression Network Analysisin Biomedicine” in: C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-PhysicalSystems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_93
Advances in Intelligent Systems and Computing 1088
Chuanchao Huang Yu-Wei Chan Neil Yen Editors
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)
Advances in Intelligent Systems and Computing Volume 1088
Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Chuanchao Huang Yu-Wei Chan Neil Yen •
•
Editors
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)
123
Editors Chuanchao Huang Huazhong University of Science and Technology Wuhan, China
Yu-Wei Chan Computer Science and Information Management Providence University Taichung, Taiwan
Neil Yen University of Aizu Fukushima, Japan
ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-981-15-1467-8 ISBN 978-981-15-1468-5 (eBook) https://doi.org/10.1007/978-981-15-1468-5 © Springer Nature Singapore Pte Ltd. 2020, corrected publication 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Contents
Impact of Smart Cities on Resource Conservation Based on Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yongzhi Chen and Yingxing Lin
1
Water Level Measurement Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jian Huang
9
Optimization of Urban Transportation Network Path . . . . . . . . . . . . . Dandan Zhang and Haiyun Zhu
15
Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weie Xiong
23
Application of VR Technology in Intangible Cultural Heritage Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liang Li
29
Construction of Ultimate Video Experience and Application Innovation System Based on 5G and 8K . . . . . . . . . . . . . . . . . . . . . . . Dong Xiang, Xia Ran and Zhiqiang Xu
35
Cost of Kidney Transplantation on the Base of Data Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Kaixing He, Jinguo Wang, Jiwei Wang and Na Wang
43
Public Service of Retired Personnel in Colleges and Universities in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanping Wang
49
Application Research of Accounting Archives Informatization Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiangdong Xu
55
v
vi
Contents
Construction of Vocational Education Information Platform Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaojun Jiang and Zengxiang Pan Language Conversion and Cultural Communication in Nobrock’s Translation—Taking Xunzi’s Persuasion of Learning as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qingkun Hu Design and Manufacture of Moxibustion Bed Control System . . . . . . . Daming Pei
63
71 81
Development of a New Computer-Aided Algorithm for Three-Layered Seale Wire Strand Geometric Design . . . . . . . . . . . Chunlei Yu, Junqi Pan, Qiang Song and Mingzhao Zhu
89
Designing of Postgraduate Medical English Class in Smart Learning Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaofang Wang and Cheng Liu
97
An Improvement Method of Power Energy Utilization Rate Based on DEA Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fu Mo
105
“Blended Learning” in Construction Cost Network Course . . . . . . . . . Shu Li, Lei Cao and Yunda Shao
111
Data Mining of Privacy Preserving Based on Secret Sharing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jianguo Liu, Xiaoyu Liu, Zhansheng Chen and Zhengkun Hu
119
Application Status and Development Prospect of Artificial Intelligence in Clinical Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mengqiao Wang
129
Core Index System of Provincial Power Grid Company’s Economic Activity Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rongmao Wang, Lei Jiang, Jia Yu and Xiao Pan
135
Application Research of Smart Education in Flipped Classroom of College English . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cheng Liu and Xiaofang Wang
147
Multi-objective Enterprise Partner Selection Model with Different Relative Superiority Parameters Based on Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Junfeng Zhao, Xue Deng, Yingxian Lin and Jinjia Lu
155
Contents
vii
Vehicle Path Optimization with Time Window Based on Improved Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Li and Tingting Li
167
Cultivation of Innovative Talents in Higher Education Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jui-Chan Huang and Kuo-Min Ko
177
Reform of Ideological and Political Teaching in Colleges and Universities Under the Background of Big Data . . . . . . . . . . . . . . Hongbing Ge and Baozhi Wang
183
Influence Factors of Consumer Satisfaction Based on SEM . . . . . . . . . Huali Cai, Yawei Jiang and Jingshu Zhang
189
Overview of Underground Space Utilization and Standardization Suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qing Xu
195
Application of Decision-Making Management and Information Management System Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . Kuo-Min Ko
205
Aluminum Foil Surface Defect Recognition Method Based on CNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hui Wang, Chunhua Gao and Pinglian Wang
211
How to Build Hadoop in the Field of Transportation by Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yunhui Gu and Li Fu
217
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral Data Using Grey Relational Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . Wei Guo, Ping Dong, Hongbo Qiao, Haikuan Feng, Huifang Wang and Hui Zhang Financial Auditing Accounting Method Based on Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoyan Ma Wireless Temperature Control System of Big Grain Depot . . . . . . . . . Mingzhi Wang and Xueyi Wang Springback Modification for Biaxial Bending Plate and Its Validation in Multi-point Forming . . . . . . . . . . . . . . . . . . . . . . Qingfang Zhang, Hengyi Yuan, Linlin Li, Hongfen Wang and Songqing Liu E-crime Management System for Future Smart City . . . . . . . . . . . . . . M. M. Kamruzzaman
225
233 239
249
261
viii
Contents
System Dynamics-Based Simulation of E-commerce Industry of Ethnic Regions in China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haiying Ma
273
Vehicle Safety Reminder System Based on Single Chip Microcomputer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yunlu Lu, Xuefeng Tan, Mengting Luo, Linchao He and Haibo Pu
283
Regional Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Environment . . . . Jianbo Li and Xiaohua Li
291
Online Reputation Evaluation for Consumer Products Based on Analytic Hierarchy Process (AHP) . . . . . . . . . . . . . . . . . . . . . . . . . Ying Li, Xiaowei Lu, Lei Han, Yingcheng Xu and Xiuli Ning
297
Discussion on the Influence of Ambient Temperature Based on Big Data Technology on the Development of Asphalt Pavement . . . . . . . . Xiaoduo Liu and Wei Liu
309
Analysis on the Criminal Subject of Artificial Intelligence . . . . . . . . . . Huilin Huang
317
U.S. Air Force Target Knowledge Graph Construction Based on Multi-source Intelligence Analysis . . . . . . . . . . . . . . . . . . . . . Ruijuan Hu
323
Design of Virtual Experiment Platform Based on MATLAB Simulation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liyan Zhao and Aize She
335
Traditional Culture Teaching in Chinese Education Under Internet Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenli Zhong
343
College Students’ Entrepreneurship Psychology Education System and Practice Based on Computer Network . . . . . . . . . . . . . . . . . . . . . Yan Zheng and Xu Wang
351
Development Status and Trend of Internet of Vehicles Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jiguang Xue, Zhenbo Liu, Xuliang Zhao, Pingjun Wang and Qiaowen Hong Temperature Controller Based on USB Interface . . . . . . . . . . . . . . . . Yali Ma and Xueyi Wang Construction of Compound DDOS Network Security System Based on PKI and CA Authentication . . . . . . . . . . . . . . . . . . . . . . . . . Bin Wang and Xiaolei Zhang
361
369
375
Contents
Agricultural Sprayer Based on Drip Performance Monitoring System Design and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ling Liu
ix
383
Building Extraction Method in Remote Sensing Image . . . . . . . . . . . . Qinzhe Han, Xin Zheng, Qian Yin and Ziyi Chen
395
Similarity Measures Between Type-2 Fuzzy Sets . . . . . . . . . . . . . . . . . Jing Wang and Gao Zheng
407
Development Strategy of E-Commerce Network Marketing Based on New Media Marketing Mode . . . . . . . . . . . . . . . . . . . . . . . . Tingzhong Wang and Lingli Zhu
417
Reconstruction of Path of Mental Health Education of College Students Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . Zhihui Gong
425
Implementation Plan on the Implementation Plan of the Linear Algebra Gold Course in Independent Colleges . . . . . . . . . . . . . . . . . . . Lijie Ma
433
Search Strategy of Shipborne Satellite Communication Servo with Changing Heading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haidong Zou
439
Hybrid Teaching of College English Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cuibai Li
445
Fuzzy RBF Neural Network Control for Unmanned Surface Vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao
451
Feasibility Study on Using Seawater in Ship Pressure Water Mist Fire Extinguishing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dongfang Zhang
461
Application Sharing Mode of University Information Resources in (IOT) Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changcheng Xin and Chaohu He
471
Information Reconstruction Strategy for a Ship Power Distribution System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hongdan Liu, Yue Sun and Lanyong Zhang
479
Design and Experiment of a Flexible Array Tactile Sensor . . . . . . . . . Hengyi Yuan and Qingfang Zhang
489
x
Contents
Design of Street Lamp Management Information System . . . . . . . . . . Xiangguo Lin Application of Big Data Technology to Ideological and Political Education in Institutions of Higher Learning . . . . . . . . . . . . . . . . . . . . Jiang Li and Xiaohua Ke Based on Computer Software to Analysis the Influence of Geometry Parameters of Herringbone Plate Heat Exchanger Plate on Heat Exchange Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shuwei Lv and Zhuojuan Yang Analysis of Working Characteristics of Buck Converter in Artificial Intelligence Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zeyu Li and Hongmei Xu Under the Background of Internet +, the Practical Research of Mobile Learning Model in Vocational Practice Teaching Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bingbing Wu, Yun Gao and Li Qiao
499
505
517
529
539
Exploration and Practice of Collaborative Education Mode Based on Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenshuang Zhu and Chen Bai
547
Analysis of Diabetic Association Rules Based on Apriori Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoli Wang, Kui Su and Zhanbo Liu
555
Design and Practice of Basic Physical Experiment Teaching Based on Combination of Virtual and Real . . . . . . . . . . . . . . . . . . . . . Baoxin Tai and Bo Hu
565
Automatic Detection of Cloth Defects Based on Gabor Filtering . . . . . Guanxiong Ding
571
Improved GA-SVM Algorithm and Its Application of NIR Spectroscopy in Orange Growing Location Identification . . . . . . . . . . Songjian Dan and Simon X. Yang
581
Condition Monitoring of Fire Water Supply System Based on LoRa Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fan Yufeng, Du Yang and Yang Shufeng
593
Application Design and Implementation of Intelligent Bracelet in Wisdom Campus Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lingling Gao, Wenjia Luo and Laifeng Tang
603
Contents
xi
Development and Implementation of Education Information Platform Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . Qiang Han
611
Application of Information Processing Technology in Garment Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lu Miao
623
Application of E-Commerce Network Security Technology . . . . . . . . . Haixiang Li and Weixian Xue
633
Construction and Analysis of a Foreign Language Learning Model Based on the Classroom Network Environment . . . . . . . . . . . . . . . . . . Jing Li
641
Reform and Practice of Advanced Mathematics Course in the Context of New Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . Dongli Liu
651
Innovation of Real Estate Marketing Strategies Based on “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lisa Zhu and Feng Yang
661
Load Balance of Cloud Computing Center Based on Energy Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhenjiang Li and Zhenxiang He
667
Express Internet of Things: Concept, Architecture and Frontier Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ji Liang and Chunhui Yuan
677
Multi-dimensional Similarity Personalized Recommendation Model in Deep Learning Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Feng Liu and Weiwei Guo
689
Teaching Curriculum System and Its Construction on the Course of “Stamping Forming Process and Die Design” Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Songqing Liu Drug Abuse Prediction Model Based on Relevance Analysis . . . . . . . . Yawei Zhou, Zhelin Guan, Pengfei Ji and Xiufen Wang Design of Temperature and Humidity Detection System for Bacteria Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhuojuan Yang, Xirui Sun, Chunyu Mao and Xiaodong Yang Interference Analysis of Mobile Communication Multi-system . . . . . . . Daming Pei
699 705
715 725
xii
Contents
Flipped Classroom Teaching of College English Based on “Rain Classroom” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wei Sun
735
Application of Information Technology to Promote the Practice of Medical Education Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Na Wang, Xige Yang, Rui Wang and Jinguo Wang
743
Analysis of Rock Fracture Deformation of Urban Informatization in China’s Modernization Drive by DDARF Software . . . . . . . . . . . . . Wen Wang, Rui Han, Yanli Zhu and Manxia Wu
751
Enterprise Information Security in the Process of Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guangzheng Wu and Jianyu Wang
759
Meta-cognitive Strategies Application in MOOC Environment—A Case of Integrated English Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . Li Zhang
765
Training Mode of Individualized Skilled Talents Based on Electronic Communication Specialty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mingguang Zhang and Lisa Zhu
775
Calculating the Pore Fractal Dimension of Porous Media by Using Pore Size Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yibo Zhao
785
RETRACTED CHAPTER: Application of Weighted Gene Co-expression Network Analysis in Biomedicine . . . . . . . . . . . . . . . . . Ming Zheng and Mugui Zhuo
793
Design of Enterprise Network Information System Based on Industrial Interconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu Zhuang and Shuili Yang
799
Discussion on the Construction of Computer Software Specialty in Private Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoming Yang
809
Design and Implementation of Cow Chewing Behavior Recognition Based on Sound Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ting Zhang and Jiahao Wang
817
Design and Application of Distribution Automation System in Intelligent Power Supply System Management . . . . . . . . . . . . . . . . . Qichang Li, Guangxiao Li, Lin Wang, Qiang Song and Yundong Xiao
823
Contents
A Framework for Occupational Risk Assessment in Power Grid Using AHP Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hualiang Li, Runzhong Liu, Li Li, Zhiting Liu, Shaoyan Lu, Lun Pan and Aihua Lin Digital Media Copyright Protection Technology in the Age of All Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yixin Chen, Xi Hu and Feng Xiao Realistic Dilemma and Breakthrough Path of “Innovation and Entrepreneurship” Education in Private Colleges and Universities Under the Background of Informatization . . . . . . . . . Ying Chen
xiii
835
843
851
Construction of Foreign Language Curriculum Resources Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanxia Hou
859
Intelligent Computation of Bubble Group Motion in Mesoscale Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bingbing Liu, Mingyu Wang, Fulin Yu and Shaojun Zhang
871
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rongna Xie, Yazhe Wang, Guozhen Shi, Lin Yuan and Quanqi Li
881
Situation and Suggestion of Geology and Mineral Resources Standardization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qing Xu
893
Commodity Sales Data Analysis Based on Qoo10 Platform . . . . . . . . . Yunle Yang, Hailan Pan and Jiaqi Xiang Design of Temperature Detection Systems Based on Wireless Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weiqing Wan Status Quo and Countermeasures of Students’ Learning Behaviors in Higher Vocational Colleges Under the Internet Age—Based on the Questionnaire Survey of 1248 Vocational College Students . . . . Baiqing Cheng, Xiang Gao and Li Ge
899
909
919
Structural Design of Snapping Machine of Brittle Materials and Its Virtual Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenjun Kou, Xiang Chen, Qiangqiang Wu and Liang Shen
931
Design Idea of Professional Talent Evaluation System Based on Mobile Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping Yang and Hongjiao Xue
943
xiv
Contents
Research and Practice on Diagnosis of Civil Engineering Majors Based on EFQM Excellence Model Analysis . . . . . . . . . . . . . . . . . . . . Aimin Wei Application of Network Score System for Sports Achievements . . . . . . Huihui Du
953 961
Forecast and Model Establishment of Urban Rail—Transit Passenger Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dandan Zhang and Zhiyuan Liu
969
Innovation and Entrepreneurship Education in Higher Vocational Colleges Under Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Linhua He
979
Using Computer Information High Technology to Improve Waterproofing and Drainage of Panel Bulk Dam . . . . . . . . . . . . . . . . Xiaoqing Shi and Gangyu Gu
985
Establishment of a Data Mining System for Estimating the Medical Cost of Renal Transplantation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haoran Yu, Jinguo Wang, Hongmei Xu and Na Wang
993
Application and Innovation of Computer Internet of Things Technology in Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guibin Zhang, Lifan Feng, Hongzhen Zhang and Xiaohua Cai
999
Significance of Embedded Linux to the Development of Internet of Things Under the Background of New Science . . . . . . . . . . . . . . . . 1007 Haipeng Yang Platform of Examination Information Resources in Colleges and Universities Based on Big Data Deep Mining Technology . . . . . . . 1015 Jianbo Li and Xiaohua Li The Impact Factors of International Navigation Talents Based on AHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023 Jian Yong and Xiuping Sui Application of Information Technology in the Problems and Countermeasures of Kindergarten Science Education . . . . . . . . . . 1031 Bo Yan Construction of University’s Innovation and Entrepreneurship Education Ecosystem Based on Computer Network Platform . . . . . . . 1037 Xu Wang and Yanmin Yu A Unified Unstructured Data Storage System Under Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1047 Mingming Chen, Ning Wang, Lihua Tang and Yuzhi Chen
Contents
xv
Classification and Pruning Strategy of Knowledge Data Decision Tree Based on Rough Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057 Xiuying Zhao and Linli Wu Teaching Strategies of Literature Courses in the New Media Technology Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065 Mingxiu Ding On the Teaching Reform of Mathematics Course in Independent Colleges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073 Yong He Adaptive Sliding Mode Control for Unmanned Surface Vehicle with Fuzzy Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Renqiang Wang, Keyin Miao, Jianming Sun, Hua Deng and Yue Zhao Application and Strategy of Internet of Things (IOT) in College Education Informationization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089 Chaohu He and Changcheng Xin Influence of Inductance Parameters on Intelligent Control of Buck Converter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099 Yutong Li, Nuo Zhou and Hongmei Xu Research and Development of Remote Monitoring System for High-Speed Rail Protective Fence Gate . . . . . . . . . . . . . . . . . . . . . 1107 Li Qiao, Yu Fan and Bingbing Wu Integration of Information Technology and Three-Dimensional Teaching Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115 Yanmin Liang and Yao Wang Research and Practice of Laboratory Safety Management Mode . . . . . 1123 Bo Hu and Baoxin Tai Dynamic Model Average for Stock Index Return . . . . . . . . . . . . . . . . 1129 Qingyu Meng Challenges and Countermeasures of Intellectual Property Rights in Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139 Ping Ma Personalized Distribution Recommendation Model of Dormitory Based on Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145 Weiwei Guo and Feng Liu Time-Limited Tour Planning Based on Ant Colony Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155 Han Liu, Zhujun Yu, Wenhui Zhang and Zhihong Ma
xvi
Contents
Fungus Bacteria Bag Density Detection System Based on Image Processing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163 Chunyu Mao, Zhuojuan Yang, Xirui Sun and Xiaodong Yang Application of Information Technology in Clinical Education . . . . . . . 1171 Na Wang, Qitong He, Rui Wang and Qun Li Optimization of Fermentation Medium of Camphor Lucidum Based on Artificial Neural Network and Genetic Algorithm . . . . . . . . 1179 Ming Zheng and Haixiao Gong Design and Implementation of Speech Recognition System Based on Gesture Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185 Zuliang Wang, Chuangle Cao and Suying Zhang Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective . . . . . . . . . . . . . . . . . . . 1191 Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li and Yali Shen Digital Watermarking Hiding Technology for Copyright Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203 Yixin Chen, Xi Hu and Feng Xiao English Teacher Information Resource Affordances in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1211 Guotai Luo How Does SEW Drive Innovation in an Internet Family Firm? . . . . . 1221 Min Zhao, Yiyi Wang and Xin Yao Construction and Application of Information Management System in Road and Bridge Engineering Construction . . . . . . . . . . . . . . . . . . . 1229 Shufang Li Control Mechanism of Network Public Opinion on Emergencies in Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1239 Baozhi Wang Decision-Making Analysis of Prognosis of Renal Transplant Recipient on the Base of Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . 1245 Yunhai Yu, Jinguo Wang, Xige Yang and Na Wang Application of Virtual Technology in the Management of Computer Laboratories in Multi-campus Colleges and Universities . . . . . . . . . . . 1251 Xudong Zhang Construction of a New Home Decoration Design Network Sharing Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1259 Nuan Sun
Contents
xvii
Dimension Reduction Algorithm of Big Data Based on Deep Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269 Jianye Zhang, Jia Shen, Tianjun Wang, Kun Liu and Jinhu Li Novel Method of Knowledge Database Data Mining by Association Rules Extraction Technology in Decision Tree . . . . . . . . . . . . . . . . . . . 1281 Xiuying Zhao and Xiangkui Chen Influence of New Media Technology on the Transformation Path of Party Newspaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1291 Liya Yao Application of NB Technology in IoT . . . . . . . . . . . . . . . . . . . . . . . . . 1299 Chao Zhou Implementation of Medical Disputes Information System . . . . . . . . . . 1305 Na Wang, Na Wei, Hongqin Li and Linghao Kong Research and Implementation of RSA IP Core Based on FPGA . . . . . 1311 Boyang Liu Innovation and Entrepreneurship Education in Higher Vocational Colleges Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . 1321 Linhua He Influencing Factors and Adaptive Strategies of Electric Power Demand in the “New Normal” Environment of Economy Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1327 Yu Shen, Kangli Xiang, Yiwang Luo, Ziming Xu and Jing Cai Application of Intelligent Control in Medical Education . . . . . . . . . . . 1335 Na Wang, Jing Yu, Lei Wang and Xiaomei Hao Network Security and Intelligence Analysis Based on Big Data . . . . . . 1341 Weigang Liu Conflict and Balance Between Big Data Investigation and Personal Information Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1351 Kaiqi Cai Influence of “Internet +” on the Development of Campus Baseball and the Countermeasure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1361 Jingxiao Zhao Application of the Computer Aided Drawing in the Wall Painting Artistic Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1369 Hao Qi
xviii
Contents
Accurate Model of the Internet Financial Poverty Alleviation Based on the Multi-agent and the Data Mining . . . . . . . . . . . . . . . . . . 1377 Anni Qian and Chien-Yin Chen Construction of the Integrated Network Service Platform for Smart City Community Home Care Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1385 Yinghong Sui Mountain Monitoring System Based on the Digital Photogrammetry and the Component GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1393 Jiuling Tian Simulation Study on the Geographical Adaptability of the Large-Scale Cultural Buildings in Shanshui Cities Based on the VR Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401 Litao Wan The Innovation of the Mobile Intelligence Terminal in Foreign Language Teaching Under the Background of the Internet . . . . . . . . . 1409 Bo Wang Design of the Ideological and Political Education Platform for College Students Based on the Mobile App . . . . . . . . . . . . . . . . . . 1417 Honggang Wang Application Effect of the Computer Remote Network System in the Comprehensive ICU Nursing Intervention Mode . . . . . . . . . . . . 1425 Huifang Wang Application of the Computer Database Software in the ICU Nursing Medical Records Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1433 Huifang Wang Design and Research of the Intelligent Aquaculture Monitoring System Based on the Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . 1439 Jianguo Wang, Handong Cheng, Sheng Yuan, Quan Wang, Longzhen Shu and Chunli Zhang Curative Effect Observation of the Computer-Controlled Rapid Three-Dimensional Traction for Prolapse of Lumbar Intervertebral Disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447 Qinjian Wang Computer Simulation Generation of the Humanized Music Timbre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1455 Rui Wang
Contents
xix
Application of the Japanese Teaching Methods Based on the Network Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1463 Xia Wang On the Network Security Prevention Under the Development of the Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1471 Heping Xi Molecular Action Mechanisms of the Traditional Chinese Medicine in the Treatment of Rheumatoid Arthritis Based on the Computer Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1479 Liang Yan and Wuyin Li Design and Teaching Reform of Interactive Multimedia Courseware for Mechanical Drawing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1487 Lirong Yang Design and Implementation of the News Practice Teaching Platform Based on JavaWeb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1495 Zhen Yang Research on Wi-Fi Signal Coverage and Quality of Urban Rail Transit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1503 Wenjie Yu Design of the Fuzzy Comprehensive Evaluation Platform for Sunshine Sports in Colleges and Universities Based on the Campus Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1511 Haonan Yuan The Validity of Computer Technologies in Promoting College Students’ Entrepreneurship Education Based on the E-commerce . . . . 1519 Jinming Bai Application of Internet of Things Technology in Industrial Automation Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1527 Liyuan Chang The Application of Transmission Technology in Information and Communication Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1535 YaoZhi Chen The Financial Data Prediction System Based on the Recurrent Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1543 Yixin Deng Design of the “Studio System” Practical Teaching Platform for Advertising Major Based on the Network Resources . . . . . . . . . . . 1551 Weibo Gong
xx
Contents
The Transformer Substation Scenario Modeling and Visual Perception Visualization System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1559 Guangceng He and Yushan Dong Library Information Resources Sharing Model Resources Based on Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1567 Xianjie Hu College Tennis Teaching Based on the Multimedia Platform . . . . . . . . 1575 Zhenhai Huang Application of the Internet-Based Remote Monitoring in Cardiac Nursing Patients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1583 Zhihui Huang and Ximin Li Design of the Innovative Teaching Platform for College English Linguistics Teaching Based on the Network Technology . . . . . . . . . . . 1591 Qinyuan Hui The Application of Big Data Analysis in College Computer Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1599 Zili Jiang Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . 1607 Kayi Jin Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1613 Ying Lei and En Zhang Interpretation Technology of the Risk Causes of Management Based on Eigenvalue Disturbance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1621 Qiang Li, Xusheng Yang and Peiyu Liu Design of the Art Education Platform Based on the Multimedia Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1629 Sen Li Implementation of Large-Scale English Speaking Test Based on P2P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1637 Sijing Li Simulation Analysis of the Life Cycle of the Tire Industry Cluster Based on the Complex Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1645 Xianghua Li
Contents
xxi
Design of the Comprehensive Evaluation Model for Operating Risks of Power Grid Companies in Competitive Environment . . . . . . . . . . . 1651 Di Liu, Yingbao Cui and Peiyu Liu The Coding Technology of Operation and Management Risk Characteristics Based on the In-Depth Learning . . . . . . . . . . . . . . . . . 1661 Di Liu and Zhen Qiu The Evaluation Algorithms of the Computer Aided Instruction System Based on the New Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1673 Qing Liu The Application of the Big Data Age and the Artificial Intelligence in the Computer Network Technology . . . . . . . . . . . . . . . . . . . . . . . . . 1679 Qing Liu Network Security Entity Recognition Methods Based on the Deep Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1687 Weigang Liu Application of the Internet of Things Technology in the Urban Ecological Protection and Environmental Rehabilitation . . . . . . . . . . . 1693 Huanchun Ma Construction of Knowledge Mapping Computing Framework Under Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1701 Boliang Men, Xiumei Zhang and Yun Shi Dynamic Information Management System of Agricultural Economy Based on WebGIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1715 Yue Meng and Wenkuan Chen Application of the Cloud Real-Time Interactive Response System in College English Reading Teaching Platform . . . . . . . . . . . . . . . . . . 1723 Di Qi Service Products and App Design of Public Diocese in Colleges and Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1731 Ruibo Song and Chenglin Ma Software Elderly-Oriented Interaction and UI Design from the Perspective of Service Design . . . . . . . . . . . . . . . . . . . . . . . . 1741 Ruibo Song and Lei Zheng Application of Fuzzy Algorithm’s Equal Flow Information Sampling Technique in Smoke Concentration Monitoring . . . . . . . . . . . . . . . . . . 1747 Jiying Chen, Shuanghe Chi, Gaoyuan Cheng and Wenqin Zha
xxii
Contents
Design of Human Resource Management System in the Background of Computer Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1757 Jingyuan Zhang Research on Intellectual Property Protection of Industrial Innovation Under the Background of Big Data . . . . . . . . . . . . . . . . . . 1765 Yu Wang and Lei Zhang Foreign Language Teaching and Intercultural Communicative Based on Network Environment and Cloud Computing Platform . . . . 1773 Zhiyin Wang Design of P2P English Teaching Platform Based on Network Technology and Streaming Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1781 Ya Yu Waterfront Recreational Landscape Planning and Ecological Protection Based on Cloud Computing and Neural Network Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1789 Yang Cao Analysis of Rural Labor Transfer Based on Network Data Mining and Financial Time Series Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 1799 Bowen Guan and Xinze Li Technical Structure Factors of the Teams in the 2018 Russia World Cup Based on Cloud Computing Artificial Intelligence . . . . . . . . . . . . 1809 Xiaowei Lv and Changjiang Tao 3D Reconstruction Method of Waterfront Recreational Landscape Space Based on Artificial Intelligence and Fuzzy Algorithms . . . . . . . . 1821 Yang Cao Research on Computer Network Information Security and Protection Countermeasure in Big Data Era . . . . . . . . . . . . . . . . . . . . 1831 Jiyan He and Yanbin He Intelligent Security Patrolling System of the Robot Based on Improved Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1839 Bo Zhao, Ming Yang, Yuxin Cai and Zhiwei Tang Integration of Information Technology and Teaching in Vocational Colleges Based on Computer Big Data System . . . . . . . . . . . . . . . . . . . 1845 Hao Yu Research on Private Cloud System Architecture and User Data Security Based on Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1861 Jian Chang
Contents
xxiii
Artificial Intelligence and Deep Learning Application in Evaluating the Descendants of Tubo Mgar Stong Btsan and Social Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1869 Dancairang Ye Analysis of Digital Media Art Teaching Innovation Based on Network and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1877 Qian Ma, Bing Zhang and Zhiqiang Xu Application of Big Data Intelligent Algorithms in Enterprise Security Risk Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1887 Xiaogang Gong, Wei Ye, Yaqiong Guo and Chao Chen Application of Network Cloud Resources in College English Listening Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1897 Ning Ding Design of Japanese-Assisted Translation Teaching System Based on Cloud Computing and Intelligent System . . . . . . . . . . . . . . . 1905 Jingxian Huang Risk Control System of Construction Engineering Based on Data Mining and Artificial Intelligence Technology . . . . . . . . . . . . . . . . . . . 1915 Wei Rao and Jian Chen Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1925 Jingxian Huang Application Research of Artificial Intelligence in Medical Information System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1935 Tianhua Bao and Cheng Cheng Discussion on the Application of 5G Network UAV in Public Security of Smart Cities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1945 Zhifang Wang and Cheng Cheng Drug Management System Based on RFID . . . . . . . . . . . . . . . . . . . . . 1955 Shicheng Li, Xiaoming You and Zheming Sun Object Recognition and Content Abstraction of Surveillance Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1959 Xiaoting Pan Real-Time Image Processing System . . . . . . . . . . . . . . . . . . . . . . . . . . 1965 Bo Zhao, Cheng Cheng, Yuxin Cai and Tang Zhiwei Research on Data-Driven Safety Level Assessment System of Refining and Chemical Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . 1971 Desong Wu, Tingchun Wang, Tao Wang and Qiandeng Li
xxiv
Contents
Research on Evaluation Technology of Police Robot Video and Image Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1983 Ming Yang and Na Liu Study on Action Recognition of Drilling Overflow Detection Based on Deep Learning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 1993 Qiandeng Li, Tingchun Wang, Zhichuan Guan, Jingwen Cui and Desong Wu Thoughts of Artificial Intelligence Enhanced Smart Community Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2003 Xiaofang Zhou, Xin Han and Weili Wang Disk-Based High Dimensional Index Structure . . . . . . . . . . . . . . . . . . 2011 Shiwei Du Semantic Marking Method of Video Scene Based on 3D Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2019 Wu Jinbo Research on Test Technology of Intelligent Algorithm for Police Robot Vision System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2027 Ming Yang and Na Liu Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2037 Liugfen Li, Guowei Lin, Zouyu Xie, Shujian Yu, Zhen Guo and Yufang Liang Privacy Protection in Blockchain Systems: A Review . . . . . . . . . . . . . . 2045 Tianjiao yu and Chunjie Cao Model Selection and Estimation in INAR(P) Model Based on Lasso Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2053 Xudong Lin and Zhen Guo Retraction Note to: Application of Weighted Gene Co-expression Network Analysis in Biomedicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ming Zheng and Mugui Zhuo
C1
Impact of Smart Cities on Resource Conservation Based on Big Data Analysis Yongzhi Chen and Yingxing Lin
Abstract In the past, the traditional urban development model, that is, the form of mechanical use of urban resources, is no longer in line with the future development direction of the city. In the current urban management, it is necessary to integrate advanced science and technology to promote the transformation and upgrading of urban development. Big data technology has significant advantages. It can be used in urban management to achieve revolutionary transformation. This paper explores the potential value under massive data and promotes the construction of smart cities. From the perspective of big data, the relevant requirements for smart cities, as well as the anatomy of smart government, smart enterprises, wisdom and people’s livelihood, and the issues that should be paid attention to later, explore the construction of smart cities based on big data. The research in this paper has contributed to the further improvement of the city’s level of intelligence. Keywords Big data · Smart city · Resource integration · Resource conservation
1 Introduction In the wilderness of time, in the flood of information, what do you use to capture the flow of information generated every minute and every minute, and use these as the dream of a “smart city”? Mastering the pulse of a city, knowing every pulsation of it, the huge flow of information generated by the city in its incessant operation will require a weapon that is sufficient to support it, and big data will be born at this time [1]. Big data is not only a carrier for creating value. It can also affect urban management, e-government, public opinion monitoring, and corporate management. Once the key to big data is mastered, the development dilemma of smart cities will be easily resolved [2]. In the same period of proposing information engineering theory and methods, the concepts, theories and methods of information resource management have also been Y. Chen (B) · Y. Lin The School of Economics and Management, Fuzhou University, Fuzhou, Fujian Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_1
1
2
Y. Chen and Y. Lin
developed [3]. Relevant scholars have put forward many important points based on their own research and practical experience [4]. The theory, methods and practices of sending information resources management are very important for information resource planning [5]. They clarify the positioning of information resources, emphasizing that information resources are not only shared resources, but also strategic resources of enterprises. At the same time, it also emphasizes that it is necessary to optimize the allocation and comprehensive management of information resources from a strategic perspective, and to improve the overall efficiency of enterprise management [6]. Some scholars have planned the information resources in a certain university from the perspective of data planning, and have achieved some results. Applying relevant theoretical methods directly to power plant information resource planning can guide demand analysis and system modeling. Some scholars believe that the existing theories and methods of information resource planning are more suitable for enterprise information construction, and the government’s information resource planning cannot simply copy the original research and methods [7]. Based on the potential value of mining massive data, this paper promotes the construction of smart cities. Strengthening the construction of smarter cities will not only help accelerate the pace of urban internationalization, promote the transformation of development mode, promote economic restructuring, but also influence and transform people’s lifestyles, making urban development more scientific, management more efficient, and society more harmonious.
2 The Connotation of the Big Data Period and Smart Urbanization Requirements 2.1 The Connotation of the Big Data Period Today, big data has become a strategic resource in the 21st century, and it has become the focus of strategic deployment of developed countries and capital investment by multinational corporations [8]. The specific connotation of big data can be understood as such, because the amount of information involved is too large, it is difficult to process, analyze and manage data in a certain period of time [9]. Compared with traditional data, the unique basic characteristics of big data can be divided into four aspects, as shown in Fig. 1. Therefore, the big data period is the period of experience fusion of information technology revolution and human social activities. It is a period of information architecture and technology architecture of a new generation [10]. It is also a new world of understanding and transforming the world by using information resources to discover knowledge.
Impact of Smart Cities on Resource Conservation Based …
3 Large storage
Volume Volume
Large increment
Variety 4V features of big data
Velocity
Value
Velocity More sources
Variety More format
Value
Fig. 1 4 V characteristics of big data
2.2 Smart Urbanization Requirements Based on Big Data Analysis The focus of the construction of a smart city is nothing more than “wisdom.” The so-called “wisdom” must be derived from the full analysis and utilization of big data [11]. From the perspective of the architecture of a smart city, the biggest difference is that the data is combined with the processing of big data, thus obtaining the multiinformation that supports and guarantees the smooth operation of the smart city [12]. It can be simply assumed that a smart city is actually an upgraded version of a digital city. The key factor in the transformation from urban digitization to urban intelligence is to achieve intelligent processing of digital information. Therefore, we must vigorously improve the level of big data applications, actively use emerging networks and information technology, promote urban management and public service information, and strive to improve the level of urban intelligence. If government departments are reluctant to disclose and share data, there is no way to make the data generate deep value and comprehensive value. We must make full use of the positive role of the government, enterprises and industry associations, divide cooperation and cooperation, coordinate interests, clarify their position of responsibility in the construction of smart cities, and avoid the phenomenon of self-built system. In the era of big data, we will vigorously promote the construction of big data infrastructure and basic networks, actively promote the construction of information resources data exchange and sharing systems, maximize the integration of resources, avoid low-level redundant construction, and make big data truly generate “great wisdom.”
4
Y. Chen and Y. Lin
3 The Impact of Big Data Analysis on Resource Saving in Smart City Construction As urbanization speeds faster, resources shortages, environmental pollution, and traffic jams become more and more difficult. These urban diseases have become the primary problem of urban construction and development. The addition of big data has solved these problems in urban construction and future development planning. Big data analytics can help solve a range of problems facing smart cities. Big data will be like the blood of the city, covering all aspects of urban life and urban construction, as shown in Fig. 2. With the existence of big data analysis, urban governance is more scientific and efficient. Big data analysis provides a good support for smart cities.
3.1 Impact of Government Resources Wisdom government refers to the use of modern network communication, computer technology, and Internet of Things technologies by government agencies to streamline, optimize, integrate, and reorganize government management and service functions on the Internet, breaking the constraints of time, space, and regulations. Data sharing is possible, which improves the efficiency of collaborative work of government agencies and the efficiency of civil affairs, and enhances the government’s social governance capabilities and public service capabilities, as shown in Fig. 3.
Application layer
Smart management
Smart industry
Smart people's livelihood
Security layer
Cyber security
Application security
Data Security
Data layer
Government cloud
Communication layer
Fig. 2 The overall architecture of a smart city
Industry cloud
Public cloud
Perceptual layer
Impact of Smart Cities on Resource Conservation Based …
5
Government window for receiving and sending information externally
Tax
Government hotline center
Court
Civil administration An open platform environment can provide outsourcing services for enterprises
Medical
Fig. 3 Schematic diagram of smart government work
Due to the application of big data analysis, smart government will become more intelligent. This is conducive to the open processing of information, timely access to online information and rapid processing. And it is conducive to coordination and cooperation between different departments. It can also accelerate the initial application of new modes of intelligent e-government services and mobile government services, expand personalized services, and further strengthen the direct two-way interaction and simultaneous exchange between the government and the society and the public. In big data, government management is both a database that can achieve effective connectivity, and the ability to improve coordination between government offices, greatly reducing government administrative costs. This provides strong support for government decision-making. The stability of “smart” will promote smart cities to be smarter, more scientific and more efficient.
3.2 Impact of Educational Resources The cloud-based education support platform will fully integrate various high-quality teaching resources, platforms, applications, etc. in the education system, and build a unified intelligent open architecture cloud computing platform to provide users with leased or free services to meet users through various The terminal application fulfills the needs of teaching, learning, management, scientific research, social interaction, etc., and realizes the release of educational information, access to teaching resources, interactive teaching, statistical education information and data, formation of scientific decision-making, implementation of educational evaluation, and collaborative research.
6
Y. Chen and Y. Lin
3.3 Impact of Logistics Resources By implanting sensor chips (nodes) in logistics commodities, every link in the supply chain of purchase, manufacturing, packaging, transportation, distribution, sale, and service can be detected and mastered without errors. These perceptual information are seamlessly integrated with the back-end databases such as GIS/GPS, Internet, and sensors, and become a powerful logistics information network. The application of such big data not only protects the interests of customers, but also realizes the effective management of logistics information, further reducing logistics costs, thus creating a more convenient smart city.
3.4 Impact of Medical Resources Whether it is the development of drugs or the use of disease sources, data analysis can get good feedback. The electronicization of a large number of cases in the hospital is more conducive to the mining of high data, and the social network provides a platform for clinical symptom communication and diagnosis and treatment sharing for chronically ill patients, and the hospital can also obtain sufficient clinical effect statistics. The difference in the way the body metabolizes drugs depends on the specific combination of genes, enzymes, and proteins, so genetic information is critical to selecting the optimal treatment. The use of big data can input the user’s daily data into the medical data system. By screening the data matching the pathogens, the infected group, scale and characteristics can be accurately found, and the treatment plan can be quickly called up. The excavation of physique will achieve the right medicine in the true sense and achieve the important goal of emergency management.
3.5 Impact of Traffic Resources Similarly, in the transportation sector, we can still see the impact of big data analytics on smart cities saving transportation resources. Smart transportation is an aspect of a smart city and a new way of travel, unlike traditional transportation. As shown in Fig. 4, the traffic road information is collected in real time, and the information processing of the big data platform is performed to guide real-time traffic according to the analysis result. This provides a good support for the good operation of urban traffic. Through real-time command, the road resource is well utilized and the transportation resources are saved.
Impact of Smart Cities on Resource Conservation Based …
Data collection
7
Analysis result Big data platform
Fig. 4 Schematic diagram of smart traffic
4 Summary Big data is becoming a new driving force for the smooth flow of smart cities, and it has become an invisible operational resource for the construction and management of smart cities. With the right use of big data, the city will explode with amazing energy. Therefore, big data is not only an important driving factor for the future economic and social development of the city, but also a trans-ageal change in the development of human society in a certain sense. The resource management of smart cities is inseparable from the innovation of the application, service and management model of big data related technologies and products, and the exploration of converged services and operation modes.
References 1. Enayet, A., M.A. Razzaque, and M.M. Hassan. 2018. A mobility-aware optimal resource allocation architecture for big data task execution on mobile cloud in smart cities. IEEE Communications Magazine 56: 110–117. 2. Mahapatra, C., A.K. Moharana, and V. Leung. 2017. Energy management in smart cities based on internet of things: Peak demand reduction and energy savings. Sensors 17: 2812. 3. Islam, M.M., M.A. Razzaque, and M.M. Hassan. 2017. Mobile cloud-based big healthcare data processing in smart cities. IEEE Access 5: 11887–11899. 4. Mehmood, R., R. Meriton, and G. Graham. 2017. Exploring the influence of big data on city transport operations: A Markovian approach. International Journal of Operations & Production Management 37: 75–104. 5. Li, R., Z. Zhao, and C. Yang. 2018. Wireless big data in cellular networks: The cornerstone of smart cities. IET Communications 12: 1517–1523. 6. Ngai, E., F. Dressler, and V. Leung. 2017. Guest editorial special section on internet-of-things for smart cities and urban informatics. IEEE Transactions on Industrial Informatics 13: 748–750. 7. Shirtcliff, B. 2015. Big data in the big easy: How social networks can improve the place for young people in cities. Landscape Journal Design Planning & Management of the Land 34: 161–176. 8. Falco, S.D. 2019. Are smart cities global cities? A European perspective. European Planning Studies 27: 1–25. 9. Garg, S., A. Singh, and K. Kaur. 2019. Edge computing-based security framework for big data analytics in VANETs. IEEE Network 33: 72–81. 10. Streitz, Norbert. 2019. Beyond ‘smart-only’ cities: Redefining the ‘smart-everything’ paradigm. Journal of Ambient Intelligence and Humanized Computing 10: 791–812.
8
Y. Chen and Y. Lin
11. Venkatesh, J., B. Aksanli, and C.S. Chan. 2018. Modular and personalized smart health application design in a smart city environment. IEEE Internet of Things Journal 5: 614–623. 12. Hossain, M.S., G. Muhammad, and S.U. Amin. 2018. Improving consumer satisfaction in smart cities using edge computing and caching: A case study of date fruits classification. Future Generation Computer Systems 88: 333–341.
Water Level Measurement Device Jian Huang
Abstract In order to detect water level information accurately, a new sensing technology based on capacitance sensing principle is adopted. A long rectangle metal sheet is inserted into the water. When the water level changes, the parasitic capacitance of the metal sheet will change. using the high precision and digital capacitive sensor FDC2214 senses this slight change and converts it into a digital output of up to 28 bits, data are sampled by the IIC interface, connected it to the high-performance microprocessor STM32, STM32 can efficiently sample and process these data. In programming the software, a multitude of data are sampled each time, and mean filtering algorithm is adopted to eliminate the interference, finally, we accurately acquire the information of water level. The experimental results show that this method can quickly detect the level of the water, the accuracy of measurement is closed to 1 mm. Keywords Water level detection · Capacitance sensing · FDC2214 · Mean filtering algorithm
1 Introduction Water level detection plays an important role in water resources protection and disaster prediction. Literature [1] proposes a water level detection method based on image processing. The video image is de-noised, the boundary is extracted, and the water level is calculated in segments. Literature [2] Template image is designed according to the pattern of standard two-color water gauge, threshold is set, image information is binarized, and water level is detected in horizontal projection curve of binary image. Literature [3] Improves the anisotropic diffusion filter (IADF) algorithm to read the image information of water level acquisition intelligently.
J. Huang (B) Xijing University, Xi’an, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_2
9
10
J. Huang
2 System Struct The system uses channel 0 of FDC2214 to detect parasitic capacitance in current air environment and channel 2 to detect parasitic capacitance in current liquid environment. For reference, the parasitic capacitance of channel 1 is used to detect the change of water level. When channel 1 is used to detect the parasitic capacitance, one side copper clad plate is inserted into the liquid, part of which is exposed in the air and part of which is in the liquid. The measured values of these three channels are output to STM32F103ZET6 through IIC interface. After the data are processed by software, the values will be transmitted to serial port or sent to LCD display through serial port. The whole system uses 3. 3 V DC power supply.
3 Main Working Principles and Techniques 3.1 Basic Principle of Capacitance Sensing FDC2214 is a sensor based on capacitive sensing technology. There are four channels, 0–3. For each channel, its working principle is the same. Take channel 0 as an example, its equivalent circuit is shown in Fig. 1. The sensing plate 1 is a one-sided copper clad sheet inserted into the water. When the water level changes, its value changes, which is expressed by Cx1. C and C X1 are connected in parallel to form an oscillating circuit with inductance L. The oscillation frequency FS is calculated by formula (1) and (2). Formula (3) calculates f r as a reference frequency. Formula (4) finally obtains the digits up to 28 bits after conversion. fs =
1 √ 2π lcx
(1)
In formula (1), L is an 18 H inductance, CX is the equivalent capacitance of capacitor C and C X1 after parallel connection, and the inductance L and CX are Fig. 1 Channel 10 equivalent circuit
Water Level Measurement Device
11
connected in parallel to generate an oscillation circuit with the oscillation frequency of f s . cx = c + cx1
(2)
In formula (2), CX is the equivalent capacitance of CX1 and C after parallel connection. fr =
f clk ch0_sel
(3)
In formula (3), FR is the reference frequency and f clk is the input frequency of FDC2214, which is 40 MHz. Ch0_sel is implemented by software setting the internal register 0 × 14 of FDC2214 to realize the frequency division of f clk . When testing, it is set to the second frequency division. The f r constant is a fixed value of 20 MHz. D AT A0 =
fs × 228 fr
(4)
In the above formulas, because the change of Cx1 in formula (2) will cause the change of Cx, which will cause the change of FS in formula (1). When it is brought into formula (4), the 28-digit DATA0 can be obtained.
3.2 Working Principle of Water Level Detection In order to improve the data acquisition rate, 40 MHz active crystal oscillator [4] is needed. In order to enhance the reliability and practicability of the system, it is necessary to test the environment. Channel 0 of FDC2214 detects the capacitance value of the current air environment, and Channel 2 detects the capacitance value of the measured liquid environment, and immerses it completely in the liquid when measuring. The above two measurements are taken as reference values. Channel 1 connects a one-sided copper clad sheet and inserts it into the liquid, part of which is exposed in the air. When the water level changes, the parasitic capacitance capacity of the copper clad sheet will change. FDC2214 is sensitive to this change and converts it into up to 28-Bit binary digits, which are transmitted to the high-performance microprocessor STM32F103ZET6 through the IIC interface to detect and process the data. The calculation of water level is carried out by formula (5). L =h×
C L − C L (0) CRL − CRE
(5)
12
J. Huang
4 Software Flow Chart and Main Technologies 4.1 Software Flow Chart Software processing. First, the serial port, SPI, IIC, timer and so on are initialized. After initialization, the values of channel 0, channel 1 and channel 2 of FDC2214 are read by IIC interface. Because of interference, mean filtering algorithm is needed to remove interference [5]. After many times of acquisition, the functional relationship between the acquisition value and water level information is obtained (given in the test part). For each acquisition value, water level information is obtained by calculation. These messages are sent to the computer through the serial port or displayed on the LCD screen.
4.2 Software Filtering Algorithm In data acquisition. The FDC2214 data of each channel should be collected many times. For example, 100 times, and then sorted all the data in order from small to large. In order to remove interference effectively, 20 maxima and 20 minima are removed, and the remaining 60 summations are used to calculate the mean, which is the final value of this acquisition.
5 Test According to the above principle, the hardware circuit is designed and the program is written. After debugging, the test sample is made. During the test, the whole copper clad laminate was exposed to air, and the sampling value was 6535. Then the whole copper clad laminate was immersed in water, and the sampling value was 6426. Gradually add water to the water tank and get the data shown in Table 1. As can be seen from Table 1, with the increase of water level, the measured value gradually decreases. In order to get the accurate relationship between water level and measured value. Continue to carry out more detailed measurements, each time the water level increases by 1 cm, record the measured values, import these data into MATLAB, after curve fitting, the following linear relationship can be obtained: y = 6534 − 6.301x
(6)
Water Level Measurement Device Table 1 Measurement results of different gesture recognition
13 No.
Level (cm)
Measurement
1
0
6535
2
0.5
6530
3
1
6527
4
1.5
6524
5
2
6521
6
2.5
6518
7
3
6515
8
4
6508
9
5
6502
10
6
6496
11
7
6489
12
8
6549
13
9
6474
14
10
6470
15
12
6459
16
14
6445
17
16
6432
6 Conclusion In this paper, a new water level measurement method is proposed. Based on capacitance sensing technology, the corresponding hardware circuit is designed, and the software is programmed. Samples are made, a large number of data are measured, and the linear relationship between water level height and measured value is determined, which can accurately measure water level height. Compared with image processing technology, this technology has the advantages of simple hardware circuit, strong anti-interference ability, high recognition rate and accurate measurement, and has certain practical value.
References 1. Bao, Jiang, Qingchuan Tao, and Peng Zhang. 2015. Water level line detection algorithm based on image processing. Hydropower and Energy Science 33 (4): 96–99. 2. Zhang, Zhen, Yang Zhou, Huibin Wang, Hongmin Gao, and Haiyun Liu. 2018. Image water level measurement with standard two-color water gauge. Journal of Instruments and Instruments 39 (9): 236–245. 3. Feng Guang, Changsheng Zhang, Ziyu Liu, Chuan Li, Bin Qian, and Hanping Zhang. 2016. IADF algorithm in water level image measurement of bicolor water level gauge. Sensors and Microsystems 35 (10): 148–151.
14
J. Huang
4. Sun, Bin, Changsheng Zhang, Ziyu Liu, Bin Qian, and Haiyong, Tian. 2015. HVPL algorithm in water level visual detection of two-color water level gauge. Control Engineering 22 (3): 413–417. 5. Bao, Shufeng, Yan Lou, Zhiliang, Dong, Fei Niu, and Rongxing Xie. 2017. Research and development of new groundwater level testing device under negative pressure environment. Geotechnical Mechanics 38 (10): 3067–3073.
Optimization of Urban Transportation Network Path Dandan Zhang and Haiyun Zhu
Abstract With the rapid growth of China’s economy, the urbanization process has been accelerating, urban road congestion has become increasingly serious, and traffic problems such as urban traffic environment pollution have become a hot spot of concern for the whole people. At present, the ways to solve road traffic problems are mainly divided into the class of strengthening road construction, increasing the road capacity to develop intelligent transportation systems, and improving road operation efficiency. However, under the condition of limited urban land resources, it is undoubtedly the most effective way to optimize road traffic organization and management through intelligent transportation system. This paper focuses on the dynamic path selection model and algorithm under multi-source traffic information, focusing on the traveler path selection behavior under multi-source traffic information, the dynamic path selection model and algorithm before travel, and the bus route selection under the influence of transfer behavior. Models and algorithms, as well as dynamic adaptive path selection models and algorithms in travel. The composition of the traffic network is discussed. The construction and expression of the traffic network model are expounded. The morphological characteristics and weight characteristics of the traffic network model are analyzed. The geometric characteristics of the traffic network and the accessibility index are used to analyze the morphological characteristics of the traffic network model. Evaluation and analysis. Keywords Network path problem · Urban traffic · Multi-source traffic · Path optimization
D. Zhang (B) · H. Zhu Zhengzhou Technical College, Zhengzhou 450121, China e-mail: [email protected] H. Zhu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_3
15
16
D. Zhang and H. Zhu
1 Introduction With the continuous increase of the number of cars owned by Chinese residents, the development speed of China’s road infrastructure is backward [1–4]. From superlarge cities to third-tier cities, traffic congestion is becoming more and more serious, and traffic congestion is endurance for motor vehicles and roads. Such resources bring losses [5, 6], which also increases the time and space resource consumption of the traveler on the road, which in turn leads to an increase in the travel cost of the residents and the production cost of the society. In addition, when traffic is congested, various pollutants emitted by automobiles, such as exhaust emissions, also pollute the urban environment, thus increasing external costs [7–9]. The purpose of the traffic network model is to describe both the characteristics of the traffic network and the application of the algorithm. The optimal path analysis algorithm is a method specifically designed to solve the optimal path problem. The system of optimal path analysis algorithms is huge, and it is very necessary to establish a classification system [10–12]. In the face of road traffic congestion and the safety and environment brought about by the increase in the number of cars, under the premise of limited road investment, this paper mainly uses the theoretical knowledge of complex networks to visualize the public transportation network. The path selection problem based on real-time traffic flow also provides guidance for urban traffic grooming, flow control, and driving route selection at the present stage. Finally, the traffic network is optimized for different time periods.
2 Multi-source Traffic Information In the context of the highly informatized process in the world, the field of intelligent transportation systems also presents a development trend based on multi-source traffic information, diversified system integration as the main form, and multi-level traffic management. As the supporting condition for the realization of various functions of the intelligent transportation system, multi-source traffic information is the core content. It is the collection, transmission, storage, analysis, processing and application of information that realizes the transition of traffic management from simple static management to intelligent dynamic management, which facilitates traffic static and dynamic information to the maximum extent, and is maximized by travellers, drivers, Traffic managers, traffic researchers and government agencies share and utilize, thus realizing the dynamic optimization of the transportation system, effectively meeting the needs of people for the development of transportation systems. Under the background of multi-source development of information, how to make full use of dynamic and static traffic information to realize the rationality of urban road network traffic flow, to achieve balanced road network traffic distribution and effectively alleviate traffic congestion, is the core of intelligent transportation system One of the features.
Optimization of Urban Transportation Network Path
17
The connotation and extension of multi-source traffic information should start with the elements of the traffic system, which consists of four basic elements: travelers, drivers and managers, goods, various kinds of vehicles and corresponding traffic facilities. Therefore, the strict definition of traffic information refers to all the information related to the four major components of the traffic system. From the perspective of traffic management, it mainly refers to the traffic information related to traffic operation and traffic management, which is the basis of the research in the field of intelligent transportation system. At the same time, due to the development of computer technology, network technology, communication technology, electronic technology and so on, traffic information is facing multi-source heterogeneous composition mode, which can be divided into static information and dynamic information from the frequency of information change. From the type of information, it includes traffic geographic information, traffic status information, public traffic information, traffic policy and regulation information, etc. These traffic information are manifested in different types, different organization and processing methods, and different service modes. The basic categories of multi-source traffic information are static traffic information and dynamic traffic information. Static information is a relatively stable traffic information for a relatively long period of time. This information is roughly information that characterizes the performance and characteristics of highways, urban roads, expressways, roads, parking lots, etc., which are the regular components of the transportation system, including related basic geography. Information such as road network distribution, functional cell division, intersections, road sections, etc., road network basic information, road grade, length, toll and other traffic management information such as limited traffic, traffic control, one-way traffic, etc. Dynamic traffic information. Dynamic traffic information refers to specific traffic information that a road traffic network participant has that changes with the actual traffic flow state. It mainly includes traffic information such as traffic flow, speed, and density, traffic dynamic control information, and traffic environment information. At the same time, in the process of dynamic and static information storage and application of intelligent transportation system, according to different data utility, traffic information is divided into transient, shortterm and historical categories. The transient information is to meet the requirements of real-time traffic control and guidance. The short-term information collected in real time is the information collected in a long period of time for the development of a specific traffic plan. The historical information is the previous traffic information selectively stored for the traffic management service, and has a long acquisition time span. Extracting the large sample size can provide data support for traffic evaluation, traffic planning and other program design.
18
D. Zhang and H. Zhu
3 Overview of Real-Time Traffic Information Informatization represents the ability and level of information technology and the integration of resources in a country or region. It is based on database technology, modern communication and network, and builds a large-scale, top-down, organized information network system. It is a kind of intelligent tool that cultivates and develops computer-based, and it is also becoming a new productive force. It can greatly improve the efficiency of people’s work and the productivity of equipment, and provide strong technical support for the improvement of human living standards and quality. It includes five basic processes: information acquisition, information transmission, information processing, information regeneration, and information utilization. A schematic diagram of the acquisition and sharing of real-time traffic flow information is shown in Fig. 1. The real-time traffic information management system realizes deep excavation and refinement of traffic data to generate a variety of traffic data information and transmit it to cars in the road. The working principle of the system is: First, identify the type of data (discrete or continuous) by k-cluster algorithm or heuristic algorithm, deal with redundancy and noise, and improve the rationality and effectiveness of the data. And intelligently supplement the missing data. Second, build a multi-source data fusion model with high correlation, build a data source and a type-rich database or data source, and a traffic status indicator system that conforms to the actual urban environment. Third, use measurement The method of economics or statistical analysis normalizes the traffic flow data collected from various channels, constructs the vehicle path feature database, and combines the real-time data of vehicle travel with the positioning data formed by GPS and Beidou navigation satellite to construct a traffic prediction model. Realized dynamic traffic forecasting.
Fig. 1 Schematic diagram of real-time traffic flow information acquisition and sharing
Optimization of Urban Transportation Network Path
19
4 Optimization of Urban Transportation Network Path Problem 4.1 Multi-objective Factors to Be Considered in Optimal Path Planning The multi-objective factors influencing the optimal path planning considered in this paper include space factor, time factor, cost factor and security factor. (1) Space factor The spatial factor is the influencing factor of measuring the spatial distance to the optimal path planning. Traditional optimal path planning is mostly based on spatial factors. The theoretical basis for the influence of spatial factors on path planning is Tobler’s first law of geography, that is, there is a correlation between everything, and things with similar distances are more closely related. In the traffic network, according to Tobler’s first law of geography, it can be considered that the interaction between two nodes, between nodes and hubs, and between hubs decreases as the distance increases. The measure of spatial factors can be quantified by the gravity model method in spatial accessibility. (2) Time factor Time-optimal path planning is getting more and more attention. Travel time data is based on time-optimal path planning, and its quality determines the accuracy of path planning. The road length can be obtained by calling the corresponding arc length, and the estimated speed can be obtained by acquiring the road design speed corresponding to the road grade attribute value of the road segment. Taking highways as an example, the estimated speed can be as shown in Table 1. (3) Cost factor The cost factor is the factor that measures the cost of the optimal path planning. The cost involved in this article refers to the narrow cost, including the fuel consumption and depreciation expenses of the vehicle, the road and bridge fees and parking fees used, and the cost of the train ticket. At present, for road networks, the cost is mainly concentrated on fuel consumption costs and road and bridge costs, and depreciation expenses and parking costs are generally not considered. The cost of railway, air and water transport is generally included in the cost of the vehicle and boat, which can be obtained by looking up the corresponding attribute data. Table 1 Road average speed Road grade
Highway
State road
Provincial road
City street
County road
Township road
Speed (km/h)
95
80
65
40
30
12
20
D. Zhang and H. Zhu
(4) Security factors The safety factor in this paper only considers the traffic accident rate. In the traffic network, there are many factors influencing the security. Taking the traffic accident rate as an example, the traffic accident rate of each arc segment is solved, and the safety weight is assigned to the arc segment attribute.
4.2 Network Shortest Path Problem Optimization For network models with different characteristics, the definition of the shortest path between the relevant source-target nodes (O-D) and their optimization methods are usually different. The shortest path problem of the same network model also leads to different optimization algorithms due to different optimization goals. In order to study the shortest path problem more systematically, classification is performed according to different classification indicators. According to the understanding of the edge and node attribute values in the network, the network shortest path problem is divided into deterministic and random network shortest path problem. The deterministic network shortest path problem is that the attribute related attribute value in the network is a clear value. The stochastic network shortest path problem indicates that the attribute values associated with the problem in the network are unknown in advance, and the values of these attributes obey a certain probability distribution. The essence of multi-objective optimization is to coordinate tradeoffs and compromises among objectives, so that all objectives can be optimized as far as possible. How to obtain the cooperative optimal solution of these objectives has always been a research hotspot in operational research and geographic information science, and also a basic problem in the analysis of GIS network. The multi-objective optimization problem is to find the best or more satisfactory path planning scheme according to certain conditions (objectives). The multi-objective optimization problem is to find the best or more satisfactory path planning scheme according to certain conditions (objectives). Its mathematical model is as follows: The objective function is: ⎧ ⎨ max(min) f 1 (x1 , . . . , xn ) ··· ⎩ max(min) f m (x1 , . . . , xn )
(1)
⎧ a11 x1 + a12 x2 + · · · + a1n xn ≤ (=, ≥)b1 ⎪ ⎪ ⎨ a21 x1 + a22 x2 + · · · + a2n xn ≤ (=, ≥)b2 ⎪ ... ⎪ ⎩ am1 x1 + am2 x2 + · · · + amn xn ≤ (=, ≥)bm
(2)
Satisfies the constraints:
Optimization of Urban Transportation Network Path
21
Necessary node Path constraint Necessary arc
Traffic rules Constraints Cost constraint
Time window Time constraint Soft window
Fig. 2 Constraints for path planning
The multi-objective factor optimal path planning model in this paper mainly considers four objective factors: space, time, cost and security. So the objective function is: C = min(θ1 Cl + θ2 Ct + θ3 Cc + θ4 Cs )
(3)
Common constraints are path constraints, time constraints and cost constraints as shown in Fig. 2.
5 Conclusion With the rapid development of economy and the acceleration of urbanization process, urban traffic congestion, traffic safety and other road traffic problems continue to spread, not only causing huge economic losses, but also aggravating environmental pollution and energy consumption, which has a serious impact on daily activities of residents such as life, work, travel and so on. At the same time, because of the low road area ratio and the serious mixed traffic flow, it is more difficult to solve the urban traffic problems in China. Optimal path analysis of traffic network is a complex problem involving multi-disciplinary fields. It needs different perspectives and methods such as applied mathematics, traffic economy, geographic information and so on. This paper analyses and evaluates the morphological and weighted features
22
D. Zhang and H. Zhu
of traffic network model, classifies and summarizes the optimal path analysis problems, establishes the classification system of the optimal path analysis algorithm, and studies the applicability of the algorithm, constructs the optimal path planning model based on multi-objective factors and verifies its correctness.
References 1. Chen, D., M. Hu, H. Zhang, et al. 2017. A network based dynamic air traffic flow model for en route airspace system traffic flow optimization. Transportation Research Part E: Logistics and Transportation Review 106: 1–19. 2. Xie, X.F., and Z.J. Wang. 2018. Combined traffic control and route choice optimization for traffic networks with disruptive changes. Transportmetrica B: Transport Dynamics 7 (3): 1–20. 3. Zhao, H., Z. Dong, Z. Dong, et al. 2015. Vehicle route assignment optimization for emergency evacuation in a complex network. Journal of Intelligent & Fuzzy Systems Applications in Engineering & Technology 28 (1): 107–116. 4. Li, P., P. Mirchandani, and X. Zhou. 2015. Solving simultaneous route guidance and traffic signal optimization problem using space-phase-time hypernetwork. Transportation Research Part B Methodological 81 (1): 103–130. 5. Xu, J., Y. Gao, C. Liu, et al. 2015. Efficient route search on hierarchical dynamic road networks. Distributed & Parallel Databases 33 (2): 227–252. 6. Cai, K.Q., J. Zhang, M.M. Xiao, et al. 2017. Simultaneous optimization of airspace congestion and flight delay in air traffic network flow management. IEEE Transactions on Intelligent Transportation Systems (99): 1–11. 7. Niu, S., J. Zhang, Z. Fan, et al. 2015. A method of UAVs route optimization based on the structure of the highway network. International Journal of Distributed Sensor Networks 2015 (1): 1667–1670. 8. Miao, C., H. Liu, G.G. Zhu, et al. 2018. Connectivity-based optimization of vehicle route and speed for improved fuel economy. Transportation Research Part C: Emerging Technologies 91: 353–368. 9. Yang, C., J. Mao, and W. Peng. 2016. Air traffic network optimization via Laplacian energy maximization. Aerospace Science and Technology 49: 26–33. 10. Li, X., J.Q. Sun. 2018. Signal multiobjective optimization for urban traffic network. IEEE Transactions on Intelligent Transportation Systems (99): 1–9. 11. Wang, S., X. Cao, L.I. Haiyun, et al. 2017. Air route network optimization in fragmented airspace based on cellular automata. Chinese Journal of Aeronautics 30 (3): 1184–1195. 12. Xiao, M., K. Cai, and H.A. Abbass. 2018. Hybridized encoding for evolutionary multi-objective optimization of air traffic network flow: A case study on China. Transportation Research Part E: Logistics & Transportation Review 115: 35–55.
Identification and Early Warning of College Students’ Psychological Crisis Based on Big Data Weie Xiong
Abstract Nowadays, the application and popularization of new media such as Weibo, WeChat and QQ make big data’s age come quietly, which will have a great influence on people’s life style, personal thought and behavior, etc. On the basis of analyzing the massive data of college students, this paper designed and developed the prototype system of big data’s analysis for college students’ mental health education, predicted the tendency of students’ psychological behavior and constructed the individualized emergency management mechanism of college students’ psychological crisis, so that to enhance the real-time and effectiveness of the management of psychological crisis in colleges and universities, and to innovate the mental health education of college students. Keywords Big data · College students · Psychological crisis
1 Introduction At present, the application of big data’s technology goes deep into various sectors of the society. In 2013, Big data’s application appeared in the “12th Five-year Plan for the Development of Cloud Science and Technology in China” issued by the Ministry of Science and Technology, and in the “Twelfth Five-year Plan for the Development of the Internet of Things” issued by the Ministry of Industry and Information Technology. Both documents are proposed to focus on supporting big data technology [1]. In the field of psychology, the research on psychological crisis early warning and suicide prevention strategy of college students under the background of big data will be a new trend in the future. We should make use of new media, innovate the carrier and platform of psychological crisis early warning, establish effective interactive mechanism, and make college students change from passive intervention object to active self-intervention subject, so that to fully reflect the subjectivity of college W. Xiong (B) Hunan Judicial Police Vocational College, Changsha 410131, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_4
23
24
W. Xiong
students [2, 3]. Moreover, we should also give full play to the enthusiasm and initiative of college students in the early warning of psychological crisis and suicide prevention, so as to achieve the good effect of intervention in psychological crisis.
1.1 The Importance of Using Big Data Technology to Identify and Warn College Students’ Psychological Crisis In recent years, there is an increasing number of incidents of students leaving home and hurting themselves caused by psychological problems, which has caused irreparable losses to the students and their families. This not only seriously affects the study, life and daily teaching of college students, but also is not conducive to the harmony and stability of colleges and universities. Through the establishment of big data knowledge base, model base, big data technology applied to early warning of college students psychological crisis and suicide prevention strategy research work, we need to fully mine the data under the support of the bottom data, and use the popular technologies such as ontology description, reasoning mechanism, machine thinking and so on, so that to design and develop big data prototype system which is suitable for the early warning of college students’ psychological crisis. Only in this way can the intelligence and humanization of the system be realized [4]. This is of great significance to the realization of individualized emergency management of students’ psychological crisis and the related theoretical research of information processing technology.
1.2 Analysis on the Current Situation of Identification, Early Warning and Suicide Prevention of College Students’ Psychological Crisis 1.2.1
Early Warning Indicator System
The early warning indicator system is a crisis prediction system by monitoring the situation of the early warning objects, events and individuals, and analyzing the causal relationship between the early warning objects and the state of crisis development according to the early warning indicators. The main components of early warning indicators are: first, the source of stress can be divided into independent stress, learning stress, future stress, communication stress, family and economic stress, major and sudden stress, etc. Second, stress response, mainly can be divided into cognitive response, emotional response, will response, behavioral response and physiological response; third, individual crisis susceptibility factors mainly refer to individual characteristics and individual background, individual characteristics focus on personality, coping style, attribution style, social support and self, etc. Individual
Identification and Early Warning of College Students’ …
25
background includes gender, nationality, grade, major, family source, self-evaluation of academic achievement, parental education, family structure and other indicators [5].
1.2.2
Analysis on the Causes of Suicide of College Students
It is generally believed that suicide is a kind of psychological crisis, and the causes of college students’ suicide are very complex, which is the result of interaction between internal and external factors such as personal factors, family conditions, social factors and so on. Suicide of college students is attributed to self-factors, external environmental factors and inducing factors. The defects in college students’ psychological tolerance, temperament, personality and outlook on life are the core factors that affect suicide behavior. However, college students encounter setbacks in love, too much pressure on learning, and tension in interpersonal relations are the cause of suicide. The emergence of suicide psychology of college students is not sudden or accidental, so it is a system; there is a process of change and development. Negative events play an important role in the formation of college students’ suicidal ideation, which is a very important external factor [6].
1.2.3
Suicide Intervention of College Students
The suicide psychological intervention system of college students is a system which can take prompt and effective measures to deal with the suicide of college students. In addition, this system can give support and help and avoid the occurrence of suicide. The system consists of three levels: social level, school level and family level, among which the school level is the key, including four subsystems: prevention system, early warning system, disposal system and tracking system. The four subsystems play an important role in suicide prevention, discovery, control and solution. College students’ suicide psychological prevention should construct a perfect network mechanism of college students’ suicide prevention so as to play a real role in the prevention of college students’ suicide. Through the mental health propaganda network, the consultation network, the crisis intervention early warning network, the psychological crisis rescue intervention network and so on, we can construct the suicide psychological prevention mechanism of college students.
26
W. Xiong
2 Construct the Emergency Management Mechanism of College Students’ Psychological Crisis Under the Background of Big Data 2.1 Construct a Six-Tier System for Emergency Management of Psychological Crisis in Schools In the aspect of emergency management of college students’ psychological crisis, schools, mental health education centers, families, colleges, classes and dormitories should be set up six-level psychological emergency management system. The school is responsible for overall planning; the psychological counseling center is responsible for professional assistance; the family is responsible for providing psychological support and emotional connection for the growth of college students; the college is in charge of arriving at the scene at the first time when an unexpected situation occurs, and controlling the situation and understanding the causes and consequences of the matter. Classroom and dormitory are the collective place for students to study and live. Class cadres are responsible for regularly providing information to counselors, so that counselors can understand the students’ psychological status, and guide and refer the students who have psychological crisis in a timely manner [7]. The six-tier system is not only the most primitive source of psychological information for college students, but also the most powerful grooming network for psychological intervention and treatment. Within the system, schools and families occupy a dominant position, and good interaction must be established. Only in this way can the system really have long-term vitality.
2.2 Construct a Psychological Crisis Treatment System The core of emergency management system of psychological crisis is to construct psychological crisis treatment system. This should be carried out not only by the psychological crisis advisory group and treatment group of mental health education center, but also by college counselors actively involved in psychological emergency management and auxiliary treatment. In the course of career planning education and life safety education, we should guide and motivate students positively. We also need to coordinate and cooperate with mental health education to systematize and diversify all kinds of educational contents. We should make great efforts to construct the sharing platform of college students’ psychological crisis treatment resources, actively integrate the superior resources both inside and outside the school, and focus on the mental health problems of college students and “consult”, so as to share the platform to absorb and expand the superior resources in all aspects. Only in this way, can we build a strong student psychological crisis therapy professional strength reserve, and improve the professional and scientific level of psychotherapy [8, 9].
Identification and Early Warning of College Students’ …
27
2.3 Construct a Psychological Crisis Relief System Due to the fierce competition in society and the higher demands on students in colleges and universities, the students’ learning pressure is generally greater at present. Moreover, most of the students study alone, and there is a lack of communication and communication between the students. Therefore, the college should establish a psychological crisis relief system. When the idea or tendency of students’ extreme behavior is found, the college counselor should actively assist the psychological counselor to guide and correct the students’ thinking and behavior [10]. Through group activities, such as relying on various competitions, social practices, volunteer services, and so on, students can discover their strengths and weaknesses, understand themselves, and communicate with each other when facing challenges or difficulties together. Moreover, they can help each other to overcome the psychological crisis and enhance the ability to adapt to the social environment. In recent years, the author used the prototype of big data technology development to carry out the early warning work of college students’ psychological crisis systematically, and achieved some results. The warning system uses green, yellow, orange and red, depending on the severity of the psychological crisis. Green means normal, and yellow indicates low-risk state of alert, which means that students’ psychology has unstable factors and is vulnerable to various influences and may develop into crisis, so early warning and prevention should be done well [11]. Orange indicates a moderate crisis alert, requiring school departments to intervene and intervene students in a timely manner. Red indicates high-risk alert status, so we should immediately intervene and evaluate and prevent crisis. This year, our school has successfully warned and has dealt with 6 psychological crisis incidents, so that to ensure the harmony and stability of the school.
3 Summary Taking the psychological crisis early warning and suicide prevention strategy of college students as the object, we should carry out the applied research work of big data’s technology pertinently, which has very important practical application value. We need to make use of the application value of big data’s technology, such as rapidity, relevance, predictability, accuracy, practicality and so on, so that to quickly and accurately judge the state and degree of the person at risk, and to effectively formulate targeted crisis intervention programs. In this way, college students can change from passive intervention objects to active self-intervention subjects, and can fully reflect the subjectivity of college students, so that to give full play to their enthusiasm and initiative in psychological crisis early warning and suicide prevention. Thus, we can give full play to the psychological crisis intervention and controlling.
28
W. Xiong
References 1. Liu, Zhenhai, and Hui Wang. 2017. Exploration on self-identity crisis and psychological intervention of college students in local undergraduate universities. Adult Education in China (21): 50–53. 2. Guo, Jing, Lili Ji, Liping Jia, Lirong Yu, and Guohua Lu. 2019. The role of psychological crisis vulnerability between college students’ life event stress and psychological crisis. Chinese School Hygiene 40 (1): 104–106+109. 3. Chen, Jianwen, and Qingxia He. 2018. Linkage between key-to-key and face-to-face: a new pattern of mental health education for college students. University Science of Education (3): 33–37. 4. Chen, You. 2018. A probe into the intervention method of psychological crisis for art graduate students–comment on the intervention of psychological crisis of college students. Chinese Journal of Education (5): 119. 5. Wu, Caizhi, Guangrong Jiang, and Wenting Duan. 2018. Current Situation and countermeasures of suicide among college students in China. Heilongjiang Higher Education Research 36 (5): 95–99. 6. Cai, Chen, and Yang Tian. 2018. Influence of campus experience input on psychological and social development of Enshi Tujia college students. Research on ethnic Education 29 (2): 80–85. 7. Lin Fan. 2018. An analysis of the application of psychological tenacity in the intervention of psychological crisis in colleges and universities. Party Building and Ideological Education in Schools (7): 80–81. 8. Zhou, Hongxia. 2018. Case study on coping with psychological crisis of college students from the perspective of ecosystem. Academic Journal of Education (2): 87–94. 9. Zhang, Pengcheng, and Ning Chen. 2018. The type, mechanism and intervention of college students’ network psychological crisis. Contemporary Youth Studies (1): 124–128. 10. Ai, Bo, and Tao Wang. 2018. Mental health education of college students and coping with psychological crisis-comment on mental health education of college students. Chinese Journal of Education (1): 136. 11. Zhou, Zhuohong. 2017. A study on mental health education of vulnerable groups of college students from the perspective of psychological capital–taking higher vocational colleges as an example. Vocational Education Forum (35): 93–96.
Application of VR Technology in Intangible Cultural Heritage Protection Liang Li
Abstract The intangible cultural heritage is a “living fossil” which reflects the existence and development of human folk culture and lifestyle. It tells the world in a unique way about the course of human growth. However, intangible cultural heritage is a special cultural carrier with an intangible state characteristics, which brought a variety of difficulties in promoting and protecting to people. Due to the shortcomings in traditional methods, this work applied the advantages of VR technology to the protection of intangible cultural heritage, in order to achieve the sustainable development goal of making innovative and characteristic intangible cultural heritage in the protection. Keywords VR technology · Intangible culture heritage · Traditional culture
1 Introduction In recent years, there has been an international upsurge in applications for intangible cultural heritage. In particular, the success of the application for the Dragon Boat Festival in Jiangling, South Korea, has made the Chinese people reflect on why the Dragon Boat Festival, which has a history of more than 2000 years in China, was first boarded by South Korea [1]. Why are rare cultural relics in China on display in foreign museums? Some Germans even say they want to see Chinese reliefs come to Germany; some Japanese say they want to see Hmong costumes come to Japan. It is undeniable that the ownership of Chinese cultural heritage is losing and many precious intangible cultures have been scrambled by other countries [2]. We must use modern means of protection to protect cultural sovereignty. The development of VR technology provides more advanced technology for the protection of intangible cultural heritage and changes the development trend of intangible cultural heritage protection in a new way.
