International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence [1st ed. 2020] 978-3-030-25127-7, 978-3-030-25128-4

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad r

2,741 155 108MB

English Pages XXXII, 2132 [2164] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence [1st ed. 2020]
 978-3-030-25127-7, 978-3-030-25128-4

Table of contents :
Front Matter ....Pages i-xxxii
Cultivation System of Innovative Talents in Ship and Ocean Engineering Complex Engineering (Guozheng Wang, Junfu Yuan, Shangfu Li, Zhenguo Ding, Hua Deng)....Pages 1-7
Preparation of Multifunctional Nano-composite and Its Application to Latent Fingermarks (Xinhua Lv)....Pages 8-13
The Application of Industrial Robot Technology in the Teaching of Applied Undergraduate Colleges and Universities (Yongcheng Huang, Xianming Wu, Bin Yang, Zhiyong Li)....Pages 14-20
Modeling and Simulation of Proximity Explosion Damage Probability for Anti-radiation Missile Laser Fuze (Song Gao, Qiang Cui, Chao Ma)....Pages 21-27
Analysis and Research on Distance Transmission Characteristics of Electric Vehicle EPRT System (Hehui Tang, Lixin Lu, Guiqin Li)....Pages 28-35
Data Mining and Association Analysis of Irrational Use of Antibiotics in Outpatient Data of New Cooperative Medical System (Qingshun Hu, Xiaoqiang Ren)....Pages 36-42
Evaluation Index System of High-Quality Energy Development (Shanshan Wu, Guoqiang Ji, Yuanyue Chen, Baoguo Shan)....Pages 43-54
Design of Smoke Detection Algorithm Based on UV Spectroscopy (Shuping Xu, Mengyao Huang, Li Chen, Xiaohui Su)....Pages 55-64
Coordinated Development of Leisure Sports Industry and Urban Culture Under the Concept of “Casual City” (Haijing Guo, Li Zhang, Huijing Song)....Pages 65-71
Quality Evaluation Research Based on Electronic Journals Published on Internet (Wang Juan, Hou Yue)....Pages 72-77
A New Type Building Fire Protection Facility Monitoring System (Yufeng Fan, Lei Zhang, Yang Du)....Pages 78-87
On Translating Internet Neologisms from Chinese to English (Liu Qian)....Pages 88-94
On the Reader Service of the Intelligent Library in Universities (Sun Jie)....Pages 95-103
Fast Calculation Method of Video Saliency Based on Temporal and Spatial Edge-Preserving Filter (Zhiming Li)....Pages 104-114
Feature Extraction for Eye Movement Video Data (Yifang Yuan, Qingxiang Wang)....Pages 115-121
Initial Path Optimization of Equal Residual Height Algorithms Based on Ring Cutter Five-Axis Milling (Ying Chen, Gang Chen, Yu Sun, Longyuan Xu, Mingtian Liu, Yuyao Chen)....Pages 122-127
Design of Intelligent Billet Furnace-NO Separation System Based on Model Free Adaptive Control Theory (Haibo Peng, Qiaoshun Wu, Jianmin Bai)....Pages 128-134
Feature Extraction of Dwarf Nova with Convolution Operation (Yongjian Zhao)....Pages 135-141
Optimized Grid Resource Allocation and Task Scheduling Strategy (Weiwei Guo, Feng Liu)....Pages 142-149
Oral English Flipped Teaching in China Based on Cloud Class (Wang Fang, Wang Haijun)....Pages 150-156
Application of Confucian “Trust” Management—Yonghui as an Example (Yigao Lv)....Pages 157-163
Design of Urban Intelligent Parking Service System Based on Intelligent Travel (Hesen Li, Xinlei Chen)....Pages 164-172
Analysis of Emotional Education in Middle School Geography Teaching (Mei Shan, Weidong Shi, Guiju Liu)....Pages 173-181
Improvement and Empirical Study of K-Means Clustering Algorithm Based on Chinese Retrieval (Yatao Su)....Pages 182-188
Innovative Design of Self-service Car Wash Service System (Hesen Li, Zixian Zheng)....Pages 189-196
Application of Special Effect Technology in Late Synthesis (Jianfeng Zhang, Haojie Yang, Ziyou Zhuang)....Pages 197-203
Development of Post-production Synthesis Technology (Liang Li)....Pages 204-210
An Improved Chicken Swarm Optimization for TSP (Hao Ye, Qiang Fu, Jiaqi Ye, Caiming Zhong)....Pages 211-220
Application Scenario of Artificial Intelligence Technology in Higher Education (Ping Xia)....Pages 221-226
Analysis on the Causes of Safety Risks About Food of Purchasing Online (Guohong Wang, Fumin Wang, Kena Wang)....Pages 227-232
Face Fatigue Detection Method Based on MTCNN and Machine Vision (Wenfeng Shi, Jun Li, Yuanjie Yang)....Pages 233-240
English Translation Model Design Based on Neural Network (Xiangrong Liu)....Pages 241-247
An Emergency Resource Allocation Method Based on Supernetwork for Urban Disaster (Zhongyi Zhang, Zhe Wang, Haibin Zhou)....Pages 248-255
Risk Assessment of Ad Hoc Based on Game Theory (Xiufeng Gao, Zhaoyi Chen)....Pages 256-264
Collaborative Mechanism of Shipping Logistics Supply Chain Based on Improved Genetic Algorithm (Chen Qian, Zhichao Xu, QiSong Zhang)....Pages 265-274
An Improved Chinese Search Engine Lingo Search Clustering Algorithm (Yatao Su)....Pages 275-280
Design of Mushroom Humidity Monitoring System Based on NB-IoT (Cuihua Sun, Yanting Cao)....Pages 281-289
Design and Implement of HPC Simulation Cloud Platform for Automobile Industry (Yingzi Wang, Panpan Han, Jue Hou)....Pages 290-296
Analysis and Simulation of Maximum Power Point Tracking for Photovoltaic Power Generation (Haokun Guo)....Pages 297-302
The Trajectory Tracking Method of Intelligent Vehicle Based on Optimality Control (Cuicui Jiang)....Pages 303-312
Attack Net Modeling Method for Mobile Ad Hoc Network (Chengli Le, Xiufeng Gao)....Pages 313-322
Game Analysis on Enterprise Performing Social Responsibility (Xin Zhao, Hong Zhao)....Pages 323-328
Training Strategy of E-Commerce Innovation and Entrepreneur Talents (Huiyong Guo, Chao Xie, Huifang Jiang, Wenlu Huang, Yating Chen, Minghua Xue)....Pages 329-336
Foam Flotation Modeling Method Based on Complex Events (Tao Sun, Qiangyong Tai)....Pages 337-347
Research into Optimization Strategies for the Rural Logistics Network—Taking Yangxin County for Example (Li Li, Zhenyan Hu, Xiaojie Wang, Yang Li, Yaqi Huang, Shanshan Hu et al.)....Pages 348-356
Differential Pricing Strategy and Coordination Mechanism of Retailer-Led Closed-Loop Supply Chain Under Multi-disturbance (Wenxue Ran, Li Liu, Zhongliang Shi)....Pages 357-365
Transmission Path of Intangible Cultural Heritage Under Digital Technology (Tingting Li, Qian Chen)....Pages 366-371
MicroBlog Community Massive Information Mining and Monitoring System—Overall Architecture and Radar Subsystem (Jing Leng, Tonghong Li)....Pages 372-382
Impact of Bundled Price Presentation the Online Consumers’ Impulsive Buyer Behavior - Empirical Analysis Based on Variance Analysis (Feng Gong, Xiawei Yang, Mengwei Liu)....Pages 383-393
Computer Aided Product Development and Design Based on Information Technology (Shuai Yang, Meijing Yao)....Pages 394-399
Application of MFCA to Improve the Yield of the FCCL Procedures (Minghung Shu, Kunchen Chung, Juichan Huang)....Pages 400-409
Electromagnetic Characteristics Analysis and AC Loss Evaluation of HTS Tapes Based on H-Formulation (Tang Yu, Jiang Yi Jue, Luo Wei)....Pages 410-418
Early Warning System for Financial Risks in the Real Estate Market of China on the Basis of BP Neural Network (Jianjun Xie, Yue Zeng)....Pages 419-424
Rural Landscape Planning and Design Based on Low Cost Control Theory (Lizhi Kang)....Pages 425-432
A Hybrid Dynamic Multi-criteria Decision Making Model Based on Interval Bipolar 2-Tuple Linguistic Terms for Supplier Selection (Dongliang Xiao)....Pages 433-442
Research into Performance Evaluation with the Application of DEA–A Case Study of Automobile Dealer (Jui-Chan Huang, Tzu-Jung Wu, Yan-Yu Wang)....Pages 443-452
Evaluation of Power Grid Construction Strategy Based on AHP-TOPSIS (Di Pu, Hu Li, Bingjie Li, Jing Shi, Dongxiao Niu)....Pages 453-459
An Efficient Weighted Negative Sequence Pattern Mining Algorithm with Multiple Minimum Support (Dongyuan Wang, He Jiang, Aixin Yang)....Pages 460-469
Dynamics of Interaction Design Course System Based on Collaborative Innovation (Gaosheng Luo)....Pages 470-478
Transformer Fault Diagnosis Based on Elman Network (Zhongqiang Liu, Li Zhang, Chunxiao Zhang, Xiangfei Kong, Anan Shen)....Pages 479-486
Agent-Based Modeling in a Simple Circular Economy (Pingchao Chen, Xinxin Wu, Dezhuang Miao)....Pages 487-497
Sports Athletes’ Performance Prediction Model Based on Machine Learning Algorithm (Pan Zhu, Feng Sun)....Pages 498-505
The Prediction Model of Air-Jet Texturing Yarn Intensity Based on LSTM Neural Network (Zhenlong Hu, Qiang Zhao, Jun Wang)....Pages 506-513
Network Platform for Inheritors of Textile Intangible Cultural Heritage Based on Cooperative Game (Hong Zhao, Liujun Guan, Kaiyuan Zhao)....Pages 514-523
Impact of Taxes and Subsidies on Social Wealth Distribution: By Agent-Based Modeling (Yuqian Yang, Pingchao Chen, Qixuan Jin)....Pages 524-533
Optimization Strategy of Database Service Resources Based on Cloud Environment (Lei Yao)....Pages 534-541
Design of Intelligent Garbage Collection System (Yueping Zhao, Qin Wang, Yuan Zang, Jun Wan)....Pages 542-547
An Improved Algorithm of Neural Network (Huan-zhao Chi)....Pages 548-555
Local Feature Detection Based on Image Block Discrete Scale Space (Jing Leng, Tong-hong Li, Wei Xu)....Pages 556-565
Coke Quality Prediction Model Based on DE-RBF Neural Network (Mingrui Xu)....Pages 566-575
Electricity Consumption Forecast of Zhejiang Based on the Background of Electric Energy Substitution (Changzu Li, Dongxiao Niu, Bo Miao, Qiang Liu)....Pages 576-583
Design of Safety Production Supervision and Data Management System Based on Cloud Platform (Hongsheng Xu, Ganglong Fan)....Pages 584-591
Logistics Cost Control of Jingdong Mall Under E-Commerce Mode (Aiping Wu)....Pages 592-599
Energy Consumption Optimization of Container-Oriented Cloud Computing Center (Zhenjiang Li, Zhenxiang He)....Pages 600-607
Blockchain Technology in the Registration and Protection of Digital Copyright (Yuanjun Ding, Haibo Pu, Yu Liang, Hongjie Wang)....Pages 608-616
Item-Based Collaborative Filtering Algorithm Based on Co-occurrence Matrix (Bocheng Liu, Jieyu Zheng)....Pages 617-623
A Comprehensive Evaluation Method of the Learning Situation of the Students of the Quality Course Website (Jingxin Yu, Yijing Zhang, Xuyan Su, Hengyan Guo)....Pages 624-633
Damage Information of Fiber Reinforced Concrete Based on Digital Image 3D-DIC Technology (Chao Lin, Chuan-guo Fu, Jie-hua Chen, Shi-han Du, Shu-jing Zhao)....Pages 634-641
Research on Vision Navigation Technology of Porter Based on Improved Simulated Annealing Algorithms (Shuguang Zhang, Mingchen Wu, Chenbing Guo)....Pages 642-649
A Review on Unsafe Behavior of Employees Based on Big Data (Tingting Li, Minglu Gong)....Pages 650-657
Adaptive Resource Allocation Algorithm for Multiuser OFDM System (Yue Xian, Hao Yang, Yuwei Zhai, Kean Shi, Wenzhuo Ma)....Pages 658-667
Synthetic Evaluation Model of Learning Maturity of Power Safety Regulations Based on Improved Radar Chart (Jiahui Zheng, Xiaoyong Bo, Zhaoyang Qu, Shiqi Zhou, Shuai Li, Quan Yuan)....Pages 668-678
Reflections on the Cross-Cultural Competence Cultivation in Higher Vocational Education Under the Global Information Age (Jie Gao)....Pages 679-685
Optimization of Optical Path for Anti-radiation Missile Laser Fuze (Song Gao, Li Chen, Hongyang Zhou)....Pages 686-693
Feasibility Analysis of Integrating Psychological Development Training into Physical Education Teaching (Haijing Guo, Li Zhang, Huijing Song)....Pages 694-701
Dual Radio Frequency Robot Group Communication System and Event Communication Control Method (Lei Zhang, Yufeng Fan, Yang Du)....Pages 702-708
Implementation of NN Algorithm Based on the MapReduce Framework (Changlin He, Weibao Zhang)....Pages 709-717
The Task-Based Model in Higher Vocational English Teaching (Xiuhua Li, Weiwei Yang, Wei Mu, Yixing Qi, Wenjia Jiang)....Pages 718-725
Target Recognition Based on Kinect Combined RGB Image with Depth Image (Jinxin Guo, Qingxiang Wang, Xiaoqiang Ren)....Pages 726-732
A Purchasing Plan Management System Based on Belief Rule-Base Method (Qiaoshun Wu, Tingting Li, Zhiqiang Wang, Haibo Peng)....Pages 733-737
Automatic Classification of Dwarf Nova (Yongjian Zhao)....Pages 738-744
Optimized Min-Min Dynamic Task Scheduling Algorithm in Grid Computing (Feng Liu, Weiwei Guo)....Pages 745-752
Comparison on Performance of Multiuser Detector (Daming Pei)....Pages 753-764
The Application of Confucian “Benevolence”—LJ Real Estate as an Example (Yigao Lv)....Pages 765-771
Discussion on Sharing Service System Design of Household Hardware Tools (Hesen Li, Ziwen Yu)....Pages 772-779
Design of Multi-project Collaborative Management System (Rui Huang, Haibo Pu, Lin Zou, Wenfeng Shi)....Pages 780-790
Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm (Qianyi Shang, Lijun Chen, Dandan Wang, Ruoxiong Tong, Peng Peng)....Pages 791-800
Logistics Mode Analysis Under the Background of Cross-Border Ecommerce Era (Huiyong Guo, Weiqi Rao, Jie Wang, Peng Wu, Zhichuang Chen)....Pages 801-810
Intelligent Storage System Based on “Internet+” Logistics (Xiaolei Zhang)....Pages 811-816
Inheritance and Development of Folk Art Based on Multi-media Platform Technology (Shi Liu, Tingting Li, Xinming Zhang)....Pages 817-822
Application Research of Holographic Image Technology in Commercial Space Design Teaching (Lizhi Kang)....Pages 823-829
Evaluation of Electric Energy Substitution Scheme Based on Combination Weight Grey Correlation Method (Di Pu, Dongxiao Niu, Qian Ma)....Pages 830-838
Design of Remote Wireless Automatic Watering Robot Control System (Yuejin Huang, Zhongfu Liu, Yuhua Dong)....Pages 839-846
Practice Teaching Reform of Motor Drive in Local Applied University (Yan Zhang)....Pages 847-856
The Prediction Model of Cotton Yarn Quality Based on Artificial Recurrent Neural Network (Zhenlong Hu, Qiang Zhao, Jun Wang)....Pages 857-866
An Improved Neural Networks Algorithm (Zhang Cheng)....Pages 867-873
Construction of Big Data Analysis Platform Based on Semantic Rough Concept Lattice Model (Hongsheng Xu, Guofang Kuang)....Pages 874-882
Virtual Machine Migration Strategy for Cloud Data Center Based on NSGAII (Zhenxiang He, Jiankang Dong)....Pages 883-890
Human Resource Management Innovation of Aviation Services (Minglu Gong, Tingting Li)....Pages 891-897
Present Research Status of Earthquake Collapse Damage of RC Frame Structures (Meng Song, Jizhi Su, Yudong Ma, Kuan Liu, Tao Bai)....Pages 898-905
Manipulator Control System Based on Machine Vision (Yufeng Zhang, Xue Wang, Longsen Gao, Zongbao Liu)....Pages 906-916
Design of Improved Deep Convolution Network Model (Hongsheng Xu, Lan Wang)....Pages 917-922
Application of Computer Technology in Sports (Qiang Wang)....Pages 923-928
Realization of Identity Card and Face Recognition Two-Factor Authentication System Based on Wechat (Guofang Kuang, Hongsheng Xu)....Pages 929-936
Extraction Method of Classification Rules in Decision Tree Based on Attribute Selection Metric of Rough Set (Lan Wang, Hongsheng Xu)....Pages 937-942
A DBN-Based Ensemble Method for Resource Usage Prediction in Clouds (Yuan Wang, Yiping Wen, Yu Zhang, Jinjun Chen)....Pages 943-950
Utilizing Tags for Scientific Workflow Recommendation (Junjie Hou, Yiping Wen)....Pages 951-958
An Improved Code-Based Encryption Scheme with a New Construction of Public Key (Yuzhuang Zhou, Peng Zeng, Siyuan Chen)....Pages 959-968
Application of the Intelligent Inspection Management System in the Operation and Maintenance of Transmission Lines (Peipei Li, Dingsong Wang, Yuxuan Jiang, Liang Han)....Pages 969-974
Study on the Brownfield Landscape Restoration of Urban Iron and Steel Industry Based on the Rainwater Management (Qingya Li)....Pages 975-986
Development and Application of Computer Data Mining Technology (Ling Liu)....Pages 987-991
The Video Detection of Human Respiratory Motion Based on Sequential Images (Luo Bin, Liu Bo, Zhu Yu)....Pages 992-997
Impact of the Power Allocation of Board of Directors on the Sustainable Growth Based on the DEA/AHP Model (Henian Song)....Pages 998-1003
Experimental Studies of Flow Structure at Confluent Main Bend Channel (Bin Sui, Shehua Huang, Peiling Yang, Yuxiao Wu)....Pages 1004-1013
The Robot Embedded Wireless Motion Monitoring Based on the Big Data Analysis (Xiangfeng Suo, Yunhui Gao, Xue Han, Xingwei Sun)....Pages 1014-1019
The Structural Design and Shock-Resistant Performance of Steel Beam-Concrete Column Frame Structure (Qiao Wang)....Pages 1020-1026
Application of the Mobile Terminals in the Long-Distance Continuing Education for Preschool Teachers (Zhen Wang)....Pages 1027-1033
The Green Indicator System of Distance Open Education Based on the APP Terminal Learning (Zhen Wang)....Pages 1034-1039
The Big Data Feature Mining Technology Based on the Cloud Computing (Yun Wang)....Pages 1040-1045
Exploration of the Big Data Applications Under the Background of “Internet+” (Wang Zhe)....Pages 1046-1056
The Modeling and Simulation of the Cloud Financing Model for Technology-Based Small and Medium-Sized Enterprises (Wu Xi)....Pages 1057-1063
The Localized Translation of the Bank User Manual Based on the Mobile Terminal Services (Xing Hao)....Pages 1064-1069
Artistic Analysis and Network Application of the Modern Commercial Digital Illustrations (Hui Xu)....Pages 1070-1075
The Construction of Distance Education Personalized Learning Platform Based on Educational Data Mining (Yanqiang Xu, Miao Zhang, Zhigang Gao)....Pages 1076-1085
The Classification Model of the Network Electronic Music Based on the Chinese Traditional Opera Music (Yuan Yue)....Pages 1086-1091
Internet of Things Perception Technology Based on the Physical ID in the Operation and Inspection Management of Smart Grids (Chunyan Zhang, Jiajun Zhou, Yule Wu, Zhengyong Fan)....Pages 1092-1097
The Processing Methods of the Computer Format Information Flow in the Network English Translation System (Jing Zhang)....Pages 1098-1104
The Combination of the University Financial Management System and the Computer Multimedia Technologies (Yabin Zhang)....Pages 1105-1111
Application of the E-commerce Platform in the International Trade (Luzhao Zhou)....Pages 1112-1117
Numerical Simulation of Foundation Pit and Performance Analysis of Vertical Column in Inverse Method (Wen Zhou)....Pages 1118-1124
The Application of Flipped Classroom Model in College Public English Network Multimedia Teaching (Juan Chen)....Pages 1125-1131
Robotic Arm Control System Based on the Reconfiguration Technology (Nan Chen)....Pages 1132-1137
English Teaching Platform Based on the Campus Network Multimedia (Heng Du)....Pages 1138-1143
The Teacher Evaluation and Management System Innovation Based on the Artificial Intelligence Algorithms (Yunhui Gao, Xiangfeng Suo, Fuyan Zheng)....Pages 1144-1149
Study on Slag-Bonding Property of Burning Blended Coal (Yanhong Guo, Fan Cheng)....Pages 1150-1158
The Landscape Enterprise Multi-project Management Information System Based on Mobile Terminals (Yingtao Guo, Ling Liu, Huilin Yi, Huilan Peng)....Pages 1159-1165
User Information Optimization and Retrieval Technology in Distributed Database (Lei Bo)....Pages 1166-1171
Method of Whole Process Post Safety Evaluation for Dangerous Liquid Bulk Cargo Port (Chen Li)....Pages 1172-1179
Response Time of a Ternary Optical Computer Based on Complex Queueing System with Synchronous Multi-vacations (Xianchuan Wang, Jie Zhang, Shan Gao, Gang Sun, Jia Zhao, Mian Zhang et al.)....Pages 1180-1188
Research on Event Recognition Based on Multi-feature Fusion (Tianqi Liu, Yan Chao, Shunxiang Zhang, Tao Liao)....Pages 1189-1197
An Improved Watershed Image Segmentation Algorithm Based on Fuzzy Threshold (Shu-ying Liu, Yan Chao, Tao Zeng, Jing Wang, Peijun Li)....Pages 1198-1205
A Comprehensive Evaluation Method of Agent Coalition (Haixia Gui, Xiangqian Wang, Banglei Zhao)....Pages 1206-1214
Frequent Subtree-Based Event Language Expression Pattern Discovery (Xianchuan Wang, Shibing Wang, Gang Sun, Xiuming Chen, Xianchao Wang, Zongtian Liu)....Pages 1215-1224
Apriori Algorithm-Based Association Rules of Event Language Expression Discovery (Xianchuan Wang, Shibing Wang, Gang Sun, Xiuming Chen, Xianchao Wang, Zongtian Liu)....Pages 1225-1234
Autonomous Learning Recommendation Algorithm Based on K-Means and K-Nearest Neighbor (Du Wei, Ma Chun, Wang Qing)....Pages 1235-1244
Collaborative Filtering Recommendation Algorithm Based on Element-Wise Alternating Least Squares and Time Weight (Shu Jianhua, Wang Dong, Xue Feng)....Pages 1245-1256
Improvement of Apriori-Pro Algorithm Based on MapReduce (Huaping Zhou, Daoyi Zhang, Xiaoyan Wang)....Pages 1257-1265
A Hybrid of Background Scatter and Foreground Contour Completeness for Salient Object Detection (Chenxing Xia, Qianjin Zhao, Shunxiang Zhang, Xiuju Gao)....Pages 1266-1275
Analysis and Classification of Tremor Characteristics of Hepatolenticular Degeneration (Du Wei, Ma Chun, Wang Qing)....Pages 1276-1285
Speech Analysis for Wilson’s Disease Using Genetic Algorithm and Support Vector Machine (Ma Chun, Du Wei, Wang Qing)....Pages 1286-1295
Design and Construction of Unification Coal Mine Safety Control-Management Model (Xiangju Liu, Pengcheng Liu, Lina Liu)....Pages 1296-1304
Causal Relationship Recognition Based on Lexcial-Syntactic Pattern for Emergency Events (Tao Liao, Xu Zhou, Zongtian Liu, Shunxiang Zhang)....Pages 1305-1314
Preventing Privacy Disclosure from Hostility Attack Base on Associated Attributes (Yushan Zhao, Gaoming Yang, Xianjin Fang, Bin Ge)....Pages 1315-1325
A Convolutional Neural Network Model Based on Improved Softplus Activation Function (Kelei Sun, Jiaming Yu, Li Zhang, Zhiheng Dong)....Pages 1326-1335
Performance Analysis and Numerical Calculation for the Geom/Geom/1 Queueing System with Threshold Policy, Delayed Vacations and Setup Time (Jie Zhang, Shan Gao, Kun Pang, Xianchao Wang)....Pages 1336-1344
Singular Value Decomposition Algorithm Combined with SDAE for Improving the Accuracy of Movie Recommended System (Shengli Hu, Zhili Song)....Pages 1345-1355
A Hyperspectral Image Feature Extraction Algorithm Combining Spatial-Spectral Information (Kui Lu, Min Zhou, Shunxiang Zhang)....Pages 1356-1365
Automatic Construction of Coal Mine Accident Ontology (Xiangqian Wang, Dongdong Gui, Huizong Li, Haixia Gui)....Pages 1366-1374
Event Recognition Oriented to Emergency Events and Its Application (Tao Liao, Weicheng Fu, Shunxiang Zhang, Zongtian Liu)....Pages 1375-1384
An Energy-Heterogeneous Uneven Clustering Routing Algorithm for WSNs (Hui Chen, Wenjun Zheng)....Pages 1385-1393
The Extraction Method for New Login Word from Chinese Micro-blog Based on Improved Mutual Information (Wenting Liu, Guangli Zhu, Shunxiang Zhang)....Pages 1394-1403
Sentiment Analysis of Film Reviews Based on Semantic Rules and Extended Domain Sentiment Dictionary (Shanshan Xu, Shunxiang Zhang)....Pages 1404-1413
Building Sentimental Word Lexicon for Chinese Movie Comments (Qiaoyun Wang, Guangli Zhu, Shunxiang Zhang)....Pages 1414-1422
Probabilistic of Membrane Computing Mobile Robot Position Optimization in Coal Mine (Jiachang Xu, Yourui Huang)....Pages 1423-1431
Character Relationship Extraction Method Based on BiLSTM (Lu Tao, Shunxiang Zhang)....Pages 1432-1441
Sentiment Calculation of Chinese Microblog Based on Dependency Parsing Analysis (Zhaoya Hu, Shunxiang Zhang, Nana Wang)....Pages 1442-1449
An Automatic Calculation Method for Sentiment Word Polarity in Commodity Reviews (Ming Jin, Shunxiang Zhang)....Pages 1450-1458
Exploring the Differences, Similarities and the Effect Between Chinese and Ghanaian Traditional Cuisines Towards a Better Appreciation and Consumption (Ernest Asimeng, Shunxiang Zhang)....Pages 1459-1467
Arithmetic Operation Recognition Method Based on BP Neural Network (Zouyu Xie, Yu Cao, Sijia Zeng, Liufen Li)....Pages 1468-1474
Attribute-Based Encryption Without Abuse of Private Keys (Xianlin Zhou, Hailong Ye, Jun Ye)....Pages 1475-1480
Efficient Outsourcing of Modular Exponentiations in Cloud Computing (Jun Ye, Bo Tang, Ziteng Wang)....Pages 1481-1485
Intelligent Design for Image Search Engine (Zhengxi Wei, Jiaxing Peng, Jun Ye)....Pages 1486-1493
Research on Identification of Handwritten Mathematical Formulas (Yu Cao, Zouyu Xie, Liufen Li)....Pages 1494-1500
Alias-Based Car Free-Form Surface Design (Yufei Huang, Hegeng Wei, Bo Wang)....Pages 1501-1505
Design of Planetary Gears for Wind Power Transmission Mechanism (Yufei Huang, Ling Zhang)....Pages 1506-1509
Green Design of Concurrent Engineering of Silkworm Machinery (Bo Wang)....Pages 1510-1516
Preliminary Study on Optimum Design of Tower Crane Boom Based on Structural Bionics (Bo Wang)....Pages 1517-1522
Research and Development of Virtual Manufacturing (Bo Wang)....Pages 1523-1529
Finite Element Analysis of Welding Joint Stress of 506 Electrode (Yufei Huang)....Pages 1530-1539
Application of Directed Recommendation in Text Manual Annotation (Wang Yue)....Pages 1540-1546
Application of Intelligent Video Analysis in Financial Security (Zhiwei Tang, Xiaoqing Chen)....Pages 1547-1555
The Data Platform for Large-Scale Video Surveillance Systems (Jie Dai, Na Liu)....Pages 1556-1561
EMC&EMI on High-Speed PCB Design (Zhiwei Tang, Xiaoqing Chen)....Pages 1562-1569
Iris Recognition Technology and Application Research in the Field of Public Security (Cheng Cheng, Bo Zhao)....Pages 1570-1574
Multiple Faults Detection of Three-Level NPC Inverter Based on Improved Deep Learning Network (Jinjing Wu, Zhiguo Yan, Quan Sun)....Pages 1575-1583
Smart and HD Bayonet Comprehensively Search System (Yixian Tan, Yanfeng Shang)....Pages 1584-1588
The Modeling Platform for Video Surveillance Knowledge Base (Xiaorong Xia, Yixian Tan, Yanfeng Shang)....Pages 1589-1594
Human Action Recognition Based on Deep Learning (YuXin Cai, YanFeng Shang, YiXian Tan, ZhiWei Tang, Bo Zhao)....Pages 1595-1600
An Effective Solution for Application Orchestration (YuXin Cai, YanFeng Shang, YiXian Tan, ZhiWei Tang, Bo Zhao)....Pages 1601-1608
The Development of an Ontology-Based Marine Injury Assessment and Treatment Decision Making Supported System (Min Zhu, Huiyu Jin, Tianshu Zhou, Ruxue Chen, Yongpeng Chen, Quanyi Huang)....Pages 1609-1618
Design Methods of Game Interface (Haojie Yang, Ziyou Zhuang, Jianfeng Zhang)....Pages 1619-1624
Analysis of Artillery Range Extension Technology Under Informationization Conditions (Xubo Zhang, Yang Ni, Haibo Lu)....Pages 1625-1629
How to Choose the Agricultural Industrialization Management Mode with the Internet’s Help (Xiu Sun)....Pages 1630-1635
Analysis of College Course Teaching Objectives and Strategies Based on Classroom Scenarios (Xiaolin Li, You Li, Nian Zhao)....Pages 1636-1640
Personalized Prediction Based on a Regression Model with User-Item Specific Interactions (Shuang Song, Chaofeng Yuan, Weijun Ma)....Pages 1641-1645
Construction and Application of Multi-relational Protein Network (Ming Zheng, Mugui Zhuo)....Pages 1646-1650
Design Af Intelligent Pattern Sauce Pouring Machine (Miao Shang, Yongtao Sun)....Pages 1651-1654
College English Reading Teaching Based on WeChat and Reading Circle – a Case Study of Advanced English (Hong Wu)....Pages 1655-1659
Analysis of the Present Situation and Countermeasures of Teaching Secretaries in Private Colleges and Universities Under the Information-Based Environment (Hongyan Zhang)....Pages 1660-1664
DC Motor Application and Control Method in Automobile Automatic Transmission Electronic Oil Pump (Ying Zeng, Hongrong Wang, Zhou Zhou)....Pages 1665-1669
Keywords Extraction of Medical Information in the Era of Big Data (Na Wang, Jinguo Wang)....Pages 1670-1674
Informatization Teaching of Optional Courses of Physical Education in Colleges and Universities (Nan Li)....Pages 1675-1679
Intelligent Distribution System Based on “Internet +” Logistics (Xiaolei Zhang)....Pages 1680-1684
Development of Business Push System Based on Bluetooth BLE Positioning (Yan Wang, Yajun Zheng)....Pages 1685-1689
Informatization Construction of College Art Design Education (Xu Cong, Shi Liu, Tingting Li)....Pages 1690-1695
Development and Research on the Informationization of Physical Education in Colleges and Universities (Jingyan Cui)....Pages 1696-1700
Network Traffic Classification and Control Technology Based on Decision Tree (Nanfang Li, Zongrong Li, Lei Zhao)....Pages 1701-1705
A Vulnerability Mining Method of Web Application Based on Neural Network and Crawler Technology (Yang Li, Shihai Han, Zhu Zhu)....Pages 1706-1710
Intelligent Reconstruction Plan for Old Stairs in Ordinary Community (Yuan Zang)....Pages 1711-1715
Network Traffic Prediction Based on Machine Learning Model (Xin Sun, Qinyuan Li, Changhua Sun)....Pages 1716-1720
Appeal Mechanism of IEEE and Its Enlightenment (Qing Xu)....Pages 1721-1725
Reform and Innovation of College English Teaching Mode Based on “Internet+” (Jian Li)....Pages 1726-1730
Computer Teaching Reform in Colleges and Universities Under the Background of Informatization (Ming-Hung Shu, Kun-Chen Chung, Jui-Chan Huang)....Pages 1731-1735
The Application of Task-Driven Teaching Method in ERP Informatization Experiment Teaching (Li Li, Liubo Hu, Zhengyan Hu, Lina Xiao)....Pages 1736-1740
Performance Analysis of Full Duplex Transmission in Hybrid Communication System Based on 5G Mobile Network (Yongjun Sun, Yongli Zhu)....Pages 1741-1745
Discussion on the Training Mode of Mobile Communication Technology Professionals Based on School-Enterprise Cooperation (Zhang Jie)....Pages 1746-1750
Teaching Methods of the Filmmaking Major Adapted to the Development of 3D Film Industry (Ziyou Zhuang, Haojie Yang, Jianfeng Zhang)....Pages 1751-1755
Implementation and Improvement of College Course Teaching Process Based on Classroom Scenario (Xiaolin Li, You Li, Nian Zhao)....Pages 1756-1760
The Method of Construction and Analysis of Gene Regulatory Network (Ming Zheng, Mugui Zhuo)....Pages 1761-1765
Design of Shower Head for Controlling Water Output (Xinlin He, Miao Shang, Xuhong Zhao)....Pages 1766-1770
Working Mode of Hospital Cyber Intelligence Under Network Environment (Na Wang, Jinguo Wang)....Pages 1771-1775
Computer Thinking and Basic Computer Education in Colleges and Universities (Wen-I Hsiao, Jung-Fang Chen, Yun Du)....Pages 1776-1780
The Content and Workflow of Game UI Design (Haojie Yang, Ziyou Zhuang, Jianfeng Zhang)....Pages 1781-1785
Application of Computer Technology in Art Design (Miao Yu)....Pages 1786-1789
A New PID Algorithm (Guoqiang Chen)....Pages 1790-1794
Application of Selective Information Integration Algorithm in Financial Credit Evaluation (Jun Yang)....Pages 1795-1801
Analysis of Modern Media Information Transmission Protocol Based on Heterogeneous Network Structure (Haidong Li, Zhiqiang Xu)....Pages 1802-1808
Application of Cloud Computing Information Processing System in Network Education (Haiqing Xu)....Pages 1809-1815
Research on Information Collection and Management of Improve ESIA’s Internet of Things Devices (Kairong Chen, Hua Liu)....Pages 1816-1822
Computer Aided Tourism Platform Design and Route Planning (Nan Chen, Yuying Chen)....Pages 1823-1829
Research on the Application of Automation Software Control System in Tea Garden Mechanical Picking (Geng Ya)....Pages 1830-1836
Open Community Education Model Based on Internet of Things and Intelligent Technology (Li Li)....Pages 1837-1842
Open University Participation in Community Education Based on Smart Network and Artificial Intelligence (Ji Xian)....Pages 1843-1849
Community Education Course Recommendation Based on Intelligent Recommendation Algorithm (Wenjun Liu)....Pages 1850-1856
Research on Quanzhou Sports Brand Communication Based on Neural Network Recommendation Algorithm (Fengsheng Zeng)....Pages 1857-1863
Home Environment Simulation and Interior Design Based on Neural Network (Zhang Xin)....Pages 1864-1869
Using Barrage Technology to Support Traditional Classroom Teaching Research (Xiaohui Zhou)....Pages 1870-1876
Research on Cultural Resource Information Management System in Internet + Times (Jiang Jie)....Pages 1877-1883
Structural Health Monitoring Based on BP Network and Magnetic Memory (Zhigang Gao)....Pages 1884-1890
Multi-cluster Fast Information Statistics Algorithm Based on Probability (Xiaohui Tian, XiaoHan Sun)....Pages 1891-1897
Intelligent Classroom Control System with Early Warning Function (Feiyun Yan, Huifang Niu, Na Feng, Qing Meng)....Pages 1898-1903
Private Cloud Storage Technology and Platform Security Analysis Based on Cloud Computing and Intelligent System (Chang Jian, Qi Yong)....Pages 1904-1914
Analysis of E-commerce Customer Consumption Model Based on Artificial Intelligence and Computer Aided (Jiang Leilei, Dong Ke)....Pages 1915-1922
Research on Vehicle Routing Planning Algorithm for Supply Chain Logistics Distribution (Pengwen Xiao)....Pages 1923-1929
Research on Overseas Communication Mechanism of Moyan Novels Based on Network Cloud Computing (Jinghui Zhou, Yingjie Nie)....Pages 1930-1936
Tourism Design of Forest Park Based on Artificial Intelligence and GIS System (Zhang Rui, Wang Wukui)....Pages 1937-1948
Analysis of Basketball Training Model Optimization Based on Artificial Intelligence and Computer Aided Model (Gong Xiaohong, Wang Yu)....Pages 1949-1956
Technological Innovation of Manufacturing Industry Based on Genetic Network and Cloud Computing Information (Wang Yu, Yuxiang Meng)....Pages 1957-1968
Research on Manufacturing Industry Transition in Guangdong-Hong Kong-Macao Greater Bay Area Based on Cloud Computing and Computer Aided Analysis (Ying Liu, Jian Ma)....Pages 1969-1980
Promotion of Morrison’s Realistic Novels Based on Information Technology and Artificial Intelligence (Li Mei, Wang Ying)....Pages 1981-1989
Construction and Empirical Research on the Competency Model of Rural E-commerce Innovation and Entrepreneurship (Wen Yan, Chengjun Zou, Min Li, Lin Chen, Yu Ye)....Pages 1990-2002
Study on the College Teaching Support Service System Based on Data Mining and Internet Platform (Jie Xu)....Pages 2003-2012
Privacy-Friendly Personality Recognition in Social Media: A Case Study of Chinese WeChat Users (Qian Xiong, Shiguang Ni, Yekai Xu, Qianjing Zhang, Kaiping Peng)....Pages 2013-2025
Application of Artificial Intelligence in Primary and Secondary Schools: A Case Study of Scratch (Kun Li, Shaocheng Song)....Pages 2026-2030
A Heuristic Search Method Based on GA-SA Algorithm (Mo Fu)....Pages 2031-2035
Application of 3D Animation Technology in Roaming Visualization of Anhui Museum (Gang Liu, Yanchen Li)....Pages 2036-2040
Eco-Environmental Geological Evaluation of Environmental Impact of Mining (Fanwei Zeng)....Pages 2041-2045
The Influence of “Internet+” on the Management of Business Capital and the Optimization Methods (Shangyue Li)....Pages 2046-2050
Second Classroom Teaching of College English Based on “We Media” (Yin Wei)....Pages 2051-2055
Practical Teaching System of Electronic Information Engineering Major Based on Cultivation of Innovative and Entrepreneurial Ability (Mingguang Zhang, Lisa Zhu)....Pages 2056-2060
Application of Virtual Reality Technology in Anhui Museum Roaming Experience (Gang Liu, Xuejun Zhan)....Pages 2061-2065
Research and Teaching Reform of Independent Learning Ability in Oral Tourism English Based on WeChat (Lina Wu)....Pages 2066-2070
Higher Mathematics Teaching Reform in Applied Undergraduate Colleges Based on Mooc (Lisa Zhu, Jiabin Zuo)....Pages 2071-2075
The Construction of Undergraduate Pathway Curriculum System in Higher Vocational Education in Mechanical Engineering (Jinling Zhao)....Pages 2076-2081
Analysis of Jesuits’ Contribution to TCM Communication from the Perspective of Informatization (Min Zhong, Zhifei Xu, Jing Yu)....Pages 2082-2086
Application of Data Mining Technology in College Students’ Employment Analysis (Guoxin Wang, Wenzheng Cao, Yuqiao Cheng)....Pages 2087-2092
The Application of Computer in Physical Education Teaching and Its Influence on Campus Culture (Yanming Pei, Lijia Luo)....Pages 2093-2096
Spread and Control of College Students’ Network Rumor Under the Environment of Self-media (Sitong Liu)....Pages 2097-2101
Integration of Theory and Practice Teaching in Electrical Specialty for Applied University (Zhenhong Yin, Xia Lei)....Pages 2102-2106
Medical Information Engineering in Clinical Practice (Na Wang, Limin Jin, Miao Li, Jinguo Wang)....Pages 2107-2111
Discussion of Related Issues in the Design of High Frequency Transformer and Its Application (Shaoyi Li, Renbo Xu, Fenglian Yuan)....Pages 2112-2116
Analysis on the Application of Multimedia Technology in the Teaching of College Ideological and Political Courses (Liu Peng)....Pages 2117-2121
Construction of Library Information Service Under the “Internet+” Environment (Jinbai Zhang, Jing Fang, Youchen Chen)....Pages 2122-2126
Back Matter ....Pages 2127-2132

Citation preview

Advances in Intelligent Systems and Computing 1017

Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Zheng Xu Mohammed Atiquzzaman Editors

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 Applications and Techniques in Cyber Intelligence

Advances in Intelligent Systems and Computing Volume 1017

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science & Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen, Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong

The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156

Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Zheng Xu Mohammed Atiquzzaman •





Editors

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 Applications and Techniques in Cyber Intelligence

123



Editors Jemal H. Abawajy Faculty of Science Deakin University Geelong, VIC, Australia Rafiqul Islam School of Computing and Mathematics Charles Sturt University Albury, NSW, Australia

Kim-Kwang Raymond Choo Department of Information Systems and Cyber Security The University of Texas at San Antonio San Antonio, TX, USA Zheng Xu Shanghai University Shanghai, China

Mohammed Atiquzzaman School of Computer Science University of Oklahoma Norman, OK, USA

ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-3-030-25127-7 ISBN 978-3-030-25128-4 (eBook) https://doi.org/10.1007/978-3-030-25128-4 © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Foreword

The 2019 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2019), building on the previous successes in Shanghai, China (2018), Ningbo, China (2017), Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 7th consecutive conference year in Huainan at June, 22–24, 2019. The purpose of ATCI 2019 is to provide a forum for presentation and discussion of innovative theory, methodology and applied ideas, cutting-edge research results, and novel techniques, methods, and applications on all aspects of cyber and electronics security and intelligence. The conference establishes an international forum and aims to bring recent advances in the ever-expanding cybersecurity area including its fundamentals, algorithmic developments, and applications. Each paper was reviewed by at least two independent experts. The conference would not have been a reality without the contributions of the authors and the reviewers. We sincerely thank all the authors for their valuable contributions. We would like to express our appreciation to all members of the program committee for their valuable efforts in the review process that helped us to guarantee the highest quality of the selected papers for the conference. We would like to express our thanks to our distinguished keynote speakers, Professor Tharam Dillon, La Trobe University, Australia; Professor Vijayan Sugumaran, Oakland University, USA; Professor J. Christopher Westland, University of Illinois at Chicago, USA. We would also like to acknowledge the strong support of Anhui University of Science and Technology, Huainan, China, as well as the general chairs, publication chairs, organizing chairs, program committee members, and all volunteers.

v

vi

Foreword

Our special thanks are due also to the editors of Springer book series “Advances in Intelligent Systems and Computing,” Thomas Ditzinger, Holger Schaepe, Dagmar Orth, and Arumugam Deivasigamani for their assistance throughout the publication process. Jemal Abawajy Kim-Kwang Raymond Choo Mohammed Atiquzzaman Rafiqul Islam Zheng Xu

Organization

General Chairs Liang Yuan (President)

John Macintyre (Pro-Vice-Chancellor)

Anhui University of Science and Technology, Academician of the Chinese Academy of Engineering, China University of Sunderland, UK

Honor Chair Yongcun Guo (Secretaryship)

Anhui University of Science and Technology, China

Program Chairs Jemal Abawajy Kim-Kwang Raymond Choo Mohammed Atiquzzaman Rafiqul Islam Zheng Xu

Deakin University, Australia The University of Texas at San Antonio, USA The University of Oklahoma, USA Charles Sturt University, Australia Shanghai University, China

Publication Chairs Juan Du Vijayan Sugumaran

Shanghai University, China Oakland University, USA

Publicity Chairs Neil. Y. Yen Xianchao Wang

University of Aizu, Japan Fuyang Normal University, China

vii

viii

Organization

Local Organizing Chairs Yan Xiong Ying Xu Qianjin Zhao

Anhui University of Science and Technology, China Anhui University of Science and Technology, China Anhui University of Science and Technology, China

Program Committee Members William Bradley Glisson George Grispos V. Vijayakumar Abdullah Azfar Aniello Castiglione Florin Pop Ben Martini Wei Wang Zheng Xu Neil Yen Xiaolu Zhang Shunxiang Zhang Guangli Zhu Tao Liao Xiaobo Yin Kelei Sun Xiangfeng Luo Xiao Wei Huan Du Zhiguo Yan Abdulbasit Darem Hairulnizam Mahdin Anil Kumar K. M. Haruna Chiroma Yi Liu

Sam Houston State University, USA University of Nebraska Omaha, USA SCSE, VIT Chennai, India KPMG Sydney, Australia Universita di Salerno, Italy University Politehnica of Bucharest, Romania University of South Australia, Australia The University of Texas at San Antonio, USA Shanghai University, China University of Aizu, Japan The University of Texas at San Antonio, USA Anhui University of Science and Technology, China Anhui University of Science and Technology, China Anhui University of Science and Technology, China Anhui University of Science and Technology, China Anhui University of Science and Technology, China Shanghai University, China Shanghai University, China Shanghai University, China Fudan University, China Northern Border University, Saudi Arabia Universiti Tun Hussein Onn Malaysia, Malaysia JSS Science and Technology University, Mysore, Karnataka, India Abubakar Tafawa Balewa University Bauchi, Nigeria Tsinghua University, China

Organization

Foluso Ladeinde Kuien Liu Feng Lu

Ricardo J. Soares Magalhaes Alan Murray Yasuhide Okuyama Wei Xu Chaowei Phil Yang Hengshu Zhu Morshed Chowdhury Elfizar Rohaya Latip

ix

SUNY Korea Pivotal Inc., USA Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences The University of Queensland, Australia Drexel University, USA University of Kitakyushu, Japan Renmin University of China George Mason University, USA Baidu Inc., China Deakin University, Australia University of Riau, Indonesia Universiti Putra Malaysia

Contents

Cultivation System of Innovative Talents in Ship and Ocean Engineering Complex Engineering . . . . . . . . . . . . . . . . . . . . Guozheng Wang, Junfu Yuan, Shangfu Li, Zhenguo Ding, and Hua Deng

1

Preparation of Multifunctional Nano-composite and Its Application to Latent Fingermarks . . . . . . . . . . . . . . . . . . . . . . Xinhua Lv

8

The Application of Industrial Robot Technology in the Teaching of Applied Undergraduate Colleges and Universities . . . . . . . . . . . . . . . Yongcheng Huang, Xianming Wu, Bin Yang, and Zhiyong Li

14

Modeling and Simulation of Proximity Explosion Damage Probability for Anti-radiation Missile Laser Fuze . . . . . . . . . . . . . . . . . . . . . . . . . . . Song Gao, Qiang Cui, and Chao Ma

21

Analysis and Research on Distance Transmission Characteristics of Electric Vehicle EPRT System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hehui Tang, Lixin Lu, and Guiqin Li

28

Data Mining and Association Analysis of Irrational Use of Antibiotics in Outpatient Data of New Cooperative Medical System . . . . . . . . . . . . Qingshun Hu and Xiaoqiang Ren

36

Evaluation Index System of High-Quality Energy Development . . . . . . . Shanshan Wu, Guoqiang Ji, Yuanyue Chen, and Baoguo Shan

43

Design of Smoke Detection Algorithm Based on UV Spectroscopy . . . . . Shuping Xu, Mengyao Huang, Li Chen, and Xiaohui Su

55

Coordinated Development of Leisure Sports Industry and Urban Culture Under the Concept of “Casual City” . . . . . . . . . . . . . . . . . . . . . Haijing Guo, Li Zhang, and Huijing Song

65

xi

xii

Contents

Quality Evaluation Research Based on Electronic Journals Published on Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wang Juan and Hou Yue

72

A New Type Building Fire Protection Facility Monitoring System . . . . . Yufeng Fan, Lei Zhang, and Yang Du

78

On Translating Internet Neologisms from Chinese to English . . . . . . . . Liu Qian

88

On the Reader Service of the Intelligent Library in Universities . . . . . . Sun Jie

95

Fast Calculation Method of Video Saliency Based on Temporal and Spatial Edge-Preserving Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Zhiming Li Feature Extraction for Eye Movement Video Data . . . . . . . . . . . . . . . . 115 Yifang Yuan and Qingxiang Wang Initial Path Optimization of Equal Residual Height Algorithms Based on Ring Cutter Five-Axis Milling . . . . . . . . . . . . . . . . . . . . . . . . . 122 Ying Chen, Gang Chen, Yu Sun, Longyuan Xu, Mingtian Liu, and Yuyao Chen Design of Intelligent Billet Furnace-NO Separation System Based on Model Free Adaptive Control Theory . . . . . . . . . . . . . . . . . . . . . . . . 128 Haibo Peng, Qiaoshun Wu, and Jianmin Bai Feature Extraction of Dwarf Nova with Convolution Operation . . . . . . 135 Yongjian Zhao Optimized Grid Resource Allocation and Task Scheduling Strategy . . . 142 Weiwei Guo and Feng Liu Oral English Flipped Teaching in China Based on Cloud Class . . . . . . . 150 Wang Fang and Wang Haijun Application of Confucian “Trust” Management—Yonghui as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Yigao Lv Design of Urban Intelligent Parking Service System Based on Intelligent Travel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Hesen Li and Xinlei Chen Analysis of Emotional Education in Middle School Geography Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Mei Shan, Weidong Shi, and Guiju Liu

Contents

xiii

Improvement and Empirical Study of K-Means Clustering Algorithm Based on Chinese Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Yatao Su Innovative Design of Self-service Car Wash Service System . . . . . . . . . . 189 Hesen Li and Zixian Zheng Application of Special Effect Technology in Late Synthesis . . . . . . . . . . 197 Jianfeng Zhang, Haojie Yang, and Ziyou Zhuang Development of Post-production Synthesis Technology . . . . . . . . . . . . . 204 Liang Li An Improved Chicken Swarm Optimization for TSP . . . . . . . . . . . . . . . 211 Hao Ye, Qiang Fu, Jiaqi Ye, and Caiming Zhong Application Scenario of Artificial Intelligence Technology in Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Ping Xia Analysis on the Causes of Safety Risks About Food of Purchasing Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Guohong Wang, Fumin Wang, and Kena Wang Face Fatigue Detection Method Based on MTCNN and Machine Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Wenfeng Shi, Jun Li, and Yuanjie Yang English Translation Model Design Based on Neural Network . . . . . . . . 241 Xiangrong Liu An Emergency Resource Allocation Method Based on Supernetwork for Urban Disaster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Zhongyi Zhang, Zhe Wang, and Haibin Zhou Risk Assessment of Ad Hoc Based on Game Theory . . . . . . . . . . . . . . . 256 Xiufeng Gao and Zhaoyi Chen Collaborative Mechanism of Shipping Logistics Supply Chain Based on Improved Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 265 Chen Qian, Zhichao Xu, and QiSong Zhang An Improved Chinese Search Engine Lingo Search Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Yatao Su Design of Mushroom Humidity Monitoring System Based on NB-IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Cuihua Sun and Yanting Cao

xiv

Contents

Design and Implement of HPC Simulation Cloud Platform for Automobile Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Yingzi Wang, Panpan Han, and Jue Hou Analysis and Simulation of Maximum Power Point Tracking for Photovoltaic Power Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Haokun Guo The Trajectory Tracking Method of Intelligent Vehicle Based on Optimality Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Cuicui Jiang Attack Net Modeling Method for Mobile Ad Hoc Network . . . . . . . . . . 313 Chengli Le and Xiufeng Gao Game Analysis on Enterprise Performing Social Responsibility . . . . . . . 323 Xin Zhao and Hong Zhao Training Strategy of E-Commerce Innovation and Entrepreneur Talents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Huiyong Guo, Chao Xie, Huifang Jiang, Wenlu Huang, Yating Chen, and Minghua Xue Foam Flotation Modeling Method Based on Complex Events . . . . . . . . 337 Tao Sun and Qiangyong Tai Research into Optimization Strategies for the Rural Logistics Network—Taking Yangxin County for Example . . . . . . . . . . . . . . . . . . 348 Li Li, Zhenyan Hu, Xiaojie Wang, Yang Li, Yaqi Huang, Shanshan Hu, and Linyun Fu Differential Pricing Strategy and Coordination Mechanism of Retailer-Led Closed-Loop Supply Chain Under Multi-disturbance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Wenxue Ran, Li Liu, and Zhongliang Shi Transmission Path of Intangible Cultural Heritage Under Digital Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Tingting Li and Qian Chen MicroBlog Community Massive Information Mining and Monitoring System—Overall Architecture and Radar Subsystem . . . . . . . . . . . . . . . 372 Jing Leng and Tonghong Li Impact of Bundled Price Presentation the Online Consumers’ Impulsive Buyer Behavior - Empirical Analysis Based on Variance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Feng Gong, Xiawei Yang, and Mengwei Liu

Contents

xv

Computer Aided Product Development and Design Based on Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Shuai Yang and Meijing Yao Application of MFCA to Improve the Yield of the FCCL Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Minghung Shu, Kunchen Chung, and Juichan Huang Electromagnetic Characteristics Analysis and AC Loss Evaluation of HTS Tapes Based on H-Formulation . . . . . . . . . . . . . . . . . . . . . . . . . 410 Tang Yu, Jiang Yi Jue, and Luo Wei Early Warning System for Financial Risks in the Real Estate Market of China on the Basis of BP Neural Network . . . . . . . . . . . . . . . . . . . . . 419 Jianjun Xie and Yue Zeng Rural Landscape Planning and Design Based on Low Cost Control Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Lizhi Kang A Hybrid Dynamic Multi-criteria Decision Making Model Based on Interval Bipolar 2-Tuple Linguistic Terms for Supplier Selection . . . 433 Dongliang Xiao Research into Performance Evaluation with the Application of DEA–A Case Study of Automobile Dealer . . . . . . . . . . . . . . . . . . . . . 443 Jui-Chan Huang, Tzu-Jung Wu, and Yan-Yu Wang Evaluation of Power Grid Construction Strategy Based on AHP-TOPSIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Di Pu, Hu Li, Bingjie Li, Jing Shi, and Dongxiao Niu An Efficient Weighted Negative Sequence Pattern Mining Algorithm with Multiple Minimum Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 Dongyuan Wang, He Jiang, and Aixin Yang Dynamics of Interaction Design Course System Based on Collaborative Innovation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 Gaosheng Luo Transformer Fault Diagnosis Based on Elman Network . . . . . . . . . . . . 479 Zhongqiang Liu, Li Zhang, Chunxiao Zhang, Xiangfei Kong, and Anan Shen Agent-Based Modeling in a Simple Circular Economy . . . . . . . . . . . . . . 487 Pingchao Chen, Xinxin Wu, and Dezhuang Miao Sports Athletes’ Performance Prediction Model Based on Machine Learning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Pan Zhu and Feng Sun

xvi

Contents

The Prediction Model of Air-Jet Texturing Yarn Intensity Based on LSTM Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Zhenlong Hu, Qiang Zhao, and Jun Wang Network Platform for Inheritors of Textile Intangible Cultural Heritage Based on Cooperative Game . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Hong Zhao, Liujun Guan, and Kaiyuan Zhao Impact of Taxes and Subsidies on Social Wealth Distribution: By Agent-Based Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Yuqian Yang, Pingchao Chen, and Qixuan Jin Optimization Strategy of Database Service Resources Based on Cloud Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Lei Yao Design of Intelligent Garbage Collection System . . . . . . . . . . . . . . . . . . 542 Yueping Zhao, Qin Wang, Yuan Zang, and Jun Wan An Improved Algorithm of Neural Network . . . . . . . . . . . . . . . . . . . . . 548 Huan-zhao Chi Local Feature Detection Based on Image Block Discrete Scale Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Jing Leng, Tong-hong Li, and Wei Xu Coke Quality Prediction Model Based on DE-RBF Neural Network . . . 566 Mingrui Xu Electricity Consumption Forecast of Zhejiang Based on the Background of Electric Energy Substitution . . . . . . . . . . . . . . . . . . . . . 576 Changzu Li, Dongxiao Niu, Bo Miao, and Qiang Liu Design of Safety Production Supervision and Data Management System Based on Cloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 Hongsheng Xu and Ganglong Fan Logistics Cost Control of Jingdong Mall Under E-Commerce Mode . . . 592 Aiping Wu Energy Consumption Optimization of Container-Oriented Cloud Computing Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600 Zhenjiang Li and Zhenxiang He Blockchain Technology in the Registration and Protection of Digital Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 Yuanjun Ding, Haibo Pu, Yu Liang, and Hongjie Wang Item-Based Collaborative Filtering Algorithm Based on Co-occurrence Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 Bocheng Liu and Jieyu Zheng

Contents

xvii

A Comprehensive Evaluation Method of the Learning Situation of the Students of the Quality Course Website . . . . . . . . . . . . . . . . . . . . 624 Jingxin Yu, Yijing Zhang, Xuyan Su, and Hengyan Guo Damage Information of Fiber Reinforced Concrete Based on Digital Image 3D-DIC Technology . . . . . . . . . . . . . . . . . . . . . . . . . . 634 Chao Lin, Chuan-guo Fu, Jie-hua Chen, Shi-han Du, and Shu-jing Zhao Research on Vision Navigation Technology of Porter Based on Improved Simulated Annealing Algorithms . . . . . . . . . . . . . . . . . . . . 642 Shuguang Zhang, Mingchen Wu, and Chenbing Guo A Review on Unsafe Behavior of Employees Based on Big Data . . . . . . 650 Tingting Li and Minglu Gong Adaptive Resource Allocation Algorithm for Multiuser OFDM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658 Yue Xian, Hao Yang, Yuwei Zhai, Kean Shi, and Wenzhuo Ma Synthetic Evaluation Model of Learning Maturity of Power Safety Regulations Based on Improved Radar Chart . . . . . . . 668 Jiahui Zheng, Xiaoyong Bo, Zhaoyang Qu, Shiqi Zhou, Shuai Li, and Quan Yuan Reflections on the Cross-Cultural Competence Cultivation in Higher Vocational Education Under the Global Information Age . . . 679 Jie Gao Optimization of Optical Path for Anti-radiation Missile Laser Fuze . . . 686 Song Gao, Li Chen, and Hongyang Zhou Feasibility Analysis of Integrating Psychological Development Training into Physical Education Teaching . . . . . . . . . . . . . . . . . . . . . . 694 Haijing Guo, Li Zhang, and Huijing Song Dual Radio Frequency Robot Group Communication System and Event Communication Control Method . . . . . . . . . . . . . . . . . . . . . . 702 Lei Zhang, Yufeng Fan, and Yang Du Implementation of NN Algorithm Based on the MapReduce Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709 Changlin He and Weibao Zhang The Task-Based Model in Higher Vocational English Teaching . . . . . . . 718 Xiuhua Li, Weiwei Yang, Wei Mu, Yixing Qi, and Wenjia Jiang Target Recognition Based on Kinect Combined RGB Image with Depth Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726 Jinxin Guo, Qingxiang Wang, and Xiaoqiang Ren

xviii

Contents

A Purchasing Plan Management System Based on Belief Rule-Base Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733 Qiaoshun Wu, Tingting Li, Zhiqiang Wang, and Haibo Peng Automatic Classification of Dwarf Nova . . . . . . . . . . . . . . . . . . . . . . . . . 738 Yongjian Zhao Optimized Min-Min Dynamic Task Scheduling Algorithm in Grid Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 Feng Liu and Weiwei Guo Comparison on Performance of Multiuser Detector . . . . . . . . . . . . . . . . 753 Daming Pei The Application of Confucian “Benevolence”—LJ Real Estate as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765 Yigao Lv Discussion on Sharing Service System Design of Household Hardware Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772 Hesen Li and Ziwen Yu Design of Multi-project Collaborative Management System . . . . . . . . . . 780 Rui Huang, Haibo Pu, Lin Zou, and Wenfeng Shi Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791 Qianyi Shang, Lijun Chen, Dandan Wang, Ruoxiong Tong, and Peng Peng Logistics Mode Analysis Under the Background of Cross-Border Ecommerce Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801 Huiyong Guo, Weiqi Rao, Jie Wang, Peng Wu, and Zhichuang Chen Intelligent Storage System Based on “Internet+” Logistics . . . . . . . . . . . 811 Xiaolei Zhang Inheritance and Development of Folk Art Based on Multi-media Platform Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817 Shi Liu, Tingting Li, and Xinming Zhang Application Research of Holographic Image Technology in Commercial Space Design Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . 823 Lizhi Kang Evaluation of Electric Energy Substitution Scheme Based on Combination Weight Grey Correlation Method . . . . . . . . . . . . . . . . 830 Di Pu, Dongxiao Niu, and Qian Ma Design of Remote Wireless Automatic Watering Robot Control System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839 Yuejin Huang, Zhongfu Liu, and Yuhua Dong

Contents

xix

Practice Teaching Reform of Motor Drive in Local Applied University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847 Yan Zhang The Prediction Model of Cotton Yarn Quality Based on Artificial Recurrent Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . 857 Zhenlong Hu, Qiang Zhao, and Jun Wang An Improved Neural Networks Algorithm . . . . . . . . . . . . . . . . . . . . . . . 867 Zhang Cheng Construction of Big Data Analysis Platform Based on Semantic Rough Concept Lattice Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874 Hongsheng Xu and Guofang Kuang Virtual Machine Migration Strategy for Cloud Data Center Based on NSGAII . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883 Zhenxiang He and Jiankang Dong Human Resource Management Innovation of Aviation Services . . . . . . 891 Minglu Gong and Tingting Li Present Research Status of Earthquake Collapse Damage of RC Frame Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 898 Meng Song, Jizhi Su, Yudong Ma, Kuan Liu, and Tao Bai Manipulator Control System Based on Machine Vision . . . . . . . . . . . . . 906 Yufeng Zhang, Xue Wang, Longsen Gao, and Zongbao Liu Design of Improved Deep Convolution Network Model . . . . . . . . . . . . . 917 Hongsheng Xu and Lan Wang Application of Computer Technology in Sports . . . . . . . . . . . . . . . . . . . 923 Qiang Wang Realization of Identity Card and Face Recognition Two-Factor Authentication System Based on Wechat . . . . . . . . . . . . . . . . . . . . . . . . 929 Guofang Kuang and Hongsheng Xu Extraction Method of Classification Rules in Decision Tree Based on Attribute Selection Metric of Rough Set . . . . . . . . . . . . . . . . . . . . . . 937 Lan Wang and Hongsheng Xu A DBN-Based Ensemble Method for Resource Usage Prediction in Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 943 Yuan Wang, Yiping Wen, Yu Zhang, and Jinjun Chen Utilizing Tags for Scientific Workflow Recommendation . . . . . . . . . . . . 951 Junjie Hou and Yiping Wen

xx

Contents

An Improved Code-Based Encryption Scheme with a New Construction of Public Key . . . . . . . . . . . . . . . . . . . . . . . . . 959 Yuzhuang Zhou, Peng Zeng, and Siyuan Chen Application of the Intelligent Inspection Management System in the Operation and Maintenance of Transmission Lines . . . . . . . . . . . 969 Peipei Li, Dingsong Wang, Yuxuan Jiang, and Liang Han Study on the Brownfield Landscape Restoration of Urban Iron and Steel Industry Based on the Rainwater Management . . . . . . . . . . . 975 Qingya Li Development and Application of Computer Data Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987 Ling Liu The Video Detection of Human Respiratory Motion Based on Sequential Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992 Luo Bin, Liu Bo, and Zhu Yu Impact of the Power Allocation of Board of Directors on the Sustainable Growth Based on the DEA/AHP Model . . . . . . . . . . 998 Henian Song Experimental Studies of Flow Structure at Confluent Main Bend Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004 Bin Sui, Shehua Huang, Peiling Yang, and Yuxiao Wu The Robot Embedded Wireless Motion Monitoring Based on the Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014 Xiangfeng Suo, Yunhui Gao, Xue Han, and Xingwei Sun The Structural Design and Shock-Resistant Performance of Steel Beam-Concrete Column Frame Structure . . . . . . . . . . . . . . . . . 1020 Qiao Wang Application of the Mobile Terminals in the Long-Distance Continuing Education for Preschool Teachers . . . . . . . . . . . . . . . . . . . . 1027 Zhen Wang The Green Indicator System of Distance Open Education Based on the APP Terminal Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034 Zhen Wang The Big Data Feature Mining Technology Based on the Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040 Yun Wang Exploration of the Big Data Applications Under the Background of “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1046 Wang Zhe

Contents

xxi

The Modeling and Simulation of the Cloud Financing Model for Technology-Based Small and Medium-Sized Enterprises . . . . . . . . . 1057 Wu Xi The Localized Translation of the Bank User Manual Based on the Mobile Terminal Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064 Xing Hao Artistic Analysis and Network Application of the Modern Commercial Digital Illustrations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070 Hui Xu The Construction of Distance Education Personalized Learning Platform Based on Educational Data Mining . . . . . . . . . . . . . . . . . . . . . 1076 Yanqiang Xu, Miao Zhang, and Zhigang Gao The Classification Model of the Network Electronic Music Based on the Chinese Traditional Opera Music . . . . . . . . . . . . . . . . . . . 1086 Yuan Yue Internet of Things Perception Technology Based on the Physical ID in the Operation and Inspection Management of Smart Grids . . . . . 1092 Chunyan Zhang, Jiajun Zhou, Yule Wu, and Zhengyong Fan The Processing Methods of the Computer Format Information Flow in the Network English Translation System . . . . . . . . . . . . . . . . . . . . . . 1098 Jing Zhang The Combination of the University Financial Management System and the Computer Multimedia Technologies . . . . . . . . . . . . . . . . . . . . . 1105 Yabin Zhang Application of the E-commerce Platform in the International Trade . . . 1112 Luzhao Zhou Numerical Simulation of Foundation Pit and Performance Analysis of Vertical Column in Inverse Method . . . . . . . . . . . . . . . . . . . . . . . . . . 1118 Wen Zhou The Application of Flipped Classroom Model in College Public English Network Multimedia Teaching . . . . . . . . . . . . . . . . . . . . . . . . . 1125 Juan Chen Robotic Arm Control System Based on the Reconfiguration Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1132 Nan Chen English Teaching Platform Based on the Campus Network Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . . 1138 Heng Du

xxii

Contents

The Teacher Evaluation and Management System Innovation Based on the Artificial Intelligence Algorithms . . . . . . . . . . . . . . . . . . . . 1144 Yunhui Gao, Xiangfeng Suo, and Fuyan Zheng Study on Slag-Bonding Property of Burning Blended Coal . . . . . . . . . . 1150 Yanhong Guo and Fan Cheng The Landscape Enterprise Multi-project Management Information System Based on Mobile Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159 Yingtao Guo, Ling Liu, Huilin Yi, and Huilan Peng User Information Optimization and Retrieval Technology in Distributed Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1166 Lei Bo Method of Whole Process Post Safety Evaluation for Dangerous Liquid Bulk Cargo Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172 Chen Li Response Time of a Ternary Optical Computer Based on Complex Queueing System with Synchronous Multi-vacations . . . . . . . . . . . . . . . 1180 Xianchuan Wang, Jie Zhang, Shan Gao, Gang Sun, Jia Zhao, Mian Zhang, Linguo Li, Dongdong Liu, Yan Zhang, and Xianchao Wang Research on Event Recognition Based on Multi-feature Fusion . . . . . . . 1189 Tianqi Liu, Yan Chao, Shunxiang Zhang, and Tao Liao An Improved Watershed Image Segmentation Algorithm Based on Fuzzy Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198 Shu-ying Liu, Yan Chao, Tao Zeng, Jing Wang, and Peijun Li A Comprehensive Evaluation Method of Agent Coalition . . . . . . . . . . . 1206 Haixia Gui, Xiangqian Wang, and Banglei Zhao Frequent Subtree-Based Event Language Expression Pattern Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1215 Xianchuan Wang, Shibing Wang, Gang Sun, Xiuming Chen, Xianchao Wang, and Zongtian Liu Apriori Algorithm-Based Association Rules of Event Language Expression Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1225 Xianchuan Wang, Shibing Wang, Gang Sun, Xiuming Chen, Xianchao Wang, and Zongtian Liu Autonomous Learning Recommendation Algorithm Based on K-Means and K-Nearest Neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . 1235 Du Wei, Ma Chun, and Wang Qing

Contents

xxiii

Collaborative Filtering Recommendation Algorithm Based on Element-Wise Alternating Least Squares and Time Weight . . . . . . . 1245 Shu Jianhua, Wang Dong, and Xue Feng Improvement of Apriori-Pro Algorithm Based on MapReduce . . . . . . . 1257 Huaping Zhou, Daoyi Zhang, and Xiaoyan Wang A Hybrid of Background Scatter and Foreground Contour Completeness for Salient Object Detection . . . . . . . . . . . . . . . . . . . . . . . 1266 Chenxing Xia, Qianjin Zhao, Shunxiang Zhang, and Xiuju Gao Analysis and Classification of Tremor Characteristics of Hepatolenticular Degeneration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1276 Du Wei, Ma Chun, and Wang Qing Speech Analysis for Wilson’s Disease Using Genetic Algorithm and Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1286 Ma Chun, Du Wei, and Wang Qing Design and Construction of Unification Coal Mine Safety Control-Management Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1296 Xiangju Liu, Pengcheng Liu, and Lina Liu Causal Relationship Recognition Based on Lexcial-Syntactic Pattern for Emergency Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 Tao Liao, Xu Zhou, Zongtian Liu, and Shunxiang Zhang Preventing Privacy Disclosure from Hostility Attack Base on Associated Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315 Yushan Zhao, Gaoming Yang, Xianjin Fang, and Bin Ge A Convolutional Neural Network Model Based on Improved Softplus Activation Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1326 Kelei Sun, Jiaming Yu, Li Zhang, and Zhiheng Dong Performance Analysis and Numerical Calculation for the Geom/ Geom/1 Queueing System with Threshold Policy, Delayed Vacations and Setup Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1336 Jie Zhang, Shan Gao, Kun Pang, and Xianchao Wang Singular Value Decomposition Algorithm Combined with SDAE for Improving the Accuracy of Movie Recommended System . . . . . . . . 1345 Shengli Hu and Zhili Song A Hyperspectral Image Feature Extraction Algorithm Combining Spatial-Spectral Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1356 Kui Lu, Min Zhou, and Shunxiang Zhang Automatic Construction of Coal Mine Accident Ontology . . . . . . . . . . . 1366 Xiangqian Wang, Dongdong Gui, Huizong Li, and Haixia Gui

xxiv

Contents

Event Recognition Oriented to Emergency Events and Its Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1375 Tao Liao, Weicheng Fu, Shunxiang Zhang, and Zongtian Liu An Energy-Heterogeneous Uneven Clustering Routing Algorithm for WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1385 Hui Chen and Wenjun Zheng The Extraction Method for New Login Word from Chinese Micro-blog Based on Improved Mutual Information . . . . . . . . . . . . . . . 1394 Wenting Liu, Guangli Zhu, and Shunxiang Zhang Sentiment Analysis of Film Reviews Based on Semantic Rules and Extended Domain Sentiment Dictionary . . . . . . . . . . . . . . . . . . . . . 1404 Shanshan Xu and Shunxiang Zhang Building Sentimental Word Lexicon for Chinese Movie Comments . . . . 1414 Qiaoyun Wang, Guangli Zhu, and Shunxiang Zhang Probabilistic of Membrane Computing Mobile Robot Position Optimization in Coal Mine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1423 Jiachang Xu and Yourui Huang Character Relationship Extraction Method Based on BiLSTM . . . . . . . 1432 Lu Tao and Shunxiang Zhang Sentiment Calculation of Chinese Microblog Based on Dependency Parsing Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1442 Zhaoya Hu, Shunxiang Zhang, and Nana Wang An Automatic Calculation Method for Sentiment Word Polarity in Commodity Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1450 Ming Jin and Shunxiang Zhang Exploring the Differences, Similarities and the Effect Between Chinese and Ghanaian Traditional Cuisines Towards a Better Appreciation and Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1459 Ernest Asimeng and Shunxiang Zhang Arithmetic Operation Recognition Method Based on BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1468 Zouyu Xie, Yu Cao, Sijia Zeng, and Liufen Li Attribute-Based Encryption Without Abuse of Private Keys . . . . . . . . . 1475 Xianlin Zhou, Hailong Ye, and Jun Ye Efficient Outsourcing of Modular Exponentiations in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1481 Jun Ye, Bo Tang, and Ziteng Wang

Contents

xxv

Intelligent Design for Image Search Engine . . . . . . . . . . . . . . . . . . . . . . 1486 Zhengxi Wei, Jiaxing Peng, and Jun Ye Research on Identification of Handwritten Mathematical Formulas . . . . 1494 Yu Cao, Zouyu Xie, and Liufen Li Alias-Based Car Free-Form Surface Design . . . . . . . . . . . . . . . . . . . . . . 1501 Yufei Huang, Hegeng Wei, and Bo Wang Design of Planetary Gears for Wind Power Transmission Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1506 Yufei Huang and Ling Zhang Green Design of Concurrent Engineering of Silkworm Machinery . . . . 1510 Bo Wang Preliminary Study on Optimum Design of Tower Crane Boom Based on Structural Bionics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1517 Bo Wang Research and Development of Virtual Manufacturing . . . . . . . . . . . . . . 1523 Bo Wang Finite Element Analysis of Welding Joint Stress of 506 Electrode . . . . . 1530 Yufei Huang Application of Directed Recommendation in Text Manual Annotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1540 Wang Yue Application of Intelligent Video Analysis in Financial Security . . . . . . . 1547 Zhiwei Tang and Xiaoqing Chen The Data Platform for Large-Scale Video Surveillance Systems . . . . . . 1556 Jie Dai and Na Liu EMC&EMI on High-Speed PCB Design . . . . . . . . . . . . . . . . . . . . . . . . 1562 Zhiwei Tang and Xiaoqing Chen Iris Recognition Technology and Application Research in the Field of Public Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1570 Cheng Cheng and Bo Zhao Multiple Faults Detection of Three-Level NPC Inverter Based on Improved Deep Learning Network . . . . . . . . . . . . . . . . . . . . . . . . . . 1575 Jinjing Wu, Zhiguo Yan, and Quan Sun Smart and HD Bayonet Comprehensively Search System . . . . . . . . . . . 1584 Yixian Tan and Yanfeng Shang

xxvi

Contents

The Modeling Platform for Video Surveillance Knowledge Base . . . . . . 1589 Xiaorong Xia, Yixian Tan, and Yanfeng Shang Human Action Recognition Based on Deep Learning . . . . . . . . . . . . . . . 1595 YuXin Cai, YanFeng Shang, YiXian Tan, ZhiWei Tang, and Bo Zhao An Effective Solution for Application Orchestration . . . . . . . . . . . . . . . 1601 YuXin Cai, YanFeng Shang, YiXian Tan, ZhiWei Tang, and Bo Zhao The Development of an Ontology-Based Marine Injury Assessment and Treatment Decision Making Supported System . . . . . . . . . . . . . . . . 1609 Min Zhu, Huiyu Jin, Tianshu Zhou, Ruxue Chen, Yongpeng Chen, and Quanyi Huang Design Methods of Game Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1619 Haojie Yang, Ziyou Zhuang, and Jianfeng Zhang Analysis of Artillery Range Extension Technology Under Informationization Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1625 Xubo Zhang, Yang Ni, and Haibo Lu How to Choose the Agricultural Industrialization Management Mode with the Internet’s Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1630 Xiu Sun Analysis of College Course Teaching Objectives and Strategies Based on Classroom Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1636 Xiaolin Li, You Li, and Nian Zhao Personalized Prediction Based on a Regression Model with User-Item Specific Interactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1641 Shuang Song, Chaofeng Yuan, and Weijun Ma Construction and Application of Multi-relational Protein Network . . . . 1646 Ming Zheng and Mugui Zhuo Design Af Intelligent Pattern Sauce Pouring Machine . . . . . . . . . . . . . . 1651 Miao Shang and Yongtao Sun College English Reading Teaching Based on WeChat and Reading Circle – a Case Study of Advanced English . . . . . . . . . . . . . . . . . . . . . . 1655 Hong Wu Analysis of the Present Situation and Countermeasures of Teaching Secretaries in Private Colleges and Universities Under the Information-Based Environment . . . . . . . . . . . . . . . . . . . . . . 1660 Hongyan Zhang DC Motor Application and Control Method in Automobile Automatic Transmission Electronic Oil Pump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1665 Ying Zeng, Hongrong Wang, and Zhou Zhou

Contents

xxvii

Keywords Extraction of Medical Information in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1670 Na Wang and Jinguo Wang Informatization Teaching of Optional Courses of Physical Education in Colleges and Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1675 Nan Li Intelligent Distribution System Based on “Internet +” Logistics . . . . . . . 1680 Xiaolei Zhang Development of Business Push System Based on Bluetooth BLE Positioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1685 Yan Wang and Yajun Zheng Informatization Construction of College Art Design Education . . . . . . . 1690 Xu Cong, Shi Liu, and Tingting Li Development and Research on the Informationization of Physical Education in Colleges and Universities . . . . . . . . . . . . . . . . . . . . . . . . . . 1696 Jingyan Cui Network Traffic Classification and Control Technology Based on Decision Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1701 Nanfang Li, Zongrong Li, and Lei Zhao A Vulnerability Mining Method of Web Application Based on Neural Network and Crawler Technology . . . . . . . . . . . . . . . . . . . . . 1706 Yang Li, Shihai Han, and Zhu Zhu Intelligent Reconstruction Plan for Old Stairs in Ordinary Community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1711 Yuan Zang Network Traffic Prediction Based on Machine Learning Model . . . . . . . 1716 Xin Sun, Qinyuan Li, and Changhua Sun Appeal Mechanism of IEEE and Its Enlightenment . . . . . . . . . . . . . . . . 1721 Qing Xu Reform and Innovation of College English Teaching Mode Based on “Internet+” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1726 Jian Li Computer Teaching Reform in Colleges and Universities Under the Background of Informatization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1731 Ming-Hung Shu, Kun-Chen Chung, and Jui-Chan Huang The Application of Task-Driven Teaching Method in ERP Informatization Experiment Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . 1736 Li Li, Liubo Hu, Zhengyan Hu, and Lina Xiao

xxviii

Contents

Performance Analysis of Full Duplex Transmission in Hybrid Communication System Based on 5G Mobile Network . . . . . . . . . . . . . 1741 Yongjun Sun and Yongli Zhu Discussion on the Training Mode of Mobile Communication Technology Professionals Based on School-Enterprise Cooperation . . . . 1746 Zhang Jie Teaching Methods of the Filmmaking Major Adapted to the Development of 3D Film Industry . . . . . . . . . . . . . . . . . . . . . . . . 1751 Ziyou Zhuang, Haojie Yang, and Jianfeng Zhang Implementation and Improvement of College Course Teaching Process Based on Classroom Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . 1756 Xiaolin Li, You Li, and Nian Zhao The Method of Construction and Analysis of Gene Regulatory Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1761 Ming Zheng and Mugui Zhuo Design of Shower Head for Controlling Water Output . . . . . . . . . . . . . 1766 Xinlin He, Miao Shang, and Xuhong Zhao Working Mode of Hospital Cyber Intelligence Under Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1771 Na Wang and Jinguo Wang Computer Thinking and Basic Computer Education in Colleges and Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1776 Wen-I Hsiao, Jung-Fang Chen, and Yun Du The Content and Workflow of Game UI Design . . . . . . . . . . . . . . . . . . 1781 Haojie Yang, Ziyou Zhuang, and Jianfeng Zhang Application of Computer Technology in Art Design . . . . . . . . . . . . . . . . 1786 Miao Yu A New PID Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1790 Guoqiang Chen Application of Selective Information Integration Algorithm in Financial Credit Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1795 Jun Yang Analysis of Modern Media Information Transmission Protocol Based on Heterogeneous Network Structure . . . . . . . . . . . . . . . . . . . . . 1802 Haidong Li and Zhiqiang Xu Application of Cloud Computing Information Processing System in Network Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1809 Haiqing Xu

Contents

xxix

Research on Information Collection and Management of Improve ESIA’s Internet of Things Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1816 Kairong Chen and Hua Liu Computer Aided Tourism Platform Design and Route Planning . . . . . . 1823 Nan Chen and Yuying Chen Research on the Application of Automation Software Control System in Tea Garden Mechanical Picking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1830 Geng Ya Open Community Education Model Based on Internet of Things and Intelligent Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1837 Li Li Open University Participation in Community Education Based on Smart Network and Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . 1843 Ji Xian Community Education Course Recommendation Based on Intelligent Recommendation Algorithm . . . . . . . . . . . . . . . . . . . . . . . 1850 Wenjun Liu Research on Quanzhou Sports Brand Communication Based on Neural Network Recommendation Algorithm . . . . . . . . . . . . . . . . . . 1857 Fengsheng Zeng Home Environment Simulation and Interior Design Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1864 Zhang Xin Using Barrage Technology to Support Traditional Classroom Teaching Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1870 Xiaohui Zhou Research on Cultural Resource Information Management System in Internet + Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1877 Jiang Jie Structural Health Monitoring Based on BP Network and Magnetic Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1884 Zhigang Gao Multi-cluster Fast Information Statistics Algorithm Based on Probability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1891 Xiaohui Tian and XiaoHan Sun Intelligent Classroom Control System with Early Warning Function . . . 1898 Feiyun Yan, Huifang Niu, Na Feng, and Qing Meng

xxx

Contents

Private Cloud Storage Technology and Platform Security Analysis Based on Cloud Computing and Intelligent System . . . . . . . . . . . . . . . . 1904 Chang Jian and Qi Yong Analysis of E-commerce Customer Consumption Model Based on Artificial Intelligence and Computer Aided . . . . . . . . . . . . . . . . . . . . 1915 Jiang Leilei and Dong Ke Research on Vehicle Routing Planning Algorithm for Supply Chain Logistics Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1923 Pengwen Xiao Research on Overseas Communication Mechanism of Moyan Novels Based on Network Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1930 Jinghui Zhou and Yingjie Nie Tourism Design of Forest Park Based on Artificial Intelligence and GIS System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1937 Zhang Rui and Wang Wukui Analysis of Basketball Training Model Optimization Based on Artificial Intelligence and Computer Aided Model . . . . . . . . . . . . . . 1949 Gong Xiaohong and Wang Yu Technological Innovation of Manufacturing Industry Based on Genetic Network and Cloud Computing Information . . . . . . . . . . . . 1957 Wang Yu and Yuxiang Meng Research on Manufacturing Industry Transition in Guangdong-Hong Kong-Macao Greater Bay Area Based on Cloud Computing and Computer Aided Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1969 Ying Liu and Jian Ma Promotion of Morrison’s Realistic Novels Based on Information Technology and Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . 1981 Li Mei and Wang Ying Construction and Empirical Research on the Competency Model of Rural E-commerce Innovation and Entrepreneurship . . . . . . . . . . . . 1990 Wen Yan, Chengjun Zou, Min Li, Lin Chen, and Yu Ye Study on the College Teaching Support Service System Based on Data Mining and Internet Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2003 Jie Xu Privacy-Friendly Personality Recognition in Social Media: A Case Study of Chinese WeChat Users . . . . . . . . . . . . . . . . . . . . . . . . 2013 Qian Xiong, Shiguang Ni, Yekai Xu, Qianjing Zhang, and Kaiping Peng

Contents

xxxi

Application of Artificial Intelligence in Primary and Secondary Schools: A Case Study of Scratch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2026 Kun Li and Shaocheng Song A Heuristic Search Method Based on GA-SA Algorithm . . . . . . . . . . . . 2031 Mo Fu Application of 3D Animation Technology in Roaming Visualization of Anhui Museum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2036 Gang Liu and Yanchen Li Eco-Environmental Geological Evaluation of Environmental Impact of Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2041 Fanwei Zeng The Influence of “Internet+” on the Management of Business Capital and the Optimization Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2046 Shangyue Li Second Classroom Teaching of College English Based on “We Media” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2051 Yin Wei Practical Teaching System of Electronic Information Engineering Major Based on Cultivation of Innovative and Entrepreneurial Ability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2056 Mingguang Zhang and Lisa Zhu Application of Virtual Reality Technology in Anhui Museum Roaming Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2061 Gang Liu and Xuejun Zhan Research and Teaching Reform of Independent Learning Ability in Oral Tourism English Based on WeChat . . . . . . . . . . . . . . . . . . . . . . 2066 Lina Wu Higher Mathematics Teaching Reform in Applied Undergraduate Colleges Based on Mooc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2071 Lisa Zhu and Jiabin Zuo The Construction of Undergraduate Pathway Curriculum System in Higher Vocational Education in Mechanical Engineering . . . . . . . . . 2076 Jinling Zhao Analysis of Jesuits’ Contribution to TCM Communication from the Perspective of Informatization . . . . . . . . . . . . . . . . . . . . . . . . . 2082 Min Zhong, Zhifei Xu, and Jing Yu

xxxii

Contents

Application of Data Mining Technology in College Students’ Employment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2087 Guoxin Wang, Wenzheng Cao, and Yuqiao Cheng The Application of Computer in Physical Education Teaching and Its Influence on Campus Culture . . . . . . . . . . . . . . . . . . . . . . . . . . 2093 Yanming Pei and Lijia Luo Spread and Control of College Students’ Network Rumor Under the Environment of Self-media . . . . . . . . . . . . . . . . . . . . . . . . . . 2097 Sitong Liu Integration of Theory and Practice Teaching in Electrical Specialty for Applied University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2102 Zhenhong Yin and Xia Lei Medical Information Engineering in Clinical Practice . . . . . . . . . . . . . . 2107 Na Wang, Limin Jin, Miao Li, and Jinguo Wang Discussion of Related Issues in the Design of High Frequency Transformer and Its Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2112 Shaoyi Li, Renbo Xu, and Fenglian Yuan Analysis on the Application of Multimedia Technology in the Teaching of College Ideological and Political Courses . . . . . . . . . . . . . . . . . . . . . . 2117 Liu Peng Construction of Library Information Service Under the “Internet+” Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2122 Jinbai Zhang, Jing Fang, and Youchen Chen Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2127

Cultivation System of Innovative Talents in Ship and Ocean Engineering Complex Engineering Guozheng Wang(&), Junfu Yuan, Shangfu Li, Zhenguo Ding, and Hua Deng College of Navigation, Jiangsu Maritime Institute, Nanjing 211170, People’s Republic of China [email protected]

Abstract. With the complexity of international forms, the frequent international exchanges and transportation, and the severe situation of domestic land transportation, ship and ocean engineering have become the disciplines that need to be developed to defend the integrity of the territory and expand the density of exchanges. In view of the current status of training of ship and ocean engineering professionals, this paper proposes an innovative talent training model that is oriented to market demand, with industry-learning-research cooperation as a way to comprehensively improve student’s engineering practice ability. Carry out exploration and practice from the aspects of professional positioning, teaching staff, theoretical teaching system and practical teaching system. Keywords: Ship engineering  Marine engineering  Composite engineering  Innovative talents

1 Introduction Ship engineering is a strategic project of national key development. Ocean engineering is one of the seven strategic emerging industries of the country. The ship and ocean engineering specialty with the background of ship and ocean engineering is one of the key development majors of Chongqing Jiaotong University [1]. Its goal is to train and transport professional professionals with strong professional foundation and strong engineering practice ability for the coastal and inland shipbuilding industry. Due to the continued sluggish shipping market, the shipbuilding industry is facing a severe “cold winter” and its development is difficult. The shipbuilding industry has put forward higher requirements for the engineering practice ability and professional quality of talents [2]. With the rapid development of China’s shipbuilding industry, the emergence of high-tech, high-value-added ships and offshore facilities, and the continuous improvement of ship design and manufacturing concepts and technologies have put forward new and higher requirements for ship and marine engineering talents [3, 4]. In order to meet the needs of the development of China’s shipbuilding industry, it is urgent to train the comprehensive engineering innovation talents of ship and ocean

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1–7, 2020. https://doi.org/10.1007/978-3-030-25128-4_1

2

G. Wang et al.

engineering that lead the industry in the future, and comprehensively reform the training system for ship and ocean engineering professionals.

2 Necessity of Training Scientific and Technological Innovation Ability of Ship and Ocean Engineering Professionals Scientific and technological innovation is an important part of cultivating applied, composite and innovative talents. The ship and ocean engineering major is a knowledge-combination specialty [5]. The professional requires that the talents must have basic theories and basic knowledge of physics, mathematics, mechanics, ship and ocean engineering. They are also subject to initial training in scientific thinking and scientific research, and have the ability to apply scientific and technological developments in advanced design methods and construction techniques for ships and marine structures. This requires that the ship and ocean engineering profession must cultivate the talent’s innovative consciousness, innovative thinking and innovative ability as the basic value orientation, and under the guidance of the quality education concept, cultivate the talent’s scientific and technological innovation ability.

3 Current Status of Scientific and Technological Innovation Activities for Ship and Ocean Engineering Professionals Through the investigation of the main domestic universities and colleges for ship and ocean engineering, the paper analyzes the training mode of current ship and ocean engineering professionals in domestic colleges. It is found that most ship and marine engineering professional training models generally have the phenomenon of attaching importance to theory, ignoring practice, curriculum system design and production practice, and the teaching and production practice are out of line. The quality of talent training is difficult to meet the production needs of enterprises [6, 7]. Especially there are serious shortages of high-quality ship and marine engineering professionals with practical engineering application capabilities and innovative practical capabilities. Under the background of vigorously advocating quality education in higher education, colleges and universities attach great importance to the development of student’s scientific and technological activities. However, due to the pressure of student’s learning, the lack of scientific and technological activities, and the impact of the standards of shipbuilding personnel, student’s technological innovation ability is relatively low, and the level of scientific and technological activities is not high. 3.1

Students are Less Aware of Their Participation in Science and Technology Innovation Activities

Due to the influence of the current teaching system, the traditional concept of learning has not changed. Although students have a certain understanding of cultivating and improving the ability of college students to innovate in science and technology, this

Cultivation System of Innovative Talents in Ship

3

understanding is often passive. Although some college students actively participate in scientific and technological innovation activities, due to narrow knowledge, traditional learning methods have not changed, lack of logical thinking ability, divergent thinking ability, etc., they are prone to failure in scientific and technological innovation activities, thus killing their sense of innovation and behavior. 3.2

Student’s Participation in Science and Technology Innovation Activities is Not Extensive, and the Enthusiasm for Participation is Not High

The science and technology innovation activities of college students are often only monopolized by students with better grades, so the activities have little effect on the promotion of most students. In addition, the current evaluation system of college student’s evaluation system and evaluation awards account for a large proportion of test scores, which can’t greatly stimulate the enthusiasm of college students to participate in scientific and technological innovation activities. At the same time, due to the large number of theoretical and experimental courses for ship professional students, if the activities conflict with the course study or exam, the students will give up participating in science and technology activities [8, 9]. These constraints have prevented students from fully investing in technological innovation activities. 3.3

The Teacher’s Guiding Role is Not Fully Utilized

When college students participate in science and technology innovation activities, due to their limited ability, students can’t think deeply about the topic selection and research methods. However, teachers have problems such as heavy teaching tasks and no calculation of workload, which makes it difficult to give full play to the guiding role. The leading role of teachers in college student’s scientific and technological innovation activities is insufficient, which relatively limits the level of student’s scientific and technological activities. 3.4

The Influence of Employment Characteristics of the Ship and Ocean Engineering Profession and the Employment Standards of Enterprises on College Students

At present, the employment situation of college students majoring in shipping is better. Therefore, except for a small number of students who choose to continue their studies, most of the students are directly employed, and most of the employment directions are on-site supervision, not ship design. At the same time, when shipping companies choose graduates, they rarely use the student’s scientific and technological innovations as one of the criteria for employment. Therefore, these influences make college students lack motivation in participating in technological innovation activities.

4

G. Wang et al.

4 Target Orientation of Training Professionals in Ship and Ocean Engineering The general stipulation of the Higher Education Law on the goal of talent training in higher education institutions is that the task of higher education is to train high-level professionals with innovative spirit and practical ability, develop science and technology culture, and promote socialist modernization [10]. The orientation of the training of ship and ocean engineering professionals should be based on the school’s orientation and market demand for talent. The ship and ocean engineering majors should make full use of the high-quality scientific research resources and human resources of research universities to cultivate the innovative ability and exploration spirit of college students. The ship and ocean engineering profession has a strong engineering background. With the development of China’s shipbuilding industry, the emergence of high value-added ships, the continuous improvement of ship design and manufacturing concepts and technologies, to put forward higher requirements for talents, in addition to having a solid foundation and professional theoretical knowledge, it must also have strong engineering application and innovation capabilities. Therefore, the goal of talent training for ship and ocean engineering should be: adhere to the party’s education policy, and adhere to the combination of theory and practice, teaching and research. Adopting a diversified talent training model, creating talents with strong sense of social responsibility and sense of the times, adapting to the needs of ship and marine engineering development, possessing the basic knowledge of modern ship and ocean engineering design, research, construction, inspection and necessary for work in the industry. The talents with basic skills can take the initiative to adapt to the senior professionals in ship and ocean engineering with strong development, strong spirit of practice and strong sense of innovation in this discipline and related disciplines. The characteristics of this type of talent are: a solid knowledge base and structure, good knowledge development ability, ability to discover engineering problems, solve engineering problems, the ability to combine divergent thinking and aggregate thinking, active thinking and willingness to try on unknown areas and problems, the spirit of unity and cooperation.

5 Capabilities of Ship and Ocean Engineering Professionals The ship and ocean engineering profession are a profession involving multidisciplinary knowledge. This requires that the talents of the profession should have a wide range of knowledge, fast skills, and strong adaptability. Basic knowledge of the technical fields of mathematics, physics, mechanics, ship and ocean engineering principles. Master the basic skills and methods of modern design and manufacture of ships and marine structures [11]. Ability to apply computers for ship and marine structures design. Students in the direction of “ship design” should have strong technical knowledge and a broad knowledge structure in ship overall and structural design. Students in the direction of “shipbuilding” should have strong basic knowledge and ability in structural design, construction technology and production organization management. The talents

Cultivation System of Innovative Talents in Ship

5

in the direction of “Ocean Engineering” require professional knowledge and capabilities in the aspects of marine environment, structural strength design and calculation of marine structures, and development and utilization of marine resources.

6 Discussion on the Training Mode of Innovative Talents in Ship and Ocean Engineering 6.1

Clarify Professional Development Positioning

In the comprehensive national ship and ocean engineering majors, there are two types of school positioning for ship and ocean engineering. Firstly, it is a first-class ship-type university represented by Shanghai Jiaotong University and Harbin Engineering University. Its teaching and research level has always stood at the forefront of the shipbuilding industry, mainly for ship scientific research institutes and design units to train ship design and research professionals who master ship performance and structural characteristics and development trends. Secondly, it’s the college represented by Jiangsu University of Science and Technology. Combining with the modern ship production practice, the company focuses on modern shipbuilding technology based on shipbuilding technology and ship production design, and cultivates professionals who possess modern shipbuilding technology for shipbuilding enterprises. 6.2

Faculty Construction

The construction of the teaching staff is the key to talent training. As a professional teacher of marine and marine engineering, it can not only teach relevant professional knowledge, but also provide students with solid professional basic theoretical knowledge, and should have rich experience in engineering practice to cultivate student’s engineering practice ability and professional comprehensive quality. Improve the overall level of the faculty in different ways. On the one hand, it introduces highly educated and high-level professionals, and focuses on introducing and cultivating academic leaders and academic backbones with great influence in the professional field to enhance professional influence [12]. On the other hand, encourage existing teachers to improve the professional quality and practical ability of the teaching team by means of corporate training, training in brother universities, industry exchanges, and visiting abroad. In particular, young teachers are encouraged to go to the company for one to two years of paid internships to complete the production design or construction of one or two actual ships. At the same time, establish a stable team of part-time teachers of enterprise engineers, so that more practical enterprise engineers can directly serve as practical courses. 6.3

Optimize Theory Teaching System

Optimize the theoretical teaching content and curriculum system of the ship and ocean engineering majors, pay attention to the cultivation of engineering ability, and train

6

G. Wang et al.

student’s engineering consciousness, engineer thinking and practical ability throughout the teaching process. After years of construction, most of China’s university ship and ocean engineering professional teaching system has been further integrated and optimized. While possessing the characteristics of general engineering professions, it also takes into account the industry characteristics of this profession. Starting from strengthening the basic theory, expanding the field of professional knowledge, paying attention to practical ability, and improving the overall quality, it has formed a professional theoretical teaching and curriculum system with strong professional foundation, broad professional knowledge field and close combination of theory and practice [13, 14]. According to the professional school positioning, the modern shipbuilding technology course modules are highlighted in the three major course modules of ship performance, ship structure and modern shipbuilding technology. Based on the traditional module courses such as shipbuilding technology, ship welding, marine materials, shipbuilding CAD/CAM, new courses in modern shipbuilding technology modules such as ship production design, ship armoring, ship painting, etc. will be added, and corresponding curriculum design will be established to ensure that students fully grasp the modern shipbuilding technology to meet the needs of shipbuilding enterprises.

7 Summary Through the investigation of the current status of training of ship and ocean engineering professionals, this paper puts forward the talent training mode, which is guided by the status quo of hip and ocean engineering professionals, with the cooperation of industry, learning and research as the way, the core goal of comprehensively improving student’s professional quality and engineering practice ability. The exploration and practice have been carried out in the aspects of professional development orientation, teacher team construction, theoretical teaching system and practical teaching system construction, industry-learning-research cooperation. It provides a multi-faceted reference for the training of China’s ship and ocean engineering professionals. Acknowledgments. This work was supported by the Foundation of Jiangsu Maritime Institute under Grant No. XR1501, No. XR1504, and Jiangsu University Brand Professional Construction Project under Grant No. PPZY2015B177. Jiangsu University Brand Educational reform in Jiangsu Province Grant No. 2017JSJG010.

References 1. Yi, Y.-H., Yuan, Y., Wang, Y.L.: Research on innovative talents training model of industryuniversity-research cooperation for printing engineering specialty. China Printing and Package Study (2013) 2. Wang, Z., Lei, L., Zhao, T., et al.: Exploration and practice of ship and ocean engineering innovative talents cultivation. J. Chongqing Jiaotong Univ. (2013)

Cultivation System of Innovative Talents in Ship

7

3. Li, Q.: Research on the training system of innovative talents for cost engineering professional. In: 2014 International Conference on Management Science and Management Innovation (MSMI 2014). Atlantis Press (2014) 4. Li, H., Wang, C.Z., Yang, Y.O.: Research and practice of innovation talents training mode of network engineering. In: International Conference on Computer Science and Education, pp. 1719–1722. IEEE (2012) 5. Zhao-Yang, X.U., Meng, G.Z., Li, X.U., et al.: Research on talents training of innovative practical education system of packaging engineering and design. J. Anhui Agri. Sci. (2016) 6. Wang, S.N., Hao, G.Z., Li, X.U.: Research on the innovative talents training mode of environmental engineering based on engineering professional accreditation. Educ. Teach. Forum (2017) 7. Jiang, L.B., Ming-Nong, Y.I., Zhao, G.: Construction and performance research on innovative talents training system of science and engineering department in sports colleges. Zhejiang Sport Sci. (2015) 8. Ran, M., Zhou, X.: Research on approaches of innovative talent training in traffic engineering. J. Yangtze Univ. (2015) 9. Lili, Y.U., Zhang, L., Meng, F.: Research on the training of innovative talents in colleges and universities under the background of new engineering. Pioneer. Sci. Technol. Mon. (2018) 10. Yun-Xia, Q.U., Mei-Lin, G.U., Gao, T.H., et al.: Research on reformation of innovative talent training system for higher education of engineering—comprehensive educational reform of mechanism design & manufacturing and automation in Hebei University of Technology. Res. Teach. (2015) 11. Songhua, L.I., Gao, L., Engineering Training Center, et al.: Research on the mode of cultivating innovative talents in practical teaching at the background of architectural industry: taking Shenyang Jianzhu University Engineering Training Center as an example. J. Shenyang Jianzhu Univ. (2017) 12. Wang, M.J., Liu, J.F., Zeng, X.Y., et al.: Exploration of school-enterprise co-operation innovative talents training mode for engineering education based on research projects. Lab. Sci. (2013) 13. En-Ming, W.U., Peng, Z.G., Huang, J.Y., et al.: Building extracurricular training system for electrical innovative talents. Res. Explor. Lab. (2016) 14. Li, Z., Zhou, H., Liu, Z., et al.: The construction and practice of the top-notch innovative talents training system in research universities. Res. High. Edu. Eng. (2013)

Preparation of Multifunctional Nano-composite and Its Application to Latent Fingermarks Xinhua Lv1,2(&) 1

2

Shandong University of Political Science and Law, Jinan, Shandong Province 250014, China [email protected] Shandong Provincial Key Laboratory of Evidence Identification in Colleges and Universities, Jinan, Shandong Province 250014, China

Abstract. Objective: To explore the preparation method of multifunctional nano-composite and analyze its effect in latent fingermarks. Methods: By the study of magnetic and fluorescent properties of Fe3O4@Pt@PE, different latent fingermarks of the objects were displayed, and its adaptability and visualization effect on different objects were analyzed. Results: The magnetism-fluorescent Fe3O44@Pt@PE nano-composites (nanoeggs) has better fluorescence and magnetic properties, and the lines are more obvious. Conclusion: The magnetismfluorescent Fe3O44@Pt@PE nano-composites are the novel technique for latent fingermarks. It is characterized by high efficiency, convenience and greenness. It can effectively show the relevant details of fingermarks and clearly display latent fingermarks. Keywords: Multifunctional nano-platinum Composite preparation

 Latent fingermarks 

1 Material Selection and Research Methods 1.1

Selection of Reagents and Instruments

There are seven reagents to be used in this study, including sodium citrate (C6H5Na3O72H2O), purchased from Zhengzhou Tiantong Food Co., Ltd., chloroplatinic acid (H2PtCl6), purchased from Shanghai Yurui Chemical Co., Ltd., ferrous sulfate (FeSO47H2O), purchased from Zouping Hongyun Biotechnology Co., Ltd., R-phycoerythrin (R-PE), N-Hydroxy succinimide (NHS), 1-[3-(dimethylaminopropyl)]-3-ethylcarbodiimide (EDC) and polybutylene succinate (PBS), purchased from Shanghai Jiahe Biotechnology Co., Ltd.; sodium hydroxide (NaOH), purchased from Cangzhou Zhenhong Chemical Products Co., Ltd.; Polyethyleneimine (PEI), purchased from Shanghai Jinjinle Industrial Co., Ltd. And the laboratory water is ultra-pure water. The selected research instruments include ultrasonic scrubbers, magnetic agitators, high-speed centrifuges, ultraviolet photometers, high-speed centrifuges, ultra-pure water machines, and electron microscopes. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 8–13, 2020. https://doi.org/10.1007/978-3-030-25128-4_2

Preparation of Multifunctional Nano-composite

1.2

9

Synthesis of Magnetism-Fluorescent Fe3O44@Pt@PE Nano-composites (Nanoeggs)

1.2.1 Synthesis of the Platinum Nano-particles (Pt NPs) To synthesize Pt NPs, three reagents of ethylene glycol, H2PtCl6 solution and KOH solution are needed to be put into the beaker. The capacities of these three reagents are 2.5 mL and 0.02 g/L 0.04 mol/L, respectively. The three reagents were then homogeneously mixed and oscillated in an ultrasonic shaker for 30 min, followed by heating in a microwave oven with a power of 700 W. After a large number of bubbles appear on the wall or bottom of the beaker, the trisodium citrate solution prepared in advance is added to the uniform stirring and heated once in the microwave oven. When the color changes from light yellow to yellow, the heating can be stopped [1]. Finally, after cooling, the solution of Pt NPs was obtained and stored in the fridge for preservation. 1.2.2 Synthesis of PEI-Fe3O4 The magnetic Fe3O4 materials in the nanometer was carried out hydrothermally synthesized by means of microwave radiation. Firstly, the aqueous solution of KNO3 and FeSO47H2O were fused together evenly. After the preparation of A aqueous solution, PEI aqueous solution and NaOH were mixed evenly to obtain B liquid. After the two liquids were made, liquid B was gradually added to liquid A under the action of magnetic stirring, then the power of microwave oven was adjusted to 800 W, and the mixing liquid with uniform stirring was placed for 2 min for heating treatment. Finally, after receiving microwave radiation, the mixture was placed in a centrifuge for centrifugal treatment, and PEI-Fe3O4 was washed three times. 1.2.3 Preparation of Fe3O4@Pt The modification method of this study was carried out through the improvement of the previous methods. Firstly, 10 mL nano-platinum solution was mixed into PEI-Fe3O4. Ultrasound was used to disperse the solution for 2 h, and magnetic separation mixture was used to separate the surplus seed solution of nano-platinum. Then, 10 mL nanoplatinum solution was put into the solution of NaOH. On this basis, H2PtCl6 solution and NH2OH-HCl solution were added to the solution successively, with the capacity of 0. 5 mL, 0.75 mL, followed by magnetic stirring for 15 min, and ultrasonication for 1 h, thereby obtaining the core-shell microsphere solution of Fe3O4@Pt [2]. 1.2.4 Combination of Fluorescent Phycoerythrin (PE) The combination of fluorescent phycoerythrin (PE) was mainly carried out by core-shell microsphere solution of Fe3O4@Pt. Firstly, 0.01 g of NHS and 0.03 g of EDC were added to the core-shell microsphere solution of Fe3O4@Pt to carry out uniform stirring, and followed by 3 h of activation of the carboxyl group at a suitable temperature, and the mixture was washed 3 times. After that, 7.4 mL of pH PBS and 1.0 mg/mL of PE and the mixture were uniformly stirred at a normal temperature by a magnetic stirrer, and allowed to react for 12 h. After the reaction time elapsed, the magnetic separation was carried out, and the system was washed three times with a 7.4 pH PBS solution, thereby possessing a multifunctional composite material having magnetic fluorescence Fe3O4@Pt@PE [3]. After completing the above series of actions, the Fe3O4@Pt@PE

10

X. Lv

solution will be filtered and centrifuged, and the lower layer will be dried by vacuum drying oven, and then the combined Fe3O4@Pt will be ground into a powder. 1.3

Surface Characteristics of Fe3O4@Pt@PE

The surface characteristics of magnetism-fluorescent Fe3O44@Pt@PE need to be observed in detail by emission scanning electron microscopy, and the particle radius of Fe3O4@Pt@PE is measured by particle size analyzer. In addition, the wavelength of ultraviolet spectrum scanning is set at 200 to 500 nm, and the preparation process of Fe3O4@Pt@PE is scanned in detail. After scanning, the ultraviolet spectra of each group are drawn. What’s more, the magnetic factors in Fe3O4@Pt@PE were effectively studied by superconducting quantum interference magnetometer, and the X-ray diffraction spectra of Fe3O4@Pt@PE during the preparation process need to be effectively analyzed by X-ray diffractometer [4, 5]. Then, the samples were diluted and the fluorescence spectra were collected by fluorescence spectrometer. The scanning range of the spectrometer was from 450 to 650 nm, while the range of slit and manmade shooting was from 5 nm. 1.4

Revealing Latent Fingermarks

All fingermarks used in this study are from the same volunteer. In order to take the samples of fingermarks, volunteers need to clean their hands before drying them, and then stamp the latent fingermarks on the objects, and keep the samples of fingermarks properly. In the appearance of latent fingermarks, the fingermarks must be placed at a moderate distance. In order to complete the recurrence of latent fingermarks on the scene of the case, in this study, the samples of fingermarks were placed in a clean tray and stored in natural conditions. Firstly, appropriate amount of Fe3O4@Pt@PE powder should be extracted, and then fingermarks should be brushed with a brush in clockwise direction [6]. Secondly, under dark conditions, latent fingermarks are photographed and fixed by a self-built display and observation system, and the contrast effect of the photos generated by the photoshop image processing software is enhanced to strengthen the clarity of the lines of fluorescent fingermarks in the pictures. The grain definition is convenient for subsequent inspection and identification.

2 Results 2.1

Intensity of Fe3O4@Pt@PE

It is found that the magnetic properties of Fe3O4@Pt@PE are studied by magnetometer. The magnetic beads Fe3O4 nano-materials modified by PEI have good superparamagnetism. The maximum magnetization of Fe3O4 nano-particles is 58.98 emu/g, 18.8 emu/g for Fe3O4@Pt@PE and 36.9 emu/g for Fe3O4@Pt [6]. Among them, Fe3O4@Pt@PE has neither remanence, nor coercivity. So it not only has superparamagnetism, but also has good monodispersity. However, Fe3O4 has a Pt outer shell bound with PE on its surface, and the increase of its thickness will reduce the magnetization.

Preparation of Multifunctional Nano-composite

11

It is concluded that the magnetic strength of Fe3O4@Pt is higher than that of Fe3O4@Ag. The result are shown in the following Fig. 1.

Fig. 1. Magnetization curves of Fe3O4@Pt@PE during the preparation

2.2

Fluorescence of Fe3O4@Pt@PE

To explore the fluorescence intensity of magnetism-fluorescent Fe3O4@Pt@PE, it is necessary to use fluorescence spectrometer. The interaction between Pt outer shell of Fe3O4@Pt and phycoerythrin has a certain influence on the fluorescence intensity [8, 9]. It can be found from the following figure that PE and Fe3O4@PE exhibit strong emission peaks at the excitation wave of 585 nm at the excitation wave length of 500 nm, and then contact with the Pt outer shell, although the fluorescence front position of phycoerythrin was not changed, it is apparent that its fluorescence intensity is reduced. However, after the reaction of phycoerythrin and Pt outer layer, although the fluorescence is reduced, it does not prevent it from still having strong fluorescence performance. By studying the fluorescence spectrum of Fe3O4@Pt@PE preserved in different time periods, it can be found that the fluorescence performance is relatively stable and has little effect on the fluorescence intensity (Fig. 2).

Fig. 2. Emission spectra of Fe3O4@PE (a: PE and Fe3O4@PE; b: the fluorescence intensity changing along with deposited time)

12

2.3

X. Lv

Effect of Latent Fingermarks

As shown below, the revealing of Fe3O4@Pt@PE latent fingermarks is done mainly through the action of magnetic field force. Under the action of magnetic field force, the potential fingermarks can be effectively displayed by the static charge and physical mechanical amount generated by the grease and scale in the latent fingermarks. Furthermore, Fe3O4@Pt@PE itself has certain fluorescence properties, which can show the emotions of fingermarks, and make potential fingermarks appear when contrasting with objects. In addition, it is also important to observe the auxiliary effect of fixed latent fingermarks through color camera filters, multi-band light sources and digital SLR cameras [10, 11]. Under a dim condition, the yellow fluorescent lines produced by it are recorded in detail by a digital SLR camera, and the fingermark lines and other related details are fixed in the form of photographs (Fig. 3).

Fig. 3. Illustration for the development of fingermarks by Fe3O4@Pt@PE

3 Conclusion It is known from the above that the magnetism-fluorescent Fe3O44@Pt@PE nanocomposite is a relatively novel latent fingermark display technology, which has the characteristics of high efficiency, convenience and greenness. It can effectively display the relevant details of the fingermarks. Compared with magnetic powder, the fluorescence properties of fingermarks can show better effect on the development of fingermarks of impermeable objects. The Fe3O4@Pt@PE nano-composite is a new kind of nano-material mechanism system, which plays an important role in the scientific field. Acknowledgments. University key laboratory of evidence identification open project, Shandong Province [Project No. KFKT(SUPL)-201404]. This study was supported by the Research Project of Shandong University of Political Science and Law [Project No. 201713B]. Supported by Program for Young Innovative Research Team in Shan Dong University of Political Science and Law.

Preparation of Multifunctional Nano-composite

13

References 1. Huang, R., Liu, R.: Preparation of platinum nanoclusters and their application in sweat latent fingerprint display. Crim. Technol. 42(01), 35–39 (2017) 2. Huang, R., Chen, H.: Preparation of multifunctional nano-composite and its application to sweat latent fingerprints. Crim. Technol. 42(04), 277–282 (2017) 3. Huang, R., Chen, H.: High-efficient green preparation of gold nanoclusters and their display of sweat latent fingerprints. J. People’s Public Secur. Univ. China (Nat. Sci. Ed.) 23(02), 01–06 (2017) 4. Fang, Y., Sha, W.: Research on progress of sweat latent fingerprint display technology. Crim. Technol. 40(03), 236–239 (2015) 5. Sha, W., Fang, Y.: Paper sweat latent fingerprint display technology – new 1,2-indene diketone-based bifunctional reagent. Crim. Technol. 41(03), 232–235 (2016) 6. Yanlei, Chen, H.: Preparation of PEI-Fe3O4 magnetic nanoparticles and their application in latent fingerprint display. J. People’s Public Secur. Univ. China (Nat. Sci. Ed.) 23(03), 19–25 (2017) 7. Wang, M.: Preparation of LaF3:Eu, Tb fluorescent nano-powder and its application in fingerprint display. J. China Crim. Police Coll. 02, 56–58 (2015) 8. Zhang, L., Zhang, D., Zhang, Z., et al.: Surface modification of three oxidation two aluminum nanoparticles suspension to reveal sweat latent fingerprints. Crim. Technol. 41(03), 200–202 (2016) 9. Wang, M.: Synthesis of YVO4:Eu nanofluorescent material and its application in fingerprint display. Spectrosc. Spectral Anal. 06, 1601–1605 (2015) 10. He, Z., Zhang, J.: Study on method of latent fingerprint display of sweat on wet surface. J. Henan Judicial Police Vocat. Coll. 14(03), 99–102 (2016) 11. Yu, Y., Yanlei: Green synthesis of Fe3O4 magnetic nanomaterials and its application in latent fingerprint. Crim. Technol. (01), 57–61 (2016)

The Application of Industrial Robot Technology in the Teaching of Applied Undergraduate Colleges and Universities Yongcheng Huang, Xianming Wu, Bin Yang(&), and Zhiyong Li Guang Dong Polytechnic College, Zhaoqing 526100, China {823044553,516254515,1016635807,8287293}@qq.com

Abstract. In order to respond to the trend of the times and follow the pace of advanced science and technology, the application of robots is no longer the exclusive of one person. Industrial robots are widely used in the field of manufacturing industry. At the same time, colleges and universities are also carrying out related teaching of industrial robots. According to the training plan of Applied Undergraduate talents, a series of explorations have been carried out in teaching content, teaching methods and practical links based on this course. It not only improves the teaching effect, but also stimulates students’ interest in learning. At the same time, it cultivates innovative thinking and greatly improves students’ comprehensive quality. This paper is based on HD1XKB Industrial Robot Training Platform by using basic module or student selfmodeling module. This kind of robot training system can complete the basic skill training task of industrial robot programming teaching course. This training system makes the students’ skill training time longer, the safety of skill training higher, and also exercises the students’ three-dimensional drawing. And so on comprehensive application ability. Keywords: Industrial robot Training system

 Applied undergraduate course  HD1XKB 

1 Introduction Since Germany put forward industrial 4.0 in 2013, the United States and Japan have also put forward corresponding manufacturing strategy ideas, China put forward “Made in China 2025” in 2015. In 2015, China made an important strategic decision to build world-class universities and first-class disciplines. It clearly pointed out that colleges and universities should focus on training innovative, applied and compound talents with a sense of historical mission and social responsibility and innovative spirit and practical ability. In order to cope with the current scientific and technological revolution, industrial transformation and rapid development of the new economy, accelerate the pace of higher education reform and development, and conform to the trend of the times, the Ministry of Education of China needs engineering technological innovation and industrial innovation talents with engineering design, engineering practice,

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 14–20, 2020. https://doi.org/10.1007/978-3-030-25128-4_3

The Application of Industrial Robot Technology in the Teaching

15

innovative thinking and digital thinking abilities [1, 2]. With the drive of social trend, industrial robots are widely used nowadays. Colleges and universities have carried out industrial robots related teaching, but also a lot of training equipment. However, the existing equipment has two problems in varying degrees: 1. Poor versatility, only suitable for an industrial robot; 2. Improper primary and secondary allocation, the proportion of learning other automation equipment in teaching is larger than that of industrial robots. Therefore, this paper adopts modular design, focusing on the flexible design of modules for practical training and assessment of related skills of industrial robots, to meet the flexible and diverse needs of robot training teaching and assessment, the key is to exercise students’ comprehensive application ability [2]. The emphasis of this course is on engineering application. In the process of teaching, we should pay attention to the systematicness and completeness of project training in order to enhance students’ practical ability. In order to understand the frontier knowledge of industrial robotics industry and expand the knowledge of students, on the basis of textbooks, we will pay close attention to the technical trends of various industrial robots and the related content of various robot competitions, enriching the knowledge of this course. Enhance curriculum interest, academic challenges, grasp the core quality of new subject talents, so as to promote the all-round development of students. The teaching content is shown in Fig. 1.

Fig. 1. Teaching content

2 Dynamics Analysis of Industrial Robot 2.1

Establishment of Industrial Robot Dynamics Model

This paper adopts ABB Robotics’ latest six-axis industrial robot. Six-axis calibration is shown in Fig. 2. It is also the smallest multi-purpose industrial robot ever launched by ABB, which is compact, agile and lightweight. It weighs only 25 kg, loads 3 kg, and has a maximum working stroke of 580 mm. The pickup distance under the base is 112 mm. It is designed for the 3C industry using flexible automation based on robots [3].

16

Y. Huang et al.

Fig. 2. IRB120 six-axis calibration

2.2

Dynamics Equation Structure of Vertical Arm

Neglecting some details of the equation can conveniently express the dynamic equation of the vertical arm. When the Newton-Euler equation is used to analyze the vertical arm, the dynamic equation can be written as follows: € þ VðH; HÞ _ þ GðHÞ s ¼ MðHÞH

ð1:1Þ

_ is n  1 Centrifugal In style M(H) Mass Matrix for n  n Vertical Arm, VðH; HÞ Force and Coriolis Force Vector, G(H) is n  1 Gravity vector. The above equation is _ called state space equation. Because of the formula (1.1), Vector in VðH; HÞ Depending on position and speed M(H) and G(H). The elements are all about the _ are all position of all the joints in the vertical arm. H complex function. But VðH; HÞ _ about H and H complex function. _ in the dynamic equation is written in another form as The velocity term VðH; HÞ follows. € þ BðHÞ½H _ H _ þ CðHÞ½H _ 2  þ GðHÞ s ¼ MðHÞH

ð1:2Þ

In the formula B(H), n  nðn  1Þ/2 the Coriolis force coefficient matrix of the _ H _ is nðn  1Þ/2  1 the joint velocity product vector of the order. order ½H _ H _ ¼ ½h_ 1 h_ 2 h_ 1 h_ 3 . . . h_ n1 h_ n T ½H

ð1:3Þ

The Application of Industrial Robot Technology in the Teaching

17

_ 2  is n  1 C(H) It is a matrix n  n of order centrifugal force coefficients, but ½H Order vector 2 2 2 ½h_ 1 h_ 2 . . .h_ n T

ð1:4Þ

(1.2) is called the form-position space equation because its coefficient matrix is only a function of the position of the vertical arm. In this form of dynamic equation, the computational complexity is reflected in the way of calculating various parameters, which are only functions of the position of the vertical arm H. In application, it is important to keep the dynamic equation updated with the movement of the vertical arm [4–10].

3 Establishment of Training Hardware System 3.1

Establishment of Module

In order to enable students to recognize the motion between the axes of the robot more directly, the virtual platform is used for programming learning. In this paper, the ABB Robotics IRB120 robot is used. Students can build modules in the three-dimensional drawing software according to their needs. In this case, the basic modules are built in proe5.0, as shown in Fig. 3. The training platform adopts HD1XKB industrial robot skill assessment training platform. As shown in Fig. 4, the triangle shown in Fig. 5 is followed by automatic path generation method.

Fig. 3. Basic module

3.2

Fig. 4. Training system

Fig. 5. Triangle

Construction of Training System

The established HD1XKB training platform is imported into Robotics and placed on the horizontal platform. The IRB120 manipulator arm in ABB model library is imported into the system and placed in the middle of HD1XKB training platform; the tool laser engraving is imported into the system and the tool is installed on the flange;

18

Y. Huang et al.

the established basic module is imported into the system and placed on the workspace 3 of the horizontal platform. 3.3

Settings of Relevant Parameters

FlexPendant is used to teach the robot. Before teaching, we need to create a system for the robot, and then determine the position of four points of P10, P20, P30 and P40. We use the modified position of the teaching device to determine the position. P10 is the starting point, P20 is the starting point of the triangle, P30, P40 is the inflection point of the other two sides of the triangle. The other parameters should be default as shown in Fig. 5.

4 Path Generation, Simulation and Practice There are two ways to write programs: The first is to create target points and instructions through path assignment and instruction function; the second is to write programs and modify location points through the program editor in the virtual teaching device of FlexPendant. In this paper, the first method is used to specify the path. The generated target points and paths are shown in Fig. 6. After the input of the program, they enter the debugging interface for debugging and modification. The final simulation results fully follow the predetermined point motion, including joint motion and linear motion. Finally, the correct simulation program is loaded into the robot, which greatly improves the students’ interest. The practice is shown in Fig. 7.

Fig. 6. Automatic path generation

The Application of Industrial Robot Technology in the Teaching

19

Fig. 7. Practice

5 Conclusion Based on HD1XKB industrial robot skill training platform, modular training can be carried out on the training platform. Modules can be built according to learning requirements. Besides the above basic modules, laser engraving, workpiece welding, handling module and asynchronous conveyor belt module can also be learned. Besides manual programming, the program can also be generated through automatic path. By using the method of combining virtual with real, students’ interest in learning is stimulated, and their ability of three-dimensional drawing and robot programming is improved comprehensively. Acknowledgements. Guangdong Institute of Polytechnic innovation project in 2017 (GKJ2017014), Education and teaching reform fund of Guangdong province (2015770), Reform and research of PLC application technology course in Guangdong Polytechnic (JXGG2017033). 2016 Guangdong Provincial Talent Training Model Innovation Experimental Zone Project (30), 2016 Guangdong Polytechnic Institute Talent Training Model Innovation Experimental Zone Project (CXSY2016001), New Research and Practice Projects of Guangdong Province in 2017 (39), Teaching Quality and Reform Project of Guangdong Institute of Technology (JPKC2016003).

References 1. Li, Y., Li, B.: Industrial Robot Application Technology-Based on ABB Robot IRB120. Harbin Institute of Technology Press, Harbin (2018) 2. Bao, Y., Li, H., et al.: Exploration and practice of serving experimental teaching with selfmade instruments under the background of “new subject”. Exp. Technol. Manag. 9, 239–242 (2018) 3. Yu, C.: Exploration on teaching reform of industrial robot technology. Technol. Wind 8, 54 (2017) 4. Xu, H., Li, J.: Design of industrial robot training module based on STM32. Mech. Eng. 9, 54–58 (2018)

20

Y. Huang et al.

5. Yang, Y., Pan, S.: Dynamic analysis of three DOF industrial robot. Manuf. Autom. 9, 51–53 (2018) 6. Guo, L.: Upgrading and reforming the training room of mechanical and electrical specialty under the background of intelligent manufacturing. Exp. Technol. Manag. 9, 158–161 (2018) 7. Zheng, F., Ji, F.: Exploration on the teaching reform of robot technology course from the perspective of applied talents training: a case study of machinery design, manufacturing and automation major in Sanming University. J. Yulin Coll. 2, 86–88 (2016) 8. Zheng, H.: Analysis of mechanical structure design method in current industrial robot applications. South Agric. Mach. 16, 43 (2018) 9. Wang, G., Ye, W., et al.: Discussion on knowledge construction and training method of practical talents in robot industry under the background of new science. Mech. Electr. Eng. Technol. (8), 25–30 (2018) 10. Han, X., Ma, Y., et al.: Exploration on the curriculum reform of “application technology of FPGA/CPLD” under the background of new subject. Wirel. Interconnect. Technol. (9), 99– 107 (2018)

Modeling and Simulation of Proximity Explosion Damage Probability for Anti-radiation Missile Laser Fuze Song Gao(&), Qiang Cui, and Chao Ma Air Force Logistics College, Xuzhou 221000, China [email protected]

Abstract. When an air-to-ground anti-radiation demolishing missile flies over a target, the fuse will be ignited according to how the missile and the target intersected. A single-shot missile damage probability model is set up in the paper, and the attacks at three types of typical radar are simulated and analyzed. The results show that proximity explosion is better than contact fuse in terms of single-shot damage probability. Keywords: Anti-radiation demolishing missile  Overfly proximity explosion  Damage probability  Simulation model

Anti-radiation missile (ARM) is a missile that uses the energy radiation source to passively find and attack the radar and its carrier. By combating various types of surface-to-air missile guidance radars, artillery aiming radars, early warning radars and meteorological radars, ARM suppresses enemy air defense weapon systems and early warning command systems. It is an important electronic warfare weapon [1]. This paper takes the air-ground anti-radiation missile, which is mainly based on blasting damage and supplemented by fragment killing, as the research object.

1 Basic Idea of “Overfly Proximity Explosion” [2] When a blasting anti-radiation missile uses a trigger fuze to detonate, most of the missile’s explosion point is behind the target, and the center of the equiprobability ellipse is mostly behind the vehicle body, as shown in Fig. 1, which is to some extent, the effect of missile damage is greatly reduced. Therefore, it is necessary to control the position of explosion point to improve the damage effect. The basic idea of “overfly proximity explosion” is that the missile is equipped with both a trigger fuze and a proximity fuze (for example, a laser proximity fuze). When the missile flies over the target, the proximity fuze detonates at the miss distance through detecting and identifying the target, and when the proximity fuze does not detect the target, the trigger fuze detonates.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 21–27, 2020. https://doi.org/10.1007/978-3-030-25128-4_4

22

S. Gao et al.

2 The Spread of Missile Explosion Points Based on the “overfly proximity explosion” detonation method, the target damage form can be divided into three types: damage of direct hit, explosion damage of colliding ground and damage of proximity explosion [3]. Determine the missile fuse initiation surface as shown in Fig. 2. h is the detection angle of laser proximity fuze, the effective proximity explosion damage area is a shadow space area which is bounded by laser rays on both sides and the circle which taking radar antenna feed point as the center, taking effective damage distance as the radius. The explosion damage area of colliding ground locates at outside the range of laser detection on both sides of the target and the front of target.

The ballistic direction

The target plane y

(y , z)

z

O (X , Y)

ω

h

X

O1

Y

The dispersion area of triggered explosion point on the ground

Fig. 1. Sketch map of triggered detonation

Fig. 2. Explosion points distribution area of overfly proximity explosion (along the ballistic view)

3 Damage Calculation Model of Ground Radar Targets The damage effect of the radar target below only considers the blasting damage. 3.1

Model Assumptions [4]

(1) The axis of the laser transceiver optical mirror is perpendicular to the missile axis. When the missile flies over the target, the fuze can reliably identifies, only the situation of scanning radar car body is considered. Regardless of the angle of attack and the roll angle of the missile, that is, at the end of the ballistic, the missile axis coincides with the ballistics; (2) Assume that the missile and radar antenna feed points are on the same plane perpendicular to the ground, the fuse start surface is the fuze initiating surface; (3) Through comprehensive analysis of various ground-based radar systems, it can be summarized into three typical radar target types [5], and both are “vulnerable targets”. The damage degree of three typical radar targets is c-class, as shown in Table 1.

Modeling and Simulation of Proximity Explosion Damage Probability

23

Table 1. Maximum effective blasting damage radius of c-class Radar name Radar-1 Radar-2 Radar-3

3.2

Ground explosion R (m) Air explosion r (m) 11.0 9.0 12.5 10.5 11.0 9.0

Target Model

The simplification of the radar target is shown in Fig. 3. It consists of two parts: the radar body and the antenna. The car body is simplified to cuboid. The ground projection point of the geometric center of the car body is the coordinate origin point, and the ground coordinate system is established parallel to the length of the car body as the X axis. The length, width and height of the radar body are A, B, C, respectively, the height of radar antenna center (feed point) is h, and the target plane coordinate system is established with the antenna center as the origin (the target plane is perpendicular to the ballistic B direction) [6]. The equations of each plane are: X ¼  A 2 , Y ¼  2 , Z = 0 or C. 3.3

The Equation of Terminal Ballistic

The Equation of terminal ballistic is determined by the attack direction and the guidance error. The attack angle is synthesized by the azimuth angle k and the incidence angle x; the guidance error obeys the normal distribution, and its parameters are determined by the circular error probability CEP. The azimuth angle k is a random number sample uniformly distributed between (0, 2p). In the actual terminal ballistic, the incidence angle x is between (20°, 40°), then the direction vector of the random ballistic is: (cos x cos k; cos x sin k;  sin x) [7]. The center of antenna is determined as the aiming point, the random ballistic is perpendicular to the antenna plane, and the yoz plane is the target plane. The intersection of the ballistic line and the target plane is (y, z), and y and z are respectively normal distribution random number sampling under the condition of l = 0, ry ,rz . ry ,rz are respectively the standard deviation of the guidance error in the horizontal and longitudinal, determined by the circular error probability CEP [8]: ry = rz = CEP/1:1774

ð1Þ

Through angle transformation of the intercept point coordinates, you can get the representation of the intercept point coordinates in the ground coordinate system: X1 ¼ y sin x cos k þ z sin k, Y1 ¼ y sin x sin k  z cos k, Z1 ¼ h þ y cos x. The ballistic equation: X  X1 Y  Y1 Z  Z1 ¼ ¼ cos x cos k cos x sin k  sin x

ð2Þ

24

3.4

S. Gao et al.

Damage Conditions of Overfly Proximity Explosion

The intersection of the ballistic line and the intercepting section is the explosion point, and x, y, and z are the coordinates of the explosion point. 1. Damage Conditions of Proximity Explosion [9] As shown in Fig. 2, point G is the laser beam intersection (0, 0,  L2 cot h2), point O is the antenna feed point (0, 0, h), the intersection of the ballistic line and the detonation surface is (X, Y, Z). When the intersection meets the conditions at the same time: (1) z  C; (2) X2 þ Y2 þ ðZ  hÞ2  r2 ; Z þ L2 coth2 ffi  h2, Pi = 1. (3) When arccos qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 X2 þ Y2 þ ðZ þ L2 coth2Þ 2. Damage Conditions of Triggered Explosion B B (1) When jXj  A 2 and jYj [ 2 , if jYj  2  R, Pi ¼ 1. A A (2) When jYj  B 2 and jXj [ 2 , if jXj  2  R , Pi = 1. (3) When jXj  A and jYj  B, P = 1. 2

2

i

B (4) When jXj [ A 2 and jYj [ 2 , the minimum value of the distance from radar car body is less than or equal to R, Pi = 1. The damage probability of overfly proximity explosion includes two parts: proximity explosion and triggered explosion. The value is: P P¼

Pi M

ð3Þ

In the formula: Pi is a simulation result, M is the total number of simulations [10].

4 Simulation and Analysis Taking a certain type of air-to-ground anti-radiation demolishing missile attacking the typical radar target as an example. The target parameters are shown in Table 1. The circular error probability (guide precision) is 5 m, and the detection angle of proximity fuze is 100°. The method of Monte-Carlo is used to simulate. The relationship between the incidence angle and damage probability is obtained, as shown in Fig. 4. Taking Radar-2 as an example, the relationship between the height of antenna feed point and damage probability is shown in Fig. 5. Figure 6 is a comparison of the damage probability between triggered explosion and overfly proximity explosion when missile attacks three types of typical radar targets.

Modeling and Simulation of Proximity Explosion Damage Probability

25

Z The target plane y,z

y

z

Feed point Incident ballistic of missile h

C X λ

ω

B A

Y

Radar car body

The ground coordinate system

Fig. 3. Sketch map of terminal ballist

Fig. 5. Relationship between overfly proximity explosion damage probability and the height of feed point (Radar-2)

Fig. 4. Curve of overfly proximity explosion damage probability varying with the incident angle

Fig. 6. Comparison of the damage probability between triggered explosion and overfly proximity explosion

The damage probability of overfly proximity explosion is related to the azimuth angle, target size, incidence angle, and the height of feed point. The damage probability of overfly proximity explosion is different when the azimuth angle, the target size, and the damage criterion is different. It can be seen from the simulation results, as shown in Fig. 4, when other conditions are constant, within a certain range, as the incidence angle increases, the damage probability generally increases. This is mainly because when the incidence angle is small, the triggered explosion point and the proximity explosion point are generally far away from the target, so that the blasting effect cannot fully act on the target. At the

26

S. Gao et al.

same time, it can be seen from the figure. that the damage probability is also related to the size of target and the height of antenna feed point. As shown in Fig. 5, when the other conditions are constant, within a certain range, as the height of radar antenna feed point increases, the damage probability of overfly proximity explosion gradually decreases. The reason is that when the height of feed point is high, the missile trajectory spread far away from the radar target. When the triggered explosion is used, the explosion point is relatively far away from the target, and thus the blasting effect cannot fully act on the target. For the three types of typical radar target, as shown in Fig. 6, the comparison of the damage probability between triggered explosion and overfly proximity explosion. It can be seen that the fuze-warhead cooperation mode of overfly proximity explosion greatly improves the damage probability of single-shot missile. Especially when the incidence angle is small, the effect is more obvious. This is because it adds the proximity explosion function when the missile flies over the target. It is equivalent to add proximity explosion damage effect on the basis of triggered explosion.

5 Conclusion In this paper, a new mode of fuze-warhead cooperation (overfly proximity explosion) is modeled and simulated aiming at air-to-ground anti-radiation demolishing missile. It is analyzed from the incidence angle and the height of radar antenna feed point taking three types of typical radar targets as examples. It can be seen from the simulation results that this fuze-warhead cooperation can effectively improve the damage probability of the air-to-ground anti-radiation missile, especially when the high and low angle of terminal ballistic is small and the antenna of target is high.

References 1. Qu, C., Chen, T.: Air Launched Anti-Radiation Missile Technology. National Defense Industry Press, Beijing (2010). (in Chinese) 2. Zhu, D., Li, Y., Zeng, J.: Fuze-warhead coordination for air to ground anti-radiation missile of demolition warhead. J. Ballist. 19(2), 21–24 (2007). (in Chinese) 3. Ma, D., Shen, J., Zhang, Z.: Study on damage effects of explosive arm to typical radar target. Ordnance Indus. Autom. 30(11), 9–11 (2011). (in Chinese) 4. Zhang, Z., Ma, D., Zhu, D.: The study on adaptive detonation strategy for anti-radiation missile. J. Proj. Rockets Missiles Guid. 34(3), 91–94 (2014). (in Chinese) 5. Zhang, Z., Ma, D., Zhu, D.: The study on fuze and warhead matching on missile with blast warhead anti-radiation attacking radar position. J. Proj. Rockets Missiles Guid. 33(4), 99– 101 (2013). (in Chinese) 6. Ding, L., Geng, F., Chen, J.: Radar Theories. Publishing House of Electronics Industry, Beijing (2011). (in Chinese) 7. Gu, L., Wen, B.: Missile General Design Principles. Northwestern Polytechnical University Publishing House, Xi’an (2004). (in Chinese)

Modeling and Simulation of Proximity Explosion Damage Probability

27

8. Zhang, Z., Ma, D., Zhu, D.: Fuze-warhead matching for air-to-ground anti-radiation missile with blast warhead. J. Ballist. 24(3), 31–35 (2012). (in Chinese) 9. Zhu, D., Zhang, Z., Wang, W.: Target recognition method of laser proximity fuze for antiradiation missile. J. Proj. Rockets Missiles Guid. 35(3), 75–78 (2015). (in Chinese) 10. Zhang, Z., Ma, D., Zhu, D.: Research on proximity fuze starting strategy based on angle measured by anti-radiation missile seeker. J. Ballist. 25(2), 85–88 (2013). (in Chinese)

Analysis and Research on Distance Transmission Characteristics of Electric Vehicle EPRT System Hehui Tang, Lixin Lu, and Guiqin Li(&) School of Mechatronics Engineering and Automation, Shanghai University, Shanghai, China [email protected], [email protected]

Abstract. The distance transmission characteristic of electric vehicle ERPT system circuit is one of the most important systems. And the distance, between the vehicle receiving end and the ground transmitting end, directly affects the availability and marketization of the charging circuit. Therefore, it is necessary to study the distance characteristics in electric Car wireless charging system. In this paper, we study the distance transmission characteristics of electric vehicle ERPT system circuit by taking into account the relationship between the electrical parameters of the circuit and the horizontal distance, as well as vertical distance among the coils. With the constant voltage, power and load are regarded as the rated parameters, the Matlab/Simulink model is used for simulation analysis to verify the characteristic relationship between distance and system transmission efficiency. What’s more, we also studies the system frequency, the coil’s own parameters and the size of the capacitor. Totally, the importance of the distance characteristics is verified by analyzing these parameters, and lay a theoretical basis for future optimization programs. Keywords: Wireless charging  Distance characteristic coil Matlab Simulink model  Transmission efficiency



1 Introduction The core of the low-carbon economy is the application of new energy technologies and energy-saving emission reduction technologies. An important manifestation of the green revolution can be regarded as green transportation. Therefore, under this market economy system, electric vehicles (EVs) Wireless charging [1] emerges as the times require. Electric vehicles can solve the problem of vehicle emission pollution and energy shortage. However, due to the limitation of power battery capacity, the current driving range of electric vehicles is relatively short. The construction problem of battery charging stations has become a constraint on EV application. Domestic and international research on this aspect, Wang [2] put forward that electric vehicle was charged by the mode of magnetically coupled resonance, Leemput [3] investigates the combined low voltage (LV) and medium voltage (MV) residential grid impact for slow and fast electric vehicle (EV) charging, Nazarloo [4] proposes a method for achieving the following objectivest to improvement the voltage profile of the point of common © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 28–35, 2020. https://doi.org/10.1007/978-3-030-25128-4_5

Analysis and Research on Distance Transmission Characteristics

29

coupling (PCC), however, the current transmission power is still relatively small (about 1 kW). It is planned to enter the market from the scope of use of forklifts along with the improvement of technology maturity and transmission power. It is also expected to enter the field of electric vehicle charging soon [5], Jiang [6] put forward the power of the quick-charging pile with multiple power output interfaces is used to provide a synchronous charging service for EVs waiting in the queue, Xu [7]. Analysis and verification of natural frequency of non-overlapping multi-layer fiber reinforced composite beams. In this paper, with regard to the distance characteristics between the main and auxiliary coils of the ERPT system of electric vehicles, we study the system frequency, coil parameters and capacitance; simulate the experimental data. Finally, we concludes the paper and points out the further work.

2 Factors Affecting Transmission Distance of Electric Vehicle EPRT System Based on the distance characteristics between the main and auxiliary coils of the ERPT system of electric vehicles, this paper studies the system frequency, the parameters of the coil, the size of the capacitor, etc. By analyzing these parameters to verify the importance of the distance characteristics. 2.1

Coil Frequency Influence on System Transmission Distance

In the electric vehicle ERPT system, the external condition that has the greatest influence on the transmission characteristics is the alternating magnetic field strength. It can be determined from theoretical knowledge that the magnitude of the magnetic field depends on how fast the current changes around it. However, the magnitude of the driving frequency directly affects the current variation. It can be seen that we have a deeper charge for this form of wireless charging, level understanding and mastery by analyzing the natural frequency. Therefore, this simulation selects three different frequency coils and analyzes the influence of natural frequency on ERPT distance through simulation of three coils. The parameters of the three coils are shown in Table 1. Simulate the distance characteristics of the above three sets of coils; calculate the experimental data as shown in Table 2. By simulating the above test results and plotting the received voltage-wire diameter relationship curve, it is obtained as shown in Fig. 1. Table 1. Coil and circuit parameters Coil parameter 1 2 3

Wire diameter/mm 8 8 8

Coil diameter/cm 54 54 54

Series inductance/lH 112 124 135

Series capacitor/lF 0.57 0.53 0.48

Resonant frequency/kHz 85 125 145

30

H. Tang et al. Table 2. Receiver voltage analog test data Transmission distance/mm Receiving voltage/V Coil 1 Coil 2 Coil 3 110 401 391 365 120 415 403 368 130 422 411 370 140 425 414 366 150 421 405 365 160 410 386 364 170 386 373 362 180 357 357 357 190 337 348 354 200 321 336 352

2.2

Effect of Coil Diameter on Transmission Distance

The change of the coil parameters directly affects the magnitude of the system frequency. The coil diameter is an important parameter affecting the characteristics of the coil. Therefore, this section mainly considers the influence of the coil diameter on the distance transmission characteristics of the ERPLT system. In the simulation experiment, three different diameter coils were used, and the coil parameters were as shown in Table 3. The simulation data of the above different coil diameters were simulated to obtain the experimental data as shown in Table 4. According to the above simulation data, the characteristic curve of the receiving voltage and the transmission distance as shown in Fig. 2. Table 3. Coil parameters and their circuit parameters Coil parameter 1 2 3

Wire diameter/mm 8 8.5 10

Coil diameter/cm 54 54 54

Series inductance/lH 135 124 112

Series capacitor/lF 0.48 0.53 0.57

Resonant frequency/kHz 85 85 85

Table 4. Simulation experimental data for coils of different diameters Transmission distance/cm Receiving voltage/V Coil 1 Coil 2 Coil 3 10 414 417 419 12 420 421 422 14 422 422 423 16 415 416 419 18 406 407 410 20 394 398 404

Analysis and Research on Distance Transmission Characteristics

2.3

31

The Influence of Capacitance Parameters on Transmission Distance

The capacitor, which size is related to the working state of the entire resonant system network, is used to store the energy of the electric field. The distance transfer characteristics of ERPT varying with different capacitance parameters. The simulation parameters of this experiment are shown in Table 5. The energy transfer simulation experiments are carried out on the above circuits respectively. The experimental data obtained are shown in Table 6. According to the data in the table, the relationship between the voltage of the receiving coil and the transmission distance is plotted, as shown in Fig. 3. Table 5. Circuit simulation parameters Coil parameter 1 2 3

Coil diameter/cm 54 54 54

Wire diameter/mm 10 10 10

Series inductance/lH 130 130 130

Series capacitor/lF 0.53 0.74 0.95

Natural frequency/kHz 145 120 85

Table 6. Simulated experimental data Transmission distance/cm Receiving voltage/V Coil 1 Coil 2 Coil 3 10 414 417 419 12 420 421 422 14 422 422 423 16 415 416 419 18 406 407 410

The results of the reliability test in this paper are shown in follow figures.

Fig. 1. Receiver voltage-transmission distance characteristic curve

32

H. Tang et al.

Fig. 2. The relationship between the different diameter distance characteristics of the coil and the voltage

Fig. 3. The relationship between the distance and voltage of different capacitors

From the above simulation curve, it can be concluded that the parameters, such as inductance, capacitance, wire diameter and coil diameter, become important factors affecting the natural frequency variation of the system. When determining the system drive frequency, it is necessary to base the natural frequency of the coil. When the coil frequency [8] is equal to the system resonance frequency, the system can reach the optimal transmission state; when the system frequency can be optimally increased to achieve the optimal frequency, the system can produce the best energy.

3 Relationship Between Vertical and Vertical Spacing and Energy Transmission Efficiency of Primary and Secondary Coils 3.1

Vertical Distance Characteristic Mathematical Model

According to the study of the distance characteristics of the EPRT system, we use the launching board and the vehicle receiving board to simplify the main and auxiliary coils in order to verify the relationship between the energy transfer efficiency of the primary and secondary coils in different directions. Establishment and study of simulation models for Z-axis and X-axis, as shown in Fig. 4.

Analysis and Research on Distance Transmission Characteristics

33

Fig. 4. Vertical distribution between the on-board coil and the transmitting coil

According to principle of electromagnetic coupling, the following equations are established [9, 10]: l pN1 N2 r12 r22 M ¼ 0  ðr1 [ r2 Þ 2 r12 þ h2 3=2 P12 ¼ hjw1 Mi1 i2 i ¼

 jw1 M  I1 I2 ejðw1 w2 Þt þ I1 I2 ejðw1 w2 Þt 4

ð1Þ ð2Þ

jw2 M k12 ¼ pffiffiffiffiffiffiffiffiffiffi 2 L1 L2

ð3Þ

jw1 M k21 ¼ pffiffiffiffiffiffiffiffiffiffi 2 L1 L2

ð4Þ

Using the coupled mode formula to describe the equation of the magnetically coupled resonant system as: (

da1 ¼ j x a  s a þ k a þ s 1 1 1 1 12 2 dt da2 ¼ j x a  ðs þ s Þa þ k a 2 2 2 L 1 21 1 dt

ð5Þ

In the above formula, N1, N2 are the turns of the coils 1 and 2; r1, r2 is the radius of the coil; a1 is the amplitude positive frequency component of the resonant coil connected to the system power supply; a2 is the amplitude positive frequency component of the resonant coil connected to the system load; s1 ; s2 is the loss coefficient between the two resonant coils; s is the effect of system power on the resonant system; x1 ; x2 is Resonant frequency; sL is the load factor, indicating that the resistive load is used to consume the active power of the system; h is the height of the two coils; k12 ; k21 is the coupling coefficient between the coils; According to the formula (1), (2), (3), (4), (5), the distance between the coils and the system power can be obtained and Performing a simulation test on coil parameters 1, 2, 3. The results of the reliability test in this paper are shown in Table 7.

34

H. Tang et al. Table 7. Coil parameters 1, 2, 3 Coil parameter Voltage (V) Power (W) Frequency (kHz) Effectiveness (%) 1 330 3470 81.2 94.2 400 3490 81.0 92.8 440 3480 80.8 91.9 2 330 3355 84.9 93.8 400 3360 83.8 92.8 440 3354 83.4 91.9 3 330 3290 86.9 93.7 400 3310 84.6 93.5 440 3310 84.0 93.0

Performing simulation tests on the above three different coil parameters, Drawing the system voltage and tri-rate characteristics of the coil [11] at different vertical distances as shown in Figs. 5, 6, and 7.

Fig. 5. Voltage and tri-rate characteristics at z = 65 mm

Fig. 6. Voltage and tri-rate characteristics at z = 95 mm

Fig. 7. Voltage and tri-rate characteristics at z = 125 mm

Analysis and Research on Distance Transmission Characteristics

35

4 Conclusion In this paper, we clarify the factors affecting the transmission efficiency of electric vehicle EPRT systems from the perspective of complex systems. Through the simulation analysis of experimental data, it is concluded that the vertical distance and horizontal misalignment distance between the vehicle receiving board and the ground transmitting board of the electric vehicle affect the power and transmission efficiency of the wireless charging system under certain conditions such as frequency and coil. Moreover, the error between the experimental data and the simulated data is small, which proves the correctness of the conclusions of this paper. Because of the coil has a certain parameter. The energy loss and the transmission can be reduced only when the horizontal misalignment, between the vehicle receiving board and the ground transmitting board is zero. What’s more, the system reducing energy loss and the transmission efficiency can be improved when the vertical distance among the coils can reach the optimal parameter range.

References 1. Lu, W., Xu, S.: Wireless charging technology and its application in electric vehicles. Automob. Driv. Maint. (Maint. Ed.). (12), 110–111 (2018) 2. Wang, X., Zhang, H., Liu, Y.: Analysis on the efficiency of magnetic resonance coupling wireless charging for electric vehicles (2013) 3. Leemput, N., Geth, F., Van Roy, J., et al.: MV and LV residential grid impact of combined slow and fast charging of electric vehicles. Energies 8(3), 1760–1783 (2015) 4. Nazarloo, A., Feyzi, M.R., Sabahi, M., et al.: Improving voltage profile and optimal scheduling of vehicle to grid energy based on a new method. Adv. Electr. Comput. Eng. 18(1), 81–89 (2018) 5. Wang, R., Qu, W.: Wireless charging technology and its application in electric vehicles. Sci. Technol. Innov. Guide 29(1), 59 (2010) 6. Jiang, L., Hou, J., Chen, Z., Zhang, D.: Automatic image annotation based on decision tree machine learning. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. CyberC 2009 (2009) 7. Xu, Z., Li, H., Xue, P., Wen, B.: Analysis and verification of natural frequency of nonoverlapping multi-layer fiber reinforced composite beams. J. Northeast. Univ. (Nat. Sci.) 39(11), 1619–1623 (2018) 8. Lijuan, C., Xiaohui., X.: Intelligent Power Technology. China Electric Power Press, Beijing (2011) 9. Zhao, X.: Magnetic Components Volume. Liaoning Science and Technology Press (2002) 10. Liu, F.: Modern High Frequency Switching Power Supply Technology and Application, p. 1. Publishing House of Electronics Industry, Beijing (2008) 11. Chen, W.: Research on Key Technologies of Resonant Radio Energy Transmission System. Nanjing University of Aeronautics and Astronautics (2015)

Data Mining and Association Analysis of Irrational Use of Antibiotics in Outpatient Data of New Cooperative Medical System Qingshun Hu and Xiaoqiang Ren(&) Qilu University of Technology, No. 3501, Changqing University Road, Changqing Campus, Jinan City, Shandong Province, China [email protected]

Abstract. With the widespread use of antibiotics, bacterial resistance has become a focus of widespread attention in the world’s medical system. China is one of the largest use of antibiotics in the world. With the popularization of new cooperative medical system (NCMS), there are serious problems of excessive use of antibiotics in small rural medical institutions. Therefore, based on the NCMS data in a certain area, this paper analyzes the use of antibiotics in new rural cooperative clinics by using data mining algorithms. By correlating commonly used antibiotics with disease, the proportion of antibiotics found in this paper was 55.98%, much higher than the international average of 30%, and there was serious excess usage. Based on this paper, a series of improvement strategies were proposed to improve the management level of the medical system. Keywords: Antibiotics

 Bacterial resistance  Data mining

1 Introduction With the widespread use of antibiotics, bacterial resistance has become a focus of widespread attention in the world’s medical system. At present, the resistance of bacteria to antibiotics has gradually evolved from single-type resistance to multi-drug resistance, and these resistant bacteria, which have mainly appeared in hospitals, are spreading to the community in different ways [1, 2]. Bacterial resistance caused by the abuse of antibiotics can cause a series of problems for medical systems and public health security. From the regional perspective, in the use of antibiotics, developed countries are more cautious than developing countries, and developed regions are more cautious than developing regions; from the perspective of medical institutions, large medical institutions are more cautious than small medical institutions. China is one of the countries with the most serious abuse of antibiotics in the world [3]. The state has also introduced a series of policies to limit the abuse of antibiotics. However, with the gradual popularization of the NCMS, the number of small medical institutions located in rural areas has gradually increased. These institutions still have many problems in the use of antibiotics for various reasons. In previous years, domestic scholars have done relevant research on the NCMS data [6–15], in addition, other scholars also studied NCMS on specific case [16–18], but they did not do research on © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 36–42, 2020. https://doi.org/10.1007/978-3-030-25128-4_6

Data Mining and Association Analysis of Irrational Use

antibiotics for small clinics. antibiotics at will. Therefore, analyzes the specific use of cooperative medical clinic by 1.1

37

Especially in some common diseases, the usage of based on the NCMS data in a certain area, this paper antibiotics in the medical treatment of the new rural using data mining and other algorithms.

Data Situation

The data used in this paper is the disease information of the NCMS personnel in a certain region in a year. The data contains information about all insured persons in the area and the data has been desensitized. The NCMS data separates the hospital from the outpatient clinic. Compared with large and medium-sized hospitals, small community clinics are more relaxed in management and regulation, and some common diseases usually go to the small clinic, such as inflammation of the infection. Therefore, this paper focuses on the analysis of antibiotic use in the outpatient clinic during the NCMS. The basic situation of the data: The data used in this paper involves more than 450,000 outpatient records, 206 diseases, 312 outpatient clinics, and more than 2000 kinds of Chinese and Western medicines and auxiliary medicines. When in use, the data is classified and described as needed. 1.2

Statistics on Antibiotic Use

First, we count the use of drugs in the NCMS data for the year. The proportion of antibiotics used in clinics can be analyzed, when analyzing the recorded information, we cleaned up the data and removed the contents of Chinese herbal medicines, medical equipment, auxiliary medicines (sodium chloride, glucose, etc.) that are not related to this article. Finally, 910 outpatient drugs were obtained, with more than 1.45 million records of usage. Ranked by number of drug use, half of the top 20 are antibiotics, especially ceftriaxone and ribavirin, which have absolute advantages. The specific quantities are shown in Table 1: Antibiotics are marked in italics. Only the total number of antibiotics used in the table reached more than 420,000, which has exceeded 1/4 of the record of use. Table 1. Statistics of drug use in the new rural cooperative clinic Index 1 2 3 4 5 6 7 8 9 10

Drug name Ceftriaxone Ribavirin Dexamethasone Amikacin sulfate Vitamin C Levofloxacin Cephalexin Vitamin B6 Dexamethasone acetate Compound paracetamol

Quantity 128285 113770 66165 56359 53277 52946 47789 47043 36521 36330 (continued)

38

Q. Hu and X. Ren Table 1. (continued) Index 11 12 13 14 15 16 17 18 19 20

Drug name Quantity Penicillin 33773 Azithromycin 29800 Amoxicillin 26438 Metronidazole 25024 Cefradine 21748 Qingkailing injection 20415 Qingkailing injection 19510 Troxerutin 17243 Aspirin 16792 Compound licorice tablets 16440

The above statistics are based on the number of all drugs in the outpatient prescription. In actual medical treatment, the doctor’s prescription is often used in combination with a variety of drugs. If the statistics on the use of antibiotics in the outpatient prescription are counted according to the disease diagnosis and treatment, the proportion of antibiotics used is much larger. At the same time, doctor will use different antibiotics for different diseases. In order to better analyze the use of antibiotics in the diagnosis of specific diseases by doctors in outpatient clinics, we need association rules mining to obtain more information. In view of the large number of antibiotics, we classify the antibiotics in Table 1 as common antibiotics as a single item, and select some common diseases for association analysis. The diagnostic records and analysis results of the most common diseases are shown in Table 2: Table 2. Results of association analysis between new rural cooperative outpatient diseases and antibiotics Sick_name Upper respiratory tract infection Acute nasopharyngitis (common cold) High blood pressure Gastritis Coronary heart disease Acute pharyngitis, laryngitis, tonsillitis Cerebrovascular disease Acute and chronic gastroenteritis Cerebral infarction Rheumatoid arthritis Gynecological diseases Influenza Diabetes

Records 109435 85402 40321 24745 17493 16178 13929 12708 10272 9776 9469 8267 7838

Antibiotic 87287 66785 2531 8708 1751 12266 1508 8167 672 1679 5542 6488 405

Support 0.221 0.169 0.006 0.022 0.004 0.031 0.004 0.021 0.002 0.004 0.014 0.016 0.001

Confidence 79.76% 78.20% 6.28% 35.19% 10.01% 75.82% 10.83% 64.27% 6.54% 17.17% 58.53% 78.48% 5.17% (continued)

Data Mining and Association Analysis of Irrational Use

39

Table 2. (continued) Sick_name Tonsil Pneumonia Bronchitis Other sports diseases Disc disease Typhoid fever and typhoid fever Insufficient blood supply to the vertebral pedicle

Records 6259 5901 3909 3900 3111 3030 2847

Antibiotic 5749 5618 3234 701 465 999 453

Support 0.015 0.014 0.008 0.002 0.001 0.003 0.001

Confidence 91.85% 95.20% 82.73% 17.97% 14.95% 32.97% 15.91%

From Table 2, we can see that due to the large amount of disease data and uneven distribution, the support for most of the associated analysis results is generally low, but for some diseases, the confidence level of antibiotic use is above 80%, has a high correlation. The same is true for medical insurance data. Specific drugs are associated with specific diseases. In terms of overall analysis, the support may be lower, but the confidence will be higher. Therefore, in the analysis process, in order to avoid missing some small and important rules, we need to set the support threshold lower. For example, in the results of Table 1, the support between pneumonia disease and antibiotics is only 0.014, but the confidence level reached 95.2%. That is to say, in the outpatient treatment of pneumonia, almost all doctors have prescribed antibiotics, and the hidden information has positive significance for further analysis of the diagnosis and treatment of pneumonia and the rational use of antibiotics. From the results of data mining, especially the level of confidence, it can be found that in certain diseases, especially in some infections and inflammatory diseases, the proportion of antibiotics contained in the prescription is relatively high, basically exceeding the ratio of 70%. At the same time, even in the case of diseases that do not require the use of antibiotics, there is a 5% to 15% utilization rate. This contain a lot of unreasonable use inevitably, such as the common “upper respiratory tract infection” disease, the proportion of its use reached 79.76%. But in 2001, a study in the United States showed that about 55% of treatments for upper respiratory tract infections did not require the use of antibiotics [4]. On the whole, the proportion of antibiotics in the above prescriptions is 55.98%, which is still very high compared to the international average of 30% [5]. Through these analyses, we can be clear that the abuse of antibiotics is a serious and widespread phenomenon in the outpatient treatment of NCMS. That will be an issue of concern for the government!

2 Association Analysis of Antibiotics Combined Drugs In addition to the excessive use of antibiotics, The collocation between antibiotics, the collocation between antibiotics and other drugs exist unreasonable. For the association of drugs with a large amount of antibiotics, we can find information on drugs used in

40

Q. Hu and X. Ren

combination with antibiotics, by analyzing the results of association rules mining, so as to provide a basis for judging whether antibiotics are used reasonably. In the choice of disease, we selected pneumonia as an analysis sample, the sample contains 5901 records, the support level of the association rule is set to 0.1, after execute the association rule mining algorithm on the sample data,, the frequent set obtained is shown in Table 3: Table 3. Results of association analysis of outpatient prescriptions for pneumonia Associated item Ceftriaxone ribavirin Ceftriaxone dexamethasone Ribavirin dexamethasone Ceftriaxone dihydroxypropyl theophylline Dexamethasone dihydroxypropyl theophylline Ceftriaxone azithromycin Ribavirin dihydroxypropyl theophylline Ceftriaxone levofloxacin Ribavirin penicillin Ceftriaxone ambroxol injection Ceftriaxone ribavirin dexamethasone Ceftriaxone dexamethasonen dihydroxypropyl theophylline Ceftriaxone ribavirin dihydroxypropyl theophylline

Frequent item Support 1944 0.33 1482 0.25 1232 0.21 939 0.16 848 0.14 746 0.13 729 0.12 711 0.12 686 0.12 662 0.11 1023 0.17 725 0.12 650 0.11

From the analysis results, we can see that in the new rural cooperative clinic, the combination of antibiotics and other drugs is more common in the prescription of pneumonia. The most common combination is the use of ceftriaxone antibiotic combined with ribavirin. However, in the guidance of the use of ceftriaxone, the description should not be used in conjunction with other drugs, which should be noted. In addition, there are problems with the combined use of ribavirin. Antibiotics are antibacterial drugs, and ribavirin is an antiviral drug. The use of the two together indicates that the doctor did not judge the cause of the pneumonia (viral infection or bacterial infection). A reasonable prescription should be to choose one of two classes of drugs. Such unreasonable prescriptions not only cause antibiotic abuse, but also increase the cost of medical insurance and even cause medical accidents.

3 Problem Solving Through the above analysis, we can see that in the medical treatment of the NCMS clinic, the abuse of antibiotics and unreasonable matching are still relatively serious. This may be related to the environment and characteristics of the new rural cooperative clinic. In addition to increasing propaganda, popularizing knowledge, and improving the professional knowledge of outpatient doctors, it is also necessary to strengthen the

Data Mining and Association Analysis of Irrational Use

41

management of the medical insurance system, and combine the medical insurance system software that has been popularized to provide reasonable monitoring and prompt for outpatient prescriptions. Outpatient type medical institutions, due to the technical level of medical practitioners and medical equipment, there is a certain gap compared with large hospitals, there will be cases of antibiotic abuse and irrational use of drugs. Moreover, not only antibiotics, but almost all drugs at present, there are misunderstandings in application and combination. If these misunderstandings can be formed into rules that can be judged by software, monitoring and prompting when doctors prescribe drugs can greatly avoid this. When the doctor prescribes the medicine, the system obtains the information of the insured person who exists in the medical insurance database according to the basic data and characteristics of the patient, such as age, gender, and allergic reaction. Combined with the state of the diagnosis and treatment: such as pregnancy, lactation, or other diseases, so that the system can determine a reasonable choice of medication according to the rules, and instruct the physician to configure a reasonable prescription. It can be seen that through the data mining technology such as association rules to mine medical insurance data, we can effectively obtain the information on the specific drug use of antibiotics and other drugs, and obtain the first-hand information in practical applications. Through the analysis of the results, combined with the judgment of professionals, to determine the problems of antibiotics and other drugs in specific applications, thereby more effectively improve the standard level of the medical system. Acknowledgments. This work was supported by Jinan star science and technology plan (No. 20120104) and Shandong Provincial Natural Science Foundation, China (Grant: ZR2016FM14).