L. Li (B) Digital Arts Department, Dalian Neusoft University of Information, Dalian, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_5
29
30
L. Li
2 The Concept and Application of VR Technology in the Protection of Intangible Cultural Heritage 2.1 Environmental Modeling Technology Three-dimensional virtual environment is the core of VR technology. The purpose of this is to obtain the three-dimensional data of the actual environment and to establish the related virtual environment by using the obtained three-dimensional environment data according to the actual needs [3]. The construction of virtual scene is mainly three-dimensional visual modeling, including graphics-based rendering technology and image-based rendering technology. The establishment of the model basically realizes the establishment of the three-dimensional virtual environment. However, there are many shortcomings and limitations in the three-dimensional software, thus the established model can not completely accord with the actual things in the detail processing. Until the end of 1990s, Apple company launched the VR technology (QuickTimeVR) system based on still image, which is a virtual reality system based on cylindrical panoramic image. The system can support the users to look around 360° in the virtual environment, walk along the fixed route and see all the high-quality real photos without knowing the 3D geometric information sheet of the image [4].
2.2 Stereo Synthesis and Stereo Display Technology In the real world, the sound we hear and the objects we see have a sense of space. For instance, the sound emitted from different sound sources can feel different sound intensity depending on the location of the sound source. The objects we see are all three-dimensional, which have different characteristics in different angles. Therefore, both objects and sound are space-occupying. However, the audio and video data we hear are played from the same speaker, thus a single tone replaces the original sense of natural space. VR technology can regain the stereoscopic space sense of sound and objects, break the defects of traditional video and audio technology and enhance the reality of virtual environment [5]. The synthesis of stereo sound in VR technology is mainly based on the design of direct sound, echo and mixed sound in surrounding environment to create a stereoscopic effect. Stereoscopic display technology is mainly realized by special stereoscopic display instruments, such as light valve glasses, helmet-mounted display and hand-held stereoscopic display equipment.
Application of VR Technology in Intangible Cultural Heritage …
31
2.3 Human-Computer Interaction Techniques Human-computer interaction technology mainly means that the user breaks away from the restriction of input devices such as mouse and keyboard. Users can first send out the demand information through gestures, voice and other body states, and then the virtual environment gives feedback and response to the commands, thus creating an immersive feeling. This technology is also realized by special sensor equipment, such as digital gloves, motion tracker and power feedback device, which can make relevant information feedback to the user’s gesture posture [6]. Virtual reality modeling language can build a three-dimensional language model base. When the speech control buttons turn on, the virtual environment will make the corresponding information feedback according to the voice of the user.
2.4 System Integration Technique Since there are a lot of perceptual information and models in virtual reality system, system integration technology is the most important part, including information synchronization technology, model calibration technology, data conversion technology, identification technology and synthesis technology. In short, the system integration technology is a systematic process of the perfect combination on the technologies used in the virtual reality environment, such as technology compatibility, playback speed and display effect [7]. In addition, the most obvious difference between intangible cultural heritage and traditional cultural heritage is that the former is a “living” cultural space, which must be associated with a specific cultural space in order to exist. Without cultural space, folk custom becomes a corpse specimen. Therefore, using VR technology to complete the transformation of the informatization form, has many advantages. (1) At present, the main means of traditional image collection is to use camera, video recording and other image equipment, which is difficult to take a complete picture for large main body. The VR technology can repair and stitch all kinds of images and simulate them into a real three-dimensional image. (2) VR technology realizes the digital management system and digital classification for the intangible cultural heritage documents, pictures, recorded sound and photographed images, in order to establish the database with pictures, text and audio-visual materials. (3) VR technology makes the static cultural heritage dynamic through living images, dynamic images and other technologies to dynamically reflect the static cultural data, thus truly making the intangible cultural heritage live. (4) The virtual reality environment not only can reproduce the real environment, but also can imagine the environment that does not exist. It can be constructed according to human needs without physical environment or development trend of the expected project, which breaks the restriction of personal factors of the inheritor.
32
L. Li
3 Case Study: Application of VR Technology in the Protection of Intangible Culture Heritage 3.1 The Significance of the Application of VR Technology in the Protection of Intangible Culture Heritage in Jiangxi Province According to a sample survey conducted in China, 26% of American tourists coming to China aim to appreciating places of interest, while 56.7% of them are most interested in the Chinese lifestyle and the local customs. The survey shows that the focus of attracting tourists is the original local culture and folk customs rather than a large number of artificial commercial facilities. Jiangxi Province is one of the best resources and environment protection provinces in China [8]. In 2009, the State Council made the decision to build the Poyang Lake Economic Circle, which is the first development project in the level of national strategy in Jiangxi Province for years. In addition, Jiangxi has rich cultural heritage and has created splendid Jiangxi culture. From the aspect of sustainable development, Jiangxi Province has great development potential both in terms of ecological environment and cultural connotation. Protecting intangible cultural heritage and developing the local tourism economy at the same time play a good role in promoting the propagation of intangible culture heritage. For example, the ceramic culture of Jingdezhen has attracted many tourists from home and abroad and brought some economic benefits. If the modern scientific and technological means such as VR technology are applied to the tourism development of intangible cultural heritage, the economic development will be greatly promoted.
3.2 Application of VR Technology in the Protection of Nuo Culture in Jiangxi Province The Nuo culture in Pingxiang is one of the most representative intangible cultural heritage in Jiangxi Province, and its most characteristic activity is the role conversion through mask, which is a kind of false act characterized by imitating the performance of the fake face to exorcise the gods and exorcism. It has formed distinct characteristics, such as the rich historical accumulation, the unsophisticated primitive form, the numerous cultural remains, the complete cultural system and the widespread distribution. Due to the lack of regional economic development and protection funds, it is difficult to adopt advanced technologies such as image rendering technology and three-dimensional display chip in VR technology directly [9]. The author considered that the “holarchy” development mode should be adopted. Under the premise of using relatively backward technologies to protect the intangible cultural heritage well, it gradually approaches to advanced technology and finally realizes the development
Application of VR Technology in Intangible Cultural Heritage …
33
mode of synchronizing with technology. For example, based on the establishment of the virtual environment, the early modeling method of VR technology can be adopted, such as the three-dimensional software modeling and the hand-drawn software, to scan the sketch through the way of three-dimensional transformation [10]. Although it lags behind the advanced technology in fidelity and efficiency, it is also a new attempt compared with the traditional protection method of intangible culture heritage. In terms of stereo effects, the stereo equipment with high cost performance can be chosen or multiple speakers can be set up to achieve similar results. In terms of service items, virtual management can be used first to use the virtual site to set up the line, evacuate the personnel and develop the whole cultural site.
4 Summary Under the impact of modern science and technology, many precious traditional cultural and intangible cultural heritage are gradually forgotten. Some intangible cultural heritages are on the verge of extinction or the loss of ownership, as a result, it is particularly urgent to seek a new technical means to save them. The successful case of VR technology has brought a lot of valuable experience and enlightenment to the protection of intangible cultural heritage. We should fully seize the opportunity and make use of advanced technology to protect our culture, in order to make the cultural construction and economic construction develop simultaneously, thus achieving the sustainable development path of protection and innovation. At the international level, we must always uphold political independence, territorial integrity and inviolability of cultural sovereignty, so as to promote the great traditional culture and intangible cultural heritage to the world stage.
References 1. Tan, Guoxin, and Lilong Zhang. 2019. Digital protection and inheritance of intangible cultural heritage. Library (4): 79–84. 2. Huo, Zhimin. 2019. Study on inheritance and protection of intangible cultural heritage about folk art in Northeast China-comment—The study of folk art heritage in Northeast China. Leadership Science (8): 2. 3. Ni, Caixia. 2019. The research status, hot spots and trends of intangible cultural heritage—In China-summary of the symposium on intangible cultural heritage and ethnic folk art discipline construction in China. Cultural Heritage (2): 139–144. 4. Hou, Xilong, Guoxin Tan, Wenjie Zhuang, and Ming Tang. 2019. Research on knowledge management of intangible cultural heritage based on related data. Journal of Library Science in China 45 (2): 88–108. 5. Ma, Xiaona, La Tu, and Yingqing Xu. 2019. Status of digitization on intangible cultural heritage. SCIENTIA SINICA Informationis 49 (2): 121–142. 6. Song, Li. 2018. A preliminary study on the supply mode of Nanyang Jade carving intangible cultural heritage digital platform under the view of internet. Art Panorama (12): 90–91
34
L. Li
7. Zong, Chuanyu. 2018. Innovative application of digital animation technology in intangible cultural heritage preservation. Art Panorama (12): 116–117. 8. Zhang, Jiayi. 2018. A study on the new media communication strategy of intangible cultural heritage—A case study of Shuishu custom in Sandu Shui autonomous county. Film Review (23): 109–112. 9. Wang, Pengfei. 2018. Application of VR technology in intangible cultural heritage protectioncomment on the frontier topic of intangible cultural heritage protection. Journal of Guangdong University of Finance & Economics 33 (6): 114–115. 10. Li, Xia. 2018. Study on the protection and inheritance of the intangible cultural heritage of the Chinese nation from the perspective of the internet. Packaging Engineering 39 (22): 92–96.
Construction of Ultimate Video Experience and Application Innovation System Based on 5G and 8K Dong Xiang, Xia Ran and Zhiqiang Xu
Abstract 5G will make the perfect presentation of 8K UHD and VR, AI, or more innovative applications possible. This paper first introduces the basic attributes of 5G and 8K, then discusses the new era of 5G to open up ultra-high-definition video applications, and then takes four fields of 8K video content production, VR 8K content production, OTT/IPTV content service and AI content service as examples. This paper probes into the innovative application of 5G 8K, and finally puts forward that the media industry should take 5G as the technology engine to layout “8K ecology” to enable the high-quality development of technology enabling media industry. Keywords 5G · 8K · VR · AI · Media integration
1 Introduction In 2019, the Chinese media industry was doomed to be no ordinary. In January 2019, the Propaganda Department of the Central Committee of the Communist Party of China listed “developing Radio and Television 5G” as one of the key tasks this year, marking that China Radio and Television Network will enter the “first year of Radio and Television 5G”. In March 2019, the Ministry of Industry and Information Technology and others issued the Action Plan for the Development of Ultra-HighDefinition Video Industry (2019–2022), which clearly put forward the overall technical route of “4K first, taking into account 8K”, and vigorously promoted the development of ultra-high-definition video industry and the application in related fields [1]. In May 2019, the Shanghai Economic and Information Commission and others issued the Shanghai Ultra-High-Definition Video Industry Development Action D. Xiang · X. Ran (B) · Z. Xu Digital Media and Creative Design Institute, Sichuan University of Media and Communications, Chengdu, China e-mail: [email protected] D. Xiang e-mail: [email protected] Z. Xu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_6
35
36
D. Xiang et al.
Plan (2019–2022), which optimizes the ultra-high-definition video industry space from the strategic level. The main task is to build the leading “5G+8K” application demonstration area in China [2]. In the same month, at the “World Ultra-Highdefinition Congress” held in Guangzhou, eight provinces and cities, such as Beijing and Sichuan, issued policies and action plans for the development of the ultra-highdefinition video industry. The State Administration of Radio and Television says it will also speed up the upgrading of radio and television transmission coverage networks and promote the application of ultra-high-definition television in cable television, satellite television, IPTV and Internet television. In particular, everyone should accelerate the construction of mobile interactive radio and television network for 5G and create a new ecology for the development of the ultra-high-definition video. The release of several “5G+8K” application policies will undoubtedly promote the overall upgrading of network capabilities, business capabilities, and user experience, and promote the development of media integration in depth.
2 5G and 8K The vision of 5G is to connect everything. Video live broadcast is one of the important applications in the 5G era. The combination of 8K UHD display and 5G will bring unprecedented extreme experience to the audience, and will make all industries develop rapidly to intelligent digitization.
2.1 5G 5th Generation (5G), which has enhanced mobile broadband, eMBB, Ultra-highreliability, and low delay communication, uRLLC, and large-scale (massive) machine communication, mMTC, these three application scenarios. The 5G peak network rate reaches 10 Gbps. The network delay is shortened from 50 ms of 4G to 1 ms, which will greatly promote the development of streaming media services. From the perspective of technology, 5G is further upgraded and evolved based on 4G. From the perspective of the impact of mobile communication on economy and society, 5G will become a new “universal basic technology” after the steam engine, electricity, automobile, and Internet, which can connect everything in the best way. However, from the perspective of commercial applications, mainstream operators around the world have begun to commercialize or deploy 5G networks, and ultra-high-definition video is undoubtedly the primary target business. 5G, the engine that drives the next ten years of information industry development.
Construction of Ultimate Video Experience and Application …
37
2.2 8K The need for visual clarity is very greedy. Generally speaking, FHD/2K/4K/8K, refers to the resolution standard of the video. From FHD to 2K, it is only the improvement of resolution and the accumulation of quantitative variation. From 2K to 4K to 8K, in addition to the improvement of resolution, it also breaks through the five-dimensional technical requirements of wide gamut, high frame rate, high dynamic, high color depth and panoramic sound, which is the beginning of qualitative change. 8K can not only bring users broad vision and high fine picture effect but also have good on-the-spot visual feeling in the aspects of picture color, level, and stereoscopic vision. However, the bandwidth requirement of 8K has exceeded the bandwidth requirement that existing 4G or even Wi-Fi can carry (such as uncompressed 8K video with a length of 5 min, the amount of data). About 1 TB, and the 5G network has good carrying capacity for 4K and even 8K UHD video. In addition, 8K is not synonymous with 8K TV or 8K content, but includes chip, shooting device, content, storage, network transmission, coding and decoding, display device front end to back end, from content making, decoding editing, hyperfusion of high speed transmission to terminal display, full link, full process service of the 8K ecological chain. In March 2018, China Ultra HD Video Industry Alliance was established. Subsequently, the three major telecom operators in China, adopted Large connection strategy to form “mobile communication ultra-high-definition video”. “combination boxing, complete the change of mentality from” “focus on product realization “to” pay attention to the user experience [3]”.
3 5G+8K, They Were Born to Create the Ultimate Video Experience Video is a typical user experience-driven business, and experience is the essential index to build the competitiveness of video business. At present, there are still many bottlenecks in 8K from production, form transmission to reception, such as scarce quality content, less pre-recording technology and equipment, the limited network carrying capacity and high production cost. In order to speed up the development of industry and the popularization of application, the Ultra-High-Definition Video Production Technology Coordination Center (Beijing) was established in August 2018. After the establishment of the center, the strategic thinking of “speeding up the popularization of 4K, cultivating 8K ecology and innovating the application of the industry” was put forward. The purpose of this paper is to gradually promote the scale deployment of ultra-high definition business, to create a whole industrial chain ecosystem covering ultra-high-definition, and finally to meet the growing video and entertainment experience life and production needs of individual and enterprise users.
38
D. Xiang et al.
The network speed limit in the 5G era will be lifted, and the video stream will become the main form of information expression and consumption. However, the new features will enable users not only to watch all kinds of current video content, but also to experience more than 8K ultra-high-definition video anytime and anywhere, bringing users the ultimate visual experience, including fast to extreme (zero waiting, zero blurred screen).It also includes simple to extreme (clear scene entry, perceptual content preview pleasure to extreme (video connection between TV and mobile phone, immersive integrated UI design) care for extreme (personalized video interface, TB class storage telecom home cloud.), and become an individual user ARPU (average revenue per user, average charge) growth, user stickiness to expand the scale of users breakthrough point [4–6].
4 5G+8K: From Quantitative Change to Qualitative Change 5G+8K brings not only faster transmission and higher quality content, but also the integration of data and services, and can also be highly integrated with a series of revolutionary technologies such as AI, VR. 5G+8K will also make more unreachable video applications a reality, and carry more video application scenes, such as live events, live performances, VR videos, and games, and even expand to medical and health, electronic production. AI intelligence and other related fields make it a giant draught of value innovation.
4.1 Production of Plane 8K Video Content In the “5G+4K” news live broadcast scene, the image is clear and delicate, the picture is coherent and smooth, the color is saturated and lifelike, and the compression damage is greatly reduced. Through 4K UHD TV and other content receiving terminals, users can obtain unprecedented sensory experience. At present, several media organizations have adopted the “5G+4K” standard for live broadcast in the process of major events and major theme reports. For example, during the National Congress in 2019, CCTV used 4K ultra-high-definition camera, ZTE 5G mobile phone, video conversion box to achieve “5G+4K” mobile live broadcast. With the improvement of network rate and video resolution, 5G network slicing function can also provide special virtual channel for 8K video, and “5G+8K” news broadcast will be more widely used in all kinds of the news reporting process. Moreover, bring users a more immersive visual experience and more rapid dissemination of information. For example, in December 2018, Chengdu’s “second Ring Road boutique Ring Road” successfully displayed the live broadcast of “5G+4K” in three places, followed by February 2019. The tallest tower in western China presented a bright and colorful
Construction of Ultimate Video Experience and Application …
39
“2019 Dream Tower Optoelectronic Fireworks Show”. It not only realizes the video broadcast of “5G Wireless Communication plus Network 8K Ultra HD Video Technology” to “Night Tour Jinjiang” and “Yuanxiao fireworks Show”, but also creates the global “5G+8K” video live broadcast (that is, 8K capture, 8K coding, all 5G transmission. The real 8K broadcast) the forerunner, for example, CCTV is better reporting on the World Park. The art fair also opened the entire “5G 8K” link in April 2019 and used it as the cornerstone of the 8K broadcast of the 2022 Beijing Winter Olympics [7, 8].
4.2 Video Content Production for VR 8K VR (Virtual Reality), also known as artificial environment, with “3I” characteristics—Immersion, Interactivity, and Imagination. Its essence is to use computers to create a false world. VR 8K video content production, based on 5G ultra-highfrequency and large bandwidth, low delay and high reliability, and relying on 5G edge cloud serviceability, not only stitches the images collected by VR cameras from all directions into 8K (or above) spherical images. Through the technical engine of real physical operation, the whole spherical image is not distorted. At the same time, the high-speed transmission rate of the 5G network transmits data to the cloud for real-time rendering, and then to the viewing end, so that the far end audience can wear VR glasses, and bring the audience a multi-dimensional, cloud-end or even endless shock experience. For example, at the 26th Oriental Wind and Cloud list Music Festival held in March 2019, China Telecom has built immersive sites for users hundreds of miles away to immerse themselves and integrate virtual and real things, through 5G+8K+VR HD live broadcast. This is the first time in the country. For example, in April 2019, Yang Liping’s modern dance drama “Spring sacrifice” also completed 5G+8K+VR live broadcast with the support of Zhejiang Mobile, which not only expanded the audience’s viewing space, but also gave a new dimension to artistic creation. In the future, with the increasing maturity of VR technology and the increasing popularity of terminals, VR can also bring a great sense of presence, immersion and interactive content, such as stadium size holographic display will produce a new artistic style, such as virtual dating based on a variety of two-way communication devices and making dating more romantic.
4.3 OTT/IPTV Content Service OTT is the abbreviation of “Over the Top,” which refers to the use of the Internet to provide users with a variety of application services; IPTV is the abbreviation of “Internet Protocol Television,” which refers to network protocol TV. With the rapid development of the Internet, OTT/IPTV business, as an important entrance to the family, occupies a very important role. OTT/IPTV service is mainly composed of
40
D. Xiang et al.
business management platform and CDN, and providing TV service and management support for users is the main function of the business management platform. With the advent of 8K, the service management platform can smoothly upgrade and support 8K services, requiring CDN streaming media server to have higher outflow, lower delay, and higher density hardware platform. The 5G network can realize seamless roaming of user OTT/IPTV service in the mobile network, home broadband network, and another network environment. In the future, everyone can quickly cut into the market through unrestricted time, positive video consumption patterns, cover more video services, and seize the minds of young users through lightweight OTT/IPTV business. For example, CCTV’s 4K channel, which was launched in October 2018, can screen the content on the user’s APP over a 5G network, providing users with an ultra-high-definition viewing experience.
4.4 AI Content Service AI is the abbreviation of “Artificial Intelligence,” which refers to artificial intelligence. At present, the biggest problem with 4K/8K is the lack of content. However, unlike the past standard definition and HD content, the difference is entering 4K/8K involves not only personal consumption level content playback, but also a super-integrated, whole-process service 8K ecosystem, which will completely bring about subversive changes to the media and entertainment industries. Therefore, for the problem of lack of 4K/8K content, AI algorithm can be used to improve the original low-resolution picture, and to achieve the expected or close to the 4K/8K picture quality display effect. However, it should be noted that cloud-based AI is highly dependent on the network, and is still limited to data transmission bandwidth and high delay, which greatly affects the real-time analysis and decision-making. The development of 5G technology will open up the whole value chain of content production, distribution, and consumption, and make the intelligent collaboration between “cloud side AI” and “terminal side AI” possible, and interact with the cloud in real time through the 5G network. 8K live stream transcoding can be carried out in the cloud, and multi-dimensional data analysis, processing, and distribution of related images can be carried out at edge nodes. For example, by analyzing the key behavior information such as human flow, residence time and so on, in the new retail industry, the customer’s activity law and changing trend in the field can be extracted automatically, and the offline behavior can be digitized. Of course, the future video business will no longer be limited to viewing and mechanical remote click, and the combination of video and AI will run through every stage of the video life cycle, and form an AI application brain and all kinds of terminals, split evolution of the super-large network.
Construction of Ultimate Video Experience and Application …
41
5 Peroration 5G will break through the limitations of existing technology, realize the real-time transmission and interactivity of high-resolution media stream, including immersive game service, VR game experience, home HD mobile video broadcast, real-time traffic and so on. Immersive and visual digital cultural products and services. It will bring infinite possibilities to the new era of “interconnection, vision, and wisdom” that human beings are about to enter [9]. The close combination of 5G and 8K industry will cultivate more new kinetic energy of economic development. In the future, the media industry should take 5G as the technology engine, combine the ultra-high-definition video technology to accelerate the design, use, construct the “5G + 8K” scene and realize the value, build the integration, cross-border coordination, solid transfer fusion. The modularity is strong, supports the diversification local characteristic application, thus explores the whole path for the media fusion to develop in depth, promotes the media industry high quality development [10].
References 1. Ministry of Industry and Information Technology, State Administration of Radio and Television, Central Radio and Television General Station. Action Plan for the Development of UltraHigh-definition Video Industry (2019–2022) [Ministry of Industry and Information Technology United Electronics (2019) 56]. 1 March 2019. 2. Shanghai Economic and Information Commission, Shanghai Culture and Tourism Bureau, Shanghai Radio and Television. Action Plan for the Development of Ultra High definition Video Industry in Shanghai (2019–2022). 5 May 2019. 3. Ren, Jianning. 2018. 2018 opens the 8K first year to compete for the 5G era video outlet? Television Technology 42 (4): 97. 4. China United Communications Co., Ltd. Network Technology Research Institute, Huawei Technology Co., Ltd. China Unicom 5G 8K Technical White Paper. February 2019. 5. Xu Huijun. 2017. Big video accelerating network change 5G is shining into reality. Communication World (5): 30. 6. Cai, Weisha. 2019. 5G era 8K UHD video development prospect. Guangdong Communication Technology 39 (1): 69–70+79. 7. 5G+8K live trial broadcasting will soon realize the appearance of “black science and technology” at Beijing World Park Expo. China Cable Television, 2019 (4): 352. 8. Sichuan Telecom completed the 5G+8K live broadcasting connection of “Night Tour to Jinjiang”. Communication and Information Technology, 2019 (2): 12. 9. 5G Network will be presented at the World Internet Congress. Telecommunication Engineering Technology and Standardization, 2018, 31 (11): 81. 10. In the name of 5G, what changes will take place in future life? Industrial Design, 2017 (11): 144.
Cost of Kidney Transplantation on the Base of Data Mining Technology Kaixing He, Jinguo Wang, Jiwei Wang and Na Wang
Abstract By analyzing the current status and problems of hospital medical data service, to propose the data cleaning scheme, and construct the database with the subject of disease expense to meet the requirements of further data mining. By analyzing costs of patients and the relationship of hospitals, diseases, surgeries, to establish a multilevel and three-dimensional analysis framework to study the current situation and characteristics of renal transplantation patients’ costs based on this framework. By using data mining technology, this paper tries to find out whether there are different rules of medical treatment behavior in the use of drugs and sanitary materials in the diagnosis and treatment of renal transplantation patients, and the current cost situation under different rules, and to explore the main factors affecting the cost of patients, so as to provide new ideas for the management and control of disease cost. Keywords Expence · Kidney transplantation · Medicine · Data mining · Evaluation system
1 Introduction Generally, medical big data is the sum of data generated by doctors in the process of patient diagnosis and treatment, including basic patient data, electronic medical records, diagnosis and treatment data, medical imaging data, medical management, economic data, medical equipment and instrument data, etc. [1]. Promoting and standardizing the application of medical big data is conducive to deepening the reform of the medical and health system, improving the efficiency and quality of health and K. He · J. Wang Department of Urology, First Hospital of Jilin University, Changchun, China J. Wang The Third Operating Room, First Hospital of Jilin University, Changchun, China N. Wang (B) Department of Anesthesiology, First Hospital of Jilin University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_7
43
44
K. He et al.
medical services, and providing health and health services for the whole life cycle of the people. Under the requirements of digitization, digitization, datalization and intellectualization of modern hospital information management, the application of medical big data in clinical diagnosis and treatment has been paid more and more attention [2].
2 The Current Status and Existing Problems With the continuous improvement and development of modern medical technology, kidney transplantation has been widely used in the treatment of end-stage renal disease. However, due to the risk of rejection and various infections and complications after transplantation, the quality of life after discharge is seriously affected [3]. However, under the traditional mode in China, it is difficult for patients to get professional guidance after discharge, so they have poor self-management and health care ability. Therefore, it is of great significance to strengthen effective follow-up after operation [4]. Liver and kidney function, blood routine test and drug concentration index test were performed weekly in the patients followed up with renal transplantation, and drug use was adjusted according to the report results [5]. All the follow-up patients need to keep the examination report documents for a long time. The traditional examination and examination report documents are usually paper, which is not easy to be kept for a long time and easy to be lost, thus increasing the physical and economic burden of the follow-up patients [6].
3 Statistical Description The distribution, centralization and dispersion trends of the cost of renal transplantation patients were statistically described, and the cost differences among different groups of renal transplantation patients were compared by using statistical tests such as analysis of variance [7]. The general data questionnaire and discharge readiness scale were given to the patients after renal transplantation before discharge, and the follow-up treatment compliance questionnaire and social support rating scale were given to the patients during the first follow-up visit to the hospital [8]. Questionnaires were distributed and collected by researchers. Explain the purpose and requirements of this study to the patients during the investigation, and carefully fill in each item individually by the research object, which can be assisted in special cases [9]. After the completion of the completion of the patient on the spot to check the integrity of the recovery. This is currently the main cost of research data collection methods.
Cost of Kidney Transplantation on the Base …
45
4 Construction of Data Mining System 4.1 To Standardize Electronic Data On the base of the diagnosis of renal transplantation patients, the association rule model was constructed to explore the combination rules of renal transplantation complications and complications [10]. On the premise of the same rule of diagnosis, the association rule model of drugs and sanitary materials is constructed respectively, and the rules of using drugs and sanitary materials are mined. Taking patient expense as decision attribute, a group model of decision tree was constructed to explore the main factors affecting patient expense [11]. Aimed at the present situation of data similar to duplicate records, missing values, inconsistent data, abnormal data as well as the primary key is not the only quality problem, using the basic field matching method and chebyshev inequality method to test the data problems, and formulate the corresponding merge, delete, tags, replace the cleaning solution, such as to construct a relational database in the cost of illness, including data testing, data cleaning, data validation, clean data flow, and the data processing flow of database construction [12].
4.2 To Establish Files of Transplant Patients On the base of the existing data, a multi-level and comprehensive analysis framework of disease cost is constructed from five dimensions, including patients, hospitals, diseases, surgeries and projects, to discuss the content and output of disease cost analysis based on different dimensions, as well as the policy issues and significance that the results may reflect [13]. In different disease types of kidney transplantation, the cost of treating patients with the same subtype of kidney transplantation in different hospitals of different levels and categories is also significantly different. Surgical patients are mainly distributed in hospitalized renal transplantation patients, and the average hospitalization cost is higher than that of non-surgical patients. By using the resources of the hospital information system, inspection system, imaging system, radiation system, pathology system and other related peripheral systems, the hospital adopts port docking technology and relies on the internal network, computer and communication equipment of the hospital to automatically mine diagnosis and treatment information from various peripheral systems. According to the statistical requirements, the follow-up data were screened, output and analyzed, and then the automatically acquired and input information and follow-up information were integrated into the follow-up management system to build a database layer of follow-up files for transplant patients [14]. There is a user operation interface layer outside the database layer, which is a system management function module, capable of storing, processing, extracting and data statistics of the database.
46
K. He et al.
4.3 Mining Approach Combined with Fuzzy Association Rules The cost of out-patient and inpatient kidney transplantation patients were mainly drugs and sanitary materials. The proportion of drug cost of outpatients is high, the proportion of health material cost of inpatients is high, and the proportion of drug cost decreases year by year [15]. In view of the cost differences among patients with different renal transplantation subtypes, this study further explored the causes of the cost differences by using data mining technology. Firstly, the association rule model of renal transplantation patients was constructed to explore the existing rules in the diagnosis of patients. Multiple diagnostic rules are obtained by screening. Under different diagnostic rules, the cost of patients was significantly different. In patients without accompanying diseases, the use regularity of drugs and sanitary materials is stronger, the dispersion trend of patient expenses is smaller under the same rule, while patients with different rules have relatively large differences in expenses, and the influence of rules on expenses is more significant. For patients with accompanying diseases, the use of drugs and sanitary materials is more scattered. Rules based on association rule model mining have limited interpretation of diagnosis and treatment behaviors and patient costs, and items outside the rules may have greater impact on costs. Based on the already discovered rules for the use of drugs and sanitary materials, combined with the basic personal information of patients and hospital visits, the group model of decision tree was built with the cost of patients as the decision attribute to explore the main reasons for the cost difference.
5 Conclusion For patients with different diagnostic rules, the association rules of drugs and sanitary materials are constructed respectively, and the rules of drugs and consumables used by patients are mined. The results showed that the use rules of drugs and consumables of patients with different diagnostic rules were common and had their own characteristics. Drugs such as sodium chloride injection, catheters, disposable syringes, disposable infusion sets and other consumables frequently appeared in the rules. Acknowledgements This research was supported by the First Hospital of Jilin University.
Cost of Kidney Transplantation on the Base …
47
References 1. Bentall, Andrew, Desley Neil, Adnan Sharif, and Simon Ball. 2015. ABO-incompatible kidney transplantation is a novel risk factor for BK nephropathy. Transplantation 2: 195–201. 2. Warejko, Jillian K., and S. Paul Hmiel. 2014. Single-center experience in pediatric renal transplantation using thymoglobulin induction and steroid minimization. Pediatric Transplantation 8: 939–942. 3. Al Aghbari, Zaher. 2004. Array-index: A plug&search K nearest neighbors method for highdimensional data. Data & Knowledge Engineering 3: 239–241. 4. Melab, Nordine. 2001. Data mining: A key contribution to E-business. Information & Communications Technology Law 3: 468–472. 5. Boraty´nska, M., A. Wakulenko, M. Klinger, and P. Szyber. 2014. Chronic allograft dysfunction in kidney transplant recipients: Long-term single-center study. Transplantation Proceedings 8: 755–756. 6. Remport, Adam, Andras Keszei, and Eszter Panna Vamos. 2011. Association of pre-transplant dialysis duration with outcome in kidney transplant recipients: A prevalent cohort study. International Urology and Nephrology 4: 415–418. 7. Hsu, J.H., C.S. Tseng, and S.C. Chen. 2001. A methodology for evaluation of boundary detection algorithms on breast ultrasound images. Journal of Medical Engineering & Technology 4: 459–462. 8. Che, Dongsheng, Qi Liu, Khaled Rasheed, and Xiuping Tao. 2011. Decision tree and ensemble learning algorithms with their applications in bioinformatics. Advances in Experimental Medicine and Biology 3: 365–371. 9. Lim, Wai H., Sean Chang, Steve Chadban, Scott Campbell, Hannah Dent, Graeme R. Russ, and Stephen P. McDonald. 2010. Donor-recipient age matching improves years of graft function in deceased-donor kidney transplantation. Nephrology Dialysis, Transplantation 25 (9): 3082– 3089. Official publication of the European Dialysis and Transplant Association - European Renal Association 2, 142–146. 10. Patricia, B. 2007. Cerrito: Choice of antibiotic in open heart surgery. Intelligent Decision Technologies 1: 89–92. 11. Yang, Wan-Shiou, and San-Yih Hwang. 2005. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 1: 143–148. 12. Wang, Louis W., Philip Masson, Robin M. Turner, Stephen W. Lord, Laura A. Baines, Jonathan C. Craig, and Angela C. Webster. 2015. Prognostic value of cardiac tests in potential kidney transplant recipients: A systematic review. Transplantation 4: 724–728. 13. Shu, Wanneng, and Lixing Ding. 2011. ECOGA: Efficient data mining approach for fuzzy association rules. Journal of Software 1: 93–94. 14. Baigent, C., L. Blackwell, R. Collins, J. Emberson, J. Godwin, R. Peto, J. Buring, et al. 2009. ‘Antithrombotic Trialists’ (ATT) collaboration: Aspirin in the primary and secondary prevention of vascular disease: Collaborative meta-analysis of individual participant data from randomised trials. The Lancet 373 (9678): 1849–1860. 15. Hemant, M. 2005. Phatak: Retrospective detection of potential medication errors involving drugs with similar names. Journal of the American Pharmacists Association 5: 639–642.
Public Service of Retired Personnel in Colleges and Universities in the Internet Era Yanping Wang
Abstract At present, the most remarkable characteristic of social development are networking and informatization, which provide a new choice for retirement service in colleges and universities. Colleges and universities are important institutions undertaking the responsibility of old-age service. How to do the old-age service of retired personnel well is of great significance and has a long way to go. Based on the investigation of the life style, material needs as well as spiritual and cultural needs of retired personnel in colleges and universities, this work obtained the results, put forward the countermeasures, and gave full play to the subjective initiative of retired personnel, so as to help the retirement work office of colleges and universities improve the management style and enrich the elderly life, especially to meet the spiritual and cultural needs of retired personnel. Keywords Internet · Retired personnel · Public service
1 Introduction Judging from the demographic characteristics of retired personnel in colleges and universities, the greatest characteristics are their high level of education and the fact that this team is composed of intellectuals, who are the intellectual elites of the society. Researching on the public service of this type of personnel can not only improve the management style of the retirement work office of colleges and universities, but also make use of the convenience brought by the Internet to provide them with excellent service [1]. At the same time, in the process of co-governance for the elderly, using the positive function of the Internet and innovating the traditional service mode for retired personnel also have certain reference significance for other colleges and universities. Doing public service well of retired personnel in colleges and universities can not only give full play to its “silver resources”, but also improve Y. Wang (B) Jilin Engineering Normal University, Changchun, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_8
49
50
Y. Wang
the veteran cadres’ sense of belonging, trust and happiness to the retirement work office, which is an urgent problem for colleges and universities at present [2].
2 The Present Situation and Problems of Public Service for Retired Personnel in Colleges and Universities 2.1 Retired Personnel in Colleges and Universities Need Superior Service At present, the management service for retired personnel is facing increasingly serious problems, and its nature has also changed, which requires better service. Its service content includes not only the actual implementation of the “two treatment”, but also the families, marriage, health and psychological needs of veteran cadres. More comprehensive and meticulous service provided by the management personnel of retirement work office is required from the daily life to illness and hospitalization of retired personnel. With the improvement of living standards and health indices, retired personnel are looking forward to better management services. For the empty nest elderly, they can not enjoy the family’s happiness, therefore, they are easier to feel lonely, pessimistic and bored after leaving their children for a long time. They need special attention and care from the staff. The management personnel of the retirement work office should visit them regularly, and timely response to the emergency in order to arrange personnel to take care of them. Every year, some personnel in colleges and universities will retire from their jobs, which inject fresh blood into the retired personnel, and they are also the main force to create social and economic value and exert the residual heat [3]. However, most of the veteran cadres are difficult to adapt psychologically after retiring due to the change of status, identity and treatment, as a result, the “retirement syndrome” will appear gradually, then cause diseases. The reason is that their focus of life is still on the job that they have been working for many years, and it is difficult to transfer for a while.
2.2 Retired Personnel Need Pluralistic Cultural Life Retired personnel in colleges and universities are different from other social retired personnel, since they are a special group with a high degree of education, high knowledge, high quality and high income. They have a strong sense of social participation, care about current affairs and politics, have a good mass foundation and their social influence is extensive [4]. Therefore, they have more demands and higher requirements for cultural facilities, and their enthusiasm for participation in cultural activities is also higher. In other words, their need for spiritual culture is greater
Public Service of Retired Personnel in Colleges …
51
than for material needs. However, the existing conditions are difficult to meet their pluralistic needs, which is a very realistic situation that colleges and universities are facing. Subjectively, some retired elderly people have to take care of their grandchildren, therefore, their chances of participating in collective cultural and recreational activities will be greatly reduced; Some elderly care about current politics and often obtain news information through various means, however, they lack the platform to display and exchange and opportunities to carry out some related lectures and to organize life; At the same time, most retired personnel are enthusiastic and eager to make their own contributions, however, there are few opportunities for them to really participate in these activities. Objectively, the building resources of colleges and universities are relatively tight and the venues for activities are quite limited. Take Southwest University as an example, its retirement work office is located in the Wuhou campus, and the existing activity centre of retired personnel, including mainly teachers and other highly educated people, sometimes overlaps with the teaching and administrative buildings, therefore, the activity space is restricted, especially various ball sports and fitness places [5]. For example, the activity places for calligraphy, dance, ball, chess, card and other fitness and entertainment activities are almost all confined to the cultural activity centre of the retirement work office.
3 Suggestions on Improving the Public Service for Retired Personnel of Colleges and Universities in the Internet Era 3.1 To Set Up Network Communication Platform Based on the Internet Nowadays, with the wide development of network and information, Internet, as a new approach to meet the spiritual and cultural needs of veteran cadres, should be made good use of its convenience and advantages to provide the retired personnel in colleges and universities with better service. For example, the network information exchange platform and the network education platform for the elderly can be built, therefore, cadres can learn courses based on their own interest or teach others in order to gain sense of achievement and pride through the Internet without space and time constraints, which is also the reflection of using the “silver resources” [6]. At the same time, through using the advantages of the Internet, such as learning forums, chat tools, personal blogs, e-mail, online video conferences and other interactive tools, veteran cadres can communicate with others at any time, so as to add fun to their spiritual life and to resolve their feelings of loneliness.
52
Y. Wang
3.2 To Implement the Political Life Treatment of Veteran Cadres The system of information briefing, visiting and saluting should be further improved in order to pass on the policies of the government and implement the relevant policies and treatment. Subscribed newspaper and magazines should also be distributed to veteran cadres so as to facilitate their autonomous study. Medical insurance, subsidies, allowances and other benefits for retired personnel should be realized in time, and schools should also increase the retirement holiday consolation payments year by year, so that veteran cadres can share the achievements of the reform and development [7]. In the period of “respecting for the elderly month”, the series activities for respecting the elderly with the theme of “cultivating respect for the elderly and building a harmonious family” should be held among the whole teachers and students in the “respecting for the elderly month” so as to send holiday greetings and greetings. What is more, the activities of “celebrating the Double Ninth Festival” and “Love in the Double Ninth Festival accompanied with youth” should be held to provide a platform for in-depth exchanges between veteran cadres aged 70, 80 and 90 and young volunteers. In addition, leaders can also visit veteran cadres who are aged more than 80 years old and living alone to send.
3.3 To Promote the Construction of Cultural Old-Age Service in Order to Meet Their Needs of Pluralistic Spirit and Culture Firstly, the position construction of the cultural activities for the veteran cadres should be strengthened, so as to ensure the construction of the basic facilities needed by the activities. It can hold various and colorful sports and cultural activities, provide learning, entertainment and fitness places with independence and good environment for veteran cadres and provide them with a wider platform for communication, so as to ensure the smooth development of the activities [8]. Colleges and universities should continuously increase its investment, gradually improve the equipment and facilities, purchase newspapers, magazines and books regularly, and check the safety and health of the center on a regular basis in order to create better conditions for enriching the cultural life of veteran cadres. However, veteran cadres should not be limited in the fixed activity place, for example, they can go out to visit, study and experience the new life, feel the new changes, visit the museum to study and enrich their cultural life and investigate elderly apartments and ecological homes for the elderly to set up new old-age ideas. Secondly, the veteran cadres center should often organize their favorite sports activities, training courses and interest groups that they are interested in, such as yoga class, model class, calligraphy class, dance class, calligraphy class, choir, chess club, flower class, opera class, recitation class, dress performance class, table tennis club,
Public Service of Retired Personnel in Colleges …
53
flower class, square dance class, badminton club and computer class. It is also possible to conduct political theory learning activities in various forms, such as situation reports, lectures, symposiums and reading sessions, so as to guide veteran cadres to pay attention to the mainstream [9, 10]. It can also hold article soliciting activity with the theme of “recalling passionate years and re-creating sunset brilliance” or the knowledge contest about the victory anniversary of the War of Resistance Against Japan. It can carry out activities among veteran cadres, student party members and party-joining activists with the theme of “Chinese Dream”, and combine their personal experiences and personal feelings to tell a good story of China and carry forward the national spirit. Finally, it can organize veteran cadres to participate in arts evening parties, such as holding the “sunset red” fun games, launching the “fun life” chess and card competitions, and holding the activities for women staff with the theme of “celebrating Women’s Day and promoting harmoniousness”, so as to let veteran cadres enjoy happiness in sports activities and further enhance cohesion [11]. The funding of periodical newspapers, such as Friends of Comrade, provides a platform for retired personnel to care about current affairs and politics and to express their feelings.
4 Summary Through the above analysis, it can been seen that the current society is in the era of the Internet, and the Internet has penetrated into various fields. For the retirement work of retired personnel in colleges and universities, it should also use the Internet to optimize the management strategy and build a network exchange platform so as to better meet the needs of the elderly and make them enjoy their life.
References 1. Yue, Jinglun, and Yun Hui. 2018. Research on the satisfaction difference of employees’ endowment insurance from the perspective of insurance participants—A case study of Guangzhou city. Jiangsu Social Sciences (4): 97–106+273 (in Chinese). 2. Chen, Lingquan, and Kaili Yang. 2017. The reasons and countermeasures for the formation of aloneness among retired personnel in colleges and universities. Chinese Journal of Gerontology 37 (23): 5947–5949. 3. Wang, Ping, and Muyang Gao. 2017. Research on the influence of participating in sports activities on the life satisfaction of urban retired personnel. Sports Culture Guide (5): 52–57 (in Chinese). 4. Zhi, Pang, Xiaorao Wang, and Huabin Xing. 2017. Research on the influence of China’s endowment insurance system on the income gap of the elderly. Shanghai Journal of Economics (1): 86–94 (in Chinese). 5. Li, Jinjin. 2016. Research on the reform of endowment insurance in China—A case study of Yuetan community in Beijing. Journal of Shanxi University of Finance and Economics 38 (S2): 15–18.
54
Y. Wang
6. Xiao, Baohua, and Yanxiang Zhang. 2016. Is the school responsible for the injury accident of labor dispatch personnel? Primary and Middle School Management (11): 46–49 (in Chinese). 7. Shen, Haiyan. 2016. Exploration and practice of personnel archives management for retired personnel in enterprises. Zhejiang Archives (6): 62 (in Chinese). 8. Hu, Jiangling, and Lin Wang. 2016. Reemployment of urban retired personnel under the background of population aging. People’s Tribune (17): 185–187 (in Chinese). 9. Yao, Zongliang. 2016. Subjective sense of happiness of retired personnel in colleges and universities and its related factors. Chinese Journal of Gerontology 36 (6): 1473–1475. 10. Guan, Weixian. 2015. Thoughts on the socialized management mode of retired personnel in public institutions. People’s Tribune (21): 236–238 (in Chinese). 11. Chen, Wenhua, Liqing Xian, Jinghong Wu, Yaping Chen, Juanjuan Wu, and Shuxin Jian. 2015. Service management of retired personnel in a certain campus of Sun Yat-sen university. Chinese Journal of Gerontology 35 (5): 1375–1377.
Application Research of Accounting Archives Informatization Based on Big Data Xiangdong Xu
Abstract Today’s society is a high-speed development of society, science and technology is developed, information flow, people’s communication is more and more close, life is more and more convenient, big data is the product of this high-tech era. Therefore, in this context, the inevitable development trend of some application fields is to use and develop large-scale information in the management of archives information. In order to make accounting archives information more extensive, active, timeliness and pertinence, we should apply multimedia technology in big data, which can not only provide great technical support for the management of archives information, but also provide archives information resources through multimedia computers. When we obtain rich and colorful archives resources, it will become very important. Convenient. In order to speed up the construction of accounting archives informatization, we must first enhance the importance of accounting archives, cultivate compound management talents, and improve the security mechanism. And through the sharing of archives information resources and the utilization of archives information resources, we can better promote the development of accounting archives informatization. Keywords Big data · Accounting · Archives · Information construction · Measures
1 Introduction With the rapid development of information in the era of big data, the importance of information has become increasingly significant. The function of digitalization will inevitably expand the function of archives, and will also make it more widely affect and affect information management [1–3]. In the background of modern big data, with the network technology and digital technology becoming more and more mature, and accounting also began to appear a large number of electronic documents, so accounting not only to protect the archives of the traditional genre of archives, but also to manage the digital records [4, 5]. The function of digitalization will inevitably X. Xu (B) Hao Jing College, Shaanxi University of Science and Technology, Xi’an 712046, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_9
55
56
X. Xu
expand the function of archives, and will make it more widely affect and affect the accounting information management [6, 7]. But in the process of archives digitization, we will encounter different bottlenecks and difficulties, such as technology is not perfect, law is not perfect, personal information level is limited, digitization gap is large, etc. So the main thing to do now is to speed up the construction of multimedia technology in the application of archives information under the background of big data era. Once this project is completed, the most important thing is to speed up the construction of multimedia technology in the application of archives information technology. Ultimately, archives and information sharing will be realized [8–10]. Therefore, through the sharing of archives information resources and the utilization of archives information resources, we can better promote the development of accounting archives informatization.
2 Brief Introduction of Accounting Archives Informatization Based on Big Data 2.1 Definition of Big Data “Big data” is an information asset that needs new processing mode to have stronger decision-making power, insight and process optimization ability to adapt to mass, high growth rate and diversification. A large-scale data set, which is far beyond the capability of traditional database software tools in acquisition, storage, management and analysis, has four characteristics: massive data scale, rapid data flow, diverse data types and low value density. The strategic significance of big data technology lies not in mastering huge data information, but in specialized processing of these meaningful data. In other words, if big data is compared to an industry, the key to making profits in this industry lies in improving the “processing ability” of data and realizing the “value-added” of data through “processing”. From a technical point of view, the relationship between big data and cloud computing is as inseparable as the positive and negative sides of a coin. Big data can not be processed by a single computer, so a distributed architecture must be adopted. Its characteristic lies in the distributed data mining of massive data. But it must rely on cloud computing distributed processing, distributed database and cloud storage, virtualization technology. Big data requires special techniques to effectively process large amounts of data that can be tolerated over time. Technologies suitable for large data include large-scale parallel processing (MPP) databases, data mining, distributed file systems, distributed databases, cloud computing platforms, the Internet and scalable storage systems.
Application Research of Accounting Archives Informatization …
57
2.2 The Application Significance of Big Data Era in Accounting Archives Informatization Multimedia technology plays a significant role in promoting and promoting the construction of archives informatization in accounting. It has the following two main application significance and application value: First, multimedia technology should be applied to the construction of archives informatization, which can give full play to the advantages of multimedia, such as high acceptance, rapid dissemination, strong intuition and large amount of information. In addition, it can improve the working level and efficiency of archives information management. Furthermore, some procedures and operation steps in the management of Archives Informationization are simplified, which can make users more convenient to access and maintain archives information. Second, the application of multimedia technology in the construction of archives information can make the current archives information management keep up with the pace of the era of big data, better adapt to the development of modernization, thus reducing the workload of archives information management, saving the storage space of archives information, and improving the quality and efficiency of archives information management.
2.3 The Status Quo of Accounting File Management Informationization The accounting information management information started relatively late with the enterprise, but after several years of development, the accounting file management informationization has achieved good results. From the hardware point of view, the coverage of new technologies such as image technology, ORC technology, barcode and multimedia in accounting archives is 100%; the transition from client/server mode to browser/server is realized in network construction, all The accounting profession has implemented the accounting file management local area network, forming a vertical and three-dimensional accounting file management system, and has accounting office automation software to realize software management and operation. In terms of the system, various regions have successively issued relevant rules for regulating the accounting information management, and constantly improve the information management process. However, the degree of informatization of accounting files is not high, and it is still in the initial stage of system operation, software maintenance and data archiving; the development of accounting file management informationization is slow; there is no systematic and historical file management, and only financial value is attached to management. The management of documents in economic affairs, neglect of archives, work coordination documents.
58
X. Xu
3 Insufficient in the Accounting Informationization 3.1 Accounting File Information Management Is Relatively Lagging Behind In the latest opinion draft, the definition of accounting files “refers to accounting materials, accounting books and financial reports and other professional accounting materials” was changed to “characteristics with saved values and archived texts, charts, images, audio, video, etc”. “Accounting documents”; “Other accounting information records with preservation value” were added to other accounting materials in the scope of accounting files; the relevant contents of electronic accounting file management were added, but the final draft was still not officially issued. Moreover, from the content of the draft for comment, it is only the revision of the original method, and there has been no substantial change. It only regulates the after-sales of accounting files, and does not cover the specific content and formation process of electronic accounting files, nor does it reflect the contents of the latest relevant laws and regulations such as electronic signature law. At present, the distribution of the literature on the application of accounting archives in different years is shown in Fig. 1. It can be seen that the information management of domestic accounting archives is also growing.
3.2 Accounting Macro Management Work Neglects Electronic Accounting File Management The domestic accounting management is the responsibility of the financial departments at all levels, and the competent department of the industry has the responsibility of guiding, managing and supervising the accounting work of the subordinate units. Fig. 1 Accounting file information application research literature statistics
200 150 100 50 0
Application Research of Accounting Archives Informatization …
59
However, in actual work, financial accounting management departments at all levels are limited to manpower and material resources, and it is difficult to implement effective management of specific accounting work. With the deepening of economic marketization, the role of industry authorities in corporate accounting management is becoming weaker. The lack of management mechanism makes the management of accounting records lack the proper supervision. As the new content of accounting files–electronic accounting files, due to the lack of specific regulations, it is in a state of no standards, unmanned and unmanned. The management of electronic accounting files of all units is completed spontaneously by the unit financial personnel. At the same time, accounting informationization is ignored in the process of accounting informationization. At present, domestic accounting informationization focuses on accounting information processing and output. For example, computerized accounting work management is mainly for the processing of accounting information. The application of XBRL in accounting is for the output of financial information, lack of accounting files. Informationization work should be given due attention. Accounting files have the commonality of general files, but at the same time they have special content and requirements. Compared with general file informatization, accounting file informationization pays more attention to the use of accounting data. The general practice of existing file informationization, such as mainly converting various types of files into graphic files for storage, is not completely applicable to accounting file informationization. Graphic files can maintain the original shape of documents, but cannot satisfy the source data of accounting files. Information needs are also not adapted to the emergence of more and more electronic original credentials.
3.3 Accounting File Information Management Software and Hardware Facilities and Lack of Development and Utilization Software and hardware infrastructure is an indispensable basic condition for accounting file information management. Accounting file information management must be used in specific computer hardware and software environments. The accounting department shall have the necessary hardware conditions for dust storage, antimagnetic, moisture-proof, etc. for the place where the electronic accounting files are stored. The electronic accounting files received and stored shall be loaded into a special software box, and the software box shall be placed in a special anti-magnetic file. Inside the cabinet. However, the reality is that the investment in the software and hardware management of accounting archives is not enough. The necessary software and hardware facilities are lacking, the facilities and equipment are not matched, and the basic demands of information management are not met. The form of accounting file development and utilization is too old and backward, and there is no effective use of information technology. It is not deep enough in the development and utilization of electronic accounting files. At present, many units still use the traditional “you
60
X. Xu
borrow me” type of accounting file utilization, most of them still stay in the passive “waiting for the door” state, the computer is just a typewriter, simply can not talk about computer storage, Review or use online. The ultimate purpose of accounting file information management is to provide utilization. However, the current development and utilization methods have restricted the development and utilization of electronic accounting files, and ultimately the accounting file management work can not play its own effective and effective role.
4 Measures to Strengthen the Accounting Information Management Information 4.1 Enhance the Importance of Leaders Enhance the leadership’s emphasis on the accounting information management information. School leaders play an important role in promoting the informationization of accounting records management. The decision-making layer must not only strengthen the informationization management of accounting file management personnel, but also enhance their own awareness. This requires them to establish a scientific accounting information management information concept, fully understand the importance of file management in school management; based on the overall situation, strengthen the financial budget in the construction of information technology, increase the use of accounting file management information Funding investment; establishment of supporting electronic accounting file management sites and hardware facilities. For example, reasonable configuration of computer hardware, software systems, supporting scanners, recorders, scanners and other input devices, timely update accounting file management software and Internet output devices, easy to operate and consult.
4.2 Enhance the Importance of Accounting Staff This requires a sense of mission and responsibility to strengthen the construction of socialist archives with Chinese characteristics. Under the background of the new era, accounting file managers need to deal with networks, computers, input devices, output devices, etc., which puts higher demands on accounting file management personnel. On the one hand, it is necessary to correctly guide accounting managers to adapt to the development of the times, to shoulder the historical responsibility given by the times, to abandon the traditional concepts, to carry forward the down-to-earth, rigorous and meticulous craftsmanship, and to carry out the accounting archives work; on the other hand, it is necessary to enhance the self-restraint awareness of accounting personnel. Clarify the importance of file management. The accounting
Application Research of Accounting Archives Informatization …
61
information management informationization is not only an effective means to solve the traditional file management complex procedures, but also an important way to realize the accounting, standardization and efficiency of accounting files. By clearly targeting and strengthening responsibilities, accounting staff can actively participate in the construction of accounting archives information.
4.3 Cultivate Compound Talents to Ensure Safety Advanced technology and equipment require supporting professionals to ensure the effective operation of technology. The comprehensive quality and professional skills of personnel determine the speed and quality of accounting file management informationization. At present, the traditional accounting file management personnel in China have a large age and low cultural level, lacking computer operation theory and network security awareness, and facing informationization construction is limited to custody and inspection. However, accounting file management informationization requires high-level composite talents to ensure the effectiveness and security of operations. This requires them to be proficient in computer network management technology, to clarify the importance of file management, and to be proficient in statistical analysis of accounting file data. The first is to strengthen the accounting file management personnel to go out and strengthen the knowledge theory reserve. To achieve full-featured computer proficiency, familiar with national accounting and accounting management laws and regulations, and master the digitalization, networking and other information-based foundations. For the young and motivated staff, according to the actual needs, targeted to send out to participate in professional theoretical training, strengthen the comprehensive management of accounting file management information, and apply the training theory to the actual work. The second is to adopt an introduction strategy. Strictly grasp the entry of accounting file management personnel, introduce a group of new file management talents that keep pace with the times and adapt to information management, realize the research of accounting file information research and management talent team, and ensure strict observance in the daily management of accounting files. Network specifications, security processes, and the phenomenon of artificially modifying files.
5 Conclusion Accounting informationization is an important economic and pragmatic record in accounting work, and an important retention resource in the process of modernization of accounting management. Therefore, the country should continuously strengthen the emphasis on the accounting information management information, improve the system guarantee of information construction, cultivate the various risks
62
X. Xu
in the management of composite talents, build an effective accounting file management information system, and promote accounting files. The business is healthy and sustainable.
References 1. Huan, Q.U. 2018. Spatial distribution patterns of cultural facilities in Shenzhen based on GIS and big data. Journal of Landscape Research 10 (04): 51–57. 2. Xiong, K.Z., W.H. Zhang, G. Han, et al. 2017. The application prospects of provantis system dispense module in the management of test article in non-clinical drug safety evaluation. Chinese Journal of New Drugs 26 (6): 635–638. 3. Zeng, L., C. Meng, Z. Li, et al. 2015. Cloud computing and its decision-making for medical and health informatization in the context of big data. In IEEE International Conference on Bioinformatics & Biomedicine. 4. Brandas, C., O. Megan, and O. Didraga. 2015. Global perspectives on accounting information systems: Mobile and cloud approach. Procedia Economics & Finance 20: 88–93. 5. Chun, N., and S. Lee. 2015. Bonus compensation and productivity: Evidence from Indian manufacturing plant-level data. Journal of Productivity Analysis 43 (1): 47–58. 6. Haijun, L. 2015. Research on contribution of informatization to the development of “four modernizations”—A case study of Henan Province. Journal of Changchun University 21 (2):62, 64–65, 67–68. 7. Li, L., Y. Lei, D. Pan, and C. Si. 2016. Research on sustainable development of resource-based cities based on the DEA approach: A case study of Jiaozuo, China. Mathematical Problems in Engineering 2016 (3): 1–10. 8. Gang, S., X. Dong, L. Zhi, et al. 2015. Design and application of government Wiki based on open knowledge management. Office Informatization 26 (1): 1–15. 9. Sommer, F., J. Klink, D. Senkl, et al. 2015. Determinants of web-based CSR disclosure in the food industry. International Journal on Food System Dynamics 6 (1): 24–31. 10. Najafi, S., S. Saati, and M. Tavana. 2015. Data envelopment analysis in service quality evaluation: An empirical study. Journal of Industrial Engineering International 11 (3): 319–330.
Construction of Vocational Education Information Platform Under the Background of Big Data Xiaojun Jiang and Zengxiang Pan
Abstract In the era of big data, the process of collecting and processing all kinds of information and data in today’s society becomes more simple and convenient. Data analysis technology is also widely used, which has deeply affected all aspects of social life. However, informationization of education is the requirement of the development of the times, the strategic choice of the overall situation of education, and the basic support and necessary means to realize the modernization of education. This paper briefly introduces what is the Vocational Education Informatization Platform under the background of big data, analyses the current situation of the development of domestic Vocational Education Informatization, and puts forward the optimization strategy of constructing the Education Informatization Platform. Keywords Vocational education · Information platform · Existing problems · Strategy
1 Introduction The arrival of the era of big data has greatly reduced the cost of information dissemination and acquisition. At the same time, vocational education informatization also has irreplaceable advantages [1–3]. In the era of big data, teaching is facing excellent opportunities for development. Through various new information and data dissemination methods such as network, the dissemination scope of teaching knowledge and information can be expanded in a wide range, so that teachers and students can acquire it; and through data analysis and collation technology such as cloud computing, the complicated teaching information can become clear and orderly, so as to be mastered by teachers and students [4–7]. It can be said that the achievements of the school cannot be separated from a lot of work, such as the clear orientation of the school, efforts to self-development and innovative personnel training mode [7–10]. X. Jiang (B) College of Extended Education, Jilin Engineering Normal University, Changchun, China e-mail: [email protected] Z. Pan Linjiang Vocational and Technical School, Linjiang, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_10
63
64
X. Jiang and Z. Pan
On the other hand, the construction of the school digital campus network and the application of information management mode have also made important contributions to promoting the development of the school, and they are mutually reinforcing [11–14]. Therefore, we should speed up the construction of vocational education informationization, promote the modernization of vocational education by the informationization of Vocational education, which is an important part of speeding up the development of modern vocational education, and is of great significance for improving the quality of vocational education personnel training.
2 Vocational Education Informatization Platform Under the Background of Big Data 2.1 Development of Internet Technology in Big Data Era As the representative technology of the third industrial revolution, Internet technology has made great progress in the past decades. Tens of thousands of computer systems with different geographic locations and relatively independent functions around the world are interconnected by means of communication equipment and lines, and the data communication network of network resources and information exchange is realized by well-functioned network software. In recent years, with the rapid development of IT and communication technologies such as Internet, Internet of Things, Cloud Computing and Triple Network Integration, the rapid growth of data has become a severe challenge and valuable opportunity for many industries, and the information society has entered the era of Big Data [1]. The basic characteristics of large data can be summarized by 4 V. They are Volume, Variety, Value and Velocity. The development of big data technology not only changes people’s life and work mode, enterprise’s operation mode, but also gradually promotes the change of vocational teaching mode.
2.2 The Connotation of Vocational Education Informatization Platform Under the Background of Big Data Educational information platform in vocational schools refers to the software and hardware environment created for the construction, application and development of information technology in the field of vocational school education in the process of modernization of vocational education and meeting the needs of the times and society by teachers and students of vocational education applying information technology and information resources to promote the development and reform of education and teaching on the basis of network environment. Vocational school education
Construction of Vocational Education Information Platform …
65
information platform mainly includes two aspects: First, the basic support platform: the digital campus basic support platform, which provides a technical platform to support a variety of application systems. It starts from the aspects of information display, security management, information resources management, teaching information resources sharing, business collaboration, and so on. By constructing various basic platforms, it enables various applications. System development can follow the unified technical specifications and standards, but also support the construction of various application systems, thus forming the application support system of digital campus. Secondly, the overall application system: provide various application systems to support the work of the school, covering the needs of digital management of school teaching, moral education, educational research, logistics and other lines, constituting the “digital campus application system”. Such as teacher education and teaching, head teacher, enrollment and employment management, student management, financial charges, logistics management, post practice, educational administration management, office automation system, campus card, etc.
2.3 Necessity of Vocational Education Informatization Platform With the improvement of informationization, data collection channels are more extensive. There are many kinds of data involved in all aspects of work, but there are also problems of low value density. This requires data mining, effective data management, analysis and extraction, from which high-value information can be obtained and teaching work can be improved. Due to the development needs of Vocational education, it is necessary to expand its functions according to the actual learning conditions. The platform should have good applicability and expansibility, such as formulating unified protocols and reserving standard interfaces, so as to avoid wasting resources due to the development of different information systems. At present, vocational education in Colleges and universities has put forward higher and higher requirements for the construction of information platform, which also promotes the continuous development and evolution of the system. It is imperative to establish a unified information platform to maximize efficiency.
66
X. Jiang and Z. Pan
3 Analysis of the Current Situation of the Development of Vocational Education Informatization in China 3.1 Progress in the Development and Application of Digital Teaching Resources Progress has been made in the development and application of digital teaching resources in recent years. In recent years, the Ministry of Education has organized and developed more than 40 national higher vocational education professional teaching resources banks and more than 300 national quality resources sharing course teaching resources. It has opened a national and higher vocational education digital learning resources platform, and has opened 1000 network education excellent courses and 1000 video lectures to the community free of charge. The center integrates more than 30,000 continuing education courses. At present, many regions in China have constructed network learning space and digital resource bank, and initially realized the co-construction and sharing of digital high-quality resources in Vocational education. The educational and teaching resources in the construction and application of educational informatization platform in vocational schools are uneven. As we all know, the well-built information platform is used to serve the future teaching activities of teachers and students, so it is very irresponsible for a few teachers to upload some low-quality teaching courseware, teaching videos, exercise homework to the secondary vocational school education information platform. Under the environment of education informationization, anyone can learn at any time, which provides a strong guarantee for realizing education equity and promoting education balance. At the same time, through the depth and wide application of information technology in education, we can promote the comprehensive reform and innovation of educational content, methods, means and concepts, give full play to people’s learning and development potential, and help to improve the quality of education and teaching.
3.2 Continuous Promotion of Digital Resources and Management Platform Construction National vocational education demonstration schools, higher vocational education demonstration (backbone) school project management information system, vocational school student information management system, national vocational college skills competition management information system and other information management platforms have been built, forming a national website and more than 20 provincial websites complement each other’s vocational education backbone network. Firstly, we should establish a “student-oriented” interactive platform of educational and teaching resources in secondary vocational schools. Strengthen the construction of digital terminals and application platforms in schools, comprehensively improve
Construction of Vocational Education Information Platform …
67
the informationization level in school management, teaching application and student training, including the construction of digital library, audio and video library, courseware library, excellent training cases, reform and innovation courses, Digital Library and other teaching resources, to provide students with high-quality learning resources such as online learning, mobile learning and online counseling. Source.
3.3 Teachers’ Information Application Level Continuously Improves The use of modern information technology has played a positive role in promoting the teaching reform of Vocational colleges, promoting the reform of teaching and learning methods, and has effectively promoted the deep integration of modern information technology and teaching practice. Among them, vocational colleges must actively promote the use of modern information technology for teaching reform, optimize teaching means, and improve the quality of education. Schools try their best to create advanced modern information technology environment and equipment for teachers, such as giving each teacher a notebook computer serving teaching reform and using modern information technology and free account on campus network, setting up special zones of “network learning platform”, “resource management platform” and “interactive learning platform” on the school website, which facilitates teachers and students to adopt existing ones. Teaching reform should be carried out on behalf of information technology.
4 Accelerating the Construction of Vocational Education Informatization Platform 4.1 Evaluation and Acceptance of Information Platform Construction In the process of building the information platform of Vocational education, relevant managers should pay attention to the evaluation and acceptance work and formulate a perfect working system. To a certain extent, it can better improve the quality of information platform construction, according to the analysis of website construction content, introduce advanced technology. At this time, the content, technology and various functions of the website construction should be evaluated, and the acceptance work should be carried out on the basis of understanding its development direction. In the process of setting up the evaluation system, managers should refine the evaluation content and distinguish the importance of various functions and powers according to the actual situation of Vocational schools. In order to improve the efficiency of
68
X. Jiang and Z. Pan
evaluation and acceptance work, managers can organize expert groups to carry out evaluation and acceptance work in the process of in-depth discussion and research.
4.2 Operation Mode of Vocational Education Informatization Platform The development of vocational education information platform depends on the effectiveness of the operation mode. At present, the operation mode of the national vocational education website can be divided into three types: government input type, complete market operation type and government-led operation type. Government investment-oriented means that the government is responsible for the introduction of all funds in the process of the construction of vocational education website, and the ownership belongs to the government. This kind of mode is suitable for vocational schools with lower economic level, and can better improve the efficiency of website construction. Complete market operation is the construction of educational schoolled information platform. The government has little influence on it. This kind of operation mode is suitable for the construction of educational functional information platform. However, during the actual operation period, because it is the website of the educational system, it is difficult to improve the operation efficiency. In a short period of time, it cannot achieve the expected benefits, and only rely on the market to achieve economic benefits. Government-led operation means that the government puts forward the direction of the construction of information platform, manages it to a certain extent, cooperates with vocational schools, and improves the efficiency of the construction of information platform of vocational education on the basis of cooperation.
4.3 Establishment of Information Platform Guarantee Mechanism The operation efficiency of vocational education websites and the degree to which the objectives are achieved are closely related to the guarantee mechanism. Therefore, managers should attach importance to the construction of information platform security mechanism, formulate a sound management system, introduce various types of educational resources, and attach importance to organizational work. In the process of building guarantee mechanism, relevant managers should introduce sufficient funds for the construction of information platform, attach importance to the introduction of advanced technology, and ensure the healthy development of vocational education information platform construction.
Construction of Vocational Education Information Platform …
69
4.4 Promoting the Basic Ability of Vocational Education Informatization The construction of information platform in Higher Vocational Colleges emphasizes that information technology should be used to create an ubiquitous learning environment or teaching environment to provide diversified learning support for the reform of teaching methods characterized by “autonomy, inquiry and cooperation”. Strengthen the infrastructure construction of digital campus and improve the standardization level of digital campus. The key to solving the problem of information resource sharing lies in standardizing the construction of various education systems with standardized and standardized educational technology framework. The Plan of Action puts forward “Promoting the implementation of relevant standards for the construction of digital campus in Vocational education”. Accelerate the construction of ubiquitous and safe full-coverage campus network, strengthen resource integration and standardization, improve the standardization level of digital campus infrastructure and service system construction in Vocational colleges, and promote higher efficiency and wider sharing of high-quality digital education resources.
5 Summary In the campus, teachers and staff should actively promote the use of modern information technology to carry out teaching reform, optimize teaching means and improve the quality of education. Schools try their best to create advanced modern information technology environment and equipment for teachers, such as giving each teacher a notebook computer serving teaching reform and using modern information technology and free account on campus network, setting up special zones of “network learning platform”, “resource management platform” and “interactive learning platform” on the school website, which facilitates teachers and students to adopt existing ones. Teaching reform should be carried out on behalf of information technology.
References 1. Liu, X., and K. Li. 2017. Application research of the microlecture teaching model in the higher vocational education and teaching reform. In International Conference on Information Technology in Medicine & Education. 2. Gessler, M., and F. Howe. 2015. From the reality of work to grounded work-based learning in German vocational education and training: Background, concept and tools. International Journal for Research in Vocational Education & Training 2 (3): 214–238. 3. Wang, Z.L. 2016. Research on the construction of “metal materials and heat treatment” network course to higher vocational colleges under the background of big data. Applied Mechanics and Materials 851: 615–619.
70
X. Jiang and Z. Pan
4. Gleeson, C.P. 2015. Residential heat pump installations: The role of vocational education and training. Building Research & Information 4: 1–13. 5. Guo, G., B. Qiu, and L. Li. 2016. Study on the strategies of improving vocational education teachers’ ability based on the “internet + education” background. In International Conference on Information Technology in Medicine & Education. 6. Guo, C.Z. 2015. Research on the problems and countermeasures of Chinese teachers in vocational education training. In 2015 2nd International Conference on Education Reform and Modern Management (ERMM2015): 157–159. 7. Yin, K., W. Li, and Y. Ke. 2016. Research on the skill teaching reform of higher vocational education from the perspective of sustainability: Case study of software college. In International Conference on Computer Science & Education. 8. Beicht, U., and G. Walden. 2015. How socially selective is the German system of initial vocational education and training? Transitions into initial vocational training and the influence of social background. Journal of Vocational Education & Training 67 (2): 235–255. 9. Li, Y., C. Wang, and M. Ha. 2015. On the cultivation mode of petroleum engineering professionals in higher vocational education. Higher Education of Social Science 8 (1): 132–136. 10. Farías, M., and M.P. Sevilla. 2015. Effectiveness of vocational high schools in students’ access to and persistence in postsecondary vocational education. Research in Higher Education 56 (7): 693–718. 11. Cong, P., and X. Liu. 2016. Study on the construction of “industrial cluster and higher vocational college docking cooperation research base”. Shipbuilding Vocational Education 4 (2): 1–5. 12. Zhu, Z., J.Q. Yan, J.F. Jia, et al. 2017. Influential factors of vocational education training demand of new-generation migrant workers in urbanization—Based on the survey data of Liaoning Province. Journal of Northeastern University 19 (4): 371–377. 13. Lv, C., and X. Ding. 2016. Research on practical teaching reform of tourism management major on the basis of promotion of vocational ability. In International Conference on Contemporary Education. 14. Xu, X., A. Welch, Z. Zhou, et al. 2015. Influence of traditional cultural ideas on the construction of quality culture in higher vocational education and constructive suggestions. Journal of Tianjin University 17 (1): 41–44.
Language Conversion and Cultural Communication in Nobrock’s Translation—Taking Xunzi’s Persuasion of Learning as an Example Qingkun Hu
Abstract The English version of Persuasion of Learning was translated by John Nobrock. This paper chooses several examples of its characteristics of understanding and expression, textually examines the exegesis of Xunzi’s Persuasion of Learning, discusses the differences between its English expression and the Chinese source language, explores the gains and losses of the transmission of Chinese cultural images, analyses how to retain the linguistic and cultural characteristics of the original text in cross-cultural communication, and puts forward the translation principles of “Chinese English” and the excellent cooperation between Chinese and Western translators. They complement each other in order to promote the spread and development of English translation of ancient Chinese works. Keywords English translation of Xunzi’s Persuasion of Learning · Language conversion · Cultural communication
1 Introduction The emergence and study of the English translation of Xunzi’s works is an inevitable trend of the internationalization of local culture. Ancient Chinese with Chinese images is the carrier of Xunzi’s endless ideological and cultural heritage. How to convey its cultural images in English is the focus of translation strategies. Most of the studies on Xunzi in China begin with his thoughts and exegetics [1]. Most of the English translations recommended by foreign translators are published by foreign translators. In China, most of them are translated by Xunzi’s famous sayings and network translators. In 2000, the Greater Chinese Library published three volumes of Xunzi works translated by Nobrock, a professor of philosophy at the University of Miami in 1988, 1990 and 1994 respectively. His version closely follows the original text and translates literally according to the words, taking into account the characteristics of “easy to understand” and “preserving the style of the original work”. Q. Hu (B) Anhui Sanlian University, Hefei, Anhui Province 230601, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_11
71
72
Q. Hu
Xunzi’s Persuasion of Learning is a wake-up warning of educational thoughts more than two thousand years ago [2–4]. Five metaphors are used at the beginning to illustrate the importance of acquired learning. Eight metaphors are used later to illustrate the importance of concentrating on learning. Persuasion of Learning implies that the whole book, whether it concerns about military affairs or governing the country, gentlemen should be good at learning in their lives, to achieve “change the nature of human nature” [5, 6]. The book borrows rich Chinese cultural images to illustrate the truth of self-cultivation learning. When dealing with cultural translation, translators basically use literal translation. The translation is clear and fluent, giving full play to the advantages of their mother tongue. Especially where there are many disputes about the translation of ancient Chinese into modern Chinese, it is achieved by English concisely and clearly [7, 8]. For example: “It is not because the nests themselves are not well-made, but because the building materials are so weak.” There are many disputes about the exegesis of the word “strong”. There are many explanations of the word “strong”: “Perfect” Fang Yong, Li Bo; “complete” by Yang Liuqiao and Gao Changshan; and “strong” by Yu Zhirong [9]. In English translation, the complexity of citation and exegesis is omitted and well-made is used effortlessly. Nobrock’s versions are still popular, making an indelible contribution to the spread of Xun’s studies in English-speaking countries. On the one hand, Nobrock’s rigorous academic attitude and profound academic skills are admirable. As an American, the translator has been studying Chinese culture for a long time. Its advantage lies in the accurate and fluent expression of English and the better understanding of the cultural differences between China and the Western countries. It is worth learning and learning from [10, 11]. The investigation proves that Nobrock’s English translation guides the Western interpretation of Xunzi. On the other hand, when translating Xunzi, a classic of Chinese traditional culture, translators are bound to face the difficulties of how to express the unique words of ancient Chinese accurately in English and how to accurately convey the images of Chinese culture to the West. Translators in English-speaking countries inevitably have deviations in their understanding of ancient Chinese, lack comprehensive knowledge of the cultural background of the Warring States Period, and become inferior translators, which will inevitably lead to the misunderstanding of the translated text and stimulate the discussion in Confucian and translation circles. In this paper, several examples are selected and classified to seek rectification.
2 Differences in the Connotation of Character Images In Xunzi, characters with high frequency are referred as “gentleman”, “villain” and “sage”. There are 14 times for “gentleman”, two times for “villain” and one time for “sage” in the article of Persuasion of Learning. Xunzi has the historical characteristics of the Warring States Period. These characters refer to images with Chinese characteristics in ancient times. They are cultural symbols of the wisdom and history
Language Conversion and Cultural Communication in Nobrock’s …
73
of Chinese people. When translating, people can borrow the expressions of “Chinese English”. As early as 1980, Mr. Ge Chuanhua first put forward the concept of “Chinese English”. He believed that it was either in the old days or in New China, speaking or writing English is something unique, such as Four Books, Keju, Xiucai, etc. All the above expressions belong to “Chinese English”. More than 30 years later in China, English has been honed and used in China. With Chinese characteristics, Xunzi is full of typical symbols of Chinese cultural imagery and fit for the translation principle of “Chinese English” with the original flavor, because exotic culture is not afraid of readers’ misunderstanding, but of changes in translation and misleading readers. The beginning of Persuasion of Learning is “Gentlemen say there is no end to learning.” The term “gentleman” is widely used in pre-Qin classics, which means a man of noble character. During the period of Zhou Dynasty, Zhou was divided into feudal lords and established a state. The princes are called monarchs, and the sons of monarchs are called gentlemen. Later a man of high moral standards is known as a gentleman. Confucius further standardized the meaning of gentleman, making it a standard of moral judgment. The standard of annotating gentlemen in The Analects of Confucius is a person with high moral accomplishment. The first three meanings on Page 719 in the English-Chinese Dictionary (2003) edited by Lu Gusun are as follows: “the person with status, the person with accomplishment, the gentleman.” They are far from the images of a gentleman with broad knowledge, profound thoughts and noble moral character. The Oxford Advanced English-Chinese Dictionary (4th edition) includes the above three meanings, as well as the meanings of rich gentry, rich and idle people, while gentleman is a commendatory word, the image differences between the two are obvious. It is necessary to express the unique Chinese cultural images, which can be translated directly into Junzi. In order to facilitate the readers, it is also possible to start with annotations and explanations. With the gradual development of Xun’s studies, the culture brought about by the alienation of Chinese Pinyin will be understood and accepted. Opposite to the “gentleman’s learning” is the “villain’s learning”. “Villain” usually refers to the antonym of “gentleman” defined by Confucianism. There are 12 explanations in Chinese classics. For example, in the Analects of Confucius: “Only women and villains are difficult to support, if you are close to them, they may not respect you; if you alienate them, they may resent you.” In the past villain referred to the subordinate man, Zhu Xi collected notes: “The villain is also known as the subordinate man.” In Evil Nature, people who indulge in temperament and violate etiquette and righteousness are villains. Villain is an image of indulgence, misconduct and violation of etiquette. There are many kinds of explanations in modern Chinese translation, and English translation is difficult to cover them up. Petty man was once translated by Nobrock. In both Lu’s and Oxford’s dictionaries, the word petty is interpreted as “small, trivial and unimportant”, which has some links with the Chinese images, but it is difficult to cover all the meanings. If it is transliterated into Xiaoren, it symbolizes the meaning of cultural symbols with Chinese characteristics. The highest level of learning is to be a saint. The definitions of saint often appear in the books of various schools of thought. “Owning both talent and virtue are all
74
Q. Hu
saints”, including ancient emperors, and later people with high moral and Confucian attainments. The definition of saint in traditional culture refers to the person who knows and acts perfectly and is the infinite existence in the limited world. Originally out of the pursuit of perfectness in Confucianism, saints were originally directed specifically at Confucianism, but later scholars, even ancient and modern religions and schools, also had their own saints. Christian saints are called sages in English. In the two dictionaries mentioned above, the first meaning is “sage, wise man”, which is close to the image meaning of China; but the second meaning is the name of a plant “sage”, which shows that the English word itself has ambiguity. In order to distinguish saints from different countries and export cultural symbols with Chinese characteristics, after all, “saints” in Xunzi refers specifically to Confucian cultural symbols in history. Although they have similar qualities, they are different from Christian saints. Transliteration of Shengren (saints) may be helpful to distinguish them from other religions and schools.