References 1. Otter, J.A., French, G.L.: Molecular epidemiology of community—associated meticillin— resistant Staphylococcus aureus in Europe. Lancet. Infect. Dis. 10(4), 227–239 (2010) 2. Gao, Y., Li, L., Schwebel, D.C., et al.: Reimbursement for injury-induced medical expenses in Chinese social medical insurance schemes: a systematic analysis of legislative documents. PLoS ONE 13(3), e0194381 (2018) 3. Sun, M., Shen, J.J., Li, C., et al.: Effects of China’s New Rural Cooperative Medical Scheme on reducing medical impoverishment in rural Yanbian: an alternative approach. BMC Health Serv. Res. 16(1), 422 (2016) 4. Taubes, G.: The bacteria fight back. Science 321, 356–361 (2008) 5. Zhou, W., Wan, Q., Zhang, R.Q.: Choosing among hospitals in the subsidized health insurance system of China: a sequential game approach. Eur. J. Oper. Res. 257(2), 568–585 (2017) 6. Babiarz, K.S., Miller, G., Yi, H., et al.: New evidence on the impact of China’s New Rural Cooperative Medical Scheme and its implications for rural primary healthcare: multivariate difference-in-difference analysis. BMJ 341(7779), 929 (2010) 7. Cheng, L., Zhang, Y.: The New Rural Cooperative Medical Scheme: financial protection or health improvement? Econ. Res. J. (2012)

42

Q. Hu and X. Ren

8. Jinxia, Y., Qicheng, J., Shixue, L.: Probe into the countermeasures of managing medical institutions Under the New Rural Cooperative Medical System. Chin. Hosp. Manag. 36(4), 702–708 (2005) 9. Dib, H.H., Pan, X., Zhang, H.: Evaluation of the New Rural Cooperative Medical System in China: is it working or not? Int. J. Equity Health 7(1), 17 (2008) 10. Wang, Y.: Development of the New Rural Cooperative Medical System in China. China World Econ. 15(4), 66–77 (2010) 11. Lu, S., Zhang, D.: China’s New Rural Cooperative Medical Scheme and underutilization of medical care among adults over 45: evidence from CHARLS pilot data. J. Rural Health 29 (s1), s51–s61 (2013) 12. Lin, Z.P., Chen, J.Y., Wang, J.S., et al.: Status quo of hospitalization of the New Rural Cooperative Medical System (NRCMS) in Nanjing city. Chin. Med. Ethics 12(2), 77–79 (2008) 13. Zhang, Y., Chen, Y., Zhang, X., et al.: Current level and determinants of inappropriate admissions to township hospitals under the New Rural Cooperative Medical System in China: a cross-sectional study. BMC Health Serv. Res. 14(1), 649 (2014) 14. Shen, S.G., Jian, Z.: The defects and improvements of New Rural Cooperative Medical Care System. J. Sun Yat-Sen Univ. (Soc. Sci. Ed.) (2008) 15. Wang, J., Zhou, H.W., Lei, Y.X., et al.: Financial protection under the New Rural Cooperative Medical Schemes in China. Med. Care 50(8), 700–704 (2012) 16. Chen, J., Yu, H., Dong, H.: Effect of the New Rural Cooperative Medical System on farmers’ medical service needs and utilization in Ningbo, China. BMC Health Serv. Res. 16(1), 593 (2016) 17. Wang, L., Wang, A., Fitzgerald, G., et al.: Who benefited from the New Rural Cooperative Medical System in China? A case study on Anhui Province. BMC Health Serv. Res. 16(1), 195 (2016) 18. Gu, H., Kou, Y., Yan, Z., et al.: Income related inequality and influencing factors: a study for the incidence of catastrophic health expenditure in rural China. BMC Public Health 17(1), 727 (2017)

Evaluation Index System of High-Quality Energy Development Shanshan Wu1(&), Guoqiang Ji1, Yuanyue Chen2, and Baoguo Shan1 1

2

State Grid Energy Research Institute Co., Ltd., Beijing, China [email protected] School of Management, China University of Mining and Technology, Xuzhou, China

Abstract. China has entered a new era of high-quality development, and the energy industry is also facing a major task of high-quality development. The concept of Modern Energy Economy has given a deeper meaning to the development of high-quality energy. In order to describe the high-quality development of energy more intuitively, this paper designs an evaluation index system for high-quality energy development, including the first-level indicators that include two dimensions named high-quality development of energy industry and high-quality development of energy. There are 12 secondary indicators, and 56 tertiary indicators. The evaluation index system is simple, objective, reasonable, scientific and effective in evaluating the high-quality development of energy, and provides a reference for the government to guide and promote the high-quality development of energy. Keywords: Energy

 High-quality development  Evaluation index system

1 Introduction On March 5, 2018, General Secretary Xi Jinping proposed “Do a good job in the Modern Energy Economy, keep up with the new trend of the world’s energy technology revolution, extend the industrial chain, and improve the efficiency of comprehensive utilization of energy resources” in the deliberation of the Inner Mongolia delegation of the National People’s Congress. At present, there are some problems in the energy economics. The concept of Modern Energy Economy not only provides guidance for solving these problems, but also enriches the connotation of high-quality development of the energy industry. The high-quality development of energy is supported by the concept of modern energy economy, fully considering the new characteristics of modern economic and social development and new requirements for energy development, and paying more attention to the role of the energy industry in promoting the high-quality development of the economy.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 43–54, 2020. https://doi.org/10.1007/978-3-030-25128-4_7

44

S. Wu et al.

2 The Dimension of High-Quality Energy Development Domestic scholars’ evaluation indicators for energy development are mostly concentrated on energy sustainable development and energy green development. Miao and others proposed to improve energy use efficiency, improve energy cleanliness, reduce energy impact on the environment, and actively carry out climate change action [1]. Xiang has built an evaluation index system for energy sustainable development from the aspects of economic development capability, social development capability, institution building capacity and environmental production capacity [2]. From the study of domestic scholars on the high-quality development of energy, Li believes that to achieve high-quality energy development, we must accelerate the promotion of energy development quality change, energy development efficiency change, energy development and power change as the focus of work [3]. Jia believes that to comprehensively promote the high-quality development of energy in the new era, we must build a strong security system, clean a low-carbon green industry system, catch up with the technological innovation system, and have a fair and orderly market operation system and science [4]. This paper evaluates the degree of high-quality energy development from the aspects of innovation capability, marketization level, industry efficiency, consumption structure, production structure, ecological environment and safety and reliability. 2.1

Innovation Ability

R&D investment is a necessary condition for improving innovation capability. Energy Industry Technology Investment Energy Sector Added Value [ Industry-wide Technology Investment GDP

ð1Þ

According to the 2017 National Statistical Report on Science and Technology Funds, the national basic research expenditure was 97.55 billion yuan, an increase of 18.5% over the previous year; the applied research funding was 184.92 billion yuan, an increase of 14.8%; the experimental development expenditure was 1,478.14 billion yuan, an increase of 11.6%. Basic research, applied research and experimental development funds accounted for 5.5%, 10.5% and 84% respectively. According to the calculation of 5% of the national level, the R&D structure of the energy industry should meet the following requirements [5]. The proportion of research and development investment in basic research funds in the energy industry is  5:2% The proportion of energy industry applied research and development investment  10:0% The proportion of investment in research and development in the energy industry  79:8%

ð2Þ Energy product innovation capabilities are companies that use innovation to change those products that are essentially the same, or to provide new products that nurture consumers’ preference because of believing in the differences in these products.

Evaluation Index System of High-Quality Energy Development

ðDifferentiated product categoryÞt  ðDifferentiated product categoryÞt1 [ 0

45

ð3Þ

Energy service innovation capability refers to the ability to continuously provide new ideas, new theories, new methods and new inventions with economic value, social value and ecological value in the field of energy services. 

2.2

   added value of energy service companies added value of energy service companies  [0 added value of energy industry added value of energy industry t t1

ð4Þ

Marketization Level

The degree of development of the non-state-owned economy refers to the final result of the production and operation activities of energy non-state-owned enterprises in a certain period of time, and also reflects the contribution to the domestic (regional) GDP. 

 non-state-owned enterprise added value energy  industry added value energy industry added value t  non-state-owned enterprise added value  [0 energy industry added value energy industry added value t1

ð5Þ

The degree of market allocation of resources refers to the degree to which the market mechanism causes price changes according to changes in market demand and supply in the process of economic operation, thereby realizing the process of resource allocation, combination and redistribution and recombination. 

   charges, appraisals, etc. that the enterprise bears charges, appraisals, etc. that the enterprise bears  [0 sales revenue sales revenue t t1

ð6Þ

According to the 2006 World Bank Survey No. 37759-CN, “Governance, Investment Environment and Harmonious Society: Improving the Competitiveness of China’s 120 Cities”, Among the time companies spend with four major government agencies (inland, tax bureau, environmental protection bureau, labor and social security bureau), the top 10% of cities are less than 36 days/year, and the last 10% of cities are more than 87 days/year. Considering that the government agencies are not just the above four, and the regional gap is difficult to disappear in the short term and the working hours for the whole year are 258 days, this paper takes the threshold of 10% [6]: Energy business managers spend time working with government departments and personnel \10% Energy business managers' working hours

ð7Þ

The degree of development of product prices reflects the extent to which the price is determined by the market. The degree to which the product price is determined by the market is measured by the weighted average of the proportion of the agricultural product price, the production material price, and the retail commodity price determined

46

S. Wu et al.

by the market, respectively, and the weights are 0.2, 0.4, and 0.4 [7], According to this calculation, the average market development degree of products in the period of 1995– 2010 is 70%, the average in the coastal areas is 67%, and the average in the inland areas is 71%. Considering the particularity of the energy industry, the development of the product market is limited, but in recent times. In the past year, the marketization process of the energy industry has accelerated, so this paper takes a threshold of 75%. The price of energy products is determined by the market [ 75% the total number of energy products

ð8Þ

Labor mobility refers to according to the differences in labor market conditions, laborers voluntarily choose and move between regions, industries, industries and posts. ðthe net increased number of labor in energy industryÞt  ððthe net increased number of labor in energy industryÞÞ t1 [ 0

ð9Þ

Marketization of technological achievements refers to the realization of free trade in energy technology achievements in the market, the full flow and effective allocation of energy science and technology resources through market mechanisms. (the turnover per 10; 000 scientific and technological personnel)t [1 (the turnover per 10; 000 scientific and technological personnel)t

ð10Þ

Energy market concentration rate refers to the share of sales of the top companies in the specific energy market. This indicator is a measure of the concentration of the market structure of the entire industry. Sales of the top 4 companies in the industry the sales of the top 8 companies in the industry \30 or \40 total sales of the industry total sales of the industry

ð11Þ ðsum of the square of the market shares of all companiesÞt [1 ðsum of the square of the market shares of all companiesÞt1

2.3

ð12Þ

Industry Efficiency

Total factor productivity refers to the comprehensive productivity of energy production units (mainly enterprises) as the various elements in the system, which is different from factor productivity (such as technological productivity). 

   total output total output  [0 total resource input t total resource input t1

ð13Þ

Evaluation Index System of High-Quality Energy Development

47

Barriers in the energy industry include barriers to blocking or restricting access to the energy industry. They are an effective means and an important method to protect the market and eliminate competition. sales of the top 4 companies in the industry the sales of the top 8 companies in the industry \30 or \40 total sales of the industry total sales of the industry

ð14Þ 

 Inter-provincial tie line utilization rate sending  electricity power end-receiving electricity power end t  Inter-provincial tie line utilization rate  [ 0 ð15Þ sending electricity power end-receiving electricity power end t1

The integration of energy industry and high-tech refers to the degree of integration of high-tech industry and energy industry. 

   Number of energy companies using high tech Number of energy companies using high tech  [0 quantity of total energy companies quantity of total energy companies t t1

ð16Þ The supporting role of energy finance in the energy real economy refers to the extent to which the support of the financial industry promotes the development of the energy industry. ðCredit Policy Evaluation ScoreÞt ðCredit Policy Evaluation ScoreÞt1 [ 0

ð17Þ

The variety of energy financial products continues to increase: ðEnergy Financial Product TypeÞt  ðEnergy Financial Product TypeÞt1 [ 0 ð18Þ The proportion of financing in the energy industry has increased year by year: Energy industry financing proportiont  Energy industry financing proportiont1 [ 0 ð19Þ

2.4

Consumption Structure

The energy consumption structure is the amount of each type of energy consumed by various sectors of the national economy and its proportion of total energy consumption in a certain period of time, or the energy consumption and its proportion classified by the consumption sector. 

   primary energy consumption primary energy consumption  \0 national total energy consumption t national total energy consumption t1 ð20Þ

48

S. Wu et al.



   Electric power Electric power  [0 Total Energy Consumption t Total Energy Consumption t1     Total Energy Consumption Total Energy Consumption  \0 GDP GDP t t1 

 non-fossil energy and natural gas consumption total energy consumption t   non-fossil energy and natural gas consumption  [0 total energy consumption t1

ð21Þ ð22Þ

ð23Þ

energy consumption of key energy-consuming products' production t [ 1 ð24Þ energy consumption of key energy-consuming products' production t1

2.5

Production Structure

The energy production structure is the energy production structure, which refers to the proportion of the output of various industrial sectors producing energy in the total output of the entire energy industry. 

   primary energy production primary energy production  \0 national total energy production t national total energy production t1 ð25Þ 

2.6

   Clean energy generation Clean energy generation  [0 generation generation t t1

ð26Þ

Ecological Environment

The degree of coordination between the energy system and the ecosystem refers to the degree of coordination between the energy subsystem and the ecological subsystem, and is used to judge whether the two systems are harmoniously developed. ðenergy pollution equivalentÞt  ðenergy pollution equivalentÞt1 \0 ðcosts for controlling energy pollutantsÞt  ðcosts for controlling energy pollutants)t1 \0

2.7

ð27Þ ð28Þ

Safety and Reliability

The reserve replacement rate refers to the ratio of the newly added proven recoverable reserves in the year to the current consumption and reserves.

Evaluation Index System of High-Quality Energy Development

New energy recoverable reserves of the annual energy [1 mining volume of the year

49

ð29Þ

The energy storage-production ratio refers to the ratio of the remaining recoverable reserves at the beginning of the year to the oil production (gas) in the oil (gas) field, reflecting the degree of oil and gas production guarantee. Remaining recoverable reserves at the beginning of the oil ðgasÞ field [ 50 ð30Þ the amount of oil ðgasÞ produced in the current year The external dependence of energy refers to the ratio of the net import volume of different energy products in a country to the consumption of the energy product in the country.     jNational energy imports  domestic energy productionj jNational energy imports  domestic energy productionj  \0 domestic energy apparent consumption domestic energy apparent consumption t t1

ð31Þ The concentration risk of energy trade is the proportion of the total amount of imports from a certain region or several countries in the total amount of energy imports, reflects the concentration of sources of energy imports. 

   Imports to certain countries=regions Imports to certain countries or regions  \0 ð32Þ imports from all countries imports from all countries t t1

The fluctuation rate of energy price is the ratio of the difference between the highest price and the lowest price of a certain period of time and the average price. High fluctuation rate of energy price indicates that the energy supply is not safe. For China, the increase in price means the increase in fiscal expenditure and production, the increase in cost [8]. Energy price volatility is between 10% and 20%1: 10%\

the highest energy price in a certain period-lowest energy price in a certain period the average price in a certain period

ð33Þ The growth rate of energy consumption, that is, the ratio of the increase in energy consumption this year to the consumption in the previous year. Generally speaking, the growth rate of energy consumption and GDP growth should maintain a relatively stable relationship. Energy consumption growth rate/GDP growth rate is between 50% and 150%. 50% \

1

energy consumption growth rate \150% GDP growth rate

From 2005 to 2009, the geometric average of China’s energy price volatility was 23%.

ð34Þ

50

S. Wu et al.

The reliability of the transportation channel is the product of the energy trade dependence and risk coefficient of the main channel (the frequency of pirates and terrorist activities in the energy transportation channel), measures the safety of the imported energy transportation channel. The quotient of the energy input of the main channel and the sum of the energy import and export volume of the main channel is less than 10%2 of the product of the hazard coefficient of the channel. Energy imports from major channels  Hazard coefficient for this channel\10% Energy imports þ exports from major channels

ð35Þ The energy availability of the international market is the ratio of the amount of domestic expenditure on energy imports to the total GDP of the country in a given year, and whether the domestic energy supply and demand gap can be met at a reasonable price through the international market. 1% \

the amount of expenditure for energy imports in the country \5% the total GDP of the country in the current year

ð36Þ

3 The Dimension of the Development of High-Quality Economy Driven by Energy’s Promotion From the study of high-quality economic development abroad, the index system proposed in foreign economic evaluation of economic development often does not directly focus on the quality of economic development, but proposes different indicator systems for different development levels. Liu believes that to change the mode of economic development, we must transform from extensive consumption to intensive consumption, improve the utilization of resources, protect the environment, and achieve the unity of economic and social benefits [9]. Li and others believe that in the middle-level or city level, high-quality economic development is to integrate the economic development mode, the economic structure, the economic power and high energy into the economic cycle, and promote the open system and factor system [10]. Ren and others have established a high-quality development evaluation system, including high-quality development of the indicator system, policy system, standard system, statistical system, performance evaluation system, and performance evaluation system [11]. In this paper, the spillover effect of energy industry development can be regarded as the effect of energy promoting high-quality economic development. From the nature, it can be roughly divided into technology spillover effect of energy, regional spillover effect, economic spillover effect, investment spillover effect and inter-industry spillover effect. 2

The average reliability index of China’s transportation corridors in 2005–2009 is 0.08. Considering that most of China’s energy imports rely on shipping in recent years, and the main risk is in the Straits of Malacca, the risk of energy transportation channels is increased. Therefore, the threshold is 10%.

Evaluation Index System of High-Quality Energy Development

3.1

51

Technology Spillover Effect

The technology spillover effect of energy means that the technological achievements developed by enterprises can be obtained and used by other enterprises without cost due to externalities. Technical relevance of upstream and downstream of the industrial chaint [1 Technical relevance of upstream and downstream of the industrial chaint1 ð37Þ The proportion of the number of R&D personnelt \1 The proportion of the number of R&D personnelt1

ð38Þ

The proportion of the number of R&D personnelt \1 The proportion of the number of R&D personnelt1



ðtechnical staff salary ratioÞt  ðtechnical staff salary ratioÞt1 \0

ð39Þ

    R&D investment R&D investment  \0 total input total input t t1

ð40Þ

   the number of shared technical achievements the number of shared technical achievements  [0 total technical achievements total technical achievements t t1

ð41Þ

3.2

Regional Spillover Effects

The regional spillover effect of energy refers to the impact of the development of energy in a region on the economic development of neighboring provinces. When the indicator value meets the following criteria, we believe that the regional spillover effect of energy is sufficient to promote high-quality economic development: Inter-regional trade turnover increased year by year: Inter-regional trade turnovert  Inter-regional trade turnovert1 [ 0

ð42Þ

The inter-regional industrial isomorphic coefficient is decreasing year by year: Inter regional industrial isomorphic coefficientt  Inter regional industrial isomorphic coefficientt1 \0

3.3

ð43Þ

Economic and Social Spillover Effects

The economic and social spillover effect of energy means that the energy industry has a significant pulling effect on regional or regional economic growth and social development. When the indicator value meets the following criteria, we believe that the

52

S. Wu et al.

economic and social spillover effects of energy are sufficient to promote high-quality economic development:     added value of energy industry added value of energy industry  [0 gross national product gross national product t t1 ð44Þ Tax amountt  tax amountt1 [ 0

3.4

ð45Þ

Energy Employment Numbert  Energy Employment Numbert1 [ 0

ð46Þ

The number of new industries derived from the energy industryt [1 The number of new industries derived from the energy industryt1

ð47Þ

Influence coefficient of energy industryt  Influence coefficient of energy industryt1 [ 0

ð48Þ

Inductive force coefficient of energy industryt  Inductive force coefficient of energy industryt1 [ 0

ð49Þ

Social Transaction Costt  Social Transaction Costt1 \0

ð50Þ

Energy Investment Spillover Effect

The investment spillover effect of energy refers to the combination of direct and indirect effects of energy industry investment on regional economic growth. When the indicator value reaches the following criteria, we believe that the social spillover effect of energy investment is sufficient to promote high-quality economic development: 



   Energy Industry Investment Energy Industry Investment  [0 Regional Investment Regional Investment t t1

Energy industry investment added value regional economic value added



  t

Energy industry investment added value regional economic value added

ð51Þ

 [0 t1

ð52Þ Direct Consumption Coefficientt  Direct Consumption Coefficientt1 [ 0

ð53Þ

Complete consumption coefficientt  Complete consumption coefficientt1 [ 0 ð54Þ

Evaluation Index System of High-Quality Energy Development

3.5

53

Inter-industry Spillover Effects

The inter-industry spillover effect of energy refers to the impact of consumption of different energy types in the energy industry on the consumption of other energy types. When the indicator value meets the following criteria, we believe that it is good to promote high-quality economic development:     Reduction of pollutant emissions from energy substitution Reduction of pollutant emissions from energy substitution  [0 total pollutant emissions total pollutant emissions t t1

ð55Þ ðthe cost of treatment of various pollutants saved by energy substitutionÞt ðthe cost of treatment of various pollutants saved by energyÞt1 ðcost of treatment of various pollutants saved by energy substitutionÞt1 ðthe cost of treatment of various pollutants saved by energyÞt þ 1 ðthe cost of treatment of various pollutants saved by energy substitutionÞt \ ðcost of treatment of various pollutants saved by energy substitutionÞt

ð56Þ

4 Recommendations The scientific empowerment of the energy quality evaluation index system can highlight the core characteristics and value orientation of the energy economic development. It is necessary to empower various indicators according to the different requirements of the energy economy at different stages of development in China. In addition, the energy quality development indicator system proposed in this paper lacks the support of official statistics. Open, publish, and share energy data information in time, and develop applications at the same time so that the public can browse and use data anytime and anywhere, which improves the application value of energy data. Acknowledgement. This work is supported by the Science and Technology Project of State Grid Corporation of China (Research on the method, model and application of economy and electricity demand forecasting based on supply-side reform).

References 1. Miao, R., Wang, L., Wu, Z., Hu, X., Zhou, F.: Evaluation index system construction and primary evaluation of sustainable energy development in China. China Energ. 34(03), 22–27 (2012). (in Chinese) 2. Xiang, Z., Liu, X., Xiao, D.: Preliminary evaluation and index application of China’s energy sustainable development status. Shandong Soc. Sci. (02), 168–173 (2016). (in Chinese) 3. Li, C.: Grasping the pulse of the new era and promoting high-quality development. Sanxia Daily (003) (2018). (in Chinese) 4. Jia, C.: Comprehensively promoting high-quality development of energy in the new era. Electr. Appl. Ind. (03), 45–46 (2018). (in Chinese) 5. Ministry of Science and Technology, Ministry of Finance, National Bureau of Statistics. Statistical bulletin of national science and technology funding input in 2017. China Information Daily (001) (2018). (in Chinese)

54

S. Wu et al.

6. World Bank: Government Governance. Investment environment and a harmonious societyimproving the competitiveness of 120 Chinese cities. China Finance and Economics Press, China (2007). (in Chinese) 7. Fan, G., Wang, X.: China’s Marketization Index: Relative Progress of Marketization in Various Regions 2011 Report. Economic Science Press, China (2011). (in Chinese) 8. Lin, Y.: Measurement of energy security index and prospect of energy cooperation between China and Canada from 2000 to 2012. Int. Econ. Trade Explor. 30(05), 29–38+61 (2014). (in Chinese) 9. Liu, X.: Reflections on some issues concerning the quality of economic development – a case study of Heilongjiang Province. Heilongjiang Soc. Sci. 03, 58–60 (2012). (in Chinese) 10. Li, H., Wang, T.: Evaluation of the realization degree of high-quality economic development – a case study of Wuhan City. J. Wuhan Metall. Manag. Cadre Inst. 04, 3–5 (2018). (in Chinese) 11. Ren, B., Li, Y.: Construction of China’s high-quality development evaluation system in the new era and its transformation path. J. Shaanxi Normal Univ. (Philos. Soc. Sci. Ed.) 47(03), 105–113 (2018). (in Chinese)

Design of Smoke Detection Algorithm Based on UV Spectroscopy Shuping Xu(&), Mengyao Huang, Li Chen, and Xiaohui Su School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China [email protected]

Abstract. The difficulty of using ultraviolet spectroscopy to measure the harmful components of flue gas is that the gases have mutual interference and their characteristic absorption peaks also interfere with each other. In this paper, we propose a cyclic iterative algorithm to solve the problem of mutual interference between gases by using Lambert-Beer’s law and absorbance. The algorithm uses different UV-light wavelengths at 190 nm–290 nm for different characteristics of UV light with different absorption peaks. The iteration is repeated until the concentration difference between adjacent two gases is less than a certain value. It is considered that the elemental gas The exact concentration, and through the programming to achieve the results. The experimental results show that the algorithm can calculate the actual exact concentration of various simple gases in the mixed gas, and the accuracy error does not exceed 3%. The actual gas detection requirements can be met. Keywords: UV spectrum  Characteristic absorption peak Iterative algorithm  Gas concentration



1 Introduction With the industrial production, centralized heating of boilers and the popularization of transportation tools, a large number of soot and toxic and harmful gases will be discharged. Hazardous substances accumulate gradually in the atmosphere and reach a certain concentration, which will make the normal composition of air change, thus endangering the health of human beings and various animals and plants [1]. Various problems caused by air pollution have attracted the attention of environmental protection departments. In order to achieve accurate and real-time monitoring of environmental quality, ecological environment and pollution sources, and provide accurate basis for supervision and management of environmental protection departments at all levels and environmental decision-making of the government, a large number of modern environmental monitoring instruments are urgently needed. At present, there are three main methods for gas detection of portable spectrometers in domestic and foreign markets: differential algorithm, electrochemical analysis and infrared spectroscopy. Differential absorption algorithm can accurately calculate the concentration of most gases, but it will lose the broadband continuous absorption information in the characteristic absorption of gases, leading to some gas concentration © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 55–64, 2020. https://doi.org/10.1007/978-3-030-25128-4_8

56

S. Xu et al.

measurement can not come out. The electrochemical analysis method has the advantages of simple structure and easy operation [2−3]. It mainly depends on gas sensors, a gas sensor can only detect a corresponding gas, and the sensitivity of gas sensors is high, but after a period of time, the sensitivity of sensors to gas will decline, it is necessary to replace gas sensors in time, and gas sensors are expensive, which increases the use cost for users. The main principle of gas sensor is to use the oxidation or reduction reaction of gas to generate current, but if there are both oxidizing gas and reducing gas, the measurement results will be inaccurate [4]. Infrared spectroscopy overcomes the shortcomings of electrochemical analysis, but can only measure the approximate concentration of nitrogen oxides, can not accurately measure the specific concentration of NO and NO2, and infrared spectroscopy for environmental humidity, temperature and other external conditions require higher technology is more complex. Based on defects and deficiencies of the above gas detection methods, an iterative evolution gas solution algorithm is proposed in this paper. According to the good absorption of ultraviolet light by gas at the wavelength of 190–290 nm, the number of absorbed photons can be obtained by measuring the ultraviolet light absorbed by gas. The actual concentration of gas can be obtained from the number of photons by using the iterative gas calculation algorithm.

2 The Principle and Computational Procedure of Iterative Algorithms 2.1

Algorithm Principle

Mixed gases have characteristic absorption peaks in the range of ultraviolet wavelength 190–290 nm. Gas absorbance has multiple superposition. Assuming that some elementary gas does not absorb other gases on its best characteristic absorption peak, the corresponding table of absorbance and concentration of this single substance gas is searched to obtain the initial concentration of the gas, and then switch to another characteristic absorption peak [5]. The photon number of the gas is subtracted from the total photon number measured, and the initial concentration of another gas is obtained. By analogy, the initial concentration of each gas is obtained one by one. Then, the characteristic absorption peak of the first gas is returned to, and the absorption photon number of other gases is subtracted from the total photon number absorbed, and the iterative concentration of the first gas is obtained again. By analogy, the initial concentration of each elemental gas is obtained again. By repeating the iteration until the difference of gas concentration between two adjacent times is less than a certain value, it is considered that the concentration of the elemental gas is obtained. 2.2

Algorithm Steps

(1) The initial concentration c1 of the first elementary gas in the mixed gas is solved. According to the characteristic absorption peak of the gas at wavelength k1 , the Dk number of photons B Sk1 absorbed by the gas is read. Solving the value of RSk1k1D k

Design of Smoke Detection Algorithm Based on UV Spectroscopy

57

(Rk is the number of incident photons; Sk is the number of photons passing through the medium; Dk is the number of photons in dark spectrum (Also known as dark spectral noise); k is the wavelength of a certain ultraviolet wave, K is a constant, c is the concentration of elemental gas), The initial concentration c1 of the elemental gas was obtained by inquiring the comparison table of absorbance and gas concentration. (2) The initial concentration c2 of the second primary gas in the mixed gas is solved too, Select the characteristic absorption peak k2 of the elemental gas and read the absorption photon number Sk2 of the elemental gas. Assuming that there are only two gases in this band. According to the formula Rk  Dk Rk1  Dk Rk2  Dk ¼  Sk  Dk Sk1  Dk Sk2  Dk

ð1Þ

the absorbance of the second gas is calculated, and the concentration of the second gas is calculated by querying the absorbance and concentration table again, as the initial concentration c2 of the second gas. (3) Solve the concentration of other elemental gases in mixed gases. Methods 1 and 2. Selecting the characteristic peak absorption wavelength of other elemental gases and reading the number of absorbed photons at that wavelength [6]. The absorbance was calculated by formula A¼

Rk  Dk Rk1  Dk Rk2  Dk Rk3  Dk Rkn  Dk ¼    ...  Sk  Dk Sk1  Dk Sk2  Dk Sk3  Dk Skn  Dk

ð2Þ

(A is absorbance), and the initial concentration of gas was obtained by looking up the table. (4) Iterative Recursion of the Concentration of the First Element Gas. The concentration of all elemental gases obtained at present is substituted into the formula Rk  Dk Rk1  Dk Rk2  Dk Rk3  Dk Rkn  Dk ¼    ...  Sk  Dk Sk1  Dk Sk2  Dk Sk3  Dk Skn  Dk

ð3Þ

and the corresponding Sk1 of wavelength k1 is read again. The iterative concentration c1 of the first elemental gas is obtained by checking the corresponding table of concentration absorbance. (5) Repeat (2) and (3) to find the iteration concentration cm1 of the elemental gas M. (6) Calculate the error of the calculation results of the same elemental gas in the adjacent two times. The first-order iteration error of each elemental gas is calculated. Dm1 ¼ jc0m  cm1 j

ð4Þ

(7) Repeat 4, 5 and 6 until the error of two iterations of the same gas concentration is less than 3%.

58

S. Xu et al.

Dn \DG

ð5Þ

The last calculated gas concentration is regarded as the final concentration of various elemental gases.

3 Algorithm Verification Figure 1 is the absorption spectra of NO, SO2 NH3 and NO2 mixed gases. Among them, N2 is a zero gas whose spectral line is called zero gas line. Zero gas is not absorbed in ultraviolet light of 190–290 nm. Because there is Rayleigh scattering in the gas to be detected, the influence of scattering can be eliminated by using the zero-gas line spectrum as the reference spectrum.

Fig. 1. Mixed gas UV spectral absorption curve

From the observation in Fig. 1, we can see that NO and NH3 can find noninterference absorption wavelengths. These two wavelengths are just the absorption peaks of NO and NH3 , and there is no NO absorption at the NH3 absorption peak, and there is no NH3 absorption at the NO absorption peak. So it is easy to distinguish the two gases if we only distinguish them. The problem now is that SO2 and NO2 both absorb at the absorption peaks of these two gases. At the wavelength of 220 nm, the maximum absorption peaks of NO and NO2 are close, and SO2 absorbs a lot of ultraviolet light in this section. So if we can know the concentration of SO2 and NO2 beforehand, we can use the superposition of absorbance to subtract the absorbance of NO and NH3 from the total absorbance of SO2 and NO2 . We can get the absorbance of NO and NH3 by looking up tables. Therefore, in order to obtain the specific concentration of various elemental gases in mixed gases, the concentration of SO2 and NO2 must be required first, and then the concentration of NO and NH3 can be calculated. In this way, the concentration of four kinds of elemental gases in the mixture can be calculated.

Design of Smoke Detection Algorithm Based on UV Spectroscopy

3.1

59

Calculating the Concentrations of SO2 and NO2

NO2 and SO2 interfere with each other in the whole working band. Now it is assumed that there are two kinds of elemental gases in the mixture, NO2 and SO2 , respectively. It is now known that the absorption spectra of mixed gases at 231.33 nm and 273.33 nm, and the absorbance of gases NO2 and SO2 at 231.33 nm and 273.33 nm (231.33 nm and 273.33 nm, respectively, are the maximum absorbance of gases NO2 and SO2 at this point). Now calculate the respective concentrations of NO2 and SO2 (Table 1). Table 1. Spectral tables for SO2 and NO2 at wavelength 273.33 nm and wavelength 231.33 nm Wavelength 231.33 273.33 NO2 absorbance 0.03003444 0.00456189 SO2 absorbance 0.00482312 0.07984884

Figure 2 is the flow chart of the iterative algorithm for the concentration of NO2 and SO2 mixed gases. After several iterations, the real concentrations of these two gases can be calculated from the mixture.

Fig. 2. NO2 and SO2 gas concentration iterative algorithm flow chart

After two iterations, the numerical value of the algorithm tends to be stable, and the precise gas concentrations of NO2 and SO2 are basically obtained (Figs. 3 and 4).

60

S. Xu et al.

Fig. 3. SO2 concentration and the number of iterations curve

3.2

Fig. 4. NO2 concentration and the number of iterations curve

Calculating the Gas Concentrations of NO and NH3

There is no interference between NO and NH3 at their maximum absorption peaks, so the total absorbance and the concentration of NO2 and SO2 can be calculated according to the superposition of ultraviolet light. Assuming that the concentrations of NO2 and SO2 in mixed gases are c1 and c2 , respectively, and the concentrations of NO and NH3 are c3 and c4 , the multivariate superposition of absorbance at wavelength 225.88 nm can be obtained as follows: A ¼ A1 þ A2 þ A3

ð6Þ

A1 is the absorbance of NO2 at 225.8 nm in c1 concentration, A2 is the absorbance of SO2 at 225.8 nm in c2 concentration, A is the total absorbance of mixed gas at 225.88 nm and A3 is the total absorbance of NO at 225.88 nm. I I

A3 ¼ A  A1  A2 ¼ lgð 0 Þ  A1  A2

ð7Þ

I0 is the spectral intensity at 225.88 nm through zero gas, I is the transmission intensity at 225.88 nm through the mixture gas to be measured, the intensity can be obtained directly by spectrometer, A2 and A3 are calculated by the concentration of SO2 and NO2 . In this way, the absorbance A3 of NO at 225.88 nm can be obtained, and then the concentration of NO can be calculated according to the corresponding table between the concentration of NO at 225.88 nm and the absorbance. The absorbance A4 of NH3 can be obtained by the same method at 208.23 nm, and the concentration of NH3 can be calculated according to the corresponding relationship between NH3 concentration and absorbance at 208.23 nm. 3.3

Absorption Spectroscopy of Elemental Gas and Zero Gas

N2 is introduced into the system, and its absorption spectrum is measured when the gas concentration is stable [7]. After that, the number of photons absorbed by NO2 , NO, SO2 and NH3 gases was measured in turn, and the curve was drawn by using the number and wavelength of photons (Fig. 5).

Design of Smoke Detection Algorithm Based on UV Spectroscopy

61

Fig. 5. Four gas photon spectrum line graph

3.4

Data Verification

The following data are obtained when a mixture of SO2 and NO is injected into the experimental system. Table 2 shows the number of absorbed photons and dark noise photons at 271.98 and 225.94 nm measured by ultraviolet spectrometer in a mixture of SO2 and NO2 at 100 ppm, respectively. Table 2. 200 ppm SO2 and NO gas spectral data Zero gas SO2 100 ppm Zero gas NO2 100 ppm

271.98 nm 225.94 nm Dark noise 56434 43973 2900 52851 42754 2900 56434 43973 2900 56386 40749 2900

Table 3 shows the number of absorbable photons at 271.98 nm and 225.94 nm for zero and mixed gases, as well as the number of dark spectral noise photons measured by spectrometer. In practical calculation, the number of photons measured should be subtracted from the number of photons of dark spectral noise to obtain the actual number of photons of zero gas and mixed gas. Table 3. Spectral data for mixed gas 271.98 nm 225.94 nm Dark noise Zero gas 56434 43973 2900 Mixed gas 52050 39588 2900

Based on the above data, the photon number absorption curves of elemental gases at their maximum absorption peaks are fitted.

62

S. Xu et al.

Figures 6, 7, 8 and 9 is a curve drawn by a single gas at the maximum absorption wavelength of ultraviolet light.

Fig. 6. Fitting curve of SO2 at 271.98 nm

Fig. 8. Fitting curve of NO at 271.98 nm

Fig. 7. Fitting curve of NO at 225.94 nm

Fig. 9. Fitting curve of NH3 at 271.98 nm

Analysis table of experimental results. In Table 4, the standard value is the concentration of the standard elemental gas put in the test, and the measured value is the concentration of the elemental gas calculated from the mixed gas using an iterative algorithm [8, 9]. From the experimental results, it can be seen that the maximum error of the measured value is less than the standard value, and the maximum error of the accuracy is 1.94%, which is much less than the original design standard of 3%, which is within the normal standard.

Design of Smoke Detection Algorithm Based on UV Spectroscopy

63

Table 4. Analysis of results Gas species SO2

NO

NO2

NH3 Conclusion

Standard value (ppm) 102 200 499 104 200 500 116 201.5 501.7 50 200 Accuracy error is

Measured Difference Maximum value (ppm) value difference 104 2 −4 196 −4 501 2 108 4 −7 206 6 493 −7 112 −4 −9.7 195 −6.5 493 −9.7 53 3 3 199 −1 less than 3%, which meets the design standard

Error 0.8%

1.4%

1.94%

1.5%

4 Conclusion Aiming at the detection requirement of main harmful components in air pollution, a fast iteration algorithm of mixed flue gas is designed by using the continuous frequency division method of ultraviolet grating in the experimental system, and the effectiveness of the algorithm is verified. Ultraviolet spectrometer is used as a sensor. The embedded development board reads and calculates the gas concentration. The analysis and calculation of the algorithm are realized by programming. The results show that the iterative algorithm can accurately measure the concentration of flue gas and keep the error within 3%. It can meet the design requirements and solve many kinds of gases at the same time. It is suitable for practical engineering applications. Acknowledgments. The authors wish to thank the cooperators. This research is partially funded by the Project funds in Shanxi province department of education (15JF019) and the Project funds in engineering laboratory project (GSYSJ2018011).

References 1. Xu, S., Li, C.: A portable flue gas analyzer based on ARM. Comput. Measur. Control. 19(7), 1788–1790 (2011) 2. Lei, T.: Present situation of portable flue gas analyzer. Environ. Monit. Manag. Technol. 4, 19 (2008) 3. Shi, B., Sun, S., Zhang, W.: Application of CCD in portable spectrometer. Electron. Measur. Technol. 11, 84–86 (2010) 4. Ju, H., Wu, Y.: Miniaturization of spectrometers. J. Instrum. Instrum. 22(4), 131–133 (2013) 5. Tang, Q.: Research and design of ultraviolet flue gas analyzer. Nanjing University of Technology (2013)

64

S. Xu et al.

6. Jiang, X.: Design of portable ultraviolet flue gas analyzer. Nanjing University of Technology (2012) 7. Chen, B.: Design of ultraviolet flue gas analyzer. Nanjing University of Technology (2016) 8. Wu, J., Wu, Y.: Micro-miniaturization of spectrometer. J. Instrum. 22(4), 131–133 (2013) 9. Yu, Z., Yu, W., Xie, Y., Zhou, S.: The control system of multi-parameter water quality tester based on raspberry pie. Instrum. Technol. Sens. 06, 20–23 (2015)

Coordinated Development of Leisure Sports Industry and Urban Culture Under the Concept of “Casual City” Haijing Guo1(&), Li Zhang2, and Huijing Song1 1

Department of Physical Education, Jiangsu Maritime Institute, Nanjing, China [email protected] 2 College of Economics and Management, Jiangsu Maritime Institute, Nanjing 211170, China

Abstract. Under the concept of “leisure city”, the coordinated development of sports industry and urban culture is an important guarantee for ensuring the healthy development of cultural and sports culture in new cities in China. Taking the multi-structure of new city culture and sports culture as the research object, and taking the theory of collaborative development as the theoretical paradigm, the paper mainly studies the collaborative development of multicultural sports culture in new urban culture. The study believes that: New urban culture and sports culture are diversified development structures, which have the characteristics of coexistence, stability, and inclusiveness. Promoting the coordinated development of sports culture’s multi-structure must establish the common goal value, organizational guarantee and institutional constraints of sports multiculturalism. Mechanism to ensure the orderly and sustainable development of the cultural and sports culture of the new city; the establishment and optimization of a platform for fair competition, the strong inheritance of traditional and characteristic sports culture, the encouragement and promotion of new fashion sports, and the integration of development patterns are urban culture and sports. Cultural multi-structure coordinated development path selection. Keywords: Leisure city Humanistic care

 Leisure sports industry  Industrial cluster 

1 Introduction Urban culture is the soul of a city. It is a manifestation of the city’s individuality and characteristics. It is also an important yardstick for measuring the internal dynamics, strength and competitiveness of a city. In addition to seizing the opportunity to do a good job in economic layout, we must also make a difference in urban cultural construction, clarify the urban cultural orientation, build urban cultural brands, provide new impetus for urban economic development, and provide powerful support for urban sustainable development and characteristic development. support. After more than just casual city to work, after work for some free time, it is the needs of the individual personality into the reconstruction after the industrial society, is also an important way to realize the value of life of the individual [1]. As an important trend in the economic © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 65–71, 2020. https://doi.org/10.1007/978-3-030-25128-4_9

66

H. Guo et al.

level is that people will have more leisure time, the boundary between work and leisure will become more and more blurred, and people have more opportunities to think carefully about how to spend their leisure time. Therefore, leisure has truly become a problem related to the quality of human existence [2–4]. Constantly improve the urban culture and cultural cooperation in the development of sports, to promote the coordinated development of sports multicultural structure must be established sports multicultural values common goals, institutional constraints and organizational security mechanisms to ensure that the new city sports and cultural pluralism cultural patterns orderly and sustainable development; establish and optimizing the fair competition platform, vigorously inheriting the traditional and characteristic sports culture, encouraging and advocating new fashion sports, and integrating development pattern are the coordinated development paths of urban culture and sports culture.

2 The Modern Value of the Leisure Sports Industry Leisure sports is a meaningful modern lifestyle that is carried out in idle time and uses the form of physical activity as a means to produce the best psychological experience. People are not limited to the strict regulations of activities and actively pursue the inner experience [5, 6]. Allow individuals to rest, relax and enjoy both mentally and physically. The leisure sports industry refers to the sports service industry that provides people with the purpose of satisfying people’s leisure time, promoting physical and mental health, enriching life and perfecting themselves. Its modern value is mainly reflected in the following aspects. 2.1

Improve People’s Health and Enrich People’s Entertainment Life

The pace of modern life is accelerating. At the same time as social progress, it also brings about different degrees of deterioration of the natural and social environment. The physical and mental health of human beings is not optimistic [7]. Therefore, the development of the leisure sports industry provides more space for people to choose for leisure and entertainment, laying a foundation for the healthy development of people’s mind and body. Through physical activity, people’s bodies are not only exercised, but also the spirit is properly relaxed. 2.2

Promote Economic Development

The brilliant achievements made in the past 30 years of reform and opening up have created the necessary material foundation, institutional conditions and market opportunities for the development of China’s leisure sports industry [8, 9]. The people’s demand for fitness and entertainment, competitive viewing and sporting goods is growing. Various economic legal persons of different ownerships have invested in the leisure sports industry, and the scale of the industry has expanded rapidly. The role played by expanding domestic demand, promoting economic growth and promoting employment has also begun to appear, and has shown great potential for development. Promote social harmony.

Coordinated Development of Leisure Sports Industry and Urban Culture

67

The development of the leisure sports industry is a sign of social progress. People can have more information exchanges in the process of participating in leisure sports activities, including not only the technical level, but also the exchange of ideas and culture [10–12]. Using leisure sports as a platform to enhance the interaction between people between cities and systems, it can promote the harmonious development of society as a whole.

3 Leisure Sports Industry Scale Analysis As far as the value-added development trend of the leisure sports industry is concerned, the development of leisure sports has a good opportunity, which has led to a change in the concept of people participating in leisure sports activities, which led to a significant increase in industrial consumption during this period, prompting the city’s leisure sports industry to usher in a good opportunity for development. In recent years, the output value of sports and leisure industry and the proportion as shown in Fig. 1.

Fig. 1. The output value and proportion of sports and leisure industry in recent years

The leisure sports industry has also formed its own brand and characteristics, the definition and classification of the leisure sports industry and the existing data. We choose the fitness and entertainment industry, the competition performance industry, the sports products manufacturing industry and the sales industry of the forward-related enterprises [13]. The back-to-back sports lottery sales industry analyzes the internal structure of the leisure sports industry. Sports lottery is one of the popular types of lottery tickets, and the sales volume is rising [14]. This is also a form of public sports promotion concept for the public. The leisure sports industry has become an emerging industry with a focus on development in China. The service characteristics of this industry will bring more employment opportunities and enrich people’s spare time. Sports lottery is an industrial sector with rapid development. Consumers provide financing channels for investment in national centralized funds through the purchase of lottery tickets. This is not only conducive to the concentration of power in the country but also to the development of the leisure sports industry.

68

H. Guo et al.

Due to the characteristics of sports and tourism shared resources, the integration of tourism and sports has become an inevitable trend in the development of leisure sports industry. Under the key development of the sports industry, we will deeply explore tourism and cultural products and promote the development and integration of sports, tourism and culture [15, 16]. All localities and cities actively rely on local superior resources to develop leisure sports with local characteristics, combine tourism resources with sports, and form sports tourism projects such as climbing, rafting, skiing and rock climbing.

4 Leisure Sports Industry and Its Development in the “Leisure City” Horizon 4.1

Correlation Analysis of Leisure Sports Market Consumption and Sports Industry Development Under the New Economic Normal

Regarding the consumption of leisure sports market, it is more focused on consumption, because consumption comes from market demand, and demand directly or indirectly determines the formation and output of the whole industry. The sports industry refers to the general name of the departments and industries that produce sports products and participate in sports services. As mentioned above, leisure sports itself is an important component of the sports industry [17]. Careful analysis is not difficult to find that the development process is synergistic with the innovation and development of the entire third service industry at the same time, and the industrial structure is also growing. 4.2

Current Status and Trends of Leisure Sports Development in China

Including China, from the perspective of the development of the entire world economy, under the WTO framework, with the economic growth, the improvement of people’s living standards and the improvement of their environment, the international competition in the fitness and entertainment market will inevitably further intensify. Relatively speaking, although China’s development level in this field is not comparable to that of developed countries such as Europe and the United States at this stage, it is undeniable that this is the gap that has been shrinking. In addition, China is a large country with a large population and a large consumer country. With the national strategic level, it has been continuously promoted from a large sports country to a sports power. It has once again laid a foundation for the future development and expansion of leisure sports in China. For the role of leisure sports development for the entire sports industry and even the economic society, it can be divided into two points: First, the development of leisure sports and the scientific transformation of consumer concepts have provided greater room for development for national fitness activities. Changes to this level are becoming more common in real life. For example, sports events are organized in various forms, and leisure activities are enriched. Before 2008, the most popular sports activities were walking, running, badminton, basketball and volleyball. Throughout the past decade, the changes have evolved from a relatively single model to a multi-faceted trend, that is, other ball games besides basketball

Coordinated Development of Leisure Sports Industry and Urban Culture

69

volleyball, and furthermore, swimming, mountain climbing, fitness, extreme sports, etc. The more common, and gradually formed a relatively complete industrial service chain. Second, the development of leisure sports and the scientific transformation of consumer attitudes have helped the public to evolve from a simple physical exercise model to a casual sports model. As we all know, people have participated in sports activities for a long period of time. The main consideration and even the only consideration is physical health. With the development of the leisure sports industry, the content of people’s healthy lifestyles is constantly changing. Under the new concept of leisure sports, more emphasis is placed on the free experience in sports activities, that is, to satisfy the psychological pleasure and satisfaction of the participants, rather than the original forced exercise and burden sports. In summary, it is not difficult to find out that all changes are based on the premise of economic and social development, and the most essential change is the increase in income levels of urban and rural residents, and the enhancement of economic and consumption power. Once again, the main point of view expressed in the opening chapter is that the core content under the concept of leisure sports is still market consumption.

5 “Leisure City” Construction of Leisure Sports Industry Function Expansion Path 5.1

Actively Build Urban Leisure Sports Space with the Concept of “Humanistic Care”

In the process of modernization, we have changed our lives with great wealth creativity, and at the same time reconstructed new types of interpersonal relationships. But the root of modernization lies in the modernization of people [18]. We don’t want to be modernized by one’s slavery. We expect that people are still the masters of society, and at the same time fully enjoy the modernization of the enormous material wealth created by ourselves. At the same time, the city’s rich material wealth and high-end social service facilities provide the possibility to meet people’s high-level leisure needs. In terms of space, urban leisure sports elements first achieve agglomeration, resulting in economies of scale, which can produce economies of scale and meet growing consumer demand and business needs. The scale economy effect of urban leisure sports is the release process of its energy, and it is also the process of its breadth expansion. This expansion will be based on all leisure elements and will be paved to the non-production space of the city, especially the living space, tourism space and recreation space. Form a leisure sports network within the city’s physical territory. 5.2

Mainly Featured Culture, Especially Creative Sports Culture with Chinese Characteristics and Regional Characteristics and Its Sports Products

Through this, we first gain creative value-added, which is also the inherent law of the development of the market economy under the new normal and its evolutionary essence. As mentioned above, leisure sports has become an internationally competitive

70

H. Guo et al.

industrial economy, and China has no previous advantages compared with some countries and regions such as Europe and the United States [19]. Therefore, only the post-production system, focusing on regional characteristics, will transform the resource advantage into a market advantage. Here, I have to mention some related TV programs in China. In response to the local characteristics, the local special resources have attracted the attention of the public, and through the reasonable and appropriate publicity in the later period, the public’s awareness and recognition of the culture has been strengthened, and the public has gradually attracted the voluntary participation. 5.3

Promote the Integration of Leisure Sports Industry with Other Industries with the Concept of “Big Culture”

The phenomenon of leisure sports is a social and cultural phenomenon, which belongs to the category of “big culture”. Due to the division of traditional duties of the administrative department, many of our cities have neglected the integration with the leisure sports industry in the development of cultural tourism and other industries. For example, for each city, there are leisure sports service departments such as stylistic fitness, but many of the tourism traffic maps or city business cards that are publicized in the city lack the propaganda of these leisure sports service nodes. Today, where leisure sports represent fashion and fashion, this will greatly affect the overall image of the city [20]. According to the industrial characteristics of leisure sports, it can carry out industrial penetration and industrial crossover with many other industries in the tertiary industry, such as the integration of leisure sports department and tourism department, the mutual penetration of leisure sports department and cultural creative department, leisure sports department and The intersection of modern electronic departments can promote the innovation of traditional industries, and then promote the optimization of urban industrial structure and the development of industry.

6 Conclusion With the advent of the leisure era, the construction boom of leisure cities has surged. According to the essential characteristics and internal requirements of the leisure city, we believe that the leisure sports industry should play an important role in this boom and give full play to its powerful functions. However, the function of the leisure sports industry is seriously absent during the practice development. The strategy to improve the functional strength of urban leisure sports is to accelerate the transformation and upgrading of urban leisure sports functional structure, improve the degree of specialization of urban leisure sports enterprises, promote the formation and development of leisure sports industry clusters, improve the industrialization of urban leisure sports, and enhance the leisure of urban government. Sports organization management awareness, etc., and its functional expansion also requires the joint efforts of leisure sports enterprises, communities, governments, groups, residents and other actors. Acknowledgments. This work was supported by Health China 2030: Jiangsu youth sports and health literacy promotion path research No. 2017SJB0691.

Coordinated Development of Leisure Sports Industry and Urban Culture

71

References 1. Zheng, S., Lin, G.H., et al.: Coordination of leisure agriculture, rural tourism and new countryside construction in Fujian Province. Fujian J. Agric. Sci. (2017) 2. Wang, S.J., Zhou, L.N., Cheng, L.I., et al.: Research on the interactive and integrated development of agriculture and tourism in poverty belt around Beijing and Tianjin. Hubei Agric. Sci. (2015) 3. Minxue, H.E., Wang, S., Liang, B., et al.: Study on the coordinated development of urban and rural sports in the process of urbanization. J. Liaoning Normal Univ. (2014) 4. Cui, Q.: Research on leisure sports activities development environment of urban senior citizens. J. Baoji Univ. Arts Sci. (2015) 5. Chen, J., Yuan, S., Xiaofeng, X.U.: On the coordinated development of sports leisure industry based on the JingJinJi region. Hubei Sports Sci. (2016) 6. Yu, H., Liu, Q., Zhang, X.: Study on the integration mechanism of recreational travel and urban development of tourist destination in developing city—taking Hefei city as an example. China Ancient City (2017) 7. Mei, L., Shun-Rong, H.U., Qiu, S.F.: Research on the construction of inner Mongolia city brand based on the coordinated development of service industry and urbanization. J. Brand Res. (2017) 8. Wei, X.F.: Study on the development of sports integration in Beijing, Tianjin and Hebei. J. Guangzhou Sport Univ. (2017) 9. Zhang, J.C.: Research on the development strategy of Beijing Olympic Games, mass sports in China. J. Jiamusi Vocat. Inst. (2015) 10. Zhong, H.M., Yu-Wei, L.I.: The Research of Beijing-Tianjin-Hebei leisure sports industry linkage development strategy. J. Nanjing Sport Inst. (2016) 11. Zhang, H., Lu, L.: Study on coordinated development of MICE industry and urban cities: a case of Beijing-Tianjin-Hebei metropolitan area and Yangtze river delta. Areal Res. Dev. (2017) 12. Wang, X., Ning, Q., et al.: Research on the coordination development of the new urbanization and industry in the ring of Changsha-Zhuzhou-Xiangtan urban agglomeration. Shanxi Archit. (2017) 13. Yan-Hui, G.U.: Study on strategy development of sports leisure industry in Hebei Province under the background of strategy of Beijing-Tianjin-Hebei coordinated development. Hebei Acad. J. (2014) 14. Lou, J.J., Li-Mei, L.I., Peng, X.U.: On the coordinated development of urban recreationalization in Shanghai. J. East China Normal Univ. (2015) 15. Jian, Y.U.: Development strategy of Chinese leisure sports industry under the new normal condition. J. Shandong Sport Univ. (2016) 16. Wang, Z.H., Yan, L.I.: Strategic design and implementation path of sports industry of Hebei provincial sports fitness and leisure circle around Beijing and Tianjin. J. Hebei Inst. Phys. Educ. (2015) 17. Li, S.: Analysis of the advantages to develop leisure sports tourism in Qingdao (2015) 18. Yang, S.S., Xie, D.T., Luo, Y.Z.: Study on the development layout and strategy of urban leisure agriculture in hilly and mountainous area under the ecological constraints. Human Agric. Sci. (2016 19. Liu, X.: Research on the current situation and countermeasures of the development of traditional sports tourism in Bozhou. J. Liupanshui Normal Univ. (2018) 20. Liu, G., Wang, X.L., et al.: Study on the development of modern leisure agriculture region of Hebei around Beijing and Tianjin. Leaders Companion (2017)

Quality Evaluation Research Based on Electronic Journals Published on Internet Wang Juan1(&) and Hou Yue2 1

The Library of Lanzhou Jiaotong University, Lanzhou 730070, China [email protected] 2 School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China

Abstract. In terms of the quality evaluation of electronic journals published on Internet, this paper carries out a qualitative attributes evaluation research based on the 2-tuple and designs and adopts corresponding linguistic evaluation sets to evaluate the journals. By designing the benchmark rank set, convert the linguistic attribute value of different linguistic evaluation sets into a fuzzy set which belongs to the benchmark rank set. Thus achieving the comparability among different linguistic evaluation sets, and their further and effective integration. In this way, the 2-tuple comprehensive evaluation values and their rankings of each journal can be obtained. Finally, a numerical example is given to illustrate the proposed evaluation method. Keywords: Electronic journals

 Qualitative attributes  Linguistic evaluation

1 Introduction Electronic journals published on Internet have become an important means of the issuance and communication in network times. However, in our country, the evaluation mechanism for network journals is not sound, and Internet publishing results can hardly obtain the same academic evaluation status as traditional publishing results, which seriously affect the development of network journals in China [1]. In order to improve the development and prosperity of electronic journals in our country, it is necessary to classify the quality of electronic journals published on Internet, so that the government management department could establish access mechanism and elimination system for electronic journals, which is beneficial for the vitality and tension of electronic journals’ long-term development. Some new characteristics that electronic journals published on Internet present attract the attention of relevant researches [1–3]. It is noteworthy that these new features not only embody the attributes which are unique to the electronic journals, and many of those attributes are qualitative indicators, and often require evaluation from the experts [4], but also require to use linguistic evaluation to embody the specific connotations and characteristics of each attribute accurately and fully.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 72–77, 2020. https://doi.org/10.1007/978-3-030-25128-4_10

Quality Evaluation Research Based on Electronic Journals

73

This paper boils down the quality evaluation of electronic journals published on Internet to a multi-attribute decision with linguistic evaluation value, and focuses on the evaluation research of the qualitative attributes. Language expression is the most suitable and appropriate way. When making a qualitative attributes evaluation on the it, you need to invite some experts to give subjective judgments. Therefore, in such decision matrix of multi-attribute decision-making problems, the evaluations on the attributes are expressed in fuzzy language in each scheme. Meanwhile, different linguistic evaluation sets are for different qualitative attributes. In the study of literature [3], in terms of authoritative indicators, using the linguistic evaluation set “okay, good, general, poor and bad” to evaluate the stability of sites, and in terms of personalized indicators, using the linguistic set “with and without” to evaluate and so on.

2 Problem Description and Linguistic Evaluation Basis 2.1

Problem Description

For the convenience of problem description, this paper adopts the following descriptors to describe the decision-making problem of qualitative attributes evaluation of the quality of electronic journals published on Internet. Note S = {S1, S2, , Sm} as a set of m schemes (i.e., electronic journals published on Internet), m  2. Note C = {C1, C2, , Cn} as a set of n attributes, n  2, W ¼ fx1 ; x2 ;    ; xn g is the weight vector of attribute, in which xj is the weight of P attribute Cj , 0  xj  1, and nj¼1 xj ¼ 1.   Note A ¼ aij mn as the linguistic decision matrix, in which aij represents the attribute value of attribute Cj in the form of linguistic term within scheme Si . Here, aij is the attribute   evaluation value of fuzzy linguistic type. In the linguistic decision matrix A ¼ aij mn , the evaluation value of each scheme in different columns (attributes) may come from different linguistic evaluation sets. In this way, a normalized evaluation set called Basic Linguistic Term Set (BLTS) (herein referred to as the reference level set) is needed to normalize different linguistic attribute evaluation values from different linguistic evaluation sets. 2.2

Relevant Concepts of Linguistic Evaluation

2.2.1 Linguistic Term In the complex and fuzzy economic decision-making environment, linguistic term can express people’s subjective feelings or judgments more accurately [5, 6]. Definition 1. A linguistic term T in the real number set R is defined as triangular fuzzy number (expressed as ðu; a; bÞ), which meets the following definitions lT : R ! ½0; 1 lT ð X Þ ¼

8 >
ub

:

0

x 2 ½a; u x 2 ½u; b other

ð1Þ

74

W. Juan and H. Yue

In the above definition, a  u  b, u is the module value, a and b stand for the right value and left value of linguistic term T respectively. 2.3

Basic Linguistic Term Set (BLTS)

In the linguistic decision matrix, the linguistic evaluation values of different attributes of each scheme may have different granularities (that is, from different linguistic evaluation sets), and thus the linguistic evaluation values are not directly comparable. Therefore, a normalization of them is needed. This paper adopts set {A+, A, A−, B+, B, B−, C} (also known as the benchmark evaluation set) as the basic linguistic term set, converting the linguistic evaluation values of different granularities into a fuzzy set of benchmark levels. For the convenience of description, note SB = {S1B, S2B, , SgB} as the basic linguistic term set. This paper adopts A+, A, A−, B+, B, B−, C as the constituent elements of the basic linguistic term set, and distinguish journals of good quality in more detail, making the quality evaluation of journals more convincing. While the journals of poor quality are classified as category C. In addition, if a specific classification (for example, more grades) is needed, you can determine the specific grades according to the practical problem, which does not affect the feasibility of the research methods proposed in this paper. 2.3.1

2-Tuple

Definition 2. Given a linguistic evaluation set S = {S1, S2, , Sg}, the 2-tuple set is called the 2-tuple on set S, k is the symbolic translation value of the term Si, and k 2 ½0:5; 0:5. Normally, the symbolic operation results (for example, x) based on the linguistic evaluation set S can be expressed as the 2-tuple on set S, namely x ! Si  ½0:5; 0:5Þ

ð2Þ

The specific calculation method of 2-tuple in formula (2) is shown by the following Definition 3. Definition 3. Assume a real number x 2 ½0:5; 0:5 is the real number of linguistic evaluation set S by certain aggregation method, in which g is the number of elements in the linguistic evaluation set S, then x can be expressed as 2-tuple information by the following function D: D : ½0; g ! S  ½0:5; 0:5  DðxÞ ¼

Si

i ¼ roundðxÞ

k ¼ x  i x 2 ½0:5; 0:5Þ

ð3Þ ð4Þ

Quality Evaluation Research Based on Electronic Journals

75

3 Aggregation Method 3.1

Calculation of Comprehensive Evaluation Value

Based on the decision matrix derived from Sect. 2.1, which is expressed SB, this paper adopts the method of weighted sums to calculate the comprehensive evaluation value of the decision schemes, Overalli ¼

  s Sji wj j¼1

Xn

ð5Þ

Wj is the weight of attribute Cj, j = 1, , n. The weight of each attribute can be given by the invited experts on the analytic hierarchy process [10]. 3.2

The Allocation of Ranking and Grading of Schemes

The comprehensive evaluation value Overalli of decision scheme Si calculated by the Sect. 2.2 is also the fuzzy set of SB, noted as: Overalli ¼

n

    o SB0 ; oij0 ; SB1 ; oij1 ;    SBg ; oijg ; ;

i ¼ 1;    ; m

ð6Þ

Thus, the comprehensive evaluation value di of decision scheme Si can be calculated. Pg koijk di ¼ Pk¼0 g ij k¼0 0k

i ¼ 1;    ; m

ð7Þ

The size comparison of the 2-tuples please refer to the literature [9].

4 Analysis of Examples In this section, this paper carries out a qualitative attribute evaluation in terms of five electronic journals published on Internet (noted as scheme S1, S2, S3, S4 and S5). The qualitative attributes refer to the stability of the site (C1), ease of use (C2), security (C3) and personalization (C4) respectively. In terms of the stability of the site, this paper uses the language set {“very good”, “good”, “ordinary”, “bad” and “very bad”} to evaluate, in terms of website’s ease of use, this paper uses the language set {“easy to use”, “ordinary” and “not easy to use”} to evaluate, in terms of security of the site, this paper adopts the language set {“very high”, “higher”, “high”, “ordinary”, “low”, “lower” and “very low”} to evaluate, and in terms of the personalization, this paper adopts the language set {“have” and “not have”} to evaluate. Specific data as shown below (Table 1):

76

W. Juan and H. Yue Table 1. The attribute evaluation of electronic journals published on Internet Scheme S1 S2 S3 S4 S5

Stability Very good Ordinary Good Bad Good

Ease of use Easy to use Ordinary Ordinary Ordinary Not easy to use

Security High High Higher Ordinary Ordinary

Personalization Not have Not have Have Have Have

According to the algorithm proposed above, normalize all the data of each column (using the seven linguistic evaluation sets as the basic linguistic evaluation set) and thus calculate the comprehensive evaluation value of each scheme are as follows: Overall1 ¼

Overall2 ¼

Overall3 ¼

Overall4 ¼

Overall5 ¼



         SB0 ; 0:2500 ; SB1 ; 0:1866 ; SB2 ; 0:1231 ; SB3 ; 0:1231 ; SB4 ; 0:4304 ;  B   

S5 ; 0:3354 ; SB6 ; 0:5



         SB0 ; 0:3134 ; SB1 ; 0:3760 ; SB2 ; 0:4585 ; SB3 ; 0:5597 ; SB4 ; 0:5854 ;  B   

S5 ; 0:1745 ; SB6 ; 0:0634



         SB0 ; 0:0634 ; SB1 ; 0:1269 ; SB2 ; 0:1866 ; SB3 ; 0:4146 ; SB4 ; 0:5121 ;  B   

S5 ; 0:7599 ; SB6 ; 0:4146



         SB0 ; 0:1609 ; SB1 ; 0:3394 ; SB2 ; 0:3991 ; SB3 ; 0:6609 ; SB4 ; 0:3097 ;  B   

S5 ; 0:3134 ; SB6 ; 0:3134



         SB0 ; 0:2500 ; SB1 ; 0:1866 ; SB2 ; 0:1231 ; SB3 ; 0:4743 ; SB4 ; 0:3255 ;  B   

S5 ; 0:3830 ; SB6 ; 0:3512

Further, according to the formula (7), it is calculated that the comprehensive evaluation value of single point value type of each journal are: d1 = 3.6953, d2 = 2.6002, d3 = 4.0674, d4 = 3.1267, d5 = 3.4293, thus it can be calculated that the 2-tuple evaluation value of each journal are: S1: (A−, −0.3047), S2: (B+, −0.3998), S3: (A−, 0.0674), S4: (B+, 0.1267), S5: (B+, 0.4293). According to the size comparison method of 2-tuples proposed in Ref. [9], the ranking of the journals is as follows: S3 > S1 > S5 > S4 > S2.

5 Conclusions This paper proposes index subjective weight determination method based on analytical method of binary semantic level. By defining transitional matrix, and proving the transitional matrix keep expert judgement matrix unchanged, and is fuzzy complementary matrix, and adjusting it as satisfactory consistency matrix, in order to

Quality Evaluation Research Based on Electronic Journals

77

determine the subjective weight of evaluation index, effectively avoid the information loss and imprecise problems of conventional information processing method. The experimental results show the method can effectively determine the subjective weights of evaluation indexes, has good enlightening significance and practical value. In view of the fact that there exists problems in terms of the quality evaluation of electronic journals published on Internet, this paper puts forward the qualitative attribute evaluation research method based on 2-tuple. First of all, the method attributes the quality evaluation of electronic journals published on Internet to multi-attribute decision making with fuzzy linguistic evaluation information. At the same time, this method can allow different qualitative attributes to use corresponding and different linguistic evaluation set to evaluate each journal, which is in accordance with the actual situation of the problem. Further, through the establishment of the basic linguistic term set, the method converts the linguistic attribute evaluation values with different granularities (from different linguistic evaluation sets) into a fuzzy set of the basic linguistic term set, thus achieving the normalization of the multi-granularity linguistic evaluation, making them comparable and further their effective integration. Acknowledgments. This research was supported by the National Social Science foundation of China (No. 14CTQ029).

References 1. Xie, X., Wan, M., Ke, X.: Research on the development and evaluation of network journals. Publ. J. 17(1), 22–28 (2009) 2. Dang, Y., Wang, L., Gao, F.: Change and development of the main evaluation index for JCR online journals. Chin. J. Sci. Technol. Res. 18(6), 951–956 (2007) 3. Zhang, X.: Comparative analysis of pure network electronic journals at home and abroad. Libr. J. 33(1), 133–136 (2011) 4. Cui, G.: Analysis of the development trend of pure network electronic journals. J. Xi’an Coll. Liberal Arts Nat. Sci. Ed. 10(2), 121–124 (2007) 5. Zadeh, L.A.: A computational approach to fuzzy quantifiers in natural languages. Comput. Math. Appl. 9, 149–184 (1983) 6. Herrera, F., Herrera-Viedma, E.: Linguistic decision analysis: steps for solving decision problems under linguistic information. Fuzzy Sets Syst. 115(1), 67–82 (2000) 7. Xu, Z.S.: Uncertain linguistic aggregation operators based approach to multiple attribute group decision making under uncertain linguistic environment. Inf. Sci. 168, 171–184 (2004) 8. Xu, Z.: Group decision-making method based on the multi-attribute term indicators of linguistic evaluation scale. J. Syst. Eng. 20(1), 84–88 (2005) 9. Herrera, F., Martinez, L., Sanchez, P.J.: Managing non-homogeneous information in group decision making. Eur. J. Oper. Res. 166, 115–132 (2005)

A New Type Building Fire Protection Facility Monitoring System Yufeng Fan(&), Lei Zhang, and Yang Du Shenyang Fire Research Institute of Ministry of Public Security, Shenyang, Liaoning, China {fanyufeng,zhanglei,duyang}@syfri.cn Abstract. This paper starts from the status quo of urban fire remote monitoring system technology implementation, analyzes the technical specifications of the relevant standards and standards of urban fire remote monitoring system in detail, and clarifies from the technical point of view that the current promotion and application of urban fire remote monitoring system has not achieved the expected results. A new type of building fire protection equipment monitoring system and automatic labeling method for facility components is proposed and designed in this paper, has solved the problems of complicated connection of equipment for monitoring fire protection facilities, difficult data collection, difficult implementation, and high human resources for networked units, and have changed the symptoms of the current implementation of the building fire protection monitoring system. Keywords: Urban fire remote monitoring system  Fire automatic alarm system  Fire protection facilities  Component marking

1 Background Introduction In recent years, with the continuous development of China’s economy, the scale of the city has been expanding, and the commercial and civil buildings in the city have also shown an explosive growth trend. According to the statistics of the Ministry of Public Security Fire Department at the end of 2017, The China’s urban high-rise buildings volume had reached 619,000, had ranked first in the world in terms of volume and height [1]. At the same time, China’s “Fire Law” also has clearly stipulated: “Fire first and second-level pipeline units must install a building fire-fighting system”, however, due to the lack of effective supervision, the efficiency and integrity of the building fire protection system in the actual use process are relatively low, fails to effectively protect the building from fire prevention and fire extinguishing [2, 3]. In order to solve the problem of low efficiency and goodness of the building fire protection system, in the last actual 90s, the concept of “urban fire remote monitoring system” was put forward in the area, and a series of specifications and standards were established in the follow-up. The urban fire remote monitoring system was consisted of three parts, the monitoring center, the transmission network and the networking unit [4, 5]. The specific implementation method is to install a user information transmission device in the networked unit, use the device to match various types of controllers (fire © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 78–87, 2020. https://doi.org/10.1007/978-3-030-25128-4_11

A New Type Building Fire Protection Facility Monitoring System

79

alarm controller, linkage controller, water system controller, etc.) inside the networked unit, and the various types of information collected are uploaded to the monitoring center through a wireless network to realize real-time dynamic monitoring of the state of the fire protection facility system inside the networked unit. The collected data will be shared to the fire supervision department in real time. The supervision department will supervise and rectify the networked units according to the data in real-time operation, and improve the efficiency and integrity of the building fire protection facilities system [6]. The specifications and standards currently involved are shown in Table 1 below [7–14]: Table 1. National standards table Serial number 1 2 3 4 5 6 7 8 9

Document nature

Document name

National specification GB 50440-2007 Technical specification for urban fire remote monitoring system National specification GB 50116-2013 Design specification for fire automatic alarm system National specification GB 16806-2006 Fire linkage control system National standard GB 26875.1-2011 Urban fire remote monitoring system Part 1: User information transmission device National standard GB 26875.2-2011 Urban fire remote monitoring system Part 2: Communication server software functional requirements National standard GB 26875.3-2011 Urban fire remote monitoring system Part 3: Alarm transmission network communication protocol National standard GB/T 26875.4-2011 Urban fire remote monitoring system Part 4: Basic data items National standard GB 26875.5-2011 Urban fire remote monitoring system Part 5: Acceptance of software functional requirements National standard GB 26875.6-2011 Urban fire remote monitoring system Part 6: Information management software functional requirements

The network structure diagram of the traditional building fire protection facility monitoring system is shown in Fig. 1.

Fig. 1. Network structure diagram of traditional building fire protection facility monitoring system

80

Y. Fan et al.

As can be seen from the above figure, the fire control room of the network unit includes fire alarm controller, fire linkage controller, flammable gas alarm controller and other building fire protection facilities systems, 1–n user information transmission devices, fire control room graphic display device. The national specification “GB 50116-2013 fire automatic alarm system design specification” stipulates: “6.9.1 Fire control room graphic display device shall be set in the fire control room, and shall meet the installation and setting requirements of the fire alarm controller. 6.9.2 A dedicated line connection should be used between the fire control room graphic display device and fire alarm controllers, fire linkage controllers, electrical fire monitors, and flammable gas alarm controllers” [7]. It can also be seen from the above figure that in the traditional building fire protection facility monitoring system, various fire protection facility system controllers will simultaneously establish a connection with the user information transmission device and the fire control room graphic display device, and upload the fire protection facility status information to the user information transmission device and the fire control room graphic display device, the user information transmission device will transmit the received fire protection facility status information to the monitoring center through the wireless transmission network, and the protocol standard to be followed is “GB 26875.3-2011 Urban Fire Remote Monitoring System No. 3 Part: Alarm Transmission Network Communication Protocol”. The national specification “GB 168062006 fire linkage control system” 4.9 fire control room graphic display device 4.9.5 information transmission requirements: “4.9.5.1 fire control room graphic display device within 10s after receiving the system fire alarm signal should transmit to the monitoring center according to the specified communication protocol format” [8, 11]. But the GB16806-2006 does not specify the communication protocol format, so the specification does not have the implementation. From the perspective of the actual promotion and application, the urban fire remote monitoring system has not achieved the expected results. The main reasons are as follows: From the technical analysis, the urban fire remote monitoring system has not solved the problem fundamentally, but it has added an additional monitoring means. In essence, there is no technical improvement in the efficiency and integrity of the building fire protection system. In addition, in the specific implementation process, while various types of building fire protection facilities are connected to the user information transmission device, as the country has not issued relevant system external output data protocol standards, and the construction fire protection facility system external transmission data protocol is a key part of the system, building fire protection facility system manufacturers are reluctant to disclose data export protocols. Therefore, in the connection process, the modes of protocol collection, analysis, and cracking are adopted. It is difficult, and the probability of problems in the middle is also large. The building fire protection facility system manufacturers are generally equipped with the fire-control room graphic display device produced by their own manufacturers. While

A New Type Building Fire Protection Facility Monitoring System

81

the system is connected to the graphic display device, it belongs to the internal data transmission communication, and there is no problem of the transmission data protocol crack. From the analysis of funds, the urban fire remote monitoring system needs to add one or more user information transmission device equipment in the networked unit. The current market price of the equipment ranges from several thousand to several tens of thousands, which seriously increases the economic burden of the networked unit. From the manpower analysis, after the urban fire remote monitoring system requires the network unit to access the system, it is necessary to upload the building plan of the unit, and mark the location of the fire protection system components and related location information one by one on the plan. Some buildings are large, there are tens of thousands of points in the fire protection system components. If they Based on the above analysis, in order to solve the above problems, this paper proposes a new type of building fire protection facility monitoring system to solve the problems of complicated connection equipment for building fire protection facilities, difficult data collection, difficult implementation, and high investing human resources for networked units. And changes the symptoms of the current.

2 A New Type of Building Fire Protection Facility Monitoring System This paper designs a new type of building fire protection facility monitoring system and automatic labeling method for facility components to solve the existing deficiencies that auxiliary monitoring facilities are over-invested and the implementation effect is not obvious, and at the same time it has positive and important significance for improving the service quality of the building fire protection facilities system. The system composition diagram is shown in Fig. 2 below.

Fig. 2. Composition of a new type of building fire protection monitoring system

82

2.1

Y. Fan et al.

A New Type of Building Fire Protection Facilities Monitoring System Composition Diagram

A building fire protection facility monitoring system consists of four parts of the building fire protection system controller, the fire control room graphic display device, the wireless transmission network and the monitoring center. The monitoring center function is to receive, analyze, and store various types of information from the building fire protection system controller of the networked unit, information include network unit information, building information, building fire protection facility location information, and building fire protection facility status information. The wireless transmission networks include various types of wired public/network, public mobile communication networks and wireless data private networks. The main function of the wireless transmission networks is to connect the monitoring center and the networking unit, and to be responsible for information communication. Networked unit fire control rooms are set in the networked unit, there are fire alarm controller, fire linkage controller, fire control room graphic display device, electrical fire monitor in networked unit fire control room, various controllers are connected to the control room graphic display device, the controller can report the fire protection facility status information to the fire control room graphic display device. The fire control room graphic display device will receive the data according to GB 26875.32011 “Urban Fire Remote Monitoring System Part 3: Alarm Transmission Network Communication Protocol” (extension) which is reported to the monitoring center through a wireless transmission network. 2.2

A New Type of Construction Fire Protection Facility Monitoring System Implementation

In order to achieve the purpose of this paper, the communication protocol between the fire control room graphic display device and the monitoring center adopts GB 26875.32011 “Urban Fire Remote Monitoring System Part 3: Alarm Transmission Network Communication Protocol”. The main body of the protocol is transformed from the user information transmission device to the fire control room graphic display device, but the protocol needs to be expanded. On the basis of compatibility with the traditional urban fire remote monitoring system, it realizes the superposition of the rapid standard functions of the building fire protection facilities, reduces the complexity of the system connection and saves the user cost. (1) Expand the upstream instruction “Uploading Networked Building Plans” Instruction description: Type value: 128, instruction description: upload the floor plan of the network unit, instruction direction: up (fire control room graphic display device ! monitoring center). The information body is shown in Table 2 below.

A New Type Building Fire Protection Facility Monitoring System

83

Table 2. Network structure of building unit floor plan Building code (1 byte) Floor code (1 byte) Building plan ( > < mi ðtÞ ¼ bestðtÞworstðtÞ mi ðtÞ Mi ðtÞ ¼ P N > > : mj ðtÞ

ð3Þ

j¼1

Where fiti ðtÞ indicates the fitness value of the particle Xi , normalizing the fitness value of the particle to [0, 1] by mi ðtÞ, which taking the proportion of the total mass Mi ðtÞ as the mass of the particle. The symbol bestðtÞ represents the best solution at the moment t, while worstðtÞ is the worst solution at the moment t, they can be expressed as: bestðtÞ ¼

max

i2f1;2;;Ng

worstðtÞ ¼

min

fiti ðtÞ

i2f1;2;;Ng

fiti ðtÞ

ð4Þ ð5Þ

The gravitational force of the object j at t moment in the kth dimension is: Fijk ðtÞ ¼ GðtÞ

Mpt ðtÞ  Maj ðtÞ k ðxj ðtÞ  xki ðtÞÞ Rij ðtÞ þ e

ð6Þ

Where e represent a constant; GðtÞ represents the gravitational constant that changes over time, whose value is determined by the true age of the universe. The longer the universe is, the smaller the gravitational constant value gets. GðtÞ can be shown as: GðtÞ ¼ G0  eat=T

ð7Þ

In the formula (7), G0 is equal to 100 while a is equal to 20. The symbol T indicates the maximum iteration times. Therefore, at the moment t, the sum of the forces acting on Xi in the kth dimension is equal to the sum of the forces of all other objects. Fijk ðtÞ ¼

N X j¼1;j6¼i

randj Fijk ðtÞ

ð8Þ

When the particles are subjected to the gravitational force of other particles during the movement, speed and acceleration are generated. The acceleration determines the change of the velocity while the velocity change determines the change of the

1580

J. Wu et al.

displacement. The acceleration of the particle is equal to the ratio of the force to the mass, thereby the acceleration of the object in the kth dimension can be stated as: aki ðtÞ ¼

Fik ðtÞ Mii ðtÞ

ð9Þ

Based on the calculated acceleration, the particle updates the position and velocity of the particle by the following formulas. 

3.3

vki ðt þ 1Þ ¼ randi  vki ðtÞ þ aki ðtÞ xki ðt þ 1Þ ¼ xki ðtÞ þ vki ðt þ 1Þ

ð10Þ

The Flowchart of the Fault Diagnosis Based on GSA-SAE

The four-layer SAE network structure is used to perform automatic feature extraction of the inverter monitoring signals and classification of multiple faults, namely one input layer, two hidden layers and one output layer. Assume that the numbers of neurons in the first and second layers of the hidden layer are nm1 and nm2 respectively. The purpose of optimizing the SAE network structure by GSA is to obtain the optimal number of hidden layer nodes nm1 and nm2 so that the multiple faults classification of the three-level NPC inverter has the best accuracy. If the accuracy of the fault diagnosis is defined as Acc = g(nm1, nm2), since the maximum diagnostic rate is 100%, f(nm1, nm2) = 1-Acc is used as the fitness function of the GSA optimization algorithm and it can be equivalent to a minimum optimization problem. The basic process of three-level NPC inverter composite fault diagnosis based on GSA-SAE is shown in Fig. 3. The main steps are as follows: (1) Selecting the signal testing point for the three-level inverter and collecting the bridge arm phase voltage signal. (2) The acquired voltage signal is preprocessed, and the load phase voltage signal is obtained by Fast Fourier Transform (FFT) to get its frequency domain features and constitute a fault eigenvector. (3) Normalizing the fault feature vector and divide the fault sample into training set and test set. (4) Initializing the GSA algorithm and the basic parameters of the SAE network, then, using the divided training sample dataset to perform unsupervised training on the SAE network model. Simultaneously, taking the GSA algorithm to solve the fitness function, in order to obtain the optimal number nm1 and nm2 of hidden layer nodes when the fault diagnosis rate gets maximum value. (5) The optimized GSA-SAE network is used to classify the test sample set, and finally achieve accurate classification of the inverter multiple fault diagnosis.

Multiple Faults Detection of Three-Level NPC Inverter

1581

three-level NPC inverter load phase voltage acquisition fault eigenvector constituted by three-phase load phase voltage frequency feature Normalize and generate sample data

Training sample data set

Test sample data set

Optimize the number of SAE hidden layer nodes using GSA Get the optimized SAE classification model

Fault mode classification

Fig. 3. The diagnosis flowchart of three-level NPC inverter based on GSA-SAE

4 Simulation Results and Analysis The MATLAB2016a/simulink simulation software is used to build the NPC three-level inverter circuit model. The input voltage is 200 V, the sampling frequency is 1 MHz, and the simulation time is set to 0.1 s. Set the capacitance tolerance of the three-level inverter to ±10%, and perform 100 times Monte Carlo analysis on the seven failure modes, so that each failure mode contains 100 fault sample data. Therefore, there are 700 sets of fault characteristics in the seven failure modes, and 80% of the sample data is selected as the training set while the remaining 20% is used as the test set. In order to facilitate the automatic extraction of deep features by the SAE network, the 600 components of the phase voltage spectrum of each phase are intercepted, that is, the number of neurons in the SAE network input layer is 1800, the number of nodes in the output layer is 7, and the number of nodes in the hidden layer is determined by the GSA optimization algorithm. The range of the number of hidden layer nodes in the first layer is set to [50,800] while the range of the number of nodes in the second layer of hidden layers is set to [50,600]. The 560 training data set is used to train the SAE network, as well as the network is optimized according to the flowchart shown in Fig. 3. It is concluded that the number of hidden layer nodes nm1 and nm2 of SAE network is 566 and 107 when the fault classification accuracy gets the highest value. In order to verify the validity and feasibility of the proposed method, the traditional BP neural network and support vector machine SVM diagnosis method are also considered, the classification accuracy of each multiple fault of the three-level inverter is shown in Table 2.

1582

J. Wu et al. Table 2. The classification accuracy of multiple faults for three-level inverter Methods

The classification accuracy of each fault mode FC0 FC1 FC2 FC3 FC4 FC5 FC6 BPNN 100% 75% 90% 90% 80% 75% 75% SVM 100% 85% 95% 95% 90% 90% 90% GSA-SAE 100% 100% 100% 100% 100% 100% 100%

ACA 83.57% 92.14% 100%

It can be seen from Table 2 that the classification accuracy of the multiple faults based on BPNN, SVM and GSA-DBN is 83.57%, 92.14% and 100%, respectively. Therefore, it can be known that the accuracy of the multiple fault diagnosis of the threelevel NPC inverter of the proposed GSA-SAE is better than the traditional BPNN and SVM methods. Due to the symmetry of the three-level inverter topology, when two different power switches occur open circuit faults, the fault characteristics may be similar, which makes it difficult for traditional BPNN and SVM to effectively identify the fault modes. Hence, the deep learning method used in this paper is adopted that GSA-SAE can further extract deep features, as well as identify different multiple fault types accurately. This research can lay a theoretical foundation for improving the reliability and safety of power electronic systems.

5 Conclusion In order to solve the problem in low diagnosis performance for the three-level NPC inverter, this paper studied a fault diagnosis method based on improved deep learning network which can extract features automatically and develop the deep feature information between different multiple faults. At the same time, the proposed fault diagnosis idea by GSA-SAE also solves the difficulty of the hidden layer node selection in SAE network. The simulation results show that the GSA-SAE diagnostic method has better fault classification performance that the obtained classification accuracy is better than the traditional BPNN and SVM methods which can get 100%. The validity and feasibility of the proposed method are verified and it will provide a theoretical basis for power electronic system health management. Acknowledgement. This work is supported by Shanghai Science and Technology Innovation Plan (17595800900).

References 1. Teymour, H.R., Sutanto, D., Muttaqi, K.M., et al.: Solar PV and battery storage integration using a new configuration of a three-level NPC inverter with advanced control strategy. IEEE Trans. Energy Convers. 29(2), 354–365 (2014) 2. Livera, A., Theristis, M., Makrides, G., et al.: Recent advances in failure diagnosis techniques based on performance data analysis for grid-connected photovoltaic systems. Renewable Energy 133, 126–143 (2019)

Multiple Faults Detection of Three-Level NPC Inverter

1583

3. Wang, B., Cai, J., Du, X., et al.: Review of power semiconductor device reliability for power converters. CPSS Trans. Power Electron. Appl. 2(2), 101–117 (2017) 4. Song, Y., Wang, B.: Survey on reliability of power electronic systems. IEEE Trans. Power Electron. 28(1), 591–604 (2013) 5. Choi, U., Lee, J., Blaabjerg, F., et al.: Open-circuit fault diagnosis and fault-tolerant control for a grid-connected NPC inverter. IEEE Trans. Power Electron. 31(10), 7234–7247 (2016) 6. Shen, Y., Miao, B.: Open circuit fault diagnosis strategy for switch of three level inverter. J. Syst. Simul. 30(8), 3058–3065 (2018) 7. Dhumale, R.B., Lokhande, S.D.: Neural network fault diagnosis of voltage source inverter under variable load conditions at different frequencies. Measurement 91, 565–575 (2016) 8. Abari, I., Lahouar, A., Hamouda, M., et al.: Fault detection methods for three-level NPC inverter based on DC-bus electromagnetic signatures. IEEE Trans. Ind. Electron. 65(7), 5224–5236 (2018) 9. Sun, Q., Wang, Y., Jiang, Y.: A novel fault diagnostic approach for DC-DC converters based on CSA-DBN. IEEE Access 6, 6273–6285 (2018) 10. Qi, Y., Shen, C., Wang, D., et al.: Stacked sparse autoencoder-based deep network for fault diagnosis of rotating machinery. IEEE Access 5, 15066–15079 (2017)

Smart and HD Bayonet Comprehensively Search System Yixian Tan(&) and Yanfeng Shang The Third Research Institute of Ministry of Public Security, BiSheng Road Number 339, Shanghai, Pudong, China [email protected]

Abstract. In recent years, with the gradual advancement of the construction of monitoring and networking platforms, the availability of massive data has become more and more prominent. Image resources and existing public information systems are not able to send information together, which makes them the isolated information islands. In this paper, a smart and high-definition camera at bayonet comprehensively search system is analyzed and designed. It can detect all the targets which need small or great attention. Once the monitoring system is used, the comprehensive level of public security will be definitely improved. Keywords: Video structured description

 Smart video monitoring system

1 Background Massive HD bayonet image data is a kind of precious data accumulated during the time to construct informatization, and it plays an important role in the public security service. However, with the gradual advancement of the construction of monitoring and networking platforms, the unavailability of massive data has become more and more serious. The problems of massive data such as “can not find existing data”, “cost too much time to search for data” have become the biggest obstacle to successfully apply the HD monitoring system. Image resources and existing public information systems are not able to send information together, which makes them the isolated information islands. Faced with the above situation, we design a smart and high-definition monitoring system comprehensively search system based on video structured description in this paper. We translate the images into the text information that can be understood by computers and people. This system can realize the business functions such as data structure, conditional filtering, and fast searching, which reduces the time of policemen to repeatedly search for videos and image from the massive resources. As a result, plenty of police force can be released and put into the process of cross-time analysis and comprehensive judgment of the results. The smart and high-definition monitoring system can be extremely helpful in veracity.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1584–1588, 2020. https://doi.org/10.1007/978-3-030-25128-4_196

Smart and HD Bayonet Comprehensively Search System

1585

2 System Analysis As shown in Fig. 1, the smart and high-definition monitoring system comprehensively search system can be divided into three layers. From low to high, respectively, there lays a reception layer to receive high-definition images from road bayonet, a description layer to analyze images and an application layer to be utilized by the users. In order to completely solve the searching problem of HD monitoring system, the three layers will be separately analyzed in the following content.

Fig. 1. Hierarchical architecture of the smart and HD monitoring search system

The first of first, in the access layer, we analyze the targets captured by a highdefinition monitoring system and find that the targets can be divided into standardlicense-plate vehicles, non-standard-license-plate vehicles (including tricycles, motorcycles, electro mobiles, bicycles, etc.) and fake-license-plate vehicles. After that, in the description layer, due to the existence of non-standard-licenseplate vehicles and fake-license-plate vehicles, simple license plate recognition cannot meet the demands of the system. We have introduced more features of vehicles, including models, logos, body colors, etc., and adopted image feature calculation and smart comparison techniques. Finally, in the application layer, we add image searching and partial features searching. As a result, all the targets captured by the system can be searched and found.

1586

Y. Tan and Y. Shang

3 System Design 3.1

System Framework Design

The smart HD monitoring system comprehensively search system mainly includes a structured description module, a search module, a structured database, and finally outputs search results, as shown in Fig. 2. The structured description module structurally describes images collected by the front end, and stores the structured description data into the structured database. The search module can perform text searching through the structured database, image searching and partial feature searching. It will finally output search results.

Fig. 2. Integral architecture of the smart and HD monitoring system

3.2

Structured Description Module Design

The identifiable contents in the HD bayonet images include: vehicles’ license plate, vehicles’ color, vehicles’ category, vehicles’ brand, sun visor, seat belt, mobile phone, wearing mask, dangerous-goods-carrying cars, non-motor vehicle category, etc. The specific instructions are as follows: (1) Vehicles’ license plate: All kinds of standard license plates for motor vehicles can be identified. (2) Vehicle color: Common colors such as brown, gray, white, red, green, blue, cyan, yellow, and black can be recognized. (3) Vehicles’ category: Common categories such as cars, commercial vehicles, offroad vehicles, vans, small passenger cars, large passenger cars, minivans, large trucks, heavy goods vehicles, and tricycles can be identified. (4) Vehicles’ brand: Common brands such as Volkswagen, Audi, BMW, Porsche, Buick, Honda and Peugeot can be identified. (5) Sun visor identification: It can detect whether the sun visors are lowered or not in front seats. In the criminal investigation and inspection control, the identification

Smart and HD Bayonet Comprehensively Search System

(6)

(7)

(8)

(9)

(10)

3.3

1587

information can be better used for the preliminary screening of the suspicious vehicle. For example, a vehicle that people still put down the sun visors at night could be the suspicious vehicle. Seat belt identification: It is able to detect whether the front row passengers are wearing seat belts. People who do not wear safe belts in front row can be punished according to the Road Traffic Safety Law and the implementation regulations. Mobile phone identification: The system can identify and detect whether the driver is using a mobile phone, and can play a good traffic management for this kind of illegal driving. Wearing a mask: The system can identify whether the driver wears a mask. In the criminal investigation and inspection control, the person wearing the mask in the car is the most suspicious one. The identification information can be better utilized for the preliminary screening of the suspicious vehicle. Dangerous-goods-carrying vehicles: The identification of dangerous goods vehicles can be realized through the feature detection of dangerous goods vehicles, which can provide basic functional guarantee for the special rectification and management of such kind of vehicles. Non-motor vehicle category: The system can identify targets such as tricycles, electric motorcycles, electric bicycles, bicycles, motorcycles, light motorcycles and pedestrians. Retrieval Module Design

(1) Text search: By inputting the basic characteristics of the target vehicles’ color, license plate, logo, and vehicle type, it is able to find a target that meets the conditions, and can also perform a combined search for various conditions. At the same time, conditions such as seat belts and sun visors can be filtered. (2) Image search: Vehicle pictures similar to the target can be found, according to the given target image. (3) Partial features search: In a given target image, by manual circle selection, the partial features of the vehicle to be searched and framed, for example, annual inspection mark, interior decoration, hanging ornament, signage, etc. Images with similar partial features can be found. The search results are sorted by matching degree or condition and displayed as thumbnails. Image search and partial features search can be combined with text search, that is, filtering by vehicle color, model, brand and other features to narrow the search range.

4 Conclusion The smart HD comprehensively search system completely solves the searching problem of HD images from bayonet, and all the targets captured by the HD monitoring system can be searched. The system can perform various classification searches on standard-license-plate vehicles, and can also query non-standard-license-plate vehicles

1588

Y. Tan and Y. Shang

through image search. At the same time, it also provides partial feature search to solve the search problem of fake-license-plate vehicles. It can improve the investigation efficiency of public security and meet the requirements of social security management. Acknowledgements. The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. In part by National key research and development plan under Grant 2016YFC0801304.

References 1. Li, C.: Application research of vehicle identification platform based on image structured description. Suzhou University (2016) 2. Zhang, Y.: Application research of high-definition video electronic police system based on video analysis and processing. Fudan University (2011) 3. Gu, S.: Design of vehicle video retrieval system based on multi-attribute hierarchy recognition. Comput. Telecommun. (7), 14–16 (2017) 4. Duan, N., Wang, L.: Image retrieval of global and its personalized regional features. Comput. Sci. 43(s2), 205–207 (2016) 5. Chen, J.: Application research of image synthesis platform based on video structured description. Suzhou University (2014)

The Modeling Platform for Video Surveillance Knowledge Base Xiaorong Xia(&), Yixian Tan, and Yanfeng Shang The Third Research Institute of the Ministry of Public Security, Shanghai 201204, People’s Republic of China [email protected]

Abstract. Video surveillance applications involve video content modeling, video understanding, video retrieval service and data management, which rely on the exploration of video surveillance knowledge base. In this study, we explore a modeling platform for video surveillance knowledge base, which supports the establishment of classification and association relations between concepts, and to form the domain ontology related to video surveillance applications. The platform contains three main tools, with which reasoning and new knowledge is carried out on the basis of the image semantic annotation information. Keywords: Modeling platform

 Knowledge base  Video surveillance

1 Introduction Video surveillance knowledge base [1] includes not only relevant application experience and knowledge, but also the modeling and expression of application requirements, application objectives and application process of surveillance video. It is the basis of on-demand service for intelligence video application, and provides basic knowledge services for other technical links such as video content modeling, video understanding, video retrieval service, data management, software support environment, etc. Meanwhile, video knowledge ontology and image ontology are the basis of realizing heterogeneous information interoperability, and can effectively promote the integration of public security information resources. In most current video surveillance applications, video annotation [2] mainly adopts manual annotation, which cannot effectively support the semantic retrieval of video. Also, it is difficult to ensure the accuracy of the retrieval. Therefore, the requirement of video semantic annotation becomes more and more urgent. There are many studies on semantic knowledge representation. Standards or methods about semantic metadata and semantic modeling have been formed. The most famous ones are RDF (Resource Description Framework) [3] and OWL (Web Ontology Language) [4]. However, the construction and application of semantic knowledge base technology in video and image understanding is still in the early stage, which lacks the corresponding technology and equipment support. How to provide an effective knowledge base modeling environment for the construction of public security video surveillance is still an urgent problem in the application of video surveillance. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1589–1594, 2020. https://doi.org/10.1007/978-3-030-25128-4_197

1590

X. Xia et al.

This paper studies the construction of semantic knowledge base and knowledge reasoning methods for video surveillance applications. For the specific application areas related to video surveillance, with the assistance of domain experts, the corresponding modeling environment is provided to support the establishment of classification and association relations between concepts, and to form the domain ontology related to video surveillance applications. On the basis of domain ontology, the domain business rules are constructed to meet the specific application requirements. Based on this, a knowledge base covering relevant video surveillance applications is constructed.

2 The Architecture of the Modeling Environment To meet the above requirements, we propose a design and development environment of video surveillance knowledge base, including domain ontology modeling, domain rule editing, knowledge query, domain knowledge-based image annotation and reasoning and other functional modules. The video surveillance knowledge base provides two kinds of interfaces for domain experts and ordinary users. On the one hand, domain experts are allowed to input knowledge samples, edit rules and ontologies. On the other hand, users are supported to query knowledge and annotate images, and the corresponding reasoning results are obtained. At the bottom level, ontology parsing/reasoning engine and rule reasoning engine are provided to support parsing and reasoning. Relevant video surveillance knowledge is stored and managed uniformly in the knowledge base. Further, we determined the overall architecture design and the development plan. The overall function module structure of the knowledge base modeling environment is shown in Fig. 1.

Fig. 1. The architecture of the modeling environment

The Modeling Platform for Video Surveillance Knowledge Base

1591

In order to facilitate the use, management and maintenance of the software, the above functions of the video surveillance knowledge base modeling platform are divided into three software tools: ontology-based domain knowledge modeling tool, domain rule modeling and knowledge query tool, and domain knowledge-based image annotation and reasoning tool. The functions of the above tools are relatively independent. They are loosely coupled with each other through OWL files.

3 Tools of Video Surveillance Knowledge Base 3.1

Ontology-Based Domain Knowledge Modeling Tool

This tool is mainly responsible for the creation of video surveillance application ontology. Modeling tools can help users to create and edit ontology concepts, object attributes, data type attributes and instances. In the process of modeling, ontology can consistency be checked to ensure the ontology consistency. Finally, ontology can be exported as OWL files. Well-structured OWL files can be parsed and imported into tools for editing. The class level design of the tool is introduced with the ontology concept class and the data attribute class. Ontology conceptual classes involve operations such as importing and exporting ontologies, displaying classes, and the adding, modifying and deleting of classes, class annotations and class descriptions. In addition, drag-and-drop operation is implemented in class display, which can flexibly modify the class tree. The operations of object attributes in ontology mainly include the addition, modification and deletion of object attributes, object attribute definition fields, object attribute value fields, object attribute annotations, and the description of object attributes. It also includes the display, addition, modification and deletion of equivalent properties, and the setting of object attribute functions, etc. 3.2

Domain Rule Modeling and Knowledge Query Tool

In terms of domain rule editing, the semantic web rule language (SWRL) is used to describe the business rules in the domain. The corresponding modeling tools are developed to assist creating and editing business rules that follow the SWRL specification. This tool can support the construction of main built-in functions in SWRL, such as swrlb: greaterThan. In the process of rule editing, it provides corresponding checking mechanism to ensure that the rule grammar conforms to the SWRL specification. At the same time, according to the actual requirements of rule reasoning in public security video applications, a specific built-in function is customized, developed, and registered in the rule reasoning engine to support the complex definition of reasoning rules. The specific functions of domain rule editing are described as follows: 1. Create rules: (a) users click the “Create rules” button; (b) the system pops up the “Create rules” dialog box; (c) users create a SWRL rule through the dialog box; (d) users click the “Generate rules” button; (e) the system writes user-created SWRL rules into the ontology file.

1592

X. Xia et al.

2. Editing rules: (a) user chooses a SWRL rule that needs editing; (b) user clicks the “Editing Rules” button; (c) the system pops up the “Editing Rules” dialog box and displays the existing components of the rules to be edited; (d) user creates a new SWRL rule on the basis of the rules to be edited; (e) user clicks the “Generating Rules” button; (f) the built SWRL rules are written to the ontology file. 3. Delete Rules: (a) user chooses a SWRL rule to delete; (b) user clicks the “Delete Rules” button; (c) the system deletes the SWRL rule from the ontology file. In order to query and manage knowledge efficiently, after constructing OWL ontology and corresponding instance files, we use RDF triple store to store ontology. We establish a query mechanism based on SPARQL, and realize a complex query mechanism for video surveillance knowledge. The SPARQL inquiry operations mainly include: database information configuration operations, ontology information SPARQL inquiry operations, and ontology information inputting operations. The data table of the knowledge base is shown in Table 1. Table 1. The data table of the knowledge base Field Graph Subject Predicate Object

3.3

Type varchar varchar varchar varchar

Requirement NOT NULL NOT NULL NOT NULL NOT NULL

Description Ontology IRI Subject Predicate Object

Domain Knowledge-Based Image Annotation and Reasoning Tool

The tool provides corresponding annotation environment for semantic annotation of video image information. With the support of ontology, some image information can be automatically recognized and annotated by ontology concept. Furthermore, users are allowed to use SWRL rule reasoning engine to conduct semantic reasoning with relevant rules, so that new knowledge can be obtained. The detailed functions of this tool are described as follows: 1. Open the image: The user opens the selected image and loads the image into the image display area. This mainly includes two different cases as the ontology image and remote image. 2. Draw the area: In the image drawing area, different areas can be divided to select different positions of the image. The system provides two different types of region rendering methods, including drawing rectangular region and drawing circular region. 3. Select the area: Many areas will be drawn in the image, thus we must select the appropriate area in order to label this specific area. 4. Delete the area: When the area drawn on the image is inappropriate, the use case of area deletion can be used to delete the specific area. 5. Opening ontology use case: In order to annotate the semantics of regions drawn on images, domain knowledge needs to be loaded. The opening of ontology use case can load ontology into the system.

The Modeling Platform for Video Surveillance Knowledge Base

1593

6. Searching concept use case: After the ontology is opened, various concepts are presented in the form of tree structure, and the needed concepts can be quickly located by searching. 7. Annotation concepts: After searching for appropriate concepts, semantics can be annotated for selected image region. 8. Setting object attribute use case: Establishing the semantic relationship between the image region and other regions, is mainly through setting object attributes. 9. Setting data attribute use case: Setting relevant data attribute values for regions in images can provide data support for reasoning. 10. Selecting inference rule use case: Domain knowledge base contains a large amount of rule information. By using this use case, one or more rules can be selected to infer different conclusions of viewing this image. 11. Selecting reasoning rule use case: We select reasoning rules to achieve the rule reasoning. 12. Cleaning up and explaining use case: Results and explanations of reasoning will be presented to the system. Also, results of reasoning can be cleaned up through this use case when re-reasoning is needed.

4 The Implementation of the Platform On the basis of the development of above-mentioned tools, by taking 52 common image patterns of vehicle traffic safety violations as experimental carriers, we construct domain ontology and domain rules. We also annotate and infer relevant images. The constructed domain ontology includes more than 100 domain concepts such as traffic marking, vehicle status, signal lamp, vehicle, road, prohibited marking, and their correlations. On the basis of domain ontology, 52 SWRL rules are constructed according to the image forensic pattern of traffic safety violations. For example, rule 1 is constructed to deal with the traffic violation as “the motor vehicle is not driving in the motor lane”. On the basis of defining rules, when a given image is labeled manually or recognized automatically by machine, the rule reasoning engine will judge whether the preceding part of the rule is satisfied or not. If the preceding part is satisfied, it will judge the existence of the aforementioned violation in the image and store it in the list of instances where the violation exists. Furthermore, the important information of key images in video is semantically annotated by the annotation environment provided by the tool, and the rules reasoning engine is used to infer the SWRL rules. According to the existing annotation information in the picture, the corresponding traffic violations in the picture can be judged.

5 Conclusion In this study, we build a domain knowledge base modeling platform to support the creation of concepts, object attributes, data type attributes and instances in domain ontology. The output of the domain ontology is in the form of OWL. At the same time,

1594

X. Xia et al.

the checking mechanism of expression in rules is established to ensure the consistency of ontology and rules. On this basis, the corresponding storage mechanism is provided to store ontology and rules in the knowledge base, and the corresponding query mechanism of the knowledge base is provided. Finally, rule reasoning is realized on the basis of description logic and rule description language. According to the business rules defined in the knowledge base, reasoning is carried out on the basis of the existing image semantic annotation information, and new knowledge is obtained. Acknowledgement. Authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. In part by National key research and development plan under Grant 2016YFC0801304.

References 1. Miguel, J.C.S., Bescós, J., Martínez, J.M., Garcí, Á.: DiVA: a distributed video analysis framework applied to video-surveillance systems. In: International Workshop on Image Analysis for Multimedia Interactive Services (2008) 2. Wang, M., Hua, X.S., Hong, R., Tang, J., Qi, G.J., Song, Y.: Unified video annotation via multigraph learning. IEEE Trans. Circuits Syst. Video Technol. 19(5), 733–746 (2009) 3. Punnoose, R., Crainiceanu, A., Rapp, D.: Rya: a scalable RDF triple store for the clouds. In: International Workshop on Cloud Intelligence (2012) 4. Wang, X.H., Zhang, D.Q., Gu, T., Pung, H.K.: Ontology based context modeling and reasoning using OWL. In: IEEE Conference on Pervasive Computing & Communications Workshops (2004)

Human Action Recognition Based on Deep Learning YuXin Cai(&), YanFeng Shang, YiXian Tan, ZhiWei Tang, and Bo Zhao The Third Research Institute of Ministry of Public Security, BiSheng Road Number 339, Shanghai, Pudong, China [email protected]

Abstract. Deep convolutional network has achieved great success in visual recognition of static images, while it is not so advantageous as traditional methods in action recognition in videos. However, in recent years, researchers have proposed a series of human action recognition networks for videos, and proposed some efficient and effective methods for action recognition. This paper will enumerate the current main action recognition network model. First we will introduce Two-Stream Convolutional Network, Temporal Segment Networks and C3D Network, and then we will introduce an efficient method for action recognition. The purpose is to introduce the characteristics of different network models, and provide some valuable reference for the research of action recognition. Keywords: Deep convolutional network Efficient method

 Human action recognition 

1 Introduction In recent years, in the field of artificial intelligence, deep learning has made a major breakthrough. It has made remarkable achievements in many fields of speech recognition, natural language processing, machine vision, image and video analysis, and is almost the biggest contribution to the whole AI wave. Video-structured massive data provides training data for deep learning and becomes a natural training ground for deep learning. The application of artificial intelligence deep learning technology to video structuring has greatly improved the accuracy and stability of video structuring. The main application of artificial intelligence in video field is video understanding, aiming at solving the “semantic” gap, and the content includes: video structured analysis, target detection and tracking, character recognition, motion recognition. This paper will mainly introduce the main target detection algorithm and behavior recognition network model in recent years.

2 Human Action Recognition Network Model 2.1

Two-Stream Convolutional Network

The Two-Stream Convolutional Network [1] was first proposed by Karen Simonyan and Andrew Zisserman. It’s important working principle is: training CNN model for © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1595–1600, 2020. https://doi.org/10.1007/978-3-030-25128-4_198

1596

Y. Cai et al.

video images and dense optical streams in spatial and temporal separately, and the two network branches are classified separately. Finally, the results of the two network branches are merged. The correct rates of UCF101 and HMDB51 are 88.0% and 59.4% respectively. The network structure is shown in Fig. 1. In 2016, Feichtenhofer and Pinz et al. [2] proposed using CNN for “spatial+temporal” fusion on the basis of “TwoStream” and space. The basic network of time and time was replaced by VGG-16 network, and the final experimental results were significantly improved, UCF-10192.5%, HMDB51-65.4%, and its network structure is shown in Fig. 2.

Fig. 1. Two-stream Network structure diagram.

Fig. 2. CNN Fusion Two-stream network structure diagram

2.2

Temporal Segment Networks

Temporal Segment Networks (TSN network) [3] was first proposed by Limin Wan and others of the Chinese University of Hong Kong. The basic principle is still to use temporal integration (spatial+temporal fusion), but to improve the effect, and two-

Human Action Recognition Based on Deep Learning

1597

stream uses a single frame or a single frame heap as input. The TSN divides the entire video into K segments, and then randomly samples the segments as input in the video segment. Finally, the segment consensus is generated by the prediction result of each segment using Segment Consensus Function. Finally, the final prediction result is obtained by the Class Score Fusion. The structure schematic diagram is shown in Fig. 3. In 2018, Bolei Zhou and others at the Massachusetts Institute of Technology added time-series relational reasoning to the TSN network structure in the paper [4]. For those actions that cannot be identified by a single frame, the time series of multiframe data images is used, and the classification result is obtained by the fusion of different length frames numbers. Its network structure diagram is shown in Fig. 4.

Fig. 3. TSN network schematic

Fig. 4. Schematic diagram of TSN network with timing reasoning

2.3

C3D Network

The C3D Network (C3D Network) [5] was first proposed by Du Tran et al. in 2015. Unlike traditional neural networks that use 2D convolution, C3D networks use 3D

1598

Y. Cai et al.

convolution, as shown in Fig. 5. The 2D convolution layer always obtains the twodimensional feature image either in single-channel image or multi-channel image (i.e., color map or superimposed video), and the 3D convolution network obtains the feature map of D, which is the biggest difference of 3D convolution to 2D convolution. The size of the 3D convolution kernel is d  k  k, and the one-dimensional d which is more than the 2D convolution kernel can be understood as the time depth of the convolution kernel. Unlike other complex networks with behavior recognition networks, the 3D Network adopts a “one-stop” network structure, and its network structure is shown in Fig. 6. There are eight convolution layers, five pooling layers, and two fully connected layers.

Fig. 5. 2D, 3D Convolution operation principle

Fig. 6. 3D Network structure

3 Human Motion Recognition Fusion Network In terms of static image recognition, deep convolutional networks have achieved great success, but traditional convolutional networks cannot be well applied in video-based human behavior recognition, so dual-stream convolutional neural network is generated. And dual-stream convolutional neural network has a good performance in human behavior recognition, but there are still many disadvantages, such as the pre-training model, the selection of hyper-parameters, and the improvement of computational performance. In view of the shortcomings of the dual-stream neural network, paper [6] has done a lot of work based on the TSN network to improve computational efficiency and accuracy. The details will be discussed in the following sections. Since the optical flow graph can better capture the dynamic information, paper [6] tried to add other network models for processing the optical flow image to increase the weight of the optical flow image. The specific network structure is shown in Fig. 7. In Table 1, it lists the correct rates of the Inception-BN, Inception-V3, and ResNet-101 network models combining with different weights. As can be seen from the

Human Action Recognition Based on Deep Learning

1599

improvement of the correct rate, the weight between them is a kind of super parameters, and simple parameters do not give an excellent improvement to the results. Benefiting from the powerful fitting ability of neural networks, paper [6] proposes a new multi-model fusion network. We simply call it a tiny fusion network. The basic principle of tiny fusion networks is: three network models extract spatial-temporal streams feature offline. The features of combination are treated as input to the tiny fusion network. They fine-tune the weights between different data streams to explore the differences between different networks, and finally obtain the classification results. Through network convergence, they achieved a 0.6–0.7% improvement in the correct rate.

Fig. 7. Tiny fusion network structure Table 1. The correct rate of different weights combining with Inception-BN, Inception-V3 and ResNet-101 network models Assemble

Weighted ratio

ResNet-101(S)+ResNet-101(T,224) ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,299) ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,299) ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,299)

1:1 1:1:1 1:1:0.5 Tiny fusion network 1:1:1 1:1:0.5 Tiny fusion network

ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,168) ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,168) ResNet-101(S)+ResNet-101(T,224)+Inception-V3(T,168)

Two-stream (%) 93.5 94.6 94.8 95.4 94.4 94.7 95.4

4 Conclusion and Future Work This paper mainly introduces the main target detection algorithms and behavior recognition network models in recent years, and introduces dual-stream convolutional neural networks, time-continuous networks, C3D networks, tiny fusion network, etc.,

1600

Y. Cai et al.

which provides important reference value for human behavior recognition research which based on deep learning. Our future works will focus on the research of advanced algorithms [7, 8]. Acknowledgements. The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. In part by National key research and development plan under Grant 2016YFC0801304.

References 1. Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. Computer Vision and Pattern Recognition (2014) 2. Feichtenhofer, C., Pinz, A., Zisserman, A.: Convolutional two-stream network fusion for video action recognition. Computer Vision and Pattern Recognition (2016) 3. Wang, L., Xiong, Y., Wang, Z., Qiao, Y., Lin, D., Tang, X., Van Gool, L.: Temporal segment networks: towards good practices for deep action recognition. In: European Conference on Computer Vision (2016) 4. Zhou, B., Andonian, A., Oliva, A., Torralba, A.: Temporal relational reasoning in videos. Computer Vision and Pattern Recognition (2018) 5. Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3D convolutional networks. Computer Vision and Pattern Recognition (2014) 6. Liu, Z., Zhang, X., Song, L., et al.: More efficient and effective tricks for deep action recognition. Cluster Comput., 1–8 (2017) 7. Jiang, Y.G., Liu, J., Roshan Zamir, A., Laptev, I., Piccardi, M., Shah, M., Sukthankar, R.: THUMOS challenge: action recognition with a large number of classes (2013) 8. Lucas, B., Kanade, T.: An iterative image registration technique with an application to stereo vision. In: Proceedings of the 7th International Joint Conference on Artificial Intelligence (IJCAI), pp. 674–679 (1981)

An Effective Solution for Application Orchestration YuXin Cai(&), YanFeng Shang, YiXian Tan, ZhiWei Tang, and Bo Zhao The Third Research Institute of Ministry of Public Security, BiSheng Road Number 339, Shanghai, Pudong, China [email protected]

Abstract. Application orchestration technology has always been one of the research directions of Devops. The traditional application orchestration technology has some problems such as slow deployment and scaling speed. Therefore, this paper proposes a Docker-based hybrid cloud application orchestration scheme addresses these issues with traditional application orchestration techniques. The goal is to solve the problem of existing application orchestration techniques from the root by borrowing Docker’s quick-start feature and the universal characteristics of hybrid cloud technology. Firstly, this paper proposes a four-layer architecture including the base layer, core layer, gateway layer and interaction layer, and designs the application orchestration module, dynamic scaling module and system monitoring module in the core layer. Secondly, the implementation scheme is tested, and the experiment shows that the scheme shows good deployment speed, speed of expansion and high reliability. Keywords: Application orchestration

 Docker  Hybrid cloud

1 Introduction Application orchestration refers to the automatic installation, deployment and startup of each component in the system according to its dependencies, so that the system can be automatically deployed and quickly scaled, which is one of the important links to implement Devops [1, 2]. Traditional application orchestration technology usually precreates the components in the application as virtual machine images, and then manages, deploys, and launches them through virtual machine management tools such as OpenStack. This application orchestration technology is relatively mature at present, but with the continuous development of technology, the traditional application orchestration technology has gradually exposed some problems, mainly reflected in the slow deployment and scaling speed and the single application scenario. In IBM’s paper on the performance of virtual machines and containers, it can be seen that the container technology represented by Docker meets or exceeds the virtual machine technology represented by KVM in all aspects, so orchestration technology using virtual machines requires a large amount of overhead, which reduces the utilization of resources to some extent [3]. The Currently, Docker-based application orchestration schemes in foreign countries mainly include Docker’s native Docker © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1601–1608, 2020. https://doi.org/10.1007/978-3-030-25128-4_199

1602

Y. Cai et al.

Compose, Google’s Kubernetes, Redhat’s Openshift 3, and Fabric8. This paper proposes a Docker-based hybrid cloud application orchestration scheme for the problems of traditional application orchestration techniques.

2 Overall System Design Through the analysis of the application scenarios and core functions of the system, combined with the design patterns and some common rules of distributed system design, the overall architecture of the system as shown in Fig. 1 is obtained: the system can be divided into the base layer, core layer, gateway layer and presentation layer from the bottom to up, and each of which is responsible for providing services to the upper layer.

Application orchestrati on

Mysql

GUI

Interaction layer

API Gateway

Gateway layer

Dynamic scaling

System monitoring

Kubernetes

Core layer

Base layer

Fig. 1. The overall architecture of the system

Base layer: The base layer provides the most basic functions of the solution, mainly composed of MySql and Kubernetes clusters. Among them, MySql is mainly responsible for some business data in the storage system, such as node information, AZ information, scaling group information, application template information, the application instance information, etc., and the Kubernetes cluster is responsible for managing the containers in the system, which is the basis for the application to implement the programming. Core layer: The core layer implements the main logic of the solution, including application orchestration, dynamic scaling and system monitoring. The main services are implemented at the core layer, and each service provides services in the form of Restful API. At the same time, considering the scalability of the system, each module of the core layer is designed as a stateless application, so it can increase the number of copies of the module to provide the system’s pressure resistance when the load is large. Gateway layer: The gateway layer is responsible for forwarding user requests. When the user’s request arrives at the gateway layer, the request can be forwarded

An Effective Solution for Application Orchestration

1603

to different backends by requesting different prefixes. On the one hand, the difficulty of front-end development is reduced, and on the other hand, deployment is performed. The gateway layer and the GUI layer can be deployed on the same host, bypassing the security issues associated with Ajax cross-domain requests. Interaction layer: The interaction layer is responsible for interacting with the user. By using a JavaScript framework such as AngularJS, the GUI layer can be designed as a pure front end, which reduces the development pressure of the system. The Restful API combined with AngularJS to achieve decoupling of the front and back of the system is a very popular design. After completing the overall design of the system, it is necessary to start detailed design of each module of the system. In the whole system: the base layer is relatively weak, and the design of the base layer is mainly determined by the requirements of the core layer design; the gateway layer logic is relatively simple, and can be simply replaced with nginx at the beginning of the solution; the GUI layer uses the AngularJS wrapped TinyUI framework, and it greatly simplifies the design process and does not require too much design work to complete the function; only the three modules of the core layer contain the most important logic of the system, which solves the core requirements of the system. Therefore, the three modules of the core layer will be designed in detail next section.

3 Core Layer Module Design 3.1

Application Orchestration Design

The main problem solved by the application orchestration module is to deploy the components in the application to the environment according to the user-defined dependencies and startup sequence. The specific design of the application orchestration module in this solution is shown in Fig. 2: The entire application orchestration module is composed by the request parsing module, the request execution module and the message queue, wherein the request parsing module is responsible for parsing the external request, and the request execution module is responsible for calling the interface provided by the underlying support module to start and deploy the application, and the message queue provides a communication mechanism for the request parsing module and the request execution module, which reduces the coupling between components and improves the system’s ability to withstand pressure.

request parsing module

message queue

request execution module

Fig. 2. Application orchestration module architecture

1604

3.2

Y. Cai et al.

Dynamic Telescopic Design

Dynamic scaling is one of the indispensable modules of an operation and maintenance system in the cloud platform era. Only when dynamic scaling is implemented, the real resource utilization can be maximized. Therefore, our solution needs to fully design the dynamic scaling module. Ensure that the system can meet the needs of users to dynamically scale applications. The internal design of the dynamic scaling module is shown in Fig. 3. The dynamic scaling module is mainly composed of four sub-modules: policy generation module, policy analysis module, task scheduling module and scaling execution module. The policy generation module is responsible for converting the scheduling policy issued by the user into the system identifiable format, the policy parsing module is responsible for converting the received scheduling request into a scaling task, and the task scheduling module is mainly responsible for scheduling the scaling task generated by the upper layer to balance the system load and provide functions such as task rollback and redo. The scaling execution module is responsible for executing the tasks submitted by the scheduling module. External scaling request

policy generation module Performance monitoring registration task scheduling module

Performance monitoring callback

Scaling strategy

Scaling task registration

policy analysis module

Scaling task callback scaling execution module Start scaling

Inside the module

Outside the module

Fig. 3. Dynamic scaling module architecture diagram

3.3

System Monitoring Design

System monitoring is an indispensable function of an operation and maintenance system: during the normal operation of the system, the user needs to monitor the running status of the application through the running monitoring function; when there are problems while the system is running, the user needs to collect the function through the log. The running logs are collected to track the running trajectory of the application to analyze the cause of the application’s problem.

An Effective Solution for Application Orchestration

1605

The system monitoring function designed by our scheme consists of two parts: operation monitoring and log collection. The operation monitoring can be divided into two parts: performance monitoring and topology monitoring. These three parts are relatively independent in design. The Internal organization diagram is showed as Fig. 4. Monitoring alarm Data service module module Obtain cluster monitoring data Data extraction module

Cluster Cluster performance monitoring monitoring module information Get node monitoring storage information Monitoring data storage module Node performance

Obtain cluster monitoring information

Log service module

Topology service module

Topology organization module

Topology capture module

monitoring module

Log configur ation module

Get log information

b

a

Get the log

Set log information

Log organiza tion module

Get logs Containe from the r file container capture module c

Fig. 4. The Internal organization diagram of performance monitoring module, topology monitoring module, and log management module

4 Experiment 4.1

Test Environment

This section first describes the test environment of the system. The hardware and software information used in this system test is shown in Table 1. Table 1. The test environment of hardware and software. Hardware environment Server IBM System x3650 m5 (10 stages); CPU 1024 MHz*8, Memory 96 GB, Disk 1T*4 Client Huawei thin client Software environment Cloud platform Huawei Fusion Sphere 5.0, VCloud, AWS Hybrid cloud Huawei Hybrid Cloud Solution technology Docker 1.8.1 Kubernetes 1.0.3

When the system was tested, using the above hardware and software environment, a Kubernetes cluster with 100 nodes was built as the underlying service platform, and then all other components were deployed to a higher performance virtual machine, forming a testing platform.

1606

4.2

Y. Cai et al.

Test Result

This section will test the system’s deployment speed, scaling speed, and stable running time. (1) Deployment speed The startup speed of the container is a huge advantage compared to the virtual machine, so this solution must ensure that the application has a high deployment speed. Table 2 shows the results of the test of the deployment speed of the project.

Table 2. Deployment speed test record table. Application size (the number of copies of each component is the same when testing) 1 component * 1 copy 1 component * 10 copies 4 components * 1 copy 4 components * 10 copies 8 components * 1 copy 8 components * 10 copies 1 component * 1 copy

Deployment time 5s 5s 19 s 19 s 34 s 35 s 5s

As can be seen from the data in the table, the deployment speed of each component in the application can be up to 1 s, which is an absolute advantage compared to the startup speed of the virtual machine for a few minutes. (2) Scaling speed Fast scaling is also one of the advantages of this solution. In some applications where the amount of traffic rise sharply (such as the spike system), although the shortcomings of the virtual machine can be overcome by the scheme of pre-scaling, if the quick start performance of the container can be fully utilized, there will be more optional solution. Table 3 records the test data for the project’s scaling speed.

Table 3. Scaling speed test record table. Scaling behavior Add 1 copy Add 10 copies Reduce 1 copy Reduce 10 copies

Scaling speed 3s 3s 1s 2s

As can be seen from the data in the table, the copy speed of the copy in this solution can reach less than 1 s, which is much higher than the startup speed of the virtual machine. Therefore, this solution has an absolute advantage compared with the

An Effective Solution for Application Orchestration

1607

traditional application orchestration scheme based on virtual machine in terms of expansion speed. (3) Stability test In the stability test, the subject was tested by writing a shell script to continuously access the system. The script used in this test is showed as Table 4.

Table 4. The test script information. Script file #!/bin/base while true do return_code=`curl -o /dev/null -s -m 10 --connect-timeout 10 -w %{http_code} "http://10.0.0.2/index.action"` if [ $return_code -eq 200 ] then echo Access success! Else echo Access failed! `date` >> access.log fi sleep 5s done

After one week of execution of the script, it was found that the system did not have an access error by checking the file system. It can be estimated that the normal running time of the system reached 99.99% or more, which met the requirements for system stability.

5 Conclusion and Future Work The emergence of Docker has brought new choices to the virtualization market. This paper proposes an application orchestration scheme that uses Docker instead of virtual machine, which greatly speeds up application deployment and scaling. At the same time, hybrid cloud, as a master of private cloud and public cloud, has the advantages of private cloud security and controllability, and the advantages of public cloud and massive resources. Therefore, the Docker-based hybrid cloud application orchestration solution has the advantages of fast and free application deployment and scaling, and perfect system monitoring schemes compared to traditional orchestration schemes. Acknowledgements. The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. In part by National key research and development plan under Grant 2016YFC0801304.

1608

Y. Cai et al.

References 1. Zou, F.: Research on resource management and scheduling algorithm in hybrid cloud environment. Northeast Normal University (2013) 2. Li, H.: Research and implementation of private cloud computing platform based on OpenStack. Jiangxi Normal University (2013) 3. Felter, W., Ferreira, A., Rajamony, R., Rubio, J.: An updated performance comparison of virtual machines and Linux containers. J. Cloud Comput. 11 (2014) 4. Chadwick, D.W., Siu, K., Lee, C., Fouillat, Y., Germonville, D.: Adding federated identity management to openstack. J. Grid Comput. 12, 3–27 (2014) 5. Liu, D.: Research on companion monitoring technology for large-scale distributed software systems. National University of Defense Technology (2011) 6. Zhang, Q.: Research and application of cloud computing platform monitoring system. Beijing Jiaotong University (2011) 7. Wang, F.: Design and implementation of Docker-based R&D deployment management platform. Beijing Jiaotong University (2015) 8. Butler, B.: Docker’s acquisition aims to improve application container management 9. Yegulalp, S.: Hypernetes unites Kubernetes, OpenStack for multitenant container management. InfoWorld.com (2015) 10. Kepes, B.: KubeCon and the growing importance of Kubernetes. Network World (Online) (2015) 11. Lackermair, G.: Hybrid cloud architectures for the online commerce. Procedia Comput. Sci. 3, 550–555 (2011)

The Development of an Ontology-Based Marine Injury Assessment and Treatment Decision Making Supported System Min Zhu1,2,3, Huiyu Jin1, Tianshu Zhou4, Ruxue Chen1, Yongpeng Chen1, and Quanyi Huang2,3(&) 1

3

6th Medical Center, General Hospital of PLA, Beijing, China [email protected] 2 Institute of Public Safety Research (IPSR), Tsinghua University, Beijing, China [email protected] Beijing Key Laboratory of City Integrated Emergency Response Science, Beijing, China 4 College of Biomedical Engineering and Instrument Science, Zhejiang University, Hangzhou, Zhejiang, China

Abstract. Prehospital injury assessment and treatment is among the most challenging situations faced by medical personnel. Marine injury assessment and treatment could be further complicated by vessel structure, austere environment at sea, distance and limited evacuation means. This paper presents an ontology-based marine injury assessment and treatment decision making supported system (DMSS), based on the result of experimentation on dogs. The aim of this system is to recommend appropriate marine injury assessment results and treatment methods considering the complicated situations at sea. The advantages of the ontology-based system is that it could combine the injury information, the rule of assessment, the treatment choice limited by sea state and treatment guidelines for some special marine injury, so as to provide a more comprehensive decision support for medical personnel. Keywords: Marine injury  Assessment and treatment Decision making supported

 Ontology-based 

1 Introduction Prehospital injury assessment and treatment are among the most challenging situations faced by medical personnel. When mass casualty incidents (MCIs) burst at sea, the marine injury assessment and treatment could be further complicated by vessel structure, austere environment at sea, distance and limited medical treatment means [1]. In this situation, medical personnel would be required to make appropriate assessment of injuries and take necessary measure to save life. We don’t have rich experiences in marine medical rescue, however, incidents with multiple casualties in the marine setting are by no means rare. In 2010 alone, the US Coast Guard counted 4,604 accidents [2], of which 657 (14%) resulted in at least 2 © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1609–1618, 2020. https://doi.org/10.1007/978-3-030-25128-4_200

1610

M. Zhu et al.

casualties. In the civilian setting, a 2007 collision of a South Korean passenger ship with a whale resulted in 114 casualties [3]. Most of injury assessment methods are for land MCIs response, such as PHI, TI, TS, etc. [4, 5]. So marine injury assessment and treatment begins once the casualties have reached land. But this could lose the best time for life saving or disability prevention [6]. Based on this, we promoted an ontology-based marine injury assessment and treatment decision making supported system to support medical personnel making comprehensive medical decision in the sea setting.

2 Previous Experimentation Results and the Design of the System Before the development of the system, previous experimentation results of special marine injuries were collected and series of dog experiments were conducted to find out feasible medical treatments under different sea situations. 2.1

Previous Experimentation Results of Seawater Immersion Wound

Seawater immersion wound is a special marine injury that could combined with other injuries such as burn injury, blast injury, bullet injury and so on. As showed in Figs. 1, 2, 3 and 4[7], in previous experimentation results, researchers found that the influence factors of the wound assessment included body temperature, heart rate, blood pressure, arterial oxygen tension difference and chloride ion concentration [8, 9]. However, some of these influence factors, such as body temperature which is very important in the assessment, are not considered in conventional land injury assessment methods.

Fig. 1. The relationship between body temperature and mortality

Fig. 2. The relationship between heart rate and mortality

The Development of an Ontology-Based Marine Injury Assessment

Fig. 3. The relationship between mean arterial pressure (MAP) and mortality

2.2

1611

Fig. 4. The relationship between oxygen pressure and mortality

Assessment Rule for Marine Injury

A new assessment rule for marine injury is promoted based on the previous experimentation results and conventional injury assessment methods. The factor, condition and algorithm are showed in Table 1. In the table, x1 indicates times of respiratory per minute, x2 indicates the value of blood pressure in the unit of mmHg, x3 indicates the sum grade of action of opening eyes, language reaction and exercise reaction. The final injury assessment grade is the total grades of all the factors.

Table 1. Assessment rule for marine injury Factor

Condition

Grade Factor

Respiratory rate

x1 < 1 [1, 6) x1  30 [6, 10) [10, 30) Unable to open Stabbing to open Call to open Automatic open Unable to speak Only able to pronounce Irrelevant answer Answer not to the point Answer to the point

4 3 2 1 0 3 2 1 0 4 3 2 1 0

Action of opening eyes

Language reaction

Condition

Grade

Systolic pressure x2 < 1 [1, 50) [50, 76) [76, 90) x2 > 90 Oxygen pressure 70

4 3 2 1 0 2 1 0

Consciousness

4 3 2 1 0

[13, 15] [9, 13) [6, 9) [4, 6) x3 < 4

(continued)

1612

M. Zhu et al. Table 1. (continued)

Factor

Condition

Exercise reaction Unable to move Limb hyperextension after stabbing Limb flexion after stabbing Able to elude after stabbing Able to locate after stabbing Exercise according to order Body ; u 2 Rp ; v 2 Rq :

ð2:5Þ

    In  Y X  Y v ; X u ¼ X  ~ In  Y Xu  Yv Im ~ Im ~ Xv ¼ X  ~

ð2:6Þ

Let

and Z ¼ vec ðRÞ, where ~ Im 2 Rm with elements if 1 and vec ðÞ here denotes the operator that stacks a matrix into a long vector by row. Hence, minimizing (2.4) with fixed v is equivalent to minimization problem: minhv kZ  Xv hv k2 ;

ð2:7Þ

 > where hv ¼ a> ; b> ; u> and Xv in (2.6) is the design matrix when v is fixed. It can be seen that (2.7) is the usual least squares problem, which is solved by   ^hv ¼ X> Xv 1 X> Z v v

ð2:8Þ

Similarly, the minimize problem with fixed u is equivalent to the minimization problem minhu kZ  Xu hu k2 ;

ð2:9Þ

 > where hu ¼ a> ; b> ; u> . Thus, when u is fixed, hu is solved by   ^hu ¼ X> Xu 1 X> Z u u

ð2:10Þ

The ALS algorithm then iteratively and alternatively changes the role of u and v until convergence. For alternating updating between u and v, a problem arises between uvT , corresponding, ~u~vT ¼ ðkuÞðk1 vT Þ, in which k is nonzero constant. In order to avoid this problem, we adopt an equal-scale strategy, and the advancement is updated after the update. Specially, we update (u, v) to the next step: qffiffiffiffiffiffi qffiffiffiffiffiffi ~u ¼ u kkuvkk; ~v ¼ v kkuvkk; u; v 6¼ 0, and u = v = 0 otherwise, such that ~ u~v> ¼ uv> and

1644

S. Song et al.

uk ¼ k~vk. Obviously, the rescaling dose not increase the objective function. Detailed k~ algorithm is summarized below. For the case of higher rank (the rank-K model), we consider the parameterization M ¼ UV> ; U ¼ ðu1    uK Þ 2 RpK ; V ¼ ðv1    vk Þ 2 RqK

ð2:11Þ

For convenience, we did not impose any identifiability constraint on U and V, as adding constraints makes no difference to our inference procedures, but only increases the difficulty in computation. Let     In  Y X  Yv . . .X  YvK ; XU ¼ X  ~ In  Y X u  Y v XV ¼ X  ~ IM ~ IM ~ ð2:12Þ   be the design matrix when V and U is fixed, respectively and hU ¼ a> ; b> ; vecðU Þ> ; hV ¼ a> ; b> ; vecðV Þ> be the corresponding parameters. vec(.) here denotes the operator that stacks a matrix into a long vector by column. Then following the same estimation procedure of the rank-1 model, the estimation   a> ; b> ; vecðU Þ> ; vecðV Þ> can be obtained by the ALS algorithm. 2.3

of



Application and Extension of Generalized Linear Models

As one can see, the low-rank partial latent model (2.2) can be extended to generalized linear models, i.e.,   h hij ¼ xTi a þ bT yj þ xTi Myj

ð2:13Þ

where hðÞ is a link function of generalized linear model. We can apply this model and method through actual data. The actual data referenced in this article is the 10M MovieLens [8]. The 10M MovieLens data includes 100,000,054 anonymous ratings from 95,880 users and 10,681 movies. Each user in the test set has 10 ratings, rated 5 stars, and half-star increments. There are four categories in the users’ data set. The original data set has only one covariate associated with the movie: type. In order to prevent the number of covariates from being too small and the results are inaccurate, we have added four covariates of film year, movie duration, movie distribution place and movie language through Baidu, Douban and other search methods. Since they are entered manually, there may be errors and inconsistencies. The film year and movie duration are 7 groups and 5 groups according to the interval, while there are 19 movie types, 97 movie distribution places, and 127 movie languages. These variables are reparameterized into binary covariate encodings for calculation.

Personalized Prediction Based on a Regression Model

1645

3 Discussion The paper based on the cumulative logistic model, emphasizing the interaction between related variables. We exchange the project matrix which is the user preference for into two product matrices. to better create the connection between them to obtain greater consequence. A regularization method is proposed, which uses a matrix for parallel computing, allowing for the processing of large amounts of data that traditional methods cannot handle. Our approach is easy to calculate and can scale to huge data sets.

Appendix Alternating Least Squares Algorithm: Step 1. (Initialization) Set initial uð0Þ ; vð0Þ . For t = 0; 1; 2;;  T from (2.3). (1) Fix v ¼ vðtÞ , obtain ^hvðtÞ ¼ aðtÞT ; bðtÞT ; uðt þ 1ÞT  T (2) Fix u ¼ uðt þ 1Þ , obtain ^huðtÞ ¼ aðt þ 1ÞT ; bðt þ 1ÞT ; vðt þ 1ÞT from (2.3). Step 2. (Iteration) Apply the equal strategy for uðt þ 1Þ ; vðt þ 1Þ . Step 3. (Termination) Repeat Step 1–2 until convergence. ðaðt þ 1Þ ; bðt þ 1Þ ; uðt þ 1Þ ; vðt þ 1Þ ÞT to form ^h.

Output

References 1. Zhu, Y., Shen, X., Ye, C.: Personalized prediction and sparsity pursuit in latent factor models. J. Amer. Statist. Assoc. 111(513), 241–252 (2016) 2. Lee, T.Q., Park, Y.: A time-based recommender system using implicit feedback. In: The 22nd International WWW Conference, Lyon, France (2012) 3. Van Meteren, R., Van Someren, M.: Using content-based filtering for recommendation. In: Proceedings Machine Learning in New Information Age MLnet–ECML2000 Workshop, pp. 312–321 (2000). https://doi.org/10.1007/11875604_36 4. Breese, J., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings of 14th Conference on Uncertainty in Artificial Intelligence, pp. 43–52 (1998) 5. Srebro, N., Rennie, J., Jaakkola, T.: Maximum-margin matrix factorization. In: Advances in Neural Information Processing System, vol. 17, pp. 1329–1336. MIT Press (2005) 6. Park, S., Pennock, D., Madani, O., Good, N., DeCoste, D.: Nave flterbots for robust cold-start recommendations. In: Proceedings the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 699–705 (2006) 7. McCullagh, P., Nelder, J.A.: Generalized Linear Model, 2nd edn. Chapman and Hall (1990) 8. Harper, F.M., Konstan, J.A.: The MovieLens datasets: history and context. ACM Trans. Interact. Intell. Syst. (TiiS) 5(4), 19 (2015). http://dx.doi.org/10.1145/2827872

Construction and Application of Multi-relational Protein Network Ming Zheng and Mugui Zhuo(&) Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University, Wuzhou, China [email protected]

Abstract. Considering that different types of interactions play different roles in function prediction, a multi-relational protein network is constructed by combining protein interaction network and protein domain information, and different ergodic priorities are assigned to each type of interaction. Based on the multirelational network, a method of protein function prediction based on multirelational network (FPM) is proposed. For unannotated proteins, the algorithm traverses all the interactions with the highest priority to form a set of candidate neighbor nodes. Finally, according to the set of neighbor nodes, a set of predicted functions is formed, and each function is scored and sorted. Compared with other algorithms, the performance of FPM is better than other methods. Keywords: Multiple relational networks Protein interaction  Priority  Domain

 Protein function 

1 Introduction Accurate annotation of protein function is the key to understanding life activities at the molecular level, and has great influence on biomedicine and pharmaceuticals [1]. Because of the inherent difficulty and high cost, experimental function annotation methods can not meet the increasing sequence and structure data. Therefore, annotation of protein function calculation methods has become a frontier issue in computational biology and molecular biology. High-throughput experimental methods have produced a large number of high-quality, large-scale protein-protein interaction data. Meanwhile, functional annotation schemes as functional descriptions/definitions of proteins have also been well developed. This makes it possible and feasible to predict the function of unannotated proteins through protein-protein interaction data [2]. Schwikowski et al. [3] proposed neighbor counting method, which takes the frequently-occurring functions of neighbors as protein annotations with unknown functions. However, this method neglects the background frequency of different function annotations. Hishigaki et al. [4] improved neighbor counting method and replaced it with chi-square statistics. Number statistics as a method of protein function scoring. In addition to direct and indirect neighbors, Chua et al. [5] inferred the functional information of proteins by assigning different weights to direct and indirect neighbors. Current methods generally measure the distance between two proteins by the shortest distance in the network, but most proteins are close to each other. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1646–1650, 2020. https://doi.org/10.1007/978-3-030-25128-4_206

Construction and Application of Multi-relational Protein Network

1647

Therefore, Nabieva et al. introduced DSD according to the diffusion of the graph. Onstate distance, which aims at capturing the fine-grained difference of function annotation transmission in PPI networks [6], Chi et al. proposed a new method of protein function prediction based on iteration, which combines the local and global semantic effects of protein function. Some network-based methods divide PPI networks into several functional modules and distribute the same protein in the same module. Functions Lee et al. changed the existing modular solutions and proposed a better method for predicting protein function using modular information [7]. Although great progress has been made in predicting protein function from PPI networks or integrating PPI networks and other biological information, protein function prediction based on computational methods still faces great challenges. One of the important reasons is that PPI data obtained from high-throughput biological experiments [8] have been found to contain a significant proportion of false positives and false negatives. The presence of false positives reduces the accuracy of prediction, while false negatives deprive some proteins with unknown functions of annotation. Some methods attempt to reconstruct more reliable networks by integrating PPI networks and other biological information, thereby reducing the impact of random noise on prediction performance. However, in biology, there are complex and diverse links between proteins [9]. Compared with interaction data, it is difficult because they often come from different conditions and play different roles. Existing protein function prediction methods ignore this point and merge interactions under different situations, resulting in artificial noise in interaction networks [10]. In this paper, PPI network and multiple biological information are used to construct a multi-relational protein network. There may be more than one interaction between two proteins in the network. Using the network topological characteristics and protein Co-structure characteristics, we weighted the constructed multi-relational protein network. Based on the weighted multi-relational network, we proposed a protein function prediction method (FPM). Based on multi-relational networks. The experimental results fully verify the effectiveness of multi-relational networks.

2 Construction of Multi-relational Network With the increasing networking of human society, complex networks have become a new research hotspot, which has penetrated into mathematical science, life science and other fields. Complex networks have small-world characteristics and scale-free characteristics. Small-world characteristics are mainly characterized by high aggregation coefficient and low characteristic path length. Scale-free characteristics are mainly characterized by growth and priority connection, and node degree obeys power-law distribution. In real life, the connections between nodes in complex networks are diverse. In interpersonal networks, for example, people can communicate through email, telephone, MSN and other ways, so interpersonal networks constitute a complex multi-relationship network. In complex biological networks, such as PPI networks, there are also various connections between proteins, such as co-gene expression and co-work. Multi-relational networks have complex characteristics different from simple networks with single properties.

1648

M. Zheng and M. Zhuo

In the multi-relational network constructed in this paper, there are at most three different kinds of connections between two proteins: Do-main, shared neighbor and physical interaction in PPI network. The multi-relational network is based on the original PPI network. If two proteins contain at least one common domain, a set of interactions between two proteins will be added. If two proteins interact in the PPI network and have the same neighbors (proteins interacting in the original PPI network), a set of interactions will be added between the two proteins. Even if two proteins share neighbors, there is no interaction in the PPI network, and the interaction between the two proteins will not be established. The purpose of this strategy is to prevent Hub nodes from generating a large number of new interactions and to reduce the generation of artificial false positives. In order to reduce the negative effects caused by noise and improve the accuracy of prediction algorithm, existing protein function prediction algorithms begin to integrate PPI network and multiple biological information, so that there may be multiple links between proteins. In dealing with such a complex biological network, existing algorithms take the simplest way to merge different properties of edges into one side. The construction of multi-relational protein networks needs to be fused into simple networks for functional prediction. When dealing with fusion networks, the simplest way is to merge the edges of different properties into one edge for processing. As mentioned in the previous analysis, this method is not suitable for protein functional prediction. This paper considers the importance of interaction between different properties of proteins for functional prediction. In this way, the complex network with multiple relationships can be decomposed into several simple networks with different priorities. In other words, this paper first decomposes the multi-relational network into three single-relational simple networks and assigns a priority to each network. For a protein with a predictable function, the algorithm designed in this paper will traverse the neighbor nodes in the network with high priority, and only when the neighbor nodes are not traversed, will it continue to traverse the network with the highest priority. At the same time, our previous studies on protein complexes prediction and key protein recognition show that the performance of the prediction algorithm based on weighted network is better than that of the same algorithm based on non-weighted network. The reason is very simple: the weights represent the reliability of interaction, and the weighted network is more representative of the real interaction network than the non-weighted network. The interaction in the multi-relational network will be weighted further. The scoring function is shown in Formula 1. S¼

n X

Pðu; pi Þtij

ð1Þ

i¼1

P represents the weight of interaction between protein u and protein pi for predicted function.

Construction and Application of Multi-relational Protein Network

1649

3 Experiment As a standard data, Saccharomyces cerevisiae interaction network is widely used in network-based protein function prediction algorithm. The data of protein interaction and function annotation are relatively perfect and reliable. This experiment will also be based on Saccharomyces cerevisiae interaction data. PPI network data is derived from the version of DIP database on October 10, 2010, and self-interaction is eliminated. After repeated interactions, the DIP data contained 5093 proteins and 24743 groups of interactions. In Fig. 1, the number is the gene code in database DIP. According to the above analysis, compared with other functional prediction algorithms, FPM algorithm has the highest prediction accuracy, which strongly illustrates the reliability of the multirelational protein network constructed in this paper. In the proposed algorithm, we set the function selection strategy according to the network structure information. In order to verify the effectiveness of this method, we compared and analyzed the work of this strategy with the existing methods. Can choose strategy.

Fig. 1. The result of the algorithm proposed in the paper

1650

M. Zheng and M. Zhuo

4 Conclusion Improving the accuracy and performance of functional prediction. After incorporating multi-bioinformatics, protein-protein interactions become diversified. Different types of interactions play different roles in functional prediction. Simple combination of multiple interactions can increase the number of predicted functions, but at the same time increase the number of false-positive functions. The domain information constructs a protein interaction network with multiple relationships and assigns different priorities to different types of interactions. Based on the constructed protein network, a protein function prediction method named FPM is proposed. The effectiveness of the network is verified by comparing the performance of FPM and other classical protein function prediction algorithms. Acknowledgments. This work was supported by grants from The National Natural Science Foundation of China (No. 61862056), the Guangxi Natural Science Foundation (No. 2017GXNSFAA198148) foundation of Wuzhou University (No. 2017B001) and Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University.

References 1. Taipale, M.: Disruption of protein function by pathogenic mutations: common and uncommon mechanisms. Biochem. Cell Biol. 97(1), 46–57 (2019) 2. Zhang, X., Acencio, M.L., Lemke, N.: Predicting essential genes and proteins based on machine learning and network topological features: a comprehensive review. Frontiers Physiol. 7, 75 (2016) 3. Schwikowski, B., Uetz, P., Fields, S.: A network of protein-protein interactions in yeast. Nat. Biotechnol. 18(12), 1257–1261 (2000) 4. Hishigaki, H., Nakai, K., Ono, T., et al.: Assessment of prediction accuracy of protein function from protein-protein interaction data. Yeast 18(6), 523–531 (2001) 5. Chua, H.N., Sung, W.K., Wong, L.: Exploiting indirect neighbours and topological weight to predict protein function from protein-protein interactions. Bioinformatics 22(13), 1623– 1630 (2006) 6. Ren, J., Shang, L.L., Wang, Q., et al.: Ranking cancer proteins by integrating PPI network and protein expression profiles. Biomed. Res. Int. (2019) 7. Lipka, S., Kumar, A., Miladinovic, B., et al.: Systematic review with network meta-analysis: comparative effectiveness of topical steroids vs. PPIs for the treatment of the spectrum of eosinophilic oesophagitis. Aliment. Pharmacol. Ther. 43(6), 663–673 (2016) 8. Liu, G.M., Chai, B.F., Yang, K., et al.: Overlapping functional modules detection in PPI network with pair-wise constrained non-negative matrix tri-factorisation. IET Syst. Biol. 12 (2), 45–54 (2018) 9. Shi, Y.J., Yao, H., Guan, J.H., et al.: CPredictor 4.0: effectively detecting protein complexes in weighted dynamic PPI networks. Int. J. Data Min. Bioinform. 20(4), 303–319 (2018) 10. Moon, J.H., Lim, S., Jo, K., et al.: PINTnet: construction of condition-specific pathway interaction network by computing shortest paths on weighted PPI. BMC Syst. Biol. 11, 15 (2017)

Design Af Intelligent Pattern Sauce Pouring Machine Miao Shang1(&) and Yongtao Sun2 1

Mechanical and Electrical Technology, Xijing University, Xi’an, China [email protected] 2 Avic Xi’an Aircraft Industry, Xi’an, China

Abstract. With the rapid development of technology, intelligent appliances have gradually become mature in technology. In order to solve the problem of children’s poor appetite, the intelligent pattern sauce pouring machine is developed. In this paper, the development background of intelligent pattern sauce machine is introduced. The research content of intelligent pattern sauce machine is described. The technical scheme of intelligent pattern sauce machine is analyzed. The function of intelligent pattern sauce machine is explained. The working principle of intelligent pattern sauce pouring machine are summarized. Intelligent pattern sauce machine, including frame, synchronous belt, stepping motor, pulley, vertical plate, beam, lead screw, sliding table, sleeve, capacitor, electromagnet and so on. The intelligent pattern sauce pouring machine can realize the automatic pattern production in the xyz direction through three motors. Intelligent pattern sauce machine makes food attractive, meanwhile, intelligent pattern sauce machine promotes the temptation of food to children, thus making children have more appetite when eating. Intelligent design pour sauce machine also can let children learn in the process of enjoy gourmet food patterns or text. Intelligent pattern sauce machine can enhance children’s appetite, intelligent pattern sauce machine can improve children’s intelligence. Keywords: Sauce pouring machine  Intelligent  Appetite  Design  Children

1 Introduction With the rapid development of science and technology, smart home appliances have gradually become mature in technology. In the direction of opening up, smart home appliances choose a more suitable for the Chinese public can accept the way of development. Intelligent home appliances in the development process, the equipment has been given more human. In addition to meeting the needs of life, the research and development of smart home appliances also needs to be considered. Smart home appliances are not only recognized by consumers, but also need to be integrated into People’s Daily life [1]. Therefore intelligent home appliances in addition to meet the basic USES of life, the other functions of intelligent home appliances should also make people’s life more comfortable [2].

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1651–1654, 2020. https://doi.org/10.1007/978-3-030-25128-4_207

1652

M. Shang and Y. Sun

In daily life, the problem of children not eating seriously is one of the major problems troubling parents. In the market survey found that the vast majority of children are generally anorexia, picky food phenomenon [3]. There are many reasons for this phenomenon. For example, children’s parents are busy with work and neglect their children’s diet, children like to eat snacks, children eat irregularly and so on. As time goes on, anorexia and picky eating will bring a lot of trouble to children. Parents of children may also worry about their children’s prolonged loss of appetite or failure to think about food. If children’s anorexia and picky eating can not be enough attention, the child’s normal development will be a significant impact [4].

2 Research Content Intelligent pattern sauce machine can be converted through the computer and free choice of patterns or text, and then choose the taste of sauce through the machine running pouring on food, and then to achieve the purpose of children to eat. Intelligent pattern sauce machine can enhance children’s appetite, intelligent pattern sauce machine can improve children’s intelligence [5]. In order to achieve the above purposes, the research contents of intelligent pattern sauce pouring machine include: Market research. Make a design plan by investigating the common problems children encounter in the process of eating [6]. Design of intelligent pattern sauce machine. The design is based on the premise of automatic sauce pouring and the intelligent control. The optimal scheme is obtained by comparing multiple schemes [7]. Design of mechanical structure. The mechanical structure of the intelligent pattern sauce machine is designed on the premise of safety, practicality and economy. Design of intelligent control mechanism. The design of the control mechanism realizes automatic control through the computer, which is convenient to drop all kinds of images and words [8]. Optimization design of mechanism. On the basis of realizing the function, the intelligent pattern sauce machine is optimized.

3 Technical Solution Intelligent pattern sauce machine makes food attractive, meanwhile, intelligent pattern sauce machine promotes the temptation of food to children, thus making children have more appetite when eating [9]. Smart pattern sauce machine can also let children learn the patterns or words on the food while enjoying the delicious food. Intelligent pattern sauce machine can enhance children’s appetite, intelligent pattern sauce machine can improve children’s intelligence [10]. Intelligent pattern sauce machine including frame, synchronous belt, stepping motor, pulley, vertical plate, beam, lead screw, sliding table, sleeve, capacitor, electromagnet and so on. Rack up and down the borders of each 1 set has a synchronous

Design Af Intelligent Pattern Sauce Pouring Machine

1653

belt 11, synchronous bel 11 and stepper motor 12 output shaft connection, a synchronous belt 11 pulley stepper motor 2 and 12 are fixed on the vertical plate 13 pulley, vertical plate 13 set between beams 14, beam 14 each set up and down two synchronous belt 15, synchronous belt 15 connect two stepper motor 16, synchronous belt 15 set is pulley 16, into motor. And pulley16 set on the vertical plate17. vertical plate 17 is connected vertical plate18. three vertical plate three stepper motor has come on top set 19, at the other end of the motor 19 and screw 3 is connect, screw3 through 4 fixed bearing, screw 3 installed in the middle of the sliding Table 5, slide sleeve 6 is set up, the sleeve 6 bottom connection to container 9, the side of the sleeve 6 installed electromagnet 7. The shape of the sauce outlet is inverted trapezoid (Fig. 1).

Fig. 1. Structure diagram of the intelligent pattern sauce machine

4 Principle of Operation The working principle of intelligent pattern sauce pouring machine is as follows: The corresponding data will be generated by the pattern or text selected by the computer and transmitted to the stepper motor 2 by the data line; Stepper motor 16 and 19 control stepper motor 2; Step motor 2 drives synchronous belt 11; The stepping motor 16 controls the synchronous belt 15 to realize the movement on the frame 1; While the synchronous belt 15 moves, the stepping motor 19 rotates. Slide 5 will rotate the motion into a linear motion; The sliding Table 5 controls the container 9 to move up and down; At the same time, the computer controls the energizer of the coil in electromagnet 7 through the data line; Electromagnet 7 is absorbed after electrifying; The suction of the electromagnet 7 drives the wire 8 to move up and down; The outlet 10 is controlled to block and release; The control of the sauce outlet 10 realizes the automatic sauce outlet and stops the sauce outlet, and then the drawing of the pattern is completed.

1654

M. Shang and Y. Sun

5 Conclusion Intelligent pattern sauce machine makes food attractive, meanwhile, intelligent pattern sauce machine promotes the temptation of food to children, thus making children have more appetite when eating. Intelligent pattern sauce machine including frame, synchronous belt, stepping motor, pulley, vertical plate, beam, lead screw, sliding table, sleeve, capacitor, electromagnet and so on. In this paper, the development background of intelligent pattern sauce pouring machine is introduced. The research content is described. The technical scheme is analyzed. The function is explained. The working principle is summarized. The intelligent pattern sauce pouring machine can realize the automatic pattern production in the xyz direction through three motors. Intelligent pattern sauce machine makes food attractive, meanwhile, intelligent pattern sauce machine promotes the temptation of food to children, thus making children have more appetite when eating. Intelligent design pour sauce machine also can let children learn in the process of enjoy gourmet food patterns or text. Intelligent pattern sauce machine can enhance children’s appetite, intelligent pattern sauce machine can improve children’s intelligence.

References 1. Liu, Z.: Motor and Electrical Control. Electronic Industry Press, Beijing (2008). (in Chinese) 2. Li, Y.: Maintenance of Motor Technology. China Power Press, Beijing (2012). (in Chinese) 3. Hu, X.: Motor and Drag the Foundation. Mechanical Industry Publishing House, Beijing (2000). (in Chinese) 4. Zhao, C.: Motor and Its Application. Aviation Industry Press, Beijing (1993, in press) 5. Qiu, D.: The failure reasons of three-phase asynchronous motor is analysed and solutions. J. Heilongjiang Metall. 1–5, 4 (2011). (in Chinese) 6. Geng, G., Jing, B.: Materials and Physical Properties. Peking University press (2010). (in Chinese) 7. Shang, M., Lin, G.: Analysis of mechanical characteristic of three-phase asynchronous motor. In: Chemical and Mechanical Engineering, Information Technologies, pp. 1575– 1579. Trans Tech Publication (2003). (in Chinese) 8. Yi, H.: System Design Basis and Examples. Mechanical Industry Publication, Beijing (2008). (in Chinese) 9. Wang, X.: Modern Control Theory Foundation. Mechanical Industry Publishing House, Beijing (2007). (in Chinese) 10. Qu, H.: Plastic Forming Process and Mold Design, pp. 26–31. Higher Education Press, Beijing (2014). (in Chinese)

College English Reading Teaching Based on WeChat and Reading Circle – a Case Study of Advanced English Hong Wu(&) Institute of Foreign Languages, Jiangxi Science and Technology Normal University, Nanchang 330108, China [email protected]

Abstract. With the rapid development of Internet technology in China, college English reading teaching is facing new opportunities and challenges. Under the background of developed network, the traditional teaching mode can not fully meet the needs of English reading teaching. This paper takes advantage of WeChat’s instant voice message and mutual sharing, combines traditional teaching with modern internet technology and constructs a new Reading Circle model in Advanced English teaching. This paper is aimed at suggesting a new approach for college English reading course teaching, thus enhancing the effectiveness of talent training. Keywords: WeChat  Reading circle advanced english Teaching modernization



1 Research Background and Significance The latest Requirements for College English Teaching released by the Ministry of Education clearly points out that it is necessary to cultivate students’ comprehensive English ability and improve their overall cultural literacy [1]. English Reading is a key course for this purpose. However, at present, there are many problems in the teaching of college English Reading courses. The most obvious one is that students have lost their interest in English reading, and few students participate in classroom activity, let alone raise their own questions. In essence, this is because the teaching of college English has always been at the level of acquisition of knowledge and skills led by teachers, and has not really gone deep into communication and culture. Students are robbed of opportunities to participate and think, thus losing initiative in English reading. At the same time, the extensive application of mobile terminals and wireless communication network leads to the “soundbite culture,” which brings great challenges to English reading teaching. In the Internet era, college students read widely but lack of depth, which will inevitably harm the development of thinking ability of college students in the long run. Therefore, how to change passivity into activeness and make effective use of the development of information technology to assist reading teaching has become a widely researched topic [2–5]. And based on these research results, some

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1655–1659, 2020. https://doi.org/10.1007/978-3-030-25128-4_208

1656

H. Wu

effective teaching modes have also been proposed [6–8]. This paper bases itself on constructivism and independent learning theory, takes Advanced English course as a case study, and constructs a new teaching mode based on WeChat platform and Harvey Daniels’s “Reading Circle” to promote the teaching reform of college English reading and improve students’ independent reading and critical thinking ability (Table 1).

2 Concept and Characteristics of the New “Reading Circle” Model Based on WeChat 2.1

Concept of “Reading Circle”

The concept of “reading circle” grew out of a book by Harvey Daniels called the Literary Circle: Voice and Choice in a Student-Centered Classroom. The book gives a comprehensive description of the connotation of “literary circle”, and holds that “literary circle” is a temporary reading group, in which members select literary works and read them independently and discuss with each other later in class. Discussion group members exchange roles, select more reading materials, re-form a new “literary circle”, and start new rounds of reading and discussion [9]. “Reading Circle” in this study is slightly adjusted on the basis of Daniels’ “literary circle”. The reading materials are not limited to literary works, but cover a variety of genres and styles such as news features, speeches and biographies. 2.2

Features of WeChat + New “Reading Circle” Teaching Mode

The new “Reading Circle” based on WeChat, a better adaption to students’ reading ability development, poses a great challenge to traditional mode which features teaching English knowledge and skills. It well explains expert Goldman Kenneth’s idea that reading is not a process of decoding words, but the process of understanding these words in specific culture [10]. The new “Reading Circle” based on WeChat effectively connects the in-class and after-class, greatly expanding the space of English reading teaching. The main features of this teaching mode are as follows: 1. Enhancing Students’ Learning Initiative and Independent Reading Ability Classroom under the “Reading Circle” mode is student-led reading and discussion activities, which breaks the traditional boring vocabulary and grammar learning mode. Students are transformed from passive receivers to active participants. They combine their existing knowledge and life experience to construct the meaning of reading materials, and then share and discuss with the other members of the circle through WeChat platform, which helps to avoid the learning anxiety caused by confrontation with teachers in traditional classes and improves their learning initiative and independent reading ability.

College English Reading Teaching Based on WeChat and Reading Circle

1657

2. Improving Students’ English Communication Ability and Teamwork Spirit The cultivation of oral English communicative competence is not achieved by the teaching of skills and knowledge, but by a large number of daily practical training. “Reading Circle” requires group members to discuss and share through WeChat platform and face-to-face interaction, which can effectively promote students’ oral English communication. In addition, each member of the circle undertakes different tasks, consulting materials, making PPT, creating questions, discussing and summarizing, drawing and so on. Only by cooperating with each other can each part of the class discussion go on smoothly. Therefore, the “Reading Circle” model is helpful to enhance students’ teamwork spirit. 3. Expanding Teaching Space The immediacy and interactivity of WeChat software enable the circles based on WeChat platform to truly break the time and space limitation of teacher-student and student-student communication, effectively connecting the classroom and outside, and enhancing the interactivity in reading classroom. Members of the circle can discuss not only through WeChat after reading the assigned reading material but also other good works they have read. This helps the students to expand the limited classroom time through good use of fragmented time and form the good habit of lifelong reading.

3 Teaching Design of Advanced English Under WeChat + New “Reading Circle” Mode The teaching design in this study is divided into 3 phases. (1) Pre-class Independent Reading under WeChat According to the number of students in the class, students can freely form groups of 5–7, establish WeChat group and assign roles. After determining the roles, each group member can read independently and complete the tasks required by the role. While completing their own role tasks, each group member can also respond to the content shared by other members. The major roles in this study have been modified based on the framework advanced by Harvey Daniels in 2002 [11]. These roles are the Discussion Leader, Linking Person, Prominent Point Person, Background Information Person and Summarizing Person. The responsibilities of each role are as shown in the table (Adjustment could be made according to the number of each group, e.g. one role can be played by 2 different students, but each member is expected to play a different role in the next reading circle):

1658

H. Wu Table 1. Roles and responsibilities for circle members

Roles Background Information Person

Discussion Leader

Linking Person

Prominent Point Person

Summarizing Person

Responsibilities Responsible for collecting relevant background information, such as the historical background of a text; Analyzing the content and structure of the reading materials based on the background information collected; Sharing with other members of the group through WeChat group to help them better understand the text Responsible for presiding over the whole class discussion activities; Creating 3–5 open questions according to the text before the discussion, and sharing the questions with the group members through the WeChat group Responsible for Analyzing, comparing, and discovering the connection between the reading material and the outside world; The connection can be text-text or text-to-movies/ TV plays, or textself/others Sharing with other members through WeChat group Responsible for locating and listing the difficult or interesting words, sentences and paragraphs in the reading materials and including person understanding; Sharing with the other members of through WeChat group before later discussion Responsible for taking notes during the discussion, and summarizing the ideas and key points in the form of words or drawings after the discussion; Sharing the summary with the whole class through the WeChat group for discussion between circles

(2) In-Class Discussion The pre-class independent reading and sharing, which enables each group to have a macro grasp of the background, theme, structure, etc., is followed by in-depth in-class discussion of the open questions and difficult or interesting language phenomenon, which can help students to connect course content with the real world, making language learning no longer divorced from reality, and thus enhancing learning interest. In addition, the discussions among the members of the circle allow each member to be exposed to different views and deepen their understanding of things, thus improving their critical thinking ability. The class discussion time of each group is at least 30– 35 min. In addition to open topics that arouse students’ thinking, questioning and criticism, students can also discuss the difficult or interesting parts of the course content and jointly master the key points of language and style in the text. The in-class discussions cover all the main contents required by the syllabus of Advanced English course, and train the students’ abilities and qualities at multiple levels, such as knowledge, communication and culture.