3 Semantic Differences in Word-Splitting Translation The meaning of nouns in the original Chinese text is significant. The English interpretation is superficial and decomposed into equivalent literal translation. It can be said that word-to-word translation is inferior to the whole sense-to-sense translation. Here are two examples to illustrate. Example 1: If you have not heard the words inherited from the Ancient Kings, you will be unaware of the greatness of learning and inquiry. The word “learning” appears 21 times in Persuasion of Learning. Most of Nobrock’s translations use the world learning and study twice. The meaning of the word learning is obvious in Chinese. Here is the noun, such as “Xunzi is full of learning”. This sentence tells us that the wise kings of the previous dynasties were knowledgeable, and profound in thought. Learning, an essential quality of gentleman, appears frequently in Xunzi. The meanings of words in ancient Chinese and modern Chinese are very clear, but when translated into English, they are divided into two parts: learning and inquiry. Obviously, the differences between English and Chinese are not well understood. Many disyllabic words in Chinese constitute a semantic meaning, which can not be divided into two formal meanings, so it is enough to translate them into learning. Ancient wise king appeared twice. Chinese annotations of the ancient sage kings, including Yao, Shun, Yu, and other wise monarchs, have become the ideological context of Chinese cultural tradition in Xunzi. For example, “the ancient wise king” appeared in the later text, which has self-evident significance. However, in English context, there is no such background of cultural inheritance. Nobrock translated it into ancient kings and the Internet into the former kings, which may include tyrants. As a result, it is necessary to translate the ancient wise kings. Example 2: If you accumulate enough water to fill a chasm, dragons and scaly dragons will be born within it. Jiaolong is a kind of miracle animal in Chinese legend that can make clouds and rain rise. It is found that dragons and scaly dragons have
Language Conversion and Cultural Communication in Nobrock’s …
75
different explanations and meanings. Interpretation in Rhyme: Jiao, Dragon. No horn is called Jiao. In Baopuzi, the mother dragon is called Jiao. This refers to the flood dragon, which is sure to be noisy, without emphasizing which kind of Jiao, and after all, it is a myth and legendary animal, which cannot and need not be scientifically divided into species and subjects. The Chinese character is apparently divided into dragons and scaly dragons. Jiaolong is both a myth and a dragon. To be concise, it is appropriate to translate it into flood dragon or dragon. A steed only leaps ten steps at a time, while an inferior horse can cover a long distance by walking continuously. The meaning of Qiji in the Chinese dictionary is a steed. In the chapter of Self-cultivation, a steed travels a thousand miles in a day, and ten inferior horses can also do that. The word Ji also refers to a steed, which is not different from the meaning of Qi. Nobrock’s English translation is Qiji. I think transliteration is preferable. Similarly a dragon can transliterate Jiaolong. Both of them are disyllabic and monosyllabic words in Chinese. It is not necessary to translate them words by words, otherwise it is easy to mislead readers into thinking that they are two kinds of animals. Example 3: … recites and enumerates his studies that he will be familiar with them, ponders over them and searches into them that he will fully penetrate their meaning,… It is the third time that the word number appears in the article. The meaning of reciting number is reading different books. Nobrock translates it into recites and enumerates, which are recitation and reading. Obviously, recites and enumerates are translated separately. Number here means different books. The translator’s misunderstanding of Chinese vocabulary naturally leads to the deviation of English expression. Textual research on its cultural background shows that the ancient Chinese traditional intellectuals were wearing long gowns and reciting by heart. The paper refers to reciting and digesting the classic books, poems, rituals and so on. Reciting is used in its original meaning, so it can be translated into reciting kinds of books.
4 Differences in the Understanding of Word Meanings Example 1: If the root of the orchid and the rhizome of the valerian are soaked in the water used to wash rice, the gentleman will not go near them, and the petty man will not wear them. The moral of this sentence is to stay away from the evil and close to the kind. Various annotations of the word slops are similar to each other: Zhang Jue’s translation of “urine”; Wang Xianqian annotated “long slops”; Modern Chinese Dictionary explains it as stinky swill water. Zheng Xuan’s Notes in the Internal Principles of Rites: “Qin people call bait as bait.” It’s meant to be foul water with human urine. The water was used to wash rice. But rice-washing water cannot be equated with dirty water or swill water in China. Dai people wash their hair with rice-washing water, which is a prescription for hair maintenance. People wash dishes and meat with rice-washing water, and remove oil and dirt. It is clean and environmentally friendly. We can see that the translated “rice-washing water” is not dirty, but nutritious and
76
Q. Hu
useful. It is obvious that the meaning of bait is different. Therefore, dirty water is used in translation. In the sentence, “common people” refer to the ordinary people without official rank, and later appear in “Tuxiang people”, “Tu people can be Yu” in Evil Nature, and “ordinary people, water” in Lament. It refers to the common people as well. The English translation is petty man, which is similar to the English translation of “villains” appearing in the following text. Other chapters sometimes explain that villains are included in the common people, but the common people are not equal to the villains. This is the meaning of ordinary people. Therefore, it is translated into the common people or commoners on the internet, which is closer to the original text. Of course, Pinyin is also a translation method, Shuren, which can be explained by adding the above two simple English words in brackets. Example 2: In the southern regions, there is a bird called the “dunce dove”… In the western regions, there is a tree called the “servant’s cane”… There is no need for commentary in the translation of the original text, and the original names can be used directly. However, the translation into English is somewhat unexpected. “Dunce dove” and “servant’s cane” mean “dumb pigeon” and “servant’s crutch” respectively. After verification, it is found that the image of the original text is quite different from that of the translated version. The following are the verification notes. Meng jiu is a small, plump light brown nesting bird. The nest is interwoven with twigs, grass leaves, moss and feathers. It is suspended on reeds, rushes or straw poles. The shape of the nest is a dome structure with a side door, 50 cm from the ground. The eggshell laid by the nest is very thick and firm. In Shanshuo, Meng Changjun also mentioned this kind of bird in the talk with others. The guest said, “Otherwise, when I see the bird nesting in the reed with its hair, the skilled female workers can’t do it. When the wind comes, the grass will break their eggs. Why? Its supporter makes it happen.” Dove means the generic name for pigeons. The bird builds the nest on the branches, and lives in trees, forests, or arable land. Dunce dove is a bit like the modern network word pigeon sprouting, which is far from the image meaning of skillful woman bird and hinders the dissemination of cultural image in the original text. The first method of translation uses proper nouns: it can be accurately translated into marsh wren. The second method is to consider the need of context. In order to distinguish it from dove and to make readers understand its nesting characteristics, it is suggested to retain transliteration and add a note to Mengjiu (also called Qiaofuniao in China, a bird with a dab hand at nesting). Black berry Lily Rhizome is a kind of perennial herbal shrub, which can be used as medicine. In Records of History: To its east, there is angelica and black berry Lily Rhizome. Thus it can be seen that Angelica and black berry Lily Rhizome often appear together in the text, they are herbal vine. The original text mentions that the cane is four inches long and is born on a high mountain. The English translation of servant’s cane is a servant’s crutch. In reality, crutches are made of tougher, long and handy sticks. Canes can rarely be used as crutches. So the translation is also transliterated. If necessary, a small explanation can be added: Yegan, a kind of cane. Example 3: An ode says: the ring dove is in the mulberry tree, its young ones are seven. This reference to “dove” can be used exactly as discussed above. Based on this understanding, Nobrock’s translation is the ring dove. It means “pigeons with rings”.
Language Conversion and Cultural Communication in Nobrock’s …
77
This sentence comes from Poetry: a kite dove is cuckoo. Zheng Xuan commented, “A kind emperor should be fair to each person.” The virtue is the example of the emperor’s benevolence. The idiom of the fairness of cuckoo has been passed down. It is said that it can feed the young equally. The image of cuckoo is used to describe that the monarch treats his people fairly. So it can be accurately translated into cuckoo.
5 Cultural Differences in Amplification in Translation Example 1: “Using a finger to plumb the depth of the Yellow River,” or “a lance to pound the husks off millet,” or “an awl to eat the evening meal from a pot.” They have become two idioms with image metaphor in China. The meaning of the first phrase is to measure the depth of the river with your fingers, which means that a person cannot achieve the purpose. “River” is a general term, not a specific term for a river. However, when it was translated into the Yellow River by Nobrock, the use of capitalization clearly referred to the only Yellow River in China. There is no need to give full play to the connotation of cultural image, that is, the general rivers can do it. The meaning of the second phrase refers to the use of cones instead of chopsticks to eat in a pot is also a metaphor that fails to achieve the goal. It does not point out that “meal” is the traditional Chinese meal of three meals a day. Therefore, it is not necessary to translate it into the evening meal, and the source language and culture can be faithfully translated by the word meal. Example 2: It can eat dust and dirt above ground and drink from the waters of the Yellow Springs below, because its mind is fixed on a constant end. As for the translation of “Huangquan” in this sentence, Mr. Jiang’s comments are very reasonable: of course, translating “Huangquan” into “the under world” and “the nether world” is also indispensable, and the annotation trouble can be saved. However, in order to preserve the style of Chinese culture, Nobrock did not hesitate to work hard and took a literal translation and annotation route: The Yellow Springs, deep under the earth, were where the spirits of the dead went and so was another name for the underworld. When “Huangquan” is used as a special noun, it refers to the place where people live after death in traditional Chinese culture. Because the water is yellow when the well is drilled to the depth, and because the person is buried underground after death, the ancients live in the underground world, that is, the Yincao Prefecture, in the Huangquan area in the extreme depths of the earth. Ancient superstition refers to the return of the soul, such as Bai Juyi’s Song of Everlasting Hatred, “Upper Poverty and Blue, Down Yellow Spring, Two Vagueness is not seen.” Nobrock really knows a lot about Chinese culture. The annotations added by the translator are the connotations of the above cultural images. But in this article, “Huangquan” obviously does not refer to the place where earthworms die, but refers to the place where earthworms do not have enough, but can drill down, reach the deep ground, and drink deep underground spring water. It is a metaphor that learning with one mind will succeed. So instead of referring specifically to capitalizing the Yellow Springs, direct lowercase is in line with the original meaning.
78
Q. Hu
Example 3: In antiquity, when Hu Ba played the zither, deep-water sturgeons came up to listen, and when Bo Ya played the lute, the six horses looked up from their feed bags. This sentence describes the zither drums and sounds so beautiful that even the fish sinking under the water can not help but come out to listen. “Shenyu” commutes “Chenyu”. Chinese idioms are “sunken fish falls wild goose, shut the moon and shy flowers”. Sunken fish comes from Xishi in the Spring and Autumn Period. The Fish in the water are amazed to see her face and sink to the bottom of the river. Without specifying what kind of fish it is, deep-water sturgeons are used in translation. Translator subjectivity is also reflected in similar places in the text. Why should the translator translate into sturgeon instead of other kinds of fish? The special verification data are as follows: The sturgeon is an animal-feeding fish, which can prey on zooplankton during the feeding stage of young fish, but soon the fry developed into benthic life. It turns out that sturgeon is a benthic animal. It would be difficult to summon sturgeon if it were not for its pleasant rustle. This kind of translation has a deeper meaning than the original text, but translation is based on the re-creation of the original text. The first task of exerting subjectivity is to be faithful to the original text. Based on this consideration, it is enough to translate into fishes. Hearing the wonderful music, all kinds of underwater fish, including sturgeon fish, cannot help floating to the surface of the scene. To sum up, the discussion of Chinese-English translation of these classics is to convey the culture and thoughts of the source language of Xunzi more faithfully. If word-to-word translation can make “the effect of the translated text on the target readers is the same or similar to that of the original readers” [12], it will be helpful. The risks of word-to-word translation exist if it is the opposite or hinders English readers from understanding the source text. We can draw lessons from the translations of Lin Daiyu’s English names. Pei Yu’s blog article Black Jade, Misleading the West for Forty Years: As early as the 1970s, Daiyu was translated into Black Jade, which was discovered and criticized by Wu Shichang, a world-renowned master of Sinology and Hongxue. Wu checked the dictionary and cited English newspapers and magazines to show that Jade had a bad extension when referring to women: sluts. Later, the Hawks Edition in 1973 and the Yang Xianyi Edition in 1978 agreed with it and replaced Black Jade with the Pinyin Lin Dai-yu. Lin Daiyu is a unique character name in Chinese fiction, which conforms to the category of “Chinese English”. As an example, the principle of “Chinese English” has been successfully applied to deal with the cultural misunderstanding caused by translation. If at first it is convenient for the readers to understand, small notes can be added to explain them later. Pei’s article also mentioned that one of the ways to improve the English translation of Chinese classics is to subsidize foreign translators. In my opinion, this kind of assistance mainly refers to joining the intellectual support of Chinese translators, so as to avoid or save foreign readers’ misunderstanding of the culture and values of the translated text. Chinese cultural imagery can cause translators and readers to make infinite deliberations. Translators need rigorous textual research in order to convey the unique Chinese language and culture authentically.
Language Conversion and Cultural Communication in Nobrock’s …
79
6 Conclusion With the upsurge of English in China, the translation of English masterpieces into Chinese has been vigorous, and even various versions have appeared. However, few versions of Xunzi have been translated into the West. The cultural differences between China and the West lead to the problems of translation. The cultural deficit mentioned in the 18th National Congress is the concentration of this phenomenon: more foreign cultures are introduced into China and few cultures are introduced to other countries. To reverse the deficit, Chinese and foreign translators need to work together to complement each other’s advantages, so that the translation of Xunzi, a Chinese classic, can give full consideration to both language transformation and cultural transmission and highlight the elements of Chinese culture. However, the drawbacks of Chinese Pinyin translation in “Chinese English” are that there are too many homonymous and heteronymous Chinese characters, and expedient measures are parentheses or simple English explanations. With the blending of Chinese and Western cultures, Chinese characters may be used directly. On June 9, 2012, the Chinese character Gaokao in the New York Times entered the English report directly. The blending of language and cultural imagery will create more convenient conditions for the English translation of Xunzi to faithfully reproduce the charm of Chinese traditional language and culture more than two thousand years ago. Acknowledgements The paper is one of the results of Educational Quality Project of Anhui Province—Chinese Culture (English); Code: 2018mooc097.
References 1. Ancient Poetry Network. Records of the Grand History of China [EB/OL]. 22 May 2014. http:// www.gushiwen.org/GuShiWen_ec024a477f.aspx. 2. Baidu Encyclopedia. Sturgeon [EB/OL]. 22 May 2014. http://baike.baidu.com/view/228927. htm?fr=aladdin. 3. Yong, Fang, and Bo Li. 2011. Xunzi. Beijing: Chung Wha Book Company, Limited. 4. Ge, Chuanyi. 1980. On Chinese-english translation. Translation Communication. 5. Jiang, Jiansong. 2016. Text and culture: A comment on Nobrock’s English version of Xunzi. Foreign Language and Foreign Language Teaching. 6. John, Nobrock, and Jue Zhang. Xunzi, greater China library. Changsha: Hunan People’s Publishing House, 2000. 7. Huijuan, Ma., and Ju Miao. 2016. Selection of contemporary western translation theories. Beijing: Foreign Language Teaching and Research Press. 8. Modern Chinese dictionary. Beijing: The Commercial Press, 2014. 9. Yu, Zhirong. 2017. Explanation of the word finish in Xunzi’s persuasion to learn. Language Research. 10. Pei, Yu, and Black Jade, Misleading the West for forty years [EB/OL]. 22 May 2014 http:// book.ifeng.com/zhuanlan/peiyu/detail_2009_01/19/33325. 11. Xianqian, Wang. 2008. Annotation of Xunzi. Beijing: Chung Wha Book Company, Limited. 12. Newmark, Peter. 1981. Approaches to translation. Pregamon Press.
Design and Manufacture of Moxibustion Bed Control System Daming Pei
Abstract To meet the needs of health care, a moxibustion bed control system was designed and manufactured. STC15W4K56S4 is used as the main control chip to detect and control 24 heating bars that used to ignite moxibustion sticks. Using 18B20 to test the temperature, when the temperature of moxibustion bed is too high, the fan is driven to discharge heat to cool down. The host computer software uses eclipse as a development tool and sends instructions to the client computer through the Bluetooth serial port. Keywords Moxibustion bed · STC15W4K56S4 · 18B20 · Eclipse · Bluetooth
1 Introduction Moxibustion therapy [1] is an important part of Chinese medicine. With the improvement of living standards, people’s health awareness is getting higher and higher, and health consumption has developed from “sick treatment” to “preventing diseases” [2, 3]. More and more people pay close attention to traditional Chinese medicine therapy. Traditional Chinese medicine therapies with thousands of years of history, such as a bowl of soup, a needle, a column of moxibustion and so on, are typical representatives of green medicine [4]. Moxibustion has become the main force of health and health care, and the first choice for modern people. In order to meet the needs of health maintenance, this paper designs and makes a moxibustion bed control system. Under the moxibustion bed, 24 moxibustion bars were arranged according to the human acupoints, and the ignition of moxibustion bars commands was sent to the Client Computer via the iPad to control the 24 heating bars (DC 24 V, power 50 W). When the temperature of the moxibustion bed exceeds the threshold, the system starts the fan to discharge excess heat and realizes temperature control. The ignition D. Pei (B) Department of Electronic Information, Guangzhou Civil Aviation College, Guangzhou 510000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_12
81
82
D. Pei
Fig. 1 The block diagram of the control system
of moxibustion bars can in accordance with the Chinese medicine model, or can be customized according to the needs of people to meet the individual needs.
2 The Overall Framework of the Control System The block diagram of the control system is shown in Fig. 1. The system uses STC15W4K56S4 as the main control chip, and communicates with the host computer via serial port, the HC05 Bluetooth [5] module realizes the wireless serial port transmission. The system realizes temperature collection, fan and motor control through IO port, and the detection and control of 24 heating bars. The control of a heating bar needs an IO port, the detection needs an IO port, the control and detection of 24 heating bars needs 48 IO ports, the temperature acquisition needs an IO port, and the control of motor and fan needs two IO ports [6]. Therefore, 51 IO ports are needed to complete the control, and STC 15W4K56S4 with 64 pins (62 IO ports) is used as the main control chip.
3 Hardware Circuit Design Hardware circuit design includes serial download circuit, fan and motor control circuit, heating bar detection and control circuit, etc. Using CH340 chip to download the program, the circuit is shown in Fig. 2. The control circuit of the motor is shown in Fig. 3. When RELAY1 (the IO port of STC15W4K56S4) is low, Q1 turns on, relay J1 coil is energized, the normally open contact of relay J1 is closed, the motor runs. When RELAY1 is high, the motor stops. The control circuit of the fan is the same, and it is no longer listed separately. Figure 4 shows the control circuit of a heating bar, P18 connected to a heating bar. When #HEAT1 (SCM IO port) is low, Q3 is turned on, relay J3 coil is energized, normally open contacts are closed, and the heating bars are heated. When #HEAT1
Design and Manufacture of Moxibustion Bed Control System
83
Fig. 2 Program download circuit
Fig. 3 Motor control circuit
is high, the heater stops being heated. The heating bar is tested with the MAX471 [7, 8]. The current flows through the RS+ of MAX471, and flows out from the RS−, and then flows through the heater (P18), and the normally open contacts of the relay J3, to the ground. When the heating bar is good, HEAT1_FB is high level. When the heating bar is bad, HEAT1_FB is low level. The SCM judges the quality of the heating bar by detecting the level of HEAT1_FB. As shown in Fig. 5, the sensing current (I sense ) flows from RS+ through the precision sensing resistance(Rsense ) to RS−, the output (out) is grounded by the output resistance (Rout ). At this time, Q2 is disconnected, the amplifier A1 works, and the output current (I out ) flows out from the emitter of Q1. Because there is no current flowing through RG2, the potential of A1’s reverse input is equal to the potential
84
Fig. 4 Heating bar control and detection circuit
Fig. 5 MAX471 functional block diagram
D. Pei
Design and Manufacture of Moxibustion Bed Control System
85
of Rsense and RG2 intersection. Because A1’s open-loop gain is very large, its forward input and reverse input basically maintain the same potential. Therefore, the potential of A1’s forward input is approximately equal to the potential of Rsense and RG2 intersection. Therefore, the voltage drop produced by the sensing current I sense flowing through Rsense is equal to the voltage drop produced by the output current I out flowing through RG1. Iout × RG1 = Iload × Rsence , or : Iout = (Iload × Rsence )/RG1
(1)
Vout = (Rsense × Rout × Iload )/RG
(2)
where Vout is the expected actual output voltage, Iload is the actual current sensed Rsense is the precision sensor resistor, Rout is output voltage regulating Resistance resistor, and RG is the gain resistor (RG = RG1 = RG2). For MAX471, the set current gain is: Rsense /RG = 500 × 10−6
(3)
Rout in the system is 2.7 K, then Isense = 50 W/24 V = 2.08 A,
(4)
Vout = (Rsense × Rout × Isense )/RG = 500 × 10−6 × 2.08 × 2.7 × 103 = 2.8 V (5) The design of the moxibustion bed control system PCB board as shown in Fig. 6
4 Software Design 4.1 Software Design of Client Computer Flow chart of the client computer software is shown in Fig. 7. After the system starts, the serial port and IO port are initialized as the following parameters: serial port baud rate 9600, no parity check, 1 bit stop bit. And then wait for the host Computer to send instructions. When the instruction is the system self-check, the system enters the self-check procedure to check the quality of the heating bar. When the instruction is the prescription mode of traditional Chinese medicine, the system connects different heating bars according to the different mode, and disconnects the heating bars after the moxibustion bars are ignited. When the instruction is in shaking mode, the motor is turned on. When the temperature is too high, the fan is turned on and the heat is discharged.
86
D. Pei
Fig. 6 Control board
4.2 Software Design of Host Computer The host computer software is based on the android platform and uses Eclipse (Version: Luna Service Release) as a development tool. Including the Bluetooth detection and communication module, the system self-test module, the user recharge module, the Chinese medicine formula module, the custom module and other modules.
5 Conclusions Nowadays, with the development of economy, people are paying more and more attention to their own health and the huge space for the development of the health care market. The moxibustion bed has the advantages of professional convenience. The user can enjoy professional moxibustion services while lying in bed. The moxibustion bed can be used in health care and other places, has a high practical value.
Design and Manufacture of Moxibustion Bed Control System
87
Fig. 7 Flow chart of the client computer software
References 1. Huang, Chang, and Jun-tian Liu. 2015. Exploration on origin development and application of moxastick moxibustion. China Journal of Traditional Chinese Medicine and Pharmacy. 2015(30): 4218–4220 (in Chinese). 2. Hui, Xin, Chang Huang, and Hao Wang. 2017. Mechanism of Moxa-smoke in moxibustion and Its safety. World Chinese Medicine. 2017(12): 2246-2251 (in Chinese). 3. Qi, Li-zhen, Xiao-wan Ma, and Yu Hong. 2013. Comparison of moxibustion materials and methods between ancient and modern times. Chinese Archives of Traditional Chinese Medicine. 2013(31): 2349–2354 (in Chinese). 4. Shen, Jie, Bin-wei Ai, and Mei-hong Shen. 2016. The effective mechanism of moxibustion on preventing and treating sub-health state. China Medical Herald. 2016(13): 90–92 (in Chinese). 5. Yang, Ying-ming. 2017. Solution of android mobile app bluetooth control intelligent vehicle. Microcontrollers & Embedded Systems. 2017(3): 71–74 (in Chinese). 6. Han, Cheng-hao. 2010. Application technology of DS18B20 and redundancy check. Microcomputer Information. 2010(26): 112,124–125 (in Chinese).
88
D. Pei
7. Fu, Guo-hong, Ji-shan He, and Bin Xiong. 2006. Application of MAX471 in voltage regulator with current-limiting. Journal of Guilin University of Technology. 2006(26): 572–574 (in Chinese). 8. Yu, Ying, Cun-chen Tang, and Fan Ding. 2008. Design of the closed loop digital control direct current source. Electronic Measurement Technology. 2008(31): 34–38 (in Chinese).
Development of a New Computer-Aided Algorithm for Three-Layered Seale Wire Strand Geometric Design Chunlei Yu, Junqi Pan, Qiang Song and Mingzhao Zhu
Abstract A new computer-aided algorithm used for the geometric design of threelayered Seale wire strands is developed in this paper. The biggest advantage of the new algorithm is that it can easily formulate a one-dimensional problem which applied to determinate the diameter ratio of each layer wires of the three-layered Seale strand. Compared to conventional mathematical method, i.e. gradual approaching method, the new presented algorithm does not need a large amount of iterations to be implemented to achieve a good accuracy. Furthermore, the necessary computational condition that adjacent wires in the same strand layer should contact with each other in the conventional algorithm does not also needed. Three-layered 19-wire Seale strand was chosen to verify the newly developed algorithm. Numerical results show better agreement with those derived from the conventional methods. Furthermore, the new algorithm has a good computational efficiency and it can provide the exact coordinate values of the contact point between the 2nd layer wires and the 3rd layer wires. Keywords Seale wire strand · Geometric design · Diameter ratio determination · One dimensional problem · Computer-aided algorithm
1 Introduction Seale wire strands are a class of important engineering component and they are widely used in engineering application and employed as the basic component of stranded ropes. Gradual approaching method is the conventional means to design the Seale strands geometry structure [1]. It requires the cross-section shapes of helical C. Yu (B) · J. Pan · M. Zhu School of Mechanical and Electrical Engineering, Zaozhuang University, Zaozhuang, Shandong 277160, People’s Republic of China e-mail: [email protected] Q. Song Shandong Trunk Line Co., Ltd. of East Route of South-to-North Water Transfer Project, Jinan, Shandong 250000, People’s Republic of China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_13
89
90
C. Yu et al.
wires in the same layer just touch with each other. And more time and calculation resource are needed for achieving a good computational precise. With the development of computer and theory, computing precise and efficiency have been improved greatly for strand structure design. By using the Frenet-Serret frame, derivations of helical parametric equations of helical structures were determined [2]. Stanova et al. [3, 4] developed many geometric models of strands and ropes with different cross-section patterns, such as single-lay or double-lay strands and spiral one or two-layered oval strand. Wang et al. [5] built geometric models of wire strands by using newly developed mathematical geometric relationships on CATIA software. On basis of parameter geometric equations of spiral triangular strands, Chen et al. [6] developed its geometric model on Pro/Engineer software. Sun et al. [7] studied the relations of lay angles and wire radii between the two helical wire layers and presented a geometric model of stranded Seale rope by using the curve function in UG software. Zhao et al. [8] derived the transformation matrix of each wire/strand local coordinate system and presented a geometric model of strands under bending loading. Foti et al. [9] established a bending model of wire strands by using the Strand-attached Reference System. Jiao et al. [10] sets up the geometry model of 6 × 19 W + IWS steel wire rope based on Pro/Engineer software. Xiang et al. [11] proposed a multi-strand wire rope mathematical model, considering wire double-helix in multi-strand structure. Ma et al. [12] presented two methods to build a three-dimensional geometry of a wire rope bent over a sheave by using the Pro/Engineer software. In this paper, an effective geometric design method will be presented for the Seale wire strand. The key problem of the determination of diameter ratio of each layer wires is addressed as a one-dimension problem and golden section method is applied to solve it. In order to verify the newly developed method, a three-layered Seale with 19 wires has been chosen and comparations of numerical results predicted by using the two above mentioned methods are implemented. Numerical results show that the newly developed method in this paper can greatly reduce the calculation difficulty and improves the computational efficiency than the conventional method.
2 Design Process of Geometry Structure The geometry structure of a three-layered Seale strand with 19 wires is shown in Fig. 1. It consists of a straight center wire surrounded by n 2nd helical wires and n 3rd layer wires. αi is the helical angle of i-th layer wire (i = 1,2,3). R1 represents the radius of the center wire. R2 , r2 and R3 , r3 denote wire radius and helix radius of the two helical wire layers respectively. β2 and β3 are included angles between adjacent wires in the 2nd and the 3rd layer wires, respectively. Figure 2 shows the cross-sectional shape of a Seale strand helical wire. It is assumed as an ellipse and its equation can be written as
Development of a New Computer-Aided Algorithm for Three-Layered …
Fig. 1 Geometry structure of 19-wire three layered Seale strand Fig. 2 Helical wire cross-section
91
92
C. Yu et al.
x R/ sin α
2 +
y 2 R
=1
(1)
Selecting an arbitrary point P(x1 , y1 ) on the ellipse, its slope can be expressed as x1 sin2 α dy =± dx α 2 R 1 − x1 sin R
(2)
Also as shown in Fig. 2, the slope at the point P(x1 , y1 ) can be expressed as − tan( π2 − πn + β2 ). Hence tan(
π π β − + )= 2 n 2
x1 sin2 α α 2 R 1 − x1 sin R
(3)
The solution for x1 yields x1 =
π π β 1 R tan( − + ) sin α 2 n 2 2 sin α + tan2 ( π2 −
π n
+ β2 )
(4)
Combining Eqs. (1) and (4), y1 can be solved y1 =
R sin α sin2 α + tan2 ( π2 −
π n
+ β2 )
(5)
An analysis of the configuration shown in Fig. 2 yields r = b1 + y1
(6)
where, b1 = x1 tan( π2 − πn + β2 ), which is defined as shown in Fig. 2. Combining Eqs. (5) and (7), the helix radius r defined by Eq. (6) can be written as tan2 ( π2 − πn + β2 ) (7) r = R 1+ sin2 α As shown in Fig. 2, the wire cross-section shows a good helical symmetric relation, thus a representative segment can be achieved and it is shown in Fig. 3. It comprises the center wire, two 2nd layer wires and one 3rd layer wire which contacted with the two selected helical wires. By using Eqs. (1)–(7), the elliptical equation of the third layer wire O3 can be written
Development of a New Computer-Aided Algorithm for Three-Layered …
93
Fig. 3 A representative segment of the strand cross-section
f 3 (x, y) =
[x cos(π / n) − y sin(π / n)]2 [y cos(π / n) + x sin(π / n) − r3 ]2 + =1 (R3 / cos α3 )2 R32 (8)
Similarly, the elliptical equation of the second layer wire O2 can be expressed f 2 (x, y) =
x2 (y − r2 )2 + =1 2 (R2 / cos α2 ) R22
(9)
where, r3 and r2 can be calculated by using Eq. (7). The radius of the third layer wire can be calculated
R3 =d m
(10)
where, d is the strand diameter, m is the lay coefficient which can be determined by using the empiric table. The helical angle of the third layer wire can be calculated α3 = arctan
π(m − 1) k·m
(11)
where, k is the twisting moment multiplier which can also be determined by using the empiric table. For the Seale wire strand analyzed in this paper, the pitch lengths of each layer wires are equal, i.e. p2 = p3 . Hence the relationships between R2 and α2 can be written as R2 =
r3 tan α2
tan α3 1 +
tan2 ( π2 − πn + sin2 α2
β2 2
(12) )
94
C. Yu et al.
Implementing analysis of Eqs. (8)–(12), the conclusion can be derived that Eqs. (8) and (9) can be determined by α2 , β2 and β3 . Moreover, the values of β2 and β3 are assigned by designer depending on the strand design requirement. Hence the elliptical equations of the helical wires can be expressed as function of α2 . Now, the one-dimensional problem can be established as follows f (x, y) = f 2 (x, y) − f 3 (x, y)
(13)
Analyzing Eq. (13), conclusions can be achieved that if f (x, y) > 0, the aforementioned two ellipses have no intersections; if f (x, y) < 0, the two ellipses intersect with each other; if f (x, y) = 0, the two ellipses only have a tangent point. Since the ellipses O2 and O3 are contacting with each other, let f (x, y) = 0. Considering f (x, y) is the one dimensional function of α2 , hence Golden section method is applied. Based on the solution result of α2 , parameters about the Seale strand, i.e. R1 , p2 , r2 , R2 and p3 , can be achieved easily. Thus the Seale strand mathematical model can be established easily.
3 Numerical Example A typical three-layered Seale strand with 19-wire was chosen to verify the newly developed method. The comparisons of results predicted used the conventional design method and the new method were implemented. Prerequisites for the strand geometry design implementation are that the Seale strand diameter is d = 16.21 mm, twisting moment multiplier k = 8.83 and lay coefficient is m = 4.0525. Implementation of the conventional method, the radii of each inner layer wires are all expressed as multiples of that of the outmost layer wires and based on this the diameter ratio of each layer wires is achieved. When calculation is carried out, the diameter ratio is iterated until enough accuracy has been achieved.
Table 1 Numerical results of conventional method Geometry parameter
1st calculation
2nd calculation
3rd calculation
Lay angle
α2 = 8.13◦ α3 = 15◦
α2 = 8.45◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
Helix radius
r2 = 2.99R2 r3 = 3.05R3
r2 = 2.99R2 r3 = 3.05R3
r2 = 2.99R2 r3 = 3.05R3
Included angle between contact point and ellipse major radius
θ2 = 49.91◦ θ3 = 69.91◦
θ2 = 48.39◦ θ3 = 68.39◦
θ2 = 48.43◦ θ3 = 68.43◦
Radius ratio of wires in each layer R1 : R2 : R3
1.986: 1 : 1.765
1.988: 1 : 1.767
1.988: 1 : 1.767
Development of a New Computer-Aided Algorithm for Three-Layered …
95
Table 2 Numerical results of newly presented method for different calculation step ε Geometry parameter
ε = 0.01
ε = 0.001
ε = 0.0001
Lay angle
α2 = 8.44◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
α2 = 8.44◦ α3 = 15◦
Helix radius
r2 = 1.69R3 r3 = 3.05R3
r2 = 1.69R3 r3 = 3.05R3
r2 = 1.69R3 r3 = 3.05R3
Radius ratio of wires in each layer R1 : R2 : R3
1.125: 0.566: 1
1.125: 0.566: 1
1.125: 0.566: 1
coordination of contact points between the 2nd and the 3rd layer wires
x = 0.374R3 y = 2.119R3
x = 0.374R3 y = 2.119R3
x = 0.374R3 y = 2.119R3
The numerical results predicted from the conventional method are listed in Table 1. It can be seen that three iterative calculations are needed to implemented to achieve the precise results for the Seale strand analyzed in this paper. For the new method implementation, the included angle of the two helical layer wires should be preassigned, that is β2 = β3 = 0.5◦ . The numerical results with three different calculation step assigned in golden section method, i.e. ε = 0.01, ε = 0.001 and ε = 0.0001, are given in Table 2. It can be seen that numerical results with different calculation step are all identical. This indicated that the golden section method used to solve the one-dimensional problem has good efficiency. By comparing with results given in the two tables, it can be concluded that the results predicted by the new method are in excellent agreement with those achieved from the conventional method. Moreover, the new method can directly achieve good results on the basis of a sufficiently small iterative step, without a large amount of iterations. Hence, the new method can greatly reduce computing time and improve calculating efficiency. At last, the new method can give exact coordinate values of the contact point which located between the 2nd and the 3rd layer wires in the global coordinate system. This provides good foundation for contact behaviour analysis of Seale strands.
4 Conclusion A new geometric design method for Seale wire strands has been developed. Onedimensional problem, which depicts the relations between the helical angle of the 2nd layer wire and other geometric parameters of Seale strands, has been established. Golden section method has been used to address the problem and good results have been achieved efficiently. In order to verify the newly presented method, three-layered 19-wire strand has been modelled by using the new method and the conventional gradual approaching method. Comparisons show that results derived from the new method have shown good agreement with the conventional method and better computational efficiency. Furthermore, the locations of contact point between the 2nd and the 3d layer wires have been determined effectively in the global coordinate system
96
C. Yu et al.
of the strand. The method presented in this paper can also be extended and used for establishing the Seale strand model which has a more complex cross-section. Acknowledgements This work is supported by A Project of Shandong Province Higher Educational Science and Technology Program (KJ2018BBH018) and Doctoral Scientific Research Foundation of Zaozhuang University (2017BS05).
References 1. Pan, Z.Y., and M.H. Qiu. 2008. Production technology of wire rope. Hunan: Hunan University Press. (in Chinese). 2. Erdönmez, C., and C.E. Imrak. 2011. Modeling techniques of nested helical structure based geometry for numerical analysis. Journal of Mechanical Engineering 57 (4): 283–292. 3. Stanova, E., G. Fedorko, M. Fabian, and Kmet, S. 2011. Computer modelling of wire strands and ropes Part I: Theory and computer implementation. Advances in Engineering Software 42 (6): 305–315. 4. Stanova, E., G. Fedorko, S. Kmet, et al. 2015. Finite element analysis of spiral strands with different shapes subject to axial loads. Advances in Engineering Software 83: 45–58. 5. Wang, X.Y., X.B. Meng, J.X. Wang, et al. 2015. Mathematical modeling and geometric analysis for wire rope strands. Applied Mathematical Modelling 39: 1019–1032. 6. Chen, Y.P., F.M. Meng, and X.S. Gong. 2015. Parametric modeling and comparative finite element analysis of spiral triangular strand and simple straight strand. Advances in Engineering Software 90: 63–75. 7. Sun, T.G., and T.L. Shi. 2016. Mathematical model and finite element analysis of wire ropes. Journal of Wuyi University (Natural Science Edition) 20 (1): 64–68 (in Chinese). 8. Zhao, P., H. Wang, X.S. Tian, et al. 2017. Construction of mathematical model for the bending state of braided wire rope. Advances in Computer Science Research 71: 1421–1425. 9. Foti, F., and L. Martinelli. 2016. An analytical approach to model the hysteretic bending behavior of spiral strands. Applied Mathematical Modelling 40 (13–14): 6451–6467. 10. Jiao, A.S., L.M. Liu, and H.P. Yan. 2016. Parametric design and modeling of Warrington steel wire rope with metal strand core. Coal Mine Machinery 37: 236–238. 11. Xiang, L., H.Y. Wang, Y. Chen, et al. 2015. Modeling of multi-strand wire ropes subjected to axial tension and torsion loads. International Journal of Solids and Structures 58: 233–246. 12. Ma, W., Z.C. Zhu, Y.X. Peng, et al. 2015. Computer-aided modeling of wire ropes bent over a sheave. Advances in Engineering Software 90: 11–21.
Designing of Postgraduate Medical English Class in Smart Learning Environment Xiaofang Wang and Cheng Liu
Abstract Based on the smart education environment, this paper employs the combination between the formative evaluation and the summative evaluation in order to conduct a teaching experiment in the second semester of the first academic year for postgraduates, which aims to promote the teaching quality of graduate medical English through various learning resources in the context of smart education. Keywords Smart education · Postgraduates · Medical English teaching
1 Research Background of Smart Education In 2009, IBM launched the Smart Education Program and proposed five major paths: student technology immersion, personalized and diverse learning paths, service economy knowledge and skills, global integration of systems, culture and resources, and the key role of education in the economy of 21st century [1]. Later, the United States, South Korea, Singapore, China and other countries invested in the relevant researches on smart education. The research and practice of intelligent education is not only the up-to-date development tendency of the fourth educational break-through, but also an essential driving force for the innovation [2], smart education of technology intermedium has become a new realm and new appeal of education informationization today [3]. This study combines the research status of domestic smart education. With the method of knowledge map and co-word analysis, we have designed the undergraduate medical English classroom in smart environment in order to provide reference for subsequent smart education research. Scholars at home and abroad have different opinions on the connotation of smart learning. Up to now, there is no definite consensus on the definition of smart learning in the world. Different researchers explain wisdom learning from different perspectives. Kaur’s explanation of intelligent learning emphasizes the role and influence of X. Wang · C. Liu (B) School of Humanities, Jiangxi University of TCM, No. 1688 of Meiling Road, Wanli District, Nanchang City, Jiangxi Province, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_14
97
98
X. Wang and C. Liu
the implantation of technological means on the learning process, which is a relatively broad definition [4]. Hwang [5] of Sungkyunkwan University in Korea holds that smart learning refers to a flexible way of learning in which learners’ abilities can be enhanced by using open educational resources, smart IT and international standards from the perspective of the relationship between resources, technology and learners. This explanation not only from the perspective of technology, but also from the perspective of educational resources and these two perspectives, the purpose of which is to enhance the learning ability based on the change of learners’ behavior and to explain the wisdom of learning. Mumford once said that any understanding of technology cannot be separated from the understanding of human beings, and human beings cannot be totally equal to animals. To view human beings as human beings, technology must take into account the internal state of human beings [6]. In modern society, science and technology follow the path of rationalism and develop rapidly. Along with the logic of rationalism, it can promote the progress of technology to the greatest extent. But outside the technology itself, the subject of using technology is not included in the logic of technology development, which results in the deviation of technology from human beings. Technology is a purposeful creative activity of human beings, and it must reflect a certain value scale in the selection and development of technological projects [7]. The criteria for measuring this value scale are human beings, whether their demands are embodied or not, whether their subjectivity is realized or not, which should be the criteria for measuring technology. Education and technology serve human development, and human is the main body of educational and technological activities. As a new form of education, smart education comes from the integration of technology and education. The most fundamental reason for the integration of technology and education is that they have the common point of integration, which means they both regard human as the purpose of their own activities and promote human development. Education and technology are peoplecentered. People are the bridge connecting the two. People’s growth and development should be the internal requirement of smart education. To develop smart education, we should correctly grasp the relationship between technology and education. Technology is the basis of the development of smart education. Without the support of science and technology, the smart educational environment, interactive educational methods and accompanying learning system will become the castle in the air. But attaching importance to technology does not mean blindly following technology. In the final analysis, technology is only a means to achieve the goal, and human growth and development is the ultimate goal of smart education. The voices that drive educational change are endless, but to this day, limited changes have not met people’s expectations. Technology has changed all aspects of the world, but education has changed little. The famous Jobs’ question is a question, but also points out a direction for our change education, that is, technology to promote educational change. We need to emphasize high-tech information. The integration of technology and education as the new cornerstone of the development of education in the new century [8], the integration of the two is indeed very difficult, and
Designing of Postgraduate Medical English Class …
99
various attempts are under study. The accumulation of historical experience and the achievements of intelligent technology have provided us with the possibility to break through the deep integration of technology and education today, and implement and realize it through the complex ecological system of smart education [9]. Since entering the information age in the 1990s, technology has gradually intervened in the education system, trying to replicate the tremendous influence of other fields into education. Educational informatization has a wide influence both in theory and in practice, and bears great expectations of revolutionary impact on education. Educational informationization has introduced technology into the classroom in many ways, and has carried out various attempts to promote the teaching effect with information technology. It also recognizes that teachers play a key role in the teaching of information technology change, and has carried out continuous training for teachers in the application of information technology. Researchers try to bridge the teaching practice with the application of technology, try to find a good way to solve the problem of education by technology, and try to find a plan to promote the reform and development of education by technology [10].
2 Postgraduate English Teaching At present, there are still inadequacies in the requirements of cultivating high-end English talents in postgraduate English teaching in China. It is mainly embodied in the five common aspects: listening, speaking, reading, writing and translating: (1) In terms of English listening, there are few field training hours. (2) In the aspect of oral English expression, there is a phenomenon of “dumb English”. Many graduate students are less willing to speak or less dare to speak that they cannot express their academic opinions in English. (3) In terms of English reading comprehension, most graduate students have been studying English for at least 10 years, but most of them still cannot read the English literature of their majors, and cannot grasp the latest knowledge of their professional development in the first time. (4) As for English writing, there is no professional English learning in the English class, and students have limitations in grasping English vocabulary. It is difficult to master their professional vocabulary, and they cannot accurately express their academic opinions in English. (5) In English translation, it is difficult to access literature and writing scientific research papers freely. Therefore, we must work hard to explore a new model of postgraduate English teaching with Chinese characteristics.
100
X. Wang and C. Liu
3 Research Significance As high-end talents of various professions cultivated by our country, graduate students will have a lot of opportunities for professional exchanges and academic exchanges in the future. They need to read a lot of English professional materials to get the most cutting-edge information in the profession, and need to know how to retrieve relevant professional English literature, write English papers, and learn how to use English to communicate with professionals orally or in writing. Postgraduate English should emphasize professionalism and academicism. On the other hand, the results of linguistic studies on register analysis, rhetorical discourse analysis and genre analysis show that the English language of each subject has unique vocabulary, syntax, rhetoric and textual features, and these knowledges are not covered by the commonality part in the basic English curriculum of students. So it is necessary to conduct special study. Otherwise, there will be a dilemma that the English level of students is high and their professional communication is very difficult. Only by extending the basic English to professional English and combining language learning with professional subject content can students understand the meaning of learning and fully mobilize the enthusiasm of students to learn. Therefore, it is necessary to strengthen the postgraduate medical English teaching in our school, and cultivate talents with professional knowledge that is more favored by the society. And they should have good communication skills in English and be proficient in using English to carry out professional technical exchanges, negotiations and cooperation.
4 Designing of Postgraduate Medical English Class in Smart Education Environment At present, almost all campuses of colleges and universities have realized complete network coverage, online courses, in this case teaching resources and platforms can be used anytime and anywhere. This study has analyzed the learning needs of students, determined students’ learning ability, their knowledge basis, the online learning goals, learning resources and learning content, in order to make use of smart learning environment to lead students break the limit of textbooks and classroom in English learning, expand English learning from classroom to the outside, and promote students’ effective learning both in the real and virtual situation context. Teachers provide a series of English learning materials for students, a specific arrangement of learning tasks, let students complete the task through cell phones or computers, exchange learning experience and share gains in depth of comprehension through We Chat groups and QQ groups, realize timely interaction, effective tracking and evaluation of the students’ learning process and effect. And the detailed research contents are as follows: (1) Students are divided into several groups, with about 4 people in each group. One group leader is selected, and he or she is mainly responsible for checking
Designing of Postgraduate Medical English Class …
101
the completion of learning tasks, group learning preparation and group learning plan. The teachers share the teaching courseware and the relevant English learning audios, videos and other materials. Students can learn at anytime and anywhere in or outside of class. Teachers randomly check the completion of students’ homework, record students’ learning files, set up formative evaluation manuals, and make 30% achievements in the final exam, then direct them to learn actively. (2) Postgraduates are directed to install VOA application on the cell phones (VOA Standard English), listening to 5 pieces of news everyday randomly. They need to imitate the pronunciation and read two of the five news intensively, two minutes for each. A member of the study group is randomly selected to check others’ learning. Teachers promptly pointed out and corrected the same problems of students, which aims to ensure the effectiveness of students’ learning and their working hard for progress every day. VOA software with normal speed classifies all the news into different categories, updates practical news daily with Chinese caption, which can guarantee the accuracy of students’ comprehension. The software is available online, and students can also download news after learning in the network environment, and support background playing. While listening and reading, students can click on any word for its definition, listen to the sound of the words and add to new word book. When in a network environment, automatic network will update to the interpretation the words of this view; through the previously stored words processed by the law of memory, students can master the words effectively. They can realize the sharing of the words in the web and mobile phone terminal end, and provide online dictionary query for the words used. This can help students to associate words when remembering the vocabulary. There is also search function in it, and students can look for keywords of interest and texts for listening and learning. It will be updated daily, obtain articles with the total amount more than 1000, support online and offline learning, record and analyze learning cases comprehensively. (3) Postgraduates are required to download and use the software of Haici electrical Dictionary on their cell phones, to finish the tasks of “daily hot words” and “daily situational learning” everyday. They can make use of the random function of CET-4 words to learn and memorize 20 random words every day, which is done by the team members together, and the group leader is responsible for recording the examination results. (4) The teacher will make use of the website of www.pigai.org to assign the writing and translation tasks once in two weeks. This website is the largest online platform for English composition and writing practice in China. This platform can submit the composition corrections timely for students, immediately score the compositions and provide the feedback analysis, which can facilitate students to correct the composition while the iron is hot. The platform can point out the existence of errors in each sentence, writing spelling, grammar and vocabulary, collocation errors, and also give suggestions to revise the composition where there are mistakes. This website provides users with specific knowledge of the expansion of training, collocation recommendation and reference example, and
102
X. Wang and C. Liu
provide comprehensive writing guidance for students, which can help students’ autonomous learning. In addition, this website will identify the composition whether there is content repetition with the compositions of other students. With each sentence as a unit after receiving students’ submitted essays, we will know whether there is duplication and repetition by using the online corpus. It can provide the relevant repetition index for teachers’ reference. It also records the growing process of the writing ability of a school, a class, or a individual student. This report is helpful for schools and teachers to grasp the weak points of schools and classes, and to understand the changing trend of mastering degree of knowledge points. In the end, it will provide data support for schools and teachers to plan English teaching. (5) WeChat groups and QQ groups are set up for further learning and better communication. The teachers arrange the learning contents, share the learning materials, record the learning effect and summarize feedback information in the two communicating groups. Students can communicate with members in either group, share their learning gains, discuss the problems encountered in the study, and answer the questions of other students. (6) Our research adopts the combination of the formative evaluation and the finality evaluation. Teachers observe and record students’ extracurricular learning performance, make quantitative and qualitative evaluation for students’ classroom performance through videos, photographs and other forms, including students’ self-assessment, peer assessment as well as teacher evaluation. In the end, they could establish the growth of students archives bag. The language teachers praise the student’s progress and whim through language incentive evaluation, praise and encouragement evaluation, and written evaluation and achievement display evaluation in the affirmative way, timely encourage and affirm students’ efforts to protect the students activeness and quick thinking, maintain good learning atmosphere, help every student to realize a comprehensive development and improve their ability to use English. Teachers test the effectiveness of student learning and the existing problems through final examinations and translation level tests, sum up the teaching innovation experience, and further improve the quality of English teaching.
5 Summary Through a one-semester teaching experiment,we have found that applying multiple smart education methods and measures in postgraduate medical English teaching can greatly promote postgraduate’ enthusiasm and learning efficiency, and improve the educational quality of professional English teaching. The mode of smart education should be paid attention to and popularized in later education reform.
Designing of Postgraduate Medical English Class …
103
Acknowledgements This research was supported by Postgraduate Teaching Reform Project in Jiangxi University of Traditional Chinese Medicine (Grant No: Jzyjg-2017-11) and Research of Education Science Planning Projects of 13th Five-Year in Jiangxi Province (Grant No: 17YB145).
References 1. Rudd, J., P. Sullivan, and M. King. Education for a smarter planet: The future of learning [OL]. http://www.redbooks.ibm.com/redpapers/pdfs/redp4564.pdf. 2. Zhong, Xiaoliu, Shuqiang Song, and Min Hu. 2015. The ecological construction of wisdom education in the vision of the fourth educational revolution. Distance Education Magazine 4: 34–40. 3. Zhu, Zhiting. 2016. New development of wisdom education: From flipping classroom to smart classroom and smart learning space. Open Education Research 1: 18–26. 4. Kaur, Abtar. The future of smart learning: Personalized learning [EB/OL]. 10 March 2013. http://www.elearningasia.net/-program/pdf_pt/[Speaker%205-1]Abtar%20Kaur.pdf. 5. Hwang, Dae-joon. What’s the implication of “SMART” in education and learning? [EB/0L]. 10 March 2013. http://ww.elearningasia.net/-program/pdfpt/[Panelist%203-2]Daejoon%20Hwang.pdf. 6. Wu, Guosheng. 2009. Lecture on philosophy of technology, 36. Beijing: Press of Renmin University of China. 7. Xu, Liang. 2004. Philosophy of technology, 35. Shanghai: Fudan University Press. 8. Gang, Ding, and Lu Wang. 2006. The development of educational technology in the perspective of education. Journal of Electrotechnical Education (8): 3–5 (in Chinese). 9. Hu, Qintai, et al. 2016. Research on the deconstruction and integration path of systematic education of wisdom education. China Electro-Chemical Education (1): 49–55 (in Chinese). 10. Gu, Xiaoqing, Chunli Wang, and Fei Wang. 2017. Looking back on the 20th year: the historical mission and role of information technology in education reform and development. ElectroEducational Research (6): 9–19 (in Chinese).
An Improvement Method of Power Energy Utilization Rate Based on DEA Model Fu Mo
Abstract The operation of electric power industry is closely linked to the smooth development of society, so the study on the using efficiency of power resources is significant. Based on the study sample, the data from 2011 to 2018, this paper analyzes the annual using efficiency of power resources based on DEA model, obtains the slack variable values of input and output, calculates the projection values of invalid variables and gets that the amount of power resources used in power industry is relatively higher. This theory avoids the research on the cost problem of each investment, and completely transforms multi-input and multi-production into fractional problem, so that applying DEA to measure using efficiency can combine input with production, and evaluation indicators finally obtained are more comprehensive and representative. It can be observed from the analysis results that the using efficiency of electrical energy also significantly affects the using efficiency of power resources, so improving the using methods and making all resources allocated relatively optimal can maximize the output, in order to make the using efficiency of power resources reach the maximum value. Keywords Power energy · Utilization rate · DEA model
1 Introduction Good economic development is dependent on the supply of power resources, while electric power is also one of the necessary resources in people’s daily life [1, 2], so a good supply of power resources plays a pivotal supporting role in maintaining the economic promotion of the whole society and changing people’s living standard, and also plays an irreplaceable role in the entire development process of national economy. Power resources, as a pillar of national economic development, have become the main object of energy consumption [3–5]. In recent years, China proposes the policy about energy problems, and the using efficiency of electrical energy has become the F. Mo (B) College of Mechanical and Electrical Engineering, Guangdong University of Science and Technology, Dongguan 523083, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_15
105
106
F. Mo
main influence factor. Thus, to increase the using efficiency of power resources is a strong guarantee for economic development, and also has great significance for the realization of energy saving and emission reduction. Power resources industry is qualified with the feature of both multi-input and multi-output, and data envelopment analysis (DEA) is a theoretical approach to solve the proposed problems. DEA can accurately conduct comprehensive analysis on multi-input, resources problem and multi-output, service problem, to get the efficiency problem of a number of units providing service.
2 DEA Model DEA is different from traditional linear programming model, and its connotation is the ratio issue between the input and output [6, 7]. Conduct unit unified processing on all variables through a certain transformation, compare the performance of similar service units, namely, the similar variables while inputting, find the side with the best performance, and retain it as the performance value of this type of unit, which can help find insufficient points to some extent to conduct corresponding change and to make all similar units reach this maximum performance. DEA helps identify inefficient units, analyze the impact severity of inefficient units, and find the most effective method through a series of analysis and comparison [8]. The non-DEA efficient decision-making unit can keep the output unchanged while reducing input, keep the unchanged input, and reduce the corresponding input. For CCR model, the following ways can be used to project the model to efficiency frontier, and the point input-output combination obtained through projection is valid DEA. xˆio = θo∗ xio − si−∗ = xio − (1 − θo∗ )xio − si−∗ ≤ xio , i = 1, . . . , m yˆr o = yr o + sr+∗ ≥ yr o , r = 1, . . . , s.
(1)
The difference between the value got from the above projection and the original input and output values is the effectively improved values that the evaluated decisionmaking unit is expected to achieve, and suppose the variable quantity of input is xio and the variable quantity of output is yr o xio = xio − xˆio = xio − (θo∗ xio − si−∗ ), i = 1, . . . , m yr o = yˆr o − yr o = (yr o + sr+∗ ) − yr o , r = 1, . . . , s.
(2)
An Improvement Method of Power Energy Utilization …
107
The final optimization model is min θ n λ j X j + S− = θ X 0 j=1 n
(3)
λ j Y j + S + = Y0
j=1
λ j ≥ 0, J = 1, 2, . . . , n S + ≥ 0, S + ≥ 0 The above formula is the specific expression of DEA model, usually an analysis model commonly applied in the relevant research fields. In the formula, λ j shows an effectual decision-making unit part finally obtained from the reconstruction of linear combination, and the No. j decision-making unit will be regrouped, thus getting the final proportional relation; θ represents the optimized distance of the efficient frontier within the decision-making unit, and S + , S + are relaxation and surplus variables, representing the using efficiency of one hundred million yuan input is very low, but the relaxation degree of the output will be greatly improved, which indicates the change space of this unit is large and needs to be further analyzed, to make non-zero variable effectively achieve the frontier, thus being improved. In practice, policy makers sometimes concern about which programs or decisionmaking units are the best, but do not care about the ordering of other units. Therefore, how to use DEA model to directly seek the optimal decision-making unit has become an important issue.
2.1 The Optimal Decision-Making Unit Selection Method with Constant Scale of Returns Minimize m i=1
⎛ ⎞ ⎛ ⎞ n s n vi ⎝ xi j ⎠ − ur ⎝ yr j ⎠ r =1
j=1
(4)
j=1
Subject to s r =1
u r yr j −
m i=1
vi xi j ≤ I j ,
n
Ij = 1
(5)
j=1
I j ∈ {0, 1}, j = 1, . . . , n In the formula, I j ( j = 1, . . . , n) is a binary variable, and only one viable can take non-zero value 1. If Io = 1, the corresponding D MUo restriction of rs =1 u r yr j −
108
F. Mo
m
m ≤ I j is rs =1 u r yr o − i=1 vi xio ≤ 1, that mis, the efficiency value of vi xi j ≤ I j of remaining D MUo is larger than 1, and the restriction rs =1 u r yr j − i=1 DMU is the same with the restriction of original CCR model. Therefore, only the efficiency value of the most effective decision-making unit is greater than 1, and the efficiencies of the remaining decision-making units are less than or equal to 1. Weight restriction proposes the form in the slacking variable model, and this restriction form is widely applied in the actual application. i=1 vi x i j
2.2 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Input-Oriented BCC Model Model is the selection method of the optimal decision-making unit based on constant scale of returns. This method can be extended to the case of variable scales of returns, as is shown below, and the form of the model is based on the form of input-oriented BCC model. Minimize ⎛ ⎞ ⎛ ⎞ m n s n (6) vi ⎝ xi j ⎠ − nv0 − ur ⎝ yr j ⎠ i=1
r =1
j=1
j=1
Subject to s
u r yr j −
r =1
m
vi xi j + v0 ≤ I j ,
i=1
n
I j = 1,
(7)
j=1
I j ∈ {0, 1}, j = 1, . . . , n, v0 is unsigned limit.
2.3 The Optimal Decision-Making Unit Selection Method of Mixed Integer Linear Programming Based on Output-Oriented BCC Mode Similarly, the optimal decision-making unit selection method of mixed integer linear programming is shown below. Minimize ⎛ ⎞ ⎛ ⎞ m n s n vi ⎝ xi j ⎠ − ur ⎝ yr j ⎠ − nu 0 (8) i=1
j=1
r =1
j=1
An Improvement Method of Power Energy Utilization …
109
Subject to s
u r yr j + u 0 −
r =1
m
vi xi j ≤ I j ,
i=1
s
u r yr j + u 0 ≥ 0,
r =1
n
I j = 1, j = 1, . . . , n,
j=1
(9) I j ∈ {0, 1}, j = 1, . . . , n, u 0 is free in sign. In the formula, the restriction condition rs =1 u r yr j + u 0 ≥ 0 ( j = 1, . . . , n) is to ensure that all outputs are non-negative, for negative outputs make no sense.
3 Power Energy Utilization Rate DEA analysis theory is to conduct comprehensive analysis on each decision-making unit from the perspective of the maximum efficiency. Specific data are shown in Table 1. In the analysis principle of DEA model, not all decision variables can be saved as an effective variable, and if the efficiency value reaches 1, the non-zero decision variables generated under the condition of constant input is invalid value. For DEA invalid decision variables, the “projection” on the effective side of the DEA can be used to study the final effective disciplinary level that the decision variables can achieve, and the reason for invalid analysis can be further analyzed, in order to be able to find changes direction and policy issues [9, 10]. And then the input value and the corresponding output value of the decision variables can be obtained. Table 1 shows the slack variable values of national power resources. Table 1 Efficiency of national power resources from 2011 to 2018 Year\index
TE technical efficiency
PTE technical efficiency
SE scale efficiency
Status of returns to scale
2011
0.403
0.895
0.451
Increment
2012
0.472
0.913
0.519
Increment
2013
0.546
0.925
0.591
Increment
2014
0.619
0.916
0.676
Increment
2015
0.729
0.940
0.775
Increment
2016
0.819
0.986
0.831
Increment
2017
0.891
1.000
0.891
Increment
2018
1.000
1.000
1.000
–
Average
0.685
0.947
0.717
–
110
F. Mo
4 Conclusion Although the using efficiency of power resources is high, the standard consumption of electricity generation and the standard consumption of electricity consumption are redundant, and thus there is still much room for improvement in the using efficiency of power resources.
References 1. Crompton, Paul, and Yanrui Wu. 2015. Energy consumption in China: Past trends and future directions. Energy Economics 66 (1): 195–208. 2. Fisher-Vanden, Karen, and Gary H. Jefferson. 2016. Technology development and energy productivity in China. Energy Economics 67 (6): 690–705. 3. Yoo, S.H., J.S. Lee, and S.J. Kwak. 2017. Estimation of residential electricity demand function in Seoul by correction for sample selection bias. Energy Policy 81 (35): 5702–5707. 4. Hamdar, S.H., H. Khoury, and S. Zehtabi. 2016. A simulator-based approach for modeling longitudinal driving behavior in construction work zones: Exploration and assessment. Simulation Transactions of the Society for Modeling & Simulation International 92 (6): 579–594. 5. Lin, Kai-Yung, Jin-Cherng Lin, and Jan-Min Chen, et al. 2010. Defense automatic malicious tools based on navigation behavior. Journal of Discrete Mathematical Sciences & Cryptography 13 (1): 17–27. 6. Lean, H.H., and R. Smyth. 2010. On the dynamics of aggregate output, electricity consumption and exports in Malaysia: Evidence from multivariate Granger causality tests. Applied Energy 112 (87): 1963–1971. 7. Han, Y., Z. Geng, Q. Zhu, et al. 2015. Energy efficiency analysis method based on fuzzy DEA cross-model for ethylene production systems in chemical industry. Energy 83 (7): 685–695. 8. Tianjia, Shu, Xiaoqiang Zhong, et al. 2011. TFP electricity consumption efficiency and influencing factor analysis based on DEA method. Energy Procedia 55 (12): 91–97. 9. Yang, L., and K.L. Wang. 2013. Regional differences of environmental efficiency of China’s energy utilization and environmental regulation cost based on provincial panel data and DEA method. Mathematical and Computer Modelling 58 (5–6): 1074–1083. 10. Jie, W., B. Xiong, Q. An, et al. 2015. Total-factor energy efficiency evaluation of Chinese industry by using two-stage DEA model with shared inputs. Annals of Operations Research 255 (1–2): 1–20.
“Blended Learning” in Construction Cost Network Course Shu Li, Lei Cao and Yunda Shao
Abstract Separation of teaching and learning is a prominent problem in distance education, and “vapidness” is one of the primary issues to be solved in network curriculum. Due to the theory and practice properties of Construction Cost, blended learning was used to satisfy students for individualising education, which strengthen students’ motivation and improve availability and interest. The route of guidancestudy behaviour-practice-final review goes through cases, actual scenario of occupational training and work office was rebuilt. Blended learning not only reduces the distance that has existed among students and teachers but also increase the interaction between the two sides. The investigation shows that 90% students consider that through cases oriented, the learning scene is more attractive as tied up with actual scenario; there is a significant increase of students’ motivation and achievement as a result of the blended learning model, and a reduction to 30% of vapidness-feeling student. This research provides experiences for teachers to support and promote the students’ interest and includes tactics such as being an involved role model on cases to facilitate help-seeking processes. Keywords Open education · Engineering · Network course · Construction cost
1 Introduction Education is a determinant in development of a country. Education is one of the largest investment in shaping and building men [1]. Curriculum is the core of school education. It is not only an important measure to guarantee the quality of education, but also a basic way to achieve educational goals [2, 3]. In the face of rapid development of modern science and technology, how to create a group of courses with its own characteristics to provide enough support and space for the development of students’ personality, and to cultivate high-quality talents with all-round development of knowledge and skills, has become important, contributing to the progress of a country which is determined by the quality of human resources. S. Li (B) · L. Cao · Y. Shao The Open University of China, Beijing 100039, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_16
111
112
S. Li et al.
However, at present, there are more discussions on the curriculum construction of ordinary colleges and universities [4, 5]. Online and blended learning is intended for individualising education. However, online and blended learning attracts a diverse range of students, while teachers lack insight into this diversity that hinders them in anticipating students’ individual needs [6] and less research on the curriculum design of distance open education, especially on the more practical courses of engineering majors. This leads to the lack of experiences for the construction and reform of engineering network curriculum, and is often in an awkward position of passively adapting to the content and mode of curriculum in ordinary colleges and universities. Therefore, it is of great significance to actively explore and design courses that accord with the characteristics and to develop online courses in line with students’ learning habits and rules for improving the quality of talents training and adapting to the new social needs of national open universities. Construction Cost is one of the most widely used courses in civil engineering, which not only focus on abstract theoretical reasoning, but also aim at practical abilities of social practice, practical problem solving and case analysis [7]. This course is professional, theoretical and practical-skill emphasised for specific groups, with typical representation in engineering. In this study, the Construction Cost network course of the Open University of China is designed and opened to the students around the country, which effect is tracked and analyzed.
2 Learner Analysis 2.1 Characteristic Distance education attracts a diverse range of students who from different traditional education. Students’ age, knowledge structure, cognitive level and learning needs are diverse. In addition, the vast majority of distance education students are adults. The limited social pressure and framework during online and distance moments [8] and the multiple responsibilities that adults face may create obstacles to complete tasks at home. It depends on beliefs and processes like task values, interest and self-efficacy [9]. They are flexible regarding time, effort and environment. The characteristics mainly lie in three respects, (1) young and fragmentation of time. The age is mainly young, most of them are on the job, the time that can be used for learning is limited and not fixed, and generally there are contradictions between working and learning; (2) weak study foundation. Most learners have a weak foundation, and lack of comprehension and concentration appears in their study. They require the knowledge they have learned is simple and easy to understand, and they prefer to learn practical techniques and lack enthusiasm for learning theoretical knowledge; (3) Separation of teaching and learning. As individual learning is main, the communication between teachers and other students is less, and the information exchange and feedback are not timely because of the separation of teaching and learning.
“Blended Learning” in Construction Cost Network Course
113
2.2 Motivation Motivation is very important to perform, which can affect the students’ choice, effort and persistence [10, 11]. It is formed by processes and beliefs like interest, selfefficacy and task values and is also a determinant regarding students’ educational achievement [9]. To keep students persisting and performing, motivation-analyze must be done to optimise students’ motivational beliefs and processes. Table 1 Table 1 Investigation results of learners Category
Background
Motivation
Requirements
Difficulty level
Employee
Rich practical experience, good professional skills Lack systematic theoretical knowledge Clear learning purpose, strong initiative
Systematic learning theoretical knowledge Raise the level of education Promotion requirements
Systematic theoretical knowledge study Understanding principles of various work Targeted promotion of one or several professional skills
Low
College graduate
Good professional foundation, master certain professional skills Lack practical experience Clear learning purpose, strong initiative
Upgrading professional knowledge and skills Strengthen practical ability Be professional
Enhance professional theoretical knowledge, practice ability; Grasp practical skills
Ordinary
Related industry employee
A certain professional foundation A certain practical experience Clear learning purpose, strong initiative
Master theoretical knowledge and skill Strengthen practical ability Be professional
Master theoretical knowledge and practical skills Preparation for job turnover
Higher
Unrelated industry employee
Little expertise and skill No practical experience Unclear learning purpose, weak initiative
Professional knowledge and skill study Strengthen practical ability Be professional
Master basic knowledge and skills Acquire theoretical knowledge and practical ability
Highest
114
S. Li et al.
displays that motivations are diverse as individualising needs. In-service learners have rich practice experiences, while graduates are adept in the theory knowledge. Graduates prefer experiences rather than theories for employee. They have different difficulties in the education.
3 Design of Network Course 3.1 Blended Learning Model The blended learning model is intended for individualising education [6], blended learning not only increase the interaction between students and teachers but also reduces the distance between two sides [10], which is “task-based, resource-applied, learning-supported”. As is shown in Fig. 1, there are obvious four learning phases Scene guide Source independent exploration On-line study
occupational training Theory
Cases
Resources
Teaching
Multimedia On-line test
Blended learning evaluation and revise
Extended content learning Self-exploration type
Teaching reflection type
Guided cooperative type
Independent inquiry on resources
Well-structured reading
Problem guided learning
Class Time
Fig. 1 Blended learning flow
“Blended Learning” in Construction Cost Network Course
115
occuring before, during and after students’ efforts to learn. First, activation phase includes processes of anticipating efforts to learn. Second, in monitoring phase, students monitor their learning processes and become metacognitively aware of their selves, task and context. Third, with the aim to get closer to the learning goals by using diverse learning strategies, in regulation phase learning efforts are optimised by controlling and regulating themselves, task and context [8]. Fourth, in the reflection phase, processes follow the students’ efforts to learn by reflecting on themselves, task and context [12, 13]. Four learning phases goes through the cases, which occur before, during and after students’ efforts and lead students to enter the learning environment. Actual scenario was rebuilt. Multimedia simultaneously demonstrates training videos, pictures, knowledge points and so on.
3.2 Course Organization Phases do not necessarily act in an orderly progression, although they are showed in a linear way. Results from using a certain means of phases can reactivate a previous phase as students realise current means not assisting with learning process. Furthermore, four phases occur in four areas of function: guidance, study behaviour, practice and review. The route of guide-study behaviour-practice-final review goes through the cases, which leads students to enter the learning environment. Actual scenario was rebuilt. Multimedia simultaneously demonstrate train videos, pictures, knowledge points and so on. In each phase and function, students can change strategies to process their education and learn efficiently. 1. Guidance The content, key points and learning objectives are Introduced systematically, and help students to clarify what content they will learn in each scene, which resources they can choose to organize the next study and what level of knowledge they should achieve after learning. 2. Learning behaviour The course is organized in cases, but an orderly progression is not necessary. “Key points” is linear layout with clear level, according to the need to click on the corresponding title of knowledge points for respectively view. Comprehensive use of multimedia presents multisensory learning content. 3. Practice After each Key knowledge is completed, there will be self-test. The self-test are only for practice, and The feedback will be analyzed after submission. The extended learning can be chosen according to the characteristics of students. 4. Review Every student’s outcome will be analyzed. Opinions will returns respectively, which lead the students to revise their study.
116
S. Li et al.
4 Effect Analysis 150 questionnaires were designed and distributed to all branches of the country to evaluate the effectiveness of the course. About 6000 students have participated in the investigation. Students found that education seemed like a hobby, felt interesting and were motivated to engage in their education intrinsically. The findings indicate that, (1) in the emotional experience of the learning process, 30% students feel vapid, which is down from 70%. Blended learning satisfies students for individualising education. It is not only shortens the distance between students’ study and work, but also makes students have a sense of immersion. (2) for the knowledge of operation and practice, 90% students consider that through cases oriented, the learning scene can be moved into project cases, and the distance between books and real life has be drawn closer. Students can experience the practical problems, think positively, analyze the causes of the problems, and find solutions. So that, they grasp the skills more firmly and effectively. (3) through combination of case and occupational training, the key knowledge is emphasized and the learning results are targeted. The survey showed that the students’ satisfaction was 89%.
5 Conclusion Education is a determinant in development of a country. For the students in the Open University of China, limited social pressure and framework during online, distance moments, and multiple responsibilities that adults face may create obstacles to complete studies at home. Blended learning not only increase the interaction between students and teachers but also reduces the distance between two sides [10]. The network course of Construction Cost, lead students to learn independently, arouse students’ desire to learn, and make students better integrate into the learning atmosphere. Comparing to extrinsic motivation, intrinsic motivation is the strongest motivation [11]. Blended learning model has a significant effect on increasing learn motivation and becomes the basis for student achievement improvement actually. Acknowledgements This research was supported by Open Research Fund of Key Laboratory of Urban Underground Engineering, Ministry of Education (Grant No. TUE2018-03), and Youth Fund for the 13th Five-Year Plan of the Open University of China (Grant No. G18F0031Q).
References 1. Islam, Syaiful, et al. 2018. To boost students’ motivation and achievement through blended learning. Journal of Physics: Conference Series 1114: 012046. 2. Yang, X.T. 2007. Evaluation of web-based learning. Beijing: Central Radio & TV University Press (in Chinese).
“Blended Learning” in Construction Cost Network Course
117
3. Wu, G.X. 2008. Process-oriented examination in modern distance education: Towards a research and practice framework. Distance Education in China 3: 26–31. (in Chinese). 4. Tao, S.L. 2008. Reform of computer specialty in modern distance education of RTVU. China Higher Education 10: 55–57. (in Chinese). 5. Wu, L.Z., and X.D. Ding. 2008. Sewart’s theory of student support in distance education: Interpretation and inspiration. Distance Education in China 1: 25–29. (in Chinese). 6. Vanslambrouck, Silke, et al. 2019. An in-depth analysis of adult students in blended environments: Do they regulate their learning in an ‘old school’ way? Computers & Education 128: 75–87. 7. Wolters, C.A., P.R. Pintrich, and S.A. Karabenick. 2005. Assessing academic self-regulated learning: What do children need to flourish? Conceptualizing and measuring indicators of positive development, 251–270. New York: Springer. 8. Pintrich, P.R., and A. Zusho. 2007. Student motivation and self-regulated learning in the college classroom. In The scholarship of teaching and learning in higher education: An evidence-based perspective, ed. R.P. Perry and J.C. Smart, 731–810. Dordrecht, The Netherlands: Springer. 9. Lazowski, R.A., and C.S. Hulleman. 2016. Motivation interventions in education: A metaanalytic review. Review of Educational Research 86 (2): 602–640. 10. Allen, I.E., J. Seaman, and R. Garrett. 2007 Blending. In The extent and promise of blended education in the United States. ERIC. 11. Baharun, H., and R. Awwaliyah. 2017. Pendidikan Multikultural dalam Menanggulangi Narasi Islamisme di Indonesia. Jurnal Pendidikan Agama Islam (Journal of Islamic Education Studies) 5 (2): 224–243. 12. Pintrich, P.R. 2000. Multiple goals, multiple pathways: The role of goal orientation in learning and achievement. Journal of Educational Psychology 92 (3): 544–555. 13. Zimmerman, B.J. 2015. Self-regulated learning: Theories, measures, and outcomes. International Encyclopedia of the Social & Behavioral Sciences 21: 541–546.
Data Mining of Privacy Preserving Based on Secret Sharing Technology Jianguo Liu, Xiaoyu Liu, Zhansheng Chen and Zhengkun Hu
Abstract Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving level, and analyses the correctness, complexity and security of the algorithm. At the same time, it points out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion between participants. This algorithm is suitable for privacy-preserving data mining in relatively small distributed databases. Keyword Secure multi-party computation · Privacy-preserving · Data mining · Secret sharing
1 Introduction Secure multi-party computing technology is a common technology in privacypreserving data mining in distributed environment. Especially when secure multiparty computing technology makes it impossible to find fully trusted third party participants, privacy-preserving data mining results can also be obtained [1]. Almost all secure multi-party computing protocols are based on some form of secret sharing. In these schemes, participants can generate the same shared secret, and no one knows the secret they share before cooperating. For example, document [2, 3] proposed decision tree classification mining algorithm for privacy-preserving in distributed environment based on Shamir secret sharing idea. For other data mining tasks such as association rules mining, how to design data mining algorithms with privacy-preserving level based on secret sharing technology remains to be solved.
J. Liu (B) · X. Liu · Z. Chen · Z. Hu College of Applied Science & Technology, Beijing Union University, Beijing 100101, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_17
119
120
J. Liu et al.
2 Secret Sharing Threshold Scheme The so-called secret sharing scheme refers to [4]: dividing a secret s into sub-keys s1 , s2 , . . . sn , also known as shadow or share, and securely allocating it to n participant to hold it separately, so as to satisfy the following two conditions: (1) Reconfigurable secrets si owned by any k or more than k participants. (2) If the value si of any participant or less k − 1 is not reconstructed secret s, the scheme is called (k, n) threshold scheme, which k is a threshold value. Since reconstructing a key requires at least k sub-key, exposing (r ≤ k −1) shares does not endanger the secret. Consequently, the conspiracy of k participants can not obtain the key. In addition, if a share is accidentally lost or destroyed, the key can still be restored (as long as there is at least k valid share). Shamir secret sharing scheme is the representative one in secret sharing threshold scheme. Shamir Secret Sharing Threshold Scheme: Shamir Secret Sharing Threshold Scheme was proposed in 1994 by Lagrange interpolation formula based on Polynomials in reference [4]. Its basic ideas are as follows: Let’s say {(x1 , y1 ), . . . , (xk , yk )} is a set of k points on a plane, which xi (i = 1, . . . , k) are different. Then there exists a unique k − 1 subpolynomial f (x) passing through the k on the plane, f (x) = ak−1 x k−1 + . . . + a1 x 1 + a0 , ( ak−1 = 0) If the secret s is taken as f (0), that is a0 , n sub-key is f (xi ) (i = 1, 2, . . . n), then any of k sub-keys can be reconstructed f (x),than obtain the secret s (that is a0 ). Shamir secret sharing threshold scheme consists of three stages: system initialization, secret distribution and secret reconstruction [5]
3 Privacy-Preserving Distributed Association Rule Data Mining Based on Secret Sharing Technology This section will focus on the privacy-preserving distributed association rule data mining based on Shamir secret sharing technology. According to the distribution of data, distributed data mining technology can be divided into horizontal distribution and vertical distribution data mining technology, which vertical distribution data mining technology is more challenging [6]. The main contents of this section are as follows: (1) A new secure and effective solution is proposed to the data mining problem of privacy-preserving association rules with vertical distribution; (2) Shamir secret sharing technology is applied to the data mining problem of privacy-preserving
Data Mining of Privacy Preserving Based …
121
association rules with vertical distribution for the first time. The algorithm can effectively prevent the collusion between participants and the correctness, complexity and security of the algorithm are evaluated.
3.1 Definition of Problem For data mining of Distributed Association rules, transaction database D is divided into two types: vertical distribution and horizontal distribution. Vertical partitions refer to that in a distributed environment, each site stores only part of the attribute data, and the data on each site has different characteristics (or sets of attributes). In this section, we will study the data mining problem of vertical distributed Privacy Preservation Association Rules with multi-party participation. There are n participants P1 , P2 , . . . Pn , The database D is divided vertically among the n participants P1 , P2 , . . . Pn . Each participant Pi has a database Di . Here is the database D = D1 ∪ D2 ∪ . . . ∪ Dn ,
Di ∩ D j = Φ, f or ∀ i, j ∈ n
That is, each participant only has data records of some attributes in the database D. In order to share common interests, n participants want to cooperate in data mining of association rules in databases D = D1 ∪ D2 ∪ . . . ∪ Dn . Each participant is reluctant to share data with others in the process of collaborative data mining, but only willing to share the results of data mining. Therefore, we can abstract the data mining problem of Privacy Preservation Association Rules with vertical distribution as follows. Question 1: There are n participants P1 , P2 , . . . Pn , in which the database D (a total of N records, Boolean database) is divided vertically among n participants, that is, each participant Pi has a database Di , and Di ∩ D j = Φ, f or ∀ i, j ∈ n. For the common benefit, n participants want to conduct privacy-preserving association rule data mining in vertically distributed databases D = D1 ∪ D2 ∪ . . . ∪ Dn . This algorithm can effectively prevent collusion between participants. In order to design a privacy-preserving distributed association rule data mining algorithm with anti-collusion characteristics, the following assumptions are made: (1) Assuming that data mining participants are quasi-honest, based on maximizing their own profits, choose quasi-honest attack strategy is Pareto’s optimal strategy, so it has practical significance and theoretical basis to assume that data mining participants are quasi-honest attack. (2) Under the hypothesis of quasi-honesty attack, participants can take conspiracy behavior. Under the hypothesis of quasi-honesty attack, Non-Conspiracy behavior is not the optimal Nash equilibrium strategy based on maximizing benefits, especially when participants’ privacy information value is high, because conspiracy behavior is likely to get more High returns.
122
J. Liu et al.
(3) The attackers are divided into two categories: internal attackers (participants in data mining) and external attackers (except internal attackers). The security of the algorithm refers to: (a) for external attackers, the algorithm is secure under the definition of semantic security; (b) for internal attackers, the algorithm is not only secure under the definition of semantic security, but also can effectively prevent the collusion between participants, that is, in the process of data mining, even if there is a collusion between participants, then collusion. In addition to the results of data mining, participants cannot deduce the privacy data of other participants who did not participate in the collusion based on the information obtained. According to the above hypothesis, our target is to design an effective and secure privacy-preserving algorithm or protocol based on Shamir secret sharing technology for data mining of privacy-preserving association rules with vertical distribution.
3.2 Privacy-Preserving Vertical Distributed Association Rules Data Mining Algorithms In order to mine association rules, it is necessary to determine whether a candidate item set is a frequent item set. At first should find out the number of records c.count in database D .whose attribute value of all items in the item set is 1. Given the minimum support threshold s, if c.count ≥ Ns% , the candidate item set is frequent item set. The following Algorithm 1 is Apriori algorithm [7] describes how to find frequent item sets of vertically distributed data. Algorithm 1: Vertical Distributed Association Rule Data Mining Algorithms Input: D // Transaction database Minsup//Minimum Support Threshold Output: L // Frequent Itemsets in 1. 2. 3. 4. 5. 6.
7. 8. 9.
L 1 = { large 1_itemsets} for (k = 2; L k−1 = Φ; k + + ) do begin Ck = apriori - gen(L k−1 ) // Generating new candidate sets for all candidates c ∈ Ck do begin if all the attributes in c are entirely the same party, then that party independently compute c.count else collaboratively compute c.count (We will show how to compute it in Section 4.3.3) end L k = L k ∪ {c|c.count ≥ min sup } end
Data Mining of Privacy Preserving Based …
123
10. Return L = ∪k L k Note 1: In tep 3 of Algorithm 1, Ck+1 = apriori - gen(L k ) is the most famous association rule algorithm. This algorithm is used to generate candidate item sets for each scan except for the first scan. Reference [4]. Note 2: In step 5 and 6 of Algorithm 1, c.count represents the count of each item set, that is, the number of records whose attribute values are all 1 in the candidate item set of transaction database D. The ratio between the attribute values and all records in transaction database D is the support degree of the item set. How to calculate c.count will be explained in detail in Algorithm 2. However, in step 6 of Algorithm 1, in order to calculate the counting c.count of item sets, it is necessary to calculate the value of item attributes among different participants. On the other hand, if the attributes of the candidate item set belong to different participants, data sharing is inevitable, then each participant can first. Establish a vector based on its own attribute values. For example, for a candidate Pi can first item set, the participant Pi has p attribute a 1 , a2 , . . . , a p , the participant p construct the vector Ai , where the j element of the vector Ai is A j i = k=1 a j k Then, multiple cooperating participants can apply Algorithm 2 to calculate the count c.count of the item set.
3.3 Item Set Counting C.Countprivacy-Preserving Algorithms This section will discuss how to apply Shamir secret sharing technology to compute item set counts c.counti without revealing participants’ privacy data in data mining of vertically distributed privacy-preserving association rules involving multiple participants. In this section, we will study the vertical and horizontal distribution of association rule data mining for privacy-preserving based on Shamir secret sharing technology and literature [2]. Participants Pn have privacy vectors An , Ai = (1, 0, 1 , 1 . . . 0)T . And, the element j representing the vector Ai is the Ai j item attribute value recorded in the participant database, whose value is 0 or 1. Whether the records in the database D support the project j or not, the calculation steps are as follows: First step: n participants P1 , P2 , . . . Pn determine an arbitrary k-degree subpolynomial (k ≤ n − 1), whose constant is equal to the privacy value Ai j , and jointly determine m ≥ n different random number X = (x1 , x2 , . . . xm ), Therefore, for each record j in the database, each participant Pi has a k-degree subpolynomial qi (x) = an−1 x n−1 + . . . + a1 x 1 + Ai j , qi (0) = Ai j , i = 1, . . . n. Then each participant calculates each participant’s share (i.e. sub-key) sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n according to its polynomial and different random numbers X = (x1 , x2 , . . . xn ), retains its share, and transmits other shares sh(Ai j , Pt ) = qi (xt ), i = t to the corresponding participants Pt .
124
J. Liu et al.
In the second step, participant Pi calculates S(xi ) = q1 (xi )+q2 (xi )+. . .+qn (xi ) based on q1 (xi ), q2 (xi ), . . . qn (xi ) what is obtained from other participants, and then transmits the intermediate results to all other participants. In the third step, participant calculates the sum of the privacy values based on the results obtained in the second step. Notice that each participant Pi has an arbitrary secret k = n − 1 degree polynomial whose constant term is equal to the privacy S(x) = value Ai j . Therefore, the sum of all these polynomials is another polynomial n−1 + bn−2 x n−2 + . . . + b1 x + ni= 1 Ai j whose q1 (x) + q2 (x) + . . . + qn (x) = bn−1 x constant term is equal to c.count j = ni= 1 Ai j . Therefore, each participant Pi will obtain a set of n-variable linear equations with n equations: ⎧ n ⎪ n−1 n−2 ⎪ b x + b x + · · · + b x + Ai j = s(x1 ) n−1 n−2 1 1 ⎪ 1 1 ⎪ ⎪ i=1 ⎪ ⎪ n ⎪ ⎨ b x n−1 + b x n−2 + · · · + b x + A = s(x ) n−1 2 n−2 2 1 2 i j 2 i=1 ⎪ ⎪ ······ ⎪ ⎪ ⎪ n ⎪ ⎪ ⎪ Ai j = s(xn ) ⎩ bn−1 xnn−1 + bn−2 xnn−2 + · · · + b1 xn +
(1)
i=1
The fourth step, by solving the above linear equations, the unique solution of the equations, i.e. the coefficients of the polynomials S(x), is obtained. Since the n constant terms of the polynomials S(x) are the sum of the privacy values Ai j ni=1 of the participants, all participants can get the sum of the privacy values i = 1 Ai j without knowing the privacy data of the participants. n Ai j . If it In the fifth step, each participant Pi gets the sum of privacy values i=1
is n, it indicates that the item attribute values of all participants’ Article records j in the database D are all 1, so Article Records j support the association rule, then m j = 1, otherwise m j = 0. Repeat the above calculation steps for each record in the database, then each participant can get m j = 1 or 0 for any record j ( j = 1, 2, · · · N ), so as to determine whether the record supports this association rule, and then get the count of item sets c.count = Nj=1 m j in the database D privately. In summary, under the assumption of participant quasi-honesty attack, the algorithms for counting item sets c.count = Nj=1 m j in the computing database D of n participants’ privacy can be summarized as follows: Algorithm 2: Require: Set of parties P1 , P2 , . . . Pn . Ai j : Secret value of Pi , X : A set of n publicly known random values x1 , x2 , . . . xn . k: Degree of the random polynomial k = n − 1. 1
: for each transaction j = 1 to N do
Data Mining of Privacy Preserving Based …
2 3 4 5 6 7 8 9 10 11 12 13 14
125
: for each party Pi (i = 1, · · · n) do : Select a random polynomial qi (x) = an−1 x n−1 + . . . + a1 x 1 + Ai j : Compute the share of each party Pt , where sh(Ai j , Pt ) = qi (xt ) : for t = 1 to n do Send sh(Ai j , Pt ) to party Pt : Receive the shares sh(Ai j , Pt ) from every party Pt . : Compute S(xi ) = q1 (xi ) + q2 (xi ) + . . . + qn (xi ) : for t = 1 to n do : Send S(xi ) to party Pt : Receive the results S(xi ) from every party Pi . n Ai j of secret values : Solve the set of equations to find the sum i=1 n : if the i=1 Ai j = n, let m j = 1, otherwise m j = 0. : Each party computes c.count = Nj=1 m j .
3.4 Item Set Counting C.Count Privacy-Preserving Algorithms Analysis The correctness, complexity and security of the aboveprivacy-preserving calculation item set count C. count Algorithm 2 are analyzed. (1) Correctness analysis Assuming participants Pi have privacy vectors Ai and participants Pi have privacy vectors Ai j for any article record j in the database D, in order to determine whether the record supports this association rule, the key is to see whether the sum of the n Ai j equals the number of participants n. If privacy values of each participant n
i=1
Ai
j
= n, it shows that the item attribute values j of all participants’ article
i=1
record in the database D are all 1, thus the article record supports the association rule, so m j = 1, otherwise, if the item attribute value of the participant’s Article Record is all 1, indicates that the Article Record does not support the association not n Ai j = n, m j = 0. According to Algorithm 2, the sum of the privacy rule, so i=1 n Ai j of each participant is exactly the constant term of the polynomial values i=1 can get a set of linear equations, S(x) = q1 (x)+q2 (x)+. . .+qn (x), each participant n Ai j by solving the linear so that the sum of privacy values can be obtained i=1 equations to determine whether the record supports the association rule. In summary, under the assumption that participants can honestly and correctly execute the algorithm under quasi-honest attacks, Algorithm 2 can accurately calculate the count c.count of item sets in the database. (2) Complexity analysis
126
J. Liu et al.
Assuming that there is n participants in distributed association rule data mining, the communication cost of step 5, 6, 9 and 10 in Algorithm 2 is 2n(n − 1), while the communication between participants is not involved in the other calculation steps, so the communication cost of Algorithm 2 is equal to 2n(n − 1)t. The computational cost of Algorithm 2 includes the generation of polynomials, the calculation of polynomial evaluation and the calculation of solving linear equations, which are as follows: The generation of arbitrary polynomials qi (x) , i = 1, . . . n in step 3; In step 4, participants need to compute total n 2 polynomial values; The number of addition operation is n(n − 1) in step 8; n Ai j by solving linear In step 12, the operation of obtaining privacy values i=1 equations; (E) The addition operation c.count = Nj=1 m j in step 14.
(A) (B) (C) (D)
The computational cost of general SMC method is O(n 6 ) ∼ O(n 8 ) [8, 9]. It can be seen that the computational cost of Algorithm 2 is smaller than that of general SMC method. (3) Safety analysis Theorem 1 (For external attackers, Algorithm 2 is semantically secure.) It is proved that during the execution of algorithm 3, external attackers can intercept data in the transmission process. sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n, i = 1, 2, . . . n, and the value of the polynomial S(x) = q1 (x) + q2 (x) + . . . + qn (x) at the point x1 , x2 , · · · xn , that is S(xi ), i = 1, . . . n, because the external attacker does not know the specific value x1 , x2 , . . . xn , it is impossible to calculate the privacy information of each participant Ai j based on the information obtained. In the process of execution, there is no transmission of private data. Therefore, the external attacker cannot intercept any valuable information, so Algorithm 2 is semantically safe for the external attacker. Theorem 2 (For data mining participants, Algorithm 2 is semantically secure). It proves that, compared with external attackers, data mining participants know the specific values x1 , x2 , · · · xn , and assume that data mining participants can intercept shares sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n, i = 1, 2, . . . n, i = t in the process of data transmission of the algorithm. In the execution of Algorithm 2, each participant Pi calculates the share of each participant sh(Ai j , Pt ) = qi (xt ) t = 1, 2, . . . n (i.e. sub-key) according to its secret polynomial and random number X = (x1 , x2 , . . . xn ). Data can only get the value of the participant’s secret polynomial at n − 1 point x1 , . . . , xi−1 , xi+1 , . . . , xn , so the participant’s privacy value Ai j cannot be obtained. To sum up, Algorithm 2 is semantically secure for data mining participants.
Data Mining of Privacy Preserving Based …
127
Theorem 3 Assuming the number of collusion participants is t < n − 1, Algorithm 2 can effectively prevent collusion between participants. It is proved that in the execution of Algorithm 2, assuming that participants can conspire with each other, in order to obtain the privacy information of non-conspirator participants, at least n − 1 participants is required to conspire, such as P2 , . . . Pn participants conspiracy, in the execution of the algorithm, they can get the values s(x1 ) of the polynomial S(x) at n − 1 points x2 , . . . xn and the P1 participant’s secret polynomial q1 (x) at different points q1 (x2 ), . . . , q1 (xn ). So can get it q1 (x1 ) = S(x1 ) − q2 (x1 ) − · · · − qn (x1 ) When the number of collusion participants is t < n − 1, the linear equations containing n equations cannot be obtained, so the privacy value of non-collusion participants cannot be obtained by collusion. In summary, if the number of participants in the collusion is t < n −1, algorithm 3 can effectively prevent the collusion between participants.
4 Conclusion Based on Shamir secret sharing technology, a data mining algorithm for privacy preservation vertical distributed association rules is presented. The correctness, complexity and security of the algorithm are analyzed. It is pointed out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion among participants when the number of collusion participants is t < n − 1. This algorithm is more suitable for privacy-preserving data mining in relatively small distributed databases [10] (especially when the number of participants in data mining is large).
References 1. Lei, Hongyan, and Hanbin Zou. 2010. Privacy-preserving classification algorithm based on Shamir secret sharing. Computer Engineering and Design 31 (6): 1271–1273. 2. F. Emekci*, O.D. Sahin, D. Agrawal, and A. El Abbadi. 2007. Privacy preserving decision tree learning over multiple parties. Data & Knowledge Engineering 63: 348–361. 3. Schneier, B. 2000. Applied cryptography. Machinery Industry Press. 4. Shamir, A. 1979. How to share a secret. Communications of the ACM 22: 612–613. 5. SIGKDD, KDD CUP 1999 Datasets. http://www.sigkddorg/kddcup/index.php?section=1999& method=data,1999. 6. Levin, I. 2000. KDD_99 classifier learning contest LLSoft’s results overview. ACM SIGKDD Explorations Newsletter 1: 67–75. 7. Hung-Min, Sun, and Shieh Shiuh-Pyng. 1999. Recursive constructions for perfect secret sharing schemes. Computers & Mathematics with Applications 37 (3): 87–96.
128
J. Liu et al.
8. Z. Yang, and R. Wright. 2005. Improved privacy-preserving bayesian network parameter learning on vertical partitioned data. Proceedings of the ICDE Inernational Workshop on Privacy Data Management: 43–52. 9. Justin, Zhan. 2006. Privacy-preserving collaborative data mining (PhD), University of Ottawa, Canada. 10. Zhang, P., Y. Tong, S. Tang, and D. Yang. 2005. Privacy-preserving Naive Bayes classifier. Lecture Notes in Computer Science 3584: 744–752.
Application Status and Development Prospect of Artificial Intelligence in Clinical Medicine Mengqiao Wang
Abstract In the past few years, artificial intelligence has developed dramatically, bringing technological innovation to quite a few fields. At the same time, as people’s demands for medical standards continue to rise, artificial intelligence has also shown great potential for development in the field of clinical medicine. As a good tool, artificial intelligence can alleviate the shortage of doctor resources and improve the efficiency of doctors. Therefore, combining artificial intelligence with clinical medicine has become a hot spot in modern technology. On this basis, this paper briefly introduces the concept of artificial intelligence, elaborates the application status of artificial intelligence in clinical medicine, including medical image recognition, drug development and medical robot, and discusses the development prospect of artificial intelligence in this field. Keywords Artificial intelligence · Clinical medicine · Application status · Prospects · The medical diagnosis
1 Introduction Artificial intelligence as a science and technology that leads the future, its ideas, theories, methods and techniques have penetrated into all areas of technology and science and all aspects of human society. At the same time, various disciplines emerged intensively and rapidly with “smart” disciplines, technologies, systems, engineering and products. “Artificial Intelligence”, a discipline with unlimited potential, is leading the development of modern science and technology and the progress of human civilization with its infinite charm. At the same time, medicine is a complex subject. At present, artificial intelligence has penetrated into many aspects of medical health, such as virtual assistants, drug procurement, nutritional collocation, health management, mental illness monitoring, wearable devices, risk management, pathology and clinical diagnosis and treatment activities. In the medical field, its application prospects are unlimited, and there is also a long way to go. M. Wang (B) Beijing University of Posts and Telecommunications, Beijing 100000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_18
129
130
M. Wang
2 Artificial Intelligence Introduction Artificial intelligence can be abbreviated as AI. It mainly studies how to use artificial methods and techniques to imitate, extend and extend human intelligence using various automated machines or intelligent machines (mainly computers) to achieve certain machine thinking or mental labor automation. Artificial intelligence does not specifically refer to a technology. It is actually a broad field composed of multiple disciplines, including robotics and machine learning. Artificial intelligence can simulate the information process of human consciousness and thinking. According to its intelligence level, it can be simply divided into: weak artificial intelligence, strong artificial intelligence and super artificial intelligence [1]. The ultimate goal of artificial intelligence is to let machines replace humans to accomplish tasks that require cognitive skills. In order to achieve this goal, the machine must automatically learn the mastery, not just the commands written by the programmer. The core issues of AI include the ability to structure, knowledge, plan, learn, communicate, perceive, move, and manipulate objects that resemble or even transcend people. Strong artificial intelligence is still the long-term goal of the field. At present, strong artificial intelligence has already achieved initial results, and even beyond the human level in video identification, language analysis, and board games. There are already a large number of tools that have applied artificial intelligence, including robot vision, image recognition, and expert systems. In the future, as the theory and technology mature, the field of application of artificial intelligence will continue to expand [2].
3 The Application Status of Artificial Intelligence in Clinical Medicine 3.1 Artificial Intelligence and Medical Imaging In traditional medicine, artificial reading requires the development of a good doctor, which takes a long time and costs a lot. In addition, the subjectivity of the manual reading is too large, the use of information is insufficient, and misjudgment is easy to occur in the judgment process. The artificial intelligence reading can save the cost of reading and improve the efficiency of reading. At the same time, 90% of medical data comes from medical imaging, which makes it possible for artificial intelligence to enter the field of medical imaging [3]. The four typical problems of medical image processing are: classification, detection, segmentation, and retrieval, all of which are time-consuming and labor-intensive in clinical medical applications. Currently successfully applied areas include: lung cancer, screening, breast cancer screening, colorectal cancer screening, cervical cancer screening, retinopathy and diabetic retinopathy. The image data analysed by artificial intelligence can provide a powerful reference for doctors, and even for some intelligent high analysis data,
Application Status and Development Prospect …
131
Fig. 1 The CT image of pulmonary nodules in the thoracic cavity [4]
the diagnosis conclusion can be made independently. Due to the two-dimensional properties of medical images, the application of AI in medical imaging has been successful, with ROC values above 0.9 [4]. Taking lung cancer as an example, the most important application of artificial intelligence in this field is identifying and detecting the presence of pulmonary nodules in chest DR or CT images, thereby achieving early screening and the diagnosis of lung cancer (Fig. 1).
3.2 Artificial Intelligence and Drug Development It is well known that the cycle of drug development is long and costly. However, artificial intelligence technology provides a safety expert for testing drugs at lower cost. In recent years, artificial intelligence technology has gradually begun to be applied to drug development research. Using big data analysis and processing technology can screen out suitable compounds or organisms quickly and accurately, which can reduce R&D costs, shorten development cycles, and increase R&D success rates. In addition, the drug activity, safety, and drug side effects can also be predicted by computer simulations. For example, Atomwise, a representative startup in the field of drug discovery and artificial intelligence, uses supercomputers to analyse existing drug databases, and uses artificial intelligence technology to evaluate new drug development risks and simulate the complete process of drug development, greatly reducing its drug development. Cost, and reduce the evaluation time of its new drug. The company made the first breakthrough in search for Ebola treatment solutions in 2015 [5]. In the past few years, the advantages of artificial intelligence technology in drug development have become more and more obvious, and major breakthroughs have been made in many fields, such as cardiovascular drugs, anti-tumor drugs, common infectious disease treatment drugs, orphan drugs and so on [7] (Table 1).
132 Table 1 Top-100 AI experts in drug discovery distribution by organization type [6]
M. Wang Group
The proportion/%
Academia
43
AI companies
30
Pharma corporations
15
Tech corporations
7
Other
5
3.3 Artificial Intelligence and Medical Robots As China becomes aging, the demand for medical care, nursing and rehabilitation continues to increase. Meanwhile, due to the pursuit of medical care quality, the personnel engaged in medical care must reach higher standards for terms of quality and quantity. On the other hand, there is the relative lack of medical staff, and medical robots have enormous potential for development. The main responsibility of medical robots is to liberate medical staff from a large number of cumbersome and streamlined tasks, thereby greatly improving the diagnostic rate. At present, according to the different uses of medical robots, it is divided into four categories: surgical robots, rehabilitation robots, auxiliary robots, and service robots [8]. Among them, surgical robots account for the highest proportion in hospitals. The surgical robot is an intelligent surgical platform that has been widely used in many clinical disciplines. Da Vinci is the best surgical robot in the world without exception [9]. Da Vinci robots have been promoted in major hospitals, and other types of robots have gradually entered the medical market with the development of artificial intelligence (Fig. 2).
Fig. 2 Market size of different branches of medical robots (100 million dollars) [8]
Application Status and Development Prospect …
133
4 The Development Prospect of Artificial Intelligence in the Field of Clinical Medicine The doctor is a very special occupational group. They have long-term professional medical training, continue to learn the latest academic reports, experienced patient death feedback, and finally formed their own unique diagnostic system. However, doctors have been unable to transcend human “subjective” limitations. Different doctors see different numbers of cases, have different comprehension skills, and have different levels of surgery. Therefore, their diagnosis and treatment effects are also different. From this perspective alone, artificial intelligence has obvious advantages, such as the ability to process large amounts of data quickly, with better reasoning capabilities, and avoiding subjective prejudgments. Therefore, the use of artificial intelligence to assist doctors is a benefit that outweighs disadvantages [10]. But this does not mean that the profession of doctors will disappear, because the cases of artificial intelligence learning still need doctors to explore [11]. The development of the times has made artificial intelligence more and more advanced, and artificial intelligence has become more and more widely used in medical scenes. Artificial intelligence is expected to carry out more tedious and repetitive work to improve the efficiency of doctors, and hope to reduce the shortage of doctors and improve the accuracy of diagnosis and treatment [12]. Promote the optimal allocation of quality medical resources and promote the efficient operation of three-level triage and medical associations; provide large-scale quantitative analysis, promote medical diagnosis into a new level of quantitative analysis, and promote new diagnostic methods and treatment options.
5 Conclusion Artificial intelligence is the trend of the times, and the application of artificial intelligence in clinical medicine is the future development direction of medical care. With the continuous advancement of society, the increasing awareness of health, and the acceleration of the current population aging, our desire to improve medical technology, enhance health and prolong life is even stronger [13]. With the continuous improvement of technologies such as computer vision, drug detection, and robotics, it is a reasonable and feasible means to promote the transformation of the medical and health industry through artificial intelligence technology. The future artificial intelligence technology will certainly bring more to the medical and health fields. Opportunity. I believe artificial intelligence will bring about earth-shaking changes in Chinese clinical medicine, and truly bring more benefits to people in the near future.
134
M. Wang
References 1. Bazzocchi, M.,F. Mazzarella, C. Del Frate, F. Girometti, and C. Zuiani. 2017. CAD systems for mammography: A real opportunity. La radiologia medica. 2. Mardani, M., E. Gong, and J.Y. Cheng. 2019. Deep generative adversarial neural networks for compressive sensing (GANCS). IEEE Transactions on Medical Imaging. 3. Schlemper, J., J. Caballero, and J.V. Hajnal. June 2017. “A deep cascade of convolutional neural networks for MR image reconstruction in International Conference on Information Processing. In Medical imaging, 25–30. Cham: Springer. 4. Yang, Y., J. Sun, H. Li, et al. 2016. Deep ADMM-net for compressive sensing MRI in the 30th Conference on Neural Information Processing Systems, 5–10. Barcelona, Spain and Cambridge: MIT Press. 5. Ye, J.C., Y. Han, and E. Cha. 2018. Deep convolutional framelets: A general deep learning framework for inverse problems, December 2016. SIAM Journal on Imaging Sciences 11 (2): 991–1048. 6. Rumelhart, D.E., G.E. Hinton, and R.J. Williams. 2012. Learning representations by backpropagating errors. 7. Eyheramendy, S.,D.D. Lewis, and D. Madigan. 2015. On the Naive Bayes model for text categorization. 8. Nilsson, N.J. 2018. Artificial intelligence: A new synthesis. 9. Miller, Adam. 2013. The future of health care could be elementary with Watson. Canadian Medical Association Journal. 10. Sokol, R.J., J.F. Roux, S. McCarthy. 2015. Computer diagnosis of labor progression: Fetal stress and labor in the occipitoposterior position. American Journal of Obstetrics and Gynecology. 11. Pearlman, M.H., W.E. Hammond, and H.K. Thompson. 2016. A “well-baby” Questionnaire. Pediatrics. 12. Henry, M.J., D.D.F. McColl, J.W. Crawford, et al. 2019. Computing techniques for in-trapartum physiological data reduction. 13. Small, S.L., and E.K. Muechler. 2018. Heuristic determination of relevant diagnostic procedures in a medical expert system for gynecology. American Journal of Obstetrics and Gynecology.
Core Index System of Provincial Power Grid Company’s Economic Activity Analysis Rongmao Wang, Lei Jiang, Jia Yu and Xiao Pan
Abstract As a common method to analyze the production and management activities of enterprises, economic activity analysis can effectively help enterprises improve administration,boost production, and provide scientific basis for decision-making. As a large state-owned enterprise, the grid company has a large number of indicators related to the enterprise’s production and operation, and there are certain internal links between some indicators. Based on this background, this paper takes a provincial power grid company as an example, deeply studies the construction of the core indicator system of the enterprise’s economic activity analysis, and filters the core indicators of the enterprise’s economic activity analysis through gray relational analysis method and factor analysis method, referring to expert opinions. This paper integrate the core indicator systems under the two screening methods to form the final core index system of the enterprise. Keywords State estimation · Economic activity analysis · Gray relational analysis · Factor analysis · Core indicator system
1 Introduction As an important means for enterprises to strengthen economic management and improve economic efficiency, economic activity analysis is a working method to research the effects of operations comprehensively and systematically [1, 2]. Economic activity analysis has significant meaning for enterprises: (1) It is beneficial for enterprise managers to grasp the situation, sum up work and obtain decision-making basis; (2) It is beneficial for enterprises to check the implementation of national policies and plans in all aspects of production and operation, discover and correct the problem in time; (3) It is beneficial for enterprises to improve the management level and economic benefits; (4) It is of great significance for the implementation of performance and responsibility assessment. R. Wang (B) · L. Jiang · J. Yu · X. Pan State Grid Liaoning Electric Power Company, Shenyang, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_19
135
136
R. Wang et al.
Under the current background of the enterprise’s neweconomic development and the reform of state-owned enterprises, the limitations of power grid company’s economic activities analysis of have gradually become prominent: (1) The scale of indicators is large and have become more complex with the developing of the developing. There are more and more indicators in the analysis framework, which adds more work to the writing and analysis of the enterprise’s economic activity analysis report. (2) There is a certain degree of redundancy in the analysis of indicators, and there are two in the analysis of economic activities. The indicators (such as the electricity consumption of the secondary industry and the industrial electricity consumption) have strong correlation, and the main factors affecting the two indicators are basically the same. At this time, the analysis of the two indicators will result in repeat of analysis [3–5]. Concerned the problems existing in the analysis of the enterprise’s economic activities, the main method at present is justly establish a core indicator system. The methods for selecting core indicators mainly include statistical methods such as principal component analysis, factor analysis, and gray relational analysis [6–8], as well as genetic algorithm, neural network and other machine learning methods [9, 10]. Taking into account the economic significance of each indicator and when the indicators are selected, it is necessary to use the expert experience and other factors. This paper mainly adopts the statistical method to construct the core index system. This paper based on the analysis and collation of relevant data in the quarterly economic activity analysis report of the company from 2014 to the present, mainly takes the perspective of the core indicators. This paper takes a provincial power grid enterprise as an example, considering the requirements for the interpretability of the analysis results and the absence of some data. Gray relational analysis and factor analysis are used to screen the core indicators of the enterprise’s economic activities. Combined with expert knowledge, the core indicators are selected under the above two methods are integrated to form the final core indicator system.
2 Gray Relational Analysis 2.1 Theoretical Basis The gray relational analysis theory, usually used in a “small sample” and “poor information” uncertainty systems, whose characteristic is partial information known and partial information unknown, is used to extract valuable information from known information and form a exact description of system operation law. In gray relational analysis system, gray relational degree is used to describe the strength, size and ordering of the relationship between factors. The basic idea is to judge whether the connection is tight according to the degree which describe the similarity between the sequence curve geometries the closer the curve, the greater the correlation between the corresponding sequences, and on the contrary, it’s also set up.
Core Index System of Provincial …
137
For the enterprise’s operating data, there are problems such as insufficient sample size and statistical caliber. The advantage of the gray correlation analysis method is that it is equally applicable to different sample regardless of size and law. Therefore, the gray relational analysis method can be used to screen the economic activity analysis indicators.
2.2 Calculation Process Step 1: determine the reference and the comparing sequence.The system feature sequence W0 = (w0 (1), w0 (2), . . . , w0 (n)) is selected as the reference sequence, and it is known that there are m factor sequences related to W0 . Assume Wi (i = 1, 2, . . . , m) is a system factor, the observed data is wi (k)(k = 1, 2, . . . , n), and Wi = (wi (1), wi (2), . . . , wi (n)) is called the behavior sequence of the factor X i . The matrix Wm∗n can be used to represent the comparison sequence as follows: ⎡
W = (w)m∗n
w11 ⎢ w21 ⎢ = ⎢. ⎣ ..
w12 w22 .. .
... ... .. .
w1n w2n .. .
⎤ ⎥ ⎥ ⎥ ⎦
(1)
wm1 wm2 . . . wmn
Step 2: make the data sequence dimensionless. Considering that the economic activity analysis indicators have positive and negative indicators, the interval value operator is used to make the original data dimensionless. The positive and negative indicators are treated as follows: vi (k) =
wi (k) − min k wi (k) maxk wi (k) − min k wi (k)
(2)
vi (k) =
maxk wi (k) − wi (k) maxk wi (k) − min k wi (k)
(3)
Step 3: find the gray relational coefficient.The gray relational coefficient characterizes the closeness of the the comparison and the reference sequence at a certain index, and its range is (0, 1). The gray relational coefficient of the the comparison and the reference sequence is calculated as follows: u 0i (k) =
min i min k |v0 (k) − vi (k)| + δmaxi maxk |v0 (k) − vi (k)| |v0 (k) − vi (k)| + δmaxi maxk |v0 (k) − vi (k)|
(4)
Among them, δ ∈ [0, 1] is called the distinguishing coefficient. The smaller the δ, the greater the difference between the relational coefficients and the greater the resolving power. Generally take δ = 0.5.
138
R. Wang et al.
Step 4: seek gray relevancy degree. The average of the relevancy coefficients at each indicator of comparing sequences Wi and reference sequences W0 is the relevancy degree between the two sequences: u 0i =
n 1 u 0i (k) n k=1
(5)
In the formula: u 0i ∈ (0, 1], the larger γ is, the greater the effect Wi on W0 is. If u 0i > u 0 j (j = 1, 2, . . . , m), then the factor Wi is better than the factor Wj . Step 5: find the gray relational order. The gray relevancy degree u 0i (i = 1, 2, . . . , m) are arranged in order of largest to smallest, which means the gray relational order is obtained. The gray relational order can reflect the close relationship between each the comparison and the reference sequence directly.
3 Factor Analysis 3.1 Theoretical Basis Factor numerator is a multivariate statistical analysis method that uses the idea of dimensionality reduction to attribute some variables with intricate relationships into a few comprehensive factors. The main idea is to group the original variables according to the size of the correlation, which means that the correlation between the variables in the same group is higher, and the correlation between the variables in the different groups is lower. Each set of variables represents a basic structure and is represented by an unobservable synthetic variable called the common factor. Factor analysis can be divided into 3 steps: determining factor load, factor rotation, and calculating factor score. The element value in the factor rotation matrix represents the relationship between the original index and the principal component index. The larger the value,the greater the relationship between the original index and the principal component index, and the stronger the relationship with the analysis object. Thus it can be an important indicator of the analysis object; on the contrary, if the lower the element value, the smaller the relationship between it and the principal component index and the weaker the relationship with the analysis object. Thus it can be an unimportant indicator. The essence of factor analysis is to use the linear combination of the few common factors for the observed indicator values. The basic model of factor analysis is Wi = ai1 F1 + ai2 F2 + · · · + aik Fk + εi , where Wi is the i-th index (i=1,…m); F j is the j-th common factor (j= 1,…,k); ai j is the load of the i-th index on the j-th common factor, called the factor load; εi is a special factor that only affects the index Wi ; k is the number of common factors, and m is the index number.
Core Index System of Provincial …
139
3.2 Calculation Process First, calculate the correlation coefficient of the normalized index value and the eigenvalue of the matrix R, the j-th common factor is the total variance of the original index value,which means the variance contribution rate of the common factor to the original index value. The eigenvalues are sorted from large to small, and the cumulative variance contribution rate criterion is determined according to the result. The common factor corresponding to the first k eigenvalues is selected and the factor analysis model is constructed. Factor analysis is used to screen the evaluation index. Factor load reflects the correlation between the index and the public factor. The greater the load, the greater the impact of the index and the greater the retention of the index corresponding to the maximum factor load. Factor analysis process ensures that a small number of representative indicators are used to maximize the original information of the index.
4 Determination of Initial Indicators After combining and summarizing the general economic activity analysis content framework and considering the enterprise’s actual, this paper studies the correlation between indicators and the differences in index classification and statistical caliber in different years. Based on the principle of construction such as comprehensiveness, focus, availability, simplicity and versatility, etc., this paper selects 105 initial indicators from the economic activity analysis report of a provincial power grid company and divide it into 8 modules. The initial indicators of economic activity analysis of a provincial power grid enterprise are shown in Table 1.
5 Core Indicator Selection 5.1 Gray Relational Analysis Index Selection Considering that there may be data correlation between indicators under different modules, and there is no logical correlation or weak correlation, this paper chooses to calculate the gray relational coefficient matrix for different modules and filters the indicators in the module. The gray relational coefficient matrix of each indicator under the macroeconomic environment module is shown in Table 2. According to the results of the gray relational coefficient matrix, this paper eliminates the four indicators ME4, ME6, ME8, and ME9. In the same way, the gray relational coefficient matrix of the indicators under other modules is calculated. The indicators according to the gray relational coefficient matrix is filtered, and finally
140
R. Wang et al.
Table 1 Initial indicators of economic activity analysis of a provincial power grid company Module
Indicator
Macroeconomic environment ME
GDP ME1, industral added value ME2, CPI ME3, import and export amount ME4, import amount ME5, export amount ME6, fixed assets investment ME7, real estate development investment ME8, local public finance expenditure ME9
Electricity demand ED
Total electricity consumption ED1, peak load ED2, the electricity consumption of the first production ED3, the electricity consumption of the second production ED4, the electricity consumption of the industry ED5, the electricity consumption of the three production ED6, the electricity consumption of urban and rural residents ED7
Power supply PS
Power generation installed capacity PS1, hydropower installed capacity PS2, thermal power installed capacity PS3, wind power installed capacity PS4, solar installed capacity PS5, nuclear power installed capacity PS6, power generation PS7, hydroelectric power generation PS8, thermal power generation PS9, wind power generation PS10, solar energy power generation PS11, nuclear power generation PS12, power generation equipment utilization hour PS13, hydropower equipment utilization hour PS14, thermal power equipment utilization hour PS15, wind power equipment utilization hour PS16, solar energy equipment utilization hour PS17, nuclear power equipment utilization hour PS18, self-supplied power plant installed capacity PS19, self-supplied power generation capacity PS20, self-supplied power generation generation hours PS21
Production and marketing PM
Electricity sales PM1, large industrial sales PM2, residential sales PM3, line loss rate PM4, 500 kV line loss rate PM5, 220 kV line loss rate PM6, 66 kV line loss rate PM7, 10 kV and below line loss rate PM8, purchasing electricity PM9, Provincial electricity purchase PM10, purchasing contact line power PM11, contact line sales power PM12, net purchasing power PM13, company market share PM14, new equipment / capacity expansion capacity PM15, volume reduction recovery industry Expansion capacity PM16, suspension recovery industry expansion capacity PM17, sales volume expansion capacity PM18, capacity reduction capacity expansion PM19, suspension of industry expansion capacity PM20, industry expansion capacity net value PM21, purchasing unit price PM22, electricity sales unit price PM23, basic electricity fee income PM24, power rate electricity fee income PM25, electricity and electricity fee income PM26, transmission and distribution price PM27 (continued)
Core Index System of Provincial …
141
Table 1 (continued) Module
Indicator
Business benefits BB
Total profit BB1, power enterprise profit BB2, subsidiary company profit BB3, asset-liability ratio BB4, operating income BB5, electricity sales revenue BB6, operating cost BB7, electricity sales cost BB8, electricity purchasing cost BB9, transmission and distribution cost BB10, wage BB11, depreciation BB12, total company assets BB13, total company liabilities BB14, owner’s equity BB15
Power grid development PGD
Fixed assets investment PGD1, grid infrastructure investment PGD2, technology transformation investment PGD3, marketing investment (capital) investment PGD4, information construction (capital) investment PGD5, sporadic purchasing investment PGD6, small infrastructure investment PGD7, non-productive technological transformation investment PGD8, newly started 66 kV and above line length PGD9, newly started substation capacity PGD10, commissioned 66 kV and above line length PGD11, commissioned substation capacity PGD12, centralized purchasing total amount PGD13, material category centralized purchasing amount PGD14, non Material category centralized purchasing amount PGD15
Power grid operation PGO
Grid/equipment events PGO1, urban users’ power supply reliability rate PGO2, rural power users’ power supply reliability rate PGO3, urban power supply voltage pass rate PGO4, rural power grid comprehensive voltage pass rate PGO5
Personnel performance PP
Number of employees in wholly-owned/holding units PP1, number of graduates or above PP2, number of undergraduates in university PP3, number of college graduates PP4, number of secondary vocational education and below PP5, labor productivity PP6
58 indicators to form the core indexsystem are selected. The core indicator system based on gray relational analysis is shown in Table 3.
5.2 Factor Analysis Indicator Selection When factor analysis is used to screen the economic and social development indicators related to electricity, the factor extraction method is the main component method. The eigenvalue must be greater than 1. The factor rotation method is the maximum quadratic method. Using SPSS to calculate the correlation matrix between the indicators, through observation, we can see that the matrix coefficient is large. Combined with the SPSS output results, we can see that there is a certain correlation between each index, so factor analysis can be performed.
ME9
ME8
ME7
ME6
ME5
ME4
ME3
ME2
ME1
1.000
ME1
1.000
0.594
ME2
1.000
0.617
0.648
ME3
1.000
0.641
0.639
0.563
ME4
1.000
0.591
0.693
0.596
0.484
ME5
1.000
0.591
0.591
0.653
0.623
0.559
ME6
Table 2 Gray relational coefficient matrix of each indicator under the macroeconomic environment module
1.000
0.637
0.716
0.643
0.669
0.619
0.571
ME7
1.000
0.662
0.576
0.702
0.619
0.674
0.632
0.583
ME8
1.000
0.649
0.672
0.595
0.582
0.668
0.584
0.709
0.666
ME9
142 R. Wang et al.
Core Index System of Provincial …
143
Table 3 Core indicator system based on gray relational analysis Number
Module
Indicator
1
ME
ME1, ME2, ME3, ME5, ME7
2
ED
ED1, ED2, ED4, ED6
3
PS
PS1, PS2, PS3, PS6, PS7, PS8, PS9, PS12, PS13, PS15, PS16, PS18
4
PM
PM1, PM2, PM3, PM4, PM5, PM9, PM11, PM12, PM13, PM14, PM15, PM19, PM21, PM22, PM23, PM27
5
BB
BB1, BB3, BB6, BB7, BB11, BB13, BB14
6
PGD
PGD1, PGD2, PGD4, PGD7, PGD9, PGD12, PGD13
7
PGO
PGO1, PGO2, PGO5
8
PP
PP1, PP2, PP5, PP6
Table 4 Interpretation variance and total variance for each factor (reverse order) Number
Variance %
Cumulative variance %
Number
Variance %
Cumulative variance %
1
33.191
33.191
2
13.885
47.076
9
2.782
86.817
10
2.527
89.345
3
8.843
4
8.193
55.919
11
2.108
91.453
64.113
12
1.866
5
93.32
7.861
71.974
13
1.62
94.94
6
4.865
76.839
14
1.32
96.26
7
4.121
80.96
15
1.252
97.512
8
3.076
84.035
16
1.01
98.521
According to the calculation results of the SPSS software, the variance and total variance of each factor (reverse order) are shown in Table 4. According to the above calculation results, we extract 16 principal components, and take each principal component in the component matrix corresponding to each original indicators index element as an important criterion for screening economic activity analysis indicators when value is greater than 0.7. The factor analysis method was used to screen the analysis of the enterprise’s economic activities, and a total of 46 important indicators were selected. The results are shown in Table 5.
5.3 Core Indicator System Construction The core indicator system of economic activity analysis is combined based on these two methods above. In view of the fact that both methods have their own advantages and disadvantages, the intersection of the two is taken in the merger and summary (a total of 33 indicators). On this basis, according to the expert knowledge, the
144
R. Wang et al.
Table 5 Factor analysis index screening result Number
Module
Indicator
1
ME
ME1, ME3, ME5
2
ED
ED1, ED2, ED6, ED7
3
PS
PS1, PS3, PS4, PS5, PS6, PS7, PS11, PS12, PS13, PS15
4
PM
PM1, PM3, PM7, PM8, PM9, PM11, PM13, PM14, PM16, PM20, PM23, PM27
5
BB
BB4, BB5, BB6, BB7, BB13, BB14, BB15
6
PGD
PGD1, PGD3, PGD13
7
PGO
PGO2, PGO3, PGO5
8
PP
PP1, PP2, PP3, PP6
Table 6 Core Indicator System for Analysis of Corporate Economic Activities Number
Module
Indicator
1
ME
ME1, ME2, ME3, ME5
2
ED
ED1, ED2, ED4, ED6
3
PS
PS1, PS3, PS6, PS7, PS9, PS12, PS13, PS15, PS16
4
PM
PM1, PM3, PM4, PM7, PM9, PM11, PM13, PM14,PM15, PM21, PM23, PM27
5
BB
BB1, BB3, BB5, BB7, BB11, BB13, BB14
6
PGD
PGD1, PGD2, PGD9, PGD12, PGD13
7
PGO
PGO1, PGO2, PGO5
8
PP
PP1, PP2, PP3, PP6
other indicators selected to be less relevant to the selected indicators and with strong explanatory power of economic activities (15 indicators in total) are the final core index system for analyzing economic activities of the enterprise, with a total of 48 indicators. The core indicator system of the enterprise’s economic activity analysis is shown in Table 6.
6 Core Indicator Selection To illustrate, by taking a provincial power grid enterprise as an example, this paper studies the process of reducing the indicators in the economic activity analysis of provincial power grid enterprise. Based on the analysis of the economic activity analysis report of a provincial power grid company from 2014 to the present, the preliminary index system is determined and divided into 8 modules based on the enterprise’s production and operation activities. On this basis, the gray relational analysis and factor analysis are used to screen the indicators. Through the integration
Core Index System of Provincial …
145
of the two screening results, the final core indicator system is formed, the indicators are effectively achieved and the dimension is reduced. The main conclusions of the article are as follows: (1) There are too many indicators for analyzing the economic activities of provincial power grid companies, and there are correlations and overlaps between the indicators. The treatment of the indicator system makes it simple and representative to facilitate the evaluation; (2) The core index system constructed effectively solves the problem of index correlation, and the final index selection result is reasonable (the intersection of the indicators selected by factor analysis and gray relational analysis accounts for more than 2/3 of the number of indicators in the core indicator system).
References 1. Zhang, Hongshan. 2008. Investigation and development on economic activity analysis system of county-level power supply enterprises. North China Electric Power University (in Chinese). 2. Persist in improving quality and increasing efficiency, and create a new situation of high-quality development. State grid news, 24 October 2018 (1) (in Chinese). 3. Li, Lijun. 2011. Deepening the analysis of economic activities and improving the management level of enterprises. Management Metaphor (11): 7–8 (in Chinese). 4. Wang, Peng, Yanhong Yan, Minfu Wang, et al. 2003. Misunderstanding analysis of the construction of economic activity analysis system for power supply enterprises. Electric Power Information (4): 92–94 (in Chinese). 5. Liu, Xin, Xiong Li, An Dongsheng, et al. 2018. Construction and research of economic activity analysis system of group-type enterprises based on full business integration. Economic Research Guide (4): 17–21 (in Chinese). 6. Sun, Guanzhong. 2010. Economic activities analysis of power generation enterprises. North China Electric Power University (in Chinese). 7. Zhang, Hengbiao, Jihong Han, Jian Zhang, et al. 2015. Algorithm of indexes reduction and weight distribution algorithm based on gray correlation. Computer Engineering and Design 36 (4): 1027–1031 (in Chinese). 8. Li, Xiaopeng, Cunbin Li, and Lizhen Ji. 2018. Construction of energy internet development index system based on rough set and factor analysis. Science and Technology Management Research (20): 75–83 (in Chinese). 9. Zhang, Le, Zhong Liu, Jianqiang Zhang, et al. 2013. Reduction method of weapon system-ofsystems assessment index system based on autoencoder. Journal of Central South University (Natural Science Edition) 44 (10): 4130–4137 (in Chinese). 10. Zhang, Wei. 2013. Research on attribute reduction method based on genetic algorithm and its application in stock prediction. Hunan University (in Chinese). 11. Jiang, F., Zhao, X., Bai, Q. 2018. Simulation and stability analysis of conflict events between employees and organization based on the social network [J]. Concurrency and Computation: Practice and Experience, e5097.
Application Research of Smart Education in Flipped Classroom of College English Cheng Liu and Xiaofang Wang
Abstract Based on the smart education environment, this paper conducted an application research on the flipped classroom of College English teaching. After introducing the smart education and the flipped classroom, we showed the specific practice of the application research on college English flipped classroom. Then we explained and made analysis on the research problem and the relevant causes. In the last part of our research, we recommended some suggestions. Regardless of the implementation process or the effect, college teachers should first lay a good theoretical foundation, combine it with teaching practice, and find out the teaching mode of flipped classroom for the real situation of Chinese universities to further promote teaching reform. Keywords Smart education · Flipped classroom · College English teaching
1 Introduction of Smart Education In 2009, IBM initiated the Smart Education Program and proposed five major paths: student technology immersion, personalized and diverse learning paths, service economy knowledge and skills, global integration of systems, culture and resources, and the key role of education in the economy of twenty-first century [1]. In the following years, the United States, South Korea, Singapore, China and other countries have invested in the relevant research on smart education. The research and practice of smart education is not only the newest development trend of the fourth education revolution, but also a fundamental driving force for this innovation [2], smart education of technology intermedium has become a new realm and new appeal of the informationized education today [3]. This study combines the research status of domestic smart education. With the methodology of knowledge map and co-word analysis, we have designed an application research on the flipped classroom of college English C. Liu · X. Wang (B) School of Humanities, Jiangxi University of TCM, No. 1688 of Meiling Road, Wanli, Nanchang, Jiangxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_20
147
148
C. Liu and X. Wang
in the smart environment with the aim to provide suggestions for subsequent smart education research. Scholars at home and abroad have different opinions on the connotation of smart learning. Up to now, there is no definite consensus on the definition of smart learning in the world. Different researchers explain wisdom learning from different perspectives. Kaur’s explanation of intelligent learning emphasizes the role and influence of the implantation of technological means on the learning process, which is a relatively broad definition [4]. Dae-joon Hwang [5] of Sungkyunkwan University in Korea holds that smart learning refers to a flexible way of learning in which learners’ abilities can be enhanced by using open educational resources, smart IT and international standards from the perspective of the relationship between resources, technology and learners. This explanation not only from the perspective of technology, but also from the perspective of educational resources and these two perspectives, the purpose of which is to enhance the learning ability based on the change of learners’ behavior and to explain the wisdom of learning. Mumford once said that any understanding of technology cannot be separated from the understanding of human beings, and human beings cannot be totally equal to animals. To view human beings as human beings, technology must take into account the internal state of human beings [6]. In modern society, science and technology follow the path of rationalism and develop rapidly. Along with the logic of rationalism, it can promote the progress of technology to the greatest extent. But outside the technology itself, the subject of using technology is not included in the logic of technology development, which results in the deviation of technology from human beings. Technology is a purposeful creative activity of human beings, and it must reflect a certain value scale in the selection and development of technological projects [7]. The criteria for measuring this value scale are human beings, whether their demands are embodied or not, whether their subjectivity is realized or not, which should be the criteria for measuring technology. Education and technology serve human development, and human is the main body of educational and technological activities. As a new form of education, smart education comes from the integration of technology and education. The most fundamental reason for the integration of technology and education is that they have the common point of integration, which means they both regard human as the purpose of their own activities and promote human development. Education and technology are peoplecentered. People are the bridge connecting the two. People’s growth and development should be the internal requirement of smart education. To develop smart education, we should correctly grasp the relationship between technology and education. Technology is the basis of the development of smart education. Without the support of science and technology, the smart educational environment, interactive educational methods and accompanying learning system will become the castle in the air. But attaching importance to technology does not mean blindly following technology. In the final analysis, technology is only a means to achieve the goal, and human growth and development is the ultimate goal of smart education.
Application Research of Smart Education …
149
The voices that drive educational change are endless, but to this day, limited changes have not met people’s expectations. Technology has changed all aspects of the world, but education has changed little. The famous Jobs’ question is a question, but also points out a direction for our change education, that is, technology to promote educational change. We need to emphasize high-tech information. The integration of technology and education as the new cornerstone of the development of education in the new century [8], the integration of the two is indeed very difficult, and various attempts are under study. The accumulation of historical experience and the achievements of intelligent technology have provided us with the possibility to break through the deep integration of technology and education today, and implement and realize it through the complex ecological system of smart education [9]. Since entering the information age in the 1990s, technology has gradually intervened in the education system, trying to replicate the tremendous influence of other fields into education. Educational informatization has a wide influence both in theory and in practice, and bears great expectations of revolutionary impact on education. Educational informationization has introduced technology into the classroom in many ways, and has carried out various attempts to promote the teaching effect with information technology. It also recognizes that teachers play a key role in the teaching of information technology change, and has carried out continuous training for teachers in the application of information technology. Researchers try to bridge the teaching practice with the application of technology, try to find a good way to solve the problem of education by technology, and try to find a plan to promote the reform and development of education by technology [10].
2 Introduction of Flipped Classroom With the fast improvement of advanced teaching technologies, flipped classroom, as a new teaching model, has set off a new wave in the field of global education. To meet the needs of educational informationization and the teaching reforms, China has begun to carry out the practice of flipped classrooms ten years ago. Flipped classroom, reflecting the people-oriented philosophy, embodies the theory of mastery learning and the theory of proximal development zone. From the researches of the flipped classroom, we can find out that the flipped classrooms are characterized by the student-centered teaching. And the flipped classrooms have abundant teaching resources, fair teaching evaluation and free teaching environment. In order to ensure the effectiveness of flipped classrooms, universities not only need to have a high level of teachers and active students who are good at learning, but also need to ensure that they have sufficient teaching resources with high quality and excellent technical platform and the consensus and support from all sectors of society. Teaching modes of flipped classroom involve putting the delivery of knowledge ahead of class, the internalization of knowledge in the classroom, and the classroom becomes a place for educators and learners to interact with each other, thus achieving better educational effect in the end. Flipped classrooms will integrate the teaching
150
C. Liu and X. Wang
of learners in accordance with their aptitude and self-study. They can change the status quo of emphasizing writing and neglecting oral training in English teaching in China, create more language expression environment, and improve the learners’ language communication abilities.
3 Application of Flipped Classroom in Smart Education of College English We have applied the teaching reform to the English class of 3A5 in our school, and will gradually apply to other majors of our school. In order to make use of smart learning environment to lead students go beyond the limits of textbooks and classroom in English learning, expand English learning from classroom to the outside, and promote students’ effective learning both in the real or virtual situation context. Teachers provide a series of English learning materials for students, a specific arrangement of learning tasks, let students complete the task through cell phones or personal computers, exchange learning experience and share experiences through WeChat groups and QQ groups, realize timely interaction, dynamic tracking and evaluation of the learning process and effect of the students. And the specific research content is as follows: Students are divided into several groups, with 3–5 people in each group. We will select one group leader, who is mainly charge of checking the finishing of learning tasks, group learning preparation and group learning plan. The teachers share the teaching plan and courseware, the related English learning audios, videos and so on. Students can learn at anytime and anywhere when they have time. Students are required to install the software of VOA Standard English on their mobile phones, practicing five pieces of English news everyday extensively. They need to imitate and repeat two of the five news intensively, at least two minutes for each. In addition, they are required to install the software of Haici electrical Dictionary on their cell phones, and to complete the contents of “daily hot words” and “daily situational learning” every day. Teachers will make use of the website of www.pigai.org to assign the tasks of writing and translation every week. This website is the largest English platform for training translation and writing in China. Through this platform, teachers can submit the composition corrections timely for students, score the compositions and give out feedback analysis instantly, which can facilitate students to correct the composition while the iron is hot. The platform can point out students’ errors of spelling, grammar, vocabulary, and collocation in each sentence, and then give suggestions to revise the compositions with mistakes. WeChat groups and QQ groups are set up for further learning and better communication. In this circumstance, teachers arrange the learning tasks, share the learning resources, summarize the learning effect and feedback information in the two communicating groups. Students can communicate in either group, share their learning experience and thoughts, negotiate the problems encountered in their learning process, and answer the questions of the students.
Application Research of Smart Education …
151
4 Inadequacies of Flipped Classroom Application and Relevant Causes Although Chinese colleges and universities are currently experimenting with new teaching models of the flipped classrooms, they still do not abandon the traditional educational philosophy centered on teachers and imparting knowledge. Whether it is online video or offline discussion, the course is based on the teacher’s introduction of knowledge and knowledge, and knowledge is taught in an orderly manner according to the prescribed syllabus. In this class, the teacher’s video and the traditional class are basically consistent with the way the teacher explains the knowledge. The teacher did not completely implement the flipped classroom teaching with the students as the mainstay. Most teachers only focus on testing exercises when they are practicing the practice of flipped classrooms, so that students can do a lot of questions instead of thinking. Students are more slack in the tasks and assignments prescribed by the teacher. Some students only complete the assignment tasks distributed in the classrooms, and the topics for classroom discussion are also provided by teachers. The students do not find the problems and conduct in-depth research. At the same time, the course discussion in which most learners participate is only a demonstration of the homework. Students did not think deeply about the problem, and there was no corresponding essay writing requirement. In addition, we lack a rich teaching platform guarantee. We must change the deep-rooted teacher-oriented and indoctrinating education. Due to the quality of the flipped classroom teaching video and the reasonableness of the curriculum design, it is important to ensure that the classroom can be successfully implemented. Flipped classroom has high requirements for teachers’ professional knowledge level, broad knowledge structure and skilled information technology mastery. The design of the courses and the production of the teaching video content require a lot of time and energy for the teacher, which also poses a great challenge to the teacher [11]. The reason for the narrow content of China’s flipped classroom teaching resources and the over-formalization of flipped classroom practice is that teachers lack sufficient energy, profound knowledge system, curriculum design and curriculum management skills. We should further develop a high-level team of cooperative teachers. The flipped classroom is student-centered, and the flipped classroom pays more attention to the cultivation of students’ selfexploration ability, innovation ability and the ability of knowledge application. In the flipped classroom teaching mode, whether it is extracurricular self-study or in-class deepening, it puts forward higher requirements for students’ subjective initiative. Students must strengthen their initiative in learning and get rid of the impact of traditional exam-oriented education and avoid flipped classroom practice flowing form. Flipped classroom is technically demanding and requires a lot of technical development funding. We hope that the government and schools will increase their support for flipped classroom practices.
152
C. Liu and X. Wang
5 Research Suggestions for the Teaching Mode of Flipped Classroom In order to carry out the classroom practice better, Chinese universities should do the following suggests. First of all, universities should pay attention to the main role of people, which includes teachers and students. And they should pay more attention to the construction of high quality teachers and incentive policies. Secondly, Chinese universities have to break the shackles of basic curriculums due to the problems of educational philosophy and curriculum setting. In this case, they have to break the traditional teaching concept and system, then they should reduce the amount of courses, deepen and expand the teaching resources in order to improve the teaching efficiency. Finally, Chinese universities should strengthen the technical support and the openness of social platform. During the guarantee of the government system, education officials should strengthen the construction of the network platform and open social organizations to support the practice of flipped classroom. Chinese universities will do better after they have implemented the above suggestions. In the end, the practice of flipped classroom is bound to develop better and faster.
6 Conclusion By analyzing the theoretical basis, characteristics and practical conditions of flipped classrooms, we found that what we need to do about flipped classrooms is to constantly strive to find a flipped classroom teaching model that meets the actual situation under the government’s institutional guarantee. Although the concept of the flipped classroom is very good, no matter from the implementation process or the effect, the teachers in colleges and universities can’t worry. When teachers have laid a good theoretical foundation, combine it with teaching practice, they will find a suitable teaching model of the flipped classroom for the real situation of Chinese universities, which can further promote English teaching reform. Acknowledgements This research was supported by the Research Project of Teaching Reform in Jiangxi Province (Grant No: JXJG-17-12-8); Research of Education Science Planning Projects of 13th Five-Year in Jiangxi Province (Grant No: 17YB145).
References 1. Rudd J., P. Sullivan, and M. King. Education for a smarter planet: The future of learning. http:// www.redbooks.ibm.com/redpapers/pdfs/redp4564.pdf. 2. Zhong Xiaoliu, Song Shuqiang, and Hu Min. 2015. The Ecological Construction of Wisdom Education in the Vision of the Fourth Educational Revolution. Distance Education Magazine (4): 34–40.
Application Research of Smart Education …
153
3. Zhu Zhiting. 2016. New development of wisdom education: From flipped classroom to smart classroom and smart learning space. Open Education Research (1): 18–26. 4. Abtar Kaur. 2013. The future of smart learning: Personalized learning, March 10. http://www. elearningasia.net/-program/pdf_pt/[Speaker%205-1]Abtar%20Kaur.pdf. 5. Dae-joon Hwang. 2013. What’s the implication of “Smart” in education and learning?, March 10. http://www.elearningasia.net/-program/pdf_pt/[Panelist%203-2]Dae-joon%20Hwang.pdf. 6. Wu Guosheng. 2009. Lecture on philosophy of technology, 36. Beijing: Press of Renmin University of China. 7. Xu Liang. 2004. Philosophy of technology, 35. Shanghai: Fudan University Press. 8. Ding Gang and Wang Lu. 2006. The development of educational technology in the perspective of education. Journal of Electrotechnical Education (8): 3–5. 9. Hu Qintai et al. 2016. Research on the deconstruction and integration path of systematic education of wisdom education. China Electro-Chemical Education (1): 49–55. 10. Gu Xiaoqing, Wang Chunli, and Wang Fei. 2017. Looking back on the 20th year: The historical mission and role of information technology in education reform and development. ElectroEducational Research (6): 9–19. 11. Cui Can, Liu Yu, and Wang Qiong. 2015. Analysis of the implementation of flipping classrooms in Chinese colleges and universities. China Education Network (5): 28–30.
Multi-objective Enterprise Partner Selection Model with Different Relative Superiority Parameters Based on Particle Swarm Optimization Junfeng Zhao, Xue Deng, Yingxian Lin and Jinjia Lu
Abstract This paper studies a multi-objective virtual enterprise partner selection model with relative superiority parameter in fuzzy environment. The objective of the model is to maximize customers’ minimum satisfaction index, maximize average customer satisfaction index and minimize project completion cost. The completion time and delivery time are fuzzily processed. By means of relative superiority degree and weighting, the multi-objective model is transformed into a single-objective model and solved by particle swarm optimization (PSO). Finally, a specific example is given to solve the problem. The results of example show that there are different influences on the optimal solution and objective function value as to different relative superiority degrees and different weights. Keywords Partner selection · Fuzzy environment · Relative superiority degree · Multi-objective optimization · Particle swarm optimization
1 Introduction It is difficult for a single enterprise to gain an advantage in the market competition, so achieving a common goal by multiple enterprise alliances becomes the choice of many enterprises. For this form of virtual enterprise, partner selection is very important. Many scholars have done some quantitative research on this kind of scheduling problem, constructed relevant models, and applied appropriate intelligent algorithms to solve the models [1–6]. In addition, considering that there are various uncertainties in reality, the fixed start time and delivery time are not in line with reality. Therefore, it is necessary to consider partner selection problem in a fuzzy environment. For example, Huang et al. [7] study a multi-objective enterprise partner selection model with fuzzy start J. Zhao School of Mechanical and Electrical Engineering, Guangdong Polytechnic of Industry and Commerce, Guangzhou 510510, China X. Deng (B) · Y. Lin · J. Lu School of Mathematics, South China University of Technology, Guangzhou 510640, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_21
155
156
J. Zhao et al.
time and fuzzy delivery time, then solve it by genetic algorithm. Besides, in order to solve the proposed partner selection problem in virtual enterprise, scholars have proposed various algorithms to solve the problem and illustrated the effectiveness of the algorithms [8, 9]. Gao et al. [8] studies the comprehensive evaluation method of virtual enterprise partners based on wavelet network; Huang et al. [10] studies the selection of virtual enterprise partners with fuzzy completion time and fuzzy delivery time.
2 Partner Selection Model Suppose that an enterprise needs to complete a large-scale project but is unable to complete all assignments, so it decides to set up a virtual enterprise to complete the project. We suppose that there are n assignments in the project, H is the set of all assignment pairs, and (i, j) ∈ H represents a pair of assignment with a temporal relationship, that is, the assignment i must be carried out before the assignment j. For any assignment i, we need to select one of the m i existing candidate partners to complete it. For assignment i, if the optimistic value of fuzzy completion time is ci1 , the most completion time possible value is ci2 and the pessimistic value is ci3 , then the fuzzy can be expressed as a triangular fuzzy number c˜i = ci1 , ci2 , ci3 , whose membership function can be expressed as:
μc˜i (x) =
⎧ x−ci1 1 2 ⎪ ⎪ ⎨ c2 −c1 , ci ≤ x ≤ ci i
⎪ ⎪ ⎩
i
ci3 −x , ci3 −ci2
ci2 < x ≤ ci3
0,
otherwise
(1)
For any assignment (e, i) ∈ H , the delivery time of assignment e is the start time of assignment i. For assignment i, if the optimistic value of fuzzy start time is si1 , si3 , then the most possible value is si2 and the pessimistic value the fuzzy start time is 1 2 3 can be expressed as a triangular fuzzy number s˜i = si , si , si , whose membership function can be expressed as: ⎧ x−si1 1 2 ⎪ ⎪ ⎨ si2 −si1 , si ≤ x ≤ si 3 μs˜i (x) = s3i −x2 , s 2 < x ≤ s 3 i ⎪ si −si i ⎪ ⎩ 0, otherwise
(2)
The delivery time of the last assignment n is the delivery date of the whole project. The expectation of a project’ delivery date is a trapezoidal fuzzy number, in which the optimistic value is cn1 , the expected interval is [cn2 , cn3 ], and the pessimistic value is cn4 . That is,the membership function of a project’ delivery date expectation c˜n = cn1 , cn2 , cn3 , cn4 is
Multi-objective Enterprise Partner Selection …
⎧ x−cn1 ⎪ , ⎪ cn2 −cn1 ⎪ ⎪ ⎨ 1, μc˜n = ci4 −x ⎪ , ⎪ c4 −c3 ⎪ ⎪ ⎩ i i 0,
157
ci1 ≤ x < ci2 ci2 ≤ x ≤ ci3 ci3 < x ≤ ci4
(3)
otherwise
Some common notations in this paper are as followed: ➀ The set of the project’s assignments is A = {A1 , A2 , · · · , An }; ➁ The candidate partners’ set of assignment Ai is Pi = pi1 , pi2 , . . . , pim i . Besides, pir = 1 if assignment Ai selects candidate partner pir , or pir = 0 otherwise; ➂ For the candidate partner pir of assignment Ai , its fuzzy start time is s˜ir ; ➃ For the candidate partner pir of assignment Ai , its fuzzy completion time is s˜ir ; ➄ For the candidate partner pir of assignment Ai , its manufacturing cost is s˜ir ; ➅ The transportation time and cost between candidate partner pir and candidate partner p jq are tir jq and cir jq respectively, in which (i, j) ∈ H ; ➆ The planned start time of assignment Ai is Si , that is, The start time of Ai is no later than Si . The delivery time of assignment Ai is C˜ ir = c˜ir + tir jq , (i, j) ∈ H. Therefore, customer satisfaction index between assignments is:
area C˜ ir , i = 1, . . . , n − 1, C S Ii = area C˜ ir s˜ jq
(4)
where area C˜ ir s˜ jq is the intersection’s graphic area of curve C˜ ir and curve s˜ jq (shaded area), and ar ea C˜ ir is the graphic area of curve C˜ ir . Similarly, we define: if (i, j) ∈ H , then customer satisfaction index of the project delivery is the ratio of the intersection’s graphic area of assignment An ’s fuzzy delivery time membership function and the membership function of the project’s expected delivery time to the graphic area of assignment An ’s fuzzy delivery time membership function
C S In = area C˜ nr D˜ area C˜ nr
(5)
where area C˜ nr D˜ is the intersection’s graphic area of curve C˜ nr and curve D˜ (shaded area), and area C˜ nr is the graphic area of curve C˜ nr . Next is the model’s construction, which has three objective functions and three constraints. The first objective function is to maximize the minimum customer satisfaction index, which is expressed as max z 1 = min1≤i≤n C S Ii . The second objective function is to maximize the average customer satisfaction index, which is expressed n C S Ii . The third objective function is to minimize the completion as max z 2 = n1 i=1 cost, which is expressed as: minz 3 =
mi n i=1 r =1
So, we have
cir pir +
mj mi n n−1 i=1 j=1 r =1 j=1
cir jq δ pir , p jq
(6)
158
J. Zhao et al.
⎧ ⎪ z ⎪ max z 1 ; max z 2 ; min 3 ⎪ ⎪ ⎪ 1, ∀(i, j) ∈ H, pir = 1, p jq = 1 ⎪ ⎪ s.t. δ pir , p jq = ⎪ ⎪ 0, otherwise ⎨ mi p = 1, pir ∈ {0, 1}, pir ∈ Pi , i = 1, 2, . . . , n ⎪ ⎪ ⎪ r =1 ir ⎪ ⎪ ⎪ ⎪ s˜ir ≤ Si ⎪ ⎪ ⎩ C˜ ≤ s˜ , ∀(i, j) ∈ H, p = 1, p = 1 ir jq ir jq
(7)
3 Multi-objective Optimization The model can be expressed by optimization matrix F. If there are l virtual enterprise partner selection schemes, then the optimization matrix is expressed as: x x · · · xl ⎤ ⎡1 2 z1 z 11 z 12 · · · z 1l z 2 F = ⎣ z 21 z 22 · · · z 2l ⎦ z3 z 31 z 32 · · · z 3l
(8)
where z wy is the objective z w ’s value of scheme z wy , w = 1,2, 3, y = 1, 2, . . . , l. In this paper, the relative superiority degree μwy = μw x y with different parameters is used to determine the optimality membership degree of scheme x y with respect to objective z w . The relative superiority degree of maximal objectives z 1 and z 2 is: λ μwy = z wy z w,max w , z w,max = max z wy 1≤y≤l
(9)
The relative superiority degree of minimum objective z 3 is: λ μwy = z w,min z wy w , z w,min = min z wy 1≤y≤l
(10)
where λw is the relative superiority parameter set by decision makers. And obviously z w,max > 0, z w,min > 0, thus, we can obtain the relative superiority degree matrix of three objectives: x x · · · xl ⎤ ⎡ 1 2 μ1 μ11 μ12 · · · μ1l μ2 μ = ⎣ μ21 μ22 · · · μ2l ⎦ μ3 μ31 μ32 · · · μ3l
(11)
Multi-objective Enterprise Partner Selection …
159
Considering that it is impossible for each objective to achieve the optimum simultaneously, this paper uses weighted summation method to transform the multiobjective model into a single-objective model. And the evaluation function of the model is: max ω1 μ1 + ω2 μ2 + ω3 μ3 where ωw is the weight value of each objective, ωw ≥ 0, we try to solve the single-objective model:
(12) 3 w=1
ωw = 1. In summary,
⎧ max ω1 μ1 + ω2 μ2 + ω3 μ3 ⎪ ⎪ ⎪ m ⎪ ⎨ s.t. i p = 1, p ∈ {0, 1}, p ∈ P , i = 1, 2, . . . , n ir ir ir i r =1 ⎪ ⎪ s˜ ≤ Si ⎪ ⎪ ⎩ ˜ir Cir ≤ s˜ jq , ∀(i, j) ∈ H, pir = 1, p jq = 1
(13)
4 Particle Swarm Optimization Step 1: In this paper, particle swarm optimization (PSO) is used to solve the model. The basic flow of PSO is as follows: Step 2: Initialize the velocity and position of each particle. Step 3: Calculate the fitness of each particle. Step 4: Find the optimal individual position of each particle and the optimal population position. Step 5: Update the velocity and position of each particle. Step 6: Calculate the fitness of each particle. Step 7: Find the optimal individual position of each particle and the optimal population position. Step 8: If the termination condition is satisfied, the algorithm ends and the optimal solution is outputted. Otherwise, return to Step 4.
5 Numerical Example In this paper, the partner selection model of virtual enterprise under fuzzy environment is solved by taking mold manufacturing [8] as an example. A large-scale injection molding project consists of eight assignments: (1) Three-dimensional modeling and mold design of the product (including design of cavity, core and electrode).