College English Reading Teaching Based on WeChat and Reading Circle

1659

(3) After-Class Summarizing and Consolidation After-class summarizing and consolidation is also very important since one can only gain new insights through reviewing the old. The summary and drawing after the discussion can make a systematic, comprehensive and vivid summary of the content discussed in class, which is helpful to sort out the important course content and consolidate the results of the discussion. At the same time, teachers can further help students to consolidate their knowledge by putting up translation, paraphrasing, writing and other exercises through the WeChat group.

4 Conclusion The application of WeChat + new “Reading Circle” in the teaching of Advanced English proves that this model has obvious effects on reducing students’ learning anxiety, and improving students’ interest in English learning, autonomous reading ability and communicative ability. However, there still exist problems in real teaching. There are students who are not competent for role tasks due to weak foundation, and students who can not participate well in class discussions. All these issues deserve attention and further study.

References 1. Qiao, X.: Recognition of college English course teaching requirements. Heilongjiang High. Educ. Res. 11, 156–159 (2014). (in Chinese) 2. Duan, J.: New research on college English reading teaching based on network informatization. J. Heilongjiang Inst. Educ. 37, 139–141 (2018). (in Chinese) 3. Li, L.: Critical absence of middle school students in advanced English teaching and its countermeasures. J. Gansu Normal Univ. 23, 82–86 (2018). (in Chinese) 4. Gao, Y.: Discussion on the application of WeChat platform in college English reading course teaching. English Campus 10, 22–23 (2018). (in Chinese) 5. Han, J.: Research on building online reading circle to improve college students’ critical thinking ability in English reading. Commun. Force Res. 2, 221 (2018). (in Chinese) 6. Li, L., Tang, J.: Research on the effectiveness of college English reading teaching under TBLT. J. High. Educ. 6, 85–87 (2018). (in Chinese) 7. Lin, Y.: Action research on question-based teaching model in advanced English teaching. English Square 12, 97–98 (2017). (in Chinese) 8. Yang, Q., Yang, Ji., Shen, Q., et al.: Research on “advanced English” teaching model based on blue ink cloud class. J. Hebei Agric. Univ. (Agric. For. Educ. Ed.) 92, 58–63 (2018). (in Chinese) 9. Harvey, D.: Literature Circles: Voice and Choice in the Student-Centered Classroom. Stenhouse Publishers, York (1994) 10. Goodman, K.: On Reading. Reed Elsevier Incorporated, New York (1996) 11. Harvey, D.: Literature Circles: Voice and Choice in Book Clubs and Reading Groups. Stenhouse Publishers, Portland (2002)

Analysis of the Present Situation and Countermeasures of Teaching Secretaries in Private Colleges and Universities Under the Information-Based Environment Taking a Private College in Wuhan as an Example Hongyan Zhang(&) Wuhan Technology and Business University, Wuhan, Hubei, China [email protected]

Abstract. Teaching secretaries, shouldering the dual functions to provide teaching management and teaching service, serve as the most primary teaching administrator in the teaching management team among higher learning institutions. Accordingly, the management level and work quality of teaching secretaries can exert immediate impact on the general quality of teaching management among the whole institution. Private colleges and universities in China have started relatively late with rapid development in size though. Hence, with limitations on funds, experience and stamina, the teaching management among Private colleges and universities has been confronted with various problems. Therefore, it is one of the most pressing task to build a team of teaching secretaries with high qualities, strong competence but low turnover rate with the purpose to address those problems arising from teaching management process since teaching secretaries are the most primary teaching administrators among private colleges and universities. Keywords: Private colleges and universities Team building

 Teaching secretary 

1 The Status Quo of the Construction of Teaching Secretaries in Private Colleges and Universities Under the InformationBased Environment Despite the fact that private colleges and universities pay more emphasis on continuously improving teaching quality and the quality of teaching management compared with traditional public colleges and universities, however, most private colleges and universities still focus more on specialty construction, teaching faculty construction, personnel allocation of intermediate and senior teachers as well as bringing in senior teaching management personnel, but usually ignore the team building of teaching secretaries [1]. Taking a private higher learning institution: S College in Wuhan, as an example, it has around 14,000 students on campus, approximately 700 full time and part time teachers, 12 teaching units (schools) and 15 teaching secretaries in total [2]. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1660–1664, 2020. https://doi.org/10.1007/978-3-030-25128-4_209

Analysis of the Present Situation and Countermeasures of Teaching Secretaries

1661

Teaching secretaries are arranged at the ratio of 1500:1, which is to allocate 2 teaching secretaries for over 1,500 students. 1.1

Teaching Secretaries of Private Colleges and Universities Shoulder a Wide Range of Work, Heavy Workloads and Huge Responsibilities

In order to save cost, most private colleges and universities set relatively fewer administration posts, and they usually set only 2 to 3 administrative posts, of which most are multiple-job holdings [3]. Moreover, there are usually large number of students in those private institutions [4]. The insufficient standardization in teaching management leads to heaps of clerical work [5]. At S college, except for leadership positions like deans and assistant deans, there are only two administrative posts: office director and teaching secretary to deal with the primary management work. The teaching secretary works as part-time executive secretary or office secretary for the most time to deal with some office work, scientific and research management, finance management, human resources management, files management and so on in addition to the work assigned by the academic affairs department and leaders who governs teaching [6]. The teaching secretary is mostly swamped in routine work such as answering phone calls, responding to various notices and filling out all kinds of forms, which leave them no time nor vigor to consider about how to further improve management efficiency [7, 8]. 1.2

The Overall Quality of Teaching Secretaries in Private Colleges and Universities Is Uneven, with Specialty Mismatching Issues

Due to its short history in development, most private colleges and universities set lower requirements for recruiting administrative staff (not including full time teachers) at the very beginning of the institution. In addition, most teaching secretaries are female, causing an unbalanced gender structure; teaching secretaries are often fresh graduates who lack of management experience and skills, causing an unbalanced age structure; most teaching management staff only accept pre-employment training when they get on board, but no training on teaching management theories. At S college, 14 out of the current 15 teaching secretaries are female, only 6 have professional background in teaching management, Chinese, secretary or management disciplines; only 1 gets master degree through on-job graduate education, 11 has bachelor degrees, and even 3 of them only have junior college degrees. These teaching secretaries are assigned with the same work content which prevents them from making full use of or improving their professional backgrounds, instead, it makes them feel at a loss as to what to do when they first take over the teaching management work [9, 10]. This situation has adverse effect on improving the teaching management. 1.3

Insufficient Appreciation to the Role of Teaching Secretary with Lower Remuneration Packages

Due to the short development history, Private colleges and universities are confronted with great limitations on finance and human resources. In the process of upgrading the

1662

H. Zhang

schooling management level, most Private colleges and universities consider more about specialty construction, teaching faculty construction, and improvement of senior management team while teaching secretaries are often overlooked as the cell unit in teaching management. Both school leaders or teachers usually take teaching secretaries as “a janieor in teaching management and someone who is not qualified to teach and has no choices but to do these insignificant and simple tasks”. What’s more, there are certain gaps between teaching secretaries and other staff when it comes to professional title assessment, political treatment and income level. According to the systems of academic affairs office and human resources searched from the official website of S college, it has been discovered that S college has no systems for teaching secretaries in relation to management, training and promotion except for “Job Responsibilities of Teaching Secretaries”. The role of teaching secretaries is not duly appreciated, and their salaries always rank the lowest among the administrative staff. 1.4

Higher Turnover Rate Due to Lack of Promotion Prospects and Motivations Among Teaching Secretaries

The work of teaching secretaries involves every aspect of teaching, which is of great complexity and huge responsibility. Moreover, it is considerably hard for teaching secretaries to accomplish some laudable and noticeable achievements since their work result is generally to maintain the normal operation of teaching order. Most higher learning institutions offer teaching secretaries with few opportunities for continuing education or further training and promotions. At S college, some teaching secretary, out of the existing 15, has worked for this college for 13 years, just 3 years less than the school-running. However, this secretary was offered with out-of-college professional training for only one time, and salary raise for only one time except for the general salary raise for all staffs. Accordingly, the salary of this teaching secretary still ranks the lower level compared with other staff who has worked for the college for the same amount of years. It is pretty much the same case with other teaching secretaries. The lack of promotion prospects and motivation for teaching secretaries among private colleges and universities make some teaching secretaries give up their post without second thoughts when they are offered with better options.

2 A Few Thoughts on Enhancing the Teaching Secretary Team Building Among Private Colleges and Universities 2.1

To Specify the Job Responsibility of Teaching Secretaries

To begin with, it is suggested to specify the job responsibility of teaching secretaries among private colleges and universities. The major responsibility of a teaching secretary is to undertake teaching management work, with less or no engagement in other administrative work. In the meantime, Private colleges and universities are suggested to reasonably increase administrative establishment for teaching units. The private colleges and universities should take into consideration of the complexity of teaching management, the number of students and full time teachers, and then allocate primary

Analysis of the Present Situation and Countermeasures of Teaching Secretaries

1663

teaching management staff based on appropriate proportion so as to reduce the workload of teaching secretaries and save them from miscellaneous administrative work so that they can dedicate themselves to teaching management. It is not suggested to turn teaching secretaries to “jack of all trades” since it will only lead them to make more mistakes while they undertake more responsibilities, causing adverse effect on longitudinal and in-depth development of teaching management. 2.2

Try to Improve the Education Background and Professional Title of Teaching Secretaries

There are two approaches to improve the education background of teaching secretaries: one is to recruit master degrees to work as teaching secretaries, and the other way is to encourage the current teaching secretaries to improve their education background through self-study or continuing education. The school leaders at various levels should provide substantial support for teaching secretaries to pursue on-job postgraduate education and offer chances to engage in advance studies at other institutions so they can systematically learn professional knowledge about teaching management, educational psychology and the specialties of the institution to improve their knowledge level, management level and work competency as well as their capability to research issues and address problems eventually. In short, the leaders of institutions should pay more attention to teaching secretaries since they make an important role in the teaching management. Only with effective systems, reasonable and humanized policies, can it motivate the teaching secretaries to work with more enthusiasm, and build a stable teaching secretary team to eventually improve the teaching management level among higher learning institutions more practically. 2.3

Leaders at Various Levels Should Attach Full Importance to the Role of Teaching Secretary and Enhance the Team Building of Teaching Secretaries

It is suggested to realize the complexity nature and time effectiveness of teaching secretary work as well as the high demand for strong responsibility and dedication. Leaders at various levels should put forward some preferential policies regarding professional title assessment and advance studies for teaching secretaries based on the characteristics of their work so as to ease teaching secretaries’ anxiety about their personal professional titles and career development and encourage them to focus on doing teaching management work well. Private colleges and universities should introduce competitive mechanisms to address the problem that the profession of teaching secretary team does not match with their work. The competitive mechanism can be executed from two aspects: one is to practice competition for a post from within; and another is to bring in some staff by recruiting graduates with specialties at secretary or management. By doing that, it can not only address the profession mismatching but also promote the teaching management by making full use of staff who really knows well about management.

1664

2.4

H. Zhang

Improve the Remuneration Package for Teaching Secretaries

It is suggested to improve the economic benefits and administration treatment for teaching secretaries to make this post become attractive and promising. It frequently occurs in the recruitment of higher learning institutions that a dozen of people compete for a post rather than teaching secretary while not a single candidate actually applies for the teaching secretary post, which leaves the institution no choice but to keep the teaching secretory stay by giving administrative orders. The fundamental reason for why does this happen is that the post of teaching secretary is usually paid less but with heavy workload. On the one hand, since it is difficult to quantify the daily work of a teaching secretary, colleges and universities are suggested to establish a performance assessment system with more flexibility, reasonableness and humanization and further improve the salaries, allowance for teaching secretaries; on the other hand, it is suggested to set up a reasonable system to select and appoint management personnel and provide reasonable promotion prospects for teaching secretaries based on their actual performance on virtues, competence, diligence and accomplishments.

References 1. Nie, C.: Discussions on the specialization construction of teaching secretaries among higher learning institutions. J. Inner Mongolia Norm. Univ. 30, 67–70 (2017). (in Chinese) 2. Jianwei, Guo: Brief analysis on teaching secretary team construction among higher learning institutions. Farmers Consultant 20, 195 (2018). (in Chinese) 3. Li, Y.: Research on teaching secretary team building among private colleges and universities-a case study of 3 private colleges and universities in Huadu Region of Guangzhou City. Guangxi Normal University, vol. 31, pp. 65–66 (2018). (in Chinese) 4. Qiu, Z.: Brief discussion on the current status and team building of teaching secretaries among higher learning institutions. J. Shaanxi Norm. Univ. (Philos. Soc. Sci. Edn.) 09, 234– 235 (2007). (in Chinese) 5. Heng, Zhu, Luyao, Liu: On the construction of undergraduate teaching management team in colleges and departments of universities. Educ. Teach. Forum 16, 12–14 (2018). (in Chinese) 6. Zhu, L., Xue, Z.: Current situation analysis and countermeasure research on the construction of teaching secretaries in independent colleges. High. Educ. 07, 79 (2013). (in Chinese) 7. Liu, C.: On the difficulty of teaching secretaries’ work in private colleges and universities. Fireworks Sci. Technol. Market 04, 13–14 (2018). (in Chinese) 8. Lijiao, Min: on the construction of teaching secretaries in private colleges and universities. Nanyang Vocat. Tech. Coll. Wuxi Z1, 32–33 (2014). (in Chinese) 9. Fan, X.: Some thoughts on the work of teaching secretaries in private colleges and universities. Career Forum 01, 23 (2013). (in Chinese) 10. Deng, X.: Problems and countermeasures in the construction of teaching secretaries in private colleges and universities. Private Educ. Res. 05, 48–50 (2010). (in Chinese)

DC Motor Application and Control Method in Automobile Automatic Transmission Electronic Oil Pump Ying Zeng, Hongrong Wang(&), and Zhou Zhou China Automotive Engineering Research Institute Co., Ltd., Chongqing, China {zengying,wanghongrong,zhouzhou}@caeri.com.cn

Abstract. With the advent of new permanent magnet materials and the development of electronic technology, an advanced “brushless DC motor (BLDC)” has been produced. Applying this new product (BLDC) to the automatic transmission electronic oil pump of the automobile has brought about major changes in its power source and executive function mechanism. Based on the characteristics of the electronic oil pump, this paper studies the control method of the brushless DC motor and analyzes the electronic oil pump motor. The speed-current double closed-loop control system is adopted, which can adapt to the load abrupt process brought by the disturbance of the hydraulic system and can reach the steady state quickly. And the application circuit is simple, small in size and easy to implement. Oil-current characteristic control can also be added in subsequent studies to achieve the control requirements of the hydraulic system to precisely adjust the main pressure. Keywords: BLDC

 Electric  Oil  Pump  Double  Close  Control

1 Introduction The automatic transmission uses oil as the transmission medium to drive the clutch and the fork to complete various actions. The mechanical oil pump used in the traditional hydraulic system is inefficient, and in some working conditions requiring less oil pressure, it is still running at full power, resulting in energy waste and fuel consumption. Therefore, a new hydraulic system that replaces a mechanical oil pump with an electronic oil pump has been developed and applied [1–3]. The electronic oil pump is driven by Brushless Direct Current (BLDC), which has the advantages of high efficiency, fast response and adjustable power. BLDC is a new type of motor that has rapidly matured with the development of power electronics and new permanent magnet materials [4]. With its small size, light weight, long service life, high efficiency, small inertia and high control precision, it also retains the excellent mechanical properties of ordinary DC motors. The products used in automobiles require simple control system design, low cost, reasonable control algorithm and short development cycle.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1665–1669, 2020. https://doi.org/10.1007/978-3-030-25128-4_210

1666

Y. Zeng et al.

2 Brushless DC Motor Works The BLDC motor is mainly composed of a permanent magnet rotor, a stator winding and a rotor position detector (Hall sensor). The design idea of the brushless DC motor is derived from the brushed DC motor. Compared with the brushed DC motor, the stator and the rotor are adjusted to each other in addition to the mechanical brush. The rotor of a brushless DC motor consists of permanent magnets that produce a constant magnetic flux that rotates with the rotor [5]. Brushless DC motors have multiphase windings in the stator, often three phases. The operating principle is the same as that of a brushed DC motor, that is, under a magnetic pole with a constant magnetic flux density distribution, a winding bar with a constant total current cuts the magnetic lines generated by the magnetic poles, and induces a constant-sized electromagnetic field. Torque (at the same speed). Only the magnetic pole of the magnetic flux generated by the brushless DC motor is rotated, and the bar for cutting the magnetic field lines is stationary, but the relative motion is maintained between the two. Brushless DC motor drives have a multi-phase structure and can be divided into half-bridge drive and full-bridge drive. The full-bridge drive is divided into star and angle connections and different power-on modes. As shown in Fig. 1, the three-phase star full-bridge drive is used, which is most used with the advantages of high winding utilization, low torque fluctuation and low circuit cost [6].

Fig. 1. Schematic diagram of the drive circuit of the brushless DC motor

3 Electronic Oil Pump Motor Control Method 3.1

DC Brushless Motor Control Method

The brushless DC motor control mode can be generally divided into: three-phase sixstate 120° bipolar, three-phase six-state 180° bipolar, three-phase three-state 120° unipolar, three-phase six-state 180° unipolar 4 ways. The three-phase six-state bipolar control mode ensures that at least two phase windings are turned on each time to ensure that the conduction winding is at a large magnetic flux density. Compared with the three-phase three-state control method, the magnetic flux generated by the permanent magnet pole is more fully utilized. The three-phase six-state 180° bipolar control

DC Motor Application and Control Method

1667

method has a three-phase winding conduction electromagnetic torque synthesized at any time than the three-phase six-state 120° bipolar mode, so that the power consumption of the motor increases. Therefore, the more common control method is the three-phase six-state 120° bipolar control mode [7]. Stator star connection, the three-phase winding is completely symmetrical, working in two-phase conduction, three-phase six-state; the back-potential waveform is a trapezoidal wave [8, 9] with a flat top width of 120° electrical angle; the magnetic circuit is not saturated during the working process. Excluding the eddy current and hysteresis loss; the air gap is uniform, the magnetic field is square wave, the stator current and the rotor magnetic field distribution are all symmetric, and the armature winding is evenly and continuously distributed on the inner surface of the stator; the armature effect and the cogging effect are neglected [11]. Under the above assumptions, the mathematical model of the brushless DC motor can be obtained as follows: The voltage balance equation of the three-phase winding can be obtained by using Kirchhoff’s voltage law [5, 10]: 0

1 0 uA R @ uB A ¼ @ 0 0 uC

0 R 0

10 1 0 0 iA LM 0 A@ i B A þ @ R iC

1 0

LM

1 0 1 iA eA AP@ iB A þ @ eB A LM iC eC ð1Þ

According to the winding voltage equation, the equivalent circuit of the brushless DC motor is shown in Fig. 2:

Fig. 2. Equivalent circuit diagram of brushless DC motor

3.2

Electronic Oil Pump Motor Control Method

Based on the requirements of the hydraulic system, the electronic oil pump is required to pump enough flow to balance the leakage amount to achieve the purpose of increasing the oil pressure. Therefore, the speed control of the oil pump motor is adopted [11, 12]. Suppose that at a certain moment, when the motor is in the A + B - conduction state, the motor voltage balance equation at this time is:

1668

Y. Zeng et al.

U  2DU ¼ RA iA þ LA

diA diB þ EA  RB iB  LB  EB dt dt

ð2Þ

iA ¼ iB ¼ const

ð3Þ

U  2DU ¼ 2RiA þ Ke n

ð4Þ

According to the above formula, the speed governing equation of BLDC can be obtained: n¼

U  2DU 2RiA U  2DU 2RTem  ¼  Ke Ke Ke Ke KT

ð5Þ

Among them, Kɛ is the average back EMF coefficient, ΔU is the power tube voltage drop, KT is the average torque factor. 3.3

Electronic Oil Pump Motor Control Algorithm

In the control algorithm, if only the closed-loop control of the speed is adopted [13], the voltage suddenly increases during the speed-up adjustment process, and the rotor does not change the speed due to the inertia, and the speed negative feedback does not change, so that the driving current suddenly rises rapidly, causing a current surge. Therefore, a speed-current double closed loop control system is generally employed. The speed is controlled as the outer ring and the current is controlled as the inner ring to achieve smooth speed regulation.

4 Conclusion The electronic oil pump brushless DC motor adopts the speed-current double closedloop control system to adapt to the sudden load change process caused by the disturbance of the hydraulic system, and can quickly reach the steady state. Moreover, the application circuit is simple, easy to implement, and small in size. Oil-current characteristic control can also be added in subsequent studies to achieve the control requirements of the hydraulic system to precisely adjust the main pressure. Acknowledgments. This research was supported by Chongqing Science and Technology Innovation Leading Talents Support Plan (CSTCCXLJRC201716), National Science and Technology Support Program (2014BAG10B018).

References 1. Ning, L., Jing, B.: Electric Power Drag and Motion Control System. Higher Education Press, Beijing (2009). (in Chinese) 2. Hu, W.J.: Developments and prospects of permanent magnetic brushless DC motor. Micromotors 35(4), 37–38 (2002). (in Chinese)

DC Motor Application and Control Method

1669

3. Wenzhuo, Z.: Application Technology of Single Chip Microcomputer. Mechanical Industry Press, Beijing (2008). (in Chinese) 4. Shouqi, W., Yingjie, Y.: Pulse Width Modulation Control Technology for Electric Drive. Mechanical Industry Press, Beijing (1995). (in Chinese) 5. Cai, Y.C.: Hall position sensors in brushless DC motor. Small Spec. Electr. Mach. 27(5), 23– 25 (1999). (in Chinese) 6. Wei, Z.: Principle and Application of DC Brushless Motor. Mechanical Industry Press, Beijing (1996). (in Chinese) 7. Chen, W., Liu, Z., Liu, K., Xia, C., Yan, Q.: Three-phase voltage vector position detection method for brushless DC motor under low speed. Trans. China Electrotech. Soc. 32(4), 133– 139 (2017). (in Chinese) 8. Changliang, X.: Brushless DC Motor Control System. Science and Technology Press, Beijing (2009). (in Chinese) 9. Wei, X., Bin, D., Jing, L.: Research on torque ripple of brushless DC motor under non-ideal back EMF. J. Syst. Simul. 6 (2018, in Chinese) 10. Junjie, Z., Haoran, L., Feng, J., Xiangzhong, W.: Research on improved SEPIC circuit of brushless DC motor. Chin. J. Sci. Instrum. 11, 2866–2873 (2017). (in Chinese) 11. Zhu, L.: Optimization of cogging torque and pole slot ratio of permanent magnet brushless DC motor. Harbin University of Science and Technology (2014, in Chinese) 12. Xia, C.: Permanent Magnet Brushless DC Motor and Its Control Electrotechnical Science, vol. 27, no. 3, (2012, in Chinese) 13. Wu, C.: Research on structure and design of new brushless DC oil pump motor. Shenyang University of Technology (2015, in Chinese)

Keywords Extraction of Medical Information in the Era of Big Data Na Wang1 and Jinguo Wang2(&) 1

2

Department of Anesthesiology, First Hospital of Jilin University, Changchun, China Department of Urology, First Hospital of Jilin University, Changchun, China [email protected]

Abstract. This paper introduces a kind of network intelligence collection system and the system structure, combined with the architecture analysis of key techniques and implementation methods in the process of system implementation. It generated in the improvement of cyber intelligence automatically. The generation process of key words and the sentence extraction algorithm and analysis of the quality evaluation method provide the measures to guarantee the safe operation of the system. In order to overcome the shortcoming of low precision of the traditional medical keyword extraction, the article puts forward a kind of multistage medical keyword extraction algorithm on the base of the statistical characteristics. The algorithm USES which is the word index of discrete coefficient formula eliminates noise, builds word frequency - reverse text information on weights of evaluation function to measure the importance of keywords, on the base of frequency skewness, words, and position of words. The experimental results show that the algorithm is superior to the traditional method, and in the era of big data it has extensive application value in the network information monitoring. Keywords: Cyber intelligence

 Keyword extraction  Big data

1 Introduction With the transformation of Chinese economy and society, various contradictions will be more fully displayed on the Internet [1]. How the state and local governments can effectively use the massive network information resources, find hot topics and emergencies as soon as possible, reasonably guide the direction of public opinion, and become an important topic of government decision-making intelligence research [2]. In the fierce competition, it has become an important issue in competitive intelligence research how to obtain competitors’ information through the network, make market warning and strategy formulation to obtain competitive advantage [3]. At the same time, how to extract research value points from the complex network information has become an important issue of research information [4]. Keyword extraction is the basic work of hot topic discovery and network intelligence monitoring in the network. A good keyword can directly hit the core of hot topics, become an important clue of

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1670–1674, 2020. https://doi.org/10.1007/978-3-030-25128-4_211

Keywords Extraction of Medical Information in the Era of Big Data

1671

intelligence monitoring, and improve the ability of government decision-making intelligence, hospital competitive intelligence and research intelligence discovery.

2 Establish the Concept of Cyber Intelligence 2.1

Concept of Cyber Intelligence

The view of information in the Internet age is an increasingly important role in the negative. It is infinite, expand area of intelligence, no restraint in intelligence work practice drifted extends to every corner of society, the intelligence agencies from the original position of business intelligence [5]. In addition, the concept of intelligence is not an exact connotation of intelligence, but improperly enlarge its denotation, the information and intelligence is blurry [6]. It can be said that the great intelligence concept only expands the extension of information science, and does not deepen the connotation of information science, so it cannot adapt to the requirements of the network environment [7]. 2.2

Research Contents

The view of information in the network environment is mainly to find an information theory suitable for the characteristics of the network era [8]. At present, most people think that the view of information under the network environment should be the modern view of information. First of all, the modern concept of intelligence on the macro to construct general information science, namely from the big social system research intelligence information and using rules and phenomenon with functions of comprehensive science, is a interdisciplinary problem oriented, beyond the intelligence theory research in the field of the study of intelligence and intelligence work general regularity [8]. Secondly, modern information concept defines the discipline status of information science from the perspective of knowledge discovery, collection, innovation, absorption, dissemination and evaluation [9]. Thirdly, modern information view deepens the connotation of information science from the aspect of quality and strengthens the research of network metrology from the aspect of quantity [10]. In a word, the network intelligence concept emphasizes the order from the level of knowledge, vigorously carry out knowledge research, and eliminate the uncertainty in decision-making. Information measurement is transformed from document unit to knowledge unit and from grammar level to pragmatics level [11].

3 Identify False Information In large data, optimizing the false intelligence information recognition can effectively filter the false intelligence, purify the network space. To identify the false information, should calculate all average intelligence information entropy measure of the extent of discrete data sets, using the data from different types of intelligence information entropy weights of distinguish the true and false intelligence, but the traditional

1672

N. Wang and J. Wang

methods by building intelligence vector space model, complete recognition on false information semantic features to retrieve [12], but not on the average information entropy measurement data set accurately describe the discrete degree and couldn’t make accurate calculations of different types of intelligence data information entropy weight and reduce the false love Quote information identification precision. In this paper, a large data of false intelligence information based on the supporting data in the network needs optimization of identification method [13]. The method with the help of the cloud computing platform will discover first intelligence data information under the network environment. is defined as a set of multi-beam characteristic space vector, and the network information data information are the main feature extraction and the state space reconstruction, in the feature space of the state trajectory of mapping out the main features, and classify various characteristics, build different intelligence data information set, on the basis of the use of all the average information entropy measurement data sets of discrete degree, with an average mutual information measure attribute dependencies between different data sets [14]. The comparison of different types of intelligence data information entropy weight and selecting weighting of information entropy as the intelligence under the network environment, the rest for the false information, false information in the finished big data network optimization identification, the simulation results show that the proposed method can effectively improve the false intelligence under the network environment identification precision and efficiency [15].

4 Specific Methods for Keywords Extraction 4.1

Approach on the Base of Words Meaning

With the help of lexical and syntactic analysis, same - gender labeling is carried out to enable the computer to understand a variety of information fragments. This algorithm USES semantic similarity of words to construct a similarity network of word semantics, combines the theory of social network, USES the semantic key degree of intermediate density words, and finally weights the semantic key degree of words and the statistical characteristic value of words to obtain the keywords [16]. 4.2

Learning of Intelligence

Through the training of a large number of training corpus, the system parameters and models are obtained, and then the model is applied to test the corpus to verify the effect of keyword extraction [17]. In the training set, keyword extraction is regarded as a supervised classification problem. Common models include support vector machine, naive bayes, maximum entropy, decision tree, etc. 4.3

Methods on the Base of Complicated Networks

According to the relationship between candidate feature tests, a complex network or a weighted complex network model is constructed according to the established rules. The

Keywords Extraction of Medical Information in the Era of Big Data

1673

node coefficient and the median meter are calculated to represent the comprehensive value of the node. This method is often too computation-intensive, and its disadvantages are obvious when faced with a large number of documents or considering the efficiency of web pages [18]. 4.4

Statistical Methods

Words frequency * reverse text frequency index and n-gram method are the most commonly used methods to extract keywords through the statistical information of words. This kind of method only requires the word frequency and filtering techniques of the corresponding word, but the accuracy of extraction is not high. Literature presented an improved TFIDF key detection extraction method for web pages. Combining the structure of web content and the part of speech characteristics of words, a comprehensive evaluation formula of candidate feature words was constructed to extract keywords [19]. The object of this algorithm is the internet resource, the process of processing including web content conversion, word segmentation, noisy word elimination, important part of the measurement of candidate words, etc., the result of processing is to produce keywords that represent the theme of the web page. The experimental results show that the algorithm is effective and has some reference value for the research and application of keyword extraction.

5 Conclusion However, the new keyword extraction method proposed in this paper is a preliminary exploration and attempt, and its extraction accuracy and efficiency still need to be tested in the intelligence monitoring system of big data. When the Internet has become an important conduit for public intelligence gathering, manual intelligence gathering has become inefficient and anachronistic. The application of automatic summarization technology in Internet intelligence collection system is worthy of application and promotion. Based on the composition and architecture of a network intelligence collection system based on automatic summarization technology, the key technologies in the system implementation are analyzed, and the difficulty analysis and corresponding solution model of automatic summarization technology are provided. The evaluation algorithm is analyzed and the necessary network security measures are given. The composition, architecture and key technologies of the intelligence collection system provided in this paper are of guiding significance to the development, enrichment and improvement of other intelligence systems. Acknowledgments. This research was supported by First Hospital of Jilin University.

1674

N. Wang and J. Wang

References 1. Smirnov, A., Levashova, T., Shilov, N.: Patterns for context-based knowledge fusion in decision support systems. Inf. Fusion 2, 175–178 (2013) 2. Nov, O., Ye, C., Kumar, N.: A social capital perspective on meta-knowledge contribution and social computing. Decis. Support Syst. 1, 37–38 (2012) 3. Colakoglu, T.: The problematic of competitive intelligence: how to evaluate & develop competitive intelligence? Procedia - Soc. Behav. Sci. 3, 193–195 (2011) 4. Biran, D., Zack, M.H., Briotta, R.J.: Competitive intelligence and information quality. J. Data Inf. Qual. (JDIQ) 3, 195–198 (2013) 5. Scally, J.R., Cassimatis, N.L., Uchida, H.: Worlds as a unifying element of knowledge representation. Biol. Inspired Cogn. Arch. 2, 89–92 (2012) 6. Guo, K., Li, W.: Combination rule of D-S evidence theory based on the strategy of cross merging between evidences. Expert Syst. Appl. 10, 375–379 (2011) 7. Liu, Z., Dezert, J., Pan, Q., Mercier, G.: Combination of sources of evidence with different discounting factors based on a new dissimilarity measure. Decis. Support Syst. 1, 46–49 (2011) 8. Mariadoss, B.J., Milewicz, C., Lee, S., Sahaym, A.: Salesperson competitive intelligence and performance: the role of product knowledge and sales force automation usage. Ind. Mark. Manag. 13, 595–598 (2012) 9. Nofal, M.I., Yusof, Z.M.: Integration of business intelligence and enterprise resource planning within organizations. Procedia Technol. 11, 658–665 (2013) 10. Carmeli, A.: Assessing core intangible resources. Eur. Manag. J. 1, 35–38 (2003) 11. Chen, H., Chau, M., Zeng, D.: CI Spider: a tool for competitive intelligence on the Web. Decis. Support Syst. 1, 71–73 (2002) 12. Preece, A., Hui, K., Gray, A., Marti, P.: Designing for scalability in a knowledge fusion system. Knowl.-Based Syst. 3, 115–118 (2011) 13. Catherine, K.: Murphy: Combining belief functions when evidence conflicts. Decis. Support Syst. 1, 55–58 (2000) 14. Vedder, R.G., Vanecek, M.T., Guynes, C.S., Cappel, J.J.: CEO and CIO perspectives on competitive intelligence. Commun. ACM 8, 315–319 (1999) 15. Comber, A., Carver, S., Fritz, S., McMorran, R., Washtell, J., Fisher, P.: Different methods, different wilds: evaluating alternative mappings of wildness using fuzzy MCE and Dempster-Shafer MCE. Comput. Environ. Urban Syst. 2, 132–134 (2009) 16. Florea, M.C., Jousselme, A.-L., Bossé, É., Grenier, D.: Robust combination rules for evidence theory. Inf. Fusion 2, 134–136 (2008) 17. Srinivasan, P., Menczer, F., Pant, G.: A general evaluation framework for topical crawlers. Inf. Retr. 3, 214–216 (2005) 18. Soundappan, P., Nikolaidis, E., Haftka, R.T., Grandhi, R., Canfield, R.: Comparison of evidence theory and Bayesian theory for uncertainty modeling. Reliab. Eng. Syst. Saf. 1, 21– 25 (2003) 19. Deng, Y., Shi, W., Zhu, Z., Liu, Q.: Combining belief functions based on distance of evidence. Decis. Support Syst. 3, 135–138 (2004)

Informatization Teaching of Optional Courses of Physical Education in Colleges and Universities Nan Li(&) Jilin Engineering Normal University, 3050 Kaixuan Road, Changchun, Jilin, China [email protected]

Abstract. Currently, physical education in colleges and universities mostly adopts optional courses, including theoretical and practical courses. Optional courses in colleges and universities are one of the great achievements of physical education reform in colleges and universities, but in the course of implementation, the disadvantages have been exposed day by day. As a first-line physical education teacher, how to apply modern information technology to the theoretical and practical courses of physical options, and which links can be applied, is obviously a problem to be solved. Based on the author’s learning and practical experience, this paper first interpreted the meaning of education informatization and physical informatization in ordinary colleges and universities, and then put forward the application of informatization in the theory teaching and practice teaching of optional courses of physical education in colleges and universities respectively. Keywords: College and universities  Optional courses of physical education  Informatization  Theory teaching  Practice teaching  Teaching reform

1 Introduction Education informatization is the comprehensive and deep application of modern information technology based on computer, multimedia and network communication in the field of education. The core content of process in development of educational resources, the optimization of educational process, the promotion of information literacy, the promotion of modern education, the reform and development of teaching, and the realization of informatization education is the teaching informatization [1]. Under the development trend of global informatization, education informatization has been paid more and more attention to and developed rapidly in the world. Especially, the impact of informatization education reform and development on the increasingly internationalized higher education is more obvious and fierce. As an important part of higher education, education informatization has huge impact on traditional physical education concept, teaching mode, teaching content, teaching methods, means and evaluation of physical education in colleges and universities [2]. As one of the achievements of physical education optional courses reform in our country, the model © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1675–1679, 2020. https://doi.org/10.1007/978-3-030-25128-4_212

1676

N. Li

meets the different needs of students and arouses the interest of physical education. Especially under the background of “Internet Plus Education”, it is of great significance to explore how to add information technology to the existing optional course model and to establish an efficient teaching model adapted to the times [2, 3].

2 The Meaning of Education Informatization and Physical Education Informatization in Colleges and Universities Computer technology, communication technology and network technology are changing people’s view of time and space, changing the structure of organization and management concept, and even changing people’s way of work and life. Education is no exception. Education informatization is to make full use of the means of information in the process of education in order to improve the effectiveness of teaching. Under the background of informatization education, teachers’ responsibility “is no longer simply teaching students to learn, but also teaching students to look for information, so that they can relate to each other, and treat the information in a critical spirit”. Therefore, the author believes that education informatization has been widely existed in the field of education, and education will appear in the face of education informatization for a long time in the future. Under the background of education informatization, we should carry on the research on the informatization teaching of the optional course of physical education in colleges and universities, which will be a win-win for both teachers and students [4]. The concept of “education informatization” is to regard information as a basic element of the educational system and to make extensive use and to promote the process of modernization of education in all fields of education.” This description contains two meanings: one is the extensive application of information technology; the other is the recognition of the importance of information technology, which regards information as a basic component. Therefore, “informatization of physical education in ordinary colleges and universities” is a process in which information is regarded as an essential element of physical education in colleges and universities; moreover, information technology is widely used in various fields of college physical education to promote the modernization of physical education in colleges and universities [5].

3 The Application of Informatization in the Teaching of the Physical Education Optional Theory Course in Colleges and Universities Carry on the Multimedia CAI Assistant Teaching to Enrich the Content of the Theory Course. Computer multimedia CAI courseware integrates text, picture, animation, video and audio. Its characters including rich content, large amount of information, rich picture and text. Moreover, it is vivid, interesting and easy to understand. It can not only stimulate human visual, listening and other sensory systems, attract students’ attention, arouse students’ non-intellectual factors in learning, but also deepen students’ understanding and mastery of teaching content, and enhance the credibility

Informatization Teaching of Optional Courses of Physical Education

1677

and persuasion of teaching contents so that to meet the needs of students at different levels to the maximum extent [6]. For example, in expounding the role of physics in modern people, such as the maintenance of life, psychological catharsis, and the relationship between physics and military, political, economic, cultural, and so on, a large amount of information and materials will be used in computer assistant multimedia teaching. In front of students, it is more convenient for students to understand, think, and to play a better teaching effect. Create an Interactive Network Platform to Break the Space-Time Limit of Theory Teaching. Using network, physical education theory course can adopt multimedia classroom teaching and online teaching method. Multimedia classroom teaching means that teachers make courseware and use it in teaching; online teaching means that teachers upload multimedia courseware to Internet’s WWW server to enrich and improve physical education, social physics and various physical activities, as well as related network resources such as healthy life, etc.; further, students connect to the net, visit these web pages and study, breaking the time and space for the study of physical education theory, enhancing students’ autonomy in learning, widening the channels for students to study physical education, enriching the content of physical education learning so that to meet the learning needs of students from various angles and different levels [7]. At the same time, we can also establish a teacher-student information network exchange platform, using online communication platforms such as friends group, WeChat, E-mail to build an interactive platform between teachers and students, and between students and students, as well as between the students and the school, which is not subject to space-time restrictions. Only in this way, can the exchange of information and the sharing of teaching resources be realized. Secondly, students can also feedback their learning results online, and invite experts to exchange and interact on the network platform. This not only makes up for the deficiency of the traditional sports theory class, but also widens the time and space of the exchange study, and makes the teaching not only limited in the limited classroom. By strengthening the theory of physical education, it can improve students’ consciousness and ability of independent physical education and lay a solid theoretical foundation for lifelong physical education.

4 The Application of Informatization in the Practice Teaching of Physical Education Option in Colleges and Universities Use Multimedia Teaching to Realize the Penetration of Theory and Technology in Skill Learning and Improve Teaching Effect. Multimedia teaching can be used not only in theory teaching, but also in technology teaching. Physical education is a very practical course, but in the study of technology can give students a theoretical explanation and analysis. Thus, students will learn and master the technology, which will play a multiplier effect with half the effort. For example, the introduction of the concept of “opposite movement” by using multimedia technology in students’ running

1678

N. Li

exercises not only deepens students’ understanding of technology, but also promotes students’ mastery of technology [8]. In addition, students are mainly imitating the movements of teachers. With the help of virtual reality, learning efficiency will be improved. For example, when explaining one-handed shoulder shooting techniques, using multimedia network virtual technology, students observe the technical movements in the virtual situation, watch the correct posture of the senior athletes, and feel the order of exertion of hip, knee, ankle and shoulder, elbow and wrist and the best angle of motion. This can improve students’ noumenon perception ability, and then improve students’ memory and trace of action representation. Through decomposition, playback, slow play and other technical means, this can also more clearly show the action to students, so as to meet the needs of different students, and overcome the shortcomings in traditional teaching. Analysis of Students’ Skill Performance by Camera Recording and Enhancement of Students’ Participation in Skill Learning. We will use photography, camera equipment, playback to analyze the process of sports practice. We will practice the activities through video recording, classroom playback, analysis, group discussions, timely inspection of the technical essentials and exercise methods to grasp the degree, and to make self-correction of errors and deviations, as well as to establish a complete and correct concept of action [9]. At the same time, it can also give full play to students’ subjective initiative and teachers’ guiding role, so that students’ perceptual knowledge can be raised to rational knowledge, which can play active role in enhancing students’ memory and building independent knowledge and skill structure in relaxed and active teaching situations. It can also be guided by teachers, collected, sorted out and played back the scenes of physical competitions and mass physical exercises by students. In classroom teaching, students’ individual needs are fully reflected, and their latent self-expression desire is stimulated; moreover, students are actively involved in the collection, design, explanation, analysis and discussion of classroom teaching contents [10]. At the same time, this not only enables students to enjoy all kinds of wonderful physical activities, but also enables students to grasp the way and methods of organizing and implementing physical activities, to understand and master the rules for the implementation of physical activities and the technical essentials of related items, and to display and understand the relevant physical cultural background. This not only activates the students’ thinking, but also improves the students’ cultural literacy and the ability to collect, organize and analyze problems, and strengthens the students’ self-organization by fully perceiving and understanding the contents displayed. More importantly, their ability of autonomous management and language expression are also improved in the process [11]. Meanwhile, it changes the phenomenon that students prefer physical activities to physical education, and ensures the high efficiency and high quality of physical education teaching.

Informatization Teaching of Optional Courses of Physical Education

1679

5 Summary The establishment optional courses has broken the space-time limitation of traditional teaching, changed the restrictive class teaching system, strengthened the enthusiasm of learning and optimized the teaching effect, which is in line with the development trend of physical education teaching in schools at present. Thus, it meets the needs of students for physical education. Although there are still many problems in teaching at present, as long as we actively explore and innovate, and start from teaching resources, teaching methods and examination models, we can certainly promote the development of informatization teaching. With the continuous reform and development of school physical education teaching, the content and quality evaluation standard of school physical education is not only multi-sided, but also developing. Therefore, how to realize the high-efficiency and high-quality physical education teaching under the support of the information condition, needs to engage in the school physical education teaching to carry on the exploration and the practice unceasingly.

References 1. Wenhua, F.: Research on informatization teaching of optional courses of physical education in colleges and universities. Res. Sport. Sci. 17(02), 85–88 (2013) 2. Min, S.: The application and practice of informatization teaching in the optional courses of physical education in colleges and universities. J. Xiangnan Univ. 35(05), 78–80 (2014) 3. Xin, Z.: A study on the informatization teaching management of public physical education in colleges and universities. Sci. Technol. Horiz. 03, 156–157 (2011) 4. Min, W., Ying, L., Xiaochen, L., Xiaoling, S.: A study on the application of “flipping classroom” model in physical education teaching in colleges and universities-taking the optional courses of aerobics as an example. J. Sci. Educ. 12, 83–84 (2017) 5. Xin, X.: Theoretical research on the application of informatization teaching in physical education technology courses. Lit. Bull. Sport. Sci. Technol. 26(06), 23–25 (2018) 6. Ping, J.: Feasibility study on the implementation of “in and out of class integration” in tennis course under the background of “internet plus complete credit system”. Lit. Bull. Sport. Sci. Technol. 26(06), 6–7 + 18 (2018) 7. Junqi, L.: Research on the application of information technology in the optional course of physical education in higher vocational education. Manag. Technol. Small Medium-Sized Enterp. 09, 73–74 (2018) 8. Hong, Z.: The application of smart phone and “Internet Plus” teaching model in yoga teaching. J. Guangzhou Inst. Phys. Educ. 37(02), 125–128 (2017) 9. Zhiming, W., Shijing, Z., Liyan, Z.: A study on the mixed learning mode of public physical education courses in colleges and universities in the “Internet Plus” era-taking the optional course of aerobics in Liaoning University of Technology as an example. J. Liaoning Univ. Technol. (Soc. Sci. Ed.) 19(03), 139–142 (2017) 10. Dangsheng, W.: Introduction and analysis of physical fitness training items in physical education optional courses in Colleges and Universities. J. Henan Electromechanical Coll. 25(03), 74–76 (2017) 11. Zhang, H.: A study on the present situation and countermeasures of public physical education optional courses in colleges and universities in Shaanxi Province. J. Weinan Norm. Univ. 32(20), 64–69 (2017)

Intelligent Distribution System Based on “Internet +” Logistics Xiaolei Zhang(&) Wuzhou University, Wuzhou 543002, Guangxi, China [email protected]

Abstract. With the growth mode change in China’s economic development, expanding domestic demand and stimulating consumption have become an important engine of economic development in the new era. In the process of the integration and development of “Internet plus” and different industries, the development speed and scale of e-commerce economy have made remarkable achievements, and at the same time promoted the development of logistics intelligent distribution system. Based on the author’s study and practical experience, this paper first analyzes the necessity of the intelligent codistribution of urban development based on the “Internet plus”, then summarizes the problems existing in the construction of the urban intelligent codistribution system, and finally puts forward the suggestions for establishing the intelligent common distribution system in different fields. Keywords: Internet plus

 Logistics  Distribution  Intelligent system

1 Introduction At the executive meeting in July 2016, the State Council explicitly proposed a strategic plan to accelerate the construction of the “Internet plus” efficient logistics, and requested intelligent logistics to deeply integrate modern information technologies such as big data and cloud computing in the process of its development and to achieve the goal of quality and efficiency improvement of the logistics industry in the process of new economic development [1]. In recent years, the market demand of industry, especially the manufacturing industry for logistics industry is constantly upgrading based on the national supply-side reform deepening, and the storage and transportation in traditional logistics services need to be constantly transformed into integrated intelligent logistics services. Intelligent logistics service enterprises will become the backbone of social development and logistics industry development if they can meet the needs of logistics that adapt to the market development from purchase to sales [2, 3].

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1680–1684, 2020. https://doi.org/10.1007/978-3-030-25128-4_213

Intelligent Distribution System Based on “Internet +” Logistics

1681

2 The Necessity of Intelligent Distribution and City Development Based on “Internet Plus” In 2015, China clearly stated that, in the coming years, 10 demonstration cities of intelligent logistics distribution should be created throughout China. Therefore, the establishment of the urban intelligent common distribution system in the “Internet plus” time is very necessary and has certain value and significance, which is embodied in the following points: Firstly, reducing the cost of distribution. From the current situation, most of the terminal distribution in China belongs to the state of separate operation, that is, self-built distribution points and self-purchased distribution vehicles, however, the overall distribution demand presents the characteristics of high frequency and small batches because the probability of changes in consumer orders is very high, resulting in a higher overall cost of distribution. But the urban intelligent codistribution system can solve these problems very well, and at the same time, it can also improve the overall distribution efficiency; Secondly, perceiving the distribution products comprehensively. The urban intelligent co-distribution system can show the actual position and status of the distribution products based on the technology of perception system and positioning system, which not only facilitates the relevant personnel to grasp the commodity information in time, but also ensures the integrity of the goods distribution; Thirdly, realizing the intelligence of distribution decisionmaking [4]. For example, it can use big data and other technologies to analyze the number and time of express delivery in each location, so that the staff can be more reasonably assigned to carry out the distribution work; Fourthly, optimizing the urban distribution environment. In general, we can often see a lot of express delivery vehicles piled up on the roadside in commercial districts, residential areas, schools and other places, which not only affects the city environment, but also leads to serious vehicle congestion and other problems. Co-distribution can solve these problems very well, that is, a express delivery company completes all the terminal distribution work.

3 Problems Existing in the Construction of Urban Intelligent Common Distribution System 3.1

Lack of Corresponding Supporting Standards

The development of intelligent co-distribution needs to base on corresponding supporting standards, but China has not established the corresponding standards at the present stage. If you enter “urban distribution” on the national standard query website, then there will only be two standards, intelligent distribution and intelligent logistics, but if you enter “co-distribution”, then there will be no standards to display. It shows that the system can solve problems of intelligent co-distribution when it comes to operation while reducing about 80% costs at the beginning of its design with uniform standards [5].

1682

3.2

X. Zhang

Low Prevalence of RFID

The realization of urban intelligent co-distribution system must be based on RFID technology. At present, the promotion extent of RFID in China is not very strong. For example, in Guangdong, where logistics is more developed, the utilization rate of RFID in key logistics enterprises is about 36%, while the popularization rate in other areas is even lower. The reasons are as following: Firstly, the cost is too high. The price of RFID tag on Taobao has exceeded 1 yuan, while the ordinary bar code price is only 0.02 yuan; Secondly, the RFID standard is not uniform. At present, there is no uniform standard in the world, and the standard in Chinese market is also confused. 3.3

Ambiguous Operation Right

Co-distribution actually combines most of the urban distribution needs, and then unifies to a single enterprise to carry out distribution services. That is to say, a distribution enterprise should construct a distribution network and take on all the distribution business, while the other distribution enterprises need to cancel the distribution points and then outsource their distribution needs to the common distribution [6]. At present, there are a lot of express delivery companies to provide distribution services, and distribution enterprises will be the key to realize the common distribution system when the joint distribution system is merged. At present, most distribution companies are willing to abandon their last kilometer of business, because as long as the distribution business is outsourced, it means that their business volume will gradually decrease. 3.4

Confusion of the Receipt Attribution

Statistics show that total number of express delivery in China has ranked the first in the world at present, and the express delivery industry of China has also realized the urban intelligent co-distribution. However, there are also a lot of problems of express delivery in the era of Internet, such as the ownership of receiving items, how to receive them, and so on. Once the city realizes the common distribution, then the terminal distribution of the express delivery industry will be transferred to the joint distribution enterprise, then the mode of expanding the market by using the courier will change, and receipt attribution will be the most important problem to solve if the common distribution system can receive the receipt.

4 Suggestions on Establishing Intelligent Common Distribution System in Different Fields 4.1

Construction of Intelligent Co-distribution System in Commercial Circulation and Manufacturing Industry

Usually, these two areas belong to supply distribution, that is, most suppliers are the same, and are distributed to supermarkets, convenience stores, shopping malls and other places, and these places are also concentrated in the business district [7]. Therefore, the same industry can use intelligent distribution center to expand, that is to

Intelligent Distribution System Based on “Internet +” Logistics

1683

achieve intelligent unified distribution mode. The actual operation process can start with the following links: Firstly, the intelligent distribution center needs to work out the purchase plan according to the procurement plan, when the goods arrive at the distribution center, it can be re-assembled according to the order, and finally, it should choose the most suitable route for unified distribution. In order to ensure the stability of the intelligent common distribution system operation, enterprises can maintain from the following aspects: Firstly, local government departments can assist in the construction of the intelligent common distribution system, so that the rational operation of the system can be guaranteed; Secondly, the operation and management right of the intelligent distribution center can be selected by the way of bidding, of course, it also needs to complete the work of distribution management, assessment and evaluation. Thirdly, local express delivery enterprises should use the same RFID bar code to lay the foundation for the establishment of intelligent distribution system; Fourthly, intelligent distribution center should be connected with urban traffic, that is, plan distribution route based on the traffic conditions of the city. 4.2

Construction of Intelligent Common Distribution System

It is known to all that the customer groups contacted by the express delivery industry are very complex, and the overall distribution object is distributed across China, therefore, the number of express delivery personnel is very large, and the distribution network is also very large too, therefore, the cost of terminal distribution will also be higher. Some statistics show that most logistics enterprises are willing to cooperate with the express delivery in the same city, but only 11% of them have realized cooperation [8]. Therefore, major logistics enterprises should improve their services for cross-border distribution with the same city. Only in this way can the intelligent common distribution system be established, so that the last kilometer distribution can be realized. The operation of the intelligent co-distribution system in the field of express delivery can start from the following steps: Firstly, the express delivery in the city where the express delivery enterprise are located can be completed by the intelligent co-distribution system of the city. When the express delivery arrives in the city, it can be concentrated in the intelligent system for transit, and then, it will carry on the intelligent classification based on the subordinate points. Finally, it can use the intelligent cabinet and the LBS intelligent distribution to complete the terminal distribution when they arrive at each branch. In order to ensure the normal operation of the intelligent joint distribution system in express delivery industry, enterprises can achieve the goal from the following aspects: Firstly, local associations and government departments can help to complete the construction of intelligent common distribution system; Secondly, the intelligent distribution system can be guided by the management department, and then it can be realized by the way of competitive bidding [9, 10]. Of course, the corresponding distribution system and management system should be established. Thirdly, GPS and other technologies can be vigorously promoted to local express delivery enterprises, so as to lay a good foundation for the establishment of intelligent distribution system, and the cost increase can be solved by using high-quality service; Fourthly, LBS technology can be used to collect idle people around the city to carry out part-time work

1684

X. Zhang

through mobile telecommunications and other terminals so as to improve the efficiency of urban end distribution [11]. Of course it can also be used to achieve real-time monitoring so as to ensure the stability of the work in each link. Fifthly, smart cabinets can be set up where the population is concentrated, and they can be popularized if the effect is obvious.

5 Summary With the continuous development of information technology and social economy, Internet has become an indispensable and important component of various industries, and logistics has also become an important support for the economic development of China. However, the development of intelligent logistics in China is still in the initial stage. There are still some problems in the construction of urban intelligent common distribution system, such as the lack of corresponding supporting standards, the low prevalence of RFID, the ambiguous operation right, and the confusion of the receipt attribution. Therefore, Internet technology and logistics industry will be integrated to strengthen the construction of intelligent common distribution system. It can be predicted that with the development of social economy, intelligent logistics has become the inevitable development trend of modern logistics economy.

References 1. Ling, S., Zuoyun, Z.: Design and development of intelligent logistics distribution system based on WeChat platform. J. Ningbo Polytech. 22(06), 82–85 (2018) 2. Xiaochuan, L., Yi, H.: SWOT analysis and suggestions on the development of intelligent logistics in shaoyang city based on “Internet Plus”. Econ. Res. Guid. 29, 60–61 (2018) 3. Yan, H.: Research on the intelligent logistics system of e-commerce based on “Internet Plus”. Mod. Mark. (Bus. Ed.) 10, 125 (2018) 4. Bailu, L., Shaoping, Z., Yufei, Z.: Research on the mode of express delivery distribution in colleges and universities based on “Internet Plus”-a case study of Jin Linbao. Value Eng. 40 (09), 28–29 (2018) 5. Mi, C.: Research on the construction of the city intelligent co-distribution system based on “Internet Plus”. Logist. Eng. Manag. 40(09), 28–29 (2018) 6. Haiyan, L.: Research on the construction of Jiangmen regional logistics distribution center based on “Internet Plus”. Henan Sci. Technol. 02, 32–34 (2018) 7. Bing, Z.: Research on innovation of logistics terminal distribution mode based on internet technology. Intell. Comput. Appl. 8(04), 92–95 + 102 (2018) 8. Langui, L.: Research on transport cost management on internet logistics platform. Account. Learn. 22, 111 (2018) 9. Di, W., Feng, L.: Research on the development of china’s cold chain logistics based on “internet plus”. Logist. Technol. 41(06), 75–78 (2018) 10. Yuechuan, Q.: Logistics industry transformation and upgrade based on “smart logistics”. China Econ. Trade Her. 12, 30–32 (2018) 11. Xiaochang, L.: Intelligent logistics system of e-commerce based on “Internet Plus”. Technol. Econ. Guid. 36, 7 (2017)

Development of Business Push System Based on Bluetooth BLE Positioning Yan Wang(&) and Yajun Zheng Suzhou Industrial Park Institute of Services Outsourcing, Suzhou 215123, China {wang.yan,zhengyj}@siso.edu.cn

Abstract. This paper mainly introduces a design method of business push system based on Bluetooth BLE anchor, mobile application software and backend service platform. Collect the nearby Bluetooth BLE anchor information through the Bluetooth function of the smartphone, compare the map location information previously loaded into the mobile phone, and navigate the client. At the same time, the server selectively picks useful information according to the customer’s habits and consumption propensity and activity time period. Push to customers, including limited time coupons (electronic coupons) or limited time special event information. Thereby, the distance between the merchant and the customer is narrowed, which is beneficial to the promotion of the merchant and promotes the sales of the merchant. At the same time save customers valuable time and money. Keywords: Bluetooth BLE

 Push system  Smart phone  Internet of Things

1 Introduction As humans enter the information age, people can access large amounts of information timely and convenient. However, on the other hand, due to the explosive growth of information, how to obtain the information required by users in a timely and accurate manner is a difficult problem now. Nowadays, there are two ways for users to obtain information through informationization: one is the traditional pull technology (PULL), which uses Baidu, Google, Yahoo and other search engines to input keywords for information indexing. However, because the information on the Internet is extremely complicated, users need to spend a lot of time and energy to find the information they need in hundreds or more pieces of information [1]. A Push Technology, in which the server actively sends information to the client. This technology can push information to users as soon as possible to ensure the timeliness and initiative of information. However, since the push technology only performs simple screening on the user, the push information and the user’s needs do not necessarily match. And because the user may not need this information, the customer is tired [2]. The purpose of this project is to develop a comprehensive use of these two means of obtaining information, using the positioning function of Bluetooth technology and the server to analyze the big data of common information of customers, and push the business information system required by users. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1685–1689, 2020. https://doi.org/10.1007/978-3-030-25128-4_214

1686

Y. Wang and Y. Zheng

2 Research Object and Meaning of This Project Because Bluetooth transmission distance is relatively close, it can make relatively accurate positioning. And because Bluetooth uses a low-power mode, the Bluetooth device can be designed as a Bluetooth anchor, fixed at a specified location, and continues to work for a long time [3]. The Bluetooth anchor device has its own unique ID information, and can also be directly associated with the background to form a highly trusted authentication and recognition system. The system makes the user’s contact with the merchant more convenient. The user can obtain the information of the merchants such as discounts and offers at any time, and the merchant can obtain the user information through the background and promote the product at any time. With the smooth communication of information between users and merchants, it will help the development and prosperity of the service industry and promote the development of the national economy.

3 System Design As is shown in Fig. 1, the Bluetooth anchor point is placed in every corner of the shop, and the broadcast is performed at a certain frequency, and the broadcast content includes its own ID and signal strength.

Fig. 1. Structure of multi-channel lighting control system of WIFI module

The Bluetooth ID is linked to the store information one by one. The mobile terminal software is installed on the user’s mobile phone. When the user starts the mobile phone software, it automatically receives the nearby Bluetooth information and parses it, and transmits the analysis result to the background service center through the wireless network, and accepts the shop information sent by the background service center, showing shop information and discounts. The mobile terminal software interface needs to be friendly, convenient and easy to use for users [4]. The background server stores the anchor information of the mall into a vector map database to process business user services. Provides an action page and a background interface for web design. There are three main key technologies of this project.

Development of Business Push System Based on Bluetooth BLE Positioning

3.1

1687

Bluetooth 4.0 BLE Anchor Design

This project is based on the Bluetooth anchor point positioning and communication functions based on the business promotion model, so the Bluetooth anchor point is the basic hardware of our positioning equipment. For the anchor point, we need to implement the following features. Establish a unique one-to-one correspondence with the shop on its specifications to avoid providing incorrect information to the backend system. Therefore, the anchor itself needs to carry a unique composite ID for identification, similar to the nameplate for identifying. The need for anchors can support long-term operation in a low-power state, considering the need to fix the anchor point to the ceiling or wall where the signal is easy to transmit, the external power supply cannot be used, and the battery must be powered. Because of the appearance, wireless signal, cost and other factors, the possibility of using button batteries is high [5]. With a portable battery and the need to support long hours of work, it is important to reduce the power consumption of the anchor point. As a wireless communication device, the anchor needs to periodically broadcast information to surrounding receiving devices (mobile phones with Bluetooth BLE). The transmission distance of Bluetooth is about 30 m, which is easy to accurately locate in a relatively close range. However, since Bluetooth is easily affected by the external environment, including the interference of human body waves, the antenna with strong increase effect and the signal intensity distribution of the antenna are best to be close to the spherical. 3.2

Mobile Phone Application Terminal Software Design

The mobile phone software part serves as a working platform for communication with users and is the facade part of the entire system. It is also the closest part to the user. The terminal software tool will need to have the following features. The simple and convenient user interface provides users with a variety of information, and at the same time facilitates the customization of the corresponding program by the customer. The message push function timely sends the information of the nearby stores to the customer in the form of a short message list, and the customer can access the corresponding webpage of the corresponding store according to his own needs, and simultaneously supports the customer to download the coupon, activate the business operations such as the points. In addition, the software can also establish a text message chat function between the shop and the shop through the network’s background service, which makes it easier for users to communicate with the shop, including confirming the product content, booking the service, confirming the store’s business status, and so on. The software also needs to drive the Bluetooth device and GPS device of the smartphone and activate these devices. When entering a shopping mall, the approximate location information of the mobile phone is obtained by the GPS device, and according to the address information, the shopping mall floor plan and the matching corresponding ID information previously downloaded through the server are activated. In the shopping mall, the identity ID information of the Bluetooth anchor in the surrounding communication range is obtained through the Bluetooth device [6]. After internal calculation, the mobile phone holder’s moving path information is drawn

1688

Y. Wang and Y. Zheng

against the previously downloaded shopping mall floor plan. At the same time, the collected Bluetooth ID of the accessory is sent to the server to obtain a list of information of the attached store. 3.3

Background Server Design

The backend service is an important port for providing services to commercial customers. It is also the data and information center of the entire system, and is the cornerstone of the commercial operation of the entire system. It will have the following features. First, the server needs to store a large amount of store floor map information and information for docking business customers [7]. At the same time, it is necessary to provide a background interface for business customers to update their own web pages and offers, so that the shop can update the content in time. Save this information to a high-speed, large-capacity database for merchants and end users to quickly query [8]. The server accepts the GPS information from the mobile phone and grasps the general location of the terminal user. When the user enters a pre-registered shopping mall, it is confirmed whether the new map information of the shopping mall in the mobile phone is up-to-date, and the processing of updating the map of the mobile phone shopping mall is done. After entering the mall, the mobile phone will periodically receive the Bluetooth anchor ID information to the server [9]. After receiving the anchor information, the server queries the database and sends the updated information list content to the client according to the stored content. When the customer views the message list message and clicks on the store or coupon information to be accessed, the mobile phone sends a specific information ID to the server, the server accepts the customer’s inquiry, and queries the database to obtain detailed information (including pictures, etc.) of the store or the coupon. Send it to the phone as an HTML packet. After receiving the content, the mobile phone displays the information to the customer on the mobile application side. In addition, the server also provides a short message exchange platform between the mobile terminal and the server for the merchant customer. After the mobile phone user inputs the text information on the mobile phone software, the information is sent to the server through the mobile phone, and the server transfers the information to the corresponding merchant [10]. The PC management client, after receiving the information, the merchant user responds to the customer question and provides the necessary service, and the reply content is also transmitted back to the mobile phone user via the server.

4 Conclusion With the explosive growth of information in modern society, how to get the useful information you need in a short time is an urgent problems. The system collects the information sent by the nearby Bluetooth anchor point through the mobile phone, so as to filter out the effective business information and send it to the user, save time for the customer, and provide a promotion platform for the merchant, which is an effective business promotion mode.

Development of Business Push System Based on Bluetooth BLE Positioning

1689

References 1. Gong, X., Wang, W.: Design and implementation of network service based on dynamic push technology. Comput. Netw. (20) (2014) 2. Wang, Z., Xu, B.: Design and implementation of an interactive system based on Bluetooth. Comput. Eng. Sci. (8) (2014) 3. Xiang, L., Zhang, S., Chen, J., Song, Z.: Multimedia information pushing system based on wireless Wi-Fi technology. J. Jilin Univ. (Inf. Sci. Edn.) (1) (2012) 4. Yu, M.: Research on indoor and outdoor integrated positioning and location service method for intelligent guides in scenic spots. Nanjing Normal University (2013) 5. Yang, P.: Research and implementation of campus location service system based on Android. Dalian University of Technology (2013) 6. Xu, W.: Research and implementation of indoor positioning technology based on Android mobile phone. Huazhong Normal University (2014) 7. Su, S., Hu, Y., Lu, G., Dong, S., Li, X., Liu, C.: Indoor positioning method for low power Bluetooth mobile phone terminal. Surv. Anal. Bull. (12) (2015) 8. Chen, R., Luo, W., Zheng, L., Xu, J.: Design of intelligent home automation system based on wireless technology. Electron. Technol. Appl. (5) (2012) 9. Zhou, C., Fan, Y., Zhang, J.: Research on mutual interference characteristics of ZigBee/Bluetooth heterogeneous network[. Mod. Electron. Technol. (24) (2015) 10. Wang, L., Lan, J., Chen, X., Chen, F.: Wireless WiFi control method based on android platform. Microcomput. Appl. (7) (2012)

Informatization Construction of College Art Design Education Xu Cong, Shi Liu, and Tingting Li(&) Dalian Neusoft University of Information, Dalian 116023, Liaoning, China [email protected]

Abstract. The deepening of the education system reform makes the majority of educators to increase the importance of art design education, especially the information education of art design. Based on this, this paper will start from the current information construction of the general situation, the art design education to carry out the information construction of the path to analyze and explore, hoping to provide some help and Suggestions for the relevant personnel, to better carry out the art design education. Keywords: Informatization

 Art design  Education concept

1 Introduction Art design education is a comprehensive course that includes different subjects and art categories. This course involves many aspects such as emotion, life, culture and science. It is not difficult to find that the introduction of information technology and information construction in the teaching of art design is conducive to helping students better learn art design courses. Therefore, the research on the path of information construction of art design education has some practical significance.

2 Overview of Current Information Construction Informatization construction, refers to the use of modern information technology to support the teaching process and means, along with the communication technology, the application of Internet technology, computer technology and development of education informationization gradually become a powerful guarantee to realize the sustainable development of colleges and universities, has become an important path to promote students comprehensive, integrated.

3 The Path of Art Design Education Information Construction 3.1

The Basic Principles of Carrying Out Information Construction

(1) Personalized education and information resources promote each other © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1690–1695, 2020. https://doi.org/10.1007/978-3-030-25128-4_215

Informatization Construction of College Art Design Education

1691

Objectively speaking, the student is the main body of the classroom teaching, the teaching process is the student through exploration, learning knowledge and find the problem, form a personal point of view of a process, the teacher to help students with personalized learning, should be with more freedom connotation, flexible retrieval methods to obtain richer and more extensive information resources, the students’ learning enthusiasm in art design effectively stimulated, guide, support and encourage students to establish and to explore its own way of learning, to realize individualized learning. In this way, teachers can exercise and shape their artistic ability, form a certain aesthetic taste and aesthetic consciousness, improve their cooperation, communication, care, respect and other ideological and moral and scientific and cultural literacy, and activate their personalized thinking [1]. (2) The content of art design textbooks is combined with informatization In the information age, information technology can play the role of multimedia and Internet in art design teaching. After the introduction of information technology, art design has acquired a new teaching method [2]. Teaching contents such as sound effects, animated images, illustrations and copywriting also need to be re-produced and rearranged by multimedia courseware, so as to optimize the overall classroom teaching structure of art design and improve the teaching quality of art design. Therefore, only when teachers fully combine the content and informatization of art design textbooks, can they optimize the teaching process and teaching effect [3]. It should be noted that the content and informatization of teaching materials should not focus too much on one aspect. If the emphasis is placed on information technology while ignoring the content of teaching materials, only to mobilize the interest of some students, the teaching of art and design will not be standardized, theoretical, and lack of practice. It is not difficult to find that teachers should avoid adopting a single teaching mode, and make the teaching of art design more flexible, interesting and diversified. They should use a variety of different teaching modes to provide students with harmonious art and design classes. We should always insist on the teaching effectiveness, flexibility and scientificity of art design, look for the fusion point of teaching material content and informationization, so as to give full play to the advantage of art design education. (3) Art design learning and information courses complement each other The teaching of traditional art design is characterized by rigidity and conservatism, and the teaching communication between teachers and students is one-way. With the expansion of school enrollment, the number of students has been greatly increased, and the teaching pressure of teachers is constantly rising. Among a large number of students, each of them has a different foundation. Some of them have strong learning ability, while others are hard to master and quickly accept the content of learning, which is not in line with the purpose of highlighting individuality, seeking for diversity and communication and cooperation in contemporary teaching [4]. With informatization of art design, art design teaching with open teaching process, the need to design unique was carried out on the part of the art design subject, if encounter difficulties in learning of art and design students or key subjects, teachers need to provide the necessary reference and knowledge, comprehensive, undertake to the student art of divergent thinking [5]. Based on information technology subject training, targeted

1692

X. Cong et al.

strong art and design practice, personalized art design activities, cooperate with collaboration between teams, synchronous and asynchronous learning can help students, students can online questions, discussion, finish the homework, the teacher can also be the first time in the beyond geographical and time environment for student feedback content, either through BBS, social networking sites give students quickly, and can easily review, correct students’ art design work, so can make students correct, scientific and objective self learning evaluation, the initiative to self-perfection and selfimprovement, Thus the informationization curriculum in the art design aspect superiority manifests comprehensively [6]. 3.2

The Main Method of Informatization Construction

(1) Construct a three-dimensional framework for informatization courses Seminal art design course in recent years, the global art design researchers found that, within the scope of the framework of art design course contains a large number of practice and exploration, as well as the magnificent course landscape, more representative is the Bauhaus curriculum design idea, he will not have the feeling of reliability successfully into a rational and scientific rule of a vision. Art design education as one of the important subjects in university, should always be the cultivation of the students’ comprehensive aesthetic quality as the basis and premise to improve and expand its pioneering thinking as main task, out of the art design teaching landscape mode, longitudinal to establish a practical teaching base of artistic design and implement a single course of art design by skills mode shift to the rational perception of art law point of view, to the depth of mining potential Angle shift between teachers and students of art design. The comprehensive design cultivates the actual combat ability, the rich theory knowledge, enhances the artistic accomplishment the informationization curriculum three-dimensional frame, thus helps the student to form the artistic design lifelong study habit. (2) Update information courses dynamically and in real time At present, teaching materials and books are no longer the only teaching resources for art design. Has a wealth of information resources in Internet, because of its personalized, interactive, informative, across time and space, and other characteristics, can quickly get to the art of design resources, this is one of the main teaching advantage into art design, teaching content of courses also include more scalable Shared resource of art, let the students in the effective knowledge of art and design at the same time get the service quality of art design teaching [7]. (3) Show the interactivity of information courses Under the background of the information age, information technology courses not like traditional teaching to the implementation of the single direction, should fully mobilize and active student’s performance in art design class, students of art design should be learning increases as the ultimate goal, increase the students and the network of interactivity, teachers and other students, by constantly to fully solve the problem of art and design interaction. The whole process of information teaching will also make

Informatization Construction of College Art Design Education

1693

the teaching resources of art design constantly enriched, improve and enrich the teaching results of teachers’ art design. At the same time, the informationized curriculum has scientific research guidance, which is conducive to the organization and development of various types of art exhibitions and related activities, so that multidirectional interaction can be realized, so that students can continuously increase their artistic knowledge, improve their artistic accomplishment and realize diversified development under the condition of informationization [8]. (4) Consolidate the achievements of information construction With the rapid update of educational methods, art and design teachers should not only actively carry out the information construction, but also constantly consolidate and strengthen the achievements in the construction process. The application level of teachers and education concept to a great extent, affects the actual effect of education informatization course, in teaching the students of art design technology and theories, education concepts should be updated as the basis and prerequisite for education practice, and realize their role transformation in art design education, broadcast, identity authority by knowledge learning partners, thinking guidance, communication, the organizers of the shift, form consistent with The Times of time concept and educational concept. At the same time, teachers should pay more attention to the training of art design technology to lay the foundation of art design theory and ability needed by students in the process of continuous improvement and development [9]. (5) Introduce information technology into public art design courses The course of public art design is available in many comprehensive schools, and the information construction is conducive to the better implementation of this course. Schools should do well in the campus network, closed-circuit television, such as the construction of campus internal video on demand system, especially the professional art and design, to construction of informatization of education database, develop information resources value, let the professional teachers and students can freely at any time or catv system with the help of computer to connect to the campus network, database access to art and design in the various colleges at the university scientific research activities required pictures, audio and text information, make these data to better serve the teaching of art design [10]. At the same time, for the information database of art design, professionals should be arranged to regularly sort out and collect the latest art design information and store it in the database, so as to constantly enrich and improve the database. For example, a teacher arranged an art design student management information database of art design, because the students learning, living well at ordinary times, serious and responsible work, often the teacher in the classroom teaching of art design knowledge for video uploaded to the database, in class. Students and teachers for art design interactive or carry out a variety of art and design activity, the student will also focus on some knowledge recorded, enrich the information database of art design, make the students in this major video art design in the database to be obtained at any time when necessary, repeatedly, to consolidate the knowledge for many times, So that the students art design knowledge level have been different degrees of improvement. From here, it is easy to find, should through the informationization way to art and design the teaching contents for image can be used at any

1694

X. Cong et al.

time, detailed classification according to the specific content, enrich art design information database, so that can facilitate teachers’ and students’ retrieval and sharing, make the school of art and design more solid foundation.

4 Conclusion In a word, it is of great significance to study the path of information construction of art design education. Teachers deal with the current informationization situation have a comprehensive understanding and grasp the basic principles of information construction, in constructing the three-dimensional framework of information technology curriculum, real-time dynamically updated information, play informatization course interactivity, informationization construction achievement consolidated, introducing information technology the way such as public art design course, promote the comprehensive development of the art design major students. Acknowledgments. This research was supported by the Liaoning Provincial Social Science Planning Fund, (project number: L18BKS004) and DaLian Social Science Federation Project, Project Number: 2018dlskyb231.

References 1. Xiaoping, G.: Research on art design teaching mode from the perspective of multimedia–on new media art design–digital visual interconnection. Chin. J. Educ. 09, 117 (2018). (in Chinese) 2. Lifang, D.: Exploration of teaching mode integrating innovation and entrepreneurship education with professional education–”digital media art design major” as an example. Theor. Res. Pract. Innov. Entrepreneurship 17, 82–84 (2018). (in Chinese) 3. Yanhua, H.: A study on the school-running form of early Chinese art design education based on the dynamic perspective of talent cultivation–a study on ethnic art research 30(03), 87–98 (2017) 4. Chen, Z.: Exploration on the teaching mode of art design subject under the platform of information education–taking the construction of the “design house” digital education platform as an example. Heilongjiang High. Educ. Res. 09, 155–157 (2016). (in Chinese) 5. Xiaolan, Z., Shaoqing, G.: Information-based teaching, pp. 44–45. Higher Education Press (2010). (in Chinese) 6. Chengxin, L.: Integration and reconstruction: interactive analysis of technology and course teaching, pp. 188–191. Electronic Industry Press (2006). (in Chinese) 7. Qinwen, Z., wenjun, D.: On problems and countermeasures in the construction of informatization course resources in colleges and universities. Educ. Career (32), 40 (2007). (in Chinese) 8. Cui, G.: Practical research on higher vocational informatization curriculum reform. China Vocat. Tech. Educ. 1, 52–54 (2014). (in Chinese) 9. Huigui, L., Guoliang, Y.: Why it is difficult for information-based curriculum resources to enter normal classrooms. Mod. Prim. Secondary Educ. (1), 6 (2013). (in Chinese)

Informatization Construction of College Art Design Education

1695

10. Yan, L., Hong, Z., Bin, Z.: Methods and research on the construction of normalized curriculum resources under the network environment. Shandong Soc. Sci. S2, 269–271 (2015). (in Chinese)

Development and Research on the Informationization of Physical Education in Colleges and Universities Jingyan Cui(&) Jilin Engineering Normal University, 3050 Kaixuan Road, Changchun, Jilin, China [email protected]

Abstract. The deep integration of information technology and education and teaching will be the key development direction of the future education reform. Therefore, it is necessary to explore the application of information technology in college physical education. Based on the author’s learning and practical experience, this paper first analyzes the development and application of information technology in college physical education, then summarizes the problems in college physical education informatization, and finally puts forward the reform approach of college physical education informatization in the new era. Keywords: Colleges and universities Internet +  Development path

 Physical education  Informatization 

1 Introduction Currently, college education also shows more modern characteristics, which is the socalled “education information” phenomenon. Why on earth should colleges and universities cultivate sports talents? What kind of sports talents should be cultivated? How to train sports talents? These are unavoidable problems in front of physical education in colleges and universities. Therefore, this paper probes into the training of informatization construction in college sports, which is conducive to the output of high-quality sports talents, so as to promote the vigorous development of China’s sports in the new era in the subsequent development [1].

2 Development and Application of Information Technology in College Physical Education The Development of Information Technology in College Physical Education. Nowadays, with the rapid development of information technology, educational informatization has become an important indicator to measure a country’s educational level and even national competitiveness. China’s information technology has developed rapidly in a short period of time. Although great progress has been made, compared with developed countries, both computer technology and software © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1696–1700, 2020. https://doi.org/10.1007/978-3-030-25128-4_216

Development and Research on the Informationization of Physical Education

1697

technology are still in a backward state [2, 3]. In particular, it is impossible to ensure that enterprise information system has a high security coefficient. Although information technology has been widely used in other disciplines, people have not paid enough attention to it in the field of physical education in China due to many problems. The Application of Information Technology in College Physical Education. Education informatization is first of all human informatization, human is all the source of educational informatization. In the process of implementation and evolution of informationization, it is necessary to carry out sports training in colleges and universities around all kinds of developments that are conducive to promoting the development of information technology in colleges and universities, so as to truly implement the development concept of “people-oriented”. At present, colleges and universities are responding to the national call, vigorously promoting the combination of information technology and subject courses, striving to improve the efficiency and quality of teaching, and achieving the goal of training multi-functional application-oriented talents. The application of information technology to physical education teachers is very short. Under the background of the rapid development of the global network information technology, educational informatization is the development trend and inevitable choice of education in the information society. Educational informatization, which integrates education and information technology, has become the direction and motive force of basic education reform in many countries [4].

3 Problems in Informationization of Physical Education in Colleges and Universities Teachers’ Awareness of Learning and Using Information Technology is Weak. Different from Chinese, mathematics, English and other courses, physical education has its own unique attributes. Compared with other disciplines, physical education is still in the immature stage, which needs to absorb the experience of other disciplines and combine the characteristics of sports practice to make up for the deficiency. Because of the particularity of its discipline, people have ignored the application of information technology in physical education. The results of the investigation show that at present, many college teachers are only proficient in operating some basic office software such as Word, Excel, etc. They are not familiar with some of the cutting-edge software, or even do not pay attention to, they think that high-tech information technology has nothing to do with sports, and lack of initiative to explore the spirit of learning. In view of the special attributes of physical education, most places of classes are in outdoor space, while multimedia resources are in indoor areas [5]. The convergence point of the two is not in the same dimension, which makes sports and information technology not well combined, and finally affects the enthusiasm of teachers in software development. The serious shortage of teachers’ awareness of learning and using information technology directly leads to the shortage of talents mastering information technology in physical education, so it is urgent to improve the information technology ability of physical education teachers [6].

1698

J. Cui

Insufficient Capital Investment. University information construction is a huge system engineering. It needs a lot of capital investment from the investment of hardware and equipment and the purchase and installation of necessary software system to the operation, management and maintenance of information system. Lack of adequate financial support, the construction of information in colleges and universities is like talking on paper. According to the survey, many teachers only receive some simple computer training, such as Word, Powerpoint and other courseware making methods. However, the effect of such collective training is not significant. In the later stage, personalized and precise training is still needed to improve teachers’ information technology level, so as to continuously improve their scientific research level. Relevant data shows that many colleges of physical education invest more in hardware than in software. Even though some schools wanted to develop sports teaching software, they failed due to lack of financial support. Therefore, the school needs to increase the investment in teachers and sports facilities, increase the number of effective training, equipped with sufficient human, material and financial resources, combined with the school’s own characteristics to design a matching multimedia sports resources, so as to promote the healthy development of college physical education and national sports undertakings. Lack of Sports Resources. At present, many colleges and universities begin to attach importance to the application of information technology in physical education and teaching, and start to construct their own sports resource base. Compared with other disciplines, the sports resource base is still in its early stage and its development is very slow. Teachers are lack of enthusiasm to develop information software, and most of them will look for relevant teaching media resources on the Internet when needed, but they still do not have or care about establishing their own physical education teaching resources. In the long run, it is an inevitable trend to establish physical education resource bank. “Sports information construction is a dynamic process”, this process is not achieved overnight, but a gradual learning process [7].