160
J. Zhao et al.
(2) Design of mold frame and its manufacturing process, as well as related process on the mold frame. (3) Process design of cavity and core, NC programming and rough machining of inserts. (4) Process design, NC programming and processing of electrodes. (5) Electrical discharge machining (EDM) of inserts. (6) Design, manufacture and mold assembly of other parts and components. (7) Mold test. (8) Mold repair according to the results of the test. The temporal relationships of these eight assignments are shown in Fig. 1. Table 1 shows the fuzzy start time, the fuzzy completion time and the transportation time of the candidate partners. Table 2 shows the manufacturing cost and transportation cost of the candidate partners. In this paper, the parameters of PSO are set as follows: particles number of the population is 100, the maximum iteration time T = 100, the initial inertia weight wstar t = 0.9, the inertia weight wend = 0.4 when iteration time is T , individual cognitive factor c1 = 1.5 and social learning factor c2 = 1.5. Firstly, this paper sets objective function weights ω1 = 0.5, ω2 = 0.3, ω3 = 0.2 and relative superiority degree λw = 1 as an example to solve the model. The customer satisfaction indexes and transportation costs between assignments are detailed in Table 3, and the manufacturing costs of each assignment are detailed in Table 4. Next, the relative superiority degree with different values is compared and analyzed. Table 5 lists the optimal solutions and objective function values obtained from nine different relative superiority degrees. Therefore, the optimal partner selection scheme is the same as the one where relative superiority degree λw = 1, and it is still X = [1, 3, 2, 3, 1, 2, 3, 1]. Finally, the objective function values of the optimal solution with different weights are compared and analyzed. Table 6 shows the objective function values when only changing weights ω2 and ω3 and keeping ω1 unchanged. Fig. 1 The temporal relationships between assignments
2
1
6
7
5
8
3
4
Multi-objective Enterprise Partner Selection …
161
Table 1 The fuzzy start time, fuzzy completion time and transportation time i
Partner
Fuzzy start time (day)
Fuzzy completion time (day)
Transportation time (day)
A1
p11
0
(4, 5, 6)
–
–
–
A2
p21
(4, 5, 6)
(17, 18, 19)
t2161 = 4.0
t2162 = 3.0
t2163 = 5.0
p22
(5, 6, 7)
(17, 18, 19)
t2261 = 5.0
t2262 = 4.0
t2263 = 4.0
p23
(4.5, 5, 6.5)
(18.5, 19, 20.5)
t2361 = 2.0
t2362 = 3.0
t2363 = 3.0
p31
(5, 6, 7)
(12, 13, 14)
t3151 = 1.0
t3152 = 1.5
t3153 = 1.0
p32
(4, 5, 6)
(11, 12, 13)
t3251 = 2.0
t3252 = 2.0
t3253 = 1.0
p33
(4.5, 5.5, 6.5)
(11, 12, 13)
t3351 = 2.0
t3352 = 1.5
t3353 = 2.5
p41
(4.5, 5.5, 6.5)
(11.5, 12.5, 13.5)
t4151 = 1.0
t4152 = 1.5
t4153 = 1.0
p42
(5, 6, 7)
(11, 12, 13)
t4251 = 2.0
t4252 = 1.5
t4253 = 1.5
p43
(4.5, 5, 6.5)
(11.5, 12, 13.5)
t4351 = 2.0
t4352 = 1.5
t4353 = 1.0
p51
(13.5, 14, 15.5)
(20.5, 21, 22.5)
t5161 = 1.0
t5162 = 1.0
t5163 = 1.0
p52
(14, 15, 16)
(20, 21, 22)
t5261 = 1.5
t5262 = 1.0
t5263 = 2.0
p53
(14, 15, 16)
(19, 20, 21)
t5361 = 1.5
t5362 = 1.5
t5363 = 2.0
p61
(22, 23, 24)
(28, 29, 30)
t6171 = 1.0
t6172 = 1.0
t6173 = 0.5
p62
(21.5, 22.5, 23.5)
(26.5, 27.5, 28.5)
t6271 = 2.0
t6272 = 1.5
t6273 = 2.0
p63
(22, 23, 24)
(28, 29, 30)
t6371 = 1.0
t6372 = 1.5
t6373 = 1.0
p71
(29.5, 30.5, 31.5)
(32, 33, 34)
t7181 = 1.0
t7182 = 1.5
t7183 = 0.5
p72
(29.5, 30.5, 31.5)
(31, 32, 33)
t7281 = 1.0
t7282 = 1.0
t7283 = 1.5
p73
(29, 29.5, 31)
(31.5, 32, 33.5)
t7381 = 1.5
t7382 = 1.0
t7383 = 1.0
p81
(33, 34, 35)
(39, 40, 41)
–
–
–
p82
(33.5, 34.5, 35.5)
(40, 41, 42)
–
–
–
p83
(33, 34, 35)
(38.5, 39.5, 40.5)
–
–
–
A3
A4
A5
A6
A7
A8
162
J. Zhao et al.
Table 2 The manufacturing cost and transportation cost Assignment
Candidate partner
Manufacturing cost (unit: 10000 yuan)
Transportation cost (unit: 10000 yuan)
A1
p11
c11 = 14.0
–
–
–
A2
p21
c21 = 9.5
c2161 = 1.3
c2162 = 1.0
c2163 = 1.5
p22
c22 = 7.7
c2261 = 1.7
c2262 = 1.3
c2263 = 1.4
p23
c23 = 8.7
c2361 = 1.2
c2362 = 1.4
c2363 = 1.2
p31
c31 = 7.0
c3151 = 0.2
c3152 = 0.4
c3153 = 0.3
p32
c32 = 7.1
c3251 = 0.3
c3252 = 0.2
c3253 = 0.2
p33
c33 = 6.7
c3351 = 0.5
c3352 = 0.4
c3353 = 0.6
p41
c41 = 3.1
c4151 = 0.9
c4152 = 0.5
c4153 = 0.3
p42
c42 = 4.8
c4251 = 0.3
c4252 = 0.2
c4253 = 0.3
p43
c43 = 3.7
c4353 = 0.7
c4352 = 0.5
c4353 = 0.4
p51
c51 = 4.4
c5161 = 0.2
c5162 = 0.4
c5163 = 0.5
p52
c52 = 4.2
c5261 = 0.5
c5262 = 0.4
c5263 = 0.6
p53
c53 = 3.8
c5361 = 0.7
c5362 = 0.6
c5363 = 0.8
p61
c61 = 18.6
c6171 = 1.2
c6172 = 0.7
c6173 = 0.6
p62
c62 = 19.7
c6271 = 0.9
c6272 = 0.7
c6273 = 0.7
p63
c63 = 21.5
c6371 = 0.9
c6372 = 0.6
c6373 = 0.8
p71
c71 = 0.6
c7181 = 0.9
c7182 = 0.5
c7183 = 0.8
p72
c72 = 0.8
c7281 = 0.8
c7282 = 0.6
c7283 = 0.5
p73
c73 = 0.7
c7381 = 0.5
c7382 = 0.5
c7383 = 0.6
p81
c81 = 4.5
–
–
–
p82
c82 = 5.0
–
–
–
p83
c83 = 5.5
–
–
–
A3
A4
A5
A6
A7
A8
Table 3 The customer satisfaction indexes and transportation costs between assignments Assignment pairs
(1, 2)
(1, 3)
(1, 4)
(2, 6)
(3, 5)
(4, 5)
(5, 6)
(6, 7)
(7, 8)
Satisfaction index
0.75
1.00
0.75
0.80
0.75
1.00
0.80
0.75
0.80
Transportation cost
–
–
–
1.4
0.3
0.7
0.4
0.7
0.5
Table 4 The manufacturing costs of each assignment in example Assignment
A1
A2
A3
A4
A5
A6
A7
A8
Manufacturing cost
14.0
8.7
7.1
3.7
4.4
19.7
0.7
4.5
2 3
Assignment 3
Assignment 4
66.8
0.84
Average customer satisfaction index
Completion cost
1 0.75
Minimum customer satisfaction index
3
Assignment 7
Assignment 8
2
Assignment 6
1
3
Assignment 2
Assignment 5
1
0.0625
Assignment 1
λw 1
1
1
3
70.1
0.85
0.45
1
3
2
1
0.125 1
70.1
0.85
0.45
1
1
3
1
3
2
1
0.25
Table 5 The optimal solutions and objective function values for different λw
66.8
0.84
0.75
1
3
2
1
3
2
3
1
0.5
66.8
0.84
0.75
1
3
2
1
3
2
3
1
1
66.8
0.84
0.75
1
3
2
1
3
2
3
1
2
66.8
0.84
0.75
1
3
2
1
3
2
3
1
4
0.85
0.45
3
2
3
1
3
2
1
1
70.1
8
66.8
0.84
0.75
1
3
2
1
3
2
3
1
16
Multi-objective Enterprise Partner Selection … 163
164
J. Zhao et al.
Table 6 The objective function values with changing weights ω1 , ω2 , ω3 unchanged Number
ω1
ω2
ω3
Minimum customer satisfaction index
Average customer satisfaction index
Completion cost
1
0.40
0.10
0.50
0.75
0.84
66.8
2
0.40
0.15
0.45
0.75
0.84
66.8
3
0.40
0.20
0.40
0.75
0.84
66.8
4
0.40
0.25
0.35
0.45
0.85
70.1
5
0.40
0.30
0.30
0.45
0.85
70.1
6
0.40
0.35
0.25
0.75
0.84
66.8
7
0.40
0.40
0.20
0.75
0.84
66.8
8
0.40
0.45
0.15
0.75
0.84
66.8
9
0.40
0.50
0.10
0.75
0.84
66.8
6 Conclusion This paper constructs a multi-objective virtual enterprise partner selection model with relative superiority parameters in a fuzzy environment. It is a multi-objective model and can be transformed into a single-objective model according to the weight parameters of different objectives. Then Particle Swarm Optimization (PSO) algorithm is applied to solve the problem. Finally, the example demonstrates the effectiveness and feasibility of the model and algorithm. Different weight combinations of different objective functions lead to different results, which also provide more schemes for reference simultaneously. Acknowledgements This research was supported by the “Humanities and Social Sciences Research and Planning Fund of the Ministry of Education of China, No. x2lxY9180090”, “Natural Science Foundation of Guangdong Province, No. 2016A030313545”, “Soft Science of Guangdong Province, No. 2018A070712002” and “Fundamental Research Funds for the Central Universities of China, No. x2lxC2180170”, “Guangdong Polytechnic of Industry and Commerce Key Special Research Project (GDGM2016-CO-02)” and “Guangdong Polytechnic of Industry and Commerce Teaching Reform Project (2016-J-09)”.
References 1. Ip, W.H., M. Huang, K.L. Yung, and D.W. Wang. 2003. Genetic algorithm solution for a riskbased partner selection problem in a virtual enterprise. Computers & Operations Research 30: 213–231. 2. Zhao, Q., X.H. Zhang, and R.B. Xiao. 2008. Particle swarm optimization algorithm for partner selection in virtual enterprise. Progress in Natural Science 18: 1445–1452. 3. Deng, X., and X.Q. Pan. 2018. The research and comparison of multi-objective portfolio based on intuitionistic fuzzy optimization. Computers & Industrial Engineering 124: 411–421.
Multi-objective Enterprise Partner Selection …
165
4. Deng, X., J.F. Zhao, and Z.F. Li. 2018. Sensitivity analysis of the fuzzy mean-entropy portfolio model with transaction costs based on credibility theory. International Journal of Fuzzy Systems 20 (1): 209–218. 5. Deng, X., J. Song, J.F. Zhao, and Z.F. Li. 2018. The fuzzy tri-objective mean-semivarianceentropy portfolio model with layer-by-layer tolerance evaluation method paper. Journal of Intelligent & Fuzzy Systems 35 (2): 2391–2401. 6. Deng, X., and R.J. Li. 2014. Gradually tolerant constraint method for fuzzy portfolio based on possibility theory. Information Scicences 259: 16–24. 7. Huang, B., C.H. Gao, and L. Chen. 2009. Multi-objective optimization for partner selection in a virtual enterprise under fuzzy environment. China Mechanical Engineering 20 (23): 2865–2870 (in Chinese). 8. Gao, Y., and Y.Q. Liu. 2008. Comprehensive evaluation method of virtual enterprise’s partner selection based on wavelet network. Value Engineering 11: 87–90 (in Chinese). 9. Tao, F., L. Zhang, Z.H. Zhang, and A.Y.C. Nee. 2010. A quantum multi-agent evolutionary algorithm for selection of partners in a virtual enterprise. CIRP Annals—Manufacturing Technology 59: 485–488. 10. Huang, B., C.H. Gao, and L. Chen. 2010. Partner selection with fuzzy completion time and fuzzy due date in a virtual enterprise. Systems Engineering-Theory & Practice 30 (6): 1085–1091. (in Chinese).
Vehicle Path Optimization with Time Window Based on Improved Ant Colony Algorithm Bo Li and Tingting Li
Abstract Ant colony optimization (ACO) is a new heuristic algorithm developed by simulating ant foraging on the basis of group cooperative learning. TSP and other combinatorial optimization problems have been successfully solved. Like other heuristic search algorithms, ant colony algorithm has the disadvantage of being easily limited to local optimum. Aiming at the vehicle routing problem based on time window, the upper and lower limits of pheromone trajectory intensity are determined by analyzing the ant colony algorithm, and the transmission probability and pheromone updating method are improved to improve the convergence speed and global search ability of the algorithm. Aiming at the vehicle routing problem with time windows in logistics distribution, an improved maximum and minimum ant colony algorithm is proposed to improve the optimization performance. The algorithm can be extended to such related path optimization problems and applied. Keywords Ant colony algorithm · Vehicle routing problem · Time window
1 Introduction Vehicle Routing Problem (VRP) is a classic combination optimization problem. It organizes appropriate driving routes, so that vehicles can pass them in an orderly manner, and meet certain constraints. Time-window vehicle path problem (VRPTW) is required to reach the customer point according to the customer’s request in the distribution process based on the VRP, that is, without compromising the vehicle capacity limit, time limit and other constraints. Under the premise of the conditions, the vehicle distribution route-plan during transportation is reasonably formulated, and the requirements for the delivery and service time of the goods in different geographical B. Li (B) Information Engineering School, East China Jiaotong University, Nanchang 330013, Jiangxi, China e-mail: [email protected] T. Li Software School, East China Jiaotong University, Nanchang 330013, Jiangxi, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_22
167
168
B. Li and T. Li
locations are met at the lowest possible cost [1]. Because VRPTW has servicetime access restrictions, VRPTW is closer to practical applications than VRP, and is widely used in transportation and logistics. Since VRPTW is an NP-hard problem, it is mainly solved by using heuristic algorithm [2, 3]. Many scholars have conducted related research on this issue [4–11]. Among them, some scholars have proposed to solve VRPTW, explore the optimization ability of ant algorithm from numerical calculation, and obtain satisfactory results [4]. Another researcher combines the state transition rule introduces the time window span and service waiting time factor [5]; some scholars propose a quantum ant colony algorithm, increase the quantum bit heuristic factor, and use the quantum-revolving gate to realize pheromone update. Experiments show that the algorithm solves VRPTW. Vehicle routing is a vehicle transportation optimization problem. Usually, heuristic algorithm is used to solve the approximate solution of the problem is obtained within a certain search time range. Then, according to the rationality of the solution, a suitable distribution scheme is worked out. In the process of modeling, we should not only minimize the cost of transportation [6, 7]. At present, most of the research on VRP is done in theory, and the main research is the VRP problem with fewer sites. But in the real world, the number of sites is often large. The existing methods can not get satisfactory solutions, so they are often not applicable when dealing with these problems. How to effectively solve the large-scale VRP problem and find a satisfactory distribution scheme has become a difficult problem that logistics enterprises need to solve.
2 Dynamic Adaptive Ant Colony Algorithm 2.1 Ant Colony Algorithm In nature, ants are almost invisible and once they encounter new obstacles in the path, the old shortest path is not feasible, they will find new shortest path. In the course of walking, ants will drop pheromones, and each ant likes to follow the direction of pheromones more probabilistically. When obstacles blocked the previous path, they began to find new shortest paths. Some ants who accidentally chose shorter paths near obstacles would reconstitute new pheromone trajectories compared with ants who chose longer paths. In this way, there will be more pheromones on shorter paths per unit time, which will inevitably cause more ants to choose this shorter path [12, 13].
2.2 Ant Colony System Model Based on the TSP problem, the mathematical system of artificial ant system is described. For ease of expression, let m be the number of ant colonies. dij (i, j = 1, 2, . . . , n) represents the distance between cities i and j, and bi(t) represents the
Vehicle Path Optimization with Time Window …
169
number of ants located in the city at time t. Obviously, τij (t) represents the residual time on the ij line at time t. In addition, τij (0) = C. Ants k (k = 1, 2,…, m) determine the next step to be transferred according to the amount of information on each path during the motion. ⎧ [τi j (t)]α [ηi j (t)]β ⎪ ⎨ [τis (t)]α [ηis (t)]β pikj (t) = j ∈ allowekk ⎪ ⎩ 0, other wise
(1)
τi j (t + n) = ρ · τi j (t) + τi j
(2)
τi j =
m
τikj
(3)
k=1
Among them, allowekk = {1, 2,…, n} − tabuk , which means that the ant k is the next city to be selected. As the motion progresses, the intensity of pheromones left on the path will become weaker and weaker, and the disappearance of pheromones will be represented by parameters 1 − p. Ants use N minutes to complete a cycle. The amount of information is calculated as follows. Q , i f the kth ant passes the path i j in this loop (4) τi j = L k 0, else τij = C, τij = 0. α, β respectively represent the different roles played by the pheromone and expected information accumulated by the ant during the movement of the ant. Heuristic algorithm problems can be expected at regular intervals. According to the specific algorithm, the expressions of ij (t) and ij (t) are different [2]. Their expressions (4) are different. Equation (4) shows the mathematical model of the ant cycle and the ant population system. τi j =
Q di j
, i f the kth ant passes the path i jin this loop
0, else
(5)
In ant-quantity system model: τi j =
Q, i f the kth ant passes the path i j in this loop 0, else
(6)
The main difference between the above three algorithm models is that the update mechanism of the information amount on the path in the latter two models utilizes local information. This information update rule will gradually increase the amount of information corresponding to the short path, which can fully reflect the survivability of the shorter path (good solution) in the global scope of the algorithm, and strengthen
170
B. Li and T. Li
the information positive. The feedback performance improves the speed at which the system search converges.
2.3 Optimal Selection of Ant Colony Algorithm Parameters
0.4 Pheromone residual coefficient ρ=0.9
0.3
0.2
0.1
0.0
Convergence performance
Convergence performance
Set the number of ant colonies m = 5, the total amount of information released by the ant cycle is Q = 1, the information heuristic factor a = 0.9, the expected heuristic factor b = 1.0, and the stop condition of the operation is the most in the adjacent two loop searches. The difference between the optimal solutions is less than 0.001, and the change of the pheromone residual coefficient is p belongs to {0.3, 0.5, 0.7, 0.9, 0.95, 0.99}. The influence of pheromone residual coefficient and convergence on the performance of the algorithm is shown in Fig. 1. This pheromone updating method converges slowly, and its global optimization performance is not obvious. In order to accelerate the convergence speed without affecting the global optimization ability and find the optimal solution in a short time, an improved pheromone updating strategy is proposed in this paper. The strategy retains the best global solution, but in order to expand the scope of pheromone updating, “elite ant” takes the first few places in each iteration result. The stop condition of the operation is that the difference between the optimal solutions in the adjacent two loop searches is less than 0.001, and the change in the number of ants is m ∈ { 2,3,4,5,6,7} . Ants’ number and algorithm performance are shown in Fig. 2. According to the application conditions and actual requirements of specific problems, reasonable or compromised choices are made in terms of global search ability. The above experimental results show that the range of m = 3 ~ 6 (relative to the scale of this problem is n = 10). So this paper believes that the ant colony algorithm should be chosen as m = n ~ n/2 (where n is the size of the problem). The TSP problem listed above is the research object. The difference between the optimal solutions in the two adjacent loop searches is less than 0.001, and the 0.4 Pheromone residual coefficient ρ=0.5
0.3
0.2
0.1
0.0 0
20
40
60
80
100
120
Number of cycles
Fig. 1 Pheromone residual coefficient and convergence
0
20
40
60
80
Number of cycles
100
120
Vehicle Path Optimization with Time Window … Fig. 2 Ants’ number and algorithm performance
4500
ρ=0.4 ρ=0.6 ρ=0.8 ρ=0.9
4000 3500
Number of cycles
171
3000 2500 2000 1500 1000 500 0 0
2
4
6
8
10
Num of Ants
combination of different values of the heuristic factors α and β. The simulation results of the heuristic factors α and β are shown in Table 1. When α and β are too large, the positive feedback of the information on the local optimal path will be extremely strong, and the algorithm will have premature convergence (stagnation). If it is too small, it will lead to the ant colony falling into pure, endless in a random search, the search performed is generally difficult to find the optimal solution. Appropriate selection of the range of values of α and β, even if the combination of parameters is different (as in the problem of this paper, β is about 1.5, α is 0.5 to 5), the algorithm has fewer cycles (that is, faster convergence), and the performance is very close. Table 1 Reliability test results of questionnaire
Factor α
Factor β
Optimal path length
Number of cycles
0.1
0.1
381.82
199
0.1
0.5
337.11
98
0.5
1.5
325.98
75
1.0
1.5
324.88
8
3.0
1.5
325.69
6
5.0
1.5
324.76
6
10.0
5.0
324.78
5
324.89
4
10.0
10.0378.
172
B. Li and T. Li
2.4 Ant Colony Improvement Algorithm Based on Dynamic Adaptive Adjustment of Pheromone At the same time, because the ant colony algorithm mainly relies on pheromone to solve the optimization problem, if the pheromone is not properly controlled. In view of these two problems, combined with the actual requirements, this paper makes the following improvements to the ant colony algorithm. Ant colony algorithm is based on the natural ants in the process of finding addresses, each ant can leave a path called pheromone material for information transmission. When other ants pass through this path, they can perceive the amount of pheromone and pheromone, and judge the probability of choosing this path according to the amount of pheromone on this path. As the number of ants passing through this path increases, the amount of pheromones in this path increases, and the probability of ants choosing this path increases gradually. ρ(t) =
0.95ρ(t − 1) i f 0.95 ≥ ρmin ρmin else
(7)
Through the monitoring of the algorithm, the search state is judged in real time. If the optimal solution obtained within a period does not change, the search is caught in a certain extreme point (not necessarily the global optimal solution). At this time, the enforcement mechanism is adopted. The small pheromone to be added tries to escape from the local minimum. The amount of information needs to be restrained properly to reduce the optimal path and the worst path.
3 Vehicle Path Problem with Time Window 3.1 VRPTW Model VRPTW is described as: a warehouse has k vehicles, each vehicle has a maximum load of w, and needs to deliver goods for n customers, where the warehouse number is 0, the household number is 1 to n, and each vehicle departs from the warehouse as a customer. Delivery and eventually return to the warehouse. qi (i = 1, 2,…, n) for each customer’s cargo demand. The objective function of VRPTW is expressed as: X i jk =
1 vehicle k from i to j 0 else
min p1K + p2
K n n k=1 i=0 j=0
Ci j xi jk
(8)
(9)
Vehicle Path Optimization with Time Window …
173
In general, there are two targets for VRPTW. Therefore, you need to set the values of p1 and p2 to p1 ≥ p2 in Eq. (2).The constraints of VRPTW are as follows: n K
xi jk = 1 ∀ j ∈ {1, 2, . . . , n}
(10)
xi jk = 1 ∀i ∈ {1, 2, . . . , n}
(11)
k=1 i=0 n K k=1 j=0 K n
n i=0
⎛
k=1 j=1
⎝qi
n
x0 jk = ⎞
K n
xi0k = K
(12)
k=1 i=1
xi jk ⎠ ≤ w ∀k ∈ {1, 2, . . . , K }
(13)
j=0
xi jk ≥ 1, ∀S ⊆ {1, 2, . . . , n}
(14)
i∈S j∈S
where Eqs. (10) and (11) constrain each customer to be serviced by a single vehicle only; (12) is a constraint on the warehouse, i.e., the vehicle that departs from the warehouse and returns to the warehouse is K; (13) the load of the vehicle Constraint; Eq. (14) is the secondary loop elimination condition.
3.2 Ant Colony Algorithm for Solving VRPTW The algorithm block diagram is shown in the Fig. 3.
4 Simulation 4.1 Analysis of Results The three algorithms run 25 times at random, and the optimization results are shown in Fig. 4. The optimal path length obtained by the single point optimized ant colony algorithm. For 1157.415 km, the optimal number of vehicles is seven. In addition, the optimal path length obtained by the multi-point optimization ant-colony algorithm is 1189.409 km, and the optimal number of vehicles is for the seven cars, the average running time of the algorithm is 57.63 s. It can be seen that the single-point optimization ant colony algorithm and the multi-point optimization ant colony algorithm have higher efficiency. It is better than multi-point optimized ant colony algorithm.
174
B. Li and T. Li
Begin
IniƟalize parameters to determine the number of ants m, iteraƟon parameter NC_max(NC=1)
Dynamic adapƟve adjustment parameter
Place m ants on the distribuƟon center for a tour k=1
Get the opƟmal soluƟon and opƟmal path for this iteraƟon
Calculate the transiƟon probability of the kth ant, and determine the next customer j according to the constraint
Update pheromone according to the taboo table
Modify the ant's taboo table tabu
Empty the taboo table Tabu NC=NC+1
k=k+1
NC>NC_max?
k>m?
Output opƟmal soluƟon
end
Fig. 3 ACO with dynamic adaptive adjustment
Fig. 4 ACO algorithm optimization results
5 Conclusion Aiming at the problem of vehicle routing optimization, the upper and lower limits of pheromone trajectory intensity are set to improve the probability of pheromone propagation. The pheromone updating method and local optimization method are used to improve the adaptability of the system. The effectiveness and feasibility of the improved ant colony algorithm are verified by the analysis of the experiment and
Vehicle Path Optimization with Time Window …
175
experimental results and an example. Of course, in the actual distribution process, route determination is affected by many factors. How to find a more suitable model and algorithm considering the influence of many factors needs further study to make it better applied in practice. Acknowledgements This work was supported by Natural Science Foundation of China (No. 61863013), Key R & D projects of Jiangxi science and Technology Department of China (No. 20161BBE50091), Science and Technology Foundation of Jiangxi Educational Committee of China (No. 150529), and East China Jiaotong University School Foundation Fund “Research on Urban Fire Monitoring System Based on IoT Collaboration Perception” (15RJ01).
References 1. Wang Qizhen. 2010. Automatic control system regulation scheme of textile air conditioning. Science and Technology Information 22: 395–396. (in Chinese). 2. Liu Jinkun. 2003. Advanced PID control and MATLAB simulation, 2nd ed. Beijing: Electronics Industry Press (in Chinese). 3. Li Jianwei, and Ren Qingchang. 2008. Study on supply air temperature forecast and changing machine dew point for variable air volume system. Building Energy & Environment 27 (4): 29–32 (in Chinese). 4. Kefayat, M., A.L. Ara, and S.A.N. Niaki. 2015. A hybrid of ant colony optimization and artificial bee colony algorithm for probabilistic optimal placement and sizing of distributed energy resources. Energy Conversion and Management 92: 149–161. 5. Abdulkader, M.M.S., Y. Gajpal, and T.Y. ElMekkawy. 2015. Hybridized ant colony algorithm for the multi compartment vehicle routing problem. Applied Soft Computing 37: 196–203. 6. Mahi, M., Ö.K. Baykan, and H. Kodaz. 2015. A new hybrid method based on particle swarm optimization, ant colony optimization and 3-opt algorithms for traveling salesman problem. Applied Soft Computing 30: 484–490. 7. Liu, M., F. Zhang, Y. Ma, et al. 2016. Evacuation path optimization based on quantum ant colony algorithm. Advanced Engineering Informatics 30 (3): 259–267. 8. Wan, Y., M. Wang, Z. Ye, et al. 2016. A feature selection method based on modified binary coded ant colony optimization algorithm. Applied Soft Computing 49: 248–258. 9. Saghatforoush, A., M. Monjezi, R.S. Faradonbeh, et al. 2016. Combination of neural network and ant colony optimization algorithms for prediction and optimization of flyrock and backbreak induced by blasting. Engineering with Computers 32 (2): 255–266. 10. Lalla-Ruiz, E., C. Expósito-Izquierdo, S. Taheripour, et al. 2016. An improved formulation for the multi-depot open vehicle routing problem. OR Spectrum 38 (1): 175–187. 11. Archetti, C., M. Savelsbergh, and M.G. Speranza. 2016. The vehicle routing problem with occasional drivers. European Journal of Operational Research 254 (2): 472–480. 12. Yao, B., B. Yu, P. Hu, et al. 2016. An improved particle swarm optimization for carton heterogeneous vehicle routing problem with a collection depot. Annals of Operations Research 242 (2): 303–320. 13. Cattaruzza, D., N. Absi, D. Feillet, et al. 2017. Vehicle routing problems for city logistics. EURO Journal on Transportation and Logistics 6 (1): 51–79.
Cultivation of Innovative Talents in Higher Education Based on Big Data Jui-Chan Huang and Kuo-Min Ko
Abstract With the continuous improvement of the informatization level of higher education in China, higher education with the core goal of cultivating innovative talents has become a data-intensive research and practice field, and has begun to show the typical characteristics of big data, such as large amount of data, diverse types and low value density. Starting from the data background, this paper analyzes the necessity and advantages of cultivating innovative talents in higher education with the help of big data, and puts forward four training measures including data analysis, innovative research and development, policy integration and practice expansion. The research results are as follows. Keywords Higher education · Cultivation of talents · Big data environment · Innovation
1 Introduction Big data has become an inevitable trend of the development of information technology in the new era, and it is also a strong support for colleges and universities to deepen the reform of higher education [1]. Although the arrival of big data era has made higher education face many challenges, the boom of big data has provided more opportunities for higher education [2].
J.-C. Huang · K.-M. Ko (B) Yango University, Fuzhou 350015, China e-mail: [email protected] J.-C. Huang e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_23
177
178
J.-C. Huang and K.-M. Ko
2 Raising of the Issue The total size of higher education in China has reached 36.99 million, accounting for 20% of the total size of higher education in the world, and ranking first in the world. The gross enrolment rate of higher education has increased to 42.7% in 2016, and is rapidly moving towards popularization of higher education [3]. The characteristics of big data in higher education will become more obvious. Big data will also become a powerful lever to leverage the cultivation of innovative talents in higher education and effectively promote the connotation development of higher education. On September 24, 2017, the Opinion on Deepening the Reform of the Educational System and Mechanism was issued. How to realize the construction of innovative talent training system under the data environment has become the focus of people’s attention in the new era [4].
3 The Advantages of Cultivating Innovative Talents in Higher Education Under the Background of Data Intelligence. It is better to make full use of big data and cloud computing to create virtual practice platform and experimental training situation; The new Internet technology can be used to establish online learning curriculum system, in order to expand students’ learning methods, broaden their horizons, and improve their independent learning ability; The big data and cloud computing technology can be used to develop personalized talent training programs, monitor training programs and analyze data, so as to strengthen the cultivation of students’ practical application ability. High Efficiency. At present, many teachers and students have cognitive biases in classroom teaching, and many teachers blindly pursue teaching results, while students also blindly pursue learning results. Big data can monitor the whole process of talent training efficiently and conveniently, make comprehensive evaluation of teaching and management and form evaluation report, and analyze and feedback the existing problems pertinently. It is helpful for the school to strengthen the guidance to the teachers’ education and teaching and to guide the students’ self-regulated learning, and to improve the teachers’ teaching level and the students’ learning ability. Integration. “Big Data + Education” is an organic body for the comprehensive application of information technology such as big data, the Internet of things, cloud computing, mobile Internet, and so on. It can effectively integrate resources inside and outside the school and make the management work more standardized, efficient, and convenient [5]. And it can save the management cost and improve the management efficiency to a certain extent, which helps to promote the construction of digital campus and intelligent campus. Synergy. Teaching and management is no longer an independent system. Managers can carry on real-time monitoring and evaluation of teaching, and evaluation
Cultivation of Innovative Talents …
179
results timely feedback to teachers, effective integration of teaching and management of resources, so as to solve the problem of “attaching importance to results and neglecting process” in the process of personnel training. Openness. In terms of the choice of learning methods, students have changed from a single offline learning mode in the past to a diversified learning mode where they can choose both online learning and offline learning. At the same time, students can improve their practical ability and broaden their horizons by creating various learning situations. Teachers can also use the new technology of the Internet to change the traditional teaching mode of one-way knowledge imparting and realize the benign interaction between teachers and students, so as to form a good ecological environment for education [6].
4 Training Paths for Innovative Talents in Higher Education Under the Background of Data Do a Good Job in Learning Analysis and Formulate a Training Plan. The theory and technology of learning analysis, which includes learning measurement, learning data collection and analysis, learning evaluation, prediction and optimization, has become a typical application of big data in the field of education. The first International Conference on Learning Analysis Technology and Knowledge was held in 2011, and the Journal of Learning Analytics was founded in 2014, which marked the professional development stage of learning analysis research and practice, and its great value to higher education teaching is self-evident. Harvard University, Yale university, Stanford university and other world-renowned universities have launched the study analysis research and exploration program, aiming to strengthen the use of big data, and promote students’ personalized learning and innovation ability [7]. Learning analysis enables universities and teachers to provide customized teaching support services and adaptive teaching resources for different learners according to their knowledge base, cognitive style, skill level, interest preference, thinking and ability tendency and future career development expectation, so as to truly realize personalized learning. As a powerful tool of teaching reform in colleges and universities, learning analysis theory and technology is the core content of the development of higher education big data. It is the primary way to deepen the reform of higher education and promote the cultivation of students’ creative ability by exploring the system, mechanism and strategy of the deep integration of learning analysis and teaching in colleges and universities. Do Innovative Research and Development Well to Improve the Practical Effect. The cultivation of innovative talents driven by big data is a technical problem first, and then it is a problem of education. Without the big data technology suitable for higher education and the deep integration of higher education and these technologies, the training of innovative talents driven by big data is destined to be a difficult educational ideal, beautiful but powerless. Obviously, it is the first step to use the
180
J.-C. Huang and K.-M. Ko
leverage of big data in higher education and realize the leap. Although many colleges and universities own strong research and development power of big data technology, compared with the advantages of Internet enterprises in big data technology research, application and promotion, the latter is more practical and closer to the application scene. Therefore, realizing the deep integration of big data higher education with the help of big data technology developed by Internet enterprises, and thus promoting the cultivation of innovative talents in higher education is an important way to break through big data technology. Of course, colleges and universities cooperate with Internet enterprises to explore the innovative talents driven by big data to cultivate new thinking and new models. It is necessary to be vigilant against the improper use of big data in higher education (for example for commercial purposes) by enterprises with obvious profit-driven characteristics as market subjects in order to avoid the ethical and moral problems caused by this. Do a Good Job of Policy Integration and Transformational Upgrading. We will guide big data’s application with policies, promote teachers’ data literacy by applying them, and ensure that big data and higher education will be integrated into the ground in terms of literacy. In the pluralistic interaction of “Policy-ApplicationLiteracy-Fusion” and other factors in higher education big data, we can realize the spiraling increase of teachers’ data literacy, and then bring big data into play in optimizing learning, so as to improve teaching and innovation in the process of talent training to promote the role [8, 9]. Secondly, through the typical application of big data in the higher education scene, providing demonstration guidance for the vast majority of teachers, and encouraging teachers to try in person with big data’s many kinds of real-world applications, observation and experience. This paper explores and practices the various applications of big data in the process of cultivating innovative talents, enhances the teachers’ data consciousness and ability in practice, and effectively improves the teachers’ data literacy. The teacher’s data literacy is not only the extent and the depth of the integration of the big data and the higher education, but also the inevitable requirement of the professional development of the university teachers in the large data era, and can provide powerful support for the teachers to carry out the duties of the moral tree. Do a Good Job in Practice Expansion and Encourage Independent Innovation. The curriculum system construction that highlights the cultivation of innovation ability should be supported by big data technology, oriented by practical application, and pay attention to the cultivation of students’ innovation ability. First of all, establish and improve the online course resource database, and highlight the cultivation of innovation consciousness. The online course resource database should be built according to the professional classification, and the resource types in each course resource database should be rich and diverse, such as teaching, inspiration, experiment, design, discussion and other types of resources [10]. The content of course resources should include introduction of course leader, syllabus, teaching content, reference materials, online homework, online answering questions and so on. Secondly, the online teaching platform of micro-course and Mooc should be established and open to students, and the teaching plan combining face-to-face learning and
Cultivation of Innovative Talents …
181
online learning should be developed to meet the diversified and personalized learning needs of college students. Colleges and universities should cultivate students individually, and meet the needs of students’ independent innovation through online learning. Secondly, in the process of training talents, teachers should change the traditional single teaching method of knowledge teaching, and make full use of big data and his new generation of information technology to establish a platform for sharing learning resources [11]. In order to stimulate students’ subjective initiative and cultivate students’ creative ability, the problems encountered in the process of learning are continuously collected and the teaching contents are designed according to the problem-oriented approach.
5 Summary It is undoubtedly of special and important significance to explore the development path and practice path of big data in higher education to facilitate the cultivation of innovative talents. Therefore, it is necessary to formulate various measures oriented to the application of big data. At the same time, it is necessary to improve teachers’ professional quality, guide the education of innovative talents, and form diversified training paths, so as to comprehensively improve the benefits of innovative talents training and comprehensively promote the development process of innovative talents training in colleges and universities under the background of data.
References 1. Wei, Zhihui. 2008. Thoughts on the reform of IT talent training mode in the era of big data. Journal of Guizhou Radio and Television University 26 (3): 64–67. 2. Wang, Yingjie. 2008. Analysis on innovative approaches of ideological and political education for college students in multi-ethnic regions under the background of big data. Journal of Heilongjiang Institute of Education 37 (8): 100–102. 3. Xu, Yafeng. 2008. Necessity and talent cultivation of big data major in higher vocational colleges. Journal of Mudanjiang University 27 (8): 137–138+141. 4. Qiu, Xiangyu. 2008. Application analysis of big data on college teaching reform and education management. Journal of Hubei Correspondence University 31 (15): 27–28+35. 5. Muo, Xianxian, Daxin Zhu, Mingyu Chen, Yuzhu Zeng, Chen Lie, Shifang Zhuang, Wei Zeng, and Lifang Hong. 2018. Cultivation of “dry” talents majoring in information management and information system in application-oriented colleges and universities. Journal of Quanzhou Normal University 36 (4): 10–14. 6. Shao, Lisheng. 2008. Research on the innovation of university administration based on “big data”. Journal of Hebei Software Vocational and Technical College 20 (3): 35–37. 7. Wei, Jia. 2018. Current situation and countermeasures of talent cultivation in colleges and universities under the background of “Internet +”—A case study of 5 colleges and universities in Jiangsu province. Journal of Jinling University of Science and Technology (Social Science Edition) 32 (2): 85–88. 8. Huang, Zhen. 2008. Influence of big data on college education management and countermeasures. Journal of Heilongjiang Institute of Education 37 (6): 4–6.
182
J.-C. Huang and K.-M. Ko
9. Li, Congcong. 2008. “University-media linkage and all-media application”—Thoughts on talent cultivation of broadcasting and hosting majors in the era of big data. Journal of Jiangxi Electric Power Vocational and Technical College 31 (5): 93–94. 10. Tang, Longsheng, and Xiaolei Zong. 2008. Opportunities and challenges of college employment in the era of big data. Journal of Mudanjiang University 27 (5): 150–152. 11. Wan, Tao, Zhang Wei, and Yang Dan. 2008. Reform practice of big data technology and application direction of information management major under the background of new engineering. Journal of Weinan Normal University 33 (10): 41–47.
Reform of Ideological and Political Teaching in Colleges and Universities Under the Background of Big Data Hongbing Ge and Baozhi Wang
Abstract The arrival of the “Big data” provides new opportunities for the reform of ideological and political education (IaPE) in colleges and universities. This work firstly analyzed the favorable opportunities provided by the “micro-era” environment for the development of IaPE in colleges and universities, then researched on the problems existing in the process of the teaching mode reform of IaPE in colleges and universities, and finally put forward effective reform strategies combined with the problems so as to improve the level of IaPE in colleges and universities and to adapt to the requirements of the development of the “micro-era”. Keywords “Big data” · Colleges and universities · Ideology and politics · Teaching reform
1 Introduction The new media represented by Weibo, WeChat and Mobile APP has been widely used in educational circles. Micro video, micro speaking and micro film can be widely transmitted through mobile terminal devices such as smartphones, and other microbehaviors have also become part of people’s living and work [1]. Contemporary college students who are active and willing to try new things. The formation and development of their ideals, beliefs and values are full of unpredictability [2, 3]. The IaPE work carries out the important mission of spreading Marxism and the core socialist values. Therefore, it is of great theoretical significance to probe into the work of the IaPE based on the micro-era.
H. Ge (B) · B. Wang Hunan Judicial Police Vocational College, Changsha 410131, Hunan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_24
183
184
H. Ge and B. Wang
2 The “Micro-Era” Environment Provides a Favorable Opportunity for the Development of IaPE 2.1 It Adapts to the Characteristics of the Times and the Development Direction of Modern IaPE There is no doubt that the IaPE is inseparable from the specific background of the times, which is the inherent requirement of the development of the IaPE law. Only combining with the specific background of the times, the development of IaPE can be possible and realistic [4]. The IaPE should press close to the times and practice, pay special attention to all kinds of new elements under the background of the “microera”, which have a very important influence on every link of the IaPE in colleges and universities. For example, college students can use Weibo and WeChat public platform to exchange information express their views on issues. Teaching stuff of IaPE can take advantage of the strong interactive characteristics of Weibo and WeChat to understand students’ personality and ideas, solve their doubts in their study and life timely, communicate with them and give them guidance, such as transmitting the education contents through voice, text and pictures to them.
2.2 It Helps Expand and Innovate the New Teaching Mode of Ideological and Political Course Firstly, the “micro-era” has expanded a new way of ideological and political teaching in colleges and universities. Weibo and WeChat make students open their hearts in the process of hidden education, which changes the way of infused and passive education, reverses the unequal educational relationship, enables students and ideological and political educators to communicate equally and greatly demonstrates the subjectivity of the students. In addition, the “micro-era” enriches the new contents of ideological and political teaching in colleges and universities. According to the need of teaching purpose, ideological and political teachers can spread rich contents to students through micro-media platform based on the characteristics of rapid dissemination of micro-media information, so that students can know the new events that have taken place throughout the country and even around the world in time. The contents of IaPE are closer to the students’ life and reality, therefore, they are more easily accepted by the students [5]. Finally, the “micro-era” has added new means of political and ideological teaching in colleges and universities. College students can interact in micro-media and participate in the whole ideological and political curriculum. It can be seen that the micro-media has constructed a new platform for college students to provide resources, express their views, communicate ideas, and have public discussion.
Reform of Ideological and Political …
185
3 Problems Existing in the Teaching Mode Reform of IaPE Under “Micro-Era” 3.1 Lack of Professional Teachers At present, most teachers do not have the consciousness of reform, let alone the teaching mode reform. What is more, most teachers think that the teaching content of ideological and political course is mostly fixed, and the reform of teaching mode has no effect on the quality and effect of ideological and political teaching at all, therefore, it is not necessary to carry on the the teaching mode reform of IaPE in colleges and universities. The professional quality of many ideological and political teachers is difficult to meet the requirements of the concept of “micro-era”, and cannot adapt to the reform of ideological and political teaching mode at all, therefore, it is impossible to promote the reform of IaPE.
3.2 Insufficient Emphasis on the Teaching Mode Reform For the teaching mode reform of IaPE under the background of “micro-era”, colleges and universities still lack enough attention [6]. First of all, college leaders believe that the reform process will cost a large amount of money, however, the ideological and political curriculum is not the dominant major, thus it is better to spend the money and energy on the advantageous subjects. In addition, teachers consider that the teaching mode reform has no great relationship with their promotion and development. If they carried on the reform of ideological and political teaching mode, they would need to spend great energy to study. However, it doesn’t have any substantial benefits, thus teachers will not pay attention to and support the reform actively. Finally, students will not pay much attention to the teaching mode reform of ideological and political courses since they have adapted to the infused teaching mode in the classroom [7]. If the teaching mode reformed in the future, they would need to adapt from the start, which has resulted in the present situation that students do not pay attention to the teaching mode reform of ideological and political course.
3.3 Imperfect Reform System Colleges and universities do not provide the teaching model for the teaching mode reform of the ideological and political course, which makes it impossible for some teachers to carry out the reform of the teaching mode. The reform of ideological and political curriculum has no relevant teaching mode reform system, and the ideological and political teachers can not achieve a unified opinion on the issue of reform, resulting in confusion in the direction and content of the reform [8]. Therefore, it is
186
H. Ge and B. Wang
not conducive to unifying standards and it is difficult to evaluate the reform results of teachers based on the assessment. The reform system of the teaching mode of IaPE is not perfect, which will not only affect the curriculum development at the beginning of the reform, but also lead to the interruption of the curriculum reform process. Teachers cannot persist in the teaching mode reform of the ideological and political course for a long time, which is not conducive to improving the teaching effect of the ideological and political curriculum.
4 Strategies for the Teaching Mode Reform of Ideological and Political Course Under the Background of “Micro-Era” 4.1 To Introduce Professional Teachers of Ideological and Political Course In order to promote the teaching mode reform of IaPE in colleges and universities, professional teachers of IaPE are supposed to be introduced. First of all, when recruiting teachers, colleges and universities should not only examine teachers’ professional ideological and political knowledge systems, but also test their ability of using information dissemination and communication tools of the “micro-era”, since only teachers who are familiar with and often use information exchange tools can give full play to it in the process of teaching reform of ideological and political classroom. Otherwise, it is difficult for teachers even with abundant basic knowledge to meet the requirements of the teaching mode reform. In addition, colleges and universities should not loosen to test them after introducing these ideological and political teachers, since they are two separate things that teachers are familiar with these communication tools and they use them in class [9]. It requires colleges and universities to inspect and monitor new teachers to ensure that they can effectively use these tools for ideological and political classroom teaching. Finally, when introducing teachers, colleges and universities should give priority to those who have rich experience of teaching reform. These teachers tend to have a keen sense of reform and have strong execution since they often assist colleges and universities to carry out teaching reform.
4.2 To Strengthen the Emphasis on the Teaching Mode Reform of Ideological and Political Course For the teaching mode reform of the IaPE under the background of “micro-era”, colleges and universities must pay enough attention to it, so that they can better
Reform of Ideological and Political …
187
promote the development of the follow-up work. First of all, colleges and universities are supposed to convey the reform in the form of notice and stress the importance of this teaching model reform of ideological and political course under the background of “micro-era” through the convening of various meetings, which can reflect the emphasis on this ideological and political curriculum reform. In addition, teachers should conscientiously implement the teaching mode reform goal of ideological and political course and regard this goal as an important standard for their future teaching, so that they can change their teaching way in days and months, realize the requirements of the teaching mode reform of the ideological and political course under the background of “micro-era”, and promote the teaching mode reform [10]. Finally, students must attach importance to the teaching mode reform of the IaPE in colleges and universities, and actively cooperate with teachers, so as to promote the integration of the teaching mode with the characteristics of the development of the “micro-era”.
4.3 To Improve the Reform System of the Ideological and Political Teaching Mode Under the Background of “Micro-Era” In order to better reform the teaching mode of IaPE in colleges and universities, the reform system of the teaching mode of IaPE under the background of “microera” must be improved. Colleges and universities should set up a special curriculum research committee and construct this curriculum system from a new aspect. First of all, the person in charge of the curriculum system must combine the characteristics of the development of the times and use the classroom teaching mode based on the characteristics of the “micro-era” when compiling the curriculum system [11]. In addition, when carrying on the system reform, colleges and universities must make detailed stipulation to the teaching content and the teaching mode of each chapter. For example, teachers should be encouraged to use video, audio, graphics film and other materials and make them into Word documents, PPT files, cartoon animation and “micro-class” video. The effect of ideological and political classroom teaching will certainly be improved through such reform and development, therefore, colleges and universities can be better integrated into the development of “micro-era”.
5 Summary As a new teaching mode, “micro-course” teaching is a powerful measure to improve the pertinence and effectiveness of ideological and political theory teaching in colleges and universities. Researching on the teaching mode reform of ideological and
188
H. Ge and B. Wang
political course under the background of “micro-era” is important for the IaPE curriculum and the whole teaching system. The process of preparing “micro-course” is also the process of micro-research. However, it is found that there still exists a series of problems in the teaching mode reform of IaPE under the background of “microera”, which will seriously affect the development and construction of the teaching mode of IaPE in colleges and universities. Therefore, it is hoped that a series of reasonable solutions given in this work will promote the teaching mode reform of the IaPE.
References 1. Ma, Jianqing, and Bianmei Shi. 2018. Research on the influence of IaPE on the development of mental health education in colleges and universities in the past 30 years. Ideological and Theoretical Education (1): 97–102. 2. Liu, Chuansheng. 2018. Improving the affinity and pertinence of ideological and political theory course in colleges and universities guided by Xi Jinping’s thought on socialism with Chinese characteristics in the new era. China Higher Education Research (02): 1–6. 3. Gu, Hialiang. 2018. Theoretical guidance and development concept of ideological and political education in colleges and universities in the new era—Learning Xi Jinping’s thought on socialism with Chinese characteristics in the new era. Leading Journal of Ideological and Theoretical Education (1): 4–10. 4. Ji, Feng, and Yijiang Chai. 2018. Research on the innovation of college students’ ideological and political education in the micro-era. Journal of Jiangsu Institute of Commerce (5): 71–73. 5. Feng, Gang, and Liming Cheng. 2018. Practice and theoretical development of ideological and political work in colleges and universities since economic reform and open Up. Ideological and Theoretical Education 10: 13–20. 6. Yang, Xiaohui. 2017. Strengthening the top-level design of the ideological and political work of party committee in colleges and universities. Ideological and Theoretical Education (3): 10–14+68. 7. Wang, Zhanren. 2017. How to educate students in all ways and directions of ideological and political education in colleges and universities. Educational Research 38 (8): 25–31. 8. Xue, Hai, and Ying Han. 2017. The construction of “six micro” mode of ideological and political education for college students under the background of “micro-era”. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition) 38 (6): 123–127. 9. Li, Li. 2016. Research on the reform of ideological and political education in colleges and universities under the background of “micro-era”. Journal of Jiamusi Vocational Institute (7): 139–140. 10. Ruan, Bo. The innovation of ideological and political teaching in colleges and universities under the background of “micro-era”. Chinese Social Sciences Today, 12 May 2016 (001). 11. Ji, Haiju. 2015. Research on the challenges and opportunities of ideological and political education in colleges and universities in the new media era. Social Sciences in Nanjing (05): 151–157.
Influence Factors of Consumer Satisfaction Based on SEM Huali Cai, Yawei Jiang and Jingshu Zhang
Abstract Structural equation modeling, SEM, can be used to calculate the influence factors of the consumer satisfaction. Based on the SEM, the authors use questionnaire survey method to look for the main influence factors of consumer when purchasing the household appliances. The structural equation model is used to evaluate the consumer satisfaction. From the result, we can see consumers are most concerned about the brand image and least concerned about the perceived value. Besides the quality, the production companies should strengthen the cultivation of brands. Production companies put more focus on the R&D process and can raise prices appropriately when pricing. Keywords Consumer satisfaction · Household appliances · Brand image
1 Introduction China’s household appliance industry is developing rapidly and has strong competitiveness in the international arena. In recent years, China’s household appliance industry has grown into a number of well-known brand companies, such as Gree, Midea, Haier, Robam, Fotile, etc., with very high reputation at home and abroad. However, what are most concerned for Chinese consumers when they buy home appliances, and which are important factors affecting customer satisfaction, which has become the focus of this paper. Among the past researches, different authors use the different methods or a specific field. Sina carried out a comparison between lifestyle and product-centric displays to enhance consumer satisfaction [1]. Through comparing the functional and emotional brand relationships, Teresa studied the consumer brand engagement, satisfaction and brand loyalty [2]. Sigismond analyzed the determinants of the use of several telecommunication networks on the satisfaction of subscribers in Cameroon [3]. Michael Lynn studied the effects of tipping on consumers’ satisfaction with restaurants [4]. Dennis C carried out the study of how delight and satisfaction affect (in a nonlinear way) consumer loyalty [5]. Sangkon H. Cai (B) · Y. Jiang · J. Zhang China National Institute of Standardization, Beijing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_25
189
190
H. Cai et al.
Park applied theories of behavioral economics to evaluate various aspects related to tour satisfaction and general impression of the city [6]. Ahmet Ekici studied the influence of shopping Well-Being and shopping Ill-Being on consumer’s satisfaction [7]. Ting Chi gave a innovative research model about the self-regulatory process theory [8]. Appalayya Meesala found the most critical factors in hospitals related to service quality that relating to survival and success in the future [9]. Yunjin put forward the process of consumer satisfaction formation of e-commerce based on the EDT and TAM [10].
2 Evaluation Model The authors use the structural equation model (SEM) to evaluate the consumer satisfaction. The example of the evaluation model is shown in Fig. 1. Where, the circles in the model means the latent variables. The arrows in the model means the causal relationship among the different latent variables, the larger of the influence, the bigger of value displayed on the arrows. The rectangles means the observable variables. The mathematical form for structural equation can be expressed as follows: η = Bη + Γ ξ + ζ In the upforward formula, the η is the endogenous latent variable. The ξ is exogenous latent variable. The B indicates the influence relationship among the different y41
y2n
y42
...
y4n
…
y51
y52
...
yn1
yn2
...
y22
y5n
y21
…
…...
y1n
y12 y11
x1
x2
...
xm
y31
y32
Fig. 1 Example of structural equation model
...
y3n
ynn
Influence Factors of Consumer Satisfaction Based on SEM
191
endogenous latent variables. The Γ indicates the impact of exogenous latent variable on endogenous latent variable. The ζ indicates residual of structural equation. The mathematical form measuring the equation can be expressed as follows: X = Λx ξ + δ Y = Λy η + ε In the formula, the X indicates the vector formed through exogenous indexes. The Y indicates the vector formed through endogenous indexes. The Λx indicates the different relationship between exogenous and endogenous indexes. The Λ y indicates the different relationship between endogenous index and the endogenous latent variable. The influence coefficient can be computed by the model, which can be taken as the influence level. Specifically, as for appliance industry, the SEM is shown in Fig. 2. Where, brand image means customers’ evaluation on the image of the household appliance company and on the conspicuousness of brand characters. The expected quality includes evaluation of customers on the overall expected quality, expected customized quality, expected product reliability and expected service quality on the household appliance brand. The perceived quality includes the evaluation on the overall perceived quality and several quality indexes in relation to quality of the household appliance company. The perceived value includes the evaluation of customers on the service price of the enterprise under given quality. The customer satisfaction includes customers’ overall satisfaction on brand service, satisfaction compared with the expected, satisfaction compared to other brands and to ideal services. The
Brand image Expected quality Customer saƟsfacƟon Perceived quality Perceive d value
Fig. 2 The structural equation model
Customer loyalty
192
H. Cai et al.
and customer loyalty includes customers’ possible willingness to repurchase brand services and to recommend.
3 Evaluation Result We made a survey for 10 household appliance industries. They are range hood, refrigerator, TV, air conditioner, washing machine, electric water heater, air purifier, gas water heater, gas stove and disinfection cabinet. This survey is made by combination of computer aided phone interview system and online survey in the 250 major cities of China. Around 250 valid questionnaires are distributed to each enterprise. The respondents are individual consumers aged 18 to 70 who have used the brands surveyed in the previous one year. The amount questionnaires are about 20000. The result of calculation is shown in Table 1. From the table, we can see all consumers care more on brand image and perceived quality than other factors. In the field of range hood, refrigerator, TV, air conditioner, washing machine, electric water heater, gas stove and disinfection cabinet, the consumers are most concerned about brand image. However, in the field of air purifier, gas water heater and disinfection cabinet, the consumers are most concerned about the perceived quality. What’s more, the consumers are least concerned about perceived value factors. Table 1 The influence coefficient of consumer satisfaction in household appliances NO.
Industry
Brand image
Expected quality
Perceived quality
Perceived value
1
Range hood
0.66
0.40
0.52
0.21
2
Refrigerator
0.58
0.41
0.52
0.18
3
TV
0.63
0.40
0.53
0.15
4
Air conditioner
0.59
0.47
0.50
0.22
5
Washing machine
0.64
0.46
0.45
0.21
6
Electric water heater
0.58
0.46
0.52
0.19
7
Air purifier
0.57
0.43
0.63
0.17
8
Gas water heater
0.53
0.46
0.60
0.20
9
Gas stove
0.58
0.55
0.57
0.19
10
Disinfection cabinet
0.55
0.55
0.65
0.12
0.59
0.46
0.55
0.18
Average
Influence Factors of Consumer Satisfaction Based on SEM
193
4 Conclusion The authors use the SEM to evaluate the consumer satisfaction and find the main influence factors. From the result, we can see consumers are most concerned about the brand image and are least concerned about the perceived value. Besides the quality, the production companies should strengthen the cultivation of brands. Production companies put more focus on the R&D process and can raise prices appropriately when pricing. Acknowledgements This work is supported by the National Key Research and Development Program of China under Grants No. 2017YFF0206504.
References 1. Sina, Kim. 2019. Enhancing consumer satisfaction and retail patronage through brand experience, cognitive pleasure, and shopping enjoyment: A comparison between lifestyle and product-centric displays. Journal of Global Fashion Marketing: 129–144. 2. Teresa, Fernandes, etc. 2019. Consumer brand engagement, satisfaction and brand loyalty: A comparative study between functional and emotional brand relationships. Journal of Product & Brand Management: 274–286. 3. Sigismond, Hervey Mvele, etc. 2019. Multiple subscriptions to mobile networks and consumer satisfaction. Journal of Retailing and Consumer Services: 375–381. 4. Michael, Lynn. 2018. The effects of tipping on consumers’ satisfaction with restaurants. Journal of Consumer Affairs: 746–755. 5. Dennis, C, etc. 2019. Ringle. Enhancing loyalty: When improving consumer satisfaction and delight matters. Journal of Business Research: 18–27. 6. Sangkon, Park, etc. 2018. Two factor model of consumer satisfaction: International tourism research. Tourism Management: 82–88. 7. Ahmet, Ekici, etc. Michael Bosnjak. 2018. The effects of shopping well-being and shopping Ill-being on consumer life satisfaction. Applied Research in Quality of Life 13 (2): 333–353. 8. Ting, Chi. 2018. Mobile commerce website success: Antecedents of consumer satisfaction and purchase intention. Journal of Internet Commerce: 189–215. 9. Appalayya, Meesala, etc. 2018. Service quality, consumer satisfaction and loyalty in hospitals: Thinking for the future. Journal of Retailing and Consumer Services: 261–269. 10. Yunjin, Cho. 2017. A consumer satisfaction model based on the integration of EDT and TAM. Asia Pacific Journal of Marketing and Logistics: 978–993.
Overview of Underground Space Utilization and Standardization Suggestions Qing Xu
Abstract Exploitation of underground space is an effective way to alleviate many urban problems and is convenient to people’s life. It has a very important and farreaching significance. This paper combs the classification and value of underground space in China. The existing practice of underground space utilization at home and abroad is analyzed and studied. On this basis, standardization suggestions on underground space utilization are given with a view to enhancing the support level of standardization for underground space utilization. Keywords Underground space · Standardization · Standard
1 Introduction Underground space is a space developed and utilized below the surface to meet the needs of production and living, according to terms and definitions 3.1 of national standards GB/T 35636-2017 [1]. Underground space is considered to be the last frontier left for human beings. It is recognized as non-renewable natural resource. Therefore, its development has been highly valued worldwide. Many countries even take it as a policy at the national level. Qian Qihu is committed to building an indestructible “underground steel Great Wall” for China, who is a Chinese expert in protective engineering, the first academician of the Chinese Academy of Engineering and a professor of Army Engineering University of PLA, also the winner of the 2018 National Highest Science and Technology Awards.
Q. Xu (B) China National Institute of Standardization, No. 4 Zhichun Road, Haidian District, Beijing 100191, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_26
195
196
Q. Xu
2 The Classification of Underground Space It may be divided into the following categories, according to functions of underground space [2]: • Underground traffic facilities: underground railway, underground highway, underground static traffic facilities (underground garage), etc. • Underground public space: underground commercial street, underground shopping mall, underground hospital, underground entertainment facilities, underground complex, etc. • Underground municipal public facilities: underground water supply facilities, underground energy supply facilities, underground communication facilities, underground sanitation facilities, underground facilities, etc. • Underground energy and material reserves: underground food and fresh water storage, underground storage, underground oil and natural gas storage, etc. • Underground military facilities: underground civil air-defense facilities, underground military warehouses, underground battle fortifications, underground missile silos, etc. • Underground industrial facilities: underground plant, underground workshop, underground hydropower station, underground nuclear power plant, underground waste incineration plant, etc. Types of underground space can also be divided by different formation causes: • Natural underground space. Underground space associated with geological processes such as dissolution, volcanic, wind and sea erosion, including the karst caves, lava caves and wind erosion caves, etc. • Artificial underground space. There are two types. One is underground traffic space, construction space, storage space, and other underground space; the other is waste and old mine space formed by mining coal, oil and other underground minerals. In addition, according to the depth it can be divided into the following categories: • Shallow underground space: Underground space within the depth range of 10 m. • Middle underground space: Underground space developed and utilized in depth of 10–50 m. • Deep underground space: Underground space below 50 m.
3 The Value of Underground Space Exploitation The use of underground space is gradually rising and developing with city growth and the solution of urban problems. With the progress of economy and society, the process of urbanization is accelerating, and the resulting problems such as pollution,
Overview of Underground Space …
197
land scarcity, and urban waterlogging are increasingly prominent. The exploitation of underground space is the way to improve the quality of environment and residents living [3]. The value of urban underground space exploitation is mainly reflected in: • Realizing three-dimensional expansion of urban space, improve main land use efficiency, and save land resources. • Protecting and improving urban ecology. • Establishing a sound urban underground disaster prevention, space system to ensure the safety of cities in the event of natural and man-made disasters. • Realizing the intensive and sustainable city development mode, and ultimately is convenient to people’s life. The value of underground space utilization outside cities is mainly reflected in: • Building tunnels across the river to ensure that China’s major transportation remain unblocked in wartime. • Constructing underground traffic tunnels to greatly increase train speed and ensure necessary transportation during wartime. • Building a national strategic material reserve system in the mountains, storing a large amount of energy and other materials, not only to withstand the usual disasters and threats, but also to support wartime needs. • Storing various military equipment and weapons to support China’s national defense construction.
4 Domestic Underground Space Utilization Practice There are 3 stages of underground space: the initial stage, scale stage and network stage. The next step is to enter the ecological stage which has deeper development and efficient integration of various underground facilities. Here are cases of Zhejiang province and Xiongan New Area introducing the exploitation of underground space.
4.1 The Case of Zhejiang Province 4.1.1
It Has Formulated Relevant Policies and Regulations
People’s Government of Zhejiang Province issued Several Opinions in 2011. The opinions emphasize that urban underground space is an important part of urban progress. It is necessary to fully understand the importance and urgency of urban underground space, and to clarify the guiding ideology, basic principles, main tasks and safeguard measures of that. In 2012, Zhejiang issued the Guidelines for Designing Cut-and-Cover Underground Space Development and Utilization Project Combining
198
Q. Xu
with Civil Defense Demand (Trial), promoting the underground space to meet the needs of Civil Air Defense. In 2013, Zhejiang issued the Interim Measures for the Registration of the Underground Buildings in Zhejiang Province, which provides an important basis for the registration of underground buildings. Also in 2013, the Zhejiang Department issued the Zhejiang province the urban construction engineering parking lot (warehouse) setting rules and construction standards. For example, Lishui has formulated policies, and Hangzhou, Wenzhou, Jinhua and other cities have stipulated ownership, land management and land registration of underground space. The 13th Five-Year Plan of Urban Underground Space Development and Utilization of Zhejiang Province was issued. It clarifies the overall requirements, the main tasks and implementation safeguard measures in Zhejiang province. The above exploration has strongly promoted the improvement of policies of Zhejiang province.
4.1.2
It Has Carried Out Diversified Planning Practice
Zhejiang Department of Housing and Urban-Rural Development issued the Guidelines for the Compilation of Specifications for the Development and Utilization of Urban Underground Space in Zhejiang Province (Trial, 2010), which is the first guideline at the provincial level. It stipulates the planning period, planning scope, main tasks, contents and achievements in the stages of general planning, specialized planning and detailed planning. In addition, Hangzhou has formulated specialized planning at the divisional level, and Ningbo has carried out the evaluation planning and research on subway line planning. Furthermore, Hangzhou, Ningbo and other cities, combined with the construction of new cities and urban rail transit, carried detailed planning, and made beneficial attempts above overall layout, underground space overall development, index setting, interconnection and other aspects. The compilation of multi-type underground space planning provides important guidance for promoting rational development.
4.1.3
It Has Carried on Fruitful Underground Space Development Construction Practice
The underground space realizes large-scale exploitation. Seen from scale of underground space exploitation, Hangzhou and Ningbo the highest total amount, more than 10 million square meters. Underground space realizes the functional diversification layout. Hangzhou and Ningbo explored the integrated construction of underground business, parking, municipal and public facilities combined with the urban rail transit construction, and built the underground comprehensive pipe gallery combined with the new city development. Combined with the construction of commercial office buildings and the headquarters industrial park, Jiaxing explored the interconnection
Overview of Underground Space …
199
and the overall development and construction of different main plots. Jinhua has built underground storage and logistics facilities in combination with the logistics base. The diversification functions alleviates effectively and promotes the improvement of urban functions. The underground space introduce private capital. Cities have given full play to private capital, and guided private capital to build underground space with multiple functions, such as parking lots, commercial facilities, etc., which has strongly promoted the construction of various underground facilities.
4.1.4
It Has Actively Explored the Construction of the Underground Space Management System
Set up the comprehensive organization. Zhejiang has set up a leading group at a provincial level, which is responsible for coordinating whole province, and holding regular on-site meetings to promote the practice and experience. Hangzhou, Jinhua, Taizhou and Lishui have set up leading groups, actively exploring the comprehensive coordination mechanism. Gradually carried out the underground space information system. The underground pipeline information survey has been carried out in various cities of Zhejiang province, which promotes the construction of the underground pipeline information management system. Shaoxing, has initially established the underground pipeline information management system. In addition, some cities, such as Hangzhou, Ningbo, Wenzhou, Jinhua, Quzhou and Yiwu, have formulated relevant regulations on the management of underground pipelines, clarified the requirements on the survey, registration and use of underground pipeline information, and standardized the management of underground pipeline information.
4.2 The Case of Xiongan New Area On January 24, 2019, The Guidance of the CPC Central Committee and the State Council on supporting the comprehensive deepening of reform and opening up of Hebei Xiongan New Area was released [4]. It puts forward nine key tasks, among which the second task, “improving the urban governance system and building a modern smart city”, puts forward “promoting the overall development and utilization of underground space and improving relevant systems of planning, land, construction, property rights, use and management”. The text is as follows:
200
Q. Xu
…… Improve the urban governance system and build a modern smart city. Adhere to the ideas of people centered approach, in accordance with the requirements of strengthening services, source governance, consistency of power and responsibility, coordination and innovation, thinking, means and models of intelligent governance are carried out throughout the Xiongan New Area. It will make innovations in urban planning and design, promote the establishment of a housing supply system, improve the scientific and refined level of urban management, and build a modern socialist city of high quality and level. 7. Establish a scientific and efficient urban planning and design mechanism. Highlight the basic and key role of experts in the planning and compilation of Xiongan new area, let professional people do professional work, explore the work procedures of expert selection, program comparison, review and decisionmaking, and form a planning mechanism for expert leadership, government organization, multi-participation, and scientific decision-making. It will establish a mechanism for overall planning and coordination. The detailed regulatory plan, site plan and the related specialized plan shall conform to the overall land space planning. It will promote the overall development and utilization of underground space and improve relevant systems for planning, land, construction, property rights, use and management. It will establish and improve urban planning, design and the construction management standard system of Xiongan New Area, promote the standardization of infrastructure, urban architecture and other fields, and provide a model for modern urban planning and construction management. …… Chen gang, the secretary of Xiongan New Area pointed out to build two cities, one is above the ground, another is underground. It is necessary to adhere to plan for both, and build first underground and then above ground. It will scientifically plan and design the underground space combined with urban functional requirements according to the principles of safety, efficiency and moderation. Therefore, Xiongan New Area will make scientific and effective use and experience of underground space. Meanwhile, it is important to build a city safety emergency, disaster prevention system and uphold the safety cornerstone of long-term development. The flood control standard for the starting area is once every 200 years, for the five peripheral groups is once every 100 years, and for other characteristic small towns is once every 50 years in principle. The seismic precautionary intensity of Xiongan New Area is 8-degree, the basic seismic intensity of schools, hospitals, lifeline systems and other essential facilities is 8.5-degree. Only fortification and construction with high standards and high quality can ensure safety all the time.
Overview of Underground Space …
201
5 The Overview Abroad In 1991, it is formally proposed “the 21st century is the century of underground space development and utilization” at Tokyo International Forum [5]. Some foreign cities has been more than 100 years old on underground space exploitation. Among them, in 1832, Paris pioneered the water supply, gas and communication pipelines in the drainage-based corridor, forming the rudiment of the utility tunnel [6]. In 1863, the London Underground was opened, officially opening up the development. After years ofexploitation of urban underground space in Britain, France, Russia, Japan and Hong Kong have reached a considerable scale, basically representing the highest level in the world today [7]. In 1863, the world’s first underground rapid rail transit line (subway) was officially opened in London, marking the first development of urban underground space. It has been more than 150 years since then. Years of accumulation have enabled foreign countries to have sound laws and regulations, advanced design concepts, mature construction techniques and scientific management experience. All countries in the world are actively developing and utilizing underground space now. All major cities have built mature rail transit networks, underground roads, integrated commercial streets and integrated pipe corridors. However, the development of various countries has its own characteristics [8]. North America, United States places great emphasis on the underground roads, which not only improves traffic conditions, but also frees up floor space to green the urban environment and develop moderately to increase the commercial value of the land [9]. One example is the project of Central Ave, Boston, which changed the elevated highways into tunnels. Due to the cold climate, Canada has focused on building underground pedestrian passages and connecting subways, buses, and commercial areas into a large underground network. For example, the Montreal Underground City has a development area of more than 4 million square meters, making it the longest underground pedestrian street system in the world [9]. In Europe, the development of underground space in France focuses on integration, such as the famous La Défense business district, the Les Halles Square complex, etc. At the same time, the drainage system of the capital Paris has a large scale, reasonable design and orderly construction. It has always been a model for many countries in the world. The Swedish cities have good geological conditions, and the large underground drainage system has reached the world’s leading level in terms of quantity and disposal rate. The Russian metro and underground integrated pipe gallery system is developed. For example, the Moscow metro has a total length of 212 km and a total of 249 stations. Japan has benefited from a sound and complete legal system, so its construction scale and maturity railway, complex and underground utility tunnel are internationally leading, especially in large depth underground space [10].
202
Q. Xu
6 Laws, Regulations and Standards Related to Domestic and Foreign Underground Space 6.1 Laws and Regulations Laws and regulations related to underground space in China are as follows: • The Civil Air Defense Law of the PRC(1997): It is the first special law on the underground space with Chinese characteristics. • Regulations on Development and Utilization of Urban Underground Space(1997, 2011): It puts forward for the first time the requirement of urban underground space planning, clarifies the main content of underground space planning. • Compiling Method of Urban Planning(2006): It provides a legal basis for special plans for urban underground space. • Property Law of the PRC(2007): It has achieved a major breakthrough in the ownership of urban underground space development and utilization. • Bidding, Auction and Listing of State-Owned Construction Land Use Rights Regulations(2007): This provision provides a legal basis for bidding, auction, listing and transfer of underground state-owned construction land use rights. • Notice of the State Council on Promoting Economical and Intensive Use of Land (2008): It encourages the development and utilization of above-ground and underground spaces to improve land use efficiency. • Urban and Rural Planning Law of the RPC (2008): It clarifies the principles of underground spaceexploitation at the legal level.
6.2 Standards Current national standards related to underground space in China are as follows: • GB/T 35636-2017 Urban Underground Space Mapping Specification. • GB/T 28590-2012 Classification and Code of Urban Underground Space Facilities. The current industry standards related to underground space in China are as follows: • JGJ/T 335-2014 Basic Terminology Standard for Urban Underground Space Utilization. • MT/T 992-2006 Technical Conditions for Uncabled Communication Equipment for Rock Used in Underground Space.The current local standards related to underground space in China are as follows: • DB31/T 948-2015 Basic Requirements for Safe Use of Underground Space (Shanghai). • DG/TJ 08—2156—2014 Underground Space Planning Specification (Shanghai).
Overview of Underground Space …
203
The current association standards related to underground space in China are as follows: • T/CECS 481—2017 Urban underground commercial space design guidelines. • CECS 402—2015 Urban underground space operation management standard. • CECS 401—2015 Urban underground space development and construction management standards. Foreign standards related to underground space is ANSI/NFPA 520-2010 Standard on Subterranean Spaces.
7 Recommendations for Standardization of Underground Space Exploitation Firstly, establish an underground space standard system. Although China’s underground space development and utilization scale is the largest, with leading surveying methods and construction techniques, the rapid progress has also exposed many problems, which seriously restricts the effective development and utilization of China’s underground space and wastes a lot of resources. It is necessary to make clear and perfect specific provisions on ownership, planning, construction, management, operation. However, China’s current underground space management laws and regulations and policy support are insufficient, and the higher-level law of urban underground space resources is missing. The single file law such as Urban and Rural Planning Law of the PRC, The Civil Air Defense Law of the PRC, Mineral Resources Law of the RPC, Construction Laws of the RPC and Protection of Military Installations Law of the RPC are uncoordinated and do not link, and there is no specific law on the development and utilization of underground space. Secondly, establish a comprehensive coordination mechanism management. The development involves various departments, such as National Development and Reform Commission, Ministry of Housing and Urban-Rural Development of the RPC, Ministry of Natural Resources of the RPC, the Office of Civil Air Defence of the RPC, etc. An integrated coordination mechanism for underground space management should be established, and a special management organization for urban underground space development should be established to form an effective mechanism for underground space development in administrative legislation, overall planning, project approval, design review, project management, safety supervision and technological innovation. Establish a collaborative system of management departments, clarify functions and responsibilities, improve the internal coordination capacity of the government, and form an underground space resource the management pattern of “convergence, combination, connectivity, and convenience”. Thirdly, Promote the formulation and release of essential standards in key technical areas. Analyze the problems faced in the current development of underground space, sort out current needs in standardization, promote the formulation and release
204
Q. Xu
of essential standards in key technical areas of underground space, solve the urgent needs improve the level of industry development. Last, Grasp the future trend of underground space and strengthening the frontier design. In order to adapt to this trend, we should strengthen the frontier design of underground space, comprehensive management, overall planning, innovative investment and financing and income models, innovative theoretical systems and key technologies for underground space development. Acknowledgements This research was financially supported by Standardization Administration of the People’s Republic of China project (Project Number: 572018B-6575).
References 1. GB/T 35636-2017. 2. Ye, Fei, Yongxu Xia, and Bangshu Xu. An introduction of the utilization of underground space, 18–19. Beijing: China Communications Press. 3. Zhu, Hehua, Xiao Luo, Fangle Peng, et al. 2017. Development strategy on urban underground space planning in China. Engineering Science 19 (6): 12. 4. http://www.gov.cn/zhengce/2019-01/24/content_5360927.htm (2019.4.30). 5. Qian, Qihu. 1998. Urban sustainable development and development and utilization of underground space. Chinese Journal of Underground Space and Engineering 18 (2): 69. 6. Qian, Qihu, and Xiaoqiang Chen. 2007. Situation problems and countermeasures of utility tunnel development at home and abroad. Chinese Journal of Underground Space and Engineering 3 (2): 191. 7. You, Xinhua, Guangyao He, Qiangxun Wang, and Lei Zhang. 2019. Current status and development trend of urban underground space in China. Tunnel Construction 39 (2): 173–188. 8. Tajima, K. 2003. New estimates of the demand for urban green space: Implications for valuing the environmental benefits of Boston’s big dig project. Journal of Urban Affairs 25 (5): 641. 9. Besner, J. 2007. A master plan or a regulatory approach for the urban underground space development: The Montreal case. Urban Planning International 22 (6): 16. 10. Kishii, T. 2016. Utilization of underground space in Japan. Tunnelling and Underground Space Technology 55: 320.
Application of Decision-Making Management and Information Management System Based on Big Data Kuo-Min Ko
Abstract Big data is another major technological change after appearing the Internet of things and cloud computing, which affects the academics, enterprise or government. Based on the introduction of big data’s concept and connotation, this paper discussed the application of decision-making management system and information management system in enterprise decision-making, government governance and disaster early-warning, so that to provide some theoretical guidance for practical work. Keywords Big data · Decision-making · Information management · Application
1 Introduction With the rapid popularization of cloud computing technology, coupled with the largescale outbreak of Internet of things and the mobile Internet applications, human beings have entered the era of big data. Gartner, a research organization, defines big data as a massive, high-growth and diversified information asset that requires a new processing model to have a stronger decision-making power, insight into the power of discovery and process optimization [1]. At present, big data technology is also developing rapidly, and begins to be widely used. For example, the use of big data technology can fully and effectively excavate the information contained in big data and can promote people’s understanding of social, economic, political, cultural and other aspects of the law and characteristics of activities [2]. Therefore, it is of great significance to discuss the application of decision-making management and information management system based on big data.
K.-M. Ko (B) Yango University, Fuzhou 350015, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_27
205
206
K.-M. Ko
2 The Application of Decision-Making Management System 2.1 Big Data’s Influence on Decision-Making Management (1) Data management under big data. Enterprises can collect comprehensive data about their management, and use digital methods to analyze and model them, so that to find out the valuable information behind the data. In this way, the probability of possible occurrence of events can be further predicted, and a more reasonable decision-making scheme can be provided for decision-makers. Thus, This can improve the predictability, pertinence and scientific degree of enterprise decision-making [3]. Multi-source data should be cleaned, extracted and integrated before using. First, the traditional database management system and data analysis methods are no longer applicable. Google, Amazon, Microsoft and other enterprises have put forward big data solution, which requires enterprises to update technology to meet the needs of big data processing. Second, the speed of data generation is fast, and the application scenario changes from offline to online, and needs real-time processing. Third, it is the relationship between big data and other data. The biggest change in big data’s era is to replace causality with correlation [4]. By exploring the correlation pattern between the data, we should mine the information in big data. (2) Decision-making participants under big data. Big data has changed the longterm experience, theory and thought of management decision-making methods. Intuitive judgment gave way to accurate data analysis, and big data’s role of decision-making participants changed. First, for high-level managers, traditional decision-making depends on the experience of business leaders because of the scarcity of data and important decisions. However, big data can ensure that from the point of view of problems, there is no need to worry about lack of data or difficulties in obtaining data. Decision-making focuses on the problem itself, and the leader’s task is to find and ask the right questions. Second, for the general managers and employees of the enterprise, the information needed for decision-making can be easily obtained, as well as the decision-making ability is greatly enhanced, and the decision-making tends to rely on the first-line employees of the enterprise. Third, as the media continue to promote and facilitate access to data, ordinary people began to recognize and use big data, and everyone can enter the big data world, so that to become a data analyst and then participate in decision-making [5]. (3) The enterprise decision-making culture under big data. Big data’s influence on enterprise management and decision-making culture is enormous. Big data era is not “what we think, but what we know”. First, when enterprises make decisions with big data, they must first change their mode of thinking. When they encounter important decisions, they should firstly collect, analyze, and then make decisions. The change of thinking of enterprise managers will also improve the executive power of employees in using big data. Using data to drive
Application of Decision-Making Management and Information …
207
decisions, they must make reasonable decisions based on large amounts of data, which requires a long analytical process. The results of big data’s analysis from the front line were used by the employees of the enterprise. Overturning the intuitive judgment of high-level managers will be the biggest change in enterprise management decision-making culture. Second, it is necessary to establish a system of collection, creation, sharing, transmission and encouragement of decision-making knowledge based on decision-making tasks, and to set up a learning-type enterprise culture, so that to improve the ability and level of all members of big data in decision-making [6]. The cultivation of enterprise culture and system based on data decision-making is the objective requirement of big data’s decision-making.
2.2 The Framework of Enterprise Decision-Making Management System The framework of enterprise decision-making management system based on big can be divided into the following aspects: data acquisition, processing and application. There are four main sources of data acquisition: access, transaction, network and purchase. From the model in Fig. 1, we can judge the development trend of enterprises and their industries according to the functions, so that to achieve the purpose of analyzing their own and competitors’ abilities and so on [7]. Through the formulation and implementation, we can make more scientific enterprise decision-making. Only in this way can a dynamic and orderly cooperative mechanism be formed. This mechanism can combine the decision-making system of the enterprise, and it is helpful for the enterprise to conduct right decision-making, so as to improve the advantages of the enterprise in the market.
Fig. 1 Enterprise decision-making management system model based on big data
208
K.-M. Ko
3 Application of Information Management System 3.1 Information Subsystem of Government Governance Under Big Data Information subsystem plays a very important role in the process of government decision-making. It is the nervous system of government decision-making system, which can provide information support for government decision-making, execution, evaluation and monitoring. Big data’s technology provides a very important means to strengthen the information subsystem, which can enhance the ability of the information subsystem to collect, organize, store and transmit information. Thus, it greatly enhances the information in the information subsystem and information analysis and processing capacity. It can also provide a very powerful information basis for government decision-making. Big data technology can provide huge amounts of real-time information data for government departments, so that the information of government decision-making can be transformed from a small amount of sample data to a huge amount of all data [8]. Moreover, it is convenient for government departments to grasp the latest information data, so that to make the government decision-making close to the actual situation to the greatest extent. In this way, the government decision-making behavior can be more accurate and objective, so as to promote the modernization and scientific of government decision-making, and effectively avoid the mistakes in decision-making.
3.2 Disaster Information Management Under Big Data Disaster management aims to effectively deal with and avoid the property loss and life threat to society and people caused by natural disasters, wars, terrorist attacks and other emergency events. It is a continuous process. The main tasks include the prevention when the disaster does not occur, the preparation before the disaster, the response in the disaster process, and the recovery after the disaster occurrence [9]. The main function of disaster information management system is to manage and analyze disaster information, and to help related departments coordinate resources and to provide decision support. Traditional disaster information management has the following shortcomings: it is very difficult to restore and create information network in disaster and after disaster. In the explosion of disaster information, all kinds of users need to process and digest a large number of disaster information. The main communication tools, such as personal computers, do not work effectively and rely on mobile devices such as mobile phones. Therefore, it is necessary to introduce big data technology to meet the needs of information exchange. The information network in disaster events is very vulnerable to damage [10]. Therefore, the efficiency of obtaining and exchanging information in various departments is greatly affected, which requires the ability to obtain timely information. Big data technology has the
Application of Decision-Making Management and Information …
209
ability of situational awareness in disaster information and can provide timely and effective disaster event information. In the explosion of disaster information, all kinds of users need to process and digest a large number of disaster information. However, it is difficult to ensure timely access to valuable information only through human or primary means of information processing. In addition, the redundancy and inconsistency of information will greatly reduce the ability of information processing from different channels. Big data technology can provide advanced data analysis, processing methods and can make decision support, which can help disaster emergency management and disaster recovery.
4 Summary In the process of the rapid development of information technology, social change and economic development have also made considerable progress, and their convergence brought about the rapid growth of data. Thus, big data appeared. Based on the development of network information technology, computer technology and statistical technology, big data’s technology can be analyzed by big data, and the rules and characteristics of the operation of things included in it can be excavated. Only in this way can the understanding of the operation process of things be enhanced and the ability to solve complex problems is improved. The decision-making management and information management system under big data environment is not only a technology, but also a brand-new model for enterprises, governments and related scientific research institutions. However, big data’s research and application has just started. Thus, the road to development is still very long, and the future will bring greater value.
References 1. Junjie, Zhang, and Yang Li. 2015. The Realistic predicament and coping strategy of enterprise decision-making management under the background of big data. Research on Business Economy 07: 106–107. 2. Zhiyan, Feng, Guo Xenhua, Zeng Dajun, Chen Yubo, and Chen Guoqing. 2013. Some frontier topics in the research of business management under the background of big data. Journal of Management Science 16 (01): 1–9. 3. Jun, He. 2014. Analysis of big data’s influence on enterprise management decision. Science and Technology Progress and Countermeasures 31 (04): 65–68. 4. Zhongshun, Li, Zhou Liyun, Xie Weihong, Cheng Minghui, Dong Yanfeng, and Jiang Luan. 2015. Research on big data’s influence on enterprise management decision. Science and Technology Management Research 35 (14): 160–166. 5. Xiaofeng, Meng, and Ci Xiang. 2013. Big data management: Concept, technology and challenges. Computer Research and Development 50 (01): 146–169. 6. Guangqing, Xiong. 2019. Big data’s use of technology and the improvement of government governance. Contemporary World and Socialism 02: 173–179.
210
K.-M. Ko
7. Jiyang, Dong. 2014. Enterprise decision-making in big data’s era. China Management Informatization 17 (24): 43–45. 8. Jianqiao, Cai. 2017. Evolution and trend of public management decision-making model based on big data. Journal of Jishou University (Social Science Edition) 38 (05): 103–109. 9. Yue, Huang, and Li Tao. 2015. Disaster information management in big data’s era. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition) 35 (06): 68–76. 10. Jie, Wu, Yi Meiyu, Zhang Jinhui, and Zhang Qilin. 2016. Design and application of structural behavior monitoring information management system under big data. Journal of Hunan University (Natural Science Edition) 43 (09): 76–81.
Aluminum Foil Surface Defect Recognition Method Based on CNN Hui Wang, Chunhua Gao and Pinglian Wang
Abstract In order to accurately identify the defects on the aluminum surface, including perforation, stains, yellow spots and scratches, etc., a method combining the robust principal component analysis and the convolution neural network is proposed to detect defects on the surface of aluminum foil products. Firstly, the defect area image of aluminum foil was segmented by using the method of robust principal component analysis; Then, using TensorFlow platform to build CNN network model, loading aluminum foil images for training, and save the network model parameters of training results, on the basis of this network model, loading aluminum foil images acquired in real time and classify them, complete defect detection tasks. Experimental results showed that the proposed algorithm has the following advantages such as high accuracy, favorable expansibility and so on, it can be easily applied into surface defect detection for other objects. Keywords Defect detection · RPCA · CNN · Tensorflow
1 Introduction As an important industrial raw material, aluminum foil is widely used in many fields. In the production process of aluminum foil, its surface is prone to some defects, including perforation, stains, yellow spots and scratches, etc. How to use machine vision to identify these defects efficiently and accurately is a critical problem that people always pay attention to. In the traditional automatic surface defect detection methods [1], how to select defect features is always a difficult problem. In recent years, image sparse representation [2–5] has been deemed as a rather effective image representation model attracting extensive attentions from scholars at home H. Wang · P. Wang School of Information and Communication Engineering, Hezhou University, Hezhou, Guangxi, China C. Gao (B) School of Tourism and Sports Health, Hezhou University, Hezhou, Guangxi, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_28
211
212
H. Wang et al.
and abroad, the main idea of low-rank sparse decomposition of defect images is to decompose the images into one part of low-rank backgrounds and the other part of sparse defects. At the same time, the method based on convolution neural network (CNN) is also widely used in many fields [6–9]. In this paper, firstly, the robust principal component analysis (RPCA) method was used to decompose the aluminum foil image into low-rank and sparse parts, and the sparse part was further analyzed to extract the defect areas on the aluminum foil surface. Then, CNN method was used to identify different types of defects on the aluminum foil surface, the method combining RPCA and CNN can realize the effective classification of aluminum foil surface defects. Experimental result shows that it is able to effectively detect and identify defects on surface of aluminum foil, such as perforation, stains, yellow spots and scratches, etc., with fast detection speed and high detection precision. Therefore, it has a preferable practical reference value.
2 RPCA for Aluminum Foil Image Defect Detection The method of robust principal component analysis can automatically identify the severely damaged elements in aluminum foil defect image sequence under certain conditions. It is assumed that the observation data matrix has a low rank, and only a few elements in the original data matrix are damaged, that is, the noise part is sparse, but the size can be arbitrary, the RPCA method can effectively realize the low-rank sparse decomposition of observation data [10]. It can be described as the following Eq. (1). min rank(A) + λE0 s.t.D = A + E A,E
(1)
where, D denote the observation data matrix, A denote the low-rank matrix, E denote the sparse matrix, and λ denote the weight of noise. Besides, || • ||0 represents zero norm. For the RPCA model, IALM algorithm is adopted to carry out relaxation optimization processing, which can effectively separate the low-rank background part and the sparse defect part in the aluminum foil image observation data matrix. Observation data of n groups containing aluminum foil defects, I1 , . . . , In ∈ Rw×h , arrange each set of data into a column vector with the size (w × h) × 1, the obtained aluminum foil image sequence observation data matrix can be expressed as the following Eq. (2). I ≈ [vec(I1 )|· · · |vec(I1 )] ∈ R(w×h)×n
(2)
If we represent each image as the sum of low-rank part and sparse part, I1 = I01 + e1 , . . . , In = I0n + en
(3)
Aluminum Foil Surface Defect Recognition Method …
213
Then, the observation data matrix composed of aluminum foil surface defect image sequence can be expressed as the following Eq. (4). D ≈ [vec(I1 )|· · · |vec(I1 )] = A + E
(4)
where, A = [vec(I10 )|· · · |vec(In0 )] ∈ R(w×h)×n denote the backgrounds, E = [vec(I1 )|· · · |vec(I1 )] ∈ R(w×h)×n denote the foregrounds. To solve Eq. (1) is a NP hard problem. As the rank of the matrix is numerically equal to the number of its non-zero singular values, and the rank of the matrix can be approximated by the kernel norm of the matrix. In addition, it is proved that it is feasible to approximate the zero norm of matrix with one-norm of a matrix [11], in this way, the non-convex problem described by formula (1) can be solved by introducing a kernel norm to carry out convex relaxation and then transformed into a convex optimization problem. min rank(A) + λE1 s.t. D = A + E A,E
(5)
where, ||A||∗ denote the core matrix, ||E||1 is one-norm matrix. The IALM algorithm is used to solve the Formula (5). IALM has a good convergence rate and only needs a few iterations, so it is widely used. min f (x), s.t. h(X ) = 0
(6)
The augmented Lagrangian function of the above constraint optimization problem can be expressed as, L(X, Y,μ) = f(X) + Y, h(X) +
μ h(X)2F 2
(7)
where,μ > 0, denote penalty parameter, y denote Lagrange multiplier, Furthermore, functions f and h are continuously differentiable. Then, the augmented Lagrangian function is adopted to perform convex relaxation on Eq. (5), which can be expressed as the following Eq. (8). L(A, E, Y,μ) = A∗ + λE1 + Y, D − A − E +
μ D − A − E2F 2
(8)
IALM algorithm is adopted to solve Eq. (8) through iteration. In each iteration, x and y are only updated once to obtain approximate solutions of the subproblems, which can also make the algorithm eventually converge to the optimal solution of the original problem. In this way, the algorithm is simpler and converges faster. Low-rank and sparse matrix decomposition of aluminum soil image observation data can be realized. Subsequently, surface defect detections are completed only by analyzing the sparse images obtained.
214
H. Wang et al.
Fig. 1 Aluminum foil defects
(a) perforation
(b) stains
(c) yellow spots
(d) scratches
The aluminum foil defect area image was segmented by using the method of RPCA, then designing and training CNN model to identify different defects.
3 RPCA-Based Extraction of Defect Areas on Aluminum Foil Surface Algorithm running equipment utilized in this paper is equipped with CPU of Intel Core i7 2.0 GHz, internal storage of 2G, Win7 operating system and software development environment MATLAB 7.11.0 (R2010b). In the production of aluminum foil materials the probability of aluminum foil surface defects occurring in the production process is low and the defects typically constitute a small area proportion on a foil image. In other words, a linear relationship may be presumed between a foil image and the background, which may both be roughly deemed to under the same low-rank subspace, and a further presumption is that surface defects are approximately sparse. In this experiment, partitioning is carried out for every single image respectively to obtain an observation data matrix, and RPCA algorithm is utilized to decompose the observation data matrix of image sequence. The surface defect part of the segmented aluminum foil is shown in Fig. 1.
4 Surface Defect Recognition Experiment of Aluminum Foil Based on CNN In designing and training of the CNN network model, a 12 layer CNN network model was constructed, including 2 convolution layers, 2 activation layers, 2 pool layers, 2 local response layer functions, 3 full connection layers and 1 normalized soft Max layer. The structure diagram of the CNN model adopted in this paper see Fig. 2.
Aluminum Foil Surface Defect Recognition Method …
215
Fig. 2 CNN model diagram
The experiment selected 3000 aluminum foil images, there are 2500 images without surface defects, each defect has 500 pictures including perforation, stains, yellow spots and scratches, the picture is unified with the size of 200 × 200. In this paper, the defect recognition method of aluminum foil is based on CNN, the result of defect identification is shown in Table 1. The average recognition rate of perforation, stains, yellow spots and scratches reached 95.88%, and the validity of the proposed method is verified. Concerning Experiment 1 during which partitioning of a single defect image is conducted, the achieved detection results suffer from influences of the size of sub-blocks. In detail, if it is over small-sized, detection results contain too many noises and consume great calculated amounts and take much time. In this paper, an aluminum foil image with a size of 880 × 540 is segmented into 8 sub-block images for processing and the time taken is 0.62 s. With regard to Experiment 2 when lowrank sparse decomposition is carried out for an image sequence formed by multiple images, multiple images are required to be input. In the case that the number of images input is too small, substantial background information is included into the sparse component image acquired by decomposition; otherwise, not only is a lot of time needed, but low computational efficiency can be generated. Moreover, a set of image sequences are formed by 20 images in Experiment 2 and the processing of an image takes 0.68 s on average. Clearly, the application of methods described in this paper into aluminum foil material production lines of a speed from 8 to 10 m/min is able to realize real-time detections. Table 1 The result of defect recognition Identification type
Number to be identified
The number of correctly identified
Recognition rate (%)
Perforation
250
250
100
Stains
200
193
96.50
Yellow spots
150
138
92.00
Scratches
250
234
93.60
Total
850
815
95.88
216
H. Wang et al.
5 Conclusion In this paper, the RPCA-based defect detection method applied into segment the defect areas on the aluminum foil surface. On this basis, the method based on CNN is adopted to complete defect classification. The experimental results verify our theory and applications for identification of surface defects of aluminum foil products shows its availability, algorithms presented in this paper are featured with rather favorable expansibility, and it can be conveniently applied to the detection of surface defects of other products, it has high practical reference value. Acknowledgements The research is supported by the fund project of Guangxi young teachers basic ability enhancement project (2017KY0651), the fund project of Guilin University of Electronic Technology 2017 Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, 2018JGA284, 2016ZZSK15, 1608027, 201711838095, 201811838187.
References 1. Sun, Bao-hua, Yue-ping Han, Qing Xu, et al. 2014. Product surface defect detection based on surf algorithm research. Infrared Technology 36 (6): 503–507. 2. Wang, Hui, and Hong Sun. 2017. Robust principal component analysis for aluminum foil surface defects detection. Journal of Signal Processing 33 (4): 577–582. 3. Yang, B., and L. Zou. 2015. Robust foreground detection using block-based RPCA. Optik— International Journal for Light and Electron Optics 126 (23): 4586–4590. 4. Yao, Ming-Hai, Jie Li, and Xian-Bao Wang. 2013. Solar cells surface defects detection using RPCA method. Chinese Journal of Computers 36 (9): 1943–1952. 5. Wang, P., Q. Chen, W. Qian, et al. 2017. Salient motion detection using proximal robust principal component analysis method. Journal of Electronic Imaging 26 (2): 023004. 6. Liu, X., Z. Liu, C. Li, et al. 2018. Fabric defect detection based on faster R-CNN. In Ninth international conference on graphic and image processing, 91–97. 7. Xu, Y., G. Yu, Y. Wang, et al. 2017. Car detection from low-altitude UAV imagery with the faster R-CNN. Journal of Advanced Transportation 2017: 1–10. 8. Li, S., Z.Q. Liu, and A.B. Chan. 2015. Heterogeneous multi-task learning for human pose estimation with deep convolutional neural network. International Journal of Computer Vision 113 (1): 19–36. 9. Philipp, K., P. Michael, and U. Martin. 2017. Segmentation and classification of colon glands with deep convolutional neural networks and total variation regularization. PeerJ 5: e3874. 10. Wright, J., A. Ganesh, S. Rao, et al. 2009. Robust principal component analysis: Exact recovery of corrupted low-rank matrices via convex optimization. In Proceedings of the conference on neural information processing systems, 2080–2088, Vancouver, Canada. 11. Elad, M., and A.M. Bruckstein. 2002. A generalized uncertainty principle and sparse representation in pairs of bases. IEEE Transactions on Information Theory 48 (9): 2558–2567.
How to Build Hadoop in the Field of Transportation by Cloud Computing Yunhui Gu and Li Fu
Abstract Since the twenty-first century, traffic big data has gained unprecedented attention as the basis of many intelligent transportation solutions. Cloud platform technology and big data mining technology have changed the restrictions of traditional traffic management administrative areas, established a comprehensive and three-dimensional intelligent transportation system, and provided new technologies and new means for traffic supervision, security early warning, and high-efficiency management and control. This paper analyzes the importance of the combination of intelligent traffic data analysis center and traffic big data and cloud platform technology from the technical and functional levels, and proposes the architecture design and implementation of the cloud big data platform based on cloud computing. Keywords Traffic big data · Cloud computing · Hadoop
1 Introduction With the surprising development of new generation information theory, big data platform technology has become one of the important supporting technologies in the field of modern modeling and simulation [1]. In particular, various industries in society are paying more and more attention to data-based applications. The rise of big data has triggered a boom in research on big data and big data in various industries. In response to the application of big data in the real life field, many scholars at home and abroad have made a lot of attempts. Sfrent [2] introduced the big data platform technology into the financial industry. The construction goal is to build a multi-scale, multi-resolution, multi-class, multi-user financial basic economic data system. Elagib [3] proposed the core idea of public transportation big data platform for the current situation of public transportation data across companies, systems, and heterogeneous, and built a public transportation big data platform architecture. Fu Qian [4] pointed out the urgency and importance of establishing a big data information sharing platform for various levels of government in China, and made people think Y. Gu (B) · L. Fu China Academy of Transportation Sciences, 240Huixinli, Chaoyang District, Beijing, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_29
217
218
Y. Gu and L. Fu
deeply. Wang Liang [5] designed and built a geological big data platform based on geological data and business characteristics, explored and studied how to apply big data technology to the geological industry, combined with the existing hardware resources of geological data characteristics, designed and built experiments based on Oracle architecture. Room big data environment. Through the analysis of domestic and international research work on big data, we can find that the research of big data platform is still scattered. Most of the big data platform architecture is based on Hadoop technology [6], and a lot of research focuses on the mining and analysis methods of big data. There is no relevant technical system to support the development of big data platforms. The research of data mining in big data application is still in the development stage. Many public security, e-government and other business information systems still stay at the primary processing level, lack of comprehensive development and application, intelligent analysis and judgment, scientific Decision warning.
2 Analysis of Traffic Big Data and Cloud Computing Technology 2.1 Traffic Big Data Because of the development of sensors and the 4g network, data in the transportation sector has exploded, including various types of transportation services, monitoring and application data, such as various types of traffic and meteorological monitoring of urban trunk roads and highways. Data, GPS data for city buses, rough and passenger vehicles, highway and channel toll data. These data are characterized by massive, multi-source heterogeneity, extremely fast generation and propagation, and contain a lot of useful information, collectively referred to as traffic big data [7]. Traffic big data can’t be processed by conventional data management, data statistics, regression analysis or other processing time, so the information in traffic big data is difficult to be mined. Traffic big data processing technology is based on Hadoop. It is precisely because of the huge amount of data that traditional data processing technology cannot continue to be applied. Therefore, big data processing technology will be correspondingly developed. Traffic big data cannot be processed by conventional data management, data statistics, regression analysis, etc., or the processing time is too long, making it difficult to mine information in traffic big data. Traffic big data processing technology has played an important role in the intelligent transportation systems. Generally speaking, the processing of traffic big data includes data generation, data collection, data storage, data analysis and data display [8]. Common traffic big data processing technologies include distributed databases, data mining, and clustering analysis. The advancement of traffic big data processing technology has benefited from the development of basic disciplines such as computer technology and network technology,
How to Build Hadoop in the Field …
219
sensor technology and mathematics [9]. Various high-performance big data processing systems and algorithms are emerging, serving all walks of life in society and promoting the development of human civilization. With the advancement of technology, some new and more efficient big data processing technologies have emerged as the times require, and become a powerful driving force for continuously promoting big data applications.
2.2 Cloud Computing Technology With the huge change of the big computer-to-client-server in the 1980s, Cloud computing came into being. Cloud computing is a kind of processing technology, which can realize the unification of hardware, software, and some other resources in the WAN or LAN to calculate and storage data. The cloud platform is divided into a storage-based cloud platform, a data-based computing cloud platform, and an intelligent cloud platform that can both compute and storage data [10]. The cloud computing platform consists of many servers and serves a lot of users. In consequence, the cloud computing platform uses distributed storage and redundant storage, which refer to cluster computing and data redundancy, to ensure data reliability. The redundant way that replace the supercomputer with many low-equipped machines based on the cluster computing and task decomposition can reduce the cost. The open source implementation HDFS of GFS developed by Google and Hadoop team is widely used in the cloud computing platform.
3 The Advantages of Big Data and Cloud Computing 3.1 Improve Traffic Safety With the active use of traffic safety and the extensive use of emergency rescue systems, the traffic safety situation has been improved, and the predictability and real-time nature of traffic big data and cloud platform technologies can help improve traffic safety system data. Processing capacity. For example, when the driver performs automatic detection, the driver can perform alcohol detection, fatigue state detection, reaction detection, etc. on the vehicle-mounted device to determine whether the driver is currently in a state of high mental concentration, whether the mental state and the physical state are normal. At the same time, if some detectors on the roadside are combined to detect the driving vehicle and quickly integrate laser, radar, video and other detectors, the vehicle’s driving speed and driving trajectory can be calculated, and the vehicle can be constructed by traffic big data and cloud platform technology. Drive the safety model to determine whether the current vehicle is in a safe driving state and reduce the possibility of a traffic accident.
220
Y. Gu and L. Fu
3.2 Improve the Efficiency of Information Combination Traffic big data and cloud platform help to build a multi-dimensional traffic information system, integrate data warehouses of all fields, jointly build a public transportation information integration utilization mode, and exert overall traffic functions to bring into play the traffic. The new value of the data. For example, the combination of data from the transportation, meteorological and insurance sectors can better study the field of traffic disaster prevention and mitigation.
3.3 Quickly Configure Transportation Resources Traffic management with the help of the traffic big data analysis and process could develop a great overall solution. It not only improve the rational use of transportation resources but also reduce the material and work force of all transportation departments. For example, according to the analysis results of traffic big data and cloud platform, the multi-mode ground public transport network, the efficient passenger flow organization scheme, multi-level ground bus backbone network green wave traffic control are determined.
3.4 Providing Environmental Monitoring Methods Traffic big data and cloud platform technology can reduce the influence of transportation on the environment and reduce the blockage of road traffic. By establishing regional traffic emission monitoring and prediction models, a traffic operation and environmental data test system is established to effectively analyze the influence of transportation on the environment. At the same time, it can also analyze the environmental historical data, provide decision-making basis for intelligent control of traffic signals to reduce traffic delays and emissions of control prototype system.
4 Construction of Hadoop in the Field of Transportation by Cloud Computing 4.1 Traffic Big Data Platform Architecture Design The design of the traffic big data platform should conform to the business characteristics of the traffic itself and the needs of various aspects. Therefore, this paper extracts and summarizes the data of each business, and designs a cloud big data platform architecture with the help of cloud computing. The platform is characterized
How to Build Hadoop in the Field …
221
by distributed, and consists of four layers: data acquisition layer, data storage layer, data analysis layer and data application layer [11]. Specifically as shown in Fig. 1. (1) Data acquisition layer The data acquisition layer is the lowest level of the entire system architecture and is the basis for system operation. It is divided into close-range information collection and long-distance information collection. Near-distance information collection includes sensor monitoring, passenger flow information monitoring, operational evaluation monitoring, maintenance information monitoring, etc., while long-distance information collection includes data of already formed traffic systems, such as subway system information, bus system information, and taxi system information. This information is collected and aggregated by the data acquisition layer, processed and stored according to a certain data model to form big data. The dynamic data in this paper is stored in a distributed database, and the static data is stored in a relational database. All data is supported as data for the big data application layer. (2) Data storage layer The storage layer can store a large amount of data collected by the acquisition layer according to a certain data structure and model. In order to improve the efficiency Short-range information source Operational assess ment
Long-range information source Maintenance
Passenger flow
Operational Sensor monitoring assess ment terminal monitoring terminal
Passenger flow information monitoring terminal
information
Maintenance information monitoring terminal
Subway system
Bus s ystem
Subway terminal
Bus terminal
Taxi system
Taxi terminal
Internet
Data acquisition layer
Sensor
LAN/WIFI
Hadoop
Spark
Oracle
Statistical analysis
Correlation Analysis
Cluster analysis
Fig. 1 Cloud-based traffic big data platform architecture
APP-based mobile data terminal
Data application layer
Remote access terminal based on B/S
Mobile terminal
Manufacturing Sector
Dispatching command system Simulation interface
MySQL
Data analysis layer
Data cleaning
Dispatch center
Maintenance department
Maintenance department and spare parts library simulation system
Data storage layer
Load balancing
222
Y. Gu and L. Fu
of data storage and query, this paper uses the master-slave structure for data storage. This article supports the distributed storage model built by Hadoop and Spark, and also supports the traditional storage mode provided by Oracle and MySQL. From the perspective of the overall architecture, dynamic data is stored using data warehouse technology, while static data is stored in distributed databases. The application of data warehouse technology provides a good foundation for upper-level data analysis and big data applications. (3) Data analysis layer The function of the data analysis layer is to perform big data analysis on the collected and stored data. This layer is the most important part of big data technology in intelligent traffic information system, which involves a large number of big data analysis algorithms such as data cleaning, cluster analysis, correlation etc., to extract intelligent traffic operations. Valuable data information. Among them, the purpose of cleaning is to remove abnormal data and format the original data to help subsequent data processing. Big data mining algorithms such as cluster analysis, correlation analysis, and time series are the core of data stratification, which can provide data reference for intelligent traffic managers and passengers. (4) Data application layer The application layer is the highest system level directly facing the user. The data service layer based on cloud computing technology realizes the organic integration and integration of structured data and unstructured data of the big data platform by using powerful data storage capability and data computing capability. Ability to take advantage of the value of data mining capabilities. Users can add new data analysis modules as needed to complete new big data mining functions.
4.2 Implementation of the Traffic Big Data Platform The cloud-based traffic big data platform architecture design draws on the theory of hierarchical design. According to the service project of big data platform, the platform is reasonably divided into different modular levels. Each level can only pass the interface of the hierarchical boundary with the upper and lower layers. Interactions effectively avoid cross-layer interactions. By designing a hierarchical big data platform architecture, the internal representation of each module is highly cohesive, and the modules are loosely coupled, which effectively improves the reliability of the big data platform and expands the business scope of the big data platform. Facilitate system maintenance. For example, when the big data platform needs to expand the Hadoop cluster, it only needs to add a new Hadoop node server on the basis of the original data platform, without any changes to other system modules, which is convenient and fast, and is convenient for staff maintenance. The logical structure of the cloud computing-based traffic big data platform is shown in Fig. 2.
How to Build Hadoop in the Field …
Zookeeper Distributed Application Coordination Service
Data Service
Computing Framework
Web display
Spark Memory distributed computing framework
223
Application service data support
Map/Reduce Distributed computing framework
Unstructured data/semi-structured data calculation
MySQL Platform Management Database
HBase Real-time distributed database
HDFS Distributed file system
Application service data support
OLAP Online analytical processing Institutionalized data calculation
Oracle Relational Database
Data Storage Backup data
Data Access Cleaning
ETL tool
Data Source
Various file storage
Database linkage
Various types of database storage
Stream processing technology
Various real-time data streams
Fig. 2 Logical structure of the traffic big data platform
5 Conclusion This paper uses cloud computing, big data and other advanced technologies to build a traffic big data platform based on cloud computing, and expounds the four-tier architecture of the platform, and gives the concrete implementation logic structure of the platform. By building a distributed big data platform based on cloud computing, it can realize the effective integration of traffic data resources and provide real-time traffic information services for traffic management departments and the public. It is a beneficial attempt to apply advanced technology to the transportation industry.
References 1. Park, Kyounghyun, M.C. Nguyen, and H. Won. 2015. Web-based collaborative big data analytics on big data as a service platform. International Conference on Advanced Communication Technology. 2. Sfrent, Andrei, and F. Pop. 2015. Asymptotic scheduling for many task computing in Big Data platforms. Information Sciences 319: 71–91. 3. Elagib, Sara B., A.H.A. Hashim, and R.F. Olanrewaju. 2017. A proposed architecture for generic and scalable CDR analytics platform utilizing big data technology. Advanced Science Letters 23 (11): 11149–11152. 4. Jian, Fu, J. Sun, and K. Wang. 2017. SPARK—A big data processing platform for machine learning. International Conference on Industrial Informatics-Computing Technology. 5. Singhal, Ayush, R. Pant, and P. Sinha. 2018. “AlertMix: A Big Data platform for multi-source streaming data.” 6. Abouzeid, Azza, et al. 2009. HadoopDB: An architectural hybrid of MapReduce and DBMS technologies for analytical workloads. Proceedings of the Vldb Endowment 2.1: 922–933.
224
Y. Gu and L. Fu
7. Qi, Shi, and M. Abdel-Aty. 2015. Big Data applications in real-time traffic operation and safety monitoring and improvement on urban expressways. Transportation Research Part C 58: 380–394. 8. Baccarelli, Enzo, et al. 2016. Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. Computers & Chemical Engineering 91 (2): 182–194. 9. Cárdenasbenítez, Néstor, et al. 2016. Traffic congestion detection system through connected vehicles and big data. Sensors 16 (5): 599. 10. Buyya, Rajkumar, et al. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25 (6): 599–616. 11. Zhen, Xie, et al. 2017. Modeling traffic of big data platform for large scale datacenter networks. IEEE International Conference on Parallel & Distributed Systems (in Chinese).
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral Data Using Grey Relational Analysis Wei Guo, Ping Dong, Hongbo Qiao, Haikuan Feng, Huifang Wang and Hui Zhang
Abstract Leaf area index (LAI) is an important parameter to evaluate crop growth and crop yield. The purpose of this study is: using grey relational analysis (GRA) to calculate the typical spectral vegetation index (VI) and LAI correlation, choice the sensitive vegetation index to leaf area index in winter wheat, called GVI; the application of correlation analysis to screen the LAI sensitive vegetation index, called CVI. Then the partial least squares (PLS) method is used to estimate the LAI of GVI and CVI respectively, and the method of determining the optimal VI is determined. The results show that grey relational analysis can improve the estimation accuracy of LAI in winter wheat. Keywords Leaf area index · Vegetation index · Grey relational analysis · Partial least squares
1 Introduction Leaf area index (LAI) is a very important physiological parameter that characterizes crop growth. It is a dimensionless variable that can be defined as the one-sided green leaf area per unit ground surface area. As LAI is relevant to many biological and physical processes of crops including photosynthesis, evaporation, evapotranspiration and carbon cycle and can be well correlated to the biomass and yield of crops [1–4], estimating the LAI of farm crops plays a critical role in measuring crop growth, monitoring plant diseases and insect pests as well as yield estimation and field management [5–8]. While conventional LAI surface measurement derives relatively accurate LAI at a specific location, it is hardly able to provide robust support W. Guo · P. Dong · H. Qiao · H. Zhang (B) College of Information and Management Science, Henan Agricultural University, Zhengzhou 450002, China e-mail: [email protected] H. Feng Beijing Research Center for Information Technology in Agriculture, Beijing 100097, China H. Wang Beijing Municipal Climate Center, Beijing 100089, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_30
225
226
W. Guo et al.
for obtaining mass LAI. Hyperspectral remote-sensing technology, on the other side, enables us to obtain fine spectral data of crop canopies in an easier, faster, more flexible and accurate manner, and thereby offers an effective way for large-scale retrieval of crop LAI by characterizing hyperspectral data and the vegetation indices based on the combinations of these hyperspectral bands [9–11]. While satisfactory results have been achieved in estimating crop LAI with vegetation indices, as each of these indices is relevant to crop LAI, it is impossible to tell which are the most relevant to LAI. This is what we call grey relation. In our study, we introduced a grey scale measurement tool called grey relational analysis (GRA) to analyze the grey relevance between each of the vegetation indices (VI) and crop LAI to select vegetation indices having higher relevance. We also incorporated the commonly used regression analysis to filter vegetation indices having the highest LAI relevance. After this was done, we estimated the crop LAI using partial least squares (PLS) method and verified the result with the measured LAI of the second year before selecting the best filtering scenario as reference for subsequent hyperspectral remote-sensing estimation of crop LAI.
2 Methodology The research area is located at Shunyi and Tongzhou, Beijing the two areas have typical continental climate. Shunyi’ geographic coordinates to latitude 40° 00 –40° 21 , longitude 116° 34 –117° 00 . covering a total area of 1020 square kilometers. Daxing’ geographic coordinates to latitude 39° 36 –40° 02 , longitude 116° 32 –116° 56 . covering a total area of 907 km2 . The growth period was from 2009 to 2010. The field survey was conducted for three stages per year from 2009 to 2010. The first stage was jointing stage, which was conducted during the April 16th to 17th in 2009 and April 21st to 27th in 2010. The second stage was heading stage, which was conducted during May 18th to 19th in 2009 and May 20th to 21st in 2010. Canopy spectral measurements were taken by FieldSpec 3 spectrometer (ASD Inc., Boulder, Colorado, USA). The hyperspectral data were acquired under clean sky and windless conditions, and the test time was only during 10:00–14:00 local time. For eliminate the effect of possible variation of illumination, we calibrated the spectrometer by a white spectral on reference panel when the canopy reflectance was measured 10 times. For every measurement, the spectrometer was above 0.6 m from the canopy, and the field of view was 23°. The spectral wavelengths from 400 to 2500 nm. To reduce the influence of soil and sky, 10 readings were made for each measurement, and three measurements for each plot, the mean value was used as the canopy reflectance for every samples. Sampling location was selected nearby the center of the plots, each sampling. Chooses 20 plants of the winter wheat growing close the center. In the laboratory, measure the length and width of all the leaves. At last, the winter wheat leaf area index was calculated using the Formula 1.
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
L AI =
0.83 ×
227
20
x×y×n 20 × l 1
(1)
where 0.83 is an empirical parameter, the x and y are winter wheat Leaf length and width. Symbol l is row spacing. Grey relational analysis (GRA) is a systematic analysis process that finds the relevance between characteristic data sequences reflecting systematic behaviors and correlation factor sequences affecting systematic behaviors. Its principle is to measure the relevance between characteristic data sequences and factors of main systematic behaviors, process them and provide a quantitative description of the effects of these factors on the system. Our study demonstrates that, when the vegetation indexes selected by GRA (Table 1) are used to estimate LAI, their relationship is both stable and feasible (Table 2). Partial least squares (PLS) method is the extension of a multiple linear regression model that is especially helpful when we try to predict dependent variables with a very large set of independent variables. In its simplest form, it refers to a linear model between dependent variables Y and independent variables X, expressed as: Y = b0 + b1X1 + b2X2 + · · · + bpXp
(2)
Here in this equation, b0 is the intercept of regression coefficient; bi is the regression coefficient; Xi is independent variable 1 to p. Table 1 Summary of selected vegetation indexes citations for LAI Name
Function
Resource
NDVI
N DV I = (R800 − R670 )/(R800 + R670 )
Rouse et al. (1974)
I R −ρ R 2.5 1+ρ N ρI RN+6ρ R −7.5ρ B
EVI
EV I =
Green NDVI
G N DV I = (ρ N I R − ρG )/(ρ N I R + ρG )
Gitelson et al. (1996)
Blue NDVI
B N DV I = (ρ N I R − ρ B )/(ρ N I R + ρ B )
Wang et al. (2007)
Green-Red NDVI
G R N DV I = [ρ N I R − (ρG + ρ R )]/[ρ N I R + (ρG + ρ R )]
Wang et al. (2007)
Green-Blue NDVI
G B N DV I = [ρ N I R − (ρG + ρ B )]/[ρ N I R + (ρG + ρ B )]
Wang et al. (2007)
Red-Blue NDVI
R B N DV I = [ρ N I R − (ρ R + ρ B )]/[ρ N I R + (ρ R + ρ B )]
Wang et al. (2007)
Pan NDVI
P N DV I = [ρ N I R −(ρG +ρ R +ρ B )]/[ρ N I R +(ρG +ρ R +ρ B )]
Wang et al. (2007)
ANDVI
AN DV I =
ρ N I R −ρ R +(1+0.5)(ρG −ρ B ) ρ N I R +ρ R +(1+0.5)(ρG +ρ B )
Note Ri denotes reflectance at band i (nanometer)
Huete et al. (1997)
Liu et al. (2008)
228 Table 2 Grey correlation degree and rank of vegetation index for LAI at the whole growth stages
W. Guo et al. Vegetation index
Grey correlation
Orders
NDVI
0.750458
5
EVI
0.801417
2
GNDVI
0.697225
7
BNDVI
0.665695
8
GRNDVI
0.767299
4
GBNDVI
0.771134
3
RBNDVI
0.801619
1
PNDVI
0.647952
9
ANDVI
0.743721
6
From literature review, many hyperspectral vegetation indices can represent LAI. To select the optimal ones, we selected ten hyperspectral vegetation indices having definite physical implications, high recognition and higher LAI correlation and compared them with LAI (Table 2).
3 Results and Analysis Firstly, band calculation was performed on hyperspectral data obtained in 2009 from the 81 sampling points. Gray relational analysis was conducted between the 10 different hyperspectral vegetation indices from each sampling point and the LAI at this point. Then, the vegetation indices were prioritized by grey relation degree between each vegetation index and LAI. As can be observed from Table 2, by grey relevance with LAI, the vegetation indices come in the following order: RBNDVI > EVI > GBNDVI > GRNDVI > NDVI > ANDVI > GNDVI > BNDVI > PNDVI. From this result, the top five vegetation indices are RBNDVI, EVI, GBNDVI, GRNDVI and NDVI. Calculation revealed that these indices remain in the same position in terms of grey relevance degree with LAI whether it be the entire growth stage, the regreening stage, jointing stage or flowering stage (data of the jointing, heading and flowering stages are not presented here), which also confirms their relatively constant relation with LAI. Secondly, to compare with grey relational analysis, correlation analysis was also conducted between the ten different vegetation indices obtained from each of the 81 sampling points in 2009 and the LAI at this point. Table 4 presents the correlation analysis result between LAI and vegetation indices. As can be observed from this table, the ten vegetation indices are all very significantly correlative to LAI. The best correlative vegetation index is GNDVI, whose r and R2 are as high as 0.818 and 0.669. By LAI correlation, these significant vegetation indices are prioritized as GNDVI > PNDVI > GRNDVI > ANDVI > BNDVI > RBNDVI > NDVI > EVI > GBNDVI. From correlation analysis (Table 3) and grey relational analysis (Table 2)
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
229
Table 3 Relationships between LAI and Vis Vegetation index
Simulated equations
R
R2
Orders
NDVI
y=
+ 3.563
0.797**
0.635
7
EVI
y = 0.263x + 1.003
0.780**
0.609
8
GNDVI
y=
+ 0.254
0.818**
0.669
1
BNDVI
y = 0.005x + 7.067
0.807**
0.652
5
GRNDVI
y=
+ 2.942
0.811**
0.658
3
GBNDVI
y = 0.185x + 3.839
0.732**
0.536
9
RBNDVI
y = 0.252x + 3.006
0.806**
0.649
6
PNDVI
y=
+ 2.716
0.814**
0.662
2
ANDVI
y = 0.126x + 3.916
0.807**
0.652
4
0.117x 0.045x 0.363x
0.516x
Note **and *represent significant at the 0.01 and 0.05 level of probability, respectively
between LAI and vegetation indices, there is some difference between their position by correlation and that by grey relevance. As grey relational analysis nondimensionalizes all data, the resulting grey relevance degree gives a better description of the relation between LAI and each vegetation index. Correlation analysis, on the other side, takes account of only the correlation between LAI and each vegetation index without nondimensionalizing the data. This also explains why there is a difference between their position based on correlation analysis and that based on grey relational analysis. As discussed above, as grey relational analysis nondimensionalizes all data, the resulted relation between LAI and vegetation indices is more comparable and thereby better describes the relation between LAI and each vegetation index. Thirdly, to further validate that grey relational analysis contributes to higher estimation accuracy when it is used to select vegetation indices for LAI estimation, five vegetation indices having the highest relevance based on grey relational analysis and five vegetation indices having the highest correlation based on correlation analysis were separately used to estimate the LAI of wheat in the study area throughout its growth period by means of PLS method. The former include RBNDVI, EVI, GBNDVI, GRNDVI and NDVI. The estimation equation was y = 0.23–47.6691NDVI + 6.3264EVI-42.1258GBNDVI + 47.6273GBNDVI + 32.5619RBNDVI, referred to hereinafter as Model 1. The latter include GNDVI, PNDVI, GRNDVI, ANDVI and BNDVI. The estimation equation was y = 2.0521 + 31.4247GNDVI-23.6538BNDVI-59.8182GRNDVI + 39.7936PNDVI + 18.3953ANDVI, referred to hereinafter as Model 2. As can be observed from Table 4, all the LAIs resulted from Model 1 have significantly higher r and R2 values than those from Model 2, suggesting that the winter wheat LAI directly resulted from vegetation indices based on grey relational analysis provides significantly higher estimation accuracy. Finally, to verify how correctly the estimation models worked, we measured the error between the predicted LAIs from Model 1 and Model 2 with the measured LAIs and hyperspectral data of winter wheat in the study area throughout its growth period
230
W. Guo et al.
Table 4 The correlation of winter wheat LAI with VIs at the whole stages Simulated equations
r
R2
RSME (%)
Model 1
y = 0.23–47.6691NDVI + 6.3264EVI-42.1258GBNDVI + 47.6273GBNDVI + 32.5619RBNDVI
0.6486**
0.4208
1.9392
Model 2
y = 2.0521 + 31.4247GNDVI-23.6538BNDVI-59.8182GRNDVI + 39.7936PNDVI + 18.3953ANDVI
0.6411**
0.4110
1.9722
Note ** and *represent significant at the 0.01 and 0.05 level of probability, respectively
from the 62 sampling points of 2010. The result demonstrates good relationship between the measured values and the predicted ones. These values were verified according to equations y = 0.5674x + 0.5277 and y = 0.4941x + 0.8023, where the R2 values are 0.4567 and 0.4244, and RMSE values are 1.3526 and 1.3602 respectively (Fig. 1). The result also confirms that vegetation indices based on grey relational method provides more accurate LAI estimation of winter wheat. This is mainly because all the vegetation indices are standardized by grey relational analysis.
4 Conclusions Our studies demonstrate that, when Estimating winter wheat LAI in conjunction with PLS, vegetation indices having higher LAI relevance based on grey relational analysis provide higher estimation accuracy than the vegetation indices having higher LAI correlation based on correlation analysis. When GRA-PLS is used to estimate the LAI of winter wheat throughout its growth period, the R and R2 values are 0.6486** and 0.4208; and the RMSE values are 1.9392. When correlation analysis plus PLS is used for the same purpose, the R and R2 values are 0.6411** and 0.4110; and the RMSE values are 1.9722. The LAI estimation models based on these two methods were verified with the measured LAI in the same area in 2010 according to equations y = 0.5674x + 0.5277 and y = 0.4941x + 0.8023. The resulted R2 values are 0.4567 and 0.4244; and the resulted RMSE values are 1.3526 and 1.3602. As demonstrated above, grey relational analysis provides higher estimation accuracy when it is used to select vegetation indices for estimating the LAI of winter wheat throughout its growth period. However, while we have proved that the winter wheat LAI estimation models based on GRA and PLS are quite reliable, as our experiment was limited to the two districts of Shunyi and Tongzhou of Beijing, to build a winter wheat LAI estimation model that applies to the entire municipality, a lot of additional data will have to be accumulated.
Filtrate Estimating Factor of Wheat LAI Based on Hyperspectral …
231
(1) Model 1
(2) Model 2 Fig. 1 Relationships between predicted LAI and actual LAI at the whole growth stages for winter wheat
Acknowledgements This research was supported by the National Natural Science Foundation of China (41501481), Henan Science and Technology Research Program (172102110055), Colleges and universities in Henan province key scientific research project (15A210028) and Youth Scientific Research foundation of BAAFS (Winter wheat growth variance monitoring through remote sensing in Beijing suburb). We would also like to thank Beijing Agro-technical Station for providing the wheat hyperspectral samples. We are also most grateful to the anonymous reviewers for their helpful comments.
References 1. Veroustraete, F., J. Patyn, and R.B. Myneni. 1996. Estimating net ecosystem exchange of carbon using the normalized difference vegetation index and an ecosystem model. Remote Sensing of Environment 58 (1): 115–130.
232
W. Guo et al.
2. Pu, Ruiliang, and Peng Gong. 2000. Hyperspectral remote sensing and applications, 82–83. Beijing: Higher Education Press. 3. Feng, Wei, Yan Zhu, Xia Yao, et al. 2009. Monitoring leaf dry weight and leaf area index in wheat with hyperspectral remote sensing. Chinese Journal of Plant Ecology 33 (1): 34–44. 4. Liu, Liangyun, Xiaoyu Song, Cunjun Li, et al. 2009. Monitoring and evaluation of the diseases of and yield winter wheat from multi-temporal remotely-sensed data. Transactions of the VDSR 25 (1): 137–143. 5. Song, Kaishan, Bo Zhang, Zongming Wang, et al. 2007. Based on wavelet analysis is Glycine max leaf hyperspectral inversion area. Chinese Journal of Ecology 26 (10): 1690–1696. 6. Koger Cliff, H., M. Bruce Lori, et al. 2003. Wavelet analysis of hyperspectral reflectance data for detecting pitted morningglory (Ipomoea lacunosa) in soybean (Glycine max). Remote Sensing of Environment 86 (1): 108–119. 7. Shi, Tiezhu, Junjie Wang, et al. 2015. Estimating leaf nitrogen concentration in heterogeneous crop plants from hyperspectral reflectance. International Journal of Remote Sensing 36 (18): 4652–4667. 8. Fletcher, Reginald S., and Krishna N. Reddy. 2016. Random forest and leaf multispectral reflectance data to differentiate three soybean varieties from two pigweeds. Computers and Electronics in Agriculture 128: 199–206. 9. Eriksson, H., L. Eklundh, K. Hall, et al. 2005. Estamating LAI in deciduous forest stands. Agricultural and Forest Meteorology 129: 27–37. 10. Jing, Huaan, Dianwei Liu, Zongming Wang, et al. 2008. Remote sensing estimation model of wetland vegetation LAI in Sanjiang Plain. Chinese Journal of Ecology 27 (5): 803–808. 11. Li, Rendong, and Jiyuan Liu. 2004. Estimating wetland vegetation biomass in the Poyang Lake of central China from landsat ETM data. International Geoscience and Remote Sensing Symposium (IGARSS) 7: 4590–4593.
Financial Auditing Accounting Method Based on Computer Network Xiaoyan Ma
Abstract Research on Accounting Methods in Financial Auditing With the continuous improvement of social and economic level, the era of information technology has come. With the sustained and stable development of China’s economy, people are paying more and more attention to economic development and pursuing higher economic benefits [1–4]. Traditional accounting methods can no longer meet the current situation of financial management. In modern society, computer technology and information technology have been applied to all walks of life, and have gradually become the main direction of the development of accounting methods [5–7]. With the in-depth development of reform and opening up, it is necessary to continuously innovate and reform accounting methods in order to meet the needs of the current era for financial work and accounting [8–10]. Therefore, we should strive to improve the level of accounting, look at the problem from a developmental perspective, realize the improvement of accounting methods, and at the same time improve the working level of financial management personnel [11, 12]. Based on the computer network, this paper discusses the new method of financial accounting audit under computer network technology. Keywords Computer network · Financial audit · Accounting methods
1 Introduction Accounting has always been an important job in the operation and management of enterprises, and has played an irreplaceable role in the development of enterprises. The work of financial audit is an important part of the actual accounting work, which can correctly respond to the production and operation of enterprises. Only by reflecting and managing the company’s capital flow through financial audit and making accurate judgment on the financial statements and other information in enterprise management can we effectively analyze the financial and capital problems existing X. Ma (B) Shandong University of Arts, Jinan Shandong 250014, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_31
233
234
X. Ma
in the enterprise and let the company adopt correct solutions. In the financial management of an enterprise, financial auditing also has the function of supervision, which can ensure the correctness and accuracy of the enterprise’s work. At the same time, it can also accurately manage the income and capital flow of the enterprise and improve the economic benefits of the enterprise to the greatest extent.
2 The Basic Meaning of Financial Audit in Financial Supervision Accounting supervision can effectively ensure the smooth progress of basic financial accounting work and improve the overall financial management level. The main content of financial auditing is to make true and accurate records of financial accounting, and to supervise and manage the truthfulness and accuracy of financial statements according to accounting principles. The basic starting point of financial auditing is to supervise the financial statements of enterprises and correctly reflect the capital status and flow direction of enterprises. Financial audit records the assets and funds of an enterprise truly, and uses accounting audit to realize overall supervision. Its main function is to prevent illegal behaviors of the enterprise, and at the same time it can also realize macro—control. In the management of enterprises, financial auditing can effectively curb the violation of regulations and laws in enterprises, and can also effectively ensure the smooth organization and management of enterprises, laying a foundation for the development of enterprises. Financial audit is a scientific examination of accounting. The main research content is the true record of accounting work, so as to help enterprise management make correct decisions through correct accounting information.
3 Accounting Methods in Accounting Auditing 3.1 Check the Relationship and Check Method In the process of audit management, the related accounting data should be taken as the guide line of the cross-checking relationship and supplemented by the checking method. The check method mainly refers to the use of more than two kinds of written information to carry out relevant cross—checks, to check whether there are differences between the two sides and whether the final calculated data are correct. In the process of checking, relevant problems can be found, and objective and accurate analysis can be carried out on the generated problems to judge the causes of the relevant problems. Through this way to analyze the problem, and use the relevant results to accurately formulate solutions, to minimize the economic losses of enterprises, to ensure the circulation of funds.
Financial Auditing Accounting Method Based on Computer Network
235
3.2 Account Correspondence and Account Analysis In the process of enterprise operation and management, double-entry bookkeeping is the main form of accounting method, which establishes a dependency and comparison relationship between accounts. Such a method is called account correspondence. In the process of auditing, the correspondence between accounts is taken as the main key point, and account analysis can be used in a variety of ways. The account analysis method is mainly based on the correlation of accounts, and finds out the unreasonable phenomena, at the same time, it can accurately and timely find and solve the problems. In the process of accounting, bank deposits and loans are systematically analyzed and managed to check the relevant existing conditions, providing an important guarantee for future inspection and management, finding problems in time and proposing solutions.
3.3 Process Analysis In the process of auditing work, we should regard the internal control system as the main body, and can accurately use the flow control chart analysis method in the process of work, and then strictly examine and evaluate the internal control system of the enterprise. The process analysis method mainly refers to drawing the internal control chart of the relevant project under examination into a matching flow chart, and finding out the relevant problems existing in the project by analyzing the basis of the whole flow chart. The advantage of this method is that it can direct the problems existing in the project more directly and comprehensively, analyze them at the same time and then solve them accurately by writing, and can directly use special colors to mark the errors in the flow chart, thus laying a good foundation for the work of auditors.
4 Accounting Methods in Information Age 4.1 Fair Value Measurement In the information age, fair value has become the main content of current accounting circles. With the development and change of society, historical cost measurement and fair value measurement have become the main contents of discussion. Historical cost measurement method and fair value measurement method are two main methods, but practice shows that the advantages of fair value measurement method are obviously higher than historical cost measurement method. The advantage of fair value measurement is that it can more accurately reflect the business status and
236
X. Ma
liabilities of enterprises. But at present, history metrology still occupies a major position in enterprises and is still the main accounting method in the process of auditing. In the era of information development, accounting systems have been widely used in data processing of various information and have the main feature of automation. Therefore, fair value measurement method is very accurate in data processing.
4.2 Moving Weighted Average Method To a certain extent, the traditional accounting work generally uses the first-in firstout method and the moving weighted average method, which can effectively ensure the accuracy of the data, but also has some shortcomings. For example, in the firstin-first-out method, in the process of using inventory, if the price of inventory is calculated for each use, the operating efficiency of the system will be reduced, and at the same time the speed of accounting will be reduced, resulting in a decrease in the efficiency of audit work. The effective application of weighted average method can not only reduce the workload of auditors, effectively improve the working level and efficiency, and save the cost of enterprises. In the process of using the moving weighted average method, there is also the disadvantage of untimely information, which requires timely updating of the accounting system. In today’s society, the development of cross-level information and data collection is mainly in a dynamic direction. The accounting information system should update the inventory price in a timely manner. The accounting system should realize the automation of mobile weighted accounting to ensure the smooth management of enterprises.
5 Measures to Improve Accounting Level 5.1 To Ensure the Independent Accounting Work The main principles of accounting work are independence, objectivity and accuracy. Enterprises should ensure the independence of the accounting supervision department and realize the function of accounting supervision in the management of enterprises. Therefore, it is necessary to continuously improve the management level of accounting work so that it can be carried out independently. In the daily management and operation of an enterprise, it is necessary to establish a corresponding responsibility mechanism to divide the accounting posts reasonably so that the responsibilities of each post can be accurately implemented. To establish a good power and responsibility system, clear responsibilities of all parts; To ensure that the accounting work can be carried out independently, and clear the relevant responsibility system; To achieve the coordination of accounting work and other departments, and to ensure the independence of accounting work, effectively improve the management level of
Financial Auditing Accounting Method Based on Computer Network
237
accounting work. In the aspect of enterprise management, it is necessary to ensure that the management can have the accounting concept, improve the overall accounting awareness, and improve the supervision system within the enterprise, enhance the supervision level of the enterprise, effectively enhance the economic benefits of the enterprise, realize the development of the enterprise itself, and allow the enterprise to occupy an advantageous position in the stimulated market competition.
5.2 To Improve the Supervision Level of Accounting Work In the operation and management of an enterprise, managers should accurately grasp the actual situation of the company and take this as a starting point to continuously promote the improvement of the supervision and management level so that the supervision system can play an important role in the enterprise. In coordinating the internal systems and relationships of enterprises, it is necessary to ensure that attention is paid to the internal supervision of the accounting work, to build an auditing department, to let the staff of the auditing department carry out accounting in all aspects, to develop problems and solve problems in a timely manner, and to cooperate with relevant departments to supervise the accounting work in all aspects. In terms of management, it is necessary to establish a people-oriented management concept, strengthen the management of enterprise financial personnel, and improve the enterprise financial management system and concept.
6 Conclusion To sum up, under the background of the information age, the operation and development of enterprises are facing various risks and challenges. In order to realize the sustainable development of the enterprise itself, we should strive to improve the level of accounting work. In the process of continuous development of market economy, enterprises should continuously improve their competitiveness, perfect and optimize the accounting system, and continuously carry out skills training in personnel management to improve the professional skills of auditors. At the same time to improve the level of supervision within the enterprise, for the enterprise. Accounting work provides sufficient development space to maximize the economic benefits of enterprises.
238
X. Ma
References 1. Hou, wenchuan. 2017. Research on accounting methods in financial audit. Ten-Day Issue of Corporate Culture (12): 140–141. 2. Li, miao. 2017. Research on accounting methods in financial auditing. Global Market (24): 125–126. 3. Liu, mengting. 2017. Research on accounting methods in financial auditing. Study of Finance and Accounting (7): 114–115. 4. Min, zhihui, lei ao, xia mingyue. 2015. Analysis of accounting methods in accounting audit. Brand (Second Half) (5): 116. 5. Lopes, I.T. 2015. Research methods and methodology towards knowledge creation in accounting. Contaduría Y Administración 60 (Supplement 1): 9–30. 6. Parlakkaya, R., H. Akmese, and K.A. Akmese. 2014. Status Quo of international financial reporting standards and international standards on auditing: A research on the accounting professionals in Konya. Procedia Economics & Finance 15: 1663–1670. 7. Laitinen, E.K. 2014. The association between CEO work, management accounting information, and financial performance: Evidence from finnish top managers. Journal of Management Control 25 (3–4): 221–257. 8. Boritz, J.E. 1986. The effect of research method on audit planning and review judgments. Journal of Accounting Research 24 (2): 335–348. 9. Guanting, Chen. 2007. Positive research on the financial statement fraud factors of listed companies in China. Auditing Research 2 (6): 25–34. 10. Bryant, L. 2003. Relative value relevance of the successful efforts and full cost accounting methods in the oil and gas industry. Review of Accounting Studies 8 (1): 5–28. 11. Baber, W.R., and P.K. Sen. 1984. The role of generally accepted reporting methods in the public sector: An empirical test. Journal of Accounting and Public Policy 3 (2): 91–106. 12. Lin, Z.J., and M. Liu. 2010. The determinants of auditor switching from the perspective of corporate governance in China. Advances in Accounting 26 (1): 117–127.
Wireless Temperature Control System of Big Grain Depot Mingzhi Wang and Xueyi Wang
Abstract It also introduce the working theory and design the method of the temperature system, which working core is AT89C51 SCM. Control system is made up by PC computer and extension computer, the extension respond for monitoring temperature of single depot, the communication method is wireless between main and extension computer, digital temperature sensor DSl8820 collects the temperature signal and transmit the digital signal to SCM, and then the temperature data should be transmit to PC computer by wireless communication module PTR8000. Wireless communication can make the CRC verify and special coding for transmitting data, which enhance the reliability of data transmission. Keywords SCM · Digital temperature sensor DSl8820 · Wireless communication · PTR8000 · Communication
1 Introduction The original grain storage grain test adopts a manual method of sampling the grain divisions of each library, which has a large workload and is not reliable. In recent years, with the development of computer technology and the improvement of measurement technology, the traditional manual method to measure the temperature of grain was gradually replaced by electronic temperature testing equipment. Small grain storage equipment generally uses a small thermometer to detect grain temperature, and large and medium grain storage equipment has been gradually equipped with a microcomputer temperature measurement system. Monitor the grain temperature in the computer room, and use the microcomputer to analyze and compare the grain temperature data.
M. Wang (B) Jilin Teachers’ Institute of Engineering and Technology, Changchun 130052, China e-mail: [email protected] X. Wang Changchun Colored Oriental Casting Ltd, Changchun 130000, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_32
239
240
M. Wang and X. Wang
2 Design of the Monitoring System For the large grain storage area, the controlled objects are dispersed, and the degree of automation is high, the layered system structure and decentralized system installation are adopted. The whole system can be divided into three layers from the structure: the microcomputer system constitutes the upper computer user monitoring layer, and the 89LV51 single-chip system constitutes the main control unit control layer and the extension measurement layer [1]. Master control unit can be used in an extension of master-slave distribution structure of long distance communication through wireless communication. The working process of the system is as follows: the communication of the system adopts the inspection mode, and the PC machine issues a temperature data read command to the main control machine at regular intervals. After receiving the command, the master computer first transmits the most recently measured data stored in the RAM to the PC in sequence [2]. After the completion of the transmission, main control unit sent the first extension read temperature data command, the command via communication microcontroller coding backwardness to wireless transmission module. The first extension sends the received signal to the communication MCU of the extension for decoding, and the decoded command is sent to the extension CPU [3]. After the extension CPU interprets the command, the data stored in the extension SRAM is sequentially uploaded to the master through the code of the extension communication Single chip microcomputer. After the host computer receives the verification and corrects the error, it updates the saved data of the corresponding location in the memory, can then be sent a second extension temperature data upload command, and so on, until all extensions have patrolled. The extension uses the gap of the communication to continuously read the latest temperature value measured by the temperature sensor in the grain store, thereby updating the data in the extension SRAM for the master to read. All commands and data are checked by CRC-16. If the receiver fails to verify the received command (data), the frame data will be discarded and then wait for the next reception. On the other hand, if the sender does not respond to the receiver for a certain period of time, the sender will consider that the previous transmission error will organize the retransmission [4]. If the retransmission fails three times, the sender will abandon the transmission of the command and perform subsequent work. System PC monitoring software using VB software realization, the interface is beautiful and reliable. Thanks to the standard graphical user interface, the operation is very convenient and intuitive. User software functions generally include data reading, display, alarm parameter settings, and so on.
Wireless Temperature Control System …
241
3 The Overall Design of the Extension Project Under temperature measurement task is mainly composed of a machine to complete. The lower position machine is the most complicated part of the whole monitoring system. It mainly completes the multi-point temperature acquisition, measurement line and measurement point selection and data sorting. When the master calls the lower computer, the lower computer sends the data wirelessly to the master. In the extension, the main program of the main MCU 89LV5 1. mainly completes the start of temperature conversion, the acquisition of temperature data, the storage of temperature data, and the main program flow diagram, as shown in Fig. 1. Fig. 1 Master flow chart
242
M. Wang and X. Wang
3.1 Temperature Data Acquisition The temperature sensor uses the digital temperature sensor DSl8820. DSl8820 internal structure is mainly composed of a 64-bit lithography ROM, temperature sensors, non-volatile temperature alarm trigger TH and TL, high speed register of four parts. DSl8820 pins are arranged as shown in Fig. 2. DSl8820 control method: On the hardware, there are two ways to connect DSl8820 to MCU: one is that Vcc is connected to external power supply, GND grounding, the I/O lines connected to the microcontroller. Another is the use of parasitic power supply, the Vcc, GND ground, 0/O is connected to microcontroller I/O [5]. Whether internal parasitic power supply or external power supply, the Xsl-fo line should be connected to the load resistance is about 5 k The DSl8820 has six control commands, as shown in Table 1. The access process for DSl8820 is: first initialize DSl8820, then execute the ROM operation command, and finally execute the memory operation and data operation. Each step of the DSl8820 is subject to strict working timing and communication
I Packaging PI-35 Packaging Fig. 2 DSl8820 pin distribution diagram
Table 1 DSl8820 Control command table Instruction
Contract code
Operation instructions
Temperature conversion
44H
Start DS18B20 for temperature conversion
Read register
BEH
Read the scratchpad 9 bytes of content
Write register
4EH
Write data to TH, The TL byte of the scratchpad
Copy register
48H
Write TH and TL bytes of the scratchpad to E2RAM
Re-adjust E2RAM
B8H
Write the TH and TL bytes in E2RAM to the scratchpad TH, TL byte
Read power supply mode
B4H
Start the DS18B20 to send the signal of the power supply mode to the main CPU
Wireless Temperature Control System …
243
protocols. If the host controls the DSl8820 to complete the temperature conversion process, according to the DSl8820 communication protocol, there are three steps: DSl8820 must be reset before every read and write. Reset after the success, send a ROM instruction, and finally send RAM instructions. This allows the DSl8820 perform scheduled operations.
3.2 Wireless Data Communication The transmission of data is highly susceptible to interference, so the transmission errors are inevitable. PTR8000 has good anti-interference and transmission performance. PTR8000 applies to point to multi-point wireless communication, built-in data protocol and CRC error detection, error free output, monitor the output carrier. Enforcement point to multipoint communication hardware control, comprehensive upgrading wireless module PTR2000 series.
3.2.1
Wireless Transmission Chip PTK8000
PTR8000 is multi-channel multiband, run (1.9 ~ 3.6 V low voltage), 2 ua standby power consumption. Subminiature built-in loop antenna, 430/868/915 MHz highperformance embedded wireless mode stable performance and is not affected by the outside world, is not sensitive to the power supply. Maximum transmitted power + 10 DBM, high anti-jamming GFSK modulation, frequency hopping, 50 KBPS data rate, the only carrier to monitor output, address matches the output, output data is ready. Built-in complete communication protocol and CRC, all of the wireless transmission and transfer can be done through the SPI, wireless communication and SPI communication as convenient. Basic electrical characteristics as shown in Table 2 Table 2 Table of basic electrical characteristics Parameters
Value
Unit
Work pressure
1.9–3.6
V
Maximum transmission power Maximum data transfer (Manchester code) The working current in power output to 10 DBM Working current in a pattern
10
dBm
100
Kbps
11
mA
11
mA
Temperature range
−400 to 85
°C
The sensitivity of the typical
−100
dBm
Working current in power mode
2.5
uA
244
3.2.2
M. Wang and X. Wang
Hardware Design
The hardware interface is shown in Fig. 3. Figure 3 shows the user interface of the PTR8000, which consists of 10 digital inputs and output I/O. It can be divided into three groups according to the work: 1. Model Control This interface is composed of TRX_CE, TX_EN and PWRS. Control of PTR8000 four work modes: shutdown mode and SPI programming model; Standby and SPI programming model; Propagation model; Receiving mode own and SPI programming modes; standby and SPI programming modes; transmit mode; receive mode. 2. SPI Interface Interface SCK, MISO, MOSI and CSN components: in the configuration mode, MCU configures the working parameters of PTR8000 through SPI interface. In the sending and receiving mode, MCU SP1 interface is responsible for the data transceiver. 3. Status Output Interface Provide carrier detect output CD, address matching output AM, output data to the DR. Fig. 3 Hardware interface circuit
Wireless Temperature Control System …
3.2.3
245
Software Design
PTR8000 software programming: because of the high-speed signal processing associated with RF protocol part has been embedded into the module, so the PTR8000 can be used with all kinds of low cost single chip microcomputer [6], and so on high speed processor with DSP systems. VI ’R8000 provides a SPI interface, rate set by the microcontroller itself interface rate decision. AM in RX mode, address matching, and data ready DR signals to single chip microcomputer has been effectively address and data packets, microcontroller through SPI read the received data. In TX mode, automatically generated PTR8000 cow preface and CRC check code, DR prepared data signals to MCU data transmission has been completed. This means that reduce the memory requirements of MCU and reduce the cost of the MCU, and reduce the time of software development [7]. Wireless data transmission system microcontroller software flow chart, as shown in Fig. 4.
Fig. 4 Flow chart of wireless data transmission system’s microcontroller software
246
M. Wang and X. Wang
After power-on, the MCU first configures the VI ’R8000 module, and first sets PWRS, TXEN and TRX_CE switch to the configuration mode. The MCU moves the configuration data into the frrR8000 module through the SPI [8]. After the power-down and standby modes work, the configuration content is still valid, and the configuration data is lost only when the power is removed. When the MCU has data to be sent to the specified node, the address (Tx_address) and valid data (“IX-payload”) of the receiving node are transmitted to the PTR8000 through the SPI interface. The application protocol or MCU settings are connected to the u speed. The MCU sets TRX_CE and TX_EN high to initiate transmission [9].
4 Master Design 4.1 Overall Design In the main control unit, the serial port of the main MCU needs to exchange data with the communication MCU, and also communicate with the computer. The MCU has only one serial port, which cannot meet the needs at the same time. Therefore, a communication selection circuit is used here. Data from the computer sent to the first communication microcontroller RXD side, and then received by communication microcontroller. Wireless communication module receives the data by communication MCU PA sent to the single chip microcomputer to decode, two kinds of data preprocessing controlled by communication. Then the main microcontroller via a serial port to the RXD end, it doesn’t produce cow communication block. Data transmission, the MCU is in a state of active transport, communication circuit can choose transmission selection object.
4.2 Centralized Display and Processing of Data The use of the grain storage monitoring system is ultimately user-oriented, so the development of user monitoring software will determine whether the system can operate conveniently and efficiently. For large and medium-sized grain storage monitoring systems, most of the system designers complete the design tasks of user software. The system host computer monitoring software is realized by VB software, and its interface is beautiful and reliable [10]. Thanks to the standard graphical user interface, the operation is very convenient and intuitive. User software functions generally include data reading and display, and alarm parameters are not set. There are also some software that have a grain analysis decision function.
Wireless Temperature Control System …
247
5 Conclusion In summary, although the design methods of the grain storage monitoring system are not the same, the ultimate goal is the same. At present, many state-owned grain depot and local grain depot is still using artificial temperature management. The use of distributed computer grain storage monitoring system can greatly improve the modern management level of grain storage, save a lot of manpower and material resources, reduce expenses and food losses in food storage. With the modernization of the grain depot, as an automatic monitoring system for grain storage grain, it will have a good application prospect.
References 1. Shousong, Hu. 2007. Automatic control principle. Beijing: Science Press. 2. Jue, Chai. 2009. The principle and application of single chip microcomputer. Xi’an: Xidian University Press. 3. Jiansheng, Chang. 2009. Detection and conversion technology. Beijing: Mechanical Industry Press. 4. Jixiang, Gao. 2006. Electronic instrument design. Beijing: Publishing House of Electronics Industry. 5. Hanfang, Sun, and Xu Aiqing. 1992. Principle and application of MCS-51/96 series microcontrollers, 1st ed. Beijing: Beijing University of Aeronautics and Astronautics Press. 6. Wei, Wu, and Zhang Jing. 1999. Highly stable wireless transmitter module F05A. Modern Communication. 7. Changjiang, Xie, and You Lihua. 1999. Relative humidity measurement using IC sensor. Measurement and Control Technology. 8. Haitang, Zhang. 1999. Visual C++ 6.0 programming guide, 1st ed. Beijing: Aviation Industry Press. 9. Haoqiang, Tan. 2007. C language programming. Beijing: Tsinghua University Press. 10. Haiming, Jing. 2006. Power electronics technology. Beijing: Beijing Posts and Telecommunications Press.
Springback Modification for Biaxial Bending Plate and Its Validation in Multi-point Forming Qingfang Zhang, Hengyi Yuan, Linlin Li, Hongfen Wang and Songqing Liu
Abstract An new algorithm of springback modification is proposed for biaxial bending plate with variable curvature. By the algorithm, the precision forming for Multi-point die can be realized. The idea of discretization is introduced into the algorithm, the whole sheet metal surface was divided into micro-plate elements. The curvature formulas of micro-plate elements were given after springback modification. Based on curvature information of the discrete micro-plate elements, a series of characteristic points obtained by interpolation. Then, The theory of Bezier surface joining is applied to reconstruct the whole bending surface after springback modification. Due to the die surface of multi-point forming is reconfigurable, discrete elements in upper and lower multi-point dies are adjusted to reconstructed surface after modification. According to the compensated and modified shapes, finite element models for multi-point forming are established and analyzed. Experiments have also been completed with multi-point dies. And the results of simulation and experiment are compared with desired shapes, the contrast results show that the springback modification algorithm can effectively controlling forming precision for biaxial bending plate with variable curvature. Keywords Springback modification · Biaxial bending plate · Interpolation processing · Precision controlling
1 Introduction Die surfaces of Multi-point forming (MPF) are composed by discrete punch elements, it is obviously different from traditional solid stamping forming. The contrast between stamping and MPF is shown in Fig. 1, stamping forming with matched solid dies, while MPF with punch matrices. Meanwhile, because of its special forming mode in MPF, elastic cushions are used to restrain dimples. Reconfigurable die surfaces in MPF make flexible and rapid forming more easily. So MPF shows great Q. Zhang · H. Yuan (B) · L. Li · H. Wang · S. Liu Jilin Engineering Normal University, 3050 Kaixuan Road, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_33
249
250
Q. Zhang et al.
(a) Solid stamping
(b) Multi-point forming
MPF
(c) MPF die Fig. 1 Contrast between stamping and MPF
advantages in small-lot and individualized production. And the MPF technology is suitable for manufacturing various 3D surface shapes in many fields.
1.1 Precision Forming by Springback Modification Method Springback is always inevitable and it is one of the key problems in MPF and solid stamping, it also impact on the precision of products seriously. Once the springback value exceeds the allowable tolerance, it will influence the whole assembly. Compensation method based on calculated springback value is one of the main modification methods. By modifying and compensating the die surface, the shape after unloading will match well with the target shape, precision forming can be realized. Although MPF has flexible and adjustable characteristics, the springback problem can not be ignored. Iteratively forming technology was used in MPF for controlling springback, its disadvantages are multiple adjusting, materials wasting and a lot of manual works.
Springback Modification for Biaxial Bending Plate …
251
The springback problem of MPF, especially for irregular surface forming, still needs to be solved urgently.
1.2 Some Research on Springback Modification and Precision Controlling In recent years, many studies have been made on springback modification, forming accuracy and springback calculation methods. For example, Liang [1] established a theoretical model to calculate multi-point bend-forming moments and predict springback. Liu [2] proposed a predictive and simplified model of springback, it was used to sandwich sheets forming. Hamid [3] introduced the effects of work hardening and blank holder force on springback, he mentioned a calculated model for springback in U-bending of duplex steel. Alhammadi [4] investigated the influence of various parameters on springback, including die opening height, testing materials, and thickness of sheet metal, etc. Xie [5] simulated the stamping and twist springback, and proposed a new equation for calculating torsional springback, the method is based on three hardening models and calculate the angle between two ends of double C-rail. Wang [6] investigated strategies including ‘squeezing’ and ‘reverse bending’ for reduction of springback in double side incremental forming. Birkert [7] developed a physical compensation method and created compensated die geometries with equal-in-area die surfaces. Jiro [8] carried out a springback cause based on the stress distribution. Hyun Sung [9] thought that springback prediction can be realized well in roll forming, so long as Bauschinger effect, non-linear transient hardening, variable unloading modulus and other parameters of materials can be considered in the simulation. Karsten [10] reported a prediction method of springback behavior for ultra-high strength tension spring by finite element analysis method.
1.3 Establishing Springback Modification Algorithm for Biaxial Bending Plate Although a lot of researches have been made and achievements have been gained in springback modification, the results are dispersive, and the research on biaxial bending plate with various curvature is relatively few. So, springback modification algorithm is established in this paper for irregular biaxial bending plate. Die surface compensation in MPF can be realized more rapidly and easily, validation of the algorithm will be carried out by MPF experiments. By the method, the forming accuracy of multi-point die can be improved, and the target shape can be formed well in one time.