4 The Reform Approach of College Physical Education Informatization Teaching in the New Era Strengthen the Application of Information Technology in Sports Training. Firstly, using information technology to strengthen teacher sports activities and training related knowledge update, through the unified management of information timely feedback to physical education teachers effective information, according to the specific needs of students and psychological characteristics to carry out physical education. Finally, under the background in the era of Internet +, using information technology to process and feedback the specific information of students’ physical training, grasp the maximum students bear the training load, and then adjust the content of physical education teaching according to the actual situation, optimize the sports teaching scientific and systemic, and improve the quality of sports teaching in colleges and universities.

Development and Research on the Informationization of Physical Education

1699

Make Reasonable Physical Education Teaching Plan Based on Information Management. One of the main ways to realize the informationized teaching reform in college physical education is to adhere to the premise of informationized management to compile reasonable physical education content [8]. First of all, according to the actual situation of each student to develop specific sports training content and regular inspection and evaluation, to ensure the orderly progress of college sports information teaching. Secondly, according to the physical education teaching in colleges and universities, a database is established to analyze the students’ problems based on the database. Finally, an effective informatization index is established to input students’ sports-related competitions and other relevant information, and the situation of students is compared before and after, which lays a good foundation for improving students’ learning efficiency in sports. On the Premise of Informatization Teaching Reform to Strengthen the Cultivation and Promotion of the Overall Quality. We should insist on improving the overall quality of college physical education teachers on the basis of information technology. Strengthen the learning and training of physical education teachers in colleges and universities, help physical education teachers form good teaching ideas, constantly update and enrich their own information knowledge, use information equipment to improve their physical skills as much as possible, update the concept of physical education teachers, and strengthen the efficient use of information sports teaching resources; To cultivate the self-learning ability of physical education teachers, use the Internet and information technology in a scientific and reasonable way to update knowledge and realize the reform of college physical education information teaching. Improve the Diversified Development Path of Informationized Physical Education. Under the background of Internet +, network technology has gradually changed the existence of college physical education teaching texts. Sports network text has realized the squeeze of traditional sports text, and people’s understanding of the Internet has developed to a stage of interaction and communication with the real media. First, actively accept and be good at using network information [9, 10]. It is necessary to adapt to the development of the Internet + era and try our best to make students innovate the text form of college physical education with the information technology of pictures, sounds and animation colors. Secondly, build a network micro platform suitable for students to participate in the interaction [11]. Using the innovation, interactivity and cluster of the Internet to provide students with a more real sense of teaching experience. Finally, innovate the network communication of college physical education. It is necessary to widely use academic BBS, websites, documentaries and other forms to promote the development of Internet texts, and use the Internet as a teaching platform to teach the difficult points and key points in physical education.

5 Summary Under the background of Internet +, informatization brings not only passion to the reform of physical education in colleges and universities, but also a kind of inspiration from teachers themselves, facing and introspecting, accepting and examining

1700

J. Cui

opportunities from a rational level. The Internet + era not only provides development opportunities for education reform, but also solves the problem of unfair teaching resources and creates an effective way for students to develop themselves. Internet thinking mode can cultivate the quality of elite students and realize the rights of fairness and autonomy. Under the background of Internet + era, physical education teaching in colleges and universities is undergoing a series of changes, making the physical education classroom more vigorous.

References 1. Pan, L., Weijun, D.: Research and design of physical education information teaching platform in colleges and universities. Educ. Inf. China 17, 44–46 (2012) 2. Lihua, Yu., Baobin, D., Zhaobing, Y.: Research on the application status of college sports informatization education resources in Jiangxi province. J. Jilin Sports Univ. 27(06), 139– 140 (2011) 3. Xiaofei, C., Yongli, X.: Reform of college physical education informationization under the background of “Internet +” era. J. Yancheng Normal Univ. (Hum. Soc. Sci. Edn.) 38(03), 119–121 (2018) 4. Junhua, P., Kai, N.: Research on the establishment of college sports informatization index system. J. Sports Coll. Shanxi Normal Univ. 04, 68–70 (2006) 5. Congmei, L.: Research on current situation and countermeasures of college physical education informatization. J. Jilin Normal Univ. Eng. Technol. 26(11), 50–51 (2010) 6. Busgren, N.: college sports informatization APP software design. Autom. Instrum. 09, 227– 229 (2017) 7. Han, W., Peng, L.: Research on the current situation and optimization measures of college physical education informatization teaching. Inf. Syst. Eng. 10, 176 (2017) 8. Yuanping, T.: Research on improving informatization literacy of college physical education teachers. J. Suzhou Inst. Educ. 16(01), 145–147 (2013) 9. Kai, N., Tongxin, L.: On the unbalanced development strategy of college sports informatization. J. Harbin Inst. Phys. Educ. 04, 33–34 (2007) 10. Mi, H.: Research on Demand Analysis Methods for College Sports Informatization Construction. Information technology and informatization 02, 11–13 (2009) 11. Ruzhen, W., Ye, W.: Enlightenment of MOOC model on college physical education courses in the information age. Sichuan Sports Sci. 34(05), 126–129 (2015)

Network Traffic Classification and Control Technology Based on Decision Tree Nanfang Li(&), Zongrong Li, and Lei Zhao State Grid Qinghai Electric Power Company Electric Power Science Research Institute, Xining 810008, Qinghai, China [email protected]

Abstract. The identification and classification of network traffic has very strong practical significance. The correct classification of network traffic is the basis of studying the upper network structure. The traditional traffic classification technology mainly relies on port information and load characteristics of data packets. However, in recent years, with the rapid growth of network bandwidth and the gradual complexity of application layer protocols, traditional traffic classification methods have been difficult to meet the needs of the current network environment, which urgently requires the introduction of new theories and technologies to achieve accurate network traffic classification. Combining with the existing network traffic identification and classification methods, this paper studies the network traffic classification method based on machine learning, gives the construction of the classification model based on decision tree, and realizes the function of traffic statistics and classification. Experiments show that the proposed algorithm has higher classification accuracy and is suitable for unbalanced traffic classification compared with many traditional algorithms. Keywords: Network traffic

 Classification  Decision tree

1 Introduction With the rapid development of Internet and the updating of network technology, network traffic classification based on statistical characteristics of network flow and machine learning has become a new direction in the field of network traffic classification [1–3]. Aiming at the unbalanced phenomenon of network traffic, this paper uses decision tree classification technology to carry out the research work of network traffic classification. Decision tree classification is a supervised classification method [4, 5], which is widely used in various fields because of its high rule induction ability and fast classification speed. In order to adapt to the classification of unbalanced network traffic, this paper applies decision tree to the classification of network traffic for the first time, which is also based on the classification of decision tree. Therefore, the basic idea of decision tree classification model is introduced.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1701–1705, 2020. https://doi.org/10.1007/978-3-030-25128-4_217

1702

N. Li et al.

2 The Construction Process of Decision Tree Decision tree uses a tree to represent the mapping relationship between classification attributes and classification results [6]. Each non-leaf node of the tree represents a test of a certain attribute [7]. The representative sample of the test node has the same test conclusion in the test node [8]. Each leaf node of the tree has a type marker, and the sample arriving at the leaf node must satisfy test conditions from root to leaf by the path. In addition to graphical description, another form of describing decision tree classification knowledge is IF-THEN classification rules, and each rule uses a logical expression to judge the classification results. The path from the root node of the decision tree to any leaf node constitutes a classification rule. A pair of attributes along a path of a decision tree constitutes a conjunction item in the conditional part (IF part) of the classification rules, and the category marked by leaf nodes constitutes the conclusion of the rules (THEN part). IF-THEN classification rule expression is easy to understand, and the advantage of IF-THEN rule expression is more prominent when the decision tree is large. Decision tree classification mainly studies the construction method of decision tree [9, 10]. As a supervised machine learning method, decision tree classification needs to provide labeled sample data set for learning as input. The generation of decision tree is a process of gradual refinement and splitting of training set. The splitting process is from top to bottom and from root to bottom. According to some criteria for evaluating split attributes, the algorithm chooses the optimal attributes from the initial sample data set as the split attributes of the root node, and also chooses the optimal split points of the corresponding split attributes as the boundary of the branch bifurcation. Then, the initial sample set is divided into several disjoint sets according to the split attributes and split points. These subsets become several different branches of the root node. Each sub-node is split in the same way until all the leaf nodes are generated. From the above, it can be seen that the process of decision tree generation is a recursive solution process, and the main steps of each recursion are described as follows: Step 1. Determine the sample data set for splitting. Step 2. Evaluate the attributes and corresponding splitting points according to some criteria and find the optimal solution. Step 3. Judge whether it is necessary to continue splitting nodes. Step 4. Use some method to determine the type value of leaf nodes. Among them, the selection of splitting attributes and splitting points and the size of the tree are the core of the decision tree classification algorithm.

3 Experimental Evaluation In this paper, the commonly used accuracy and recall rates are used to evaluate the experimental results. For a classification experiment and a given class of Ci , true positive (TPi ), true negative (TNi ), false positive (FPi ), false negative (FNi ) are defined as follows.

Network Traffic Classification and Control Technology Based on Decision Tree

1703

The actual type of TPi is Ci , and the experiment is also classified as the number of samples of Ci . The actual type of TNi is not Ci , nor is the number of samples classified as Ci in the experiment. The actual type of FPi is not Ci , but the experiment is classified as the number of samples of Ci . The actual type of FNi is Ci , but the experiment is classified as the number of samples of other types. Based on these data, the accuracy Pi and recall ri of Ci can be defined as Pi ¼

TPi ; TPi þ FPi

ri ¼

TPi TPi þ FNi

ð1Þ

Therefore, for the experiment, the higher the accuracy, the better recovery rate. In order to estimate the accuracy of the classifier for all types, the weighted average method is used to estimate the total accuracy p and the total recall r of the classifier in all categories. The formulas are as follows. P¼

Pn

Wi P i ; n

i¼1



Pn i¼1

W i ri

n

ð2Þ

Wi is the weight of Ci class, which can be set according to actual needs, and the percentage of each type of network flow in the total sample can be used. In order to ensure the comparability of experimental results, all algorithms and experimental processes are implemented on WEKA platform. WEKA is one of the most complete and mature data mining tools nowadays. It is also widely used in traffic classification research. Select the appropriate training data set, and compare the traditional algorithms, including Naive Bayesian algorithm, Bayesian neural network, Kmeans and K-nearest algorithm with CS algorithm, to examine the effect of CS algorithm. The experimental results of flow classification accuracy and flow recall rate are shown in Tables 1 and 2. Table 1. The classification accuracy of each algorithm flow Algorithm WWW MAIL PTP

ATTACK P2P

NB BNN K-means KNN CS

0.687 0.756 0.293 0.247 0.619

0.886 0.927 0.329 0.988 0.943

0.905 0.914 0.415 0.985 0.974

0.917 0.896 0.544 0.956 0.975

0.581 0.719 0.128 0.467 0.916

DATABASE SERVICES Weighted mean 0.947 0.965 0.820 0.954 0.978 0.872 0.352 0.762 0.407 0.978 0.945 0.761 0.984 0.965 0.878

From the weighted average results, except for K-means, the classification accuracy and recall rate of network traffic of all kinds of classification algorithms almost exceed

1704

N. Li et al. Table 2. The classified recall rate of each algorithm flow

Algorithm WWW MAIL PTP

ATTACK P2P

NB BNN K-means KNN CS

0.603 0.738 0.532 0.133 0.612

0.899 0.918 0.315 0.967 0.938

0.913 0.907 0.513 0.955 0.963

0.926 0.915 0.465 0.935 0.967

0.539 0.638 0.219 0.389 0.909

DATABASE SERVICES Weighted mean 0.937 0.957 0.849 0.943 0.963 0.884 0.357 0.635 0.517 0.935 0.906 0.960 0.968 0.956 0.937

80%. For CS algorithm, the average accuracy and recall rate of stream weighted average are also about 90%, which is the best among all the algorithms. From the point of view of single traffic type, the classification accuracy of DATABASE and SERVICES traffic is the best, almost all above 90%, and the classification accuracy of CS algorithm reaches 99%. This is mainly because the request content of DATABASE and SERVICE streams is relatively single and the data format is relatively fixed. Comparatively speaking, the classification accuracy of ATTAK and P2P is relatively low, almost all between 60% and 70%. For ATTACK traffic, the accuracy of various algorithms is not high. The main reason is that the types of network attacks are various, mostly WWW and MAIL as carriers. Therefore, it is not reliable to use the classification results of machine learning algorithms directly in Intrusion detection.

4 Conclusion In view of the shortcomings of the existing network traffic classification methods, this paper studies the network traffic classification based on the statistical characteristics of network traffic and the decision tree classification model. The decision tree algorithm is applied to the classification of network traffic, which improves the accuracy of unbalanced traffic classification.

References 1. Kampeas, J., Cohen, A., Gurewitz, O.: Traffic classification based on zero-length packets. IEEE Trans. Netw. Serv. Manag. 121(99), 223–234 (2018) 2. Canovas, A., Jimenez, J.M., Romero, O., et al.: Multimedia data flow traffic classification using intelligent models based on traffic patterns. IEEE Netw. 32(6), 100–107 (2018) 3. Sun, G., Teng, C., Su, Y., et al.: Internet traffic classification based on Incremental support vector machines. Mob. Netw. Appl. 55(14), 1–8 (2018) 4. Swarnkar, M., Hubballi, N.: RDClass: on using relative distance of keywords for accurate network traffic classification. IET Netw. 67(4), 273–279 (2018) 5. Chowdhury, M.Z., Hossan, M.T., Jang, Y.M.: Interference management based on RT/nRT traffic classification for FFR-Aided small cell/macrocell heterogeneous networks. IEEE Access 61(6), 31340–31358 (2018)

Network Traffic Classification and Control Technology Based on Decision Tree

1705

6. Wong, A., Shafiee, M.J., Jules, M.S.: MicronNet: a highly compact deep convolutional neural network architecture for real-time embedded traffic sign classification. IEEE Access 61(4), 1324–1337 (2018) 7. Haferkamp, M., Al-Askary, M., Dorn, D., et al.: Radio-based traffic flow detection and vehicle classification for future smart cities. IEEE Access 61(6), 100–107 (2018) 8. Keser, T., Dejanović, I.: Traffic sign shape detection and classification based on the segment surface occupancy analysis and correlation comparisons. Tehnicki vjesnik - Technical Gazette, 25(S1), 1–9 (2018) 9. Staravoitau, A.: Traffic sign classification with a convolutional network. Pattern Recogn. Image Anal. 28(1), 155–162 (2018) 10. Shafiq, M., Yu, X., Bashir, A.K., et al.: A machine learning approach for feature selection traffic classification using security analysis. J. Supercomput. 2018(2), 1–26 (2018)

A Vulnerability Mining Method of Web Application Based on Neural Network and Crawler Technology Yang Li(&), Shihai Han, and Zhu Zhu State Grid Chongqing Electric Power Co., Electric Power Research Institution, Chongqing 401123, China [email protected]

Abstract. With the continuous development of network technology, the security vulnerability detection products have developed rapidly, which has given good results to some vulnerability detection, but there are still many shortcomings. Most of them are basically aimed at traditional vulnerability detection, but they do not essentially check the application security, resulting in low coverage, high false alarm rate, slow detection speed, poor performance and so on. Moreover, these products only aim at a certain kind of vulnerabilities, which are highly targeted, but have poor scalability. The proposed method improves the speed, coverage and accuracy of vulnerability mining. Selecting professional web crawlers to grab pages is fast and efficient. Faced with the super-large website is also enough to cope with, so the scope of application is relatively wide. The fuzzy theory into neural network can improve the insufficiency of the application in vulnerability mining. Practice has proved that this method can effectively reduce the test set of injection mining, avoid unnecessary measurement, greatly reduce the time consumed, and improve the accuracy of vulnerability identification to a certain extent. Keywords: Vulnerability mining  WEB application  Fuzzy neural network Crawler technology



1 Introduction With the social and economic development, we have now entered the era of big data, and if you want to get valuable data in complex mass data, data mining technology is indispensable. It not only can serve people’s daily life, but also bring benefits for businesses and individuals, so study on data mining techniques and algorithms has great practical significance. Since the complexity among large amounts of data is very high [1, 2], using conventional method is not suitable and efficient. Because neural network is qualified with strong classification capability and nonlinear separable and rule extraction capability [3, 4], it can solve certain problems in the application in data mining. But neural network also has some shortcomings. And in terms of knowledge acquisition and rule extraction, fuzzy theory has its own advantages, which is relatively close to fuzzy thinking mode of human [5–7], while its self-learning adaptive capacity is deficient. Therefore, this paper organically combines fuzzy theory and neural © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1706–1710, 2020. https://doi.org/10.1007/978-3-030-25128-4_218

A Vulnerability Mining Method of Web Application

1707

networks to complement each others advantages for data mining research. Finally, an application case is given for testing. From the point of view of current applications, people are still neglecting the application security. Although many security agencies report and call for this problem, the research on application security is still far from being meticulous and perfect as the research on network security, and it is also the easiest to bring serious problems. At present, there is little research on vulnerabilities. Despite the appeal of many security experts, it has not attracted the attention of actual developers in detecting application vulnerabilities.

2 Data Mining Data mining is the process to extract effective knowledge and data in a large number of databases [8]. Its main role is to obtain the relationship among large amounts of data and look for neglected contact, which plays an important role in forecasting and decision-making. Analysis process is shown in Fig. 1.

Fig. 1. The analysis process

Data mining process includes data preparation phase, data mining phase and final results evaluation and representation phase. The process is shown in Fig. 2.

Fig. 2. The data mining process.

1708

Y. Li et al.

3 Neural Network Neural network model originated in neurobiology [9]. Its calculation process is similar to the reaction process in the biological neurons [10]. Excitation function f ½u1  determines the output form of reaching threshold value hi under the joint action of x1 ; x2 ;    ; xn . ui ¼

X

wij xi  hi

ð1Þ

j

y i ¼ f ½ ui  ¼ f

X

! wij  hi

ð2Þ

j

To calculate the output of each layer, for xik of the ith neuron output in the kth layer, therefore,   yki ¼ f uki

ð3Þ

Wherein, uki ¼

X

wij xk1  hki j

j

In the formula, xk1 n þ 1 ¼ 1,wiðn þ 1Þ ¼ h. The structure and working process of neural network are shown as Fig. 3.

Fig. 3. The structure of neural network

ð4Þ

A Vulnerability Mining Method of Web Application

1709

4 Web Crawler Technology WEB application vulnerability mining system is divided into five parts: web page capture module, analysis module, detection module, recording module and reporting module. Web crawling module is responsible for traversing and downloading all HTML content on the web site, including filtering invalid and duplicate pages. Web application is one of the core parts of vulnerability system, which is web page crawling. The importance of web crawling is to ensure the comprehensiveness and efficiency of the system, or to play a key role in the coverage and speed of detection applications. If WEB application vulnerability system can not access all web pages, it can not ensure that WEB application vulnerabilities are fully detected. Because any page that can interact may have vulnerabilities, especially some pages whose functions are not particularly important in WEB applications. Programmers may neglect these pages, resulting in vulnerabilities that hackers can easily exploit. The most commonly used effective way to crawl web pages is to use web crawlers. Because of the importance of the network capture module, it is necessary to select a high-performance crawler component to enhance its function. Professional web crawler software can track the URL of the page for extended crawling, and finally provide a wide range of data sources for search engines. Crawler technology can crawl tens of thousands of pages a day with a good network and a standard computer. Its communication programming mode includes both multi-threaded blocking mode and singlethreaded non-blocking mode. It is more recommended to use single-threaded nonblocking mode. Although the multi-threading mode can effectively utilize the resources of machines and networks by using the parallel nature, it also consumes a lot of machine resources. Frequent switching between user-level multi-threads will also have a certain impact on performance. The one-way non-blocking mode is to make multiple non-blocking connections, then judge the connection status, and respond to requests in the first time, which not only makes full use of network resources, but also reduces the consumption of local CPU resources to a minimum. The optimized method improves the weighting algorithm and supports Chinese page crawling. These improvements can help the system to ensure a relatively high coverage. In addition, through the study of html, the possible tags of SQL injection are identified and stored in different queues, which avoids the complexity of multiple page parsing to get vulnerability injection points and the speed is improved.

5 Conclusion It is very valuable to design a system to detect application vulnerabilities. It can make up for the loopholes that firewalls and intrusion detection systems can not prevent. Before the application is released, we can quickly and efficiently discover the logic or function defects in the application. At the same time, we can let the developers and testers understand the application architecture and weaknesses, and then quickly repair the vulnerabilities to prevent them from happening.

1710

Y. Li et al.

References 1. Bowman-Perrott, L., Burke, M.D., Zaini, S.: Intrusion detection model and algorithm based on multi dimensional data stream mining technology. J. Comput. Res. Dev. 46(4), 602–609 (2016) 2. Farraj, A., Hammad, E., Daoud, A.A., Kundur, D.: Data stream frequent pattern mining based on time decay model. Acta Automatica Sinica 36(5), 77–86 (2016) 3. De Clerck, D., Demeulemeester, E.: Towards a more competitive PPP procurement market: a game-theoretical analysis. J. Manag. Eng. 32(6), 106–115 (2016) 4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Model. Simul. Int. 92(6), 579–594 (2016) 5. Lin, K.-Y., Lin, J.-C., Chen, J.-M., et al.: Defense automatic malicious tools based on navigation behavior. J. Discrete Math. Sci. Crypt. 13(1), 17–27 (2010) 6. Wong, A., Shafiee, M.J., Jules, M.S.: MicronNet: a highly compact deep convolutional neural network architecture for real-time embedded traffic sign classification. IEEE Access 61(4), 1324–1337 (2018) 7. Tatli, Eİ., Urgun, B.: WIVET-benchmarking coverage qualities of web crawlers. Comput. J. 60(4), 555–572 (2017) 8. Choi, H., Lee, H.: Identifying botnets by capturing group activities in DNS traffic. Comput. Netw. 56(1), 20–33 (2012) 9. Marchetto, A., Tiella, R., Tonella, P., et al.: Crawlability metrics for automated web testing. Int. J. Softw. Tools Technol. Transf. 13(2), 131–149 (2011) 10. Lavori, P.W., Sugarman, J., Hays, M.T., et al.: Improving informed consent in clinical trials - a structured literature review of empirical research. Control. Clin. Trials 20(2), 187–193 (2009)

Intelligent Reconstruction Plan for Old Stairs in Ordinary Community Yuan Zang(&) City College, WuHan University of Science and Technology, Wuhan 430083, Hubei, China [email protected]

Abstract. At present, a large part of community residential buildings in China have no elevator phenomenon, which is a big obstacle for the elderly, the disabled, and normal people to carry things. However, the stairs of buildings in the community are difficult to be intelligentized because of their own characteristics. The existing technical conditions cannot directly meet this requirement. Based on the existing technical conditions, this paper studies the rationalization scheme of the intelligentized transformation of the old stairs, which provides an important guarantee for the follow-up intelligentized research and implementation of the stairs. Keywords: The stairs

 Intelligent  Retrofit scheme

1 Research Background and Significance At present, a large number of multi-storey buildings in China are in the state of only ordinary stairs [1]. The multi-storey buildings built around 2000 are not designed to be used for a short period of time because they have not been used for a long time. The mere use of ordinary stairs will bring a lot of inconvenience to the lives of the people, especially the elderly and the disabled [2, 3]. Because of their inconvenience, going up and down the stairs has become a heavy burden for them, directly affecting their quality of life [4–6]. Although there have been cases of adding elevators to existing buildings in recent years, they have a relatively large impact on the lives of the people during construction, and their construction time is relatively long [7–10]. Therefore, in the Internet+ era, how to intelligentize the ordinary stairs and transform the existing old stairs into an important research content in the simplest way. This has great practical significance for improving the service function of stairs in ordinary community buildings and improving people’s lives [11].

2 Intelligent Transformation Plan for Community-Oriented Old Staircase At present, most of the old stairs in the community use parallel double-running stairs, as shown in Fig. 1. The stairs are given the values according to the specifications. The net width of the stairs can reach 2.2 m or more, as shown in Fig. 2. However, due to © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1711–1715, 2020. https://doi.org/10.1007/978-3-030-25128-4_219

1712

Y. Zang

the nature of its use, the overall width is still less than the width of the stairs of public buildings. In other words, space is an important factor in the intelligent transformation. As far as its function is concerned, the current stairs solve the problem of the passage of people on different floors, but it becomes a big obstacle when carrying articles. In the intelligent transformation, we should first solve the problem that the stairs can be automatically moved up and down, so as to make the passage more convenient and slow down the fatigue of the stairs. The existing scheme based on the above basic conditions is as follows: (1) Add smart, electric stairs [2] in the stairwell, as shown in Fig. 3. (2) Add intelligent stairway transporter [3] in the stairwell, as shown in Fig. 4. (3) Install intelligent barrier-free stairs upgrade system in the stairwell [4], as shown in Fig. 5. (4) With the help of a robot [5] that can go up the stairs, as shown in Fig. 6.

Fig. 1. Parallel double running stairs

Fig. 2. Ladder section height

Intelligent Reconstruction Plan for Old Stairs in Ordinary Community

Fig. 3. New type of electric stair climbing transport vehicle

Fig. 4. Smart staircase transport vehicle

Fig. 5. Intelligent barrier-free stairs upgrade system

1713

1714

Y. Zang

Fig. 6. Creep robot

The above methods currently have certain research results, but for the stairs of community residential buildings, the following problems will arise when simply applying the two: The parking position of the intelligent stair transporter is not easy to set up, and the intelligent barrier-free stair lift system will occupy the net width of the stairwell and the net height requirement is relatively high, which is contrary to the relatively small space of the residential stair space. Therefore, although the technical conditions are already available, the two schemes are very difficult to apply and may not be feasible at all. On this basis, a more reasonable plan should be proposed. The solution can solve the problem of small space by the following methods: (1) Make full use of the space of the railings and handrails. When the intelligent transformation is carried out, the traveling rails can be set at the handrails of the railings, and even the railings can be replaced by the renovation facilities. (2) The transport facility is designed to be collapsible, foldable into a line or face, hidden in the stairwell at idle time or hidden at the stepped board, thus saving space in the stairwell. (3) Make full use of other attached rooms such as the attic to hide the transportation facilities in the space during your free time. (4) With the concept of an escalator, a smart facility similar to an escalator is added to the stairs. Of course, while making full use of the existing space, intelligent automatic cleaning function, intelligent automatic lighting function, and intelligent safety reminding function can be added for the renovation of the intelligent staircase.

3 Conclusion (1) In the intelligent transformation of the old stairs for the ordinary community, due to the characteristics of the stairs, it is necessary to ensure that the normal evacuation function cannot be affected after the transformation. This is the most basic principle of transformation. (2) In the intelligent transformation of the old stairs for the general community, the existing technical conditions cannot fully meet their needs. Therefore, in the

Intelligent Reconstruction Plan for Old Stairs in Ordinary Community

1715

context of the era of the Internet+, the research space for the intelligentization of the stairs is still relatively large. (3) The economical nature of the old stairway for the ordinary community should also be considered. Otherwise, the individualized demand in the implementation process may lead to poor promotion. In short, research on both technical and economic aspects of the intelligent transformation of stairs will certainly be better promoted, and truly benefit the people.

References 1. Li, P., Li, B., Long, P.: Smart cleaning machine for stairs armrest of community buildings. J. Hubei Univ. Technol. 28(04), 105–109 (2013) 2. Cui, J., Zou, Y., Zhao, Z., Miao, H., Zhao, G., Yang, S.: The structural design of smart electric stairs carrying vehicles. Heilongjiang Sci. Technol. Inf. (36), 179 (2016) 3. Feng, Y., Liang, W., Zeng, Y., Han, H., Xie, X.: Planetary wheel intelligent staircase transport vehicle design. Mech. Eng. Autom. (05), 158–159 (2016) 4. Huang, H., Tang, H., Dai, Q., Li, S.: Intelligent barrier-free staircase lifting system. Comput. Meas. Control 21(04), 1039–1041+1043 (2013) 5. Yao, Y.: The design and implementation of intelligent robots that can go up the stairs. University of Posts and Telecommunications, Beijing (2013) 6. Wu, C., Xia, Z., Zhang, M., Wang, L., Wang, X., Liang, T.: Design and production of smart staircase climbing vehicle based on single chip computer. Electron. Prod. (22), 31–32+49 (2018) 7. Wang, L.: Staircase evacuation experiment and simulation research based on intelligent body model. China Mining University (2018) 8. Zhao, J.: Study on the attitude control and interior autonomous navigation of intelligent helper wheelchair. Wuhan Institute of Technology (2016) 9. Feng, P., Shi, A., Liu, J., Wang, Y.: Design of intelligent staircase flat dual-use freight car. Mod. Manuf. Technol. Equip. (01), 14+21 (2014) 10. Wei, W., Huang, Q.: Design of intelligent staircase channel light switch based on human perception. Technol. Inf. (02), 17–18 (2013) 11. Li, X., Li, Z., Yang, L., Wuyuhao, Yan, M.: New type of electric staircase transport vehicle. Sci. Technol. (06), 3 (2019)

Network Traffic Prediction Based on Machine Learning Model Xin Sun(&), Qinyuan Li, and Changhua Sun Electric Power Research Institute of State Grid Zhejiang Electric Power Co., Ltd., Hangzhou 310014, China [email protected]

Abstract. Network traffic engineering is of great significance to large-scale network planning and design, network resource management and network intrusion detection. Traffic modeling and prediction is an important part of network traffic engineering. The traditional traffic time series model is only suitable for analyzing stationary and special non-stationary processes, and it is difficult to describe the complex traffic behavior of large-scale networks. The idea of using support vector machine to estimate function is to select a non-linear mapping to map the sample vector from the original space to the high-dimensional feature space, and construct the optimal decision function in the high-dimensional feature space. The principle of structural minimization is used, the loss function is introduced, and the kernel function of the original space is used to replace the point product operation in the high-dimensional feature space for avoiding the complexity. In this paper, support vector machine (SVM) is used to predict network traffic. The network traffic is preprocessed, the parameters are dynamically adjusted, and then the network traffic is predicted. From the actual prediction results, this method has a good prediction effect. Keywords: Network traffic Support vector machines

 Prediction  Machine learning 

1 Introduction With the rapid development of the Internet, the number of Internet users has also increased dramatically [1–3]. However, with the rapid increase of Internet users, the scale of the network is becoming larger and larger, and the network structure is becoming more and more complex [4, 5]. Therefore, network traffic plays an important role in the regulation of network resources, the design of network structure, and the optimization of resource scheduling strategy on the server side. If we can predict the trend of network traffic, we can make a reasonable task scheduling strategy for the server according to the prediction results, make full use of network resources, try our best to achieve load balancing, so as to improve the quality of service. In addition, we can also find the abnormal behavior in the network in time and improve the security of the network in view of the abnormal situation of network traffic, which will bring convenience and far-reaching impact to people’s life. How to predict network traffic accurately and quickly has become a core problem. At the same time, the network is © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1716–1720, 2020. https://doi.org/10.1007/978-3-030-25128-4_220

Network Traffic Prediction Based on Machine Learning Model

1717

complex and influenced by many factors [6], and the network traffic will inevitably show the characteristics of high self-similarity, time-varying and non-linear, which dooms that the traditional prediction methods can not achieve high accuracy. Network traffic prediction models can be divided into linear prediction and nonlinear prediction [7, 8]. Among them, linear prediction methods mainly include ARMA model, FARIMA model, and non-linear prediction methods mainly include wavelet theory, neural network and support vector machine. Because of the mixed and pure characteristics of network traffic, the non-linear prediction method is paid more attention to. In the aspect of network traffic prediction based on SVR, because support vector machine is a new statistical method proposed in recent years, there are many studies on it. At the same time, it also shows great advantages in traffic flow prediction, fuzzy control and other fields. Because of the time-varying and purity of network traffic, support vector machine (SVM) has the advantage of selecting fewer samples and strong generalization ability in solving non-linear regression problems, which can be used in the research of network traffic modeling and prediction.

2 Support Vector Machines The limitation of traditional statistics is that it is difficult to achieve the desired results in the case of limited samples [9]. In order to overcome this limitation, people have innovated the original statistical theory system. It provides a strong theoretical basis for machine learning in the case of small samples. Support vector machine is a more efficient machine learning method, which is also based on statistical learning theory. Up to now, support vector machine and statistical theory, as the leader in the field of small sample research, have been widely accepted by the world and gradually become a new research hotspot. The estimated function is f ðxÞ ¼

N X

wm /m ðxÞ þ b

ð1Þ

m¼1

where /ðxÞ ¼ ð/1 ðxÞ; /2 ðxÞ;    ; /N ðxÞÞT is nonlinear mapping, w ¼ ðw1 ;    ; wN Þ is a linear weight vector. b is the bias. The loss function is defined as  Le ðx; y; f Þ ¼

0 for jf ðxÞ  yj\e jf ðxÞ  yj  e otherwise

ð2Þ

The non-linear regression problem to be solved is to minimize the objective function. l X 1 jjwjj2 þ C Le ðxi ; yi ; f Þ 2 i¼1

where e and C are two user-determined free parameters, respectively.

ð3Þ

1718

X. Sun et al.

By introducing non-negative relaxation variables ni , the equivalent primitive problem is obtained. 8 l P > > < min J ¼ 12 jjwjj2 þ C ni > > :

i¼1

s:t:yi  f ðxÞ  1  ni ni  0; i ¼ 1;    l

ð4Þ

The corresponding dual problem is 8 l l P P > > > max QðaÞ ¼ yi ai  e jai j > > > i¼1 i¼1 > > l P l > P < 1 ai aj Kðxi ; xj Þ 2 i¼1 j¼1 > > > l P > > > s:t: ai ¼ 0 > > > i¼1 : C  ai  C; i ¼ 1;    ; l

ð5Þ

where ai is the Lagrange multiplier. K is a kernel function satisfying Mercer condition. The output corresponding to test sample x is predicted by the following formula f ðxÞ ¼

l X

ai Kðx; xi Þ þ b

ð6Þ

i¼1

The prediction accuracy and calculation of the network model are determined by points. Local linear models with local linear assumptions restrict the performance of local nonlinear models and predictions. In order to give full play to the advantages of local non-linear fitting of the non-linear model and improve the prediction accuracy of the local non-linear model, the value of the local non-linear model with the number of adjacent points can be larger than that of the local linear model. At the same time, the local nonlinear model is not limited by the local linearity under the assumption, the number of adjacent points can be larger than that of the local linear model. However, if the number of adjacent points is too large, not only the local non-linear model will greatly increase the amount of calculation, the calculation time will greatly increase, may appear over-fitting phenomenon, but reduce the accuracy of prediction. So the number of neighbors is not very large.

3 Network Flow Data Acquisition The network traffic prediction requires network data collection [10]. The process of network data collection includes system configuration, statistical analysis of network traffic data and data related to events. At present, the data collection methods of network traffic include SNMP-based acquisition method, NetFlow-based acquisition method, and network probe-based acquisition method. The network traffic collection

Network Traffic Prediction Based on Machine Learning Model

1719

method provides a device from the network to collect information related to the network management method, as well as the network management for network equipment to provide fault and error reports, mainly through the SNMP protocol and based on the Request/Response mode between Network Management Station and Management Agent. Network data flow information acquisition method based on network probes is mainly the traditional network communication framework based on ethernet. The method of inserting network probes is used to further analyze the data flow statistics of all network data flows through bus monitors and receiving and recording information. The content of this paper needs real-time monitoring of network data, but the method based on SNMP technology and network probe can not achieve this effect, so this paper adopts the method of collecting data based on NetFlow. The NetFlow working system studied in this paper includes three parts: data export, data acquisition and data analysis. The model of network flow data acquisition is shown in Fig. 1.

Fig. 1. The model of network flow data acquisition

Data export refers to a device with NetFlow data export function, which can directly export NetFlow data to a database and support files in CFlOW stream format or ASCII text. NetFlow cache is responsible for registering IP stream information, while transmission mechanism or export data are directly used by NetFlow to send data to data acquisition system. Data acquisition routers are based on UDP network protocols deposited on NetFlow servers to accurately and quickly send a set of NetFlow data and traffic information of NetFlow network data. It is mainly responsible for collecting, compressing, storing and sending a UDP packet from the router. NetFlow Server can accept multiple collected data at the same time, in order to reduce the workload of CPU and disk and prevent the normal work of data acquisition from being disturbed by abnormal workflow, a data acquisition system can only acquire one data file.

1720

X. Sun et al.

Data analysis is a Web-based network transmission analysis tool for analyzing NetFlow data exported from Cisco routers to provide further information on network traffic. Data analysis makes use of the data stored in the server after encapsulation for statistical analysis and traffic prediction.

4 Conclusion With the rapid development and application of the Internet, the scale and application of the network are becoming more and more complex. The Internet is a complex and nonlinear network to achieve reliable data transmission and network resources. It is particularly important to study the rational allocation of network monitoring institutions and their complex behavior characteristics. Network traffic prediction analysis and network performance evaluation is of great significance. The key of network traffic forecasting is to forecast and alarm by describing the network traffic situation in the future and analyzing the normal behavior. Acknowledgments. This research was supported by Research on Attack and Defense Technology of Intelligent Network Based on Machine Learning (Grant No. 5211DS18003H).

References 1. Bowman-Perrott, L., Burke, M.D., Zaini, S.: Intrusion detection model and algorithm based on multi dimensional data stream mining technology. J. Comput. Res. Dev. 46(4), 602–609 (2016) 2. Farraj, A., Hammad, E., Daoud, A.A., Kundur, D.: Data stream frequent pattern mining based on time decay model. Acta Automatica Sinica 36(5), 77–86 (2016) 3. De Clerck, D., Demeulemeester, E.: Towards a more competitive PPP procurement market: a game-theoretical analysis. J. Manag. Eng. 32(6), 106–115 (2016) 4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Model. Simul. Int. 92(6), 579–594 (2016) 5. Lin, K.-Y., Lin, J.-C., Chen, J.-M., et al.: Defense automatic malicious tools based on navigation behavior. J. Discrete Math. Sci. Crypt. 13(1), 17–27 (2010) 6. Wong, A., Shafiee, M.J., Jules, M.S.: MicronNet: a highly compact deep convolutional neural network architecture for real-time embedded traffic sign classification. IEEE Access 61(4), 1324–1337 (2018) 7. Tatli, E.İ., Urgun, B.: WIVET-benchmarking coverage qualities of web crawlers. Comput. J. 60(4), 555–572 (2017) 8. Choi, H., Lee, H.: Identifying botnets by capturing group activities in DNS traffic. Comput. Netw. 56(1), 20–33 (2012) 9. Marchetto, A., Tiella, R., Tonella, P., et al.: Crawlability metrics for automated web testing. Int. J. Softw. Tools Technol. Transfer 13(2), 131–149 (2011) 10. Lavori, P.W., Sugarman, J., Hays, M.T., et al.: Improving informed consent in clinical trials - a structured literature review of empirical research. Control. Clin. Trials 20(2), 187–193 (2009)

Appeal Mechanism of IEEE and Its Enlightenment Qing Xu(&) China National Institute of Standardization, No.4 Zhichun Road, Haidian District, Beijing 100191, China [email protected]

Abstract. Appeal mechanism is an important content in the construction of social organization standardization. It is also a way for members of a social organization to safeguard their rights and interests in standardization. The development of association standards in China is still in primary level. The construction of the appeal mechanism is a weak link in the construction of the working mechanism of most social organizations. This paper takes IEEE as an example, the appeal mechanism in the formulation of IEEE standards is studied systematically, characteristics of its appeal mechanism are deeply analyzed. The procedures and requirements of different types of appeals and relevant enlightenment is put forward, in order to provide reference for the establishment of appeal mechanism in social organization standardization in China. Keywords: Appeal mechanism  Social organization  Association standard IEEE



1 Introduction Cultivating and developing association standards is an important measure proposed in the reform plan of deepening standardization work in China [1]. In just four years, association standards in China have achieved significant development. Until March 18, 2019, a total of 2,222 social organizations have participated in standardization through the national information platform for association standards. And 7499 association standards were published on this platform [2]. Appeal mechanism is an important content in the construction of social organization standardization. It is also a way for members of a social organization to safeguard their rights and interests in standardization. International and foreign standardization organizations have generally developed a more rigorous and mature appeal mechanism. In China, the national standard GB/T 20004.1-2016 points out that social organizations should set up a appeal mechanism, in order to clarify the members of social organizations to the standardization of the appeal authority, the content of the appeal and procedures and requirements for handling appeals within social organizations [3]. The development of association standards in China is still in primary level. The social organizations involved in the standardization work still lack knowledge and experience in the construction of appeal mechanism. This paper takes IEEE as an example, the appeal mechanism in the formulation of © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1721–1725, 2020. https://doi.org/10.1007/978-3-030-25128-4_221

1722

Q. Xu

IEEE standards is studied systematically, characteristics of its appeal mechanism are deeply analyzed. The procedures and requirements of different types of appeals and relevant enlightenment is put forward, in order to provide reference for the establishment of appeal mechanism in social organization standardization in China.

2 Brief Introduction of IEEE IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity [4]. IEEE has 426,000 members in 160 countries, and 45 societies and technical committees cover a wide range of areas of IEEE technical interest [5]. The organization of IEEE includes Assembly and Board of Directors. Board of Directors has six committees that govern the main areas of interest to IEEE, including Educational Activities Board, IEEE-USA Board, Member and Geographic Activities Board (MGA Board), Publication Services and Products Board, IEEE Standards Association (IEEE-SA) and Technical Activities Board [6]. The department responsible for standards development is the IEEE-SA. IEEE has developed nearly 1300 standards and projects [7]. Board of Governors (BOG) and IEEE-SA Standards Board (SASB) is set up in IEEE-SA. Standardization technology organizations of IEEE-SA include technical committees (TC), standardization coordination committee and working groups (WG). IEEE has established a perfect appeal mechanism to ensure the interests of all parties involved in standard-developing.

3 Analysis of Appeal Mechanism of IEEE IEEE has published the latest revision of [8], , and in December 2018. These documents have adjusted and optimized the standard-setting policies of IEEE. The appeal mechanism in the standard-developing process has also been further clarified and required. The appeals of IEEE include the appeals of IEEE SA BOG, the appeals of IEEE-SASB, the appeals of the working group of the IEEE SA, and the complaints in the period of standarddeveloping. Each type of appeal has its own specific procedures and requirements. 3.1

Appeal Mechanism for IEEE-SA BOG

Persons who have directly and materially affected interests and who have been, adversely affected by a decision of the IEEE-SA BOG, shall have the right to appeal actions or inaction of the IEEE-SA BOG. The IEEE-SA BOG shall not consider appeals of technical decisions based on technical grounds or make findings with respect to ethical rules. All technical decisions shall be made at or below the Standards Committee level, such as IEEE Ethics and Member Conduct Committee, IEEE-SA Standards Conduct Committee. The appeal officer of BOG is the chairman of IEEE-SA and the vice-chairman of BOG. At the first IEEE-SA BOG meeting of the year, the

Appeal Mechanism of IEEE and Its Enlightenment

1723

IEEE-SA President shall appoint, subject to ratification by the IEEE-SA BOG, one of its voting members to serve as the IEEE-SA BOG Vice Chair for Appeals. The IEEESA BOG Vice Chair for Appeals shall form BOG Appeal Panels to hear specific appeals. If the IEEE-SA BOG Vice Chair for Appeals has a conflict regarding the subject matter of an appeal, the IEEE-SA President shall appoint another member of the IEEE-SA BOG to serve as the IEEE-SA BOG Vice Chair for Appeals for that particular appeal [9]. The procedure for appeals by the IEEE-SA BOG is: (1) Submission of appeal brief. The appellant shall submit a written appeal brief to the Secretary of IEEE-SA BOG. The appeal brief shall state the nature of the objection(s) including any adverse effects, the clause(s) of the procedures or the standard(s) that are at issue, actions or inaction that are at issue, and the specific remedial action(s) that would satisfy the appellant’s concerns. Previous efforts, including all subordinate appeals, to resolve the objection(s) and the statement of outcome/decision of each, including a sequence of events of these efforts, shall be provided. (2) Appeal brief acceptance. The Secretary shall send the appellant a written acknowledgment of receipt of the appeal brief within five working days of such receipt. The BOG Appeal Officers shall review the appeal brief and determine within 20 days of receipt of the appeal brief if the appeal shall be heard by an IEEE-SA BOG Appeal Panel. If it is determined that the evidence is not conclusive, the secretary of BOG shall notify the appellant in writing that his appeal has been dismissed. If it is determined that the IEEE-SA Standards Board should hear the appeal, the appeal shall be referred to the IEEE-SA Standards Board and adjudicated according to IEEE-SA Standards Board processes. If the BOG Appeal Officers determine that an IEEE-SA BOG Appeal Panel should hear the appeal, the Secretary shall, within 30 days of receipt of the appeal brief, send the appellee a copy of the appeal brief and acknowledgement, and shall send the appellant and the appellee a written notice of the date, time, and location for an in-person hearing with the BOG Appeal Panel. (3) Reply brief of appellee. Within 45 days of receipt of the hearing notice, the appellee may send the appellant and Secretary a written reply brief, which specifically and explicitly addresses each allegation of fact in the appeal brief to the extent of the appellee’s knowledge. (4) Confirm the members of BOG Appeal Panel. Except as noted below, the BOG Appeal Panel shall consist of three voting members of the IEEE-SA BOG who have not been directly involved in the matter in dispute. At least two members of the BOG Appeal Panel shall be acceptable to the appellant and at least two shall be acceptable to the appellee. (5) Conduct of the hearing. The number of participating representatives for each of the parties to the appeal is limited to a maximum of three. No recordings or verbatim transcriptions of the hearing are allowed, except by the IEEE-SA at its sole discretion. The appellant has the burden of demonstrating adverse effects, improper actions or inaction, and the efficacy of the requested remedial action. Each party may present other pertinent arguments, and members of the BOG

1724

Q. Xu

Appeal Panel may address questions to individuals. The BOG Appeal Panel shall only consider documentation included in the appeal brief and reply brief, unless: • Significant new evidence; • Such evidence reasonably was not available to the appellant or appellee, as appropriate, at the time of filing; • Such evidence was provided by the appellant or appellee, as appropriate, to the other parties as soon as it became available. (6) BOG Appeal Panel discussion and decision. The BOG Appeal Panel shall make a written decision on the basis of the vote. The BOG Appeal Panel Chair, through the Secretary, shall notify the appellant, the appellee, and members of the IEEESA BOG in writing of the decision of the BOG Appeal Panel. 3.2

Appeal Mechanism for IEEE-SASB

The IEEE-SA Standards Board Chair shall select six to nine members of the IEEE-SA Standards Board to serve as the SASB appeals pool. The SASB Appeal Officers shall be the IEEE-SA Standards Board Chair and the SASB Vice Chair for Appeals. The Past Chair of the IEEE-SA Standards Board shall serve as the SASB Vice Chair for Appeals. If the SASB Vice Chair for Appeals has a conflict regarding the subject matter of an appeal, the IEEE-SA Standards Board Chair shall appoint another member of the IEEE-SA Standards Board to serve as the SASB Vice Chair for Appeals for that particular appeal. If the IEEE-SA Standards Board Chair has a conflict regarding the subject matter of an appeal, the SASB Chair shall appoint a non-conflicted member of the SASB to serve as the second SASB Appeal Officer for that particular appeal [10]. The appeal mechanism for IEEE-SASB is similar to that of IEEE-SA BOG. Such as Submission of appeal brief, appeal brief acceptance, reply brief of appellee, confirm the members of SASB Appeal Panel, conduct of the hearing, SASB Appeal Panel discussion and decision.

4 Characteristics and Enlightenments of Appeal Mechanism of IEEE 4.1

Setting up the Main Post and Deputy Post

It is necessary to set up the main post and deputy post in key posts to ensure fair and impartial handling of appeals. 4.2

Setting up Appeal Mechanism Refer to the Hierarchy of the Standardization Technical Organization

The appeal mechanism shall be reasonably set up according to the hierarchy of the standardization technical organization.

Appeal Mechanism of IEEE and Its Enlightenment

4.3

1725

Confirm the Members of Appeal Panel Flexibly

It is very necessary to confirm the members of appeal panel flexibly, in order to ensure fair and equitable handling of appeals. 4.4

Strengthen Interaction Between the Appellant and the Appellee

It is very necessary to strengthen interaction between the appellant and the appellee, which may promote the resolution of appeals.

5 Conclusion Compared with the development of association standards in foreign countries for more than one hundred years, China is still in the initial stage of association standards development. Appeal mechanism is an important content in the construction of social organization standardization. It is also a weak link in the construction of the working mechanism of most social organizations. This paper fully analyzed the IEEE appeal mechanism and some enlightenments are suggested. Social organizations in China need to draw on the successful experience of foreign social organizations when establishing the appeal mechanism. It is very necessary to set up a reasonable appeal mechanism combining with China’s reality, which can safeguard their rights and interests in standardization of social organizations members. Acknowledgments. This research was financially supported by Standardization Administration of the People’s Republic of China project (Project Number: 572018B-6575).

References 1. China government website, the State Council issued . http://www.gov.cn/xinwen/2015-03/26/content_2838703.htm 2. The National Social Organization Standards Information Platform. http://www.ttbz.org.cn. Accessed 18 March 2019 3. GB/T 20004.1-2016 4. https://www.ieee.org/about/index.html?WT.mc_id=head_bm. Accessed 21 Mar 2019 5. https://www.ieee.org/about/index.html. Accessed 21 Mar 2019 6. https://www.ieee.org/about/organization/index.html. Accessed 21 Mar 2019 7. https://www.ieee.org/standards/index.html. Accessed 21 Mar 2019 8. https://standards.ieee.org/about/policies/opman/sect5.html. Accessed 21 Mar 2019 9. IEEE Standards Association Operations Manual, December 2018 10. IEEE-SA Standards Board Operations Manual, December 2018

Reform and Innovation of College English Teaching Mode Based on “Internet+” Jian Li(&) Shandong Women’s University, Jinan 250000, Shandong Province, China [email protected] Abstract. “Internet+” has become a new form in the field of higher education, therefore, the reform of college English teaching has a new direction and a reliable carrier. With the advantage of “Internet+”, college English teaching can actively construct new teaching mechanism and talent training mechanism to improve the quality of college English teaching. Based on the author’s study and practical experience, this paper first analyzed the problems in college English teaching under the background of the “Internet+”, and then put forward the innovative strategies of the college English teaching model based on “Internet+”. Keywords: Internet+  College English Teaching reform and innovation

 Teaching mode 

1 Introduction Under the background of “Internet+”, college English teaching can promote the individuation of teaching, change the allocation of college English teaching resources, break the limitation of time and place in the traditional classroom, and extend the teaching activities to a more free and broad space [1]. College English teaching based on “Internet +” makes full use of video resources such as mousse course, micro-class and so on, so as to create a real personalized teaching environment. In spite of this situation, many college English teachers still simply use PPT to teach English, believing that students can not learn English well by using Internet information technology alone. In fact, many teachers failed to really grasp the integration of information technology and college English teaching. Based on this, the author tries to construct a more effective college English learning environment based on “Internet+” environment [2].

2 Problems in College English Teaching Under the Background of “Internet+” The Concepts and Methods of Theoretical Teaching Are Relatively Backward At present, in the college English teaching system, the teaching of theoretical courses accounts for a large proportion, and the contents and methods of theoretical teaching are relatively old, and it seems there has not been much change in the teaching content over the years [3]. The lack of teaching theories and methods makes it difficult to adapt © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1726–1730, 2020. https://doi.org/10.1007/978-3-030-25128-4_222

Reform and Innovation of College English Teaching Mode

1727

to the practical requirements of the training of English talents, which makes the current education cannot meet the practical needs of the reform of college English teaching under the background of “Internet+”. In college English teaching, teachers mainly teach according to the existing teaching materials, and the content of the teaching materials is relatively fixed. At present, English teaching mainly focuses on some basic knowledge and theory of English-speaking courses, and has little correlation with English application in the practical professional environment. Because of the backwardness in ideas and methods in the theoretical teaching of college English, it is difficult for the students in the new era to produce enough interest and initiative to study college English, which affects the development of students’ overall English quality. Also, it hinders the improvement of the training quality in colleges and universities [4]. Practice Teaching Platform Is Not Perfect Enough At present, due to the limitation of various conditions, many colleges and universities have not established a perfect, high-standard, targeted college English practice teaching platform, so that students cannot get a large number of effective practical exercises. At the same time, colleges and universities do not attach importance to the internal and external cooperation during college English teaching, and also fail to set up targeted English training bases outside the school, so that English teaching is limited in the classroom and in the teaching material system, and students’ time of learning and practicing English is limited. In particular, some non-English majors in college English practice teaching, non-English majors of college English course teaching time is limited, resulting in many English teachers directly ignore the practical teaching links. As a result, the systematic cultivation of students’ practical quality in college English has been restricted. The Student’s English Study Material Is Relatively Single Because of the disadvantages in the assessment and evaluation system of college English teaching, the most important thing to test the students’ English learning achievement is the result of the final examination. In the final examination of college English course, the scope of examination is relatively narrow, which is based on the study of teaching materials, so that, it is difficult to reflect students’ comprehensive English quality in an effective way [5]. In particular, teachers’ assessment of students’ English learning results in the form of closed-paper examinations will have a bad guiding effect on students’ learning and bring greater utilitarian benefits to students’ English learning. As a result, students also take English teaching materials as the main carrier of English learning, neglecting the wide caliber and application of English learning. In particular, the teacher assesses the student’s English learning result in the form of a closed-volume test, which will bring bad guidance and more utilitarian to students’ English learning. In this way, the English teaching material is the main study carrier, and the wide caliber and the application of English study are ignored. In addition, some college English teachers do not attach importance to the construction of college English teaching materials, and the construction of self-regulated learning resources on the Internet is very little. Also, it is difficult for students to find online learning materials suitable for them. In this way, it is not conducive to the effective development of students’ autonomous learning activities in college English [6].

1728

J. Li

The Comprehensive Quality of College English Teachers Needs to Be Improved At present, the comprehensive quality of most college English teachers can not meet the needs to train English talents under the background of “Internet+”. On the one hand, the current college English teacher generally lacks the working experience of the “Internet + English education”, especially some older teachers, who are not limited to the current network teaching advantages, and can not provide professional guidance to the students’ self-learning. On the other hand, the college English teachers lack the understanding of the “Internet + Education”, and it is not accurate to grasp the English self-learning ability and the quality of the students in the background of the “Internet+”, which leads to the lack of pertinence of the network teaching, and is not conducive to the improvement of the comprehensive quality of English teaching.

3 Innovative Strategies of the College English Teaching Model Based on “Internet+” To Construct the Multi-Teaching Model by “MOOC + Microlecture + Flipped Classroom”. In the teaching, colleges and universities have constantly promoted the reform of education, continuous innovation, the construction of information-based and personalized education system to improve the students’ enthusiasm and initiative, and to improve the teaching effect. In recent years, the country has greatly reduced the theoretical class hours, but increased practice class hours. While the spare time of college students increases, on the one hand, the students will face a lot of temptation from the outside world in a large amount of spare time, on the other hand, it will become a problem to complete the teaching schedule within the prescribed school hours. Therefore, teachers can use the “Internet+” technology to mobilize students’ learning initiative, deploy project tasks, and gradually promote the transformation of college English teaching under the “Internet+” environment. In the spare time, teachers can communicate with students after class through QQ, WeChat, Fetion and other chat software, to guide students to complete the project tasks pay attention to the completion of the students’ project tasks. For example, the teacher can arrange an English speaking task in class [7, 8]. When the students go back, they can find their own material, prepare the material, and communicate with the teacher in time to solve the problems encountered in the course of preparation. Due to limited classroom time, teachers can set a time for handing in homework, allowing students to send it to teachers in the form of WeChat phonetics, and teachers can use their spare time to evaluate and instruct students on the tasks they have completed, and finally put forward some suggestions for improvement. By this way, teacher can not only save classroom time, but also bring students the freshness of completing homework, and effectively improve the quality and effect of homework completion. In the concrete teaching practice, it is necessary to construct the multi-teaching model by “MOOC + Microlecture + Flipped Classroom” to finish interactive college English teaching. This diversified teaching mode can not only complete the teaching schedule within the prescribed hours, promote the transformation of college English teaching,

Reform and Innovation of College English Teaching Mode

1729

but also shorten the distance between teachers and students and improve the students’ initiative in learning. At the same time, we can use the school network of universities to expand the role of campus network [9]. As we all know, the level of development of universities in our country is extremely unbalanced. Through the Internet, the distance between ordinary colleges and famous universities can be overcome, so that the teaching effect can be improved and the relative weakness of hardware equipment in colleges and universities can be solved. In addition, under the premise of various conditions permitting, domestic colleges and universities can also be associated with foreign universities to share teaching resources and carry on a greater degree of schoolto-school union. To Transfer the Role of Teachers In view of the transformation and development in the integration of “Internet + education”, teachers should not only master professional knowledge but also be good at the Internet for classroom teaching. First, we should change the teaching concept, pay attention to the study of students’ learning needs, and realize that teachers are not the only source of knowledge for students. Second, we should change the role from a simple knowledge teacher to a guide, collaborator, evaluator, and provide personalized guidance to students. Teachers should promote their teaching ideas, master the new “Internet+” technology, communicate with students and make progress together [10]. In addition, while promoting the classroom teaching reform, students are no longer regarded as the recipients in the classroom teaching, but the partners of the classroom teaching. For example: select a “teacher assistant” every week, give a certain amount of study hours every week to let the “teacher assistant” explain a certain western culture or character, making the teacher acts as a student to listen to. In the process of teaching, “teacher assistant” promotes their own learning, and their ability to express and learn has also been improved. This way can stimulate the enthusiasm and initiative of students to study, and the teaching effect will be obviously improved. To Build an Online Learning Platform to Encourage Teachers and Students to Carry Out Teaching Practice With the rapid development of “Internet+”, web-based learning platforms emerge one after another, and become the dominant force of learning under the “Internet+” environment. Therefore, colleges and universities should constantly strengthen the students’ understanding of the network learning platform and improve their practical ability [11]. Colleges and universities should actively provide students with excellent and advanced web-based learning and practice platforms, and guide teachers and students to carry out practical operations through the online platform, so as to improve college students’ comprehensive English practice ability. While completing the construction of a series of web-based learning platforms, we can put forward the idea of “fine service education and teaching”, and uses “Internet+” thinking to make Internet deeply integrated with education and teaching. Colleges and universities should start from curriculum construction, develop application system, fully excavate teaching content, train teachers’ ability to use “Internet+”, innovate teaching methods and models, so that teachers and students can have a better experience in teaching and learning, and to promote the reform of education and teaching innovation. For example: if conditions permit, schools and departments can provide some network

1730

J. Li

platforms and practice platforms for the practical operation of spoken English, so that students can discuss and speak on the network platform. During this stage, teachers can guide and make suggestions on students’ speeches and discussions. The construction of web-based learning platform can make students have more and better learning experience opportunities, so that learning is no longer boring, and better learning results can be achieved.

4 Summary The coming of the “Internet+” era has brought new opportunities and challenges to the reform and innovation of college English teaching. Practice has proved that the traditional teaching ideas and ways have been out of touch with the development of the times and the needs of the society. Therefore, it has become an important subject for the teaching reform to combine the “Internet+” and the English classroom organically. Therefore, college English teachers should respond to the development trend of the Internet era, pay more attention to the information reform, and take this as a good opportunity to boldly carry on the teaching reform exploration. The advantages of modern information technology and Internet resources should be constantly applied to ensure that college English teaching can achieve the goal of healthy and sustainable development.

References 1. Yan, X., Qu, X.: Challenges and countermeasures in college English teaching in the context of “Internet+”. Heilongjiang Educ. (Theor. Pract.) 10, 62 (63) (2018) 2. Zhang, Y., Li, J.: A practical study of college English teaching in the context of “Internet+”. J. Changchun Normal Univ. 37(09), 188 (2018) 3. Yao, C.: The transformation and innovation of college English teaching thinking in the Internet era. Comp. Study Cult. Innov. 2(19), 99–100 (2018) 4. Wang, H.: The construction of college English translation teaching model in “Internet+” era. Engl. Plaza 04, 103–104 (2018) 5. Zhao, D.: The design plan of college English teaching reform from the perspective of “Internet+”. J. Changchun Univ. Tradit. Chin. Med. 33(05), 833–835 (2017) 6. Li, X.: Research on college English ecological curriculum based on Internet. Chin. Foreign Lang. 14(05), 81–86 (2017) 7. Liu, L.: The reform and innovation of college English teaching under the background of “Internet+”. J. Changchun Univ. 27(08), 112–115 (2017) 8. Huang, D.: A study on the innovation of college English translation teaching model in the context of “Internet+”. Theory Pract. Educ. 37(15), 53–54 (2017) 9. Zhao, D.: The integration of English broadcasting and college English teaching from the perspective of “Internet+”. China J. Radio Telev. 03, 101–102 (2017) 10. Kong, S.: The influence of Internet on college English teaching. Engl. Teacher 16(07), 6–8 (2016) 11. Shen, X.: Reflections on the reform of college English teaching mode in the Internet era. Overseas Engl. 14, 65–66 (2015)

Computer Teaching Reform in Colleges and Universities Under the Background of Informatization Ming-Hung Shu1, Kun-Chen Chung1(&), and Jui-Chan Huang2 1 Department of Industrial Engineering and Management, National Kaohsiung University of Science and Technology, Kaohsiung 80778, Taiwan [email protected], [email protected] 2 Yango University, Fuzhou 350015, China [email protected]

Abstract. Colleges and universities should do computer education reform well based on informatization in order to improve the computer application ability of college students. This paper first analyzes the dilemma of computer education colleges and universities based on informatization, and then puts forward scientific countermeasures to optimize the contents of computer education in colleges and universities and improve the education level in order to achieve the goal of computer education reform in colleges and universities. Keywords: Informatization  Education in colleges and universities Computers  Education reform



1 Introduction The 21st century is the era of information explosion and all kinds of information technology are prevailing. In this era, information technology has penetrated into all aspects of people’s life, including computer education in colleges and colleges and universities. Applying the information technology to carry out computer education in colleges and universities has many distinct advantages and good development potential [1]. However, it is not a simple thing to introduce the teaching mode of modern information technology through the teaching reform to realize the high quality reform of computer education in colleges and universities due tor the condition of long-term use of traditional computer teaching mode in colleges and colleges and universities. It is necessary to find out the law and carry out step by step [2]. Only in this way can the long-term mechanism of the computer teaching reform in colleges and universities be obtained and gain the best result.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1731–1735, 2020. https://doi.org/10.1007/978-3-030-25128-4_223

1732

M.-H. Shu et al.

2 The Dilemma of Computer Education in Colleges and Universities Under the Background of Informatization Theory and Practice Teaching Are Disjointed. Most colleges and universities do not attach great importance to practical teaching compared with theoretical courses influenced by the traditional teaching mode. Most teachers just read according to the book, but the computer technology is changing rapidly, and the information technology is developing rapidly. Therefore, the existing computer textbooks can no longer meet the actual needs of students, and the contents of the textbooks are updated slowly [3]. However, teachers do not realize it and still impart the backward theory knowledge and the related operation skills to students. At the same time, teachers pay too much attention to theoretical teaching so that they neglect practical learning. There are no conditions for student to take practical operation after understanding and mastering the relevant theoretical knowledge [4]. The relevant colleges and universities have not established a practical training base, which leads to students being unable to carry out practical operations of the knowledge they have learned. As a result, students are unable to realize the influence and help of what they have learned to their lives. As time passes, students will gradually lose their enthusiasm and interest in learning computer, and the computer teaching level and teaching quality are difficult to improve. The Contents of Computer Textbooks Are Outdated. The development of computer technology is changing with each passing day. Therefore, the computer teaching work in colleges and universities should actively follow the development pace of computer technology, update the teaching contents in time, and introduce advanced computer technology knowledge into teaching, particularly into computer teaching materials. However, this is not the case. It is found that the teaching materials used in computer teaching in colleges and universities are generally lagging behind. The contents compiled in the textbooks are mostly those of a few years ago, some of which have been completely eliminated, and their practicability is very low, which leads to the fact that the computer knowledge learned by students cannot really be applied to practice. Although students have spent time learning computer knowledge and skills, they have not learned the truly advanced and practical computer knowledge and skills that adapt to the current situation. Computer Teaching Lacks Innovation. Although the computer teaching is a little boring and simplex, the teaching interest can be excavated to make enough attraction to students through appropriate ways [5]. At present, the computer teaching in many colleges and universities does not make the interesting excavation, but still explores randomly. They neither focus on the innovation of the computer teaching nor absorb the advanced experience of other schools, leading to the single and boring computer teaching mode, so it is difficult to arouse students’ interest in learning, and even triggers the strong anti-emotion in learning the computer courses. Reasons are as following: Firstly, teachers do not have a deep understanding of the computer teaching work, do not realize the interesting points existing in computer teaching, and do not show the interest of computer teaching. Therefore, it is not attractive to the students. Secondly, teachers themselves lack the sense of innovation. Even if they realize the interest of

Computer Teaching Reform in Colleges and Universities

1733

computer teaching, they are reluctant to change the traditional teaching methods and still follow the old routine and the old style of teaching, so that the interest of computer teaching cannot be reflected. Teachers Do Not Have a Thorough Understanding of Students. Most of the contemporary college students are post-90s and post-00s, which leads to a networking tendency of their learning and living habits. However, computer teachers are not fully aware of the psychological and behavioral changes of contemporary college students and do not fully understand their network thinking. Therefore, teachers can not design a classroom teaching process that can fully meet the needs of students according to their actual learning needs, which leads to the difficulty of improving the computer teaching efficiency in colleges and universities. In some colleges and universities, teachers are still assigned tasks and students still accept knowledge passively due to the traditional teaching mode [6]. Such passive learning can not meet the actual needs of students, and they will gradually lose their enthusiasm for learning computers.

3 Strategies and Measures for Computer Teaching Mode Innovation in Colleges and Universities Under the Background of Informatization Setting Up a Scientific and Clear Teaching Goal. With the deepening of the new curriculum reform and the constant innovative development of information technology, the traditional teaching concepts cannot adapt to the teaching of colleges and universities anymore, especially for computer teaching. Computer technology has changed with each passing day, so colleges and universities must actively change teaching ideas and keep pace with the times, so as to meet the requirements of the modern information technology development. In addition, teachers should not only attach importance to students’ theoretical knowledge cultivation, but also strengthen the cultivation and improvement of students’ practical ability and professional ethics. At the same time, with the continuous development of information technology, teachers should constantly update their knowledge reserves, realize the effectiveness and timeliness of computer teaching, so as to better carry out teaching activities [7]. Designing Scientific System of Computer Curriculum. In the traditional computer teaching curriculum, colleges and universities and teachers usually assign most of the class hours to theoretical teaching, but neither fully integrate practical teaching into it nor attach importance to the cultivation of students’ comprehensive ability and quality. Therefore, the author believes that colleges and universities and teachers should innovate and improve based on the original teaching curriculum system, meet actual needs of teaching and students’ demands for computer teaching, and construct the computer curriculum system reasonably and scientifically [8]. Firstly, if students fully master the relevant computer theory knowledge, the teaching system should actively carry out practical teaching activities in order to cultivate students’ practical ability to use theoretical knowledge and improve the students’ comprehensive quality; Secondly, the arrangement of the teaching contents should pay attention to the practical operation

1734

M.-H. Shu et al.

of the computer so as to realize the scientific stability and dynamic sensitivity of the teaching course; Finally, the computer information technology has a short update period, so teachers should actively learn advanced technology and introduce advanced information teaching software, so that computer talents can constantly meet the needs of the society. Actively Innovating Computer Teaching Methods. Computer teaching is a highly practical course, but the development of all practical activities must be based on solid theoretical knowledge. In the teaching process, teachers usually provide targeted lab operation exercise for students after teaching the theory knowledge, and students may need to practice the same application software repeatedly, which is boring. Therefore, teachers should flexibly use information-based teaching tools, constantly innovate teaching methods, optimize the teaching process, create a relaxed and pleasant learning environment and atmosphere, and fully mobilize students’ enthusiasm, so as to effectively improve the teaching quality and promote comprehensive development of students. In the process of practical teaching activities, teachers can use the sharing technology of the Internet and multimedia technology to design flipping classes and micro-classes to guide students actively and effectively and to cultivate students’ exploratory thinking and divergent thinking. What is more, colleges and universities can set up teaching websites and teaching platforms to share teaching resources, and students can learn independently according to their own needs. At the same time, teachers can strengthen the relationships with students through the network exchange platform, which can guide and manage students efficiently [9]. Improving the Comprehensive Quality of Computer Teachers. At present, some computer teachers do not have a deep understanding of computers, and lack the correct understanding of the computer teaching, so they have the rejection psychology and still adopt the traditional teaching mode and teaching method. With the continuous development and progress of the society, those teachers’ professional ability has been unable to keep pace with the times, which is reflected in the fact that their teaching ideas, teaching methods, curriculum settings, thinking models and teaching contents are out of touch with the times, and students who accept traditional teaching are difficult to adapt to the development of society after graduation [10]. To solve this problem, firstly, colleges and universities should vigorously train computer teachers, and build an excellent group of teachers; Secondly, the academic affairs office and the computer research group should conduct a comprehensive analysis of the computer teachers, identify the problems existing in their teaching activities, and then invite experienced and efficient teachers to communicate with each other, or hire excellent educators outside the university to train teachers in an all-round and systematic way, formulate corresponding training programs, and constantly improve teachers’ professional ability and comprehensive quality; Finally, colleges and universities should strengthen the assessment of computer teachers, formulate reasonable and scientific assessment and evaluation standards, and integrate the teaching concepts, teaching methods and teaching process into the teaching evaluation system to make objective and fairly evaluation, which not only relies on the students’ final grades [11].

Computer Teaching Reform in Colleges and Universities

1735

4 Summary The motive force of development always comes from reform, and the best result of reform is to form a perfect and highly executive system, which is the same in computer teaching in colleges and universities. The computer teaching reform in colleges and universities is the trend of the times, and it is the necessary work of the computer teaching in colleges and universities to cater to the progress of the times under the background of the information technology. In the process of reform, computer teachers in colleges and universities should actively change teaching ideas, set up scientific and clear teaching objectives, design reasonable and scientific curriculum system of computer teaching, use flexible information teaching tools, innovate teaching methods and constantly improve their professional ability and comprehensive quality, thus promoting the continuous development of computer teaching in colleges and universities.

References 1. Cheng, L.: Research on the application of action-oriented teaching method in the reform of computer teaching in colleges and universities. Comput. Knowl. Technol. 13(33), 168–169 (2017) 2. Yang, Z.: Research on computer teaching reform in colleges and universities based on employment. J. Jiang Xi Vocat. Techn. Coll. Electr. 31(06), 97–98 (2018) 3. Fu, R., Cui, L., Liu, Y.: Research on computer teaching reform method based on hybrid teaching mode 4. Niu, Y.: Research on computer teaching reform in universities under the background of informatization. Technol. Econ. Guide 13, 142–143 (2016) 5. Wei, H.: Research on the curriculum reform of computer network teaching in colleges and universities based on the new educational reform. Digital Commun. World 11, 61–63 (2016) 6. Chen, J.: The infiltration of action-oriented teaching method in the reform of computer teaching in colleges and universities. J. Changchun Educ. Inst. 30(22), 152–153 (2014) 7. Wang, Y.: Research on computer teaching reform in colleges and universities based on network development. J. Changchun Educ. Inst. 30(22), 154, 157 (2014) 8. Gao, G.: Research on the practical teaching reform of computer courses in colleges and universities that improves the ability of programming. J. Kaifeng Inst. Educ. 35(02), 92–93 (2015) 9. Gong, P., Fu, J., Gu, C.: Constructing educational synergy system and continuously improving the training level of college students’ computer ability. China Univ. Teach. 11, 24–26, 68 (2013) 10. Zhu, J., Liu, H.: Exploration on the practical training reform of computer specialty in colleges and universities. J. Changsha Univ. 23(05), 112–113, 116 (2009) 11. Chen, J., Lu, X., Jiang, Y., Yu, X.: Research on the teaching reform of the autonomous inquiry of the computer foundation in colleges and universities. J. Educ. Inst. Jilin Province 29(02), 47–48 (2013)

The Application of Task-Driven Teaching Method in ERP Informatization Experiment Teaching Li Li, Liubo Hu(&), Zhengyan Hu, and Lina Xiao School of Management, Wuhan Donghu University, Wuhan, China [email protected], [email protected], [email protected], [email protected]

Abstract. As a new teaching form, task-driven teaching method can help students to master more knowledge and improve their level of ERP informatization experiment. In this situation, this paper firstly analyzed the meaning and characteristics of task-driven method, and then discussed the application of taskdriven teaching method in ERP informatization experiment teaching, so as to improve the quality of ERP informatization experiment teaching and to better meet the development needs of students. Keywords: Task-driven teaching method Teaching application

 ERP  Informatization 

1 Introduction With the popularization and application of ERP informatization software in China, enterprises need a large number of ERP informatization talents. Therefore, many undergraduate and tertiary colleges offer ERP courses to train qualified ERP informatization talents for enterprises [1]. At present, the teaching of ERP course has been transformed into practical teaching through the original theory teaching. Various colleges and universities purchase ERP software system one after another, and bring the operation of each module of ERP into the teaching content, which greatly improves the students’ practical ability. However, practice teaching is only to learn the operation of software in ERP system. It can not fully understand the operation of modern enterprise management and the functions of each post, and can not fully meet the actual needs of industry enterprises for professional ability and professional accomplishment [2, 3]. The Ministry of Education calls on colleges and universities to closely connect with industry enterprises and actively explore a new model of school-enterprise combination for the construction of productive practice bases in schools [4].

2 The Meaning and Characteristics of Task-Driven Method Implications of the Task-Driven Methods. Task-driven method is that in the whole teaching process, the knowledge to be learned is hidden in one or more specific tasks. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1736–1740, 2020. https://doi.org/10.1007/978-3-030-25128-4_224

The Application of Task-Driven Teaching Method

1737

With the help of teachers, students closely revolve around learning tasks; driven by strong problem motivation, students analyze and discuss tasks. Sudents explore independently and interact with each other. Finally, through the completion of the task, the meaning construction of the learned knowledge can be realized [5]. This teaching method based on constructivism learning theory. It implicates the new knowledge to be learned in one or more tasks. Through the analysis, discussion and explicit knowledge of the task, the students find out the new knowledge, and then find out the problem-solving methods with the help of the teachers, so as to train the students’ independent inquiry ability and innovation ability [6]. Characteristics of Task-Driven Method. Compared with traditional teaching methods, the task-driven method has the following characteristics: First, the task-driven teaching model is used for teaching. Teachers’ teaching and students’ learning are all about how to accomplish a specific task. The teaching idea of teachers is clear, and the purpose of students’ study is clear, and it is easier to master the learning content. Second, stimulate students’ interest in learning and mobilize the consciousness of active participation. In the traditional teaching mode, the teacher always says, and the student listens, so the student mood is easy to fatigue, and also is easy to develop the dependence psychology that the teacher waits for the teacher to teach in class. We should adopt a task-driven teaching model, and teachers in each class require students to complete a specific task, so that students have a sense of urgency in their thinking. In the process of teaching by teachers, students are no longer passively accepting, but have a purpose to follow the teacher’s thinking. Such teaching has completely broken the situation of “teacher arbitrariness”. Because the teacher is mainly the guidance of the method, the students have more time to operate on their own, and they are easy to feel the sense of success of their own exploration, so that we can fully stimulate the students’ interest in learning and mobilize students to learn actively with active participation awareness. Third, improve students’ ability to find problems, solve problems and apply them comprehensively. We should adopt task-driven teaching. The learning process of the students is carried out around a specific task, which combines the teaching content together, so that the students can learn the teaching content and apply the teaching content synthetically in the process of completing the task. In the process of learning, teachers can also guide students to put forward the functions they want to achieve in real life according to their own needs, and guide students to solve them themselves. Fourth, cultivate students to pay attention to master methods, and encourage students to take the initiative to innovate. After the assignment of the task, the teacher does not limit the methods and ideas to realize the task, as well as the form and content of the work, which leaves plenty of room for the students to exert their imagination and create freely. In this way, students’ works will be rich in content and various forms.

1738

L. Li et al.

3 The Application of Task-Driven Teaching Method in ERP Informatization Experiment Teaching Put Forward the Clear and Appropriate Task Premise. Putting forward the clear task plays an important role in the future study and the final completion of the task. In classroom teaching, teachers and students hide the knowledge they want to learn in the task by creating the problem scene, so that the students can understand the subject knowledge and master the skills in the process of completing the task. Ingenious design of “task” can fully mobilize students’ enthusiasm for learning and desire for knowledge, and achieve good teaching results in harmonious situations. In ERP informatization teaching, data simulation is usually carried out by one-month task of the enterprise [7]. It is the comprehensive practice training and rotation operation in different posts training of each student. Comprehensive practice training of each student is required to complete the whole process of setting up accounts, initializing, processing regular accounts and processing report forms independently. After the training, every student is required to submit the experimental report and the backup copy of the account case, which is necessary to complete the whole process. From building accounts to completing report processing, it is a big task that can be divided into ten small modules or tasks. As the learning process is completed step-by-step, it is up to the students themselves to design specific items such as staff files, inventory control, etc. The Key is to Properly Decompose the Task. The decomposition task is to divide a large task into ten sub-tasks, and then divide the sub-tasks down until each small subtask can be operated or executed. In this sub-task, there are a lot of knowledge or skills that have not been learned before; namely, it implied new knowledge points, which need to arouse the enthusiasm of students to explore the problem (task) desire. Through explanation, demonstration and other teaching methods, teachers use a variety of information technology to create task situations, so as not to allow students to produce too much resistance to the task. Teachers should make students learn in situations, acquire knowledge in the process of task decomposition, and improve their ability to analyze problems [8]. In fact, in the ERP informatization teaching simulation training process, it is the process of constantly decomposing the task. Achieve Task Priorities Through Autonomous and Collaborative Learning. After the problem is put forward and designed, the students need to complete the task through all kinds of ways, methods and means. Therefore, students must actively participate in the whole learning process, through autonomous learning and cooperative learning to construct new knowledge and complete the tasks. Autonomous learning is self-learning, and students can independently explore learning to complete the task. Students with simple or single tasks can do so by using this learning method. Collaborative learning is based on individual autonomous learning through group discussion and consultation in order to further complete and deepen the construction of the meaning of the theme. Through this collaboration and communication, students can see the different aspects of the problem and the ways to solve the problem, which can broaden the students’ thinking, and produce a new understanding of the knowledge. More comprehensive and difficult tasks require more collaborative learning. For the

The Application of Task-Driven Teaching Method

1739

analysis and solution of this problem, students can first consult the relevant teaching materials, and gradually understand, imitate, and revise the problem in practice, etc. Then, we should encourage all of us to share information, discuss each other, communicate with each other, and learn collaboratively. When we encounter difficulties, we can also have teachers’ guidance and help, so as to facilitate the realization and completion of the task [9, 10]. Regard Evaluation of Learning Effectiveness as an Important Stage. Learning effect evaluation refers to the process of students’ reflection on the problem solving, mutual evaluation or self-evaluation, so teachers can make appropriate comments, and help students to sum up. The evaluation of learning effect is not only an important stage of summary and improvement, but also an excellent opportunity to cultivate students’ good self-confidence and sense of achievement [11]. When a student completes a task in the form of a personal achievement (such as an experimental report), he or she has set up his own cognitive structure, but it is not yet perfect. The teachers need to demonstrate, communicate, discuss, and analyze their learning results by showing, communicating, discussing, and analyzing their learning results. They can make comment and feedback and evaluation on students’ learning situation in time. Therefore, in the ERP information experiment teaching, teachers should do a good job to evaluate the students’ learning effect, improve the students’ understanding of the informatization experiment teaching, discover the deficiency of their own study in time, and find the suitable learning mode. Moreover, it can improve the learning quality, meet the requirements of ERP informatization experimental teaching, and lay a good foundation for the future development of students.

4 Summary By proposing a clear and moderate task, the task-driven method decomposes the task. Autonomous learning and collaborative learning can realize tasks and evaluate learning effects, guide students from simplicity to complexity, from ease to difficulty, and gradually complete a series of “tasks”, so as to get clear ideas, methods and knowledge. This can develop the ability of analyzing, solving, and dealing with problem in the process of completing tasks. Therefore, in the ERP informatization experiment teaching, teachers should change their roles, give students more space to study, stimulate students’ initiative and enthusiasm in learning, improve the consciousness of cooperation and exchange, and thus improve their level of application of ERP information and better adapt to the needs of the development of the times. Acknowledgement. The research work is financially supported by The 12th Five-year Plan of Educational Science in Hubei Province NO. 2015GB197 (Research on Application of Taskdriven Model in ERP Experimental Teaching).

1740

L. Li et al.

References 1. Zhang, X., Zhang, H.: Research and application of virtual simulation teaching in the course teaching of economics and management specialty-taking Shangluo college as an example. J. Jilin Radio Telev. Univ. 06, 20–21 (2016) 2. Jie, L., Ling, N.: Application of informatization in classroom practice teaching-taking ERP sand table simulation course as an example. J. Fujian Commercial Coll. 04, 70–74 (2016) 3. Yaling, L.: A preliminary study on accounting informatization teaching. Account. Newsl. 31, 53–56 (2017) 4. Chun, P.: Research on the application of information technology in the teaching of cost accounting in higher vocational education. J. Lv Liang Inst. Educ. 35(01), 146–148 (2018) 5. Jiang, X., Mao, Y., Zhang, L.: A probe into the informatization of ERP sand table simulation practice teaching in business colleges and universities-a case study of harbin commercial university. Foreign Trade Econ. Cooper. 08, 134–135 (2012) 6. Peng, H., Li Yun, L.: ERP principle and application curriculum design based on “integration of science and practice”. Mon. Financ. Acc. J. 15, 109–111 (2015) 7. Wang, R.: New exploration of ERP curriculum teaching model-application of productive practice base in school. J. Pu’er Coll. 31(04), 131–134 (2015) 8. Li, J., Yang, F.: The reform of ERP training course in financial management specialty under the information-based teaching mode. China Manag. Inf. 18(21), 65–67 (2015) 9. Fu, Z.: Application of task-driven teaching method in e-commerce practice course. ECommerce 03, 83–84 (2016) 10. Wang, X., Sun, X., Wu, D.: Teaching of ERP course for information management and information system specialty. Mall Modernization 21, 389–390 (2007) 11. Ye, Y.: Construction of accounting informatization experimental teaching system under ERP environment. Acc. Newsl. 22, 30–31 (2009)

Performance Analysis of Full Duplex Transmission in Hybrid Communication System Based on 5G Mobile Network Yongjun Sun and Yongli Zhu(&) Xidian University, Xian 710071, Shaanxi, China [email protected]

Abstract. The main factors affecting the function of 5G system include the following two aspects. One is that the same frequency is produced when the full duplex D2D is used twice, which causes mutual interference. The other is other interference. On the premise of this, a resolution on effective power control has been adopted after discussion by relevant departments. The main purpose of this plan is to make the obtained transmission power meet the optimal requirements, and then make full-duplex D2D produce the maximum transmission rate. The method adopted is Lagrange dual method, which meets the user’s requirements. Based on the advantages of high-tech, this paper concentrates on the analysis of all the data of the system. Then, a series of plans are made for the full-duplex D2D system of 5G network in order to obtain the best control power, and a feasible scheme for high-tech research and development is given. Keywords: 5G communication Optimal power



Full duplex D2D communication system



1 Theoretical Analysis of 5G Full Duplex D2D Communication System 1.1

5G Full Duplex Transmission Mode

In the era of network, the transmission of information and data basically adopts a new full duplex mode, which is bidirectional [1]. That is to say, full duplex information transmission is the original way of information transmission, which transmits information at both ends at the same time. On the contrary, we can get a more complete and direct field of transmission, that is, two-way transmission of information, which meets the requirements of 5G network information transmission, and cannot be replaced in today’s society. 1.2

D2D Communication System

Based on 3D technology, D2D information transmission establishes a comprehensive human-machine interface performance, and achieves the requirements of visual communication images in the system [2]. Based on the network virtual platform, all of them are converted into new electronic maps and e-commerce. On the basis of daily life, © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1741–1745, 2020. https://doi.org/10.1007/978-3-030-25128-4_225

1742

Y. Sun and Y. Zhu

work, tourism and other information, rebuilding the information base and comprehensively integrating the information of the information base are the key to collecting and utilizing information in today’s society.

2 Optimal Control Power Planning for 5G Full Duplex D2D Information Transmission 2.1

Establish the Best Hypothetical Model

Based on the new transmission mode, an efficient and comprehensive new information transmission model is established [3]. First, suppose that the optimal power control model for information transmission must be programmed according to the program structure [4–6]. In this study, the transmission set of cellular data resources is defined as M, and the original data in the set M is as follows: 1, 2, 3… n et al. In this case, the information transmitted by the D2D system is backed up in the information base. The assumption of simulating the transmission signal M1 containing data and information is the same as that of M containing data information. The structural model of duplex fullinformation transmission has a strong ability to interfere with signals. If both the interference signal wave and the duplex full-signal wave are turned on simultaneously, the signal transformation will be more advantageous. Therefore, in order to establish different signal transmission channels, external signal jammers should be designed and pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi installed. In addition, the calculation results of formula d = r 2 c þ r02  2rc r0 cos h show that the accuracy of new information transmission will affect the stability of information transmission and signal transmission intensity to a certain extent [7]. Therefore, according to the two-way operation function of full-duplex information transmission, a system information processing system driven by the overall structure of system information is established [7]. In the early, middle and late stages of mobile data transmission, three groups of mobile data detection equipment are set up. Each unit of information transmission corresponds to the corresponding transmission channel to achieve the purpose of signal transmission [8]. In addition, for establishing the best model of power control in the new transmission mode, the information data transmitted can be processed synthetically. The settlement results of the new transmission mode can clearly reflect the general structure of the system, in order to ensure the new data transmission network [9, 10]. Each unit of information transmission corresponds to the corresponding transmission channel to achieve the purpose of signal transmission. In addition, for establishing the optimal model of power control in the new transmission mode, the information data transmitted can be processed comprehensively, and the settlement results of the new transmission mode can clearly reflect the general framework of the system. In order to ensure the internal security of the new data transmission network, a new integrated structure planning system is developed. Cellular data can centrally connect the transmitted data, and then centrally guide the establishment of network information database (Fig. 1).

Performance Analysis of Full Duplex Transmission

1743

Fig. 1. Full duplex D2D system model

2.2

Structural Programming Analysis

Signal transmission and reception are thoroughly analyzed. At the beginning of signal transmission, the database can be mobilized for all information, extracting qualified information. According to the structure model of the original data, the signal is transmitted directly to observe the fluctuation degree of the data fluctuation chart. At present, more and more people use 5G signal to transmit, which will greatly increase the amount of information transmitted by the new transmission mode, increase the amount of signal received by the transmission center, and have the largest amount of information at a certain time. In this case, the external signal jammer has been opened, which accelerates the fluctuation of the peak value of the center signal of the full duplex operation platform, and improves the cycling effect. Each time a new transmission mode is used to transmit information, the program of the transmission signal automatically clears the information collected in the system. New signal transmission data programs are received, and the information of the system is centralized between them for processing. According to the statistical results of relevant data, it can be seen that there are corresponding detection values in signal transmission, namely 27W, 35W and 25W. It will only be transmitted if it meets the detection value. As far as the data in the design of computational structure is concerned, the best working model will appear in the process of signal transmission. The amount of information transmitted corresponds to the period of signal transmission, and some periodic laws have been summed up for a long time. In order to establish the transmission structure model of electric signals, it is necessary to proceed according to the formula p = Gmax-Gmin. In this process, the working state of the power structure is the most effective, and the calculation results are all within the range of 1–1.5. The results of the experiment show that there are three calculation data of the system program operation: 0.55, 0.72 and 0.50. Therefore, it can be seen that the design of the optimal control power of the new transmission mode is suitable for the requirements of its operation.

1744

2.3

Y. Sun and Y. Zhu

Research on Simulation Practice

(1) Practical conditions of simulation The actual environment is a circular body with a design radius of 1000 m and other conditions for transmitting information: Noise power is - 170 DBM/Hz, 50 household cellular users, 2 MHz unidirectional broadband, 5 dB noise control factor. Based on the simulation design of external environment, all information transmission modes are recorded separately according to the application structure of data integration and information transmission. (2) Verification of information transmission The first step is to record the original data of the information transmission in the practice area. The following are the main contents of the data: the power of transmitting single information is 119W, and the noise shielding power is 22. When transmitting data signals, the power ratio required for transmission is 148 + 40, and the power ratio required for cellular data transmission is 150 + 27. The overall framework of single transmission of traditional data is established, and about 30%–35% of the signals are close to each other. The influence of distance factor or the transmission of data signal is blocked. In the second step, a new signal transmission structure is established. The full duplex signal in the signal transmission of the acquisition system is synthesized in three stages. That is, the power of the transmission signal is within the range of 17–130w, and the noise shielding force is 11.3–15. In the data structure of the transmission signal communication process, the power ratio required for transmission is 119 + 20, and the power ratio required for cellular data transmission is 160 + 30. The overall framework of single transmission of traditional data is established. About 10%–25% of the signals are affected by the factors of short distance or the transmission of data signals is blocked. Compared with the above two sets of data, the results show that, in practice, the overall framework of 5G full-duplex D2D communication system is allocated. It is especially advantageous to the omni-directional transmission of the whole data and reduces the interference of external noise to the signal transmission. It is particularly integrated for the transmission of information, that is to say, the transmission of a whole information.

3 Conclusion Throughout the whole paper, the research on the optimal control power plan in the new way of transmitting information has laid a foundation for the research and development of high-tech in China. On this premise, we must comprehensively use the new mode of transmission of information, and test the new mode of transmission of information based on the previous inductive theory. Therefore, the adoption of the optimal power control resolution in the new mode of information transmission can provide various guarantees for the future transmission of social information.

Performance Analysis of Full Duplex Transmission

1745

References 1. Zhang, X., Cheng, W., Zhang, H.: Full-duplex transmission in phy and mac layers for 5G mobile wireless networks. IEEE Wireless Commun. 22(5), 112–121 (2015) 2. Cheng, W., Zhang, X., Zhang, H.: [IEEE IEEE INFOCOM 2015 - IEEE Conference on Computer Communications - Kowloon, Hong Kong (2015.4.26–2015.5.1)] 2015 IEEE Conference on Computer Communications (INFOCOM) - Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks. In: IEEE Conference on Computer Communications, pp. 55–63. IEEE (2015) 3. Ma, B., Member, S.M., IEEE, et al.: Full-duplex relaying for D2D communication in mmWave based 5G networks. IEEE Trans. Wireless Commun. 99, 1–1 (2018) 4. Al-Saadeh, O., Sung, K.W.: A performance comparison of in-band full duplex and dynamic TDD for 5G indoor wireless networks. Eurasip J. Wireless Commun. Netw. 2017(1), 50 (2017) 5. Mahmood, N.H., Berardinelli, G., Mogensen, P.: On the potential of full duplex communication in 5G small cell networks. In: Vehicular Technology Conference. IEEE (2015) 6. Mahmood, N.H., Sarret, M.G., Berardinelli, G., et al.: Full duplex communications in 5G small cells. In: Wireless Communications & Mobile Computing Conference. IEEE (2017) 7. Sharma, S.K., Bogale, T.E., Le, L.B., et al.: Dynamic spectrum sharing in 5G wireless networks with full-duplex technology: recent advances and research challenges. IEEE Commun. Surv. Tutorials 1–1 (2017) 8. Zhang, Z., Ma, Z., Xiao, M., et al.: Two-timeslot two-way full-duplex relaying for 5G wireless communication networks. IEEE Trans. Commun. 1–1 (2016) 9. Cheng, W., Zhang, X., Zhang, H.: Heterogeneous statistical QoS provisioning for fullduplex D2D communications over 5G wireless networks. In: IEEE Global Communications Conference. IEEE (2015) 10. Gatnau, M., Berardinelli, G., Mahmood, N.H., et al.: Impact of transport control protocol on full duplex performance in 5G networks. In: Vehicular Technology Conference. IEEE (2016)

Discussion on the Training Mode of Mobile Communication Technology Professionals Based on School-Enterprise Cooperation Zhang Jie(&) Jilin Agricultural Science and Technology University, Jilin, Jilin, China [email protected]

Abstract. With the continuous development of economy and the continuous improvement of scientific level and technology, the demand for mobile communication technology talents is growing. Therefore, the training of mobile communication technology talents has become the top priority. Firstly, the importance of training mobile communication technology professionals based on school-enterprise cooperation mode and the current situation at home and abroad are discussed. Secondly, the curriculum system of innovative talent training mode and the construction mode of innovative talent training platform in school-enterprise cooperation mode are discussed. Finally, the importance of school-enterprise cooperation talent training mode is summarized. Keywords: Mobile communication technology School-enterprise cooperation  Training mode



1 Introduction In recent years, the telecommunication industry has ushered in a new generation of technological revolution marked by 4G and optical communication technology. The emergence and popularization of new technologies have led to another wave of investment and development in the telecommunication industry [1]. The huge market has brought huge demand for talents, which puts forward higher requirements for the technical skills and literacy of industry practitioners, at the same time, it also brings great opportunities to the training of mobile communication technology professionals in Vocational colleges. However, the contradiction between emphasizing knowledge imparting, neglecting skill training, slow updating of teaching equipment, inadequate adaptation of personnel training objectives to the quality and ability needs of grassroots technical personnel in the industry still exists widely in Vocational colleges, and there is a big gap between graduates’ professional ability and enterprise post needs, These factors make the further development of mobile communication technology major face pressure and challenges [2], and also put forward new requirements for the training mode of communication professionals in Vocational Colleges in the new era. At present, foreign school-enterprise cooperation can draw on more experience than domestic ones. The current situation of school-enterprise cooperation in China is not optimistic, mainly reflected in the lack of enthusiasm for enterprise participation and © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1746–1750, 2020. https://doi.org/10.1007/978-3-030-25128-4_226

Discussion on the Training Mode of Mobile Communication Technology

1747

the inconsistency between the internship positions offered and the needs of students. Foreign vocational education school-enterprise cooperation has a lot of mature experience to learn from. Taking Germany as an example [3], vocational education in Germany can be divided into theoretical study in school and enterprise training outside school, i.e. “apprenticeship” and “dual system”. One of the major characteristics of German vocational education is to train applied talents in Enterprises Based on the most advanced technology in the contemporary era. This paper mainly discusses the training mode of mobile communication technology specialty based on schoolenterprise cooperation [4].

2 Innovative Talents Training Model In order to meet the demand for talents in the current mobile communication industry market, it is necessary for higher vocational colleges to learn from the joint experience of foreign universities and colleges [5], to explore the reform and innovation of teaching mode, and to construct a curriculum system of mobile communication technology specialty based on school-enterprise cooperation to adapt to the new era, further improve students’ employment ability and social practice ability, let students combine what they learn in school with enterprise practice organically [6], let the equipment and technology of school and enterprise complement each other and share resources, in order to effectively improve the pertinence and effectiveness of educating people, and improve the quality of training skilled talents [7]. This paper mainly studies the curriculum system of innovative talents training mode and the construction of talent training platform in school-enterprise cooperation mode [8]. 2.1

Course System of Professional Talents Training Model

The curriculum system of talent training mode mainly includes enterprise development dynamics, teaching mode, curriculum setting, curriculum assessment, teaching methods and teaching quality evaluation mechanism. In order to better build the curriculum system, we should always pay attention to the development direction of mobile communication enterprises, which is a necessary step for mobile communication specialty and a prerequisite for staff work. When investigating mobile communication enterprises, we should also pay attention to the focus of observation. Firstly, we should pay attention to the development of enterprises in our province or in adjacent provinces [9]. Close enterprises are more convenient to investigate. Moreover, from the perspective of schools, it is difficult for schools to cooperate with enterprises in other provinces, and they can not communicate and understand effectively. Therefore, when investigating the development of enterprises, we should pay more attention to the development direction of enterprises in our province or adjacent provinces, and actively carry out school-enterprise cooperation. Based on the understanding of the development direction of mobile communication industry and the determination of employment direction, this paper transforms the related work of enterprises into knowledge and skills, and establishes a curriculum

1748

Z. Jie

system of “vertical pull + horizontal contact” suitable for the new era. Longitudinal pull refers to the links between courses, while horizontal links refer to the links between courses and employment direction, so as to achieve seamless docking between courses and enterprises [10]. The teaching mode takes the training of vocational post skills as the main line, the “simulation + authenticity” training and the “summer + post” practice as the core, and forms the “1.5 + 1.5” professional training mode. In the teaching of communication technology, we should adopt a step-by-step mode of education, cooperate with other enterprises to accomplish the related teaching tasks of mobile communication technology, so as to improve students’ relevant working technology and meet the development needs of communication technology specialty. In the first 0.5 semester, students can be educated in theory first to lay a solid theoretical foundation, and in the second 0.5–1 semester, relevant quality and technology can be trained; After one year’s study in the school, we will cooperate with enterprises to train students in relevant technology for half a year, so that students can continuously carry out practical operations and exercises to meet the students’ full understanding of the development of communication technology specialty, and lay a solid technical foundation for future work; after 1.5 semester, students will go to enterprises to Practice on fixed posts [3]. The core of student assessment is vocational ability assessment, including curriculum assessment and post practice assessment. According to the nature of different courses, the curriculum evaluation program is formulated. Among them, the curriculum assessment relies on the curriculum standards and adopts the combination of “project/achievement + reply + examination”. The post practice assessment combines the work/achievement assessment with the practice summary assessment, and focuses on the work/achievement assessment [11]. 2.2

Training Platform for Collaborative Talents Between Schools and Enterprises

The training platform of school-enterprise cooperation talents mainly includes textbook construction, teaching staff, training environment, post practice, school-enterprise cooperation Personnel Training Council and so on. The public basic courses and professional basic courses of mobile communication technology specialty select excellent new editions of Higher Vocational and technical textbooks, which ensure the requirements of the Ministry of Education for the teaching of cultural courses. Professional technology textbooks should be developed jointly by schools and enterprises, reflecting the integration of industry and education, and the textbooks should be optimized and revised annually according to the technological development of the industry. Textbooks such as “Principles and Optimizations of GSM”, “Principles and Optimizations of 3G”, “Principles and Optimizations of LTE” can be modularized in structure. They are usually divided into basic chapters, task chapters, engineering chapters and development chapters. A good specialty can not be separated from the support of excellent teachers. In the construction of teaching staff, this specialty adheres to the principle of “going out and introducing”. First, it actively selects excellent teachers to train, follow-up exercises in industries such as Xingxing and Huawei, and obtains industry certification qualification

Discussion on the Training Mode of Mobile Communication Technology

1749

certificates and professional experience. Second, it introduces excellent engineers and project managers from enterprises to serve as part-time teachers, they teach, instruct and design courses together; Thirdly, we should establish regular exchange and consultation mechanism between schools and enterprises (such as once a half month), regularly discuss and feedback on teaching activities and processes, and constantly optimize personnel training mode, teaching objectives, teaching means and methods. A good specialty can not be separated from the support of advanced training platform. In the construction of training platform, the specialty adheres to the orientation of personnel training objectives, plans the construction of training room scientifically, and timely starts the new and reconstruction project of training room. In order to better promote students’ practical ability, it is necessary to develop the information platform of student internship and graduate management, to realize the process management of internship and to monitor the data management and quality tracking of graduate employment information [8]. In order to cultivate technical applied talents closely integrated with local economic and social development, promote the combination of production and learning, strengthen the construction of specialty and practice bases in schools, strengthen the cooperation between schools and employers, jointly do a good job in the employment of graduates from higher vocational colleges, import required applied technical talents to enterprises, and jointly build a long-term cooperation relationship between supply and demand of human resources, it is necessary to set up a school-enterprise cooperation personnel training council, actively promote the deep integration of schools and enterprises, truly realize the dual-subject, increase the intensity of personnel training, and promote the development of mobile communication technology specialty [9].

3 Summary School-enterprise cooperation is an important measure for higher vocational colleges to pursue their own development, achieve market integration, vigorously improve the quality of education, and cultivate first-line practical technical talents for enterprises, its original intention is to let students combine what they have learned in school with the practice of enterprises organically, to make the equipment and technology of schools and enterprises complement each other and share resources, so as to effectively improve the pertinence and effectiveness of educating people and the quality of training skilled talents. Acknowledgments. This research was supported by Scientific Research Project of Jilin Vocational and Technical Education Society in 2018 (project number: 2018XHY149)

1750

Z. Jie

References 1. Huang, J., Deng, Z., Deng, X.: Construction and practice of innovation model for dual program leaders and dual subjects cultivation. J. Nanning Polytech. 24, 70–72 (2017). (in Chinese) 2. Wang, X., Zhang, K., Zhang, X., et al.: Research on professional training mode of communication major in vocational colleges. J. Chengdu Aeronaut. Polytech. 2, 31–33 (2016). (in Chinese) 3. Lin, C.: On the practice of “school-enterprise integrated” talent cultivating mode of mobile communications technology specialty in higher vocational colleges. Specialty Curriculum 35, 35–39 (2015). (in Chinese) 4. Zeng, H., Zheng, X.: Research on the teaching reform of the principle of mobile communication. Sci. Technol. Vis. 15, 38–39 (2018). (in Chinese) 5. Silver, H.: Higher Education and Opition Making in Twentieth-Century England. Woburn Press, Portland (2003) 6. Eggins, H.: Globalization and Reform in Higher Education. Open University Press, Buekingham (2003) 7. Currie, J.: Globalizing Practices and University Responses: Europen and Anglo-American Differences. Praeger Publinshers, London (2003) 8. Kerzner, H.: Project Management – A Systems Approach to Planning and Controlling, 7th edn. Publishing House of Electronics Industry, Beijing (2002) 9. Zhi, Q.: Construction of talent training mode for mobile communications technology specialty in higher vocational colleges. Specialty Curriculum 32(36), 26–28 (2015). (in Chinese) 10. Wang, Y.: Constructing a long-term mechanism of school-enterprise cooperation to adapt to the new normal state of economic development. Chin. Vocat. Tech. Educ. 8, 14–18 (2016). (in Chinese) 11. Yang, X.: Research on training scheme of mobile communication technical talents based on school-enterprise cooperation model. Intell. City 11(06), 31–50 (2016). (in Chinese)

Teaching Methods of the Filmmaking Major Adapted to the Development of 3D Film Industry Ziyou Zhuang(&), Haojie Yang, and Jianfeng Zhang Dalian Neusoft Institute of Information, Dalian, Liaoning, China [email protected]

Abstract. With the rapid development of 3D film industry, to make China as a global filmmaking powerhouse, the support of excellent talent is critical. The major of filmmaking aims for cultivating talent for this professional field. Therefore, developing a set of scientific and practical teaching method which is adapted to the current situation of the 3D film industry becomes a must nowadays. In this paper, we will study the status of the 3D filmmaking industry abroad and at home, and elaborate on some practical and proven teaching methods for the Filmmaking major. Keywords: 3D film

 Filmmaking  Teaching method

1 Introduction Since its appearance, the 3D film (also known as the stereoscopic 3D movie) has attracted extensive interest by the filmmaking industry. With the development and popularization of the stereo3D technology, the 3D films are no longer new to the people. Moreover, it is becoming the mainstream of the film industry. 1.1

The History of 3D Filmmaking

Surprisingly, the 3D film is not an invention of the 21st century. The history of the 3D film begins in 1922 when the silent movie “The Power of Love” premiered at the Ambassador Hotel Theater in Los Angeles. Even though it received good reviews and some people were fascinated, most of the audience were not crazy about it at all. After that, the 3D film industry failed to have any development for quite a long time due to the ensuing World War II. In 1962, China produced a 3D film called “The Magician’s Adventure.” It is the first widescreen 3D film produced in China which combined the characteristics of stereo3D with the acrobatic and magic performances to enhance the comedy effect. When it comes to the 3D film, we have to mention one of the iconic characters, James Cameron, who began to explore the stereo3D technology and applied it in filmmaking in 1996 and produced the famous 3D sci-fi film “Avatar” in 2009, which brought the 3D film into the second golden age [1]. Since then, more and more 3D films have been shown in major cinemas. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1751–1755, 2020. https://doi.org/10.1007/978-3-030-25128-4_227

1752

1.2

Z. Zhuang et al.

The Current Situation of China’s 3D Film Industry

With the technological innovation of the film industry, China has become the second largest film market in the world [2]. In 2016, the annual box office in China was 45.7 billion CNY, and the number of movie screen reached more than 40,000 (first place in the world). The domestic films are becoming more and more internationalized, and their international competitiveness is rising remarkably. Especially in 2017, the 3D film “Wolf Warrior 2” premiered, which had become an excellent model of high-quality movies in China. Meanwhile, the 19th National Congress of China pointed out that in order to develop a socialist culture with Chinese characteristics, China’s film industry and the film market must be further strengthened so that China could become a bigger and more powerful country of filmmaking [3, 4]. Although the box office of China’s film market is remarkable in recent years, the overall quality of domestic films still varies greatly. The production level of some domestic films has great disparity from that of the other countries like the US [5, 6]. In this background, a large amount of high-level professional filmmaking talent is urgently needed. China’s filmmaking major has embarked on the road of American-styled filmmaking education, and with the liberal university education as the foundation, it aims to cultivate compound talent with general qualities in the film-related fields [7]. Therefore, we must study and develop a set of practical teaching method which meets the needs of the current situation of the film industry in China.

2 Teaching Method of the Filmmaking Major The filmmaking of the 3D films is much more difficult than 2D, which requires more shooting and post-production techniques. At present, there are mainly two approaches to make a stereo3D film. One way to do it is through shooting in 3D as James Cameron did in “Avatar.” His team developed a specific HD stereo3D camera for the film which cost him over 12 million dollars. The other method is through shooting in traditional 2D and then converting to stereo3D in post-production stage, also known as the 2D/3D Convention [8–10]. This approach is quite labor-intensive which requires a considerable amount of workforce. Both of these two approaches require a solid understanding of cinematography and post-production. On the other hand, the professional education of the filmmaking major should not only focus on teaching the techniques but also integrate the culture related content into the classes. In this way, we will be able to cultivate high-quality, versatile talent for the filmmaking industry. After a long time of research and teaching practice, we propose the following teaching methods to achieve this goal. 2.1

Project-Based Teaching Method

In this teaching method, the teacher introduces actual or virtual projects into the class teaching as a case study. To meet the needs of the projects, the students will expand

Teaching Methods of the Filmmaking Major Adapted to the Development

1753

their current knowledge base by self-learning and sometimes inter-disciplinary learning specifically, thereby improving their general professional abilities. (1) Necessary hardware should be invested and introduced, such as filming equipment, computer devices for post-production as well as practical training bases. Especially for 3D filmmaking, professional two-lens 3D camera or two HD camera installed on the specifically-made head, dollies and tracks are needed. As for post-production, equip a set of high-performance graphics computer and software (such as Adobe After Effects, Autodesk 3Ds Max, Final cut pro, etc.) is very necessary. (2) Set up study groups and take each group as a unit to simulate the actual filming crew. (3) Create a good learning atmosphere and set up a proper project scenario, which is very important for stimulating students’ interest and enhancing their motivation. Meanwhile, we should innovate methods to promote students’ teamwork and cooperative learning. (4) The teachers should learn from colleagues and students, find out the needs of the enterprises, audiences, and students. Determine the theme of the projects by research and study. Only with such an attitude can we truly achieve the effectiveness of project-based teaching. (5) The theme of the project should be as practical as possible. For example, if the micro-course based flipped class model is applied in the teaching process, the shooting and production of micro-course can be handed over to the student team. The teachers issue tasks and assignments in advance, and then ask the students to form a team and clarify each other’s duties and responsibilities. Students themselves are responsible for making the shooting plans, storyboarding, considering the desired effects and so on. (6) Improve the assessment method. The traditional assessment method is not suitable for the project-based teaching. In the actual teaching process, we should focus on the process of students’ implementation of the project, and evaluate the learning effects by their performance in the project. The essential purpose of project-based teaching is to cultivate the students’ general abilities. The teaching process should be centered on the project instead of the teaching goals, and ultimately achieves the teaching goals through the project. Therefore, the implementation process and performance in the project should be generally regarded as the evaluation and assessment basis. Combining with the example mentioned above, we use the video materials made by the students as teaching resources to analyze the gains and losses and find ways to improve them. 2.2

Flipped Classroom

The flipped classroom (also known as the inverted classroom) teaching method aims to re-arrange the time that the students spend inside and outside the classroom, transfer the initiative from the teachers to the students. Based on this teaching model, the students will be more focused on mastering the knowledge and skills about the project during the valuable time of classroom teaching. The teachers will not take up so much class

1754

Z. Zhuang et al.

teaching time on elaborating the basic knowledge and information which requires the students to self-study before the class by watching micro-course videos, listening to related podcasts, reading e-books and so on. The flipped classroom teaching model is a part of the Great Education movement, which aims to make the learning process more flexible and initiative and make the students more engaged. The miro-course based flipped classroom model has the following characteristics: (1) The video tutorials are short but refined. Most of the teaching videos are just 5 to 10 min long, and each one of them is focused on one specific topic which is easy to follow. (2) The information is clear and definite. (3) Reconstruct the learning process. (4) Easy to review and test. After the students finished watching the video tutorial, there will be quizzes come after the video which can help the students test and evaluate themselves. The micro-course based flipped classroom model may be more effective while combining with the project-based teaching method mentioned above. Since the microcourses abstract and refine the key knowledge points and facilitate self-learning, the students can spend more time to participate in the project practice and accumulate experiences and skills in filming and post-production. Let’s take the 2D/3D Conversion as an example. We can use micro-courses to explain the essential techniques and methods to make this effect, such as rotoscoping, motion tracking, 3D reconstruction as well as stereoscopic rendering. The students will watch and study the micro-course videos before the class and have a basic understanding of the related tools and technologies. And then the teachers will issue a real or virtual project and release the tasks and assignments. After that, the students will use the equipment and resources that they can use as much as possible to finish the project on their own. After the project is done, the students will be assessed by the teacher based on their performance in the project.

3 Conclusion As a new type of comprehensive major, the filmmaking major covers the teaching systems including cinematography, directing, editing, recording, special effects and so on. The emergence of this major has changed the way of the traditional talent education of the filmmaking related majors and adopts the teaching mode of film majors in the US, i.e., the large-scale education. The major aims to cultivate practical compound talent with comprehensive professional qualities. Thus the practical training should be highlighted in the teaching process. In this paper, we undertook the study of the current situation of the 3D filmmaking industry along with its requirements of high-level professional talent and proposed a set of practical teaching methods which are in line with the filmmaking major’s characteristics. Hoping these teaching methods will facilitate improvements in professional talent cultivation for the filmmaking major.

Teaching Methods of the Filmmaking Major Adapted to the Development

1755

References 1. Ohanian, T., Phillips, N.: Digital Filmmaking: The Changing Art and Craft of Making Motion Pictures. Routledge, Abingdon (2000) 2. Wright, S.: Digital Compositing for Film and Video. Routledge, Abingdon (2013) 3. Umble,.: Making it real: the future of stereoscopic 3D film technology. ACM SIGGRAPH Comput. Graph. 40(1), 3 (2006) 4. Zone, R.: Stereoscopic Cinema and the Origins of 3-D Film, 1838–1952. The University Press of Kentucky, Lexington (2007) 5. Mendiburu, B.: 3D Movie Making Stereoscopic Digital Cinema from Script to Screen. Routledge, Abingdon (2009) 6. Blumenfeld, P.C., Soloway, E., Marx R.W., Krajcik, J.S., Guzdial, M., Palincsar, A.: Motivating project-based learning: sustaining the doing, supporting the learning. Educ. Psychol. 26, 369–398 (1991) 7. McManus, J.W., Costello, P.J.: Project based learning in computer science: a student and research advisor’s perspective. J. Comput. Sci. Coll. 34(3), 38–46 (2018) 8. Rahman, A.A., Zaid, N.M., Abdullah, Z., Mohamed, H., Aris, B.: Emerging project based learning in flipped classroom: technology used to increase students’ engagement. In: 2015 3rd International Conference on Information and Communication Technology (2015) 9. Habók, A., Nagy, J.: In-service teachers’ perceptions of project-based learning. SpringerPlus 5, (2016) 10. Gilboy, M.B., Heinerichs, S., Pazzaglia, G.: Enhancing student engagement using the flipped classroom. J. Nutr. Educ. Behav. 47(1), 109–114 (2015)

Implementation and Improvement of College Course Teaching Process Based on Classroom Scenario Xiaolin Li(&), You Li, and Nian Zhao Business School, Sichuan Agricultural University, Chengdu 611830, China [email protected]

Abstract. In recent years, China has been actively carrying out education and teaching reform. Teaching based on classroom scenarios has been widely used in the teaching of various disciplines at various stages, and has achieved good teaching results. The application of classroom situational teaching in college classroom teaching has also achieved certain achievements. However, there is a lack of relevant research on the implementation and improvement of the teaching process in China. This paper mainly uses the classroom situation teaching method as the research background, and analyzes the implementation and improvement of the university curriculum teaching process. Keywords: Classroom scenarios

 University courses  Teaching process

1 Introduction Classroom situational teaching is a new teaching mode under the background of education and teaching reform [1]. Through classroom situational teaching, it can effectively improve classroom teaching efficiency, promote teaching method innovation and reform of teaching management system [2]. Most scholars mainly study the application of situational teaching methods in the classroom. Yan (2006) believes that using the situational teaching method in the college English writing class can cheer the classroom atmosphere up and promote students’ interest in learning [1]. Deng (2016) believes that the using situational teaching methods in high school English grammar courses can improve students’ enthusiasm and initiative, and thus improve students’ comprehensive ability and academic achievement [2]. However, few scholars have studied the implementation and improvement of the university curriculum teaching process under the classroom situation teaching mode. Therefore, it is necessary to conduct an in-depth analysis of the implementation and improvement of the university curriculum teaching process. This paper mainly analyzes the implementation and improvement of the university course teaching process under the background of classroom situation teaching methods, and puts forward some suggestions. The rest of the paper will be arranged in this way: the second part introduces the implementation of the teaching process, the third part introduces the teaching improvement, and the fourth part summarizes the full text.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1756–1760, 2020. https://doi.org/10.1007/978-3-030-25128-4_228

Implementation and Improvement of College Course Teaching Process

1757

2 The Implementation of the Teaching Process 2.1

Teacher and Student Cognition, Establish Teacher-Student Contact

The first lesson of the course is the beginning of the relationship between the teacher and the student. In order to establish the interrelationship between the teacher and the student, and let the students understand the requirements of the course, the teacher should pay attention to the mutual understanding with the students, and at the same time emphasize the learning requirements of the course, introduce course assessment programs and life guidance and recommendations. Guide students to actively communicate with teachers, mutual understanding, and ask students to record assessment methods and consider the life guidance suggestions put forward by teachers. Make students establish good study habits, and establish noble sentiments and accomplishments by thinking about the life guidance suggestions put forward by the teachers. 2.2

Topic-Oriented, Pre-class Exploration

Teachers can set discussion topics related to the teaching content so that teachers and students can enter the topic situation together. Through topic orientation, students are encouraged to think and cultivate students’ habits and thinking ability to think actively, so that students can enter the topic situation through layers of thinking and prepare for the introduction of new lessons. 2.3

Leading the Problem, Introducing New Lessons

By deriving the problem and then introducing a new lesson, it can effectively increase the perceived interest in the course of teaching. Teachers can guide students to think about the issues related to the content of the course in life. Students watch the projections, think about the relationship and role of course content and personal life, and think about the common themes involved in the course topics. Teachers lead questions, attract students’ attention, and guide students to think continuously. Finally, teachers introduce new lessons to stimulate students’ desire for knowledge. 2.4

Problem-Driven, Exploring New Knowledge

The driver problem designed by the teacher should have a positive guiding role [3]. By leading the case and analyzing the problem, the student can be guided to think positively and teacher can discuss the problem with students. After students have a certain understanding of the relevant knowledge of the case and the course, the teacher can propose new concepts based on the driving problem, and cultivate students’ ability to find and solve problems. 2.5

Creating Scenarios and Deepening Cognition

For some difficult knowledge points, creating situational teaching is very effective. In the traditional teaching process, when teachers explain some important and difficult

1758

X. Li et al.

knowledge points, students may feel boring, more difficult to understand, and may even get bored. When designing the teaching implementation process, teachers can consider creating scenarios, such as using a poem, a piece of music, a video, etc. to stimulate students’ interest and thinking. This process mainly consists of two parts, the first part is the creation of the situation and the second part is the analysis of the situation. For some difficult knowledge points, multiple scenarios can be created to reduce the difficulty of students’ understanding. By creating case scenarios, students can be helped to enter the situation and deepen their understanding of certain concepts. Guide students to think through situations, cultivate students’ ability to analyze problems, and let students actively participate and strengthen their understanding. 2.6

Diffusion of Ideas and Expansion of New Knowledge

This process is mainly for teachers to guide students in thinking, to propose and analyze problems. Teachers should pay attention to the diffusion of students’ thinking and expand new knowledge in the process of teaching. Through thinking, the students’ thinking ability is trained, the students’ thinking mode is cultivated, and the students’ knowledge structure is constructed. 2.7

Summary, Consolidation and Improvement

Inductive summary is an important teaching part in the teaching process. For college students, this is an important learning and research method [4]. Teachers should classify the purpose of learning; summarize the knowledge structure and content, at the same time, guide students to think about the purpose and meaning of the content, recall all the knowledge content involved in the class, and consolidate the memory. This helps to clarify the students’ learning ideas, summarize the knowledge content, consolidate and deepen understanding, and actively construct knowledge. 2.8

Task-Driven, Reinforcement Learning

Task-driven refers to the teacher designing the teaching content as one or more specific tasks, driven by tasks, guided by an instance, and then asking questions to guide students to think [5]. Teachers can assign after-school tasks to students, recommend after-school reading materials, and ask questions after class. In order to strengthen student learning, teachers should urge students to record recommended reading materials, learning resources, and after-school thinking questions.

3 Teaching Improvement 3.1

Teaching Philosophy

The teaching concept is the basic viewpoint and fundamental view of the teacher from the teaching practice and the relatively stable thought and concept system formed on this basis [6]. The teaching concept can clarify the teaching objectives and learning subjects; emphasize the initiative, creativity and individuality of students; pay attention

Implementation and Improvement of College Course Teaching Process

1759

to students’ cognitive and psychological factors, and pay attention to students’ allround development and ability improvement. But the systematic concept of teaching needs to be improved. Influenced by the background of growth, teachers’ openness and diversification concepts need to be strengthened. Therefore, it is recommended that college teachers pay attention to the overall and systematic thinking of the whole teaching work, organically integrate all aspects of teaching, and enhance the systematic nature of teaching; strengthen individual learning and cultivation, broaden their horizons, and promote the teaching methods and content to be more open, vivid and novel. 3.2

Teaching Methods

The teaching method is the method adopted to complete the teaching task, which is one of the important factors affecting the quality of teaching. The teaching method is restricted by the teaching purpose and teaching content [7]. It is the most intuitive expression of teachers’ teaching practice [8]. The concrete can be divided into four categories: main in language transmission; main in direct perception; main in actual training; main in guiding exploration. The teaching method can replace the “knowledge infusion” teaching with “knowledge construction”; replace the “monologue” teaching with “conversational” teaching; “promoting learning” instead of “knowledge transfer” teaching. However, limited by the content of teaching: the application of teaching methods based on direct perception and actual training is insufficient, which limits the teaching effect to a certain extent; the ability to comprehensively apply scientific teaching methods needs to be improved. Therefore, teachers are advised to modify the teaching design, reasonably arrange the teaching content, appropriately increase the training content, strengthen the study, and master the various teaching skills. 3.3

Teaching Process

The teaching process is the whole process of teaching activities [9]. It is the process of teachers guiding students to build cognition according to the teaching philosophy, the purpose of teaching and the characteristics of students’ physical and mental development, with certain teaching conditions [10]. The teaching process pays attention to the mutual connection, gradual and progressive improvement of the whole teaching process; It pays attention to students’ independent learning and comprehensive development, and cultivates students’ learning ability and innovative ability. However, the systematic aspects of the entire teaching process should be further strengthened; due to the limitations of the curriculum content, the ability of students to develop is not comprehensive enough. Therefore, teachers are recommended to modify the teaching design, pay attention to the connection of teaching links, pay attention to the systematic process of teaching; modify the teaching design, adjust the teaching content appropriately, increase the practical content, pay attention to the cultivation and comprehensive development of students’ comprehensive ability.

1760

X. Li et al.

4 Conclusion In conclusion, college teachers should pay attention to the design of teaching links, enrich the teaching content of each teaching link, and take into account the student activities while designing the teacher activities, and clarify the intent of each teaching process design. At the same time, teachers should reflect on different dimensions, such as teaching concepts, teaching methods, and teaching processes. Giving suggestions for improvement after fully recognize the advantages and disadvantages of each dimension.

References 1. Yan, J.: The application of situational teaching method in college English writing class. J. North Univ. China 04, 88–90 (2006) 2. Deng, W.: Application of Situational Teaching Method in English Grammar Teaching in Senior Middle School. Central China Normal University (2016) 3. Fu, D.: Research and implementation of problem-driven teaching methods. Univ. Educ. 04, 1–3 (2014) 4. Zhang, M., Yuan, L., Yuan, X.: Organic chemistry “target teaching - introducing problems inspiring discussion - inductive summary” four-step classroom teaching model exploration. High. Educ. Chem. Eng. 28(06), 78–81 (2011) 5. Xu, Y.: Comparison between task-driven teaching method and project teaching method. Educ. Occup. 11, 36–37 (2008) 6. Li, H., Deng, N., Yang, X.: On teaching concept and its influence on teaching. Teach. Res. 03: 232–234, 240 (2004) 7. Wang, D., Wang, H.: Education, p. 244. People’s Education Press, Beijing (1989) 8. Zhong, Q.: Teaching methods: interpretation of concepts. Educ. Res. 38(01), 95–105 (2017) 9. Ye, L.: Classroom teaching process between: theory of Kung Fu is outside. J. Curriculum Teach. Mater. Teach. Methods 05, 3–13 (2013) 10. Pan, H.: Reflections on the essence of teaching process. J. Sichuan Normal Univ. 01, 87–91 (2001)

The Method of Construction and Analysis of Gene Regulatory Network Ming Zheng and Mugui Zhuo(&) Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University, Wuzhou, China [email protected]

Abstract. As we all know, gene regulatory network is a kind of basic and important biological network. It can regulate and control the robustness of gene regulatory network through input, noise, parameters and positive and negative feedback. In this paper, we first briefly review the progress of gene regulatory network control, and then put forward some basic scientific issues related to control. The control of gene regulatory networks is based on life science and control theory. In the past few decades, the basic ideas and methods of cybernetics have gradually penetrated into the research of gene regulatory networks. At the same time, the control problems originating from life science have brought us new opportunities and challenges. The control of gene regulatory networks is a basic problem that plagues human beings in life science, such as the control of gene regulatory networks. It is of great practical significance to prolong life span, cure cancer, diabetes and other persistent diseases. In addition, the study of gene regulation network control has potential application value for the development of synthetic biology, network medicine, personalized medicine and other related disciplines. Keywords: Bioinformatics  Gene regulatory networks Positive feedback  Negative feedback

 Noise 

1 Introduction The development of systems biology has brought many new opportunities and challenges to the researchers of control theory and control engineering. As summarized by Sontag [1], a control scientist in 2004, these new opportunities and challenges include: (1) how to apply control theory and signal processing technology to the design of highprecision biometrics and manipulation instruments [2]; (2) how to apply the relatively perfect theories that have been developed in control theory to the design of highprecision biometrics and manipulation instruments [3]; (3) Biological systems can be regarded as complex circuits, communication and sensing systems. Evolution leads to high fault tolerance, high nonlinearity and abundant feedback of biological systems [4]. (4) How to abstract new control and sensing engineering from biological systems research. The main purpose of this paper is to summarize the research progress of gene regulatory networks (GRNs) control, and then put forward some scientific issues

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1761–1765, 2020. https://doi.org/10.1007/978-3-030-25128-4_229

1762

M. Zheng and M. Zhuo

related to GRNs control, with a view to providing reference and further thinking and discussion for readers. The biological system of system biology includes many networks of different levels and different organizational forms, ranging from micro-protein molecules and regulation and signal transduction networks between genes to macro-ecological networks [5]. Gene transcription regulation networks, biological metabolism and signal transduction networks, protein interaction networks at micro-level are currently the hotspots of system biology research. Points. Research issues include reconstructing the actual network with experimental data, modeling the molecular network with known interaction relationships, dynamics analysis and control, predicting unknown nodes in the network (genes or protein molecules, etc.), studying the characteristics of disease networks, and finding the nodes closely related to diseases so as to control and treat diseases purposefully [6]. Complex is a biochemical network composed of a group of genes, proteins, small molecules and their interactions [7]. It is a basic and important biological network. This paper mainly takes gene regulatory network as the background, summarizes and expounds the research progress of ideas and methods in control theory in gene regulatory network, and puts forward some suggestions drawn from the research of gene regulatory network. There are two kinds of regulatory roles between nodes in gene regulatory networks: promotion and inhibition. Therefore, gene regulatory networks can be expressed by directed graphs. The growth, development and differentiation of all organisms, as well as the response to the external environment, are closely related to the orderly expression of various related genes. In theory, gene expression regulation can occur in genetic information [8]. At every level of information transmission process, the research of gene regulation mainly focuses on the regulation of DNA level, expression regulation at transcriptional level and expression regulation at translation level. Transcription regulation is the most important and complex link in gene expression regulation, and is also the focus of current research [9]. The research of gene regulatory network can be divided into positive and negative aspects, i.e., knowing network structure and studying network function; reverse engineering includes known stimulus response relationship or input {output relationship, detecting network structure and so on. In the positive research of gene regulatory network, gene regulatory system is highly non-linear, positive and negative feedback regulation, signal pathway crosstalk and delay of gene or protein transport, etc. Mathematical modeling can help to integrate these factors, quantitatively understand gene regulatory systems, identify the design principles of biochemical structure of gene networks, understand the response of organs to stimuli under normal and mutation conditions, and verify the consistency and integrity of response combinations describing gene systems [10].

The Method of Construction and Analysis of Gene Regulatory Network

1763

2 Some Applications of Control Theory in the Study of Gene Regulatory Networks Bio-cybernetics is a branch of cybernetics. It uses the general principles of cybernetics to study the control and information reception, transmission, storage, processing and feedback in biological systems. The research object of bio-cybernetics is from ecosystem to molecular biological network. The research feature of bio cybernetics is that it pays more attention to the dynamic process of the system. Gene regulatory network control is obviously bio-cybernetics. An important branch. Gene regulatory networks can regulate and control the functions of biological systems through input, noise, parameters, positive and negative feedback regulation, and small RNA regulation. Cells can be regarded as a typical input-output wireless communication system. Gene regulatory network is an important part of this communication system. The input of gene regulatory network system includes physical aspects, such as radiation, temperature changes, and chemical aspects, such as drug intervention, growth factors, hormones, nutrition, etc. The measurable output includes signals reaching other cells or genes. Flagellum movement or invertebrate prosthetic foot movement, transcription factor activation, etc. Although gene regulatory networks have been extensively studied up to now, they are only a black box or grey box problem for many eukaryotic gene regulatory networks. Input-output control in cybernetics can help to whiten gene regulatory networks. The network structure, i.e. the reconstruction of gene regulatory networks, can be retrieved from input-output signals, as shown in Fig. 1. Input-output experimental data.

Gene expression profiles

Reverse

Genes funcƟon

method one

Reverse

method two

Gene regulatory network

Fig. 1. Detecting unknown network structure under condition of known input-output relationship

1764

M. Zheng and M. Zhuo

3 Some Related Problems of Gene Regulatory Network Control We think that the following problems deserve further study: (1) Because the mathematical models of gene regulatory networks are generally highly non-linear, such as Hill function, most of the current research results are mainly numerical. For example, we have demonstrated from the point of view of numerical experiments that colored noise is beneficial to the synchronization of multi-cell coupled Toggle switch system and the increase of protein production. White noise of the same intensity is beneficial to switching. How to verify these conclusions in theory with stochastic system control theory is a problem worthy of further study. (2) Biological experiments have shown that the same genes can participate in different physiological processes and achieve different physiological functions in biological cells. Some genes can only participate in certain time and specific external conditions. There are interactions, but there are no interactions under other conditions. That is to say, the existence and direction of interaction between two genes may be different in different periods. This poses a challenge for control theorists, that is, how to construct, model, analyze and control highly non-linear and time-evolving networks. (3) About the parameters of gene regulatory networks. In relation to the structure and function of the network, we propose a global relative sensitivity index, which takes into account the global relative parameter sensitivity and global relative input-output sensitivity of eight configurations of feedforward loops, and discovers some meaningful results. It is worthwhile to extend the proposed method to oscillatory systems, disease network modeling and control, and metabolic control analysis. Further in-depth study of the issue as Eq. (1): dx ¼ fðx; tÞ þ gðx; tÞn dt

ð1Þ

4 Conclusion This paper discusses the research progress of gene regulatory network control, and studies the control of gene regulatory network from the aspects of input, noise, parameters and positive and negative feedback. Finally, several scientific issues related to gene regulatory network control are put forward in order to provide further thinking and discussion for readers. Cybernetics originates from biological problems. With the development of recent decades, control theory has formed a perfect theoretical system, but how to apply it to practical biological systems, such as systems biology, synthetic biology, network medicine, personalized medicine, etc., especially in gene regulation system, has important significance and broad prospects for the development of control theory itself and life science.

The Method of Construction and Analysis of Gene Regulatory Network

1765

Acknowledgments. This work was supported by grants from The National Natural Science Foundation of China (No. 61862056), the Guangxi Natural Science Foundation (No. 2017GXNSFAA198148) foundation of Wuzhou University (No. 2017B001) and Guangxi Colleges and Universities Key Laboratory of Professional Software Technology, Wuzhou University.

References 1. Sontag, E.D.: Some new directions in control theory inspired by systems biology. Syst. Biol. 1(1), 9–18 (2004) 2. Ferrer, M.A., Chanda, S., Diaz, M., et al.: Static and dynamic synthesis of Bengali and Devanagari signatures. IEEE Trans. Cybern. 48(10), 2896–2907 (2018) 3. Duong, M.H., Tran, H.M.: Analysis of the mean squared derivative cost function. Math. Methods Appl. Sci. 40(14), 5222–5240 (2017) 4. Subramanian, R., Sarkar, S.: Evaluation of algorithms for orientation invariant inertial gait matching. IEEE Trans. Inf. Forensics Secur. 14(2), 304–318 (2019) 5. Shinde, S.B., Kurhekar, M.P.: Review of the systems biology of the immune system using agent-based models. IET Syst. Biol. 12(3), 83–92 (2018) 6. Singh, A.J., Ramsey, S.A., Filtz, T.M., et al.: Differential gene regulatory networks in development and disease. Cell. Mol. Life Sci. 75(6), 1013–1025 (2018) 7. Chai, L.E., Loh, S.K., Low, S.T., et al.: A review on the computational approaches for gene regulatory network construction. Comput. Biol. Med. 48, 55–65 (2014) 8. Chai, L.E., Mohamad, M.S., Deris, S., et al.: Current development and review of dynamic Bayesian network-based methods for inferring gene regulatory networks from gene expression data. Curr. Bioinform. 9(5), 531–539 (2014) 9. Hecker, M., Lambeck, S., Toepfer, S., et al.: Gene regulatory network inference: data integration in dynamic models – a review. Biosystems 96(1), 86–103 (2009) 10. Chen, H.L., Vanburen, V.: A review of integration strategies to support gene regulatory network construction. Sci. World J. (2012)

Design of Shower Head for Controlling Water Output Xinlin He, Miao Shang(&), and Xuhong Zhao Mechanical and Electrical Technology, Xijing University, Xi’an, China [email protected], [email protected]

Abstract. Shower heads are used in the bathroom in daily life. The traditional shower head is not easy to disassemble, and the traditional shower head is easy to damage the connection between the hose and the shower head. In order to supplement the shortage of traditional shower heads, the design of the shower head for controlling water output is to provide a portable shower head for controlling water output. This kind of shower head is different from the traditional shower head. The design of the trigger and the design of the spherical connector can make the connection between the hose and the shower head not easy to be damaged, thus saving water resources. There are many advantages to control the output of the shower head, such as the connection between the hose and the shower head is not easy to damage, the structure design of the shower head is reasonable, the process of water pressure regulation is very easy and so on. Keywords: Shower head

 Water yield  Water pressure  Portable  Energy

1 Introduction The shower head is a shower head when showering. Shower heads are used in bathrooms in daily life. The shower head is called a shower head because it is shaped like a lotus. In daily life, shower heads are used for watering flowers and bathing. However, the traditional shower head structure is either very simple or very complex. Most of the traditional shower head design is integrated design [1]. Traditional shower heads are not easy to disassemble and damage the connection between the hose and the shower head. Therefore, the hose needs to be replaced frequently and resources will be wasted. Traditional shower heads are sometimes complicated in composition. Most traditional shower heads cannot adjust water pressure. Traditional shower head installations are too complex for those capable of regulating water pressure. There are many disadvantages of traditional shower heads, such as poor user experience of no hydraulic regulation shower head, complex structure and low efficiency [2]. To sum up, a kind of shower head that can adjust the water pressure is what users need, the connection between the hose and the shower head is not easy to damage, the structure design of the shower head is reasonable, this kind of shower head can control the water output, thus saving water resources [3].

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1766–1770, 2020. https://doi.org/10.1007/978-3-030-25128-4_230

Design of Shower Head for Controlling Water Output

1767

2 Characteristics of Traditional Shower Heads Most of the traditional shower head design is integrated design. Traditional shower heads are not easy to disassemble and damage the connection between the hose and the shower head. Therefore, the hose needs to be replaced frequently and resources will be wasted [4]. There are many disadvantages of traditional shower heads, such as poor user experience of no hydraulic regulation shower head, complex structure and low efficiency. The working process of traditional shower head is realized by the principle of pressure. Sometimes traditional shower heads advance the internal pressure higher than the external [5]. Sometimes the traditional shower head is the moment of pressing out some of the internal air, so that the air pressure connected to the nozzle in the pipe is less than the internal liquid pressure, the liquid inside the shower head under the action of pressure [6]. There are three main types of traditional shower heads. The three types are portable, overhead and postural shower heads [7]. (1) Portable shower head: the shower head can be held in the hand at will, shower head bracket has a fixed function. (2) Overhead shower head: the shower head is fixed on the top of the head, and the support enters the wall. It does not have the function of lifting or lowering. However, there is a small ball on the shower head, which is used to adjust the Angle of water outlet. (3) Position shower head: the shower head is hidden in the wall and sprays the body sideways. There are various installation positions and water spraying angles, playing a role of cleaning and massage.

3 Research Content of the Shower Head for Controlling Water Output In order to supplement the shortage of traditional shower heads, the design of the shower head for controlling water output is to provide a portable shower head for controlling water output [8]. This kind of shower head is different from the traditional shower head. The design of the trigger and the design of the spherical connector can make the connection between the hose and the shower head not easy to be damaged, thus saving water resources [9]. There are many advantages to control the output of the shower head, such as the structure is moderate, is large, the process of water pressure regulation is very easy, and so on [10]. The design of the trigger and the design of the spherical connector can make the connection between the hose and the shower head not easy to be damaged, thus saving water resources. This design allows a wide range of hydraulic regulation, the process of hydraulic regulation is very easy [11]. The technical solution of this design is: a portable controllable water output shower head, including the main body 6, rubber hose 7, spring 1, push rod 2, trigger 3, stainless steel tube 4, spherical connector 5.

1768

X. He et al.

(1) A rubber hose is arranged inside the main body, and a spring is arranged on the rubber hose. (2) The bottom end of the spring is provided with a push rod. (3) The trigger is set at the bottom of the push rod. (4) The lower end of the rubber hose is provided with a stainless steel tube. The lower end of the stainless steel tube is provided with a spherical connector 5. (6) The main body and the rubber hose are movable connections. Between the main body and the spring hose is a movable connection. The main body is connected with the spring, the push rod, the trigger, the stainless steel pipe and the spherical connector. (7) Spring and rod, rubber hose and stainless steel pipe are fixed connection. Because the design in the main body inside the rubber hose, rubber hose with a spring, spring with connecting rod and trigger. This design can make the connection between the hose and the shower head not easy to damage, thus saving water resources. There are many advantages to control the output of the shower head, such as the structure is moderate, is large, the process of water pressure regulation is very easy, and so on. The lower end of the stainless steel pipe is equipped with a spherical connector, so it is not easy to damage the connection between the hose and the shower head and save resources. The structure diagram of the shower head controlling the water output is shown in Fig. 1.

1. Spring; 2. Push rod; 3. The trigger; 4. Stainless steel pipe; 5. Spherical connector; 6. The main body; 7. Rubber hose; 8. Outlet Fig. 1. Structure diagram of the shower head controlling water output

Design of Shower Head for Controlling Water Output

1769

4 The Working Principle of the Design The working principle of the shower head controlling the water output is further explained in detail in the following Fig. 2. The structure diagram of the shower head controlling the water output is shown in Fig. 2. The shower head which controls the water output is a portable shower head. This kind of shower head can control the water output. Includes body 6, rubber hose 7, spring 1, push rod 2, trigger 3, stainless steel tube 4, ball connector 5. The rubber hose is arranged inside the main body, and the rubber hose is provided with a spring. The bottom end of the spring is provided with a push rod. The trigger is set at the bottom of the pin. The lower end of the rubber hose is provided with a stainless steel tube. The lower end of the stainless steel tube is provided with a spherical connector 5. Between the main body and the rubber hose is a movable connection. Between the main body and the spring hose is a movable connection. The main body is connected with the spring, the push rod, the trigger, the stainless steel pipe and the spherical connector. The use of portable and controllable water output shower head is as follows: (1) when in use, connect the spherical connector with the outlet hose; (2) turn on the faucet, hold the end of the shower head, put the index finger and middle finger on the trigger to apply a little pressure, and push the lever back to push the spring to make the rubber hose unblocked and increase the water pressure; (3) loosen the force exerted by the index finger and middle finger, and push the rubber hose under the spring to block it, so that the water pressure will be reduced or water will be cut off. (4) by adjusting the pressure exerted by the index finger and middle finger, the water pressure can be conveniently adjusted.

5 Conclusion Most of the traditional shower head design is integrated design. Traditional shower heads are not easy to disassemble and damage the connection between the hose and the shower head. In order to supplement the shortage of traditional shower heads, the design of the shower head for controlling water output is to provide a portable shower head for controlling water output. This kind of shower head is different from the traditional shower head. The design of the trigger and the design of the spherical connector can make the connection between the hose and the shower head not easy to be damaged, thus saving water resources. There are many advantages to control the output of the shower head, the connection between the hose and the shower head is not easy to damage, the structure design of the shower head is reasonable, the process of water pressure regulation is very easy and so on.

1770

X. He et al.

References 1. Zhang, D., Zhu, H.: Flexible reconfiguration patterns for measurement architecture. In: 2010 IEEE International Conference on Information and Automation (2010). (in Chinese) 2. Depari, A., Ferrari, P., Flammini, A., et al.: Multi-probe measurement instrument for realtime ethernet networks. In: 2006 IEEE International Workshop on Factory Communication Systems (2006) 3. Qu, H.: Plastic Forming Process and Mold Design, pp. 26–31. Higher Education Press, Beijing (2014). (in Chinese) 4. Sun, H., Guo, X.: Design of rotary piston injection mold. Mold Ind. 47–50 (2015). (in Chinese) 5. Berenshtein, V.B., Rabinov, A.A., Tsytsarev, A.U., et al.: Device control measurement and checking methods and algorithms. In: 15th International Crimean Conference on Microwave & Telecommunication Technology (2005) 6. Zhang, Y., Huang, K.: Design of injection mold for mini speaker case. Mold Ind. 48–51 (2016). (in Chinese) 7. Tamura, T.: Motion analysis measurement. In: 2003 IEEE International Workshop on Computer Architectures for Machine Perception (2004) 8. Zhu, X.: Pattern and Composition. Zhengzhou University Press, Zhengzhou (2014) 9. Jiang, W.: Method of system design and product function combination. Eng. Des. 28–30 (2001). (in Chinese) 10. Zhang, X.: Safety control analysis of mechanical design automation equipment. Shandong Ind. Technol. 44 (2018). (in Chinese) 11. Tang, X.: Research on safety control of mechanical design automation equipment. Guangdong Sericulture 38 (2018). (in Chinese)

Working Mode of Hospital Cyber Intelligence Under Network Environment Na Wang1 and Jinguo Wang2(&) 1

2

Department of Anesthesiology, First Hospital of Jilin University, Changchun, China Department of Urology, First Hospital of Jilin University, Changchun, China [email protected]

Abstract. The hospital information system should realize automation of the management, storage and transmission of each issue process inside the hospital, and provide the foundation and platform for the hospital to carry out the high efficiency of medical information work. Because the system has not realized the orderly integration and utilization of information resources, its integrity, convenience and timeliness can’t be improved. In addition, problems such as single service form and insufficient information service quality have affected the utilization of information resources. Therefore, it is an important task for the hospital intelligence department to explore the medical information work mode on the base of the internal network. Efficient integration of internal and external resources of the hospital can provide multi-level and deep-level network intelligence services, and expand the depth and breadth of the hospital intelligence work. Keywords: Cyber Intelligence

 Medicine  Hospital  Management

1 Introduction The advent of big data era brings unprecedented opportunities and challenges to network intelligence research. On one hand, it expands intelligence research to a broad field, brings new technologies and methods, and reposes the value of intelligence research [1]. On the other hand, big data itself make governments, enterprises, scientific research institutions and other industries pay more attention to intelligence research [2]. However, what big data brings to intelligence researchers is not only structured data, but more unstructured data. Internet data is an important part of big data. The exponential growth of users and web pages makes the network become the information distribution center, the amplifier of public opinion, and the place where scientific research information is generated. With the transformation of Chinese economy and society, various contradictions will be more fully displayed on the Internet. How the state and local governments can effectively use the massive network information resources, find highlights and emergencies as soon as possible, so they can reasonably guide the direction of public opinion, and become an important topic of government decision-making intelligence research [3].

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1771–1775, 2020. https://doi.org/10.1007/978-3-030-25128-4_231

1772

N. Wang and J. Wang

2 Working Mode of Medical Cyber Intelligence 2.1

Contents and Methods of Medical Cyber Intelligence

The formation and development of network pose challenges to the theory of information science in the pre-network era. The original thinking mode of information science is based on the two-pole mode of “subject and object”. With the advent of network, the space of information science expands to a multi-dimensional information space of “subject-object and subject” mode. This requires that information science should change from a thinking paradigm based on a single and materialized world to a thinking paradigm based on a double world base E which integrates materialization and virtualization [4]. The network has shaken the literature theory foundation of information science. Information science in the pre-internet era is established on the basis of literature. Its theoretical system is also formed with the help of literature theory. For example, classification, subject method, cataloguing method, index method, abstract method and other organizational methods take literature as organizational unit [5]. For example, Bradford’s law, ziff’s law, rotka’s law, price’s law of literature growth and literature aging law et al. are also the results of literature unit statistics [6]. The network introduces the concepts of knowledge organization and knowledge management into information science, which requires the organization and service of knowledge as the organizational unit. 2.2

Concept of Network Intelligence

In the view of information in the Internet age, it is an increasingly important role in the negative [7]. It is infinite, expand areas of intelligence, no restraint in intelligence work practice drifted extends to every corner of society, the intelligence agencies from the original position of business intelligence, in addition, the concept of intelligence is not an exact connotation of intelligence, but improperly enlarge its denotation, the information and intelligence is blurry [8]. It can be proved that the great intelligence concept only expands the extension of information science, and does not deepen the connotation of information science, so it can’t be adapted to the requirements of the network environment [9].

3 Formation and Development of Network Pose Challenges 3.1

Establishment of Network Medical Information Working Mode

According to the characteristics of medical information work under the network mode, three aspects of research are carried out. One is to study different types of hospital personnel. Professional, different levels of information needs, explore the hospital internal resources, external resources screening, processing, analysis, integration, management to provide a full range of, comprehensive, initiative knowledge information service model [10]. The second is to establish a network information service platform-hospital integrated information service system, realize the orderly management and integration of network resources inside and outside the hospital, visualize the

Working Mode of Hospital Cyber Intelligence

1773

knowledge information service mode, and further expand the depth and breadth of information service. Third, relying on the internal and external network of the hospital, explore the use of information science technology and methods to expand the intelligence service function, and develop the information content and methods of valuable information products for medical treatment, scientific research and hospital management [11]. 3.2

The Research Method Is Based on the Internal Intranet

The research method is based on the internal Intranet of the hospital to create the internal comprehensive information system of the hospital, establish the background database and realize the interaction with the background database [12]. The data mining technology is applied to develop and utilize the network resources inside and outside the hospital. Adopt push technology to automatically search the information needed by users and send it to users in time. In addition, methods such as bibliometrics, literature analysis and literature compilation are applied to clinical, management and scientific research to provide decision-making basis for hospital management, scientific research and discipline construction [12–16]. 3.3

Principle of Discovering False Information

In the process of constructing the principle model of the false information system in the big data network, firstly, the original intelligence data with different structures are preprocessed by integrating ontology domain knowledge, and the correlation degree matrix between words is constructed. Cut and distinguish the collected intelligence documents. Extract the characteristic information of false information [17]. The similarity between vector intelligence texts was calculated. Based on the similarity, false intelligence texts were clustered and indexed. Finally, false intelligence information was identified at the semantic level to establish the theoretical model of the false information system in the big data network [18]. Nowadays, hospital reform continues to deepen and informatization construction is strengthened. Informatization has become the primary task and historical mission of hospitals. This paper puts forward the concepts of information science and network information science in the pre-network era, and expounds the challenges of network to the theory and practice of information science, as well as the main lines of formation and development of network information science [19]. The main contents of network information science are discussed. The architecture of network information science is constructed. After mechanization, electrification, informatization and networking, human beings have stepped into the development stage of virtual and real interactive parallel intelligent technology [20]. Correspondingly, we believe that intelligence science and technology, which share the same root with intelligence, will rapidly enter the new historical development period of parallel intelligence, namely intelligence era, following personnel intelligence, signal intelligence, image intelligence and network intelligence.

1774

N. Wang and J. Wang

4 Conclusion In this new era of intelligence, intelligence is encapsulated intelligence, and intelligence is open intelligence. Intelligence will be the core and key of the whole society, from military defense, social economy to personal services. The main features are real-time, online and interactive social signals, social intelligence and social intelligence. It should be pointed out that information science did not emphasize management information science in the pre-internet era. We believe that in the network environment, management information science is in a prominent position, should be an important branch of science. In addition, the structure outlined in the figure is not all, but only serves as an example. With the further development of the network, its structure will be further enriched. In a word, through the discussion of the network information science, we are convinced that the information science will present the vigorous development momentum and the encouraging prospect in the network era. Actively exploring the structure, characteristics and tasks of the network information science, and constructing the network information science subject system which reflects the new pattern of information science and is full of vigor and vitality, will certainly promote the major innovation of the information science subject construction, and bring the prosperity of Chinese information cause. Acknowledgments. This research was supported by First Hospital of Jilin University.

References 1. Wright, S., Pickton, D.W., Callow, J.: Competitive intelligence in UK firms: a typology. Mark. Intell. Plann. 6, 95–98 (2002) 2. Sousa, R., Voss, C.A.: Quality management re-visited: a reflective review and agenda for future research. J. Oper. Manage. 1, 85–91 (2002) 3. Jaworski, B.J., Macinnis, D.J., Kohli, A.K.: Generating competitive intelligence in organizations. J. Market-Focused Manage. 12, 275–278 (2012) 4. Coase, R.H.: The nature of the firm. Ecomomics (1937) 5. Choi, S.Y., Stahl, D.O., Whinston, A.B.: The Economics of Electronic Commerce. Macmillan Technical Publishing, Indianapolis (1997) 6. Tanev, S., Bailetti, T.: Competitive intelligence information and innovation in small Canadian firms. Eur. J. Mark. 7, 175–176 (2008) 7. Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J.M., Welton, C.: MAD skills: new analysis practices for big data. In: Proceedings of the VLDB Endowment (2009) 8. Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. 2, 75–76 (1981) 9. Grant, R.M.: The resource-based theory of competitive advantage: implications for strategy formulation. Calif. Manage. Rev. (1991) 10. Hamel, G., Doz, Y.L., Prahalad, C.K.: Collaborate with Your Competitors and Win. Harvard Business (1989) 11. Adidam, P.T., Banerjee, M., Shukla, P.: Competitive intelligence and firm’s performance in emerging markets: an exploratory study in India. J. Bus. Ind. Mark. 3, 114–115 (2012)

Working Mode of Hospital Cyber Intelligence

1775

12. Zhao, J., Jin, P.: Extraction and credibility evaluation of web-based competitive intelligence. J. Softw. 8, 174–175 (2011) 13. Anand, K.S., Goyal, M.: Strategic information management under leakage in a supply chain. Manage. Sci. 3, 95–98 (2009) 14. Calof, J.L., Wright, S.: Competitive intelligence: a practitioner, academic and interdisciplinary perspective. Eur. J. Mark. 7, 137–139 (2008) 15. Moore, J.F.: The Death of Competition: Leadership and Strategy in the Age of Business Ecosystems (1996) 16. Masárová, G.: The need of complex competitive intelligence. Procedia-Soc. Behav. Sci. (2014) 17. Sewdass, N., Toit, A.D.: Current state of competitive intelligence in South Africa. Int. J. Inf. Manag. 11, 295–299 (2013) 18. Porter, M.E.: Competitive Strategy (1980) 19. Williamson, O.E.: Comparative economic organization: the analysis of discrete structural alternatives. Adm. Sci. Q. 6, 225–227 (1991) 20. Prahalad, C.K., Hamel, G.: The core competence of the corporation. Harvard Bus. 4, 123– 126 (1990)

Computer Thinking and Basic Computer Education in Colleges and Universities Wen-I Hsiao1, Jung-Fang Chen1, and Yun Du2(&) 1

Department of Business Administration, National Kaohsiung University of Science and Technology, Kaohsiung 80778, Taiwan [email protected], [email protected] 2 Yango University, Fuzhou 350015, China [email protected]

Abstract. The computer thinking is closely related to the basic education of the university computer, and the university should pay enough attention to it so as to improve the basic education quality of the computer. This paper first introduces the meaning and function of computer thinking, analyzes the relation between computer thinking and computer teaching, then researches on the current situation of computer basic education in university, and finally explores the computer education path of university based on computer thinking in order to ensure the smooth development of the basic computer education in the university. Keywords: Computer thinking  Computer teaching in colleges and universities Basic education  Education method



1 Introduction In the new era of the booming economy, many contradictions interweave and add together, and various risks and challenges are following. The accelerating process of information technology has helped the rise of computer technology, making computers permeate into all aspects of our lives. In the current field of education, computer specialty has been paid special attention, and new vitality has emerged in the teaching reform based on the continuous popularization of computer. In the practical teaching of the top colleges and universities, the computer specialty has become an important curriculum, and the university students should be required to take the compulsory computer course [1]. At the same time, colleges and universities set up the computer specialty in order to cultivate computer technical personnel who are equipped with computer thinking. Therefore, in the progress of computer curriculum reform, we should pay high attention to the cultivation of the students’ computer thinking in order to improve the overall effect of computer teaching [2].

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1776–1780, 2020. https://doi.org/10.1007/978-3-030-25128-4_232

Computer Thinking and Basic Computer Education in Colleges and Universities

1777

2 The Meaning and Effect of Computer Thinking The cultivation of computer thinking is the natural product of the long-term development of computer science. Computer thinking means that people can use the basic concept of computer science to solve the problem and design scientific system that can accurately understand human behavior and instruction. Nowadays, the understanding of computer thinking in society is still on the surface. Although computer thinking is full of human daily life and thinking, it has not really been paid attention to. In fact, computer thinking helps people understand and change the world correctly. With the development of the times, new social technologies continue to emerge, and computer technology has always occupied a leading position since it emerges [3]. Computer technology plays such a crucial role, which has an inseparable relationship with computer thinking. It is necessary to know that any science or technology that wants to develop is guided by the way of advanced thinking. As a product of contemporary social development, computer not only innovates people’s ideas, but also brings great convenience to people’s work and life, and effectively solves the problems in people’s daily life in practice. Therefore, the significance of computer thinking lies not only in its innovation, but also in its practicability. People should attach great importance to computer thinking and cultivate computer learning of university students.

3 The Relationship Between Computer Thinking and Computer Teaching Computing technology is the core of the computer technology application, so cultivating modern college students to develop computer thinking is the basic goal to realize the computer quality teaching. In the university computer teaching, the main purpose of the teaching is to train the students’ computer skills, help students use the computer thinking to properly solve the practical problems, and to train the students’ ability to observe and understand the abstract language. In the past few years, the computer teaching course in China has made many changes, and made some progress, so the teaching content is constantly changing and enriching from the simple computer theory knowledge to the training application skill and the thinking ability, and the teaching difficulty is also increasing continuously [4]. Therefore, the university teaching should pay great attention to the computer teaching, put the cultivation of the computer thinking in the core position, constantly infiltrate the computer thinking to the students in the actual teaching process, and effectively combine the current teaching goal and the teaching course system so as to promote the realization of the computer teaching goal.

1778

W.-I. Hsiao et al.

4 The Present Situation of Computer Basic Education in Colleges and Universities Computer thinking mainly solves problems through computer mode, computer knowledge and computer concept, which is a kind of thinking mode of human beings to participate in computer activities. Computer thinking is a hot research topic in basic computer education in colleges and universities. Many colleges and universities in China train students’ computer thinking in the process of computer education and solve the problem through computer thinking mode. Computer thinking exists generally in human life, and it is necessary to carry out basic education from the aspects of computer calculation method, teaching thinking and scientific theory. With the increasing development of information technology, the coverage of domestic computer and Internet technology is more and more extensive, and is becoming more and more influential. In order to meet the needs of the human society development, colleges and universities in China have set up contents of computer basic education since the nineties of last century. Although domestic colleges and universities have achieved research results in computer basic education, there is still a gap with foreign developed countries [5]. In the aspect of university computer basic education, there is no systematic educational theory and management system in domestic colleges and universities. Therefore, there may be a variety of drawbacks in the basic computer education. In the aspect of computer basic education activities, teachers and students do not attach importance to the teaching of basic computer content. In the aspect of computer basic education, it is difficult for teachers to solve the problems existing in teaching activities because they lack teaching experience, which leads to the obstruction of teaching activities.

5 The Path of Computer Education in Colleges and Universities Based on the Computer Thinking Firstly, innovating the education concept of computer teaching. Throughout the progress of computer teaching in colleges and universities, the traditional teaching methods mainly attach importance to the students’ learning of knowledge and skills, but lack enough attention to the cultivation of their thinking ability. In class, students often learn mechanically by memorizing the contents of relevant knowledge explained by teachers as examination review standards, which results in the shortage of computer practical application ability and students only learn about knowledge points but are difficult to give full play to their practical utility. In fact, the classroom teaching should be based on the cultivation of the students’ skills, while in the traditional teaching class, students only master the computer theory knowledge, but do not exercise the computer thinking and the computer ability. The teacher should help students effectively digest the rich knowledge theory and form a coherent mode of thinking, so the teacher should constantly strengthen the exercise of computer theory and practice skills. In the past computer teaching, some students do not pay enough attention to the computer course themselves, what is more, they used to regard the computer course as a relaxed course, and do not really seriously study the theory and skills [6]. Therefore, in the future

Computer Thinking and Basic Computer Education in Colleges and Universities

1779

computer teaching, teachers should improve the requirements of the students and cultivate students’ computer thinking based on the reality. Secondly, cultivating the computer thinking ability of university students. In the current college computer teaching curriculum, teachers should attach great importance to the cultivation of students’ computer thinking, take the computer thinking ability as the starting point of the course, and cultivate the students’ computer application ability. In addition, computer teaching should cultivate students’ creative thinking, which is not only helpful to cultivate students’ thinking ability, discovery ability and problemsolving ability but also fully meets the needs of computer talents in today’s society. Therefore, it is imperative to cultivate students’ computer thinking. The specific teaching measures are as follows: To begin with, the university computer teachers should set up correct teaching concepts and attach great importance to the cultivation of computer thinking and innovation thinking. In addition, university computer teachers should innovate teaching methods and use computer thinking to teach [7, 8]. For example, teachers can take the research process of the problem as the starting point of the teaching, encourage students to find out the core of the problem in the process of exploring after putting forward the teaching question based on the teaching content, help students take the initiative to explore the problem, and develop students’ computer thinking ability step by step [9]. At the same time, teachers should assign certain teaching assignments to students based on the computer classroom, so that students can study independently. In the process of exploring the problems, students can cultivate their ability to think about the problems actively. Students get the proper exercise through exploring the problem. In this way, the computer teaching is better than the ordinary teaching because the students’ computer thinking can be fully trained. Finally, innovating the computer teaching system. Teachers should strengthen students’ understanding of computer thinking, adopt image and vivid ways to deepen students’ understanding of computer thinking, and apply computer thinking to the related contents of explanation, so as to train students’ thinking and mode of solving problems [10]. Thirdly, introducing the hierarchical teaching mode in computer teaching. Computer learning has the characteristics of particularity, hierarchy and complexity, for example, computer database, computer C language and computer basic skills have obvious hierarchy. What is more, students have different computer foundation, so the layered teaching mode can be introduced to meet the needs of students and solve the problem of difference [11]. For example, students can be reasonably layered. Teachers should fully understand the characteristics of the students and design different teaching schemes based on their different characteristics because there are various differences in the students’ learning ability, psychological quality, cognitive level and intelligence level. Only in this way can they realize the layered education of students and ensure the effect of computer teaching.

6 Summary Objectively speaking, the formation of computer thinking is helpful to improve personal ability. At present, countries all over the world begin to pay close attention to the cultivation of computer talents’ thinking ability. Therefore, it can be predicted that the

1780

W.-I. Hsiao et al.

talent competition in the future will span the diversified competition of technical ability. Therefore, the curriculum reform of colleges and universities based on computer thinking should be carried out practically. In the information society with big data, computer technology has been widely used. Only by innovating the content of teaching materials, reforming the mode of innovation, combining theory with practice, can the university computer majors help students develop and enhance the competitive strength. Therefore, colleges and universities should pay greater attention to the computer majors reform in order to cultivate more professional technical personnel.

References 1. Xie, J.: Computer thinking and the basic thinking of university computer curriculum reform. China J. Multimedia Netw. Teach. (07), 37–38 (2018) 2. Ren, J.: Research and practice of computer public curriculum teaching mode based on “computer thinking”-a case study of computer public curriculum in Xi’an Aeronautical University. J. Xi’an Aeronautical Univ. 36(05), 93–96 (2018) 3. Feng, M.: Research on teaching innovation of college basic computer courses based on computer thinking. Comput. Knowl. Technol. 14(23), 141–142+153 (2018) 4. Chen, Y.: Research on the computer teaching and college computer basic education. Comput. Fan (11), 205 (2018) 5. Yongliang, Jiang, Ruihua, Pang: The basic teaching reform of college computer based on computer thinking. Comput. Knowl. Technol. 12(04), 129–130 (2016) 6. Yang, C., Xing, Y.: Research on the relationship between computer application and computer thinking. Comput. Commun. (Theor. Ed.) (03), 254–256 (2017) 7. Guo, Y.: Application-oriented classification teaching and computation thinking cultivation in colleges and universities. Wirel. Internet Technol. (01), 283–284 (2015) 8. Xu, Q., Chen, Z., Cai, J., Han, H., Sun, Q., Xu, Y.: Research on the current situation and changes of college computer basic teaching. Comput. Educ. (07), 90–93 (2015) 9. Li, P.: Research on computational thinking and computer basic teaching in higher vocational education. Telecom World (12), 248–249 (2015) 10. Mao, L.: Research on the cultivation of computer thinking ability in computer basic teaching. Comput. Softw. Appl. (09), 249 (2012) 11. Zhan, D., Nie, L., Xu, X.: University computer - a basic course of computer thinking for all college students. China Univ. Teach. (04), 15–20 (2011)

The Content and Workflow of Game UI Design Haojie Yang(&), Ziyou Zhuang, and Jianfeng Zhang Dalian Neusoft Institute of Information, Dalian, Liaoning, China [email protected]

Abstract. Objective: To research and study the content and workflow of game UI design and propose a practical guidance for the people related to the game design industry. Methods: Analyse the content of game UI design from the perspective of different human sensations. And study the general workflow of game UI design base on actual projects. Results: A brief theory and guidance for game UI design. Conclusion: The UI design of games is different from that of the other fields. Therefore, it is necessary to systematical study and analyse the content and workflow of game UI design. Keywords: Game UI design

 Content  Workflow

1 Introduction As the UI (abbreviation of user interface) of a game, its importance equals the appearance of people. The perceptions of the UI will directly affect the players’ interaction experience. Besides, it is a critical factor that determines whether the functional requirements of a game can be achieved. Therefore, the design of the game UI should have a systematic approach.

2 The Content of Game UI Design The so-called game UI refers to the interaction between users and computers, which is considered as a bridge for communication between men and machines. In the process of the gameplay, the content is presented to the players through the UI, where the players manipulate the characters and convey their thoughts to the game [1]. All of these processes require the participation of the UI to complete. To make the players have visual, auditory, sensory experience at the same time, the game UI must be a combination of visual, sound, interactive elements which are entirely in different design areas. 2.1

The Visual Element-Look

According to the research result of experimental psychology, vision is regarded as the primary way for the perception of physical forms [2]. People tell the beauty and © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1781–1785, 2020. https://doi.org/10.1007/978-3-030-25128-4_233

1782

H. Yang et al.

ugliness of an object by sight. In another word, vision is the most important channel of acceptance of external information and stimulation [3, 4]. Therefore, rich visual feedback is the key to successful game creation [5–7]. The visual form of the game interface includes the visual elements as well as the combination of these elements. As the most important key element of the game, while creating the UI, we need to grasp and thresh over the settings of operating UI including the primary colors of the UI, figures, scenes, auxiliary object models, game maps, information windows to achieve the best visual effects [8–10]. Every person has different feelings towards the vision range, and the visual process is not always static. However, usually, most details are presented to the center of vision. So the most crucial game scenes must be centered on the screen. The main game UI has the following three forms: The game world with a single scene: the entire game world is in the same game screen. Such as chess games, cards game, and mobile games. The game world with multiple scenes: similar to the scenery settings of theatre plays. The game world of scrollers: horizontal/vertical scrollers. 2.2

Audio Element-Listen

Some game designers consider audio effects as part of the player UI. As an essential part of the game, sound plays a crucial irreplaceable role in the game. Sound helps render the atmosphere and storytelling, which can get the players more involved in the story. Therefore sound design is regarded as another critical factor of modern online games. In order to bring reality to the players, the video interface or operating interface must work with the audio effects. The audio types include music, sound effects, narration, and dialogue. Music. The background music must keep consistency with the game style. Interactive music can be played according to the player’s actions and events. Sound effects. Sound effects are used to heighten the effect of the events, hence must correspond to the various actions and events. Its purpose is to provide tips to players which helps to indicate what is going on. For instance, the sound of gunfire indicates the enemy is near, while the sound of engine tells the engine is gearing up. Narration and dialogue. Since the storyline of the game is non-linear, we need the characters’ dialogue and voiceover to help connect the various stories and make the players emerged into the game world. 2.3

Interactive Elements-Sensation

The sensation is the physical and mental experience of people. Good interaction design will make a good impression on the players who have the first contact with the game. Therefore, the quality of interaction design will directly impact on the size of the customer base. As the emerging field of the software industry, the goal of interaction design is to make the software behaves more like the human, more naturally. The products are no longer limited to meet the needs of users, but to offer what the users desire.

The Content and Workflow of Game UI Design

1783

To get good interaction effects, it is not just simply place a few buttons together. The interaction and display UI screen can determine the difficulty level of the game. They should be easy to control and understand, which is one of the most challenging parts of the game design. Even if the design itself is outstanding, it is hard for players to realize it, on the contrary, a bad design will soon lead to constant complaints from the players. Once the players feel the difficulty of operation, they will lose their interest sooner or later. Therefore, interaction design must be created from the users’ point of view. Generally speaking, there are usually two approaches to interaction design: onedimensional and two-dimensional. The so-called one-dimensional operation is that the players follow the instructions step by step to achieve the goal, which is just like counting numbers one by one till the last. The two-dimensional operation is to make use of the operational resource as much as possible and match all of the selectable contents with the operational resource of players.

3 Game UI Design Workflow When the players launch the game for the first time, it will take just a few minutes to finish login and enter the game UI, which is difficult for the players to judge whether it is a good game or not, but it is long enough to give the players the first impression. This first impression has a powerful influence on the overall evaluation and interest of the players. In order to ensure the quality of the game UI, and make players enjoy the game, the game UI design must follow specific process workflow, as shown in Fig. 1.

Fig. 1. Game UI design workflow

1784

H. Yang et al.

The game UI design workflow can be divided into six steps: Step 1: Requirements Analysis Obtain primary data from the game marketing, including what kind of games are popular, how to play, the tactics that players usually use and their mental activities during the gameplay. The designers can also get inspired by observation research, expert interviews, questionnaires and so on. Step 2: Design Analysis By investigation and research, designers can proceed with conceptual design and chalk out a rough sketch of the design and document through imagination and creativity. The design content should include the basic functional structure (what functions are going to be implemented into the UI as well as their relationship), information structure (how information is displayed, how to set up the menu), the screen plan (where to display game world and where to display UI elements) and the usage of input devices. Step 3: Research and Verification After the completion of basic conceptual design, refine the design sketches to make it ready to be tested as a prototype. The most popular methods include paper prototyping (create static UI screenshots by computer graphics software like Adobe Photoshop), storyboards (like the comic books), and software prototyping. Step 4: Plan Improvements After the initial UI is formed, it needs to be continuously modified by taking visual effects, interaction design, reasonable layout, and other factors into consideration to achieve the best result. After that, the designers should test the usability of the game and optimize the UI based on the report of test assessment. Step 5: Users’ Feedback Create some tasks in advance and ask the players to test. Found out problems existing in the UI design based on the feedback from the players and make modifications accordingly and generate a new prototype version to test all over again. Repeat this process until satisfactory results are archived. Step 6: Product Publishing After completing the modification and optimization of the game UI, it comes to a new phase called product publishing. This phase is also critical to game UI design, due to the customer base will mainly depend on the success of UI design. Once the process of UI design is determined, analyze the game and summarize the design goal in details and then proceed to design under the guideline. Generally speaking, it is impossible to complete the UI design in isolation, the support of program engineers, gatekeeping of the planers as well as the executive ability of the artists are all necessary. Besides, these components are complementary to each other, which require sufficient understanding against the game.

The Content and Workflow of Game UI Design

1785

4 Conclusion Due to the significant role it plays in the game industry, UI design for games has attracted more and more attention in recent years. In this paper, we systematically discussed the principles and methods of content creation and workflow of game UI design, hoping to provide a practical guideline for UI designers who are interested in this subject.

References 1. Tracy, F.: Game Design DreamWorks. Electronic Industry Press, China (2016) 2. Xu, W.: Game Design: Deep Design Ideas and Skills. Electronic Industry Press, China (2018). (in Chinese) 3. Xie, R.: Game Design: Player Thinking: Self-cultivation of Game Designers. Electronic Industry Press, China (2016) 4. Adams, E.: Game Design: The Basis of Game Design. Machinery Industry Press, China (2017) 5. Adams, E.: Fundamentals of Game Design. Pearson Education, London (2014) 6. Saunders, K., Novak, J.: Game Development Essentials: Game Interface Design. Cengage Learning, Boston (2012) 7. Laurel, B., Mountford, S.J.: The Art of Human-Computer Interface Design. Addison-Wesley Longman Publishing, Boston (1990) 8. Ahmad, I., Hamid, E., Abdullasim, N., Jaafar, A.: Game interface design: measuring the player’s gameplay experience. In: Visual Informatics Conference (2017) 9. Bo, W.: On the usability design strategy in mobile game product interface design. Packag. Eng. 36, 49–53 (2015) 10. Wood, L.E.: Introduction: Bridging the design gap. In: User Interface Design (2018)

Application of Computer Technology in Art Design Miao Yu(&) Inner Mongolia University for Nationalities, Academy of Fine Arts, Tongliao 028000, China [email protected]

Abstract. In the process of rapid development and popularization of computer technology, the way people live and work has changed a lot. Nowadays, computer technology is more and more used in the field of art design. It promotes the transformation of art design by providing art designers with new modeling language and expression. This paper expounds the change of art design brought by computer technology, and probes into the concrete application of computer technology in art design. Keywords: Computer technology

 Art design and application

The application of computer technology in art design has formed a new art creation method. Computer art design is a comprehensive subject, which melts traditional art design and computer technology into a furnace.

1 The Changes Brought About by Computer Technology to the Art Design Work 1.1. The traditional art design tools are mainly composed of paper and pen, pigment, ruler and so on. The effect and quality of art design are closely related to the precision of the tools. It is easy to produce errors in the drawing of gauge by traditional tools, although the error is not too small, it still has some influence [1]. And the application of computer technology in art design can be solved well. To solve this problem, taking Photoshop software as an example, the designer can make full use of the functions of “history record” and “snapshot” in the art design to modify and perfect the design works accurately and without leaving any mark of modification [2–4]. Compared with previous design methods, computer technology greatly improves the efficiency and quality of art design work. In addition, the effect of art design has become richer because of the application of computer technology. Take color as an example, Photoshop software has more freedom, variety of color choices, designers can give full play to creative thinking through the use of computer technology to meet. The request of art design, let the design work be more exquisite, closer to perfection. 1.2. Make the expression of art design more hierarchical traditional art design expression is static the expression effect is slightly single [5, 6]. The application of computer technology in art design makes the expression of art design more © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1786–1789, 2020. https://doi.org/10.1007/978-3-030-25128-4_234

Application of Computer Technology in Art Design

1787

hierarchical, because it can realize the expression of dynamic form. Computer technology is a wide range of concepts, which are mainly used in art design. The software realizes the diversified expression of animation, video, audio and dynamic graphics, which makes the audience have a deeper and more intuitive understanding and feeling of the connotation of the art design works [7–9]. At present, the interactive functions in computer technology, such as Flash character animation, interactive games and web pages, are the most accepted and loved by the public, which provide a good channel for the audience to participate in artistic creation. It gives the audience the space to choose and experience independently, which greatly promotes the development of art design. 1.3. To make the ideas of art design more modern before the emergence of computer technology, some art designers’ ideas and ideas are relatively old and lack of originality; There are also some art designers have some novel design ideas and ideas, but because of technical constraints can not achieve the ideal design effect [10–12]. Computer technology solves such restrictive design problems. When After the computer technology is applied to the design of the fine art, the designer can make full use of the appropriate design software to express its own design and conception, and the computer technology provides a broad imagination space and creative space for the designer, so that the designer can no longer have the ideological shackles, the rich and developing of the design thought and concept greatly promoted the progress of the design of the fine arts.

2 The Application of Computer Technology in Art Design 2.1

The Application of Computer Technology in the Creation of Basic Patterns

In general, the process of creating basic patterns in art design is to place basic shapes of different shapes together in two-dimensional plane space for new creation. And this requires a lot of designers, because it’s a very flexible way of designing, and the same basic graphics are in the framework of multiple bones. As long as a slightly different way of placing will show a different visual effect, which for the designer’s spatial thinking. The virion must be very high. The AutoCAD drawing software in computer technology has powerful drawing function. Whether ordinary two-dimensional graphics or three-dimensional graphics, can be launched modeling creation. This software not only can effectively design and process the plane graphics, but also can combine and change the graphics. 2.2

Application of Computer Technology in Color Matching

Color collocation is one of the key links in art design. The visual effects and psychological effects of the works will be changed by the changes of collocation and combination. The traditional color collocation is mainly determined by the subjective consciousness of the designer. This way will lead to a great difference between the ideal effect and the actual image of the work.

1788

M. Yu

Test, can find the color match that accords with ideal effect most. This approach will result in the overall art design work of the efficiency is reduced. The Photoshop software in computer technology solves this problem very well. The software has the advantages of color blending and has the function of completing color filling quickly. The designer can change the color directly according to the change of idea, and then mix out the ideal color with high efficiency and high quality. 2.3

Application of Computer Technology in Stereo Design

The process of stereoscopic design requires designers to give full play to their own imagination and creativity. Not all designers are particularly capable of spatial thinking. Some designers often have confusion or confusion when constructing the space map of design works, which will hinder the smooth progress of the whole art design. Computer instant rendering technology and 3D modeling function can be used to design the Surface details are presented in a complete way, which is helpful for designers to observe the works and to modify and perfect the form.

3 The Promoting Effect of Multimedia Technology on Art Teaching 3.1

Can Stimulate Students’ Interest in Learning

Interest plays an important role in students’ learning. If it can stimulate students’ interest in learning, it can fully arouse students’ enthusiasm for learning and achieve better teaching results. Once students are interested in what they have learned, they will take the initiative to acquire what they have learned, which can not only make the knowledge more extensive, but also make the students have a stronger grasp of knowledge. By using multimedia technology, the specific pattern and learning content can be combined organically, so that the knowledge is no longer single and boring, which can improve students’ interest in learning and stimulate students. The initiative and enthusiasm of learning. It plays a great role in promoting the mobilization of classroom atmosphere and the achievement of teaching goals. 3.2

Can Improve the Efficiency of the Classroom

Multimedia teaching has the characteristics of fast and accurate. In the limited classroom time, it can save time to the maximum extent, complete the teaching progress very well, and ensure the teaching quality. In this way, teachers not only reduce their work intensity, save teaching time, but also expand the amount of teaching knowledge, so that students can see more information. Therefore, the use of multimedia technology can optimize the structure of the classroom, and ultimately improve the quality of teaching. Multimedia teaching technology can not only give full play to the leading role of students, but also reflect the subjectivity of students’ learning, teachers’ teaching and students’ teaching. A good combination of learning, so as to achieve better teaching results.

Application of Computer Technology in Art Design

1789

The application of the multimedia technology to the art teaching can fully arouse the enthusiasm of the students to study, can stimulate their imagination, and create more novel things. So that the original abstract knowledge becomes more imagespecific and is more beneficial to the students to understand and master. It is also possible to optimize the structure of the class and to do more with less. However, there may be some problems, such as shortening the teaching time, and the teacher’s teaching is not active. Therefore, in the course of practical teaching, it is necessary to attach importance to the teaching of the teacher and to attach importance to the study of the students and to study the teachers and the study in the practical teaching process from the reality of the art teaching and combining with the new multimedia technology. Students can be effectively combined to optimize teaching results. The application of computer media can transform the knowledge taught by teachers into the knowledge that students take the initiative to learn, which makes the original boring learning rich and colorful. Therefore, in the teaching process, we should make full use of modern teaching technology. Constantly enrich the richness of the classroom. Epilogue A large number of practices have proved that the application of computer technology in the field of art design can improve the level and quality of art design work. In the art design work, designers should keep pace with the development of the times at any time, so that they can better use all kinds of modern information technology to optimize the effect of art design and promote the healthy development of art design.

References 1. Yao, L.: The integration of computer technology and art design. Art Fashion (Lower issue) (10) (2014) 2. Zhang, J.: Research on the application of digital media art in architectural art design. Build. Eng. Technol. Des. (6), 387 (2016) 3. Left, C.: Research on the application of digital media art in architectural art design. Build. Eng. Technol. Des. (18), 248 (2015) 4. Zhu, X.: Analysis on the application of digital media art in architectural art design. Build. Eng. Technol. Des. 2016 (12): 3037 5. Yuan, X.: The basic teaching research of digital media art specialty of game. J. Chifeng Univ. (Nat. Sci. Ed.) (18), 242–243 (2014) 6. Xu, M.: Study on the design of computer aided art design system. J. Xi’an Univ. Arts Sci. (Nat. Sci. Ed.) (11), 51–55 (2016) 7. Qi, M.: Comparison analysis between computational and transmissible metering. Electron. Test 8(18), 8–25 (2014). (in Chinese) 8. Cao, J., Su, C.: On the advantages of computer art design. Softw. Appl. Comput. Disc 8(8), 137 (2012) 9. Qi, M.: A study on the advantage and application of computer computing in the design of American art. Electron. Test (8), 5 (2014) 10. Liu, T.: The application of computer technology in art design. Ind. Des. 20(10), 177–180 (2015) 11. Pan, C.: On the application of computer art in film and television art design. Art (12) (2015) 12. Zeng, F.: Analysis of the application of computer fine arts in film and television art design. Wirel. Interconnect. Technol. (11) (2016)

A New PID Algorithm Guoqiang Chen(&) Changchun Institute of Technology, Changchun 130021, China [email protected]

Abstract. In order to solve the disadvantages of traditional PID algorithm, such as difficulty in adapting to control parameters and poor anti-interference ability, a PID control algorithm based on network was proposed, which can realize the adaptive modification of PID control parameters. Practice shows that the algorithm improves stability, parameter adaptability and robustness of the system. Keywords: PID

 Adaptive control  Practice verification

1 Introduction Dc motor is widely used in electromechanical products because of its characteristics such as high starting torque, low energy consumption and excellent control performance [1–6]. Under certain load conditions, the smooth stepless speed regulation can be realized according to the work requirements, and the speed regulation range is wide. At present, PID control is often used to control motor. PID control after more than half a century of research and development, with its simple structure, good stability, strong robustness and other characteristics an important position [7–10]. However, traditional PID is difficult to adjust parameters, and cannot adjust parameters automatically when the control environment changes. With the research of intelligent control algorithm, there are many self-tuning PID control methods, such as the algorithm combined with fuzzy control, but fuzzy control has higher requirements for control experience due to the choice of membership function and the design of fuzzy rules. In this paper, based on neural network PID control algorithm to control motor, the algorithm make full use of the neural network self-learning function, when the control environment condition changes, such as adaptive adjustment to parameters KP, KI and Kd values, to achieve the optimal control effect and apply the algorithm to motor control system, the adaptive control of motor speed control.

2 Mathematical Model The electromagnetic torque generated by stator winding can be expressed as: T¼

ðe1 i1 þ e2 i2 þ e3 i3 Þ x

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1790–1794, 2020. https://doi.org/10.1007/978-3-030-25128-4_235

ð1Þ

A New PID Algorithm

1791

As can be seen from (1), the magnitude of the electromagnetic of the motor is proportional to the magnitude of the magnetic flux and current, so the torque of the dc motor can be controlled by controlling the amplitude of the output square wave current of the inverter. To produce a constant electromagnetic torque, stator current to square wave, trapezoidal wave counter electromotive force, and in every half cycle, the duration of the square wave current at 120° Angle. Since at any time, the stator has only two phases of conduction, the electromagnetic power can be expressed as: P ¼ e1 i1 þ e2 i2 þ e3 i3 ¼ 2EI

ð2Þ

The electromagnetic torque can also be expressed as: T¼

P 2EI ¼ x x

ð3Þ

The equation of motion is: T  Tt  Bx ¼ JPu

ð4Þ

3 PID Control Algorithm 3.1

PID Control Algorithm

The commonly used PID control algorithm is: uðkÞ ¼ uðk  1Þ þ KP ½eðkÞ  eðk  1Þ þ Ki eðkÞ ¼ Kd ½eðkÞ  2eðk  1Þ þ eðk  2Þ ð5Þ

3.2

Neural Network Algorithm

Feedforward control is adopted in this paper, and the structure of and PID control algorithm is shown in Fig. 1. Feed-forward control is adopted to realize the combination of and PID control algorithm to ensure the control response speed of the system and reduce overshoot. The control algorithm of the system is: un ðkÞ ¼

e X

x i ai

ð6Þ

i¼1

uðkÞ ¼ un ðkÞ þ up ðkÞ

ð7Þ

Where, UN (k) is the corresponding output generated by, and up(k) is the output generated by conventional controller PID.

1792

G. Chen

function calculation module

Address mapping

r(k) ·

PID control algorithm

Learning algorithm

up

un

u

·

y Controlled object

Fig. 1. Structure diagram of combined with PID control algorithm

4 Control System Simulation Research The mathematical model of the controlled object is as follows: GðsÞ ¼

s2

5e10s þ 15s þ 300

ð8Þ

Specific parameters are set as follows: rated voltage is 50 V, rated current is 3. A, the motor speed is 1 500 r/min, and the stator winding resistance is 0.5 X, stator inductance L = 0.08 H, the moment of inertia is J = 0.075 kg m2, damping coefficient = 0.01. The three parameters of PID are Kp = 0. KI = 1.3. Kd = 0.027. Take the input signal as square wave signal, and the simulation results are shown in Figs. 2 and 3. Figure 3 shows the simulation diagrams of network controller, PID controller and master controller respectively.

Fig. 2. Simulation diagram of square wave response

A New PID Algorithm

1793

Fig. 3. Simulation diagram of each controller

As can be seen from Fig. 2, the square wave response has a good tracking effect, and the system has a short adjustment time. It can respond quickly according to the changing input, showing good tracking characteristics. As can be seen from Fig. 3, each controller of the system can effectively eliminate the error amount caused by the change of input signal in a short time, so that the system remains stable. PID parameters can be quickly and accurately adaptive adjustment.

5 Conclusion It can be seen from the simulation results that the control of dc motor based on neural network PID control algorithm can improve the anti-interference ability of the system and effectively suppress errors caused by parameter changes.

1794

G. Chen

References 1. Zhang, C., Kovacs, J.M.: The application of small unmanned aerial systems for precision agriculture: a review. Precis. Agric. 13(6), 693–712 (2012) 2. Yang, F.B., Xue, X.Y., Zhang, L., et al.: Numerical simulation and experimental verification on downwash air flow of six-rotor agricultural unmanned aerial vehicle in hover. Int. J. Agric. Biol. Eng. 10(4), 41–53 (2017) 3. Park, S., Won, D.H., Kang, M.S., et al.: RIC (robust internal-loop compensator) based flight control of a quad-rotor type UAV. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 3542–3547. IEEE (2005) 4. Sarabakha, A., Fu, C., Kayacan, E., et al.: Type-2 fuzzy logic controllers made even simpler: from design to deployment for UAVs. IEEE Trans. Ind. Electron. (2017). Li, B., Tang, Y.: Application of fuzzy PID algorithm in brushless dc motor control system. Micromotor 39(2), 14–16 (2006) 5. Hall, W.E., Gupta, N.K., Smith, R.G.: Identification of aircraft stability and control coefficients for the high angle of attack regime. ADA032800, March 1974 6. Ihr, K.W., Muine, R.E.: Practical aspects of using a maximum likelihood estimation method to extract stability and control derivatives from flight data. Contract 512, 53-03 (1976) 7. Zhu, H., Huang, J., Yang, Y., et al.: Speed control of dc motor based on neural network. Power Stat. Syst. Eng. 20(1), 57–58 (2004) 8. Ma, X.: Research on compound PID control system of dc motor. Gansu Sci. Technol. 25(4), 48–50 (2009) 9. Liu, Y., Xu, X., Dai, Y.: The anti-interference maneuver control based on extended observer for quadrotor UAV. In: International Conference on Intelligent Human-Machine Systems and Cybernetics. IEEE (2016) 10. Scholz, G., Trommer, G.F.: Model based control of a quadrotor with tiltable rotors[J]. Gyroscopy Navig. 7(1), 72–81 (2016)

Application of Selective Information Integration Algorithm in Financial Credit Evaluation Jun Yang(&) Faculty of Finance, City University of Macau, Taipa 999078, China [email protected]

Abstract. How to effectively control bank financial credit assessment is of great significance to the development of banks. This study analyzed the current situation of personal credit defaults at home and abroad, and through the analysis of problems, finds that the important reason that affects the development of bank finance is that the credit evaluation system is imperfect. Therefore, based on the selective information integration algorithm, this paper constructed a financial credit evaluation model suitable for China’s banks. In order to verify the validity of the model, this paper designed a verification test to analyze the performance of the model. The research indicates that the algorithm model proposed in this study has certain effects and can provide theoretical reference for subsequent related research. Keywords: Selective integration Model analysis

 Financial credit  Evaluation analysis 

1 Introduction The degree of global financial liberalization has continued to deepen since the 1980s, and the volatility of the global market has clearly increased. Therefore, banks and investors in various countries are facing increasingly serious financial risks. In particular, the US subprime mortgage crisis that swept the world in 2007 showed that the financial operation pattern under globalization has undergone fundamental changes, and the financial supervision systems of various countries are facing unprecedented challenges. Relevant research shows that the credit risk of commercial banks has led to the crisis of the World Bank industry, and banks are facing bankruptcy [1]. Artificial intelligence technology was first developed in the 1980s and gradually developed, including expert systems, decision trees, artificial neural networks (ANN), support vector machines (SVM), genetic algorithms (Geneticalgorithm, GA), Roughset (RS), etc., which is applied to the credit rating. Each model has its own advantages and disadvantages in terms of accuracy and interpretability of prediction [2]. Both statistical models and artificial intelligence models are traditional credit models. At present, the hybrid model that combines the advantages of various methods has become a hot topic for scholars. Lu et al. formed a personal credit evaluation classification database based on the minimum reduction credit index, used rough set theory to discriminate the © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1795–1801, 2020. https://doi.org/10.1007/978-3-030-25128-4_236

1796

J. Yang

sample credit rating matched with the rule base, and used the BP neural network model of the standard genetic algorithm to discriminate the sample level that does not match any of the rules in the rule base [3]. Yu et al. combined the kernel principal component analysis and the support vector machine algorithm to construct a fuzzy support vector machine model with variable penalty factor and used the model to classify known credit data [4]. Yao et al. improved the approximate support vector machine by introducing fuzzy membership degree and proposed fuzzy approximate support vector machine. This model not only retains the advantages of the generalization ability and easy solution of the original model, but also overcomes the influence of singular points and noise on the model. The empirical results show that this fuzzy approximation support vector machine can significantly improve the accuracy of credit risk classification [5]. Jiang and Yuan combine GA and SVM to construct a combined model, use GA to select the parameters of SVM, and set the fitness function through GA to control the occurrence of “pseudo-false” misjudgments that cause significant losses to commercial banks [6]. Huang et al. proposed a two-stage genetic algorithm to study the credit rating model. This model can extract the IF. THEN rules for decision makers, which facilitates them to understand the authenticity of the data [7]. However, this inductive model has a problem in that if a sample individual does not meet any of its rules, its credit rating cannot be assessed [8]. Therefore, some scholars have proposed using inductive-based methods and function-based method integration to study the issue of personal credit evaluation. Ke et al. combined RS with BP neural network to construct a five-level classification evaluation system [9]. China’s financial institutions must constantly explore new ways to evaluate personal credit, learn advanced foreign personal credit assessment techniques and management methods, find a balance of interests between controlling risks and pursuing profits, and try to use advanced intelligent analysis methods to establish a standardized and effective personal credit assessment model plow.

2 Research Method Selective integration means that in the case of setting a target (such as accuracy, training time, stability, etc.), the goal-optimal behavior is achieved by the selection of the base classifier. In the selective integration algorithm, how to choose the base classifier is the most important problem of the algorithm. The choice of the base classifier is a process of combinatorial optimization, and the most direct method is the exhaustive method. However, the exhaustive law has the problem of a combined explosion. Especially for the case where the number of base classifiers is large, the exhaustive method does not apply. The iterative optimization method decomposes the problem of combinatorial optimization and converts it into a problem of gradual optimization, which greatly saves the selection time [10]. In this paper, in order to compare the effects of selection, this paper improves the optimization goal of GSEAN algorithm, and adds new optimization goals to improve the fitness while seeking a smaller integrated classifier as the optimization goal, which aims to improve the convergence speed of the model.

Application of Selective Information Integration Algorithm

1797

In the choice of optimization method, the GSEAN algorithm generally uses the Genetic Algorithm as the optimization algorithm. The GSEAN algorithm treats the base classifier as a gene, a group of genes form an individual, and multiple individuals form a population, and the genes in each generation of the population are integrated by algorithms such as crossover and mutation. That is, the weight of the base classifier is re-evaluated, and the goal of gene evolution is to optimize the target. Zhou Zhihua, Thompson, and Lobato conducted an empirical study on this algorithm, and obtained an integrated model with high prediction accuracy. Some scholars have chosen other methods to optimize the algorithm and also get good prediction accuracy. This section will build a selective integrated personal credit scoring model based on the FCM-CFP clustering method. The basic principle is to cluster the base classifier according to the clustering algorithm and select the base classifiers with high precision and other classifiers from each cluster to integrate, so as to improve the predictive ability of the integrated classifier on the basis of retaining the diversity of the classifier as much as possible. The construction process of the FCM-CFP model is shown in Fig. 1.

Fig. 1. Schematic diagram of selective integration process of FCM-CFP clustering method

In this model, the classifier will be filtered by Kappa coefficient. In the experiment, the threshold value k of the Kappa coefficient is set to 1.0 to remove the redundant base classifier as much as possible on the basis of the diversity of the reserved base classifier.

1798

J. Yang

3 Result According to the personal credit scoring model based on selective integration algorithm designed in the previous article, empirical research was carried out with Chinese credit samples, German credit samples and Australian credit samples as sample sets. Moreover, this paper compared and analyzed between selective integration models, selective integration models and other models, and combined empirical experiments to demonstrate the advantages of selective integration applied to personal credit scores. The credit sample set from China, Germany and Australia was used to jointly validate the advantages of the selective integrated personal credit scoring model through multiple credit sample sets. According to the sample size and sample ratio optimization results, the three sets of sample sets used are as follows.

Table 1. Credit sample table of empirical research Sample set Chinese sample German sample Australian sample

Number of indicators 10.3

Default sample size 1030

Non-default sample size 1545

Total sample 2575

20.6

309

721

1030

14.42

316.21

394.49

710.7

As shown in Table 1, the credit sample indicators of China, Germany, and Australia are optimized from structural equations and are weighted indicators. The credit sample capacity and sample ratio are determined by the optimal sample size and the optimal sample ratio, that is, the highest point of the three-dimensional surface is taken. In addition, the Chinese credit sample was randomly sampled from more than 4,500 credit samples. In order to remove the influence of redundant classifiers, four models of C4.5 (decision tree), Bayesian network, BP neural network and SVM (support vector machine) are selected based on the degree of difference. In order to further improve the prediction accuracy of the model, this paper will construct the heterogeneous classifier based on four structural models. It can be seen from Table 2 that the GASEN performance is not good due to the limitation of the rule conditions of the algorithm. Since the clustering method is affected by diversity, there are also biased results. In contrast, the predictive performance of the OO method is better (Figs. 2 and 3).

Application of Selective Information Integration Algorithm

1799

Table 2. Prediction accuracy results Method

Chinese sample Precision Misclassification rate

GASEN 78.7229 OO 79.1967 FCM79.2894 CPF

24.2771 23.8033 23.7106

German sample Precision Misclassification rate

Australian sample Precision Misclassification rate

74.263 74.3866 75.3342

85.6445 85.8917 86.5097

28.737 28.6134 27.6658

Fig. 2. Comparison image of prediction accuracy

Fig. 3. Comparison image of the misclassification rate

17.3452 17.1083 16.4903

1800

J. Yang

4 Analysis and Discussion This paper selected the GSEAN algorithm in the iterative optimization method as the basic algorithm for establishing the personal credit scoring model. Compared with other iterative algorithms, this algorithm has the advantage of high applicability to personal credit scores and can be better applied to personal credit scores. At the same time, an empirical study is carried out on the personal credit scoring model based on selective integration algorithm. In the empirical research, the establishment of the selective integration personal credit scoring model is mainly divided into four steps: the determination of the sample set, the construction of the heterogeneous base classifier, the generation of the check sample set, and the selective integration of the base classifier. Focusing on the research topic of personal credit score, this paper proposes a research on personal credit scoring model based on selective integration algorithm by combing and summarizing the personal credit scoring theory at home and abroad, the personal credit scoring method of single model, the integration model and the selection integration technology. Through the systematic analysis of the process of personal credit scoring and the applicability analysis of selective integration method, a selective integrated personal credit scoring model based on GSEAN optimization algorithm, a selective integrated personal credit scoring model based on OO sorting method and a selective integrated personal credit scoring model based on FCM-CFP clustering method were established. In addition, this paper compared the single credit scoring model, the selective integrated personal credit scoring model and the integrated personal credit scoring model from the scoring accuracy of the personal credit scoring model, the stability and applicability of the model. The research results show that the algorithm has certain effects.

5 Conclusion The study compared and analyzed the selective integration of personal credit scoring model with single credit scoring model and integrated credit scoring model. First, for the comparison between the selective integration models, the three selective integration models have their own advantages in terms of prediction performance, selection time and size of the integrated classifier. In terms of predictive performance, the OO sorting method and the FCM-CPF clustering method have better prediction performance than the GSEAN optimization algorithm, but there is no significant difference in the prediction performance of the three methods. From the base classifier selection time, the OO sorting selection speed varies linearly with respect to the number of base classifiers, so the time taken to perform the base classifier selection is the shortest. Finally, in terms of the size of the integrated classifier, i.e., the number of base classifiers, the number of base classifiers used in the GASAN integration process is the least. Finally, this paper compared all selective integration models with single models and integrated models. The results show that the selective integration model can achieve higher classification accuracy and better stability. Therefore, in the actual scoring process, commercial banks can select the scoring model according to the characteristics of the algorithm.

Application of Selective Information Integration Algorithm

1801

References 1. Qing, Y., Shuai, H., Qiang, W., et al.: Evaluation on application of China disease prevention and control information system of hydatid disease II system integration and simulation tests. Chin. J. Schistosomiasis Control 29(3), 324 (2017) 2. Andoh, Y., Yoshii, N., Yamada, A., et al.: Evaluation of atomic pressure in the multiple time-step integration algorithm. J. Comput. Chem. 38(10), 704–713 (2017) 3. Muse, A.R., Lamson, A.L., Didericksen, K.W., et al.: A systematic review of evaluation research in integrated behavioral health care: operational and financial characteristics. Fam. Syst. Health J. Collab. Fam. Healthc. 35(2), 136 (2017) 4. Miłosz, K., Labijak, A., Małgorzata, N.: Integrated framework for robustness analysis using ratio-based efficiency model with application to evaluation of Polish airports. Omega 67, 1– 18 (2017) 5. Koutsoukos, X., Karsai, G., Laszka, A., et al.: SURE: a modeling and simulation integration platform for evaluation of SecUre and REsilient cyber-physical systems. Proc. IEEE 106, 93–112 (2017) 6. Pereira, L.O., Freitas, C.C., Santaanna, S.J.S., et al.: Evaluation of optical and radar images integration methods for LULC classification in Amazon region. IEEE J. Sel. Top. Appl. Earth Observ. Remote Sens. 11, 3062–3074 (2018) 7. Liang, W., Zhao, G., Luo, S.: An integrated EDAS-ELECTRE method with picture fuzzy information for cleaner production evaluation in gold mines. IEEE Access 6, 65747–65759 (2018) 8. de Oliveira Lara-Silva, F., Michalsky, É.M., Fortes-Dias, C.L., et al.: Evaluation of chemical spraying and environmental management efficacy in areas with minor previous application of integrated control actions for visceral leishmaniasis in Brazil. Acta Tropica 176, 109–113 (2017). S0001706X16310518 9. Stylianides, A., Mantas, J., Roupa, Z., et al.: Evaluation of an integrated health information system (HIS) in a public hospital in cyprus: a pilot study. Stud Health Technol. Inform. 238, 44–47 (2017) 10. Ara, A., Khan, N.A., Razzaq, O.A., et al.: Wavelets optimization method for evaluation of fractional partial differential equations: an application to financial modelling. Adv. Differ. Equ. 2018(1), 8 (2018)

Analysis of Modern Media Information Transmission Protocol Based on Heterogeneous Network Structure Haidong Li(&) and Zhiqiang Xu Sichuan University of Media and Communications, Chengdu, China [email protected]

Abstract. The traditional digital broadcast network using the MPEG-2 TS multimedia transmission protocol has been used as a platform for distributing high-quality professional multimedia service gates efficiently, quickly and reliably. This study analyzed the MPEG-2 TS, RTP, DASH, and MMT protocols, and summarized the advantages and disadvantages of each protocol. In a heterogeneous network environment, the use of the MMT protocol has tremendous advantages, such as supporting for file transmission, supporting for media content and signaling multiplexing and demultiplexing, supporting for heterogeneous networks, supporting for error control, and supporting for file storage. The final experiment verified that using the MMT protocol has great advantages in the environment of heterogeneous networks. Keywords: Heterogeneous network MMT protocol

 Information dissemination 

1 Introduction Heterogeneous network convergence technology can integrate different wireless network resources without changing the existing communication infrastructure and provide higher data transmission rates and more reliable communication services in selected coverage areas at a lower cost. At the same time, it maintains wireless capacity while maintaining backward compatibility of the network architecture and provides a near-perfect solution to the limitations of a single wireless access technology in complex application scenarios [1]. However, different types of wireless access systems have large differences in protocol architecture and physical devices. How to design a universal adaptation layer protocol architecture to be compatible with various existing wireless access technologies, and to consider the uncertainty of future air interface technologies, and compatible with the upper layer TCP/IP protocol architecture has become a core problem to be solved by heterogeneous network convergence. Yiping et al. proposed a new architecture supporting ABC services in [2], which mainly includes three parts of functions. The first is a new access discovery mechanism that combines service location protocols and location-based services. This is followed by a new personalized network selection scheme where users can choose their own personalized “best network” by changing the weighting factor. The third is to propose a © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1802–1808, 2020. https://doi.org/10.1007/978-3-030-25128-4_237

Analysis of Modern Media Information Transmission Protocol

1803

seamless handover mechanism based on Mobile IPv6, which supports end-to-end quality of service guarantee. The authors have shown through analysis that the architecture can bring benefits to both network operators and users. Perera et al. [3] proposed a mobility toolbox architecture for scenarios where multiple mobility protocols coexist in all-IP networks in the future. The architecture allows mobility management mechanisms to be selected based on the network environment, and supports protocols such as Mobile IPv4, Mobile IPv6, NEMO, HIP, etc., and presents the design of the Mobility Toolkit as an integral part of the Ambient Networks architecture. In [4] and [5], Eastwood and Pontes et al. demonstrated how to use the IEEE 802.21 mediaindependent switching framework to seamlessly integrate and switch IEEE 802.11 and IEEE 802.16 networks by investigating heterogeneous network fusion schemes of IETF, 3GPP/3GPP2, IEEE and other standardization organizations. Song et al. proposed a new network architecture for IEEE 802.16 network and 3GPP network convergence in [6]. A new network component, Data Forwarding Function (DFF), is introduced in the network architecture to eliminate data loss during vertical handover. Through simulation analysis, the authors show that this scheme can effectively reduce data loss during vertical handover, and it has universality and can be applied to other wireless access technologies. In the literature [7], Salkintzis et al. categorized and analyzed WLAN/3G wireless network convergence technologies and architectures, and the interoperability conditions covered are: (1) General billing and customer service (2) 3G-based access control and billing (3) Access 3G packet switching services (4) Access 3G packet switching services and ensure service continuity (5) Access to 3G packet switching services and ensure seamless service continuity (6) Access to 3G circuit-switched services and ensure seamless mobility The second and third scenarios are mainly discussed, and the conclusion that 3G users can obtain performance gain from IP connection hotspots with high throughput is obtained.

2 MPEG-2 Transport Stream The MPEG-2 Transport Stream (MPEG-2 TS [1]) is a packaged specification for realtime transmission of code streams for audio, video and control data as defined in the MPEG-2 standard. In the MPEG-2 TS transport stream, a number of transport stream messages of length 188 bytes are included, and each TS message contains a 4-byte header and a 184-byte payload. The header of the MPEG-2 TS message contains the important packet identifier (PID) of the TS transport stream, and the PID can distinguish different types (such as audio and video) transport stream messages. The PID identification of the streaming media packets of different applications in the multiplexed MPEG-2 TS is different and unique. The MPEG-2 TS realizes clock synchronization between the codec and synchronization of audio and video decoding and playback by clock information inserted during multiplexing. However, the fixed 188byte stream in MPEG-2 TS is not very suitable for ultra-high definition video services based on IP distribution, and also lacks error control and QoS support [7]. A normal program receiving process is shown in Fig. 1:

1804

H. Li and Z. Xu

(a) First, the synchronization is completed by looking up the sync byte 0  47 in the TS byte header. (b) Then the PAT table is parsed to get the program list and the PID number of the PMT corresponding to each program. (c) The PMT table is searched to obtain the substream collection corresponding to each program. (d) The collected TS packets are restored to PES packets and sent to the upper layer video or audio decoder.

Fig. 1. TS stream achieves program multiplexing

In order to address these technical challenges of existing standards and to support the multimedia heterogeneous network environment and the widespread need for network-friendly transmission of next-generation broadcast systems, MPEG has embarked on a new international standard for custom transmission and synchronization technologies, namely MPEG Media Transport (MMT for short). It absorbs the main advantages of MPEG-2 TS and simplifies some unnecessary complex attributes in the IP environment. For the difficulty of PCR synchronization, MMT uses the NTP clock to keep the multi-source content synchronized. In order to cope with the complex environment of the heterogeneous network, MMT adopts the AL-FEC mechanism to ensure transmission reliability. In order to get rid of the single media service of the traditional broadcasting system, MMT allows to display rich multimedia resources such as texts and pictures through HTML5 technology and signaling mechanism. However, it also has its shortcomings in FEC design. FEC encoding is performed for each resource, which causes an increase in the amount of data and real-time performance is difficult to guarantee. In addition, the signaling that is very important for resource files does not provide a protection mechanism [8]. MMTP is an application layer transport protocol designed to efficiently and reliably transmit media information. The MMTP protocol is available for both timed and nonsequential media data and it offers several improved features. The MMTP protocol also supports multiplexing of media data and signaling messages within a single data

Analysis of Modern Media Information Transmission Protocol

1805

stream. Only one MMTP payload can be carried in an MMTP packet. Moreover, an MMTP packet format does not support aggregation of multiple MMTP payloads and partitioning of single MMTP payloads. The MMTP protocol defines two packet modes: the transfer mode of the general file and the mode of the MPU. The former defines a media data packet mode based on the payload size, and the latter defines a packet mode based on the data type within the payload. The MMTP protocol supports a mix of two modes in a single transport session, and a packet stream of an MMTP packet can be arbitrarily composed of two types of payloads. At the same time, the MMTP protocol also provides a means to calculate and eliminate the jitter introduced by the underlying transport network to achieve a constant delay of the data stream. In addition, by using the timestamp field of the packet header, jitter can be accurately calculated without introducing additional signaling information and protocols [9] (Figs. 2 and 3).

Fig. 2. End-to-end architecture of MMT

3 MMT Error Protection An application layer forward error correction mechanism is provided in the MMT protocol to ensure reliable transmission of data packets in the network. The FEC mechanism of the MMT includes generating a source symbol block according to the MMTP packet, generating a corresponding repair block by the encoder through the encoder, and transmitting the source data block and the repair block through the MMT protocol. Table 1 shows the architecture of AL-FEC in MMT. The MMT sending entity determines which resources need to be FEC and generates corresponding source data streams. One or more resources are protected in one source data stream, and corresponding coding configuration information is transmitted through signaling. When the data stream passes through the MMT FEC mechanism, corresponding source data streams and repair data streams are generated. At the receiving end, the MMT FEC mechanism recovers the original data stream based on the received source data stream and the repair data stream [10].

1806

H. Li and Z. Xu

Fig. 3. MMT’s AL-FEC architecture Table 1. Comparison of functions of MMT, MPEG-2 TS, RTP Features

MMT

File sending

Support (MFU/MPU) Support

Multiplex media content and signaling Demultiplexing media content and signaling Heterogeneous Network Error control Support storage

Support Support Support (ALFEC) Partial support

MPEGE2TS Partial support Support Not support Not support Not support Partial support

RTP

DASH

External agreement Not support

Partial support Not support

Not support Support External FEC framework Not support

Not support Support Not support

4 Analysis and Discussion Most broadcast systems today still use MPEG-2 TS as their media transmission method, and MPEG-2 TS may only be suitable for broadcast systems. One disadvantage of MPEG-2 TS in hybrid transmission is that providing non-real-time media content is not feasible because the use of MPEG-2 TS to transfer content files is quite complicated. For RTP, media file transfer and integration can be independent. However, RTP lacks the multiplexing characteristics of media components and signaling, and there is also a very big problem that RTP does not specify its storage format. Compared to MPEG-2 TS, MMT supports full file transfer, which is more widely

Analysis of Modern Media Information Transmission Protocol

1807

applicable than MPEG-2 TS. In contrast to RTP, MMT supports multiplexing of media components and signaling and specifies the storage format of the MMT itself. MMT has undoubtedly demonstrated obvious advantages over MPEG-2 TS and RTP. Moreover, MPEG-DASH is based on the HTTP protocol, and the connectionoriented features are not well suited to the one-way transmission requirements in heterogeneous networks. In addition, the file-based access method makes the client start time longer. Therefore, in the environment of heterogeneous networks, the use of the MMT protocol has tremendous advantages.

5 Conclusion This paper studied the existing and several network media transmission protocols and their respective characteristics. At the same time, this paper introduced the existing various transmission protocols and analyzes their respective advantages and disadvantages. The first is to introduce the TS protocol adopted by the traditional broadcast television system, and analyze its decoding process, and discuss the characteristics of program multiplexing and error control. The second is to introduce the current mainstream multimedia transport protocol RTP protocol and analyze the benefits of RTP application in the field of video transmission, and RTP provides end-to-end real-time transmission services. Third, we introduced the MPEG-DASH protocol and introduced its approach to stream synchronization and error control. The fourth is to introduce the MMT protocol, including its data model, signaling design and error protection. Finally, we discussed the advantages and disadvantages of these kinds of protocols.

References 1. Zhang, Z., Ma, Z., Xiao, M., et al.: Modeling and analysis of non-orthogonal MBMS transmission in heterogeneous networks. IEEE J. Sel. Areas Commun. 35, 2221–2237 (2017) 2. Yang, W., Hongjie, C., Sunan, W.: Resource allocation of wireless backhaul in heterogeneous network based on the large-scale MIMO. Future Gener. Comput. Syst. 88, 117–126 (2018) 3. Wang, X., Zhang, Y., Xu, M., et al.: Development of integrated network platform for heterogeneous agricultural information remote monitoring terminal. Nongye Gongcheng Xuebao/Trans. Chin. Soc. Agric. Eng. 33(23), 211–218 (2017) 4. Rong, C., Mingxue, C., Qianbin, C., et al.: An optimal joint user association and power allocation algorithm for secrecy information transmission in heterogeneous networks. Wirel. Commun. Mob. Comput. 2017, 1–13 (2017) 5. Kim, Y.J., Song, H.K.: Enhanced performance using precoding scheme with limited feedback information in the heterogeneous network. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100(3), 916–919 (2017) 6. Gai, K., Qiu, L., Chen, M., et al.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017)

1808

H. Li and Z. Xu

7. Chen, C., Qiu, T., Hu, J., et al.: A congestion avoidance game for information exchange on intersections in heterogeneous vehicular networks. J. Netw. Comput. Appl. 85, 116–126 (2017) 8. Wu, Z., Wu, Y., Wu, Z.G., et al.: Event-based synchronization of heterogeneous complex networks subject to transmission delays. IEEE Trans. Syst. Man Cybern. Syst. 99, 1–9 (2017) 9. Xu, C., Wang, P., Xiong, C., et al.: Pipeline network coding-based multipath data transfer in heterogeneous wireless networks. IEEE Trans. Broadcast. 63(2), 1–15 (2016) 10. Pervaiz, H.B., Musavian, L., Ni, Q., et al.: Energy and spectrum efficient transmission techniques under QoS constraints toward green heterogeneous networks. IEEE Access 3, 1655–1671 (2017)

Application of Cloud Computing Information Processing System in Network Education Haiqing Xu(&) Dianchi College of Yunnan University, Kunming 650000, China [email protected]

Abstract. With the goal of realizing computer hardware resources, software resources, teaching resources and other resource sharing and teacher-student interaction, the cloud computing teaching platform has built a cloud education platform with complete functions, stability, efficiency and security. Based on the application development platform launched by cloud computing, this paper developed the application of college education system. At the same time, this paper expounds the cloud computing theory, the architecture of cloud computing, the structural model of cloud computing, and analyzed the abstract model and overall technical architecture of infrastructure cloud services. In addition, this paper designed and built an infrastructure cloud service platform and implemented a college network education platform based on cloud computing. Keywords: Cloud computing Data analysis

 Information processing  Network education 

1 Introduction The importance of current science and technology and education is self-evident. Countries all over the world regard technology and education as the top priority of the country. With the popularity of the Internet, modern education based on computer networks has gradually received the attention of the government and the industry. Moreover, in today’s society where information technology and knowledge economy are developing at a high speed, how to effectively use online education has become one of the major issues of governments around the world, and various special plans have been formulated and implemented. Developed countries use their inherent economic advantages to rapidly develop in the field of information education [1]. Cloud computing is the third wave of innovation in the IT industry following PCs and the Internet and has grown rapidly since 2008 [2]. The foreign cloud computing industry started relatively early, and the technology development is relatively mature. The industry has gathered many well-known cloud computing service providers including Amazon, Google, Microsoft, VMware, and Racespace. Among them, Amazon, as the top service provider in the cloud computing industry, accounts for 41%–43% of the global cloud computing market share [3], and its products mainly include Elastic Compute Cloud and Simple Storage Service (S3). EC2 is a platform for users to access cloud servers through Web services, and users can install and run any © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1809–1815, 2020. https://doi.org/10.1007/978-3-030-25128-4_238

1810

H. Xu

software applications they need on EC2, which provides users with adjustable cloud computing capabilities. Amazon S3 is an online storage service provided by Amazon, and users can easily store digital data such as documents, videos, and images on the cloud server through the S3 service. Google is the largest application of cloud computing technology, and it has more than 30 data centers around the world, and the total number of servers exceeds 1 million. Moreover, it has launched many cloud computing services including Google App Engine, Google Cloud Storage, Google Docs, Gmail, and more. Its core technologies GFS, MapReduce and BigTable are known as the troika of distributed computing technology. In addition, Microsoft has launched its large enterprise cloud platform, Azure, to provide users with cloud computing services such as NET applications, SQL applications, SharePoint, Dynamics CRM, and Live applications. Since then, VMware, Racespace, IBM, Citrix and other companies have also joined the development and promotion of cloud computing technology, which promotes the prosperity of the cloud computing market. China’s cloud computing industry has developed rapidly in recent years, and the industrial layout has gradually become clear, but the overall situation is still in its infancy [4]. At present, China has formed four cloud computing strategic development bases, namely, “Huanyuhai Cloud Computing Industry Circle”, “Yangtze River Delta Cloud Computing Industry Circle”, “Pearl River Delta Cloud Computing Industry Circle” and “Central and Western Cloud Computing Industry Circle”. At the same time, through cooperation with foreign companies such as Amazon, Microsoft, IBM, SAP, etc., it has strongly promoted the development of China’s cloud computing industry. Alibaba, Shanda, Sina, Tencent and other domestic IT service providers have also joined the research and development of cloud computing, and launched a series of cloud service products, such as Alibaba Cloud Elastic Computing [5], Shanda Cloud Host [6], Sina App Engine et al. [7]. The main content of this research is the design and implementation of the distance education system based on MVC mode. It mainly uses high-tech means to provide students with better and more convenient learning mode based on the reality education mode.

2 Cloud Computing Platform Design The virtualization layer is designed primarily by using an open source infrastructure cloud service management software, Eucalyptus. The virtualization layer needs to choose the right node because it is a key layer in the entire platform. The resource pool layer selects resources from the pooled resource pool layer and packages them to form computing resources of different sizes according to the needs of users or services, thus obtaining the virtual machine that we are most familiar with [8]. At the virtualization layer, Eucalyptus, an open source software for managing the infrastructure cloud service platform, is used, and the node control components of Eucalyptus, which can perform shutdown, check, start, and cleanup, are installed on them. In order to access the underlying virtualization layer and virtual resources, it is necessary to install the corresponding components on the two servers deployed on the management layer. In addition, management ultimately translates the corresponding requests from the service

Application of Cloud Computing Information Processing System

1811

layer into access to virtual resources. On the issue of installing a deployment server, one server installs the cloud controller component and the other installs a cluster controller component and a storage control component with nodes that connect the connection service layer and the virtualization layer. The overall architecture of the design is shown in Fig. 1 [9].

Fig. 1. System overall architecture design

This paper wants to design a resource pool layer to build less resources and lighter, the virtualization layer configuration and management operations are simpler, and it is conducive to building a private cloud service platform in the network environment, so that their own designed image files can be placed on the infrastructure cloud service platform to run these images. The cloud computing-based education platform system architecture design is shown in the Fig. 2 [10].

Fig. 2. Design image of the cloud computing-based education platform system architecture

1812

H. Xu

3 The Overall Design of the Network Education Platform Based on cloud computing, a cloud education system research solution was built, and a unified and open cloud education system was developed using Google App Engine on the existing Google cloud computing platform. At the same time, related theories such as cloud computing, the core architecture of Google App Engine, and the interface service technology provided by it have been researched and analyzed. In addition, this paper provides a detailed analysis of the traditional decentralized model of building online learning platforms. Aiming at its shortcomings, combined with the advantages of cloud computing, this paper proposed a research program based on cloud computing to build an educational learning platform, and analyzes and designs the architecture and functional requirements of the entire cloud learning platform. Finally, the main functional modules of the education cloud system were developed using the Google App Engine development platform, the Eclipse integration environment, and the Java web technology. Moreover, the specific implementation of system function interface, business logic, data persistence and system security were analyzed and elaborated. The architecture of the university network education platform based on cloud computing is shown in the following Fig. 3.

Fig. 3. Architecture of university network education platform based on cloud computing

The functional modules of the university network education platform based on cloud computing are shown in the following Fig. 4.

Application of Cloud Computing Information Processing System

1813

Fig. 4. The functional modules of the university network education platform based on cloud computing

4 System Test Evaluation The cloud service process includes: pending approval, pending allocation, normal, abnormal, stop, logout, and so on. After receiving the resource request, the infrastructure service will generate a resource service item and mark it as pending status. After the administrator approves the approval, it is marked as the status to be allocated, waiting for the resource allocation and host configuration to complete. After the cloud host configuration takes effect, the resource service project is marked as normal and the service can be delivered to the user. If the resource allocation is abnormal, such as insufficient resources and insufficient user level, it is marked as abnormal and needs to be processed by the administrator. When the resource service expires, the service status is automatically marked as stopped, and the resource configuration engine module is requested to cancel the access permission of the related resource, and the original resource allocation generates the virtual machine image for a period of time. After the user logs out, the status of the related service item is marked as logout and all resources are released. The implementation of the system function requires the following steps. First, the rough framework is designed, then the code is written according to the system requirements, then the program is debugged, and finally the system is summarized. The most important of these is the two steps of writing code and debugging the program. In this design, what impressed me the most was the debugging of the system. During the debugging process, I encountered a lot of problems, but after I kept checking the information, the teacher’s guidance, and the classmates’ discussions, these problems were gradually solved. The solution cloud computing platform will run normally using several servermanaged system management modules, which are a very important part of the IT architecture. Moreover, as a foundation for supporting the entire business platform and application platform and ensuring its smooth operation, it must obtain more reliable and continuous operation and maintenance.

1814

H. Xu

Education customers have multiple application systems, and each user may have access to one or several application systems, which requires each user to manage and maintain multiple sets of accounts in multiple application systems. Typically, these applications use a variety of products, vendors, architectures, back-end databases, and so on, and are classified as heterogeneous systems. Moreover, the respective account information is usually discrete in different directories, databases or other IT network infrastructures. Since these applications cannot be synchronized, it causes a lot of this information to be redundant, inconsistent or useless, which inevitably increases the risk of conflict. Moreover, managing this information is even more painful and requires expensive investment, and there may be potential security holes. As the information technology of educational customers continues to deepen, application systems are gradually increasing, and this situation is becoming more and more complicated. At the same time, the administrator has to manually record a large amount of identity information. However, it is often only when a fault occurs that it can be informed that a certain information has changed or that the information has become out of sync and multiple versions have appeared.

5 Conclusion Based on the research of cloud computing theory, cloud computing architecture and cloud computing structure model, this paper analyzed the abstract model and overall technical architecture of infrastructure cloud services, designed and built an infrastructure cloud service platform, and finally implemented a cloud-based college network education platform. At the same time, this paper builds the designed scheme and builds it from three aspects: hardware environment, software environment and network environment. It implements the process from the decentralization of IT resources to the final pooling and presentation in the form of services. In addition, this paper implements and tests the network education platform based on cloud computing and its modules. Moreover, all applications and data sources are provided in a unified manner, and the way information is provided can fully meet the unique needs of different users. All in all, the method of this paper reduces the complexity of system application, promotes the application and promotes the reuse of educational resources, eliminates three types of isolated islands, improves the level and efficiency of education management, and effectively reduces the total cost of ownership and reduces duplication of investment.

References 1. Anshari, M., Alas, Y., Guan, L.S.: Pervasive knowledge, social networks, and cloud computing: e-learning 2.0. Eurasia J. Math. Sci. Technol. Educ. 11(5), 909–921 (2015) 2. Babin, R.: Cloud computing e-communication services in the university environment. J. Inf. Syst. Educ. 15(1), 55–67 (2017) 3. Xu, B., Xu, L., Cai, H., et al.: The design of an m-Health monitoring system based on a cloud computing platform. Enterp. Inf. Syst. 11(1), 17–36 (2017)

Application of Cloud Computing Information Processing System

1815

4. Hartmann, S.B., Braae, L.Q.N., Pedersen, S., et al.: The potentials of using cloud computing in schools: a systematic literature review. Turk. Online J. Educ. Technol. 16(1), 190–202 (2017) 5. Contractor, D., Patel, D.: Trust management framework for attenuation of application layer DDoS attack in cloud computing. In: International Federation for Information ProcessingPublications - IFIP, vol. 374, pp. 201–208 (2017) 6. El Mhouti, A., Erradi, M., Nasseh, A.: Using cloud computing services in e-learning process: benefits and challenges. Educ. Inf. Technol. 23, 893–909 (2017) 7. Pinto, M.F., Marcato, A.L.M., Melo, A.G., et al.: A framework for analyzing fog-cloud computing cooperation applied to information processing of UAVs. Wirel. Commun. Mob. Comput. 2019(2–4), 1–14 (2019) 8. Yang, J., Jiang, B., Song, H.: A distributed image-retrieval method in multi-camera system of smart city based on cloud computing. Future Gener. Comput. Syst. 81, 244–251 (2018) 9. Yu, H., Patnaik, S., Ji, S., et al.: Design and implementation of multi-agent online auction systems in cloud computing. Int. J. Enterp. Inf. Syst. 13(1), 50–66 (2017) 10. El-Sayed, H., Sankar, S., Prasad, M., et al.: Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6, 1706– 1717 (2018)

Research on Information Collection and Management of Improve ESIA’s Internet of Things Devices Kairong Chen and Hua Liu(&) College of Medical Information Engineering, Guangdong Pharmaceutical University, Guangzhou 510006, Guangdong Province, China [email protected] Abstract. At present, the management process of some enterprise equipment lacks information means, which is the key to the following problems, such as low equipment management efficiency, poor real-time data and difficulty in realtime sharing. In view of this paper optimized the equipment management business process of a heavy machinery enterprise, studied the equipment state management data collection method and mobile terminal acquisition method, and built the equipment state management model and equipment state statistical data model based on the Internet of Things + APP. Based on this, the device state management information system and the mobile terminal APP application were designed. The research results show that the method proposed in this study has certain effects. Keywords: ESIA Data collection

 Internet of Things  Equipment information 

1 Introduction At present, there is a lack of information management tools in the process of device state management, which leads to problems such as low management efficiency, inability to share information in real time, query and collection, etc. At the same time, the device state management process lacks statistical analysis of the device status data, so that the device’s potential effective information cannot be found, and the life cycle dynamic management of the device cannot be effectively performed to ensure the safe and normal operation of the production. In the mid-1980s, foreign countries began to study equipment state management systems, and their application fields were very extensive. In the medical field, Ruben and others have realized the real-time information on the use status of medical equipment after developing the medical equipment management system, which has effectively improved medical safety [1]. In the petrochemical industry, Kim et al., based on the research that the production process and equipment information of petrochemical enterprises are isolated from each other and cannot fully play their roles, proposed a flow chart equipment monitoring and management system based on SVG dynamic technology [2]. Deyu et al. established an online monitoring system for © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1816–1822, 2020. https://doi.org/10.1007/978-3-030-25128-4_239

Research on Information Collection and Management

1817

electrical equipment based on wireless sensor networks, which solved the problems of fault diagnosis and maintenance [3]. Xu et al., after analyzing the feasibility of Prognostic and Health Management (PHM) technology in the state management of environmental testing equipment, proposed a PHM-based environmental testing equipment state management system [4]. In order to facilitate equipment managers to make timely decisions based on equipment diagnostic data, Charavay et al. proposed a wireless plug-and-play system based on comprehensive productivity maintenance and lean methods to facilitate reliable diagnostic equipment status [5]. Rutschmann et al. studied the problem that the state information of the equipment management system is inconsistent with the actual state information. Moreover, he applied the Internet of Things technology to realize real-time collection and update of equipment fault status information, but this method does not have real-time reporting and query function of equipment fault information anytime and anywhere [6]. Steinbauer et al. studied how the enterprise resource planning system affects the decision of the middle and upper managers of the enterprise and how the enterprise resource planning (ERP) system affects strategic knowledge management and in what direction influences the enterprise to be more innovative and competitive advantage [7]. Bosch et al. studied a wireless sensor microsystem containing data acquisition systems such as sensors, signal conditioning circuits, analog-to-digital converters and RF communication modules [8]. Shu et al. proposed a data collection architecture called CoDA that brings together heterogeneous things to create a distributed global data model [9]. Xihai et al. studied a multi-sensor automatic data acquisition system for CNC turning equipment in real-time production environments [10]. This paper takes a heavy machinery enterprise as the research background and studies the equipment state management information system based on the Internet of Things. At the same time, according to the attribute categories of lean and informatization and equipment status data, statistical analysis of equipment status data is carried out to realize equipment status decision management, equipment information integration and sharing. In addition, this study lays a theoretical foundation for the realization of equipment state management system design and equipment state management system and intelligent terminal collaborative management functions.

2 Research Method As an important sensing device of sensing technology, the sensor can realize data perception to the external environment, people and things. It is a physical device that detects and senses external signals, physical conditions (such as light, temperature, humidity) or chemical conditions (such as gas components) and transmits the detected information to other devices. In heavy machinery enterprises, there are many CNC equipments with PLC and other processing modules, which can collect and store parameters such as machine tool start-up time and equipment processing time and provide data foundation for statistical analysis of equipment. However, the processing modules such as PLCs carried by each numerical control device are limited, and the data that can be collected is also limited, and the information that the enterprise needs to collect is relatively large. Therefore, it is only by relying on the PLC carried by the

1818

K. Chen and H. Liu

numerical control equipment itself to process the module, which obviously cannot meet the requirements of data acquisition. As the main link of the device state management system, information collection is the first step to realize device state management. Figure 1 is a data acquisition scheme for the state of the device in combination with the sensing technology and the PLC. In the figure, the field device layer applies sensors and PLC to realize real-time acquisition of operational data; the network layer uploads the collected operational data to the server for processing and storage, and the application layer uses the intelligent terminal and the PC (personal computer, PC) to complete the management of device information entry and monitoring.

Fig. 1. Data acquisition scheme of device state combined with sensing technology and PLC

Fig. 2. Process flow of device data

Research on Information Collection and Management

1819

Figure 2 is the data processing flow of the device. When the equipment starts to work, the PLC and the sensor carried by the numerical control equipment start to collect the operating parameter data of the equipment, and then simplify the processing of the collected data, including signal transformation processing, data abnormality judgment processing, etc. After that, according to the results of the data abnormality judgment, it is processed in two cases: If the data is normal (NO), the data is directly stored, and a new round of data collection is performed. If the data is abnormal (YES), the abnormal data is stored, and the system prompts the alarm and then performs the fault repair process (fault repair process).

3 Programming of Equipment Terminal The device status management system implements the real-time access function of the mobile terminal, which can realize the effect of real-time query and report on the status of the device and the like by the various types of personnel of the device management. The user needs to install the device state management APP application on the smart terminal for the first time. After installation, the user clicks the APP to input the correct username and password, and then enters the APP interface to perform business operations, as shown in Fig. 3a. The functions of the mobile terminal APP program are: personal center, home page navigation and two-dimensional code scanning modules. The home navigation function covers various sub-modules of the device status management system, including: device assets, device reports, equipment failures, equipment accidents, equipment surveys, and so on. Its purpose is to be able to quickly send device information to relevant management personnel in order to make corresponding processing work, to ensure the real-time and accuracy of information. Taking the device fault as an example, when the device fault module is selected on the home page, the user will enter the “fault record” page, as shown in the b diagram of 3. At this time, the page displays all the faulty devices. When the user selects the device to be viewed or directly clicks the QR code to scan the device label, the Device Fault Record Details interface will be displayed directly, as shown in the c diagram of 3. At this point, the user can view the device fault information or report the fault. When the character icon at the upper left of the figure a is clicked, the user enters the personal center setting. The personal center is mainly to maintain system settings such as user information, password modification, help feedback, and logout. The two-dimensional code scanning icon is located at the upper right of a diagram of Fig. 3, and the mobile terminal APP is provided with a two-dimensional code scanning function to facilitate various types of management personnel to query and report device information. Therefore, by scanning the QR code tag generated by the device status management system for each device, the required information can be quickly queried.

1820

K. Chen and H. Liu

Fig. 3. Device fault management interface of the mobile terminal

4 Analysis and Discussion Device status data is the basic data of device status management, and the fast real-time and correct data of the collection methods affect the device status management. And the fast and real-time and data correct of collection methods affect device status management. Combining the actual system requirements of the enterprise with the existing production conditions, this paper uses the Internet of Things technology, that is, an acquisition method combining a sensing technology with an acquisition module such as a PLC of a numerical control device and a combination of a two-dimensional barcode and a mobile terminal APP, to realize the information management of the equipment status at anytime and anywhere on the site, to ensure that the on-site staff can pay attention to and grasp the dynamics of the production equipment at any time, and achieve the real-time reporting and query purposes of the equipment status information, including device information collection, information identification and APP application. After a period of implementation of the equipment state management information system based on the Internet of Things in a heavy machinery enterprise, the system has been gradually improved and improved in the process, and the following effects have been achieved. (1) The system adopts the optimized equipment state management business process, which can effectively reduce the time spent in the finance department (1 month), improve the equipment management efficiency by more than 50%, and ensure the efficient operation of equipment management.

Research on Information Collection and Management

1821

(2) The efficiency of device data collection is improved, and the real-time and accuracy of data is ensured, which lays the foundation for equipment management and statistical analysis of data. (3) The device state management system and the mobile terminal APP collaborative management function are realized, which has changed the traditional device management mode of the enterprise for many years, realized the device management innovation, and achieved the purpose of real-time monitoring of the device state, real-time uploading and querying of information. (4) Through the designed device state management system and mobile terminal APP, the device status query function can be realized anytime and anywhere, which effectively ensures that the device is in a good technical state, and it is expected to improve the overall efficiency of the device by more than 20%, and also achieve the purpose of reducing the device failure rate and improving the device integrity rate.

5 Conclusion Firstly, data acquisition method based on IOT device status: According to the actual situation of the enterprise, two data acquisition methods combining sensor and PLC, two-dimensional code and mobile terminal APP are proposed, which realize real-time uploading, sharing and querying of device information. The method has the characteristics of mobile management, can achieve the purpose of mastering the dynamics of the device at any time, and lays a foundation for designing the device state management system. Secondly, device state management model and data statistics model were built: The process of collecting, transmitting and applying the whole data of the device is analyzed, and the device state management model based on the Internet of Things + APP is established. At the same time, based on the analysis of the data attribute categories of the equipment, the equipment state statistical data model is established to guide the equipment management work, and also lays a theoretical foundation for designing the equipment state management system. Thirdly, the device state management information system and APP were designed: Based on the optimized business process, data collection method and actual needs of the enterprise, the system framework design, function module design and database design are carried out. The system can realize different division functions of business responsibility. Acknowledgement. The research in this paper was supported by the grant from 2017 research project of College of Medical Information Engineering, Guangdong Pharmaceutical University.

References 1. Ruben, C.H., Rafael, D.S.J., Maristela, D.H., et al.: Distributed data service for data management in internet of things middleware. Sensors 17(5), 977 (2017) 2. Kim, D.Y., Hwang, S.H., Kim, M.G., et al.: Development of Parkinson patient generated data collection platform using FHIR and IoT devices. Stud. Health Technol. Inf. 245, 141– 145 (2017)

1822

K. Chen and H. Liu

3. Deyu, Z., Ying, Q., Liang, S., et al.: Two time-scale resource management for green internet of things networks. IEEE Internet Things J. 6, 545–556 (2018) 4. Xu, X., Zhang, L., Sotiriadis, S., et al.: CLOTHO: a large-scale internet of things-based crowd evacuation planning system for disaster management. IEEE Internet Things J. 5(5), 3559–3568 (2018) 5. Charavay, C., Segard, S., Nathalie, P., et al.: SeedUSoon: a new software program to improve seed stock management and plant line exchanges between research laboratories. Front. Plant Sci. 8, 13 (2017) 6. Rutschmann, S., Detering, H., Simon, S., et al.: Colonization and diversification of aquatic insects on three Macaronesian archipelagos using 59 nuclear loci derived from a draft genome. Mol. Phylogenet. Evol. 107, 27–38 (2016) 7. Steinbauer, M.J., Irl, S.D.H., González-Mancebo, J.M., et al.: Plant invasion and speciation along elevational gradients on the oceanic island La Palma, Canary Islands. Ecol. Evol. 7(2), 771–779 (2017) 8. Bosch, J., Olsson, H.: Towards evidence-based organizations: learnings from embedded systems, online games and internet of things. IEEE Softw. 33(1), 218–225 (2017) 9. Shu, L., Mukherjee, M., Pecht, M., et al.: Challenges and research issues of data management in IoT for large-scale petrochemical plants. IEEE Syst. J. 12, 2509–2523 (2017) 10. Xihai, Z., Mingming, Z., Fanfeng, M., et al.: A low-power wide-area network information monitoring system by combining NB-IoT and LoRa. IEEE Internet Things J. 6, 590–598 (2018)

Computer Aided Tourism Platform Design and Route Planning Nan Chen(&) and Yuying Chen School of Culture Industry and Tourism Management, Henan University, Kaifeng 475001, China [email protected]

Abstract. With the increase of people’s income and the increase of leisure time, outbound tourism has become the preferred activity, which puts higher requirements on the design of tourism platform and route planning. The development of computer technology provides a good platform for tourism planning and design, and becomes a convenient and rapid popular design method in tourism planning. Computer-aided design has the characteristics of low cost, high precision, fast speed and easy modification. The computer is applied to the design and route planning of the travel platform, which improves the speed and accuracy of the design. This paper has carried out a comprehensive study on the design and route planning of computer-aided tourism platform, which can provide users with a more complete travel itinerary planning service. The research results have certain theoretical significance and application value. Keywords: Computer

 Tourism  Trip planning  System design

1 Introduction With the rapid development of China’s tourism industry, China has become the world’s fourth largest inbound tourism host country, Asia’s largest outbound tourist source country, and will form the world’s largest domestic tourism market. The rapid development of the tourism market has made the traditional itinerary planning service unable to meet the needs of tourists, and it is increasingly urgent to require it to transform into digital services. In this context, travel websites have begun to emerge, and travel itinerary planning services have evolved as a basic function of the website. For example, Ctrip.com, Lotto Travel Network, Jinya Travel Network, China General Travel Network, etc., all provide users with unique travel itinerary planning services. The function of this type of travel itinerary planning service is basically: the system first provides the user with a planning form, and the user fills in the planning keywords, such as departure place, destination, travel time, travel budget, etc. [1]. Then according to the planning form filled out by the user, the system retrieves the database according to a certain logic and algorithm, and obtains and outputs the planning result; finally, the user views and selects the planning result that he needs.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1823–1829, 2020. https://doi.org/10.1007/978-3-030-25128-4_240

1824

N. Chen and Y. Chen

2 Computer Intelligent Client Technology With the continuous advancement of computer technology and software engineering theory, the software system architecture has evolved from the traditional fat client mode and thin client mode to the smart client mode [2]. The smart client is Microsoft’s integration of Windows and the Internet, allowing local applications to interact with web applications and server applications to build new distributed applications that combine the benefits of Windows applications and Internet applications [3, 4] and launched a new technology. The smart client technology is implemented on the Net platform and represents a new development model. Compared with the traditional fat client and thin client mode, the characteristics of the smart client technology are shown in Fig. 1.

Fig. 1. Features of smart client technology

Depending on the platform that your application is targeting, you can divide the form or style of smart clients into three broad categories: Windows smart client applications, Office smart client applications, and mobile smart client applications. In actual development, smart client applications can be either oriented to one of these platforms or to multiple platforms at the same time. Exactly which form to take depends on the user’s functional requirements for the application. Although smart client-based applications vary widely in design style and implementation form, smart clients should have some or all of the following features, regardless of style or form [5]: (1) Make full use of local resources A good smart client application should be able to make full use of the computer hardware and software resources of the machine. This reduces the server-side workload throughout the system, reducing the hardware and software requirements on the server side.

Computer Aided Tourism Platform Design and Route Planning

1825

At the same time, the client program should also have the ability to work with other applications or programs to do the system, so as to provide better decision support for the client, improve user productivity. (2) Make full use of network resources Smart client applications should not be standalone Windows applications, but should be part of a network distributed system that uses data or services of different sources from the network as much as possible. This network connectivity nature enables smart client programs to provide more valuable data services. (3) Support wired and offline The biggest difference between a smart client application and a stand-alone application is that it has network connectivity and can invoke a WEB service over a network connection. WEB Services Smart Clients can access the latest services and data provided by WEB Services over the network. At the same time, smart clients have the ability to work offline, such as caching data on a local machine with smart caching, or sending requests to the server in bulk when the network connection is smooth.

3 Market Demand Analysis 3.1

Self-help Travel Needs

With the continuous development of tourism, self-service tourism is gradually rising [6]. Tourists do not want to passively accept the tourism products that have been designed on the market, but design their own travel routes according to their own needs. This self-service tour mode has become a major development trend of modern tourism consumption [7]. However, the travel itinerary planning system provided by the current travel website does not provide self-service travel itinerary planning services. Although some websites have opened hotel reservations, air ticket bookings, travel line bookings, online groups and other services, but must be “online booking, offline confirmation, offline payment”, to self-service travelers caused inconvenience [8]. At the same time, this status quo has resulted in information asymmetry between self-service tourists and tourist destinations or tourism enterprises. This not only caused unfair competition in the tourism market, but also caused great harm to the rights and interests of tourists [9]. The development of self-service tourism market requires the travel itinerary planning system to provide a self-service travel itinerary planning Service. 3.2

Route Search Requirements

Distinguished from the traditional travel itinerary planning services to provide users with travel agencies customized travel itinerary characteristics, self-service travel planning services to provide users with travel itinerary by the user according to their own needs, preferences, budget, etc., self-service planning of the itinerary of every detail, such as mode of transportation, accommodation, attractions along the way and so on. Another reason for the asymmetry of tourism market information is that the existing tourism website and system can not fully cover the information of various

1826

N. Chen and Y. Chen

tourism enterprises and tourism resources. Due to the limitation of Business Partnership, a travel website can often only cover some tourist enterprises, tourist attractions information. Therefore, the travel itinerary planning services provided by the travel website will also be limited to tourism enterprises with which they have a cooperative relationship, and the travel itinerary planning route provided to users [10] is limited to the tourism products of this part of the tourism enterprises. The expansion of tourism market has led to the explosive growth of tourism information, which requires travel itinerary planning services to obtain a wide range of travel itinerary planning route information, so as to provide users with more and more comprehensive comparison and choice. 3.3

System Analysis

According to the above analysis results, it can be concluded that the system is shown in Fig. 2.

Fig. 2. Diagram of computer-aided travel itinerary planning system

In Fig. 2, the main role of the system is the system user. The user group mainly targeted by the system is the passenger who plans to travel. Passengers log in to the system before travel, plan according to the planning needs of the departure place, destination, travel time, etc., get the planning results, and collect, comment, and query the planning results. In addition, the user registers, logs in, and fills in or modifies personal information through the user information management functions provided by the system.

Computer Aided Tourism Platform Design and Route Planning

1827

4 Overall System Design The overall design of the system consists of two parts: a vertical structure and a horizontal module. In the vertical architecture [11], the system is designed in three layers. The bottom layer is the data layer, which uses the relational database to store the data required by the system for the business layer to use. The middle layer is the business layer. According to the user’s needs, the layer reads, processes, and organizes data according to various business logics, submits the data to the presentation layer, and outputs it to different users by the presentation layer. The top layer is the presentation layer, which uses different network interfaces to shield network differences for the service layer, thereby providing the same service layer services for users of different networks and different terminals. 4.1

Database Layer Design

The database layer is the lowest level of the system and is responsible for storing and maintaining the data required by the system. The database layer mainly includes a relational database such as a user information base, an attraction information base, and a line information base. The system is based on a huge tourist destination information database, tourism enterprise and product information database to provide users with travel itinerary planning; at the same time, it provides users with intelligent and personalized services based on the user information database. The data required for these services is stored and maintained by the database layer. The database used by the system is located in the system database layer, and mainly includes a user information base, a scenic information database, an association rule base, an association rule to be mined database, a provincial information base, a city information base, a hotel information base, and a route information base. The route information store stores the planned route information, including the route name, departure and destination, departure time and return time, scenic spots along the route, schedule and other information. The route information base mainly provides data support for the finished route planning sub-module. The route information ER diagram is shown in Fig. 3. 4.2

Business Layer Design

The business layer mainly implements system business logic to provide users with the required services. This layer is divided into different modules according to different service functions. The business layer coordinates the functions and data of each module according to the different functional requirements put forward by the user, and cooperates with other two layers of communication to provide complete system services to the users. 4.3

Presentation Layer Design

With the deepening of the research on triple play, the separation of the business layer and the presentation layer has become an inevitable trend. The integration of the three

1828

N. Chen and Y. Chen

Fig. 3. Route information ER diagram

networks does not simply mean the physical integration of the telecommunication network, the broadcasting network and the Internet, but mainly refers to the integration of high-level business applications. Users of different networks access the Internet based on the IP protocol through their respective networks, using the same service services. The convergence of service networks can solve the problem of vertical independence of traditional business systems, and can achieve unified resource management, including sharing data, single user attributes, and making the user experience more complete. And what kind of network users to provide services is a concern for the presentation layer. The function of the presentation layer is to allow users to obtain the required system services according to the access modes and terminal capabilities of different users. The main solution is to solve the problems of what protocols are used under different networks and how to transmit data.

5 Conclusion Firstly, this paper analyses the main related technologies involved in the computer intelligent travel planning system. Then, by analyzing the existing travel planning system and the market development trend, it puts forward the system requirements of the intelligent travel planning system, and completes the demand analysis and overall design of the intelligent travel planning system. On this basis, this paper proposes a three-tier architecture of the overall design of the system, which is divided into three layers: presentation layer, business layer and database layer. The presentation layer is mainly responsible for providing the interface of the system and its functional services for users; the business layer provides various system services for users; and the database layer stores and maintains the data needed for the business layer for system

Computer Aided Tourism Platform Design and Route Planning

1829

services. In this way, it makes up for the shortcomings of the existing travel planning system in the tourism market, can fully meet the needs of tourists for travel planning, and provide users with intelligent, personalized and diversified travel planning services. It has significant application value, market demand and research significance. Acknowledgement. National Social Science Fund Project (12CGL057); Young College Teachers’ Training Program for Henan Higher Education (2018GGJS023).

References 1. Sun, Y.: Theoretical analysis and model research on travel agency travel route customization problem. J. Beijing Int. Stud. Univ. 3, 46–54 (2006) 2. Brian, N.: Data Binding with Windows Forms 2.0: Programming Smart Client Data Applications with .NET. Addison Wesley Professional, Boston (2006) 3. Billy, H.: Back to the Future with Smart Client. MierosoftMSDNLibrary, March 2004 4. Kuo, C.-C., Ting, P., Chen, M.-S., et al.: Design and implementation of a network application architecture for thin clients. In: Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment, pp. 193–198, August 2002 5. Hill, D., Webster, B., Jezierski. E.A., et al.: Smart Client Architecture and Design Guide. Microsoft Corporation, New York (2004) 6. Tian, Y.: China tourism e-commerce market demand analysis and network marketing solution. J. Heilongjiang Agric. Eng. Vocat. Coll. 1, 19–23 (2006) 7. Han, T.: On the tourism market under the e-commerce environment. Shopping mall modernization (21), 159 (2008) 8. Sun, L.: Market prospects and development strategies of self-service tourism in China. Enterp. Econ. 4, 137–139 (2009) 9. Wang, J., Sun, H.: Research on the status and countermeasures of information asymmetry in tourism market. Resour. Dev. Mark. 25(1), 87–90 (2009) 10. Zhang, X., Li, M.: Research and development of intelligent search engine technology. Comput. Eng. Appl. 37(24), 67–70 (2001) 11. Zhao, Z.: Vertical website and vertical search engine. China Inf. Guide 11, 18 (2000)

Research on the Application of Automation Software Control System in Tea Garden Mechanical Picking Geng Ya(&) Changzhou Vocational Institute of Engineering, Changzhou 213164, Jiangsu, China [email protected]

Abstract. The use of mechanical picking instead of labor can improve the picking efficiency, but the use of mechanical picking will take the old leaves together with the young leaves, which lacks selectivity. Based on this study combined the automation control software system, functional requirements and performance requirements to analyze the control software of the crawler-type tea picker cutter. At the same time, this paper combined the machine vision system to construct the tea bud identification system, and taken the crawler picking system as an example for experimental analysis. Through experimental