252
Q. Zhang et al.
2 Springback Compensation and Modification Algorithm 2.1 Algorithm for Curvature Before Springback It is assumed that a rectangular plate with thickness t is only subjected to the action of uniform bending moment M x on its opposite edge and M y on the other. Its numerical value is equal to the applied bending moment. For the linear hardening material model, the simplified case of elastic-linear hardening is considered, Linear reinforcement factor is δ. And the bending moments are loaded proportionally. The yield of x and y should occur at the same time. Based on Mises yield criterion and thickness stress integral, the formula of stress distribution moment is: ⎧
1/2 zs ⎪ ⎪ ⎪ Mx = 2 σx bzdz + 2 σs + δσs zzs − 1 bzdz ⎪ ⎪ ⎪ z 0 ⎪ ⎪ s 2 ⎪ ⎨ = Ezs 2 κx + μκy t2 − zs (1 − δ) + δt3 1−μ 4 3 12zs (1)
t/2 zs ⎪ ⎪ z ⎪ σ M = 2 σ bzdz + 2 + δσ − 1 bzdz y y s s zs ⎪ ⎪ ⎪ 0 ⎪ zs 2 ⎪ 2 ⎪ ⎩ = Ezs 2 κy + μκx t − zs (1 − δ) + δt3 1−μ
4
3
12zs
In the formula, σ s is the initial yield stress, μ is the Poisson ratio, σ x is the stress of x axis, while σ y is y axis, κ x is the curvature of bending surface of x axis, while κ y is y axis, E is the elastic modulus, and zs is the length between initial yield fibers and the center surface along thickness directions. Based on Eq. (1) and Mises yield criterion, following equations can be gained: ⎧ ⎪ ⎪ κx = ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ κy = ⎪ ⎪ ⎩
2σs σσxy −μ
2 21 λEt 1− σσxy + σσxy 2σs 1−μ σσxy
2 21 λEt 1− σσxy + σσxy
f
=
κx
2 (1−δ)(1+ zts )(1− 2zt s )
=
κy
2 (1−δ)(1+ zts )(1− 2zt s )
f
(2)
where (κfx , κfy ) are curvatures of target shape. The curvatures of springback modification (κx , κy ) are shown as follows: ⎧ ⎪ ⎪ ⎪ ⎪ ⎪ κ = ⎪ ⎨ x ⎪ ⎪ ⎪ ⎪ ⎪ κ = ⎪ ⎩ y
2 2 −1 1− σσxy + σσxy −μ
√ 2 √ σ √ f 3σs σxy −μ + 33 κx Et 1− σσxy + σσxy (cos α3 − 3 sin α3 ) Et 2 2 −1 1− σσxy + σσxy 4σs2 1−μ σσxy
2 √ √ √ f 3σs 1−μ σσxy + 33 κx Et 1− σσxy + σσxy (cos β3 − 3 sin β3 ) Et 4σs2
σx σy
(3)
Springback Modification for Biaxial Bending Plate …
253
2.2 Modification Algorithm for the Construction of Biaxial Bending Surface The idea of discretization is introduced into the algorithm, the whole sheet metal surface is divided into micro-plate elements. The irregular target surface which we need is a given quantity, that is, the curvatures (κfxi , κfyj ) of the micro-plate elements are given. Then, the curvatures (κxi , κyj ) after springback modification can be calculated by Eq. (3). The discrete micro-plate elements which determined by the curvatures in x and y directions, can be regarded as a quadrangle with four control points. According to the interpolation formula, a serious of surface feature points can be described along x and y directions. The curves can be written as follows by interpolation: ⎧
m si i sk ⎪ ⎪ ⎪ ∫ x(s cos ϕ(s κ ds ds = x(s + + ) ) ) 0 0 xi ⎨ i i=1 si−1 k=1 sk−1
m si i sk ⎪ ⎪ ⎪ ∫ z(s sin ϕ(s κ ds ds = z(s + + ) ) ) i 0 0 xi ⎩
k = (1, 2, 3, . . . , i) (4)
k=1 sk−1
i=1 si−1
⎧ j sl n si ⎪ ⎪ ⎪ ∫ κ y j ds ds cos θ (s0 ) + ⎪ ⎨ y s j = y(s0 ) + j=1 si−1 l=1 sl−1 j sl n s j ⎪ ⎪ ⎪ ∫ κ y j ds ds sin θ (s0 ) + ⎪ z (si ) = z(s0 ) + ⎩ s j=1 s j−1
l=1
l = (1, 2, 3, . . . , j) (5)
l−1
where s is the small arc length of every micro-plate surface, ϕ(si ) are the angles between tangent direction of arc s and x axis, while θ (sj ) are the angles between s and y axis. The characteristic points of the plate element are inversely calculated, and a series of characteristic points matrices on the surface of compensating springback are obtained by Eqs. (4) and (5). Then, a smooth and continuous surface after springback compensation can be reconstructed by Bezier surface blending method (as shown in Fig. 2). In Fig. 2, the k × l-th (k = 0, 1, 2, …, l = 0, 1, 2, …, j) Bezier surface blending equation is described in u and v directions: l p=0 q=0 B p,k (u)Bq,l (v)W p,q V p,q k l p=0 q=0 B p,k (u)Bq,l (v)W p,q
k P(u, v) =
(6)
where P(u,v) is the point vectors on surfaces, Vp,q express the control points, W p,q are the weight factors which are bound up with Vp,q , B p,k (u) and Bq,l (v) are Bernstein functions. The whole surface expression is expressed in matrix form as follows:
254
Q. Zhang et al.
Fig. 2 Bezier surface blending
⎤ P0,0 (u, v) P0,1 (u, v) · · · P0, j (u, v) ⎥ ⎢ .. .. .. P(u, v) = ⎣ ⎦ . . . ⎡
Pi,0 (u, v) Pi,1 (u, v) · · · Pi, j (u, v) Construction of Biaxial Bending Surface after springback modification can be realized by Eq. (7).
3 Simulation, Experiment Validation and Error Analysis 3.1 Finite Element Analysis Model MPF which involves large changes of shape, geometric and material nonlinearity, is analyzed by finite element analysis (FEA) software ABAQUS. Die surface information data described by Eq. (7) are imported into MPFCAD software. Based on this, the position information of the punch matrices in the FEA model is determined. In simulation, the dynamic explicit algorithm is suitable for dealing with MPF process (the FEA models of MPF are shown in Fig. 3), two irregular biaxial bending plate (waist drum surface and double wave surface) are simulated and analyzed. And static implicit method is suitable for unloading process. When importing explicit analysis results of forming parts, it is necessary to import the stress and strain data first. Then, removing the multi-point dies and elastic cushion in the process to eliminate the constraints on the sheet metal. At last, imposing appropriate constraints on the sheet metal to eliminate the rigid body movement in the springback process.
Springback Modification for Biaxial Bending Plate …
(a) waist drum surface
255
(b) double wave surface
Fig. 3 The FEA models of MPF
3.2 Simulation Results Figure 4 shows Z-direction displacement of two doubly curved plates. The meshes represent the bending surface before unloading, the color contour represent the final shape after unloading. It can be observed that the curvature after springback is less than that of the sufaces before springback. The maximum springback value of Z-displacement for waist drum surface is 1.34 mm, and double wave surface is 3.47 mm. In order to analyze and contrast the value of errors, maximum error E z is defined, it refers to the maximum Z-direction difference value between simulation and target results. Meanwhile, the formula of relative error E g is defined:
Eg =
m
(Z v − Z v )/
v=1
m
Z v × 100%
v = 1, 2, . . . , m
(8)
v=1
In the formula, the amount of the sampling points is defined m’, Z v represents the Z-direction value of each sampling points in the simulation results, while Z v’ represent the target shape in the same coordinate system.
(a) waist drum surface Fig. 4 Z-displacement distribution
(b) double wave surface
256
Q. Zhang et al.
Table 1 Errors comparison of two surfaces between simulation and target E x /mm
E y /mm
E z /mm
E g (%)
Waist drum surface
0.29
0.35
0.37
1.89
Double wave surface
0.43
0.56
0.69
2.45
Table 1 shows errors comparison of two surfaces between simulation and target. Comparing with the target shapes, the doubly curved plates with springback modification is similar to the target shape, and the error is very small. The maximum error of X and Y axis direction is 0.29 and 0.35 mm for waist drum surface, 0.43 mm and 0.56 mm for double wave surface. Relative error E g is less than 3%. The shapes obtained with springback modification are consistent with the target shapes.
3.3 Experimental Results and Analysis of Springback The die-face of MPF is reconstructed by punch groups. The position for each punch in x and y directions is fixed, and the displacement in the Z direction is controlled during forming. The calculation result of the die surface process is shown in Fig. 5a. According to the height data of punches, the multi-point die is adjusted by the control system. MPF software is shown in Fig. 5b, and the adjusting result is shown in Fig. 5c. The MPF experiments with modification are carried out, formed parts are shown in Fig. 6. The forming trend of parts is consistent with the target shape, and the forming quality is well. In addition, parts without springback compensation are formed with the target surface as the die surface. Comparing the measured three-dimensional surface information with the target shape, the forming errors can be obtained. Errors between measured results and target shapes as shown in Fig. 7. Table 2 provides a list of errors between simulation, measurement and target surface. Two parameters are defined as E 1 and E 2 , E 1 represents the error value between
(a) calculation result
(b) MPF software
Fig. 5 Die surface adjusting of MPF
(c) adjusting result
Springback Modification for Biaxial Bending Plate …
257
Fig. 6 Formed parts
(a) waist drum surface
(b) double wave surface Fig. 7 Errors between measured and target shapes Table 2 Errors between simulation, measurement and target surface With modification E1
Without modification E2
E1
E2
Waist drum surface E z /mm
0.37
0.88
1.26
1.34
E g (%)
1.89
2.35
8.21
9.13
Double wave surface E z /mm
0.69
0.90
1.31
1.41
E g (%)
2.45
2.93
8.25
9.32
258
Q. Zhang et al.
simulation and target, and E 2 is the difference of contrast between measurement and target. According to the results of experiments and simulations, it is found that values of E 1 and E 2 are smaller with springback modification, all less than 1 mm. With modification, the values of E g for two surfaces are all less than 3%, while without modification, E g is relatively larger, about 10% approximately. That means the application of modification algorithm is effectively benefit for precision controlling.
4 Conclusion Springback compensation and modification algorithm of biaxial bending plate are proposed. And the theoretical calculation results are applied to simulation analysis and MPF experiments. By comprehensive analysis between simulation, measurement with modification and target profile, the overall relative errors E g of two surfaces are less than 3%, that is satisfied the industrial production. The forming error of the workpiece without springback modification is larger, which shows that it is difficult to get the accurate target surface. It is also found that the surface after springback modification can match the shape of the target very well, and the error range is small, which also proves that the springback modification algorithm described in this paper has good prediction effect and application value. And the algorithm can also be applied to conventional stamping. Acknowledgements This research was supported by Program for Innovative Research Team of Jilin Engineering Normal University (IRTJLENU).
References 1. Liang, X.B., Z.Y. Cai, and X. Zhang. 2018. Forming characteristics analysis and springback prediction of bi-directional trapezoidal sandwich panels in the multi-point bend-forming. The International Journal of Advanced Manufacturing Technology 98 (5–8): 1709–1720. 2. Liu, J.G., and W. Xue. 2016. Unconstrained bending and springback behaviors of aluminumpolymer sandwich sheets. International Journal of Advanced Manufacturing Technology, 1–13. 3. Hajbarati Hamid, and Asghar Zajkani. 2019. A novel analytical model to predict springback of DP780 steel based on modified Yoshida-Uemori two-surface hardening model. International Journal of Material Forming 12 (3): 441–455. 4. Aysha, Alhammadi, Rafique Hafsa, and Alkaabi Meera. 2018. Abu Qudeiri Jaber: Experimental investigation of springback in air bending process. Materials Science and Engineering 323 (1): 12–21. 5. Xie, Yan-Min, Ren-Yong Huang, Wei Tang, Bei-Bei Pan, and Fei Zhang. 2018. An experimental and numerical investigation on the twist springback of transformation induced plasticity 780 steel based on different hardening Models. International Journal of Precision Engineering and Manufacturing 19 (4): 513–520. 6. Wang, Hongyan, Runfeng Zhang, Huan ZhangQi, and HuJun Chen. 2018. Novel strategies to reduce the springback for double-sided incremental forming. International Journal of Advanced Manufacturing Technology 96 (1–4): 973–979.
Springback Modification for Biaxial Bending Plate …
259
7. Birkert, A., B. Hartmann, and M. Straub. 2017. New method for springback compensation for the stamping of sheet metal components. Journal of Physics: Conference Series 896 (1): 12–67. 8. Hiramoto, Jiro, Masaki Urabe, Akinobu Ishiwatari, and Fusahito Yoshida. 2017. Simple Springback cause analysis using measured shapes of dies and pressed part. Key Engineering Materials 725: 683–688. 9. Hyun Sung Choi, Yoon, Jeong Whan, Lee, Jong Sup, and Kim, Geun Ho. 2019. A Springback prediction of 1.5 GPa grade steel in roll forming process for automotive sill-side inner component. Key Engineering Materials 794: 267–274. 10. Richter, Karsten, Franz Reuther, and Roland Muller. 2019. Simulation-based approach to predict the springback behavior of ultra-high strength spring strips. Materials Science Forum 949: 48–56.
E-crime Management System for Future Smart City M. M. Kamruzzaman
Abstract Architecture of an E-crime management system for future smart city is proposed in this paper. The architecture is divided into four main components: Police Station, Server, Internet and Citizen of smart city. Citizen of smart city can use any type of microcomputer such as: smart phone, tablet, laptop or desktop to register a case from online. Specification of server to make it secure and reliable is listed in this paper. Investigation center is equipped with Forensic Services, Artificial intelligence and Analytics module and connected with the main server. All information related to investigation and criminals can be stored in this system for further proceeding. At present, part of the proposed architecture is designed and implemented which is also described in this paper. Keywords E-crime · Smart city · Management system · Artificial intelligence · Forensic Services
1 Introduction A smart city is a set of artifacts that provides better services for government and private organization such as electricity, transportation, water, sanitation, waste management and so on; reduces useless resource consumption, wastage and overall costs; and makes life easier for people living at that city by using information and communication technologies (ICT). While enhancing facilities through ICT, people and organization are facing complex challenges continuously, including crime and terrorism. Recently, Kenya faced such as terrorist strikes on its cities and coastal towns which has made a big impact on tourism—the second largest contributor to the economy. The Criminal Scene Investigation (CSI) department is usually responsible for recording offences, collecting evidence and looking for criminals and preventing crime. E-crime management system will be used by police force for crime detection, M. M. Kamruzzaman (B) Jouf University, Sakaka, Al-Jouf, KSA, Saudi Arabia e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_34
261
262
M. M. Kamruzzaman
conviction and prevention by gathering and retrieving intelligence-based information from existing records. The proposed system will gather criminals’ information in its own database and it will be linked with the server of smart city where all information of people living at that city is available. The police force will able to get information about any citizen from the database of smart city and identify the offenders by matching information in their own system. The objective of this work is not only identifying criminal but also making a system which will provide complete solution for the work of police station including boo king, investing, managing the cases, case management, investigations, booking systems, storing demographic information in databases, next generation automated biometric identification system, forensic analysis (Latent, DNA), mobile platform, integration and capability of sharing data with global agencies, intelligence reports, and analytics as well as comprehensive ad hoc reporting. The citizen of smart city who registered the case could also get free access for their queries, complaints and improvement at any time from online by login to the system using user name and password. The citizen of smart city could lodge a complaint if they see that there has been no progress made on the case or investigation has not been done properly. Officers in the police force could also monitor the complains and check progress. Numerous features have been included with the proposed system which are absent in present crime management system. For example, webcasting with 3D view which is incorporated with the investigation center to give virtual 3D analysis of crimes scenes and criminal. This system analysis and publishes part of investigation result through online with the help of blogs for enabling people to post ideas, thoughts, and remarks on crime which are linked with facebook, linkedIn, twitter, wikis and other social media. Citizen of smart city can communicate using text or voice chat, video conference through this system. Crime, security and privacy for smart city have been widely studied [1–4]. Intelligent crime prevention technologies & system based on spatial information was explained in [1]. The present condition of security and privacy of smart cities is studied in [2]. Evaluation of cyber risks using artificial intelligence for critical infrastructure has been described [3]. [4] uses mobile and social networking technologies for smart and safe cities. However, to the best of the author’s knowledge, architecture of an E-crime management system for future smart city is unprecedented in the literature which is proposed in this paper.
E-crime Management System …
263
2 Architecture The architecture of proposed E-crime management system for future smart city is divided into four main components (Fig. 1). The following are the four main components: 2.1 Citizen of smart city 2.2 Internet 2.3 Server Setup
Fig. 1 Architecture of an E-crime management system for future smart city
264
M. M. Kamruzzaman
2.4 Police Station
2.1 Citizen of Smart City Any citizen of smart city can submit of Online First Information Report (FIR)/Complaint from online without physically going to the police station. The steps of submitting FIR/Complaint are as follows: – – – – –
Visit this link. It is a form where you have to fill several fields. At first you need to register with this system using username, email and password. Login the to the system using username and password Click on Add Case from menu.
– Write the date of case – Address of place where case occurred. – After
this
you
need
to
describe
your
case
in
detail.
– Set initial state as not resolved – Upload picture or video of crime – Click on save
2.2 Internet Any citizen can use any type of microcomputer such as smart phone, tablet, laptop or desktop to connect with this system using internet. For optimal and recommended performance the proposed system used following specification: – For optimal performance, this system needs greater than or equal to 5Mbps for download and upload. – The recommended internet speed is 1500Kbps for download and upload
E-crime Management System …
265
2.3 Server A secure and easy to handle server is required to host website easily and reliably. Centralized web farm management, powerful admin tools, security and reliability. Issues are taken under consideration to implement the server of proposed system [5]. Those issues are explained in following sections:
2.3.1
Centralized Web Farm Management
Centralized web farm management is considered for the proposed system when servers host multiple instances of an application.
2.3.2
Reliability
There are several issues which have been taken care to ensure reliability of the system such as: routing and load balancing, powerful tools for diagnostic test, compression and dynamic caching, rewriting URL, saving data in local and cloud database, error tracing etc.
2.3.3
Security
Highest concern has been taken on security issues to implement this system such as: providing different privileges to the users, environment for developing the software is separated from testing or producing the software, installing the patches for security on time, monitoring the serve, uninstalling the modules which are not necessary, using strong firewall.
2.3.4
Powerful Admin Tools
A powerful administration tools is used for managing the server. Administrator can easily handle the configuration, user account, diagnostic test, administrative account of developers or content owners.
2.4 Police Station The police station is responsible for checking the online request of FIR. If FIR is valid (all information is available), police will accept and forward it for investigation.
266
M. M. Kamruzzaman
Fig. 2 Process for FIR at police station for E-crime management system for future smart city
Start Login by user (police)
Opening the complaints/ FIR
Not Complete
Verifying the complaints/ FIR Yes Formally accept complaint/ FIR and insert into database
Send back to complainer
Update the status and inform to citizen Send for investigation
Notify citizen after investigation and inform proceedings
End
Investigation department will investigate the FIR and submit the report to the system. An automated email will be sent to the citizen of smart city with required information for preceding the FIR. The process for FIR at police station can be shown by following flowchart (Fig. 2): The police station depends on CIS department for crime investigation reports, criminal personal details, case status, and results of investigation process. Investigation center should be rich with built in state of the art probabilistic matching system including text, images, tattoo matching for finding criminal. To ensure a single click reporting system with transparency and accountability, the proposed system considers following aspects:
2.4.1
Database for Criminal
Investigation Department needs complete data of criminals and crime for performing fruitful investigations. The proposed system has a database to manage criminals and crimes information. The database stores finger prints, name of criminals and crimes,
E-crime Management System …
267
ID card information, passport information, vehicles information; and weapons and threats. Any police station can search records anytime for investigation through online. All authorized users are able to view and comments on important information and share among themselves.
2.4.2
Database for Forensic Services Department
The proposed system also provides a database for forensic services department. This database stores Deoxyribonucleic acid (DNA), fingerprints, facial images for using in future to help police force understanding criminal patterns, identify clues in mysterious cases and incidents [6, 7].
2.4.3
Artificial Intelligence and Analytics Module
This module uses artificial intelligence (AI) with probabilistic analytics to help police for preventing the crime before it happens [8–10]. Third party software will be integrated with this system for getting benefit of AI-driven facial recognition. This software will help to collect video from cameras which are installed at different places in city; find abnormal or unusual behavior; and alerts police if it detects criminal behavior.
3 Implementation Part of the proposed system is implemented for testing using windows 2016 server with PhP and MySql. An Entity Relationship (ER) Diagram is shown in Fig. 3. The login page for this system is presented in Fig. 4. The registration page of this system is presented in Fig. 5. The list of criminal stored in database is presented in Fig. 6. Any citizen of smart city can submit an online FIR using the form shown in Fig. 7.
4 Conclusion Architecture of an E-crime management system for future smart city is proposed and activities of four main components, i.e., Citizen of smart city, Internet, Server Setup and Police Station are described in detailed in this paper. Any Citizen of smart city can use any type of microcomputer such as: smart phone, tablet, laptop or desktop to register and track a case from online. Police stations are connected with investigation center and database of smart city. So proposed system can stop many crimes before occurrence, provide a user friendly interface to handle crime related issues, increase the transparency of FIR handling, and the accountability of police officers. Part of the
268
M. M. Kamruzzaman
Fig. 3 ER diagram for E-crime management system for future smart city
Fig. 4 Login page for E-crime management system for future smart city
proposed architecture is implemented and tested and now we are trying to integrate Forensic Services Department, Artificial intelligence and Analytics module with our system.
E-crime Management System …
Fig. 5 Registration page for E-crime management system for future smart city
Fig. 6 FIR form for E-crime management system for future smart city
269
270
M. M. Kamruzzaman
Fig. 7 Displaying criminals from database in E-crime management system for future smart city
Acknowledgements The authors would like to thank the reviewers for the suggestions which help to improve the quality of this paper. In addition, the authors are also very thankful to Jouf University, Sakaka, Al-Jouf, KSA (No. 40/140) for providing fund and resources.
References 1. WooChul, C., and N. JoonYeop. 2017. Relative importance for crime prevention technologies as part of smart city based on spatial information. In 2017 Smart City Symposium Prague (SCSP), 1–5, Prague. 2. Cui, L., G. Xie, Y. Qu, L. Gao, and Y. Yang. 2018. Security and privacy in smart cities: Challenges and opportunities. IEEE Access 6: 46134–46145. 3. Falco, G., A. Viswanathan, C. Caldera, and H. Shrobe. 2018. A master attack methodology for an AI-based automated attack planner for smart cities. IEEE Access 6: 48360–48373. 4. Ballesteros, J., B. Carbunar, M. Rahman, N. Rishe, and S.S. Iyengar. September 2014. Towards safe cities: A mobile and social networking approach. IEEE Transactions on Parallel and Distributed Systems 25 (9): 2451–2462. 5. Kamruzzaman, M.M., M. Wang, H. Jiang, W. He, and X. Liu. 2015. A web-based remote laboratory for the college of optoelectronic engineering of online universities. In 2015 Optoelectronics Global Conference (OGC), 1–6, Shenzhen. 6. Liu, A., H. Fu, Y. Hong, J. Liu, and Y. Li. October 2019. LiveForen: Ensuring live forensic integrity in the cloud. IEEE Transactions on Information Forensics and Security 14 (10): 2749–2764.
E-crime Management System …
271
7. Taha, K., and P.D. Yoo. April 2016. SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization. IEEE Transactions on Information Forensics and Security 11 (4): 811–822. 8. Chen, Xue, Lanyong Zhang, Tong Liu, and M.M. Kamruzzaman. 2019. Research on deep learning in the field of mechanical equipment fault diagnosis image quality. Journal of Visual Communication and Image Representation. https://doi.org/10.1016/j.jvcir.2019.06.007. 9. Yin, P., and M.M. Kamruzzaman. 2019. Animal image retrieval algorithms based on deep neural network. Revista Científica, FVC-LUZ/XXIX (2): 188–199. 10. Liang, Rui, Hui Zhi, M.M. Kamruzzaman. 2019. Methods of moving target detection and behavior recognition in intelligent vision monitoring. Acta Microscopica 28 (4): 750–759.
System Dynamics-Based Simulation of E-commerce Industry of Ethnic Regions in China Haiying Ma
Abstract As the national strategic emerging industry, e-commerce industry is attracting more attentions. In order to deeply understand the dynamic mechanism of the E-commerce industry development, this paper divides the e-commerce industry development system into four interrelated subsystems on the basis of system dynamics: technological progress, market demand, economic development and industrial environment. We construct the dynamic model of the E-commerce industry system using MATLAB software, which is guided by the government, technological progress, logistics level. The market demand is variable to design different simulation policies. The corresponding countermeasures and suggestions are also discussed for the development of the e-commerce industry in ethnic regions in China. Keywords E-commerce industry · System dynamics · Simulation
1 Introduction The rapid development of e-commerce has become a significant force of China’s strategic emerging industries. With its openness, high efficiency and global advantages, E-commerce has penetrated into various industries and has become an important area to realize the Internet + strategy. It plays key role in promoting the transformation of economic growth and structural adjustment, and has increasingly become an important engine for promoting the transformation and upgrading of national economy in China [1]. Chinese e-commerce transaction volume reached 20.8 trillion Yuan, increasing 27% over the same period last year. However, the development of E-commerce is confronted with the problems of inadaptable management, the imperfect credit system and irregular market order. Therefore, in order to achieve the coordinated development of e-commerce industry to the economy as the whole, we must thoroughly analyze the development status and the mechanism of E-commerce H. Ma (B) School of Economics, Northwest Minzu University, Northwest Minzu University & the Provincial Key Laboratory of E-commerce of Ethnic Information, Lanzhou 730124, People’s Republic of China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_35
273
274
H. Ma
in China, accurately grasp the interaction between e-commerce and economic growth, and find out the main factors affecting the development of E-commerce in China. This is of great practical significance for optimizing the development environment of e-commerce in China and further improving the quality and efficiency of economic development.
2 Research Status The E-commerce is not an isolated industry or system, rather than industry chain with strong industry-driven and wide-ranging radiation. It is even a complex ecosystem that needs the participation of society, government, service agencies, the public, media and many related industries. Research on e-commerce mostly uses the theory of business ecosystem and industrial chain to analyze. Leong et al. [2] attempted to analyze the development of e-commerce industry by using the theory of business ecosystem, which emphasizes multi-dynamic integration, put forward the concept of e-commerce ecosystem, and summarized the evolution law of e-commerce ecosystem in stages of birth, growth, maturity and decline. Jian et al. [3] constructed a pyramid e-commerce industry chain, and analyzed the market structure and market behavior of e-commerce industry with SCP theory. Wu [4] took the capital of ecommerce as the sample, and by field research on E-commerce related enterprises to understand the development trend of E-commerce to make systematic study of the E-commerce industry chain. Xiao et al. [5] established a constrained selection model and an extended credit risk mechanism for the e-commerce industry and extracted seven industries relating to the E-commerce industry. The application of system dynamics in the research of industrial development system proves its unique superiority. Tang [6] combined the current situation and characteristics of the information resources industry in China and constructed a system dynamic model for e-commerce-based information resources industry, and systematically studied the main influencing factors and trend characteristics of the development of information resources industry in China. Tang and Wu [7] discussed the factors of E-commerce promoting industrialization with the principle of system dynamics, and analyzed the mechanism of e-commerce’s influence on industrialization. E-commerce is a dynamic development system, in which the element changes with time. System dynamics [8] is suitable for studying the dynamic relationship between the structure and behavior of complex systems. It is a feasible attempt to use system dynamics to study the e-commerce industry.
System Dynamics-Based Simulation of E-commerce …
275
3 The System Dynamics Model of E-commerce Industry System Dynamics is an applied discipline that combines qualitative and quantitative methods to analyze social and economic problems systematically. Based on the theory of system feedback control and by means of computer simulation, it studies the dynamic behavior of system development quantitatively.
3.1 Systematic Framework of the E-commerce Industry E-commerce is an important part of the national economy and becoming sub-system of the economic system as a whole [9]. In order to highlight the research, it is necessary to select most closely related factors from a large number of influencing factors to form the research-oriented e-commerce system. The development of ecommerce involves talents, technology, capital, market demand, government policy and economic development, and there is an interactive relationship among these factors [10]. According to the function of elements in the development of E-commerce industry, this paper divides the development system of the E-commerce industry into four subsystems: technological progress, market demand, economic development and industrial environment.
3.2 Causality Analysis of Subsystems According to the subsystems of the e-commerce industry, this paper intends to make a deeper causal analysis of the system. The following four subsystems of the system are analyzed respectively. 1. Technological progress subsystems. The progress subsystem is a subsystem with electronic payment technology innovation, business model innovation and logistics technology innovation as its main content, and it is the core driving force for the development of e-commerce industry. The important feedback loops are: Loop1: Technological progress→GDP→e-commerce strategic position→government support→R&D→industry-university-research cooperation→technological progress. Loop2: technological progress→GDP→e-commerce strategic position→government support→e-commerce training→industry-universityresearch cooperation→technological progress. Loop3: Technological progress→e-commerce development→corporate profit→R&D investment→industry-university-research cooperation→technological progress.
276
H. Ma
The three circuits mentioned above indicate that the improvement of technological innovation level of e-commerce can continuously improve the development level of e-commerce industry. Good user experience comes from excellent technology. Human-computer based websites depends on technology. It will encourage the government to increase investment in e-commerce industry and staffs training. 2. Market demand subsystems. With the improvement of residents’ income level, E-commerce consumption also increases. Online shopping is preferred by consumers because of its convenience and time-saving, and has a huge consumer market. At the same time, with the improvement of information literacy for people, most populations have learned to shop through mobile and computers, and popularity of the e-commerce has become higher and higher. In order to promote industry, the government will also encourage relevant government departments to implement online procurement, and the market demand for E-commerce will be further expanded. Important feedback loops are: Loop1: Market demand→e-commerce transaction volume→e-commerce industry development→contribution coefficient of E-commerce→GDP per capita→per capita consumption expenditure→e-commerce consumer expenditure→market demand. Loop2: Market demand→e-commerce transaction→e-commerce industry development→contribution coefficient of e-commerce→GDP→government policy→national information literacy→e-commerce consumer expenditure→market demand Loop3: Market demand→e-commerce transaction→e-commerce industry development→contribution coefficient of e-commerce→GDP→government policy→government procurement→market demand The above indicate that the government should encourage relevant departments, and to stimulate the market demand for promoting the development of E industry and enhancing GDP. 3. Economic development subsystem. E-commerce industry has become a new driving force of economic growth, which is mainly reflected its contribution rate to GDP growth. The increase of GDP will promote income growth of per capita of residents, and therefore to increase of e-commerce consumption expenditure. At the same time, with the prominent dynamic effect of e-commerce on economic development, the government supports the e-commerce industry. The important feedback loops are: Loop1: GDP→economic development level→government support→Ecommerce transaction→e-commerce sector→e-commerce contribution coefficient to GDP→GDP. Loop2: GDP→GDP per capita→market demand→e-commerce contribution coefficient to transaction→E-commerce→e-commerce GDP→GDP.
System Dynamics-Based Simulation of E-commerce …
277
These two circuits indicate that economic development will promote the development of the e-commerce industry. E-commerce industry not only creates new consumption demand and opens up employment channels, but also accelerates the integration of E-commerce with the manufacturing industry. 4. Industrial environment subsystems. Environmental system is the summarized by industrial policies, laws and regulations to support and guarantee e-commerce industry. Environmental system directly or indirectly affects the development of e-commerce industry by various funds, the talents and logistics services. Important feedback loops are: Loop1: Government support→financial support→e-commerce industry development→e-commerce transaction→e-commerce contribution→GDP→ecommerce industry strategic position→government support. Loop2: Government support→talent support→e-commerce industry development→e-commerce transaction→e-commerce contribution rate to GDP→GDP →e-commerce industry strategic position→government support. Loop3: Government support→improvement of regulations→development of e-commerce industry→e-commerce transaction volume→contribution rate of e-commerce→GDP→strategic position of e-commerce industry→government support. The above three circuits mentioned above indicate that the government can create a good e-commerce environment, enhance the trust of consumers and sellers, enhance the stickiness of consumers online shopping, increase the volume of e-commerce transactions and increase the contribution rate of e-commerce to economy by increasing financial support, strengthening the cultivation of ecommerce talents and improving laws and regulations.
3.3 Variable Determination and Model Construction Based on the above analysis, this paper changes the variables of each sub-system to adapt the integration of the system, and determines the level variables, rate variables and auxiliary variables of the model. In addition, because many variables in the system will change over time, the exogenous variables are chosen to represent the properties of these variables with time. Based on the above analysis, this paper constructs the system flow model of the e-commerce industry. The system dynamic lays more emphasis on the composition of the model, and studies the trend and fluctuation. The specific form of the function does not affect the analysis process and conclusions. The paper also selects 2005–2014 as the research period. The data mainly derived come from China Statistical Yearbook, China Ecommerce Development Report, and the E-commerce Survey Report 1997–2009 in China. It is difficult to get exact values for some parameters. This paper will make reasonable estimates through simulation and continuous adjustment of empirical
278
H. Ma
Table 1 Model variable and equations 错误!链接无效 Variable name
Type
Variable calculation equation
DGP
State
INTEG (GDP increase, 184937. 4)
E-commerce production value
State
INTEG (increased output value, 7400)
Number of practitioners
State
INTEG (the increased number of employees, 238)
Logistics level
State
Market demand factor × Logistics level factor × Human resource factor × Government guidance coefficient × Technology progress factor × Informatization factor
Increase in output
Rate
GDP × contribution coefficient of electricity to GDP
GDP increase
Rate
E-commerce practitioners × Employment growth rate
Increase employees
Rate
14. 104 × R&D expenditure + 27882
Technological progress index
Auxiliary
WITH LOOKUP (Technical Level Index, ([(0,0. 8)—(900000,0. 9)])
Technological progress factor
Auxiliary
WITH LOOKUP (information level, ([(0,0. 5)—(20,0. 8)])
Informatization factor
Auxiliary
WITH LOOKUP (logistics level, ([(1,0. 6)—(20,0. 8)])
Logistics factor
Auxiliary
WITH LOOKUP (logistics level, ([(200,0. 6)—(4000,0. 8)])
data. The calculation equations of the main variables in the model are shown in Table 1.
3.4 Model Validity Test In order to verify the validity and reliability of the model and ensure that the running data of the model can truly reflect the reality, we compare the simulation data of the model with the historical data. This paper chooses the gross GDP as the test variable and takes 2005–2014 as the test period. The simulation value of the model is compared with the actual value, and the relative error of the parameters is calculated. The test data are shown in Table 2. From the data in the table, it can be seen that the relative error between the simulation value and the actual value of the model is 4.74%. The minimum value is 0.02%, and the error is not more than 5%, which is within the allowable range. It shows that the simulation result of the model is in well consistent with the actual value and has a certain degree of authenticity and validity, which can be used to judge the future development trend of the system.
System Dynamics-Based Simulation of E-commerce …
279
Table 2 Comparisons of actual GDP data with simulation data Year
GDP real values (hundred million)
GDP simulated values (hundred million)
Relative error (%)
2005
184.937
184.957
0.01
2006
216.315
217.541
0.34
2007
265.71
259.591
2.34
2008
314.257
314.548
0.13
2009
340.597
360.478
4.74
2010
401.625
382.641
4.62
2011
473.104
460.214
2.74
2012
519.547
525.478
1.22
2013
564.217
547.369
3.47
2014
634.154
636.485
0.02
4 Model Simulation Results and Policy Analysis According to the above analysis, the system dynamics model of e-commerce industry constructed in this paper would simulate the interaction between the e-commerce industry and economic development in China. The simulation results of the main variables of the model show the trends of GDP, E-commerce output, logistics level and the number of e-commerce practitioners shown in Fig. 1. The following conclusions can be drawn:
Fig. 1 Simulation results
280
H. Ma
(1) According to the data of statistical yearbook, GDP has maintained a steady and rapid growth from 2005 to 2015. The simulation results of the model accord with the actual situation. It is predicted that China’s GDP will continue to grow steadily from 2015 to 2020, which is also in line with the experts’ prediction of the future economic development situation. The e-commerce industry in promoting economic development will increase, and the strategic position of e-commerce will become increasingly prominent. The government should gradually increase its investment in E-commerce industry to provide strong financial and policy support for its development. (2) From 2005 to 2020, E-commerce output will continue to rise steadily. After the exploration and rational adjustment in the Tenth Five-Year Plan period, e-commerce began to enter the track of pragmatic development. In 2005, the volume of e-commerce transactions was 74 million Yuan, and in 2008, the scale of e-commerce transactions exceeded 100 billion Yuan. From 2005 to 2008, the central government issued a series of policy to support the development of e-commerce. These policies and measures have further improved the environment for e-commerce and enhanced people’s awareness of its application. In order to cope with impacts of international financial crisis, the central government popularized the application of e-commerce in small and medium-sized enterprises through practical financial support and other means. In 2015, ecommerce transactions reached 18 trillion Yuan. According to the simulation trend, the transaction volumes will exceed 40 trillion Yuan in 2020. (3) The simulation results of logistics level show that China’s logistics service level is steadily increasing. From 2005 to 2015, although the growth rate of logistics level in China fluctuates, the overall trend is better, and the growth rate has increased since 2015. It is predicted that logistics will continue to grow rapidly in the period of 2016–2020, and the growth rate will increase steadily. (4) The simulation results of the number of e-commerce practitioners show that the demand for e-commerce practitioners keeps growing in 2005 to 2015. In 2005, the number of E-commerce practitioners increased from 2.38 million to more than 20 million by 2015. With the continuous expansion of e-commerce, local governments vigorously promote e-commerce development. E-commerce has a strong driving role for related industries, which will generate a large number of employment demands. It estimated that the number of E-commerce practitioners will exceed 30 million by 2020.
5 Conclusions This paper uses MATLAB software to model and simulate different simulation policies with government guidance, technological progress, logistics level and market demand. We found that the development of e-commerce industry is affected by many factors, and needs to optimize policy regulation and resource allocation according
System Dynamics-Based Simulation of E-commerce …
281
to the mechanism of each factor. Among them, government guidance, logistics level and technological progress can have a greater positive effect on the development of E-commerce industry, while the government guidance coefficient is the most sensitive policy variable in industrial development, and sensitivity of logistics level is higher than that of technological progress. Therefore, we should improve supporting policies of e-commerce industry, and build a logistics distribution system suitable for the development of e-commerce, speed up the development and application of information technology. Acknowledgements This work was supported by Laboratory Opening Project 2019, the Gansu Provincial Key Laboratory of E-commerce of Ethnic Information of Northwest Minzu University (Grant No: 2019-1), and by The Funds of Central University of Northwest Minzu University (Grant No: 31920190063).
References 1. Ministry of Commerce: Guidelines for the Development of Electronic Commerce in the Twelfth Five-Year Plan, Beijing (2011). (in Chinese). 2. Leong, C., S.L. Pan, and S. Newell. 2016. The emergence of self-organizing e-commerce ecosystems in remote villages of China: A tale of digital empowerment for rural development 40 (2): 475–484. 3. Chen, Jian, Yin Tang, and Jinyu Yang. 2018. A survey of system dynamics in B2C e-commerce business model. Modern Economy 9: 830–852. 4. Xianfeng, Wu, and Guozhu Wang. 2018. Analysis on development strategy of agricultural products e-commerce supply chain based on system dynamics. World Scientific Research Journal 4 (5): 137–155. 5. Xiao Qiang, Liao Hui, and Qian Xiao-dong. 2013. System dynamics simulation model for the electronic commerce credit risk mechanism research. International Journal of Computer Science Issues 10 (2): 33–40. 6. Shoulian, Tang, and Wei Muhua. 2014. System dynamics simulation of information resources industry in China. Information Science 14 (4): 16–20. (in Chinese). 7. Tang Panpan, Wu Liang. 2014. Study on the mechanism of the impact of emerging E-commerce on the industrialization of underdeveloped areas. Management Journal 20 (8): 1143–1149. (in Chinese). 8. Qipan, Wang. 2009. System dynamics. Shanghai: Shanghai University of Finance and Economics Press. (in Chinese). 9. Hu, Ganglan, Xianghua Lu, and Lihua Huang. 2009. E-commerce ecosystem and its evolution path. Economic management 26 (6): 110–116. (in Chinese). 10. Ying, Cheng. 2011. SCP theoretical analysis of China’s e-commerce industry. Contemporary economy 24: 116–119. (in Chinese).
Vehicle Safety Reminder System Based on Single Chip Microcomputer Yunlu Lu, Xuefeng Tan, Mengting Luo, Linchao He and Haibo Pu
Abstract With the popularity of smartphones and the popularity of Weibo WeChat, many people today cannot do without mobile phones. When walking and gathering, it became a “low-headed family”. When driving, it became a “low-headed driver”, laying a huge hidden danger to road traffic. The car safety alert system selects STC’s STC89C52 single-chip microcomputer as the controller, HC-05 master-slave integrated Bluetooth module, and the smart car speed measuring module for the overall design of the hardware system. After the hardware and software design is completed, debugging, repeated tests, continuous improvement of software design issues, and the expected on-board safety alert system requirements. Keywords Playing mobile phone while driving · Single chip microcomputer · Reminder system · Android system
1 Introduction According to a survey commissioned by Ford Motor, 59% of Chinese drivers saw WeChat during driving and 31% played self-portraits or photographed. Studies have shown that when a driver is texting while driving, the chance of a car accident is 22 times higher than usual, and the chance of a car accident is 2.8 times that of normal driving [1], Solving the phenomenon that drivers drive to play mobile phones has become a more pressing issue. At present, there are vehicle intelligent defense driving systems for vehicle driving analysis and driving mobile phone bad behavior warning system, relying on vehicle networking and artificial intelligence technology, through the supervision and reminder of background administrators, to solve the main problems faced by current vehicle safety management [2], But the system involves labor and is currently not heavily put into use; Motor vehicle driving fatigue recognition system, starting Y. Lu · X. Tan · M. Luo · L. He · H. Pu (B) College of Information and Engineering, Sichuan Agricultural University, Yaan 625014, China e-mail: [email protected] Key Laboratory of Agricultural Information Engineering of Sichuan Province, Yaan 625014, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_36
283
284
Y. Lu et al.
from facial feature detection and identification, designing fatigue driving detection system [3], But the system processing speed is lower; There is a big gap in the form of passive warning system such as automobile driving monitoring system, and there is a big gap in the warning and warning system for the poor use of mobile phones by drivers. Lightweight intelligent traffic applications are now gradually being used, such as “air traffic police” multi-rotor drones [4], Lightweight intelligent applications such as artificial intelligence-based fatigue inspection systems have filled some of the blank intelligent safety traffic market, but the smart safety traffic application for driver’s safe driving assistance reminders is still blank. This design is designed to solve the problem of the driver driving the “low-headed family”. The alarm is used to alert the driver, and the alarm sounds the attention of the passengers, reminding the driver to pay attention to safety, thus achieving a double warning effect. This system fills some gaps in China’s intelligent traffic safety, and improves the intelligent transportation system. It has high scientific and advanced performance in the market. The system optimizes the judgment of vehicle driving status, and combines Bluetooth and mobile phone software. The list is a combination of practical and technical lightweight applications, and it is also highly scientific and advanced in technology.
2 System Hardware Design 2.1 Speed Measuring Module Unit The speed sensor module uses a Hall-type speed sensor, as shown in Fig. 1. The Hall speed sensor is mainly composed of a power supply voltage adjustment circuit, a Hall probe, an amplifier, a filter, a comparator, a digital signal processing circuit, and an AD converter DA converter. And so on. Hall sensors have many advantages, such as simple structure, good robustness, high reliability, long life, low power consumption, wide temperature range, strong anti-interference ability, resistance to dust and oil corrosion [5].
+5V
Hall sensor
C1
Fig. 1 Hall-type speed sensor circuit diagram
C2
Vehicle Safety Reminder System …
285
The input shaft of the magnetic turntable is connected to the measured rotating shaft. When the measured rotating shaft rotates, the magnetic rotating disc rotates accordingly. The Hall switch integrated sensor can generate a corresponding pulse when each small magnet passes, detecting the unit time. The number of pulses to calculate the speed of the car. In the physical structure, since the front wheel is mainly responsible for the steering of the car, the front wheel will rotate from time to time, and the detecting device is mounted on the rear wheel [6]. The signal directly from the sensor is very weak, so it must be amplified by a triode. The amplified signal does not change rapidly from 0 V to 5 V—a voltage signal that is easily handled by the microcontroller [6].
2.2 MCU Information Processing Unit The system uses STC89C52 type MCU, 8-bit CPU; has 32 general-purpose I/O ports, on-chip oscillator, working frequency is 12 MHz; with 4 K bytes of EEPROM storage space; full-duplex serial communication. The STC89C52’s operating temperature range of 40 °C to +85 °C, can meet the requirements of automotive applications. The core module of the single chip microcomputer can be composed of a minimum system, and is composed of a single chip core, a power supply circuit and a buzzer circuit. The Bluetooth module uses the HC-05 module. The HC-05 module is a highperformance master-slave Bluetooth serial port module that is compatible with the microcontroller system. It also inputs the electrical signal through the P0.6 and P0.7 ports of the single-chip microcomputer to make it work normally [7]. The STC89C52 can process the signals converted by the HC-05 Bluetooth module and the Hall-type speed sensor in real time after the logic operation, and control the operation of the alarm unit. The program uses the processing method of the time slice and runs once in l0 ms [8].
2.3 Safety Reminder Unit The system safety prompt unit is composed of a buzzer module. The buzzer is a sounding element, and a DC voltage (active buzzer) or a square wave (passive buzzer) can be applied to both ends to sound. The buzzer drive circuit generally includes the following parts: a triode, a buzzer, and a current limiting resistor. The transistor Q1 acts as a switch, and the low level of the base causes the triode to be saturated and conducts, so that the buzzer sounds; and the base high level turns off the triode, and the buzzer stops sounding [9]. A waveform that matches the frequency required by the buzzer is generated by the timing flip level, and this waveform is used to drive the buzzer to act as a cue. The circuit is shown in Fig. 2. The STC89C52 calculates
286
Y. Lu et al.
VCC
Fig. 2 Buzzer structure diagram
Q1 R17 3TY
R19
a speed of 20 km/h, and the Bluetooth module sends a buzzer to remind the driver not to play the phone again after sending the driver’s signal to play the phone.
2.4 Bluetooth Module Design and Implementation The Bluetooth module uses the HC-05 module, and the HC-O5 is a master-slave Bluetooth serial port module. Normal power supply voltage: 3.3 ~ 3.6 V, HC-O5 can be set as the sender or receiver. The sender can communicate with the receiver, and the sender and the sender cannot communicate with each other or between the receiver and the receiver [10]. The mobile phone sends various AT commands to control the Bluetooth module through the serial port. The TTL module is connected to the Bluetooth module, and the connection mode is as shown in Fig. 3. Open the serial port debugging assistant, enter the AT command mode; set the serial port baud rate 9600, no check digit, no stop bit; modify the Bluetooth name, password; set the Bluetooth master-slave mode (1 master 1 slave); realize the master-slave module Bind Fig. 3 Bluetooth module and TTL module connection
Bluetooth module
USB to TTL module
RXD
TXD
TXD
RXD
GCC
5V
GND
GND
Vehicle Safety Reminder System …
287
(two modules implement transparent transmission). After the setting is completed, the vehicle end and the user end communicate with each other through the Bluetooth module.
3 System Principle and Implementation 3.1 System Working Principle When the driver sits in the driver’s seat and starts the engine, the car prompts the owner to use the “do not play” APP to connect to the Bluetooth. If the driver chooses not to connect to the Bluetooth, the car will not be prompted until the next start; if the driver connects the Bluetooth, the car safety system start up. First, the driving safety system detects the vehicle speed through the speed measuring sensor, and transmits the data to the single-chip microcomputer through the serial interface, and the single-chip computer transmits the data to be processed, and then sends the data to the mobile phone through the Bluetooth serial port. The “Do Not Play” app divides the mobile phone software into two categories: whitelist software and blacklist software. The whitelist is navigation software such as “Gaode Map” and “Baidu Map”, and the blacklist is “WeChat” and “Weibo”. Entertainment software such as “vibrato”. When the “Do Not Play” APP detects that the car speed reaches 20 km/h and detects that the driver is playing blacklist mobile phone software, the “Do Not Play” app will transmit the information to the MCU via Bluetooth. The MCU processes the received information, triggers the buzzer at the same time, and sends feedback to the mobile phone, and the mobile phone vibrates. The alarm sound and vibration play a role in reminding the driver that he should not play the mobile phone during driving, and cause other passengers to be alert and urge the driver to play a dual role. Its system structure block diagram is shown in Fig. 4. power supply
Power client (phone)
Fig. 4 System block diagram
Bluetooth module
Single chip
Car speed
microcomputer
measuring module
288
Y. Lu et al. Mobile app and Bluetooth connection
no
Whether the speed reaches 20km/h
no
Security reminder system not activated
Security status
yes APP background monitoring whether there is software running
no
yes Mobile phone vibration + car alarm
Fig. 5 System work flow chart
3.2 APP Design and Implementation The mobile app is called “Do not play”. The app has the following four functions: Bluetooth connection, detection of active apps in the background, vibration and voice prompts. Open the “Do not play” APP. When the user clicks the link Bluetooth, the interface will display the current speed and blacklist after the connection is successful. If the user does not connect to the Bluetooth, the upper end of the APP will appear “Traveling, please connect Bluetooth”. When the car speed reaches 20 km/h and the user is using the entertainment software in the “blacklist”, the phone will issue a warning. The system work flow chart is shown in Fig. 5.
4 Conclusion This design adopts AT89C52 single-chip microcomputer as the main control chip of the system. It is designed to monitor the state of driving. The system has the advantages of low price, small size, easy placement, high precision and strong stability. The voice prompt function and alarm function of the system have positive auxiliary functions for the driver to drive safely. This design proposes a brand-new car safety solution, which combines Bluetooth communication technology with Hall sensor and cooperates with the control technology of single-chip microcomputer to complete the real-time detection and warning of the driver. It opens up new models for automotive safety systems and is highly value-for-money. In practical applications,
Vehicle Safety Reminder System …
289
it can be modularized and fixed in the interior of the car. Nowadays, most of the cars are equipped with a speed measuring module, so the Hall sensor can be omitted in the modular installation, and mass production can be realized. Acknowledgements This work was supported in part by the Google supports the project of the National University Student Innovation and Entrepreneurship Training Program Joint Fund of the Ministry of Education (Grant No. 201801006096), and in part by the Lab of Agricultural Information Engineering and the Sichuan Provence Department of Education (No. 17ZA0297).
References 1. Wangqun, Song. 2018. Drivers playing mobile phones while driving, the probability of accidents increased 22 times. Safety and Health 453 (9): 39 (in Chinese). 2. Xiaofeng, Wang, and Zhu Zhijie. 2018. Vehicle safety management and intelligent defence driving system application. Journal of Highway and Transportation Research and Technology (11): 324–326 (in Chinese). 3. Huaiyang, Han, and Wang Xiuli. 2016. Research on motor vehicle driver’s fatigue driving detection system. Internal Combustion Engines and Parts (10): 6–7 (in Chinese). 4. Jianguo, Mao. 2018. Going to drive a mobile phone like a drunk driving. Zhejiang People’s University 195 (9): 56–57 (in Chinese). 5. Xifu, He. 2013. Introduction to principle and algorithm of hall sensor. Electronic Products World (8) (in Chinese). 6. Chaosheng, Wang. 2007. Design of a smart car system based on 16-bit single chip MC9S12DG128B, Tianjin Polytechnic University (in Chinese). 7. Qiuxian, Yang. 2018. Design of reversing distance measuring system based on SCM. Modern Industrial Economy and Informatization 8 (16): 47–48 (in Chinese). 8. Enmin, Sun. 2018. A driver’s drinking detection system based on single chip microcomputer. Automobile Practical Technology (1): 179–181 (in Chinese). 9. Ziyang, Liu, Su Wei, Chen Wantong. 2018. Design of anti-drunk driving system based on MCU. Electronic Technology 47 (512 [8]): 64–66 (in Chinese). 10. Yanyan, Liu. 2018. Design of smart car based on Bluetooth remote control. Wireless Interconnect Technology (9) (in Chinese).
Regional Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Environment Jianbo Li and Xiaohua Li
Abstract Cloud computing and big data promote the development of serviceoriented society and drive regional information sharing, service and social interconnection with large scale and new mode, which provides technical support and reconstruction platform for the digitization of social public service, networked development and regional collaboration. Based on this background, this work started from three aspects: strategic environment, strategic framework and combat realization path, and constructed the regional cooperative strategy of social public service under the background of cloud computing and big data environment, aiming to promote the adoption of cloud computing, big data integration and public service value innovation of social public service organization. Keywords Cloud computing · Big data · Public service · Rational cooperative strategy
1 Introduction Offering public service is an important function of the government. The construction of public service platform based on cloud computing and big data is not only the informatization of public service organization means, but also a measure to promote the reform of equal distribution system of public service resources [1]. In the public service platform, the huge scale, zero-distance interaction as well as convenient transaction rules and processes will reduce the threshold of innovation and entrepreneurship, promote the sharing and opening of resources, activate the participation of different subjects and realize the diversified supply and comprehensive management of public services, which provides an important way for service-oriented governments faced with “public tragedy” and “government failure” [2]. Large-scale J. Li · X. Li (B) Hunan University of Arts and Sciences, Changde, Hunan Province, China e-mail: [email protected] J. Li e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_37
291
292
J. Li and X. Li
and intelligent operation of social public service cloud and big data can also accelerate the linkage among government, society and enterprises, lay an information foundation for the circulation of resources, elements and services and the formation of integrated channels of regional economy, and contribute to the development of regional cooperation and cooperative development.
2 Research on the Regional Cooperative Strategic Environment of Social Public Service Led by Cloud Computing and Big Data In terms of specific policies, the state and related departments have issued a series of development guidance and management regulations based on the Internet, cloud computing and big data. Since the beginning of 2015, the documents of Opinions of the State Council on Promoting the Innovative Development of Cloud Computing and Cultivating the New State of Information Industry, Regulations on the Management of Internet User Account Names and Opinions of the General Office of the State Council on Using Big Data to Strengthen the Service and Supervision of Market Subjects have been issued one after another. Behind these policies, some departments and localities have done a large number of pilot projects for related issues in advance, and accumulated corresponding experience [3]. The adoption and application process of cloud computing and big data is the diffusion process of new information technology innovation in political, social and economic fields, which leads to the revolution of information and communication technology. In addition to the core data and computing platform, 3D printing, WEB2.0, Internet of things, robot and other technologies have formed a peripheral support technology network and associated technology groups. They take the mobile Internet as the main channel and achieve the continuous learning of technology through integrating super large demand flow and resource pool. Open continuous service can destroy the original closed product version, form an Internet-based product ecosystem, form a computing platform and achieve integrated innovation through the integrated Internet technology, service architecture and cluster computing [4]. Cloud computing and big data have changed the measurement standards and trading rules of information service and products, leading to the measurement and transaction mechanism based on service-level agreement and virtualization sharing. The measurement technology and technical standards of cloud computing and big data service are important strategies for technological innovation and management. Using virtual machine as measuring tool and delivering virtual machine resources according to service agreement are the new rule of information service in cloud computing and big data environment.
Regional Cooperative Strategy of Social Public Service …
293
3 Regional Cooperative Strategy Framework of Social and Public Services Under the Background of Cloud Computing and Big Data Under the background of big data and cloud computing, the innovation of social public service content, ability and value depends on the cooperation of resources, relationships and networks. The cooperation of service resources is centered on coordinated sharing, the cooperation of service relationship is centered on synchronous cooperation, and the cooperation of service network is centered on collaborative creation [5]. This three dimensions measure and coordinate the content, ability and value of service, and realize the social value innovation goal of public service regional cooperation. The differences of different regional resources complement each other, coordinate demand and supply capacity, coordinate related resources to form a resource pool, and then implement hierarchical allocation standards. Constructing resource base based on cloud computing and big data, realizing the resource digital and unified allocation mechanism through information coding, and using efficient query, consistent distribution and long-term maintenance can create new service value. Such mechanism facilitates the construction of long-term allocation standards, the implementation of minimum standards, and consistency stratification and grading. The governance ability of public services depends on the continuity of inter-regional policies [6]. Implementing consistent policies and regulations within a certain region is beneficial to reducing the governance consumption caused by regional segmentation. Therefore, synchronously implementing the supporting and supply system of resources is important for the cooperation among regions and the improvement of public service governance ability. In terms of value, it is of great significance for the public service market to reorganize the value activities and the value exchange relationship with the network system. The public resource market based on the network system takes the process of co-creation as the starting point. The competition and cooperation among the network nodes can improve the efficiency and sharing value of the network resources, create the value of joint participation of the service network, give full play to the free mechanism and co-creation effect of the network and construct the cooperative direction and strategy of social public service [7].
4 Realization Path of Rational Cooperative Strategy of Social Public Service Under the Background of Cloud Computing and Big Data Cloud computing and big data have accelerated the digitization path of material, process, relationships and networks. Particularly, with the development and application of the Internet of things, 3D printing and social media, material resource, social service and national government affairs have been further digitized. The whole social
294
J. Li and X. Li
public service system has been virtualized, therefore, the cloud service among the objective organization, the social organization and the government department needs to be classified, layered, distributed and integrated. Planning regional climate, land, energy, infrastructure and other material data can achieve the maximum level of material sharing and use value [8]. Based on avoiding repeated construction and invalid replication, a personalized distributed social network can be built and the complementation of professional and large-scale service can be realized. The overall planning of material resource focuses on policy cooperation. The government should promulgate long-term policies, systems and mechanisms consistent with the sharing and distribution of material resources, introduce short-term guidance and quasi-regulatory documents to coordinate local conflicts and support complementary advantages, resource linkage and capacity symbiosis of the system operation from the level of material and organization. Respective service resources and capabilities should be coordinated around the social structure, social form and social organization to realize the cloud resource sharing and cloud service coordination of social organizations. International cooperation should be carried out based on social organizations to integrate domestic and foreign resources and optimize the resource structure. Social public service demand should be predicted by using social structure, population resource base should be built based on cloud computing to achieve the overall planning of service requirements, and a unified service platform for population, resources and environment should be established based on intelligent medical cloud [9]. In addition, changing serial government examination and approval into network political consultation and parallel evaluation based on material and social planning is conductive to completing the overall planning and coordination of government departments, social organizations and material entities. Cloud computing and big data are an open environment, and the basis of overall planning resources is to establish a standardized system to achieve sharing and co-creation of the service platform based on relevant standards. In the current standardization regulations and practices, the standards of cloud computing and big data should be gradually changed from recommended standards to guiding standards and mandatory standards, which is the need of national technology strategy and national security. In a unified standardization environment, the government can reduce the threshold of mass innovation and entrepreneurship by building a standardized cloud service platform and providing big data mining services. Current systems, such as Government Procurement Cloud Service Guide, Information Security Technology Cloud Computing Service Security and Ability Requirements of Information Security Technology and Cloud Computing Service Security, have corresponding regulations on the meaning and process of use, but lack the integration standard of cloud and noncloud resources and the standard of value creation behavior in cloud use. From the perspective of operations, management and services, the standard system of cloud computing and big data has not yet been formed, and cross-regional cooperation needs to be implemented. At the level of service value innovation, standards are also an important basis for cloud computing and big data to achieve social value. The standard reduces transaction cost and uncertainty cost by unifying measuring units
Regional Cooperative Strategy of Social Public Service …
295
and standardizing transaction rules, which brings economy of distance and benefits of scope based on platform [10]. Facing the globalization and networking of resource competition, simplifying the information development mode and optimizing the service mechanism are the important foundation to reduce the information cost and enhance the information ability. For the regional sharing of social services, cloud computing and big data bring new ideas, platforms and efficient tools for information path optimization. The path of first constructing, then using, and finally maintaining and updating results in idle resources, limited time and site segmentation. The mode of building while using can be explored based on cloud computing and big data. This model has irreplaceable advantages in risk prevention, efficiency improvement and resource allocation. Facing the bottom-up informatization path, cloud computing and big data need top-level design to produce strategic value. In the experience of optimizing the service, both big data and cloud computing need open, free and cheap Internet, and the recent network fee adjustment and Internet security team are both the pioneers to simplify the path and optimize the service. Data is the important strategic resource at present, and geographical data, population data and other basic data play a more and more important role in national strategy, business development and resource utilization. Consumption data, communication data and other social data are also of unprecedented value in the process of national governance and enterprise management. Establishing data protection law and maintaining Internet security are the inevitable requirements of governing the country according to law. Big data and cloud computing have subverted the progressive structure of original data, information, knowledge and wisdom, and have realized the comprehensive innovation of big data and service through free combination and omni-directional openness. Data tends to be more factual than information and knowledge, and can express the law and describe the essence more. The value of big data focuses on the original ecology and comprehensiveness. The upgrade from sample to overall is the transformation from phenomenon to essence and the generalization from causality to relation is the transformation from constraint to freedom [11]. The interactive development of big data and cloud computing needs the reflection of law and morality, and this process needs the law as the backing of long-term development to realize the integration of legal equality rules and moral freedom spirit an to recreate the new value and business culture of Internet freedom, sharing and low price led by the call and guidance of morality.
5 Summary The adoption of cloud computing and the emergence of big data environment, the pace of social progress has been accelerated, the social service has been enriched, and the demand form, the delivery environment, the experience content and the social value of social public service have been faced with unprecedented development opportunities. With the rapid development and wide application of the Internet, the economic value
296
J. Li and X. Li
of cloud computing service and big data has gradually become prominent. Recreating the public service system through cloud computing and big data, migrating these services to the cloud and carrying out the innovation of social public service based on data are conductive to realizing the sharing of public resources, the super value experience of service and the harmony and progress of society. Acknowledgements General project of hunan department of education “Research on regional collaborative strategy of social public services in the context of cloud computing and big data” 18C0745,Research project on teaching reform in colleges and universities of hunan province, Practical research on information teaching of interdisciplinary specialty [2018,543]
References 1. Jujun, Zhao. 2016. How to promote the rational coordinated development through the adjustment of administrative division—A case study of Beijing-Tianjin-Hebei region. Comparative Economic and Social Systems (2): 1–10 . 2. Dongsheng, Zhan, Zhang Wenzhong, Yu. Chen Li, and Dang Yunxiao Xiaofen. 2019. Research on the progress and trend of urban public service facilities allocation. Progress in Geography (4): 506–519. 3. Fei, Li. 2019. Fragmentation and reconstruction of rural public service supply mechanism. Agricultural Economics (4): 39–40. 4. Xiaoyi, Li, and Xie Shun. 2019. Social organization, local financial capacity and quality of public service supply. Research on Financial and Economic Issues (4): 77–84. 5. Lijun, Zhang. 2018. Regional cooperative development of small towns with sports characteristics: Realistic demands and path choice. Journal of Shenyang Sport University 37 (5): 8–14 + 27. 6. Chunmei, Liu, and Tang Jiping. 2017. Research on the management system of cooperative public sports service in Changsha-Zhuzhou-Xiangtan Region. Journal of Anhui Sports Science 38 (06): 1–4. 7. Xiaomin, Song, and Chen Min. 2017. Promoting the equalization of service in Xiongan New Area with cooperative development. China Business and Trade (34): 136–137. 8. Qingjin, Wang, and Ma. Wei. 2017. Research on the system construction of regional cooperative innovation platform. Research on Financial and Economic Issues (12): 110–116. 9. Sheng, Wang. 2017. Coordination of Beijing-Tianjin-Hebei endowment service: Motive force, dilemma and transcendence. Future and Development 41 (11): 100–105. 10. Jianwen, Liu. 2017. The mechanism transformation of regional synergetic development in China: Analysis based on the three regional development strategies of China. Tianjin Social Sciences 5: 77–82. 11. Ling, Li. 2016. Research on the construction mode of regional cooperative innovation system based on network public service platform. China Business (26): 51–52.
Online Reputation Evaluation for Consumer Products Based on Analytic Hierarchy Process (AHP) Ying Li, Xiaowei Lu, Lei Han, Yingcheng Xu and Xiuli Ning
Abstract With the rapid development of information technology featuring “Internet +”, the consumption pattern of e-commerce has impinged heavily on traditional real economy. Unlike the offline service model, for the e-commerce business, how to evaluate online products has become the research object of many scholars. This paper constructs an online reputation evaluation indicator system for consumer products, and develops an AHP model to determine the weight of indicators. It builds an online reputation evaluation model for consumer products based on AHP, and applies it to living examples. Keywords Analytic hierarchy process · Consumer products · Online reputation · Weight of indicators
1 Introduction Thanks to the fast internet speed and its replicable development model; e-commerce has achieved rapid growth. However, the quality of e-commerce products has become a serious impediment to the healthy development of e-commerce economy, while consumers’ distrust becomes the biggest obstacle to its further development [1–3]. Determining the online reputation for consumer products is to shift the reputation of traditional transactions to the special environment of e-commerce transactions. However, it is more difficult to evaluate and control online reputation than the traditional model due to lack of face-to-face communication in the transactions. A good online reputation is a facilitator of smooth e-commerce transactions, a driver for its sustainable development, and an effective evaluation tool for purifying the transaction environment. Unlike the product reputation in the traditional sales model, the quality of online reputation directly determines consumers’ purchase decision. Objectively speaking, online reputation represents consumers’ recognition of the Y. Li · X. Lu · Y. Xu · X. Ning (B) China National Institute of Standardization, Beijing 100191, China e-mail: [email protected] L. Han China Electronics Engineering Design Institute Co. Ltd., Beijing 100142, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_38
297
298
Y. Li et al.
quality of online products. Therefore, it is necessary for the online reputation evaluation indicator system for consumer products to comprehensively consider the relevant factors and highlight the characteristics of online sales. Online reputation has always been the focus of many scholars, and a slew of research has been carried out on it. For example [4], Studies the proposed reputation evaluation model by comparing the reputation calculation methods, and proposes a trust system [5]. Proposes a combination of qualitative and quantitative methods for the reputation evaluation model on the basis of the uncertainty of interactions for the online system [6]. Attempts to use the discrete time optimal control to determine the online reputation evaluation model, so as to evaluate the online reputation of buyers and sellers [7]. Constructs an e-commerce transaction subject reputation evaluation model through AHP. These studies are more about reputation evaluation of companies and other economic entities, than the online reputation of products that consumers really need. At present, the research on online reputation mainly focuses on the evaluation of online services, buyers and sellers of online transactions while seldom touching upon the comprehensive evaluation of related products, services, buyers and sellers in online transactions. Based on the current development of e-commerce, this paper proceeds from the particularity of e-commerce transactions and constructs an online reputation evaluation indicator system for consumer products that integrates consumer products, seller reputation, platform reputation and social concern.
2 Constructing an Online Reputation Evaluation Model for Consumer Products 2.1 The Basic Principles of the Construction of the Online Reputation Evaluation System for Consumer Products (1) Scientific The online reputation evaluation indicator system for consumer products should consider the relevant indicators that affect the quality and user experience of its online products from multiple dimensions and aspects, and consider the hierarchical and weight distributions of different indicators to make a scientific evaluation indicator system. (2) Applicable Unlike the product reputation in the traditional sales model, the quality of online reputation directly determines consumers’ purchase decision. Objectively speaking, online reputation represents consumers’ recognition of the quality of online products. Therefore, it is necessary for the consumer product online reputation evaluation indicator system to comprehensively consider the relevant factors of online consumer products reputation and highlight the characteristics of online sales.
Online Reputation Evaluation for Consumer Products …
299
(3) Comprehensive Since there are many factors affecting the online reputation of consumer products, the evaluation indicator system needs to be both comprehensive and applicable. Therefore, when designing the indicator system, it is necessary to consider the quality of the consumer themselves and the online sales platform and other important factors that affect consumers. More importantly, after-sales evaluation of consumer products, customer complaints, injury accidents and other factors should also be taken into account. (4) Core There are many factors affecting online reputation. It is impossible for the indicator system to include all of them, so it is necessary to grasp the core indicators.
2.2 Online Reputation Evaluation Indicator System for Consumer Products This paper constructs online reputation evaluation indicators for consumer products from four aspects, namely, the product quality, business reputation, third-party website, and the public, as shown in Table 1.
2.3 Weight of Evaluation Indicators 2.3.1
Building a Hierarchical Model
A hierarchical mechanism model shown in Fig. 1 is constructed, including the target layer (the highest layer), the criterion layer (the middle layer), and the secondary criterion layer (the third layer).
2.3.2
AHP
To facilitate quantitative assessment of the weight of each evaluation indicator, this paper adopts the 1–9 scale method proposed by Satty (Table 2) to indicate the relative importance of each evaluation indicator. Since the online reputation evaluation indicator system for consumer products is relatively complex, the results from the judgment matrix are not always reasonable. It is necessary to make consistency check of the judgment matrix to ensure the validity of the online reputation value [8]. The average random consistency indicator RI of the judgment matrix is shown in Table 3 [9]. If the consistency indicator of a certain judgment matrix is CI and the maximum eigenvalue is λmax , its consistency check
300
Y. Li et al.
Table 1 Online reputation evaluation indicators of consumer products Primary indicator
Secondary indicator
Indicator description
A: product quality reputation indicators
A1: product brand
It is an identification mark, a spiritual symbol, a value concept, and an embodiment of excellent quality
A2: product safety indicator
It means the physical, chemical, and microbiological safety indicators meet the requirements or that the potential hazard of the product is acceptable to consumers
A3: product functionality indicator
B: business reputation indicators
A4: product price and added value
Product design, manufacturing, production, etc. surpass the required standards, and reflect the technological elements and technological level of the products, such as user-friendly design and other value-added elements
A5: customer satisfaction
It makes an overall evaluation of the product through the customer’s perception, serving as a supplement for the first few indicators that can not be fully quantified
B1: product conformity
To what degree do the actual function and durability of the product meet the relevant requirements and conform with the product description
B2: product sales
Mainly monthly and annual sales
B3: after-sales service
It includes after-sales service of the product manufacturer, such as changing or refunding products, logistics and distribution, providing information, spare parts, and maintenance for broken products (continued)
Online Reputation Evaluation for Consumer Products …
301
Table 1 (continued) Primary indicator
C: platform credit
D: the public
Secondary indicator
Indicator description
B4: buyer’s evaluation
The buyer’s overall evaluation of the seller’s products and services after receiving the products
C1: platform visibility
The scale and sales volume of products sold by third-party platforms affect the indicators of platform visibility
C2: platform service level
The overall evaluation of the quality of products on the third-party platform, its rigorous review of the settled businesses, the policy services for protecting vulnerable groups such as consumers, etc.
C3: reliability of financial supervision
The reliability of the third-party platform in the supervision of buyers and sellers’ funds protect the property safety of sellers and buyers in the event of a transaction failure
D1: cases of product liability
Statistics on cases of product liability from consumers, third-party evaluation agencies, and media reports
D2: product quality data released by the government
Data on the quality and safety of products such as product spot checks, supervision, monitoring, and government warning
D3: consumer complaint data
Product quality data of consumer complaints from consumer associations and rights protection departments, etc.
value CR is as follows: CR =
CI (λmax − n)(n − 1) = RI RI
(1)
When CR < 0.1, it is generally agreed that the consistency of the judgment matrix A is acceptable; otherwise, it is necessary to make adjustment until satisfactory consistency is achieved [10, 11].
302
Y. Li et al.
An Online Reputation Evaluation Model for Consumer Products
product quality reputation indicators
business reputation indicators
platform credit
the public
consumer complaint data
product quality data released by the government
cases of product liability
reliability of financial supervision
platform service level
platform visibility
buyer’s evaluation
after-sales service
product sales
product conformity
customer satisfaction
product price and added value
product functionality indicator
product safety indicator
product brand
Fig. 1 An online reputation evaluation model for consumer products
Table 2 AHP 1–9 scale Scale
Implication
1
Two factors are equally important
3
Of the two factors, the former is slightly more important than the latter
5
Of the two factors, the former is obviously more important than the latter
7
Of the two factors, the former is much more important than the latter
9
Of the two factors, the former is extremely more important than the latter
2,4,6,8
The intermediate value of the above adjacent judgment
The reciprocal of the scales above
The opposite of the above definition
2.3.3
Using the Judgment Matrix to Determine the Weight of the Evaluation Indicators
Ten experts from relevant industries, research institutes, consumers, and regulatory authorities, etc. are asked to assign evaluation indicators according to the 1–9 scale method. According to the statistical analysis of the survey results by SPSS, the judgment matrix of each level of the online reputation evaluation indicator system for consumer products is determined as shown in Tables 4, 5, 6, 7, and 8. As can be seen from Tables 4, 5, 6, 7, and 8, the consistency ratio CR of the judgment matrices M1–M5 is less than 0.1, indicating that the weight distribution
1
0
n
RI
0
2
0.58
3
Table 3 RI of 1–9 scale matrices 0.90
4 1.12
5 1.24
6 1.32
7 1.41
8
1.45
9
1.49
10
1.51
11
Online Reputation Evaluation for Consumer Products … 303
304
Y. Li et al.
Table 4 Judgment matrix M1 of the criterion layer relative to the target layer A
B
C
D
Wi
A
1
5
3
7
0.5507
B
1/5
1
1/4
3
0.1041
C
1/3
4
1
7
0.2963
D
1/7
1/3
1/7
1
0.0489
Note λmax = 4.1810; CR = 0.0678
Table 5 The judgment matrix M2 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the product quality reputation indicator A) A
A1
A2
A3
A4
A5
Wi
A1
1
1
4
1/5
9
0.2019
A2
1
1
4
1/2
7
0.2168
A3
1/4
1/4
1
1/6
4
0.0712
A4
5
2
6
1
7
0.4782
A5
1/9
1/7
1/4
1/7
1
0.0319
Note λmax = 5.3782; CR = 0.0844
Table 6 The judgment matrix M3 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the business reputation indicator B) B
B1
B2
B3
B4
Wi
B1
1
1/9
1/7
1/9
0.0473
B2
9
1
7
1/7
0.3480
B3
7
1/7
1
1/9
0.0712
B4
9
7
9
1
0.5335
Note λmax = 4.0813; CR = 0.0304
Table 7 The judgment matrix M4 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator for the platform reputation indicator C) C
C1
C2
C3
C1 C2 C3
Wi
1
3
7
0.6491
1/3
1
5
0.2790
1/7
1/5
1
0.0719
Note λmax = 3.0649; CR = 0.0624
of the above evaluation indicators is reasonable. The weights of the indicators of the online reputation evaluation indicator system for the consumer products obtained by AHP are shown in Table 9.
Online Reputation Evaluation for Consumer Products …
305
Table 8 Judgment matrix M5 of the indicator layer relative to the criterion layer (the comparison of importance of each secondary evaluation indicator of the public reputation indicator D) D
D1
D2
D3
Wi
D1
1
1/7
1/2
0.0905
D2
7
1
6
0.7582
D3
2
1/6
1
0.1512
Note: λmax = 3.0324; CR = 0.0311
2.4 Calculation Method of Online Reputation Evaluation of Consumer Products According to Table 1 and Table 9, when Wi (i = 1, 2, 3, 4, …, n) represents the weight of the secondary evaluation indicators to the primary ones, and Gi (i = 1, 2, 3, 4, …, n) the actual score of the secondary evaluation indicators, the online reputation value of consumer products is: R=
n
Gi × Wi
(2)
i=1
3 Application Cases According to the evaluation indicator system shown in Table 1 and the weight of the online reputation evaluation indicator of the consumer products shown in Table 9, we can calculate the online reputation evaluation value of a certain type of consumer products, as shown in Table 10. As can be seen from Table 10, the model can calculate both the online reputation value of congeneric consumer products on different platforms, and that of different consumer products on the same platform. It provides third-party evaluation agencies and related management departments with the method and model of online reputation evaluation of consumer products.
4 Summary Based on the analysis of the factors affecting the online reputation of consumer products, this paper studies the online reputation evaluation model of consumer products, and uses AHP to determine the weight of each evaluation indicator. It shows that this model is of practical significance for evaluating the online reputation
306
Y. Li et al.
Table 9 Weights of indicators of online reputation evaluation indicator system for consumer products Primary evaluation indicator (weight to the general objective)
Secondary evaluation indicator
Weight coefficient of the secondary evaluation indicator to the primary evaluation indicator
Weight of the secondary evaluation indicator to the general objective
A: product quality reputation indicators (0.5507)
A1: product brand
0.2019
0.111186
4
A2: product safety indicator
0.2168
0.119392
3
A3: product functionality indicator
0.0712
0.03921
7
A4: product price and added value
0.4782
0.263345
1
A5: customer satisfaction
0.0319
0.017567
11
B1: product conformity
0.0473
0.004924
14
B2: product sales
0.3480
0.036227
9
B3: after-sales service
0.0712
0.007412
12
B4: buyer’s evaluation
0.5335
0.055537
6
C1: platform visibility
0.6491
0.192328
2
C2: platform service level
0.2790
0.082668
5
C3: reliability of financial supervision
0.0719
0.021304
10
D1: cases of product liability
0.0905
0.004425
15
D2: product quality data released by the government
0.7582
0.037076
8
D3: consumer complaint data
0.1512
0.007394
13
B: business reputation indicators (0.1041)
C: platform credit (0.2963)
D: the public (0.0489)
Weight ranking
Online Reputation Evaluation for Consumer Products …
307
Table 10 Scoring standards for online reputation evaluation indicators of consumer products General objective
Evaluation indicator
Weight of indicator
Score (100 points)
Online reputation evaluation value of consumer products
A1: product brand
0.111186
85
A2: product safety indicator
0.119392
70
A3: product functionality indicator
0.03921
68
A4: product price and added value
0.263345
60
A5: customer satisfaction
0.017567
80
B1: product conformity
0.004924
78
B2: product sales
0.036227
90
B3: after-sales service
0.007412
90
B4: buyer’s evaluation
0.055537
80
C1: platform visibility
0.192328
75
C2: platform service level
0.082668
64
C3: reliability of financial supervision
0.021304
75
D1: cases of product liability
0.004425
60
D2: product quality data released by the government
0.037076
85
D3: consumer complaint data
0.007394
65
Total score: 71.64586
value of each e-commerce platform through specific consumer online reputation evaluation cases for an e-commerce product. Acknowledgements This paper is funded by the National Key Research and Development Program. Project Number: 2017YFF020960302, 2016YFF0202604.
References 1. Zhang, Yu, Jing Bian, and Weixiang Zhu. 2013. Trust fraud: A crucial challenge for China’s e-commerce market. Electronic Commerce Research and Applications 12 (5): 299–308. 2. Science-Food Science; New Food Science Study Results from University of Turin Described (Italian Wines In China’s E-commerce Market: Focus on Piedmont Region Products). Food Weekly News, 2019.
308
Y. Li et al.
3. Lijuan, Liu. 2019. Theoretic shock and realistic challenge of e-commerce on international trade. Institute of Management Science and Industrial Engineering. Proceedings of 2019 International Conference on Education, Economics, Humanities and Social Sciences(ICEEHSS 2019). Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, 4. 4. Sang, A., R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43 (2): 618–644. 5. Zhang, Y., S.G. Wang, and Y.T. Xu. 2008. Online credit evaluation system based on analytic hierarchy process and set pair analysis. International Symposium on Computational Intelligence and Design, 453–456. Tokyo: IEEE. 6. Chaoning, Zhang, Zhang Ying, and Xu Yingtao. 2018. Online reputation evaluation model based on discrete time optimal control. Journal of Zhejiang Normal University (Natural Science) 41 (4): 383–389. 7. Zhiwen, Cai, and Lin Jianzong. 2015. Reputation evaluation of platform-based e-commerce online transaction evaluation subjects. Journal of Southwest China Normal University (Natural Science) 40 (8): 79–85. 8. Li, Yu, Wang Jianli, Li Changxiao, et al. 2014. Health evaluation of wetlands at Ningxia Sand Lake based on DPSIR and AHP. Journal of Southwest University: Natural Science Edition 36 (2): 124–130. 9. Tao, Yin. 2012. Construction of road transportation emergency response evaluation indicator system based on analytic hierarchy process. Journal of Southwest China Normal University: Natural Science Edition 37 (11): 107–111. 10. Heydari, Mohammad, Kin Keung Lai, and Xiaohu Zhou. 30 November 2019. Risk management in supply chains. London: Taylor and Francis. 11. Jalil, M. I. A., Pitchay, A. A., and Yahya, S. 2019. Cash Waqf and preferred method of payment: Case of Malaysia using an AHP approach. In Revitalization of Waqf for socio-economic development, Vol. II, 187–206. Cham: Palgrave Macmillan.
Discussion on the Influence of Ambient Temperature Based on Big Data Technology on the Development of Asphalt Pavement Xiaoduo Liu and Wei Liu
Abstract The asphalt pavement rutting is mainly caused by the high temperature and the channelized traffic, and the permanent deformation of the asphalt pavement structure layer occurs mainly in the high temperature season. Semi-rigid base asphalt pavement under heavy-duty traffic conditions, the rutting mainly occurs in the asphalt surface layer. Compared with traditional data analysis technology, big data technology can realize rapid processing and value mining of massive data, and has been applied to medical and energy industries. In order to explore the application prospects of big data technology in asphalt pavement, it is first necessary to grasp the application status. It also predicts the development trend of big data technology for asphalt pavement rutting at ambient temperature, and provides a reference for further application of big data technology in asphalt pavement. In order to study the effect of temperature and vehicle load on the development of asphalt pavement rut, the analysis model is established under big data, combined with temperature observation data, the variation law of temperature field inside the pavement is analyzed. On this basis, the variation law of asphalt pavement rutting at different temperatures is analyzed. Keywords Big data · Asphalt pavement · Rutting · Environmental temperature
1 Introduction Among the many diseases of asphalt pavement, rutting disease is an important and major form of damage. When the asphalt pavement is used for performance evaluation, the high temperature performance of the asphalt mixture is also listed as the primary test indicator. With the rapid development of the national economy and the X. Liu School of Civil Engineering, Changchun Institute of Technology, Changchun 130012, China W. Liu (B) Institute of Technology, The Tourism College of Changchun University, Changchun 130607, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_39
309
310
X. Liu and W. Liu
highway transportation industry, heavy-duty and even heavy-duty traffic has become a common traffic phenomenon [1, 2]. Although people have already paid attention to the damage effect of overloaded traffic on the road surface and took measures to carry out overload control, the actual situation is that heavy load still exists; although people have carried out many studies on the pavement structure under heavy traffic [3–8]. Asphalt mixture is a temperature sensitive material whose road performance is closely related to its temperature sensitivity. The ruts are usually easy to produce at high temperatures and vary with temperature [9, 10]. As a composite material, asphalt mixture is a typical elastic, viscoal and plastic composite, which is close to the linear elastomer in the low temperature and small deformation range. It is a viscoplastic body in the range of high temperature and large deformation activity, and is a general viscoelastic body in the transition range of normal temperature [11, 12]. In the current building materials engineering, many new technologies and new methods have been widely used, and big data technology is one of the more common ones and one of the more important ones. It plays an important role and significance for the development of building materials engineering. This paper analyzes big data technology and its application in building materials engineering, in order to promote the further development of building materials engineering. Under high temperature conditions, the development speed of rutting is much higher than that under low temperature conditions; under the same load action times, the rutting depth is linearly related to the load size; for the same load growth range, the rutting increases at a lower temperature, but the temperature is higher. Under the conditions, the absolute value of the rut depth increase is even larger.
2 Big Data Technology and Its Advantages The so-called big data, which is also called huge amount of data, refers to related information assets that need to be processed by using new processing modes. Currently, there is a rapid development and application. For big data, its characteristics mainly include large volume, diversity and high speed, and it has high value. Among them, large volume refers to the big data record unit is TB level or PB level. The traditional data processing method can not meet its actual needs; diversity means that big data currently includes three types. They are structured data, unstructured data, and semi-structured data; high speed means that when dealing with big data, it should be guaranteed to be real-time and fast; and valuable means to fully explore big data. The hidden value in big data can be found better. Big data technology is a related technology for analyzing and processing big data. In short, big data is to analyze and process a large amount of data in the network, and on this basis, obtain high-value information and apply it in practice. In the traditional data analysis, the main method is to select the random sampling method for analysis, and most of them are implemented by human resources. In this statistical analysis mode, it is easy to cause the data to be compared in the data collection, and the data is relatively one-sided. In the process of collecting, it often takes a lot of manpower and material
Discussion on the Influence of Ambient Temperature …
311
resources. Compared with traditional data analysis and processing methods, data processing using big data technology can be faster and faster, and can process data more accurately, which can effectively improve data processing efficiency and better meet actual needs. In the construction of roads and construction, the generation of building energy consumption is closely related to many factors, including space, floor space and lighting conditions. At present, relevant researchers have made a reasonable application of the data mining framework to deeply analyze the data occupied by the office area. Based on this, the use of various advanced big data technologies can be used to calculate the building occupancy mode and related timetables. The results obtained can propose a variety of energy saving solutions, and more valuable ideas can be obtained in the analysis of building energy consumption. In addition, the consumption model can be used to analyze the energy consumption of buildings. In the analysis of building energy consumption, power data is an important one, and it is also big data. It cannot be completed by traditional data analysis methods, but through the big data technology. Utilize, for a variety of electrical equipment in a large number of building space samples, timing data acquisition can be implemented, and a large amount of power consumption data can be obtained. On this basis, using the relevant big data processing techniques such as feature extraction, clustering and correlation analysis, statistics can be applied to the data of various power consumption devices with different uses and types, and the general power consumption mode can be obtained. It is possible to predict the actual power consumption in the future buildings, so as to better grasp the energy consumption and better carry out the project construction.
3 Formation Mechanism of Rut on Asphalt Pavement The rut is one of the main forms of asphalt pavement damage. It directly affects the performance of the pavement and the smoothness of the pavement, jeopardizing the driving of the road car, and the increasing depth of the rut will also cause serious road surface damage, resulting in increased maintenance costs. The ruts that occur on asphalt pavement can be classified into the following categories: (1) Structural ruts, which are caused by deformation of the subgrade and the base layer of the pavement; such ruts have a large width, no bulging on both sides, and a cross-section exhibits a glyph; (2) a destabilized rut or flow Sexual rut, due to the poor flow characteristics of asphalt mixture, under the repeated action of vehicle load and temperature change, the asphalt concrete is shaped and sheared. On the asphalt road, the wheel parts are concave and the wheel edge is upward. Uplift, this constitutes a rut, (3) wear-resistant car withdrawal, tire with nails or belt chain; (4) compaction deformation, surface lamination solidity does not meet the requirements of the regulations, generated under the load of the vehicle Consolidate the rut. Due to the greater rigidity of the semi-rigid base layer, the first type of structural rutting is not easy to occur on asphalt roads in China. The rutting of asphalt concrete pavement mainly occurs in the asphalt surface layer. The asphalt concrete surface layer produces
312
X. Liu and W. Liu
viscous flow under the repeated action of vehicle load, which is the main reason for the rut on the road surface. According to foreign literature, the direct cause of large permanent deformation of pavement is: under the condition of heavy traffic, the axle load of the vehicle and the grounding pressure of the tire are increasing, and the number of times of axle load of the vehicle is large, which makes the asphalt pavement surface The layer is in a state of high complex stress. The permanent deformation of the asphalt pavement is mainly due to the shear deformation of the asphalt pavement layer under load. This conclusion is only applicable to the pavement where the compaction degree can be well controlled during the construction process. During the construction process, the compaction degree can not meet the requirements, and the pavement surface layer will of course produce compaction deformation under the load of the vehicle to form permanent deformation. In addition, the vehicle load has a large shear stress at the contact interface between the tire and the road surface. This shear stress has a significant influence on the rutting of the road surface. To accurately analyze the permanent deformation of the asphalt pavement, it is also important to select the load level that matches the actual road surface. Based on the statistical relationship, the statistical formula of the permanent deformation and applied load of the green layer and the performance of the raw material is further determined. lg ε p = c0 + c1 lg N
(1)
The viscoelastic layered theoretical system combined with indoor and outdoor tests yields an empirical relationship between the permanent deformation of the asphalt layer and the material parameters, loads and deflections of the road table: RD =
a1 δ N 1+a2 W (1 + a2 )
(2)
The rutting prediction model is based on rheological model analysis and elastic layered theory system, and combined with the deformation characteristics of raw materials. The prediction equation includes the rutting depth of lateral uplift height when the thinning of Zhejiang-Qinghai layer has been subjected to load: RD =
n i=1
cdt
2 pδ Smi x, p
× Wi (1 + K L )
(3)
Discussion on the Influence of Ambient Temperature …
313
4 Effect of Ambient Temperature on Rutting Development of Asphalt Pavement From Fig. 1, it can be seen that the rutting of asphalt pavement shows obvious reguFig. 1 Sketch map of rutting development in each month
9
8
7
1 2 3 4 5 6 7 8 9 10 11 12
larity with the change of months. The month of rutting development is concentrated between May and October, which is the time of summer, spring and summer, summer and autumn. The average temperature of the environment is higher and the solar radiation is stronger, which causes the temperature field of the pavement structure to be higher. Because asphalt mixture is a kind of temperature sensitive material, it produces more serious rutting in high temperature season. Corresponding to the average temperature of the environment, the month in which the maximum rutting depth occurs is also July when the average temperature is the highest. The rutting depth under standard load is about 7.35 mm, while the smallest rutting occurs in January, February and December, and the rutting depth under standard load is about 0.54 mm. The ratio of maximum rutting depth to minimum rutting depth is close to 14:1. It can be seen that the rutting depth under high temperature is much greater than that under low temperature. Therefore, for asphalt concrete, we should pay attention to its rutting resistance under high temperature, which is also consistent with engineering practice. At the same time, it can be observed from Fig. 2 that although the law of rut development is basically consistent with the law of temperature change, there are still differences. For example, in March and April, the temperature has risen, but the development of the rut is still very similar to that of January and February, and it does not immediately show a significant increase as the temperature rises. The reason for this phenomenon is the material properties of asphalt concrete. Under low temperature conditions, the material properties of asphalt concrete reflect the properties of linear elastic materials to a greater extent. Therefore, under the load of vehicles, most of the deformation can be recovered by elastic deformation; when the temperature rises to a certain extent, the asphalt, the mixture gradually reflects the properties of the viscoelastic plastic material, and its creep effect becomes an important factor under the load of the vehicle. The irreversible plastic deformation caused by it will become a rut disease macroscopically under the accumulation of a long time. From this, it can be judged that although the average temperature has
314 Fig. 2 Diagram of rut changing with temperature
X. Liu and W. Liu
95 90 85 80 75 70 65
1
2
3
4
5
6
7
8
9 10 11 12
changed in 1, 2, 3, and 4 including November and December, under these conditions, the asphalt concrete is still in the elastic stage, resulting in less accumulated deformation and rutting disease. Not obvious; and once the temperature continues to rise, the plasticity increases and the creep effect gradually becomes apparent, resulting in a larger rut. In summary, the rutting disease generally increases with the increase of the ambient temperature, but the two are not linear, but exhibit a nonlinear relationship of mutation. Therefore, in the actual engineering material design, the research focus should be mainly on the anti-rutting performance under high temperature conditions.
5 Conclusion This paper first expounds the related concepts of big data and big data technology, then selects a representative typical scientific literature database, systematically retrieves the literature related to big data and asphalt pavement, and analyzes it. According to the survey results of asphalt pavement rutting, the inductive analysis of the composite structure rutting test and the big data environment were used to analyze the influencing factors of the permanent deformation of the asphalt pavement. The main research conclusions obtained are as follows according to the results of the rutting disease site investigation and literature investigation. Under repeated load, the cumulative residual deformation of asphalt mixture is the direct cause of rutting on asphalt pavement. Under the combined action of compressive stress and shear stress, the strength of asphalt mixture can not resist the load stress, which leads to the rut of asphalt pavement. The root cause. At the same time, it is found that the structural thickness of the asphalt pavement, the interlayer contact conditions of the asphalt layer and the semi-rigid base layer, and the form of the base layer are the main factors affecting the rutting of the asphalt pavement.
Discussion on the Influence of Ambient Temperature …
315
Acknowledgements The corresponding author of this paper is Wei Liu. The work was supported by the Science and Technology Project of the 13th Five-Year Plan of Jilin Provincial Department of Education under Grant No. JJKH20180991KJ.
References 1. Shamami, V.H., and A.K. Khiavi. 2017. Effect of temperature on geosynthetic rutting performance in asphalt pavement. Petroleum Science and Technology 35 (11): 1104–1109. 2. Ji, X., N. Zheng, S. Niu, et al. 2016. Development of a rutting prediction model for asphalt pavements with the use of an accelerated loading facility. Road Materials & Pavement Design 17 (1): 15–31. 3. Du, Y., J. Chen, H. Zheng, et al. 2018. A review on solutions for improving rutting resistance of asphalt pavement and test methods. Construction and Building Materials 168: 893–905. 4. Mallick, R.B., D. Singh, and A. Veeraragavan. 2016. Extension of asphalt pavement life by reduction of temperature. Transportation in Developing Economies 2 (1): 7. 5. Trotochaud, L., R. Tsyshevsky, S. Holdren, et al. 2017. Spectroscopic and computational investigation of room-temperature decomposition of a chemical warfare agent simulant on polycrystalline cupric oxide. Chemistry of Materials 29 (17): acs.chemmater.7b02489. 6. Yu, X., N.A. Burnham, and M. Tao. 2015. Surface microstructure of bitumen characterized by atomic force microscopy. Advances in Colloid and Interface Science 218: 17–33. 7. Ameli, A., R. Babagoli, and M. Aghapour. 2016. Laboratory evaluation of the effect of reclaimed asphalt pavement on rutting performance of rubberized asphalt mixtures. Liquid Fuels Technology 34 (5): 5. 8. Wu, J., F. Ye, F. Hugo, et al. 2015. Strain response of a semi-rigid base asphalt pavement based on heavy-load full-scale accelerated pavement testing with fibre Bragg grating sensors. Road Materials & Pavement Design 16 (2): 316–333. 9. Guo, F., F.U. Hongyuan, and L. Shao. 2015. Fatigue damage analysis of composite base asphalt pavement structure based on change of ambient temperature. Journal of Central South University 46 (5): 1869–1875. 10. Moafimadani, S.R., K. Rahimov, and S. Hesami. 2016. The effect of warm additive on the properties and behavior of an asphalt binder. Liquid Fuels Technology 34 (19): 1654–1662. 11. Javilla, B., L. Mo, H. Fang, et al. 2017. Significance of initial rutting in prediction of rutting development and characterization of asphalt mixtures. Construction and Building Materials 153: 157–164. 12. Wu, J., F. Ye, and Y. Wu. 2015. Modulus evolution of asphalt pavement based on full-scale accelerated pavement testing with Mobile Load Simulator 66. International Journal of Pavement Engineering 16 (7): 609–619.
Analysis on the Criminal Subject of Artificial Intelligence Huilin Huang
Abstract The development of artificial intelligence warns of possible social risk, and artificial intelligence crime put forward a new proposition for criminal law theory and legislation. From the perspective of criminal subject, artificial intelligence can be divided into artificial narrow intelligence (ANI) and artificial general intelligence (AGI). The ANI does not have independent judgment and decision ability, so it can hardly become the subject of criminal responsibility. However, the AGI has independent discrimination and control ability, and it can commit a crime by selfselection and identification, so it is more possible to become the criminal subject. At present, we should gradually construct and improve the scientific normative system of artificial intelligence crime on the basis of focusing on legislative foresight. Keywords Artificial intelligence · Criminal subject · Criminal responsibility
1 Proposal of the Criminal Subject of Artificial Intelligence The research on the criminal subject of AI in academic circles mainly focuses on determining who should bear criminal responsibility as criminal subject according to the analysis of the role played by AI, researchers and users in different AI criminal activities. Some scholars further pointed out that autonomous intelligent machines in the future will be able to act completely autonomously and will no longer be passive tools using by human beings [1]. Although human beings design, manufacture and deploy them, their behavior is not constrained by human direct instructions, but based on the analysis and judgment of the information they acquire. Moreover, their responses and decisions in different situations may not be predictable or precontrolled by their creators [2]. Complete autonomy means that the new machine paradigm is “perception-thinking-action” that does not require human intervention [3]. Some scholars even think that artificial intelligence is a special legal subject, which is the inevitable outcome of human society when it develops to a certain H. Huang (B) Wuhan University of Science and Technology, Wuhan, Hubei 430065, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_40
317
318
H. Huang
stage. It has high intelligence and independent decision-making ability. Its nature is different from traditional tools or agent artificial intelligence crime [4]. At present, AI crime is mainly divided into two kinds of situations. The first case is artificial narrow intelligence (ANI). ANI does not have independent judgment and decision ability, researchers and users have complete control ability on it. Artificial intelligence operates in accordance with pre-set codes and established procedures, makes criminal acts and results that are expected by researchers and users. The second case: artificial general intelligence (AGI). AGI, with independent identification and control ability, can commit criminal acts through self-identification and selection, which can not be foreseen by researchers and users.
2 Analysis of Artificial Narrow Intelligence Criminal Subject Artificial narrow intelligence refers to AI that is good at only one aspect and only used to solve specific problems. From the viewpoint of ANI, intelligent machine just looks like intelligence, its intelligence is only superficial and non-substantial, and it will not really have intelligence and consciousness like human beings [5]. The behavior of ANI is entirely the embodiment of the subjective will of the actor. It is only a tool for the actor to commit criminal acts. Researchers and users are the subjects who commit harmful social acts and should bear criminal responsibility according to law. In criminal activities, ANI operates according to the pre-set procedure of the actor. It has no independent identification ability and control ability, so it does not have the qualification of criminal subject. It only plays the role of tool in criminal activities.
3 Analysis of Artificial General Intelligence Criminal Subject 3.1 AGI Is Inadequate to Be Criminal Subject Firstly, if AI is the criminal subject, it should abide by its obligations in criminal law and not infringe on the legitimate rights and interests of others, but even if it has certain ability of identification and control, it still does not have the same consciousness as the natural person, and there are still obstacles in the motivation and basis of the implementation of crime. The essential attribute of AI is naturalness and mechanics. It can only operates pre-set procedures or chooses behavior independently in the course of operation, and it does not take into account social significance, social responsibility and social consequences, so it can’t carry out real practical activities, form social attributes and possess the personality of natural persons, so the AGI is inadequate to be criminal subject. And then, criminal subject is the premise of judging
Analysis on the Criminal Subject …
319
criminal responsibility and penalty standard. There are two purposes of penalty: special prevention and general prevention. If the artificial intelligence without the personality of natural persons is included in the scope of criminal subject, the purpose of penalty for crime prevention will become a mere formality and can not play its due legal and social role [6].
3.2 AGI Is Adequate to Be Criminal Subject Firstly, the ability of criminal responsibility is the key to become the subject of criminal responsibility. According to the general theory of academia, the ability of criminal responsibility means the ability of identification and control. The AGI has the ability of autonomous learning, reasoning, selection and decision, which proves that AI has the ability of independent identification and control, that is, the ability of criminal responsibility [7]. Secondly, the actor with criminal responsibility ability can become the subject of criminal responsibility. At present, the subject of criminal responsibility stipulated in our country includes natural persons and units. Artificial intelligence and units are all inanimate things. In some cases, the unit is fabricated as the subject of criminal responsibility by law. This means that with the development of artificial intelligence, AI can also be fabricated as the subject of criminal responsibility by law in some specific cases. Finally, as far as AI is concerned, since it has the ability of identification and control, the applicable penalty can also be reformed, so that the criminal subject can receive education and be deterred, so that it can not, dare not, and do not want to repeat, so as to achieve the purpose of special prevention of punishment [8].
4 My Views on the Subject of Artificial Intelligence Crime At present, AI does not possess the qualification of criminal subject. We should use the existing theory of criminal subject to coordinate and solve the problem of the subject of AI crime, focusing on natural persons and units. Article 17.18.19 of The Criminal Law of the People’s Republic of China indicates that the subject of crime in our criminal law is limited to natural persons, not non-living bodies other than human beings. Therefore, the behavior implemented by AI can not be summarized as criminal behavior. There is no theoretical basis for incorporating AI into criminal acts, and the behavior it implements can not be evaluated as criminal acts, nor can it be regarded as the subject of crime [9]. However, in the long run, we can refer to the idea of unit as the subject of crime, and construct the legal fiction model of AI criminal subject qualification. The reasons are as follows: Firstly, with the rapid development and continuous evolution of artificial intelligence technology, intelligent robots are becoming more and more like “people”. In the future, intelligent robots may not only have intelligence quotient, but also
320
H. Huang
emotional quotient. According to the development of AI and on the premise of taking natural person as the center, the law should make specific regulations on the research and development and use process of AI in time, gradually build and improve the meaning and behavior elements of AI subject, and consider bringing AI into the scope of criminal subject in the right time, so as to prevent the situation that legal interests can not be relieved. Secondly, it is feasible to bring artificial general intelligence into the scope of criminal subject. Referring to the double penalty system of our country’s Criminal Law for units, we can use the relevant criminal law theory to solve the application of artificial intelligence as the subject of crime in the penalty system, and apply the subject of double penalty system to artificial intelligence and other natural persons such as researchers and users [10].
5 Concluding Remarks Through the above analysis of AI crimes, we should anticipate the possible criminal risks in the era of AI in advance, clarify the legal characteristics and legal status of AI, and clarify the way AI bearing criminal responsibility in advance. We need to reserve the necessary space for legal drafting, and gradually build and improve the scientific normative system of artificial intelligence crime on the basis of focusing on legislative foresight. The renewal and development of criminal law theory and criminal law provisions are adapted to social development. Exploring the theory and legislative response of AI crime is not only focusing on the current new problems, but also a new thinking of looking into the future.
References 1. Xiao, Si, and Cao Jianfeng. 2017. On the civil liability of artificial intelligence. Science of Law 35(5): 166–173 (in Chinese) . 2. Zeng, Yuan. 2017. Limited legal personality analysis of artificial intelligence. Oriental Law 12(5): 50–57 (in Chinese). 3. Parker, Lynne E. 2018. Creation of the national artificial intelligence research and development strategic plan. AI Magazine 4(2): 25–31. 4. Hilt, Kailee. 2017. What does the future hold for the law librarian in the advent of artificial intelligence. Canadian Journal of Information and Library Science 11(3): 211–227. 5. Jiang, Huang, and Zhang Chunyan. 2016. The road to the future of artificial intelligence. Tsinghua Business Review 45(1): 21–28 (in Chinese). 6. Zhiguo, Ma, and Tian Xiaochu. 2018. The possibility of applying criminal law to artificial intelligence body. Journal of Huazhong University of Science and Technology 52(2): 108–115 (in Chinese). 7. Handong, Wu. 2017. Institutional arrangements and legal regulation in age of artificial intelligence. Science of Law 35(5): 128–136 (in Chinese). 8. Tizheng, Zhu. 2018. Legal responses in the age of artificial intelligence. Journal of Dalian University of Technology (Social Sciences) 15(2):97–102 (in Chinese).
Analysis on the Criminal Subject …
321
9. Qianyun, Wang. 2019. The criminal law system on data security crime under the background of artificial intelligence. Legal Forum 29(1): 27–36 (in Chinese). 10. Xianquan, Liu. 2019. The path of criminal regulation of artificial intelligence crime. Modern Law Science 25(2): 75–83 (in Chinese).
U.S. Air Force Target Knowledge Graph Construction Based on Multi-source Intelligence Analysis Ruijuan Hu
Abstract With the multi-source intelligence data grow exponentially, traditional methods can barely satisfy the requirement, which means to organize and understand the tremendous military knowledge. So, this research project aims to develop unified, highly connected military knowledge graph to integrate information. Using frontend interaction technology, supporting learning function based on inference, errorcorrecting and marking, this graph can continuously modify the logic model and improve the intelligence of itself, so the knowledge will be solid in our department. By doing this, we can reduce our dependence on the experience of special experts, and moreover, provide platform for developing data-driven general battle system in recent years. Keywords Multi-source intelligence · Graph database · Knowledge graph
1 Introduction With the explosive growth of battlefield information and intelligence data of frontline units, the traditional search engine and query methods can no longer satisfy the acquisition and understanding of a large amount of military knowledge. By constructing the knowledge map of the military field of the US Air Force operational targets in the circum-Pacific region, we can provide efficient information retrieval, data de-redundancy and integration, and target potential for front-line units’ intelligence operations. Relation discovery and support intelligence support, combat planning and assistant decision-making and other applications [1]. At present, knowledge graph technology has shown great advantages in solving the accuracy and scalability of knowledge query, and has become a hot research topic. Internet companies led by Google have built a series of application-oriented knowledge maps. In China, Sogou “Knowing Cube” and Baidu “Knowing Heart” [2] are the leading Internet companies. All walks of life have begun to build domain knowledge maps. However, most of the existing knowledge graphs are general, and R. Hu (B) PLA Strategic Support Force Information Engineering University, Zhengzhou 450000, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_41
323
324
R. Hu
Fig. 1 Construction process of military knowledge graph
there is no better way to construct and express the domain knowledge graphs with strong pertinence, especially in the military field.
2 Knowledge Graph Construction Technology Data acquisition, knowledge extraction, knowledge representation, knowledge storage, knowledge reasoning and other technologies need to be involved in the process of building military knowledge graph. The overall flow chart is as shown in Fig. 1. It gives the overall structure of knowledge graph technology [3], in which the part of dotted line frame is the process of knowledge graph construction and knowledge graph updating. Figure 1 shows that the process of knowledge graph construction is based on the original data, using a series of automatic or semi-automatic technical means, extracting knowledge elements (i.e. facts) from the original data and storing them into knowledge. The process of identifying database layer and schema layer. This is an iterative updating process.
3 Construction of Knowledge Graph of U.S. Army Target Based on Multi-source Intelligence 3.1 Knowledge Extraction After years of business accumulation, the amount of existing text data in a unit is huge, so the field of text mining has received extensive attention in recent years.
U.S. Air Force Target Knowledge Graph …
325
Most of these text data come from a variety of means, with different forms, such as speeches, important enemy information obtained, Internet news and so on. Most of these data are unstructured text, which is easy for human to process and recognize, but it is very difficult for machine to understand. There is no doubt that a great deal of valuable enemy information and intelligence exist in such unstructured data. Knowledge extraction is a huge task, including named entity recognition, ambiguity elimination, relationship extraction and other sub-tasks. Because this topic focuses on building knowledge graph from engineering to achieve its basic performance, and because of the existence of highly structured text in the unit, most knowledge extraction work has actually been completed by the unit’s salesmen and experts in their daily work. Therefore, this paper mainly extracts entities, relationships and entity attributes from structured text, and semi-structured text and image information from Web pages. In Web page extraction, Python crawler crawls the information of “nationality”, “base”, “army”, and “aircraft type”, while the weapon information equipped on the plane is obtained from the Web page by using “rear harvester”.
3.2 Knowledge Modeling and Representation Ontology-based modeling method is used in the process of data modeling of instances in knowledge atlas system. Ontology should be composed of four aspects: class, attribute, facet and instance [4]. Class representing a category is the set of attributes of the category, the set of classes is constructed into a domain, each instance is a kind of instance. Properties describes the values of various dimensions of a particular class. Conversely, only by combining various attributes can the category of an instance be clearly identified. Facets constraints of attributes, such as value intervals of numerical types. Instances of corresponding classes, namely entities, are specific stored values in the knowledge graph. Further, there are generally three ways to define the hierarchical structure of a class: top-up method, bottom-up approach and comprehensive method. Top-up method: Firstly, the root node is established, which is similar to the class inheritance system of object-oriented programming. Secondly, the object type is defined, including only the basic attributes and methods, and the level above the root is defined layer by layer. Finally, the underlying class is defined, and the concept is refined by adding subclasses in the way of inheriting the base class. For example, we first define the class of weapons, then define the subclasses of aircraft, ships, tanks and so on, and then refine the characteristics of each class in turn. Every node can describe ontology, but the details of description are different. The more leaf nodes can clearly represent an entity [5]. Bottom-up approach: Define many bottom-level, smallest classes, and combine these refined classes to create a new class. For example, we first define the aircraft as engine, wing, refueling system and mounted weapons, which can attack, transport
326
R. Hu
and refuel. We define these basic classes, and then aggregate some of them to create new classes, such as fighter aircraft to aggregate engine, wing, attack and mount weapons; refueling aircraft to aggregate engine, wing, refueling system, refueling, through this way to aggregate upward into a variety of new classes. Comprehensive method: Combining top-down and bottom-up methods. In the process of system model design, comprehensive method is adopted to model. By referring to the military domain ontology of Wikidata, combined with the relevant work experience and application requirements of frontline experts in practical business, the system defines the categories of the following tables (Table 1). Secondary category inheritance base category,as shown in Table 2. The relationship definitions in the atlas are written in a Cypher-like structure, as shown in the Table 3. Table 1 Definition of ontological basis in military domain Category
Description
Attributes
Position
Military positions, such as “Chief Auditor of the Air Force”
Position profile
Affair
Position Supervisors, e.g. “Human and Reserve Services”
Affair profile
Department
Organs or operational departments, such as the National Aerospace Intelligence Center and the Global Intelligence Brigade
Profile Establishment time Responsible for content
Character
Specific stakeholders, such as Wilson, Harris, etc.
Chinese name English name Gender Age Level (military or civilian title) Performance experience
Equipment
Operational or special weapons, such as B-52 bombers
Equipment performance attribute group (Variable) Whether to assemble troops (true/false)
Country
Countries of concern, such as the United States, Japan, Taiwan, etc.
Country profile
Region
A subordinate area of the country, such as Guam.
Region profile
Base
Bases of concern, such as Kadena
Base attribute group (variable)
Facility
Key military facility, such as airport runways
Facility attribute group
Task
Regular or special missions, such as landing in Normandy
Task attribute group
U.S. Air Force Target Knowledge Graph …
327
Table 2 Secondary concept of ontology in military domain Category
Description
Attributes
Secondary Position
Subordinate to a higher position, such as “Assistant Deputy Chief of Staff” subordinate to “Deputy Chief of Staff”
Position profile
Subordinate Department
Subordinate to superior departments, such as the “11th Air Force” under the “Pacific Air Force Command”
Profile Establishment time Responsibility for content
Subsidiary Equipment
Weapons equipped on an aircraft or ship
Equipment performance attribute group (variable) Whether to assemble troops (true/false)
Subtask
Subtasks of a task subordinate
Task attribute group
3.3 Knowledge Storage 3.3.1
Triple Storage of Raw Data
Knowledge graph is a data structure based on directed graph, which consists of points and directed edges. Each node in the graph is called entity, and the edges represent the logical relationship between entities. Knowledge graph can be represented by triples (entity-1, relationship, entity-2) [6]. Each record describes a fact, such as the fact that (the 33rd Rescue Squadron has eight, HH-60G) means that “the 33rd Rescue Squadron has eight HH-60G”. It should be noted that if the relationship is determined, then the position of entity-1 and entity-2 cannot be reversed, because a triple describes a directed edge (fact); the entity is not necessarily a specific thing in real life, but also an attribute value of the thing, and the relationship is that attribute. One problem to be considered when storing knowledge graphs with triples is Entity Recognition and Entity Disambiguation. For example, the entity “Yokota” may refer to Yokota, Japan, or Yokota Air Force Base. In the process of building knowledge graph, if ambiguity is found, the corresponding superior nodes are added. When selecting the word “Yokota”, the superior nodes are used to disambiguate, and the two entities are established respectively. The region and the base are regarded as the superior nodes. In this research topic, the entity and relational data before storage are organized in triple form.
3.3.2
Graph Database Neo4j Storage
If the traditional relational database is used to store the tremendous amount of triple information of knowledge atlas, the construction of database will be enormous. In relational databases, foreign key constraints are used to achieve the mutual reference
328
R. Hu
Table 3 Ontological relation table in military domain Entity-1
Entity-2
Relationship(using cypher)
Position
Department
Position—[: Subordinate]→Department
Position
Subordinate Departments
Position—[: Subordinate]→Subordinate Departments
Secondary Position
Position
Secondary position—[: affiliate]→Position
Position
Business
Position—[: Supervisor]→Business
Person
Position
Person—[: Position]→Position
Subordinate Department
Department
Subordinate Department—[: Subordinate]→Department
Subordinate Department
Equipment
Subordinate Department—[: Ownership]→Equipment
Department
Equipment
Department—[: Ownership]→Equipment
Subsidiary Equipment
Equipment
Subsidiary Equipment—[: Installation]→Equipment
Subordinate Department
Region
Subordinate Department—[: Located in]→Region
Department
Base
Department—[: Located at]→Base
Subordinate Department
Region
Subordinate Department—[: Located in]→Region
Region
Country
Region—[: Ownership]→Country
Base
Region
Base—[: Located in]→Region
Department
Task
Department—[: Execution]→Task
Subordinate Department
Task
Subordinate Department—[: Execution]→Task
Department
Subtask
Department—[: Execution]→Subtask
Subordinate Department
Task
Subordinate Department—[: Execution]→Task
Subordinate Department
Subtask
Subordinate Department—[: Execution]→Subtask
Subtask
Task
Subtask—[: belonging]→task
relationship between some records of two or more tables. Foreign keys are used to search for matched primary key records in the main table for search and matching computation, because this operation is “computationally intensive” and “memory intensive”, and the number of operations will be at the exponential level of the records in the table, so it needs. Consumption of a large number of system resources [7]. For the storage of knowledge graphs, each kind of entity corresponds to different tables, and each relationship needs to establish a relationship table. When querying, a large
U.S. Air Force Target Knowledge Graph …
329
number of table join operations are time-consuming. Adding, deleting and modifying tables also involve the modification of multiple tables. In particular, when new entity types need to be added to the graphs, a new table structure and its correspondence need to be established. The overall engineering implementation is complex, cumbersome and inefficient. Graph database is a new NoSQL database based on graph theory. Compared with traditional relational databases, graph databases support very flexible and finegrained data models [8]. They can model and manage data applications in a simple and intuitive way. They can easily miniaturize and standardize data units. At the same time, they can realize rich relational connections. For the large amount of relational network information in knowledge atlas, graph database has a natural correspondence with it. There are three kinds of graph data models commonly used in graph databases: Property Graphs, Hypergraphs and Triples. Among them, attribute graph model is more intuitive and easy to understand. It can describe most of the graph usage scenarios. It is also the most popular graph database model nowadays. There are fewer database products in the form of hypergraph and triple. Attribute graph model includes Node, Vertex, Edge, Link, Property and Label [9]. In this data model, knowledge graph is described. A node represents an entity, while the edge corresponds to the relationship between the entity and the entity, and tags are used to distinguish different types of entities. The relationship between nodes in a graph can contain complex attribute information. For queries with complex connections in graph databases, they can basically achieve millisecond-level response. Under the same system resources, their efficiency is much higher than that of relational databases.
3.4 Knowledge Query Neo4j database traversal and query efficiency is very high, its traversal focus is its own localization, traversal query data only use the necessary data, and do not need to use join operation in the relational database as all the data sets to implement expensive grouping operations. With the change of traversal depth, when the number of nodes returned remains unchanged, the query performance of MYSQL decreases slightly, while the query performance of MYSQL decreases with the change of query depth (because most of the Cartesian product is discarded). Neo4j tracks the visited nodes, so it can skip the previously visited nodes, thus improving query performance. The query language of Neo4j graph database is Cypher [10], which describes the sub-graph structure with human-readable syntax and is easy to read and understand. Knowledge inquiry can be carried out in the map of target knowledge of the U.S. Army, such as the organizational structure of the U.S. Air Force, the relevant attributes and subordinate forces of the U.S. base, the relevant information of the designated forces, the stationed bases and the aircraft owned, etc.
330
R. Hu
Fig. 2 Part of U.S. air force target Knowledge graph
4 Experimental Design and Result Analysis 4.1 Data Preparation The experimental data source is structured text data and web page crawling data of military units, among which structured text data is mainly provided by base manuals and air force sequences provided by experts in aircraft and naval fields and U.S. military research fields; the data crawled from pages are deployment data and weapon equipment data of U.S. air base.
4.2 Constructing Target Knowledge Graph of U.S. Army The knowledge graph of the U.S. military target is constructed by data cleaning and data model building. It includes the sequence organization structure of the U.S. Air Force, 5134 base entities, deployment, personnel and equipment of each base. Figure 2 shows the part of the knowledge map of U.S. military objectives.
4.3 Knowledge Query Based on Constructed Knowledge Graph (1) Query the basic attributes and subordinate forces of U.S. bases (Fig. 3). MATCH p = (m:base)-[r:besubordinateto]- > (n:army) WHERE m.country = ”U.S.”
U.S. Air Force Target Knowledge Graph …
331
Fig. 3 Query result of all weapons and equipment of the specified aircraft type
RETURN p (2) Inquire about the basic attributes of the designated troops, their bases and their aircraft. MATCH (m:base) < -[: Bestationed]-(n:army)-[: configure]- > (p:plane) WHERE n.name = “第57联队” RETURN m,n,p (3) Query all models of the specified type of aircraft. MATCH (n:Bomber) RETURN n.name (4) Query all weapons and equipment of the specified aircraft type. MATCH(p:plane)-[:provide]- > (w:weapon) RETURN p,w
4.4 Application Performance Assessment This knowledge graph system uses the Performance tool of Chrome developer tool to monitor the performance of the application, record the running time of the application, record the current page load, CPU occupancy, memory, operation and other contents, and generate statistical reports. Through the test unit’s base manual (5134 entity nodes) knowledge graph loading speed in 09, dragging the nodes, browsing pictures, rich text and other operations, the application performance was checked, and the operation of knowledge graph
332
R. Hu
containing 5134 nodes in 60 s was recorded with Chrome Performance as shown in Fig. 4. The index and parameter values of this system are mainly analyzed from four aspects: memory occupancy, resource occupancy, code analysis and time occupancy. The results are as shown in Table 4. Within 60 s, 84.84% of the time was spent executing JS scripts and rendering web pages. At the same time, in 60 s, node dragging and entity content viewing operations were successfully carried out to achieve performance expectations. Under normal use, the occupancy of various resources is within acceptable range. The test results show that the application runs smoothly, but the response time and occupied resources increase correspondingly.
Fig. 4 Large-scale knowledge map rendering performance monitoring results
Table 4 Application Performance Assessment Index
Parametric numerical analysis
General situation of application
Memory occupancy instructions: heap (HEAP) usage is 2.9–37.3 MB
Resource occupation
Network: Requests are focused on loading and rendering knowledge map nodes Frame rate: When displaying the knowledge map, the frame rate is low. Low frame rate shows that the application will not occupy extra resources
Code analysis
JS heap: The heap occupies 2.9–37.3 MB. The loading map is huge and the memory occupies a lot Nodes: Document tree nodes, 109644–227508, with the expansion of the atlas, the number of nodes increased accordingly
Time occupancy
Loading: Data loading, 26.6 ms_ Scripting: JS script execution, 25049.6 MS Rendering: Web page dyeing, 25852.8 MS Painting: Web page drawing, 1540.1 MS Other: Network waiting, operation, etc., 1518.9 MS Idle: idle, 6080.8 MS
U.S. Air Force Target Knowledge Graph …
333
5 Conclusion According to the actual needs of the front-line units and the suggestions of experts in the field of the US Army, this paper puts forward a set of construction scheme of knowledge atlas system, and further gives the implementation process of the whole project. The data used in the system are mainly the data of the existing units of the US Army, supplemented by some open information sources on the Internet. At present, the knowledge map only has the part of the U.S. Air Force in the organizational structure of the U.S. Army. Follow-up consideration will be given to expanding the data scope and further building the organizational structure network of the U.S. Army deployment in the global scope. At the same time, the accuracy of global military base atlas at the national level, except for the United States, will be further considered to refine the geographical location to the city level, adding special attention to the region, so as to optimize the efficiency of graphs query.
References 1. Wu, Wentao, Hongsong Li, Haixun Wang, and Kenny Q. Zhu. 2012. Probase: A probabilistic taxonomy for text understanding. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, 481–492. ACM. 2. Lehmann, J., R. Isele, M. Jakob, et al. 2015. DBpedia: A large-scale multilingual knowledge base extracted from wikipedia. Semantic Web 6 (2): 167–195. 3. Bin, Ge, Tan Zhen, Zhang Chong, and Xiao Wei-Dong. 2016. Military knowledge graph construction technology. Journal of Command and Control 2 (4): 302–308 (in Chinese). 4. Faguo, Mei, Dai Dawei, and Zhang Yi. 2017. Combat target relation fusion technology based on knowledge map. Command Information System and Technology 8 (5): 81–86. 5. Yuji, Yang, Xu Bie, Hu Jiawei, et al. 2018. An accurate and efficient method for constructing domain knowledge map. Journal of Software 29 (10): 2931–2947. http://www.jos.org.cn/10009825/5552.htm. 6. Hong, Wang, Zhang Qingqing, Cai Weiwei, et al. 2017. Research on domain ontology storage method based on Neo4j. Computer Application Research 34 (8): 1–6 (in Chinese). 7. Zenglin, Xu, Sheng Yongpan, He Lirong, et al. 2016. Overview of knowledge mapping technology. Journal of University of Electronic Science and Technology 45 (4): 589–606. 8. Xuan, Luo. 2018. Design and implementation of personal knowledge management platform based on knowledge map. Master’s Degree thesis of Beijing University of Posts and Telecommunications, 63–68. 9. Alan, A., L. Alexander, and N. Krake. 2012. N-ary facts in open information extraction, Proceedings of the Joint workshop on Automatic Knowledge Base construction and Web-scale Knowledge Extraction.Stroudsburg, PA, ACL 52–56. 10. Kalmegh,P., and S.B. Navathe. 2012. Graph database design challenges using HPC platforms. In 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC), 10–16. Piscataway, NJ: IEEE, 1306–1309.
Design of Virtual Experiment Platform Based on MATLAB Simulation Technology Liyan Zhao and Aize She
Abstract MATLAB provides matrix operations, drawing functions and data, implementing algorithms, creating user interfaces, connecting programs to other programming languages, and providing a graphical interface to Windows. According to the characteristics of MATLAB simulation software, this paper explores its application in automation teaching. Keywords MATLAB simulation technology · Virtual reality technology · Multimedia teaching · Experimental platform
1 Introduction MATLAB is a combination of the two words matrix & laboratory, meaning matrix factory (matrix lab). MATLAB is an interactive software system that combines command translation and scientific computing. It is a commercial mathematics software produced by MathWorks, USA. It can be used in advanced technical computing languages and interactive environments for algorithm development, data visualization, data analysis, and numerical computing. It can perform matrix operations, draw functions and data, implement algorithms, create user interfaces, programs that connect to other programming languages, and more. Moreover, it is mainly used in engineering computing, control design, signal processing and communication, image processing, signal detection, financial modeling design and analysis. With great improvements in core numerical algorithms, interface design, external interfaces, application desktops, etc., MATLAB is highly integrated with its powerful mathematical computing capabilities, convenient and practical drawing functions, and language [1]. It has gradually developed into a general programming language for scientific computing, graphical interactive systems and control system simulation [2]. The MATLAB L. Zhao (B) Jilin Engineering Normal University, Changchun 130052, China e-mail: [email protected] A. She Hohai University School of Energy and Electric, Nanjing 211100, China © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_42
335
336
L. Zhao and A. She
language has the following four characteristics: the first is efficient numerical calculation and symbolic calculation function, which can free users from complicated mathematical analysis; The second is to have a complete graphics processing function to achieve the visualization of calculation results and programming; the third is a friendly user interface and a natural language close to mathematical expressions, making it easy for scholars to learn and master; The fourth is a feature-rich application toolbox (such as signal processing toolbox, communication toolbox, etc.), providing users with a large number of convenient and practical processing tools [3]. Because MATLAB has such characteristics, it is widely used in computer-aided analysis, design, simulation, and teaching. Therefore, it is practical and necessary to introduce the MATLAB/Simulink language environment to establish a “soft experiment” environment for related courses [4, 5].
2 Application of MATLAB Simulation Technology in Experimental Teaching Current experiments in electric power automatic control systems, electrical engineering, and power system operations are generally performed on parameters and characteristics. It can be realized in the laboratory through various instruments, connecting lines and experimental equipment. This method can exercise students’ hands-on ability and is a very important part of professional teaching. However, the high price of the components of the system usually requires complicated parameter calculations to build the system circuit. If the parameter exceeds the tolerance range of the device parameters, it may cause system failure, burn out the device, etc. Therefore, computer simulation is introduced in the experiment for fault analysis and troubleshooting. After the circuit is verified by the simulation program, the actual connection is performed, which not only reduces the occurrence of the failure, but also increases the safety factor and success rate of the experiment. Using Matlab, we can simulate the automatic control system and demonstrate the system modeling, analysis and debugging process to students through multimedia teaching. However, when the actual teaching, the use of the program and the parameter debugging are more troublesome, each parameter debugging must be run on the host, and then the effect on the target machine can be observed. Although the teaching effect is improved, the time taken by the debugging program increases, and the parameter setting is not easy [6, 7]. A graphical user interface for graphical user interface development environment provided by Matlab is used to quickly construct a graphical user interface. Using GUIDE to process graphical user interfaces is as easy as drawing on paper. Figure 1 shows the GUIDE program interface: The toolbar is given on the left side of the interface. There are 9 kinds of interface controls. The window area on the right is the user area to be designed. Double-click on the user area and a function dialog appears, allowing the user to modify the contents to change the properties of the window. The user can make his own interface in this window. By selecting
Design of Virtual Experiment Platform …
337
Fig. 1 Guide program interface and description
Fig. 2 Lorenz control simulation experiment platform
one of the controls by left-clicking, the control can be drawn in the user area on the right side, and the function is customized, and the callback function (callback) of the corresponding control is established. The interface created by GUIDE software can adjust the controller parameters and operating environment in real time and can display various parameters. Therefore, the virtual instrument developed by Matlab is used for teaching, which enables students to feel the working environment of the laboratory in the classroom. Figure 2 shows the simulation experiment platform controlled by Lorenz. Different dynamic curves and response characteristics can be obtained by modifying the parameters in the parameter setting column.
338
L. Zhao and A. She
3 Perfect Combination of MATLAB Simulation Technology and Virtual Reality Technology Virtual reality is a combination of computer graphics, optoelectronic imaging technology, sensing technology, computer simulation, artificial intelligence and other technologies to create a realistic computer system with various perceptions such as sight, hearing, touch, smell and taste. People use various interactive devices to immerse themselves in the virtual environment and interact with entities in the virtual environment to produce experiences and feelings equivalent to the real physical environment, making the user feel as if they are there. Figure 3 is a block diagram of the aircraft flight simulation module based on the MATLAB Virtual Reality Toolbox. After the simulation run, the virtual reality picture of the flight process of Fig. 4 is obtained. The simulation uses interactive visual simulation. Students can not only watch the simulation, but also operate some of them to move them autonomously in space. In the course of the experiment, students can also adjust the scene according to their own preferences, which will enable students to have a strong sense of participation, stimulate their enthusiasm for learning, and achieve the purpose of improving the quality of teaching [8, 9]. Fig. 3 Aircraft flight simulation module block diagram
Fig. 4 Virtual reality display of aircraft flight process
Design of Virtual Experiment Platform …
339
4 Simulate the Experimental Environment with MATLAB /Simulink Simulation Software In the classroom teaching process, it is very difficult to optimize the structure and parameters of some real systems, and the simulation can play its special optimization design function. The optimization module provided by MATLAB/Simulink can be used in some experiments that need to adjust the parameter settings. Usually, the simulation needs to determine the optimal value or range of values. Then, the circuit connection is made on the test bench, which avoids burning the components on the test bench and saves the experiment time. After the simulation program, each student has the opportunity to participate in practical debugging, and at the same time, the experimental content can be appropriately increased to further develop students’ practical ability. In order for students to understand the results of theoretical analysis, it is sometimes necessary to bring teaching aids into the classroom and experimentally verify the system characteristics of the analysis. After the establishment of the MATLAB simulation platform, some typical system design cases can be directly applied to the MAT-LAB/SIMULINK simulation software for demonstration, so that physical aids are no longer needed. SIMULINK also offers a wide range of curve and data output modules. In order to improve the connection between students’ theory and practice, SIMU-LINK provides a series of ActiveX technology dial and gauge display components, such as ammeters, pressure gauges, etc. (as shown in Fig. 6). Take the asynchronous motor simulink simulation model in Fig. 5 as an example, and the output port uses a virtual oscilloscope. Through simulation, you can see the desired response speed of the asynchronous motor output speed and torque in the virtual oscilloscope (as shown in Fig. 6). The platform created by matlab software can largely solve a large number of matrix analysis, principle analysis, data calculation and other issues in the automation Fig. 5 Simulation model of asynchronous motor simulink
340
L. Zhao and A. She
Fig. 6 Asynchronous motor speed and error waveform
professional teaching. Students can design independently and build circuits on the virtual platform according to their own design needs. Various control algorithms are used to adjust the motor speed and debug the functional unit. The system can also be optimized to achieve personal ideas. In the development of electric drive systems in some industrial fields, new controllers are tested directly using actual motor systems [10]. It is difficult to implement and costly. Therefore, the emergence of the simulation system not only facilitates it, but also makes the original cumbersome abstraction vivid. And the courseware produced by the software is very interactive, which greatly mobilizes the enthusiasm of the students, and reduces the maintenance cost of the experimental equipment and the consumption of low-value consumables.
References 1. Fang, Liu, Wu Chengjiu, and Pan Juntao. 2016. Construction of power electronic circuit simulation platform based on Matlab/GUI. Experimental Technology and Management (1) (in Chinese). 2. Chao, Feng. 2013. Design and application of electric vehicle simulation model based on Matlab/Simulink, University of Chinese Academy of Sciences. 3. Xianxiang, Wu, Guo Baolong, Yan Yunyi, Zhu Juanjuan, and Meng Fanjie. 2016. Discussion on auxiliary teaching of “automatic control principle” course based on Matlab. Journal of Electrical and Electronic Education (6) (in Chinese). 4. Xianlun, Tang, and Liu Xiangde. 2014. Three-dimensional construction of power electronics and electric drive series courses. Laboratory Research and Exploration (9)(in Chinese). 5. Rui, Wang. 2010. Application of Matlab in experimental platform. Science and Technology Information(in Chinese). 6. Liangyu, Su, Wang Wu, and Ge Yu. 2013. Power electronics technology simulation experiment teaching and innovative thinking development. Experimental Technology and Management (1) (in Chinese). 7. Youling, Yu, and Xu Zhiyu. 2015. Power electronics research experiment based on Matlab/Sim Power Systems. Experimental Technology and Management (11) (in Chinese). 8. Tianlin, Niu, and Fan Bo. 2015. Application of Matlab/Simulink simulation in power electronic technology teaching. Laboratory Research and Exploration (2) (in Chinese).
Design of Virtual Experiment Platform …
341
9. Jiali, Wang, Jin Shuangyan. 2019. Return to the simple digital signal processing classroom. Computer Knowledge and Technology (10) (in Chinese). 10. Weiwei, Gong, Feng Shanshan, and Han Xi. 2017. Rapid construction technology of experimental platform based on Matlab GUI. University Physics Experiment (2) (in Chinese).
Traditional Culture Teaching in Chinese Education Under Internet Thinking Wenli Zhong
Abstract The importance of traditional culture teaching has received more and more attention, and the desire to learn Chinese has become more and more intense. However, the traditional cultural education has been impacted by the Internet, and this kind of impact has changed the traditional cultural education in all aspects. How to choose richer content and adopt a more appropriate teaching method is a problem that Chinese traditional culture educators face today. By analyzing the problems encountered in the development of Chinese traditional culture, this paper proposes a kind of introduction of Internet technology into traditional culture education, thinking about traditional culture education from the perspective and perspective of the Internet, and the strategies that can be chosen in teaching. Keywords Chinese education · Traditional culture teaching · Cultural factors · Strategy · Internet thinking
1 Introduction The teaching of cultural factors in Chinese teaching is still in an immature stage. There are still some problems in the whole teaching process, and the existence of these problems will affect the teaching effect and the development of cultural factors teaching to some extent [1, 2]. Among the Chinese textbooks, it is one of the textbooks with a wide range of use and high frequency of use. It contains a wide range of cultural factors and is highly practical [3, 4]. When Chinese teachers use textbooks to teach cultural factors, only by profoundly understanding the connotation of culture and choosing the correct way of introduction can the meaning of culture itself be effectively disseminated [5, 6]. For the cultural factors to be imported, we should choose the mainstream Chinese cultural factors [7]. Some scholars once thought that “language and culture are not a general juxtaposition, but a partial and overall treatment relationship, or a special juxtaposition of point-to-face treatment. Culture includes language, and language is a special culture in culture” [8]. This paper, W. Zhong (B) Yunnan Technology and Business University, Kunming, Yunnan, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_43
343
344
W. Zhong
through the teaching of cultural factors to assist foreign students to learn Chinese knowledge, can stimulate the motivation and interest of foreign students to learn Chinese knowledge to a certain extent. Especially in the advanced stage of Chinese learning, when students encounter bottlenecks in the process of learning Chinese, it is undoubtedly a stimulant to add cultural factors to teaching.
2 Research on the Teaching Theory of Traditional Culture 2.1 Importance of Traditional Culture Teaching As we all know, language and culture are inseparable. On the basis of mastering pronunciation, vocabulary and grammar, it is also very important for learners to understand the cultural customs of the target language countries to improve their communicative competence. It can be seen from this that the cultural teaching of Chinese international education is extremely important and necessary. Chinese traditional culture includes not only traditional customs and customs, traditional festivals and some specific cultural products, but also traditional spiritual culture, that is, “the crystallization of national wisdom, including philosophy and religion, is based on the thinking of human itself and the relationship between human and nature, and society”. With the vigorous development of the international promotion of Chinese language and the development of Chinese as a second language teaching, in recent years, the establishment of Chinese government scholarships and Confucius Institute scholarships has greatly improved the quality and level of students. In addition, the rapid development of Confucius Institutes has also put forward higher requirements for Chinese learning along with years of study in China. With the extension of Chinese language and the improvement of Chinese language level, the learners’ contacts with Chinese society are getting deeper and deeper. The cultural teaching of cultural customs, cultural products and traditional festivals can not satisfy the students’ desire to know what they are. How to carry out the deep traditional culture teaching—traditional spiritual culture teaching has become a problem to be solved.
2.2 The Meaning of Cultural Factors Many learners choose to learn Chinese language, mainly from the curiosity of traditional Chinese culture. Therefore, in the teaching of Chinese, we should specially design and carefully prepare the content of the cultural teaching part, help the learners to eliminate the obstacles caused by the mother tongue culture factors, solve the difficulties brought by the cultural differences as much as possible, and guide step by step. Learners pay attention to the Chinese language itself, so that cultural teaching can be organically integrated into the teaching of Chinese as a foreign language.
Traditional Culture Teaching in Chinese Education …
345
Through fun learning, lead learners to experience different learning processes, discover the charm of Chinese language more quickly, and discover the cultural factors of language. Some scholars have pointed out: “From the perspective of language learning and language teaching, we must study the relationship between language and culture, because language understanding and language use are inseparable from certain cultural factors.” Teachers completed the speech in the classroom, The teaching of vocabulary and grammar, if this process is separated from the understanding of the specific cultural connotations and backgrounds of these linguistic elements, without understanding the behaviors and psychology in the process of using the language, it is still impossible for the learners to achieve effective communication. At the same time, the combination of cultural teaching and language teaching allows learners to have fun in exploration and discovery, and then to learn spontaneously and spontaneously, and is always proud of their unique insights, which will undoubtedly master the learners. Language plays a vital role.
2.3 The Relationship Between Language and Culture in Chinese Education Language is not a tool for conveying this simple meaning with words and words. Language is a complex coal that is composed of various factors such as human thinking, spirit and feelings. The use of language is closely related to the current thinking. Moreover, the language used by humans is not static, but varies according to the environment and the way they think. In this way, language is a simple expression tool that revolves around the existence of human beings. So the concept of language is not an independent element. It must be explained along with the factors of language existence. All things can be called culture. Culture is the sum of material wealth and spiritual wealth created by human beings in the process of social and historical development, especially spiritual wealth. The so-called culture refers to the lifestyle of the local society that has been inherited from history. Language is a system of actions consisting of traditions, and this system of action is made up of multiple components. The most important of these is the way of thinking, attitude and social value system of members of society. Language not only conveys the communication between people, but also has the creation and inheritance of culture. It can be seen that culture and language are not separate, but have an inseparable relationship.
346
W. Zhong
3 Problems in the Teaching of Developing Chinese Traditional Culture 3.1 The Simplification of Teaching Methods in Teaching These cultural factors presented in the book should be explained in depth by teachers, and at the same time, they should predict which way to introduce them is the most appropriate. At present, most of the explanations of cultural factors in teaching are relatively single in the traditional way of education, which is transmitted to students through teachers’ oral statements. Moreover, most of the objects of this book are students of advanced classes. Therefore, some teachers will think that it is not necessary to stimulate the interest of foreign students and focus their attention in the way of teaching in junior and middle classes. As stated in the second chapter of this paper, when a large proportion of cultural factors is involved, it will inevitably aggravate the singularity of the introduction of cultural factors to a certain extent. Change. Only using a single statement or teaching method that students are already familiar with will make students feel tired and outmoded, thus losing the fresh sense of exploring the culture. Therefore, in order to achieve the teaching effect, we should choose a relatively appropriate and novel way to teach cultural factors.
3.2 Cultural Factors and Language Teaching Cannot Achieve Unity Cultural factors teaching and language teaching are complementary and indispensable in the classroom of Chinese as a foreign language. At present, the relationship between the two in teaching is shown in Fig. 1. No matter whether it is Chinese or which language teaching is essential in the teaching process of language teaching, it will be supplemented by cultural teaching. However, some Chinese lessons isolate the cultural connotation behind the language and put a lot of time into the pronunciation and grammar, thus neglecting the teaching of cultural factors. Cultural factors 6 4 2 0
1
2
3
cultural factor
4
5
6
Language Teaching
Fig. 1 Relationship between cultural factors and language teaching
7
Traditional Culture Teaching in Chinese Education …
347
should be justified in the process of language teaching. At the same time, language teaching establishes a solid framework for cultural teaching, so that students can absorb cultural factors as much as possible in the process of learning language. The teaching of cultural factors has long been regarded as one of the important factors that constitute the teaching of Chinese as a foreign language. To a certain extent, it also reminds the instructors that cultural factors should also be taken seriously. Don’t neglect the explanation of cultural factors, so that cultural factors can play their auxiliary role and achieve the unity of cultural factors teaching and language teaching.
3.3 Some Teachers’ Cultural Factors Are Insufficiently Understood On the basis of being familiar with Chinese native culture, teachers have the ability to explain the textbooks and at the same time, they must be extensively involved in the cultures of countries around the world. Nowadays, Chinese teachers are mostly teachers of the linguistics of the liberal arts college or are temporarily seconded to this. In one post, the training of relevant professional content has not been carried out, which has led to some lack of teachers’ cultural literacy. However, this is not only in the personal reasons of the teachers, but also in the daily teaching life of the students, and also in the emotional communication with the students. In the classroom, when you need examples in the classroom, you don’t notice problems that may arise in cross-cultural communication. In the classroom, you will cause unnecessary misunderstandings. These misunderstandings will lead to barriers between students and teachers of different national cultures and customs. It is difficult to have good interaction with teachers in class, and it is even more impossible for such students to have further communication with teachers under the class. In addition, through the analysis of the distribution of cultural factors, we can also see that the cultural factors in the development of Chinese culture cover a wide range of aspects, and the higher the cultural literacy of teachers themselves. However, some teachers still fail to reach this level.
4 Coping Strategies in Traditional Culture Teaching 4.1 Reasonable Selection of Content in Traditional Culture Teaching In Chinese education, language teaching itself has a certain degree of boringness and unity. Because of the exclusion of students from the second language, teaching is
348
W. Zhong
more boring. Experiential teaching requires the participation of students and handson, which requires the fun of teaching content. Chinese culture is profound and profound. In order to mobilize students’ participation, it is necessary to select interesting content for teaching, or to explain in depth, to enhance the fun of teaching content through rich teaching methods. Strong story is an important feature of intellectual culture. There is a story behind each cultural knowledge. There can be stories behind each definition. The characters, plots, suspense and hints of the story can attract students’ participation. Choosing stories with interesting stories can bring together many traditional Chinese cultural figures and ideas, and can reflect Chinese traditional cultural concepts well. While paying attention to fun, it is also integrated with Chinese culture and organically unified. At the same time, while teaching emphasizes fun and participation, it should pay more attention to the thinking after students participate, especially the cultural class. In addition to letting students know the external manifestations of culture, we need to let students understand the meaning behind the form.
4.2 Combining Practice with Theory in Traditional Culture Teaching The combination of practice and theory is mainly for the content of teaching. The cultural knowledge points are quite rich and the coverage is quite extensive. Therefore, when teaching traditional culture, we must establish a holistic concept and grasp the content of the teaching from a systematic perspective, instead of making the various knowledge points of the culture too scattered, there is no connection in the knowledge points, there is no connection between the courses, and there is no connection in the learning stage. Of course, if there is a whole light, it will give people a big, ubiquitous, unstressed feeling, and the effect will be greatly reduced. Part of it is also involved, part of it should be representative of the whole, part should have a clear example, can give people a vivid intuition. Therefore, the teaching content should be point-to-face. But whether it is a classroom experience or an off-campus experience, it is not purely, it is a combination of teaching tasks with teaching purposes. At the same time, in addition to the interest in teaching, we must also pay attention to the concept of teaching. In various activities, teachers should set up corresponding teaching tasks, let students practice in learning, and learn in practice. The two are mutual and the efficiency brought to the classroom is different, as shown in Fig. 2.
Traditional Culture Teaching in Chinese Education …
349
6 4 2 0
1
2 practice
3 theory
4 Effect
Fig. 2 The combination of practice and theory
4.3 Teachers Should Constantly Improve Their Self-quality in Traditional Culture Teaching Teachers are the key to the success of cultural teaching. Teachers with cultural skills can carry out cultural teaching more effectively. The role of teachers is very important for effective cultural teaching by various teaching parties. The qualifications of Chinese teachers are not simply technical personnel, but constantly developed and improved. Introducing a variety of teaching methods, in order to effectively educate, we must constantly check ourselves. Such a posture is the teacher’s own efforts, but through research or other education can establish a correct posture. In order to better implement cultural teaching, teachers should play a flexible role. At the same time, education departments need to provide targeted training opportunities for school teachers at different levels. Every teacher should learn Chinese and culture by himself, and actively participate in various training activities to improve his Chinese level and cultural knowledge. No matter how smart the textbooks are, how to make a reasonable education plan or how to implement the education curriculum correctly depends on the practice of the teachers in class. Therefore, the most important thing in Chinese teaching and culture teaching is the role of teachers themselves. In order to achieve better teaching, teachers and students should cooperate with each other in school education conditions and environment.
5 Conclusion We should combine language teaching with cultural teaching, follow the principles of shallow to deep, step by step, arouse interest and guide understanding, and carry out the teaching of traditional spiritual culture timely, moderately and appropriately at all stages of language teaching. Nowadays, the enthusiasm of Chinese language education is not high, and the real scene of Chinese language education is not mature. Real Chinese education is not only the study of Chinese, but also the full understanding and experience of the traditional Chinese cultural characteristics and diversity.
350
W. Zhong
References 1. Tan, Charlene. 2015. Education policy borrowing and cultural scripts for teaching in China. Comparative Education 51 (2): 196–211. 2. Wang, X., and T. Wang. 2018. Discourse on nationalism in China’s traditional cultural education: Teachers’ perspectives. Educational Philosophy and Theory 50 (12): 1–12. 3. Hong-Li, P. 2017. Research on Chinese culture aphasia in college English teaching and countermeasures. Chinese and American English Teaching: English Edition 7 (14): 420. 4. Sum, R.K.W., M.S. Ma, A.S. Ha, et al. 2016. Action research exploring Chinese physical education teachers’ value of physical education: From belief to culture. Asia Pacific Journal of Sport and Social Science 5 (1): 1–15. 5. Wu, Ming-Hsuan. 2017. Examining Mandarin Chinese teachers’ cultural knowledge in relation to their capacity as successful teachers in the United States. Asian-Pacific Journal of Second and Foreign Language Education 2 (1): 11. 6. Hsu, S. 2015. Education as cultivation in Chinese culture. Education in the Asia-Pacific Region: Issues, Concerns and Prospects 26 (3): 260–264. 7. Wang, Z. [IEEE 2018 International Conference on Robots & Intelligent System (ICRIS)— Changsha, China (26 May 2018–27 May 2018)] 2018 International Conference on Robots & Intelligent System (ICRIS)—The Evaluation Model of Teaching Quality of Modern and Contemporary Literature in Chinese Higher Education Based on Support Vector Regression Algorithm (SVRA): 452–455. 8. Yang, Y., and G. Welch. 2016. Pedagogical challenges in folk music teaching in higher education/a case study of Hua’er music in China. British Journal of Music Education 2016 (1): 1–19.
College Students’ Entrepreneurship Psychology Education System and Practice Based on Computer Network Yan Zheng and Xu Wang
Abstract Under the background of China’s education system reform, college education should also continue to reform the education model to adapt to the demand characteristics of social development in the new era. In the continuous development of information technology, computer networks have gradually appeared in people’s field of vision, and have become an important driving force for the adjustment of industrial structure in traditional industries. Education should also rely on the advantages of computer networks to achieve education system reform and promote the all-round development of students. Innovation and entrepreneurship education is an important part of college education, and it is also an encouragement for entrepreneurial talents in China’s economic development. It is necessary to integrate college students’ entrepreneurial parks with innovation and entrepreneurship education to create a foundation for the development of college students. This paper will explore the integration mode of college students’ entrepreneurial parks and innovation and entrepreneurship education under the background of computer network. According to the shortcomings of entrepreneurial psychology education in the four aspects of college students and college students, the reasons for these shortcomings are analyzed. Keywords Computer network · College students · Psychological education · Practical research
1 Introduction The application of advanced technologies such as cloud computing and big data in various fields of society provides ideas for the reform of the education sector. The education model can be innovated by means of advanced network information technology [1, 2], which is the source of education for China’s education. An important way to continuously develop vitality [3–6]. College student entrepreneurship park is an important channel for students to carry out entrepreneurial practice, which can Y. Zheng (B) · X. Wang Jilin Engineering Normal University, Changchun 130052, China e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 C. Huang et al. (eds.), Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), Advances in Intelligent Systems and Computing 1088, https://doi.org/10.1007/978-981-15-1468-5_44
351
352
Y. Zheng and X. Wang
continuously enhance students’ practical ability and enhance their understanding of the knowledge they have learned [7, 8]. Innovative entrepreneurship education is an important educational content that encourages talents to start a business in the current market economy development process, and is of great significance for stimulating China’s economic growth [9]. Effectively integrating innovative entrepreneurship education with college students’ entrepreneurial parks can continuously enhance students’ social resilience and help them improve their practical ability after completing school knowledge learning [10–14]. Under the environment of computer network, the integration of college students’ entrepreneurial parks and innovation and entrepreneurship education is closer, which can continuously enhance the advanced nature and era of innovation and entrepreneurship education. Based on the understanding of the current situation of college students’ entrepreneurial psychology education and the reasons, this paper puts forward what kind of measures should be taken from the perspective of the state and the school, and what kind of suggestions should be adopted at the small level of family and individual to work together. To shape the good psychological quality of college students’ entrepreneurship.
2 Computer Network and Background The social economy is prosperous and developing. The computer network is not only a high-tech in the traditional sense, but an era. In the era of computer networks, no matter whether you are willing or unwilling to accept it, it is extremely difficult to completely avoid the impact of computer networks. In the era of computer networks, our thinking, learning, living, and working methods are changing. We can no longer use traditional thinking patterns to face this era. We need to use computer networks in life and study, and enjoy computer networks. The convenience brought by life. As an era, computer networks have the following three distinct characteristics: 1. Interconnected with Each Other. The mutual connectivity of computer networks spans geographical restrictions and overcomes the gap between time and space, enabling anyone to communicate anywhere, anytime. The computer network connects the whole world closely, and the various elements in the world are combined and intertwined without boundaries. Similarly, the computer network makes the distance between the main students of entrepreneurship education and teachers more and more close, and there is no barrier to geographical communication between students and students, which promotes better communication between the two sides. 2. Big Data Is Highly Mobile. The era of computer network is the era of big data. The big data generated by computer networks anytime and anywhere has the characteristics of dynamicity, predictability and sample accuracy. Sample accuracy means that big data, although very large in sample size, is much more accurate than sampled samples. Enterprises can conduct qualitative and quantitative analysis through big data generated by computer networks, and the results
College Students’ Entrepreneurship Psychology Education System …
353
Fig. 1 A sketch of business models for traditional and computer network entrepreneurship
can predict the future development trend. The same is true for universities. The characteristics of computer network big data play an extremely important role in the enrollment, management and education of colleges and universities. 3. Data Openness. The various resources of computer networks are relatively open. Unlike the spread of knowledge in traditional education, the information age is developing rapidly. Nowadays, the school is constantly improving itself and selftransformation. The various resources provided for students are also constantly expanding. Therefore, colleges and universities in the context of the computer network era are open and shared with each other. From the business model sketch of traditional and computer network entrepreneurship, we can see that there are many types of entrepreneurship modes. But in the final analysis, traditional entrepreneurship takes entity enterprises as the media, and products need to go through many links to reach consumers. Transactions can only occur in entity enterprises, business hours are limited, and the cost of enterprises is greatly increased in the context of computer network. The new business model reduces many links in the middle, improves the convenience of customers and reduces the cost of enterprises (Fig. 1).
3 Problems in the Psychological Education of Computer Network College Students’ Entrepreneurship 3.1 It Is Difficult to Screen Effective Information of Entrepreneurship From the current situation of entrepreneurship education for college students in computer network, it is difficult to screen effective entrepreneurship education information in computer network. Although the era of computer network provides many conveniences for the development of entrepreneurship education in Colleges and universities, it also brings some difficulties to the development of entrepreneurship education in Colleges and universities. The mode of entrepreneurship education in
354 Fig. 2 The form of entrepreneurship education in Colleges and universities
Y. Zheng and X. Wang
Online Course
Incubation base 0
20
40
60
Colleges and universities is still mainly based on traditional curriculum teaching, special lectures, entrepreneurship activities or entrepreneurship competitions. Not all colleges and universities have incubation bases or practice bases, nor do they provide online entrepreneurship education (Fig. 2).
3.2 The Implementation Goals and Tasks of Entrepreneurial Psychology Education Are Not Clear Although our country has 5000 years of history and civilization, people in our country are seriously lacking in adventurous spirit and innovative consciousness. They are easy to settle in the status quo, seek stability, tend to be the same, and are unwilling to be unconventional. The traditional thinking of “learning and being good” in Confucianism encourages college students to seek stable work after graduation. It is hoped that after graduation, they can work in various departments of the state and government. Few college students will consider entrepreneurship. The implementation goals and tasks of entrepreneurial psychology education are not clear, and there are no implementation rules. This makes it impossible for entrepreneurial psychology education to be implemented. What kind of problems will be encountered in college students’ entrepreneurial practice, and what kind of goals need to be achieved is not known. The unclear goals and tasks of the implementation of college students’ entrepreneurial psychology education are important reasons for the lack of attention in entrepreneurial psychology education. Up to 80.83% of students believe that entrepreneurship is a career, and 12.5% of students believe that entrepreneurship is to start a business of their own or to develop a new technology project. It can be seen that college students’ understanding of entrepreneurship in colleges and universities is relatively one-sided and in a state of vagueness and chaos (Fig. 3).
College Students’ Entrepreneurship Psychology Education System …
355
Fig. 3 College students’ understanding of the concept of entrepreneurship
Open a business Technology Technological innovaƟon other
3.3 Less Publicity and Attention in Entrepreneurial Psychology Education At present, our country, government, and society have little understanding of college students’ entrepreneurial psychology education, and they do not know which channels should be used to obtain education and guidance for entrepreneurial psychology. This makes them unable to improve their entrepreneurial psychological quality. The propaganda of entrepreneurial psychology education in relevant departments is not in place. The work of entrepreneurial psychology education is not widely practiced in the group of college students. The intensity of propaganda is not in place, and the propaganda methods need to be improved. If the work of entrepreneurial psychological education gets attention and is well publicized, it can create a good environment for entrepreneurial psychological education for the society, promote the construction of entrepreneurial psychological education system, promote the development of various entrepreneurial psychological education activities, expand the demonstration role, and promote Other social subjects care about and support entrepreneurial psychology education.
356
Y. Zheng and X. Wang
4 The Significance of Computer Network in College Students’ Psychological Guidance Education for Entrepreneurship 4.1 Enriched the Mode of Psychological Guidance for College Students’ Entrepreneurship Traditional entrepreneurship guidance model is relatively single, mainly in the classroom for a simple theoretical education, and lectures, competitions and other ways can not meet the actual needs of students’ entrepreneurship, so such entrepreneurship guidance can not meet the needs of the times, and can not meet the “mass entrepreneurship, innovation” social needs. With the development and popularization of computer network, innovation and entrepreneurship education must be reformed and innovated, which enriches the guidance mode of college students’ entrepreneurship, not just in the classroom, but also through micro-blog, Weixin, professional social software, school employment and entrepreneurship website, etc. Students can choose what they want to learn from online courses.
4.2 Increased Opportunities for College Students to Receive Guidance on Entrepreneurship The greatest convenience of the computer network is that it is not restricted by the region. As long as there is a network, students can fully use the network resources to receive entrepreneurship guidance anytime, anywhere, and more professional and experienced instructors can receive online guidance, which will greatly increase the opportunities for students to receive innovative entrepreneurship education.
4.3 Stimulate the Enthusiasm of College Students’ Entrepreneurship Psychology With the rapid development of computer network, many universities are actively exploring new entrepreneurship guidance modes in order to bring more effective entrepreneurship guidance to students. In addition to the normal entrepreneurship guidance courses, many colleges and universities have added online entrepreneurship guidance courses, online and offline also strengthened exchanges and discussions with students. Online entrepreneurship guidance course enables students to learn more freely and have more choices. Because of this, the computer network will inevitably gradually become an important carrier of entrepreneurship guidance
College Students’ Entrepreneurship Psychology Education System …
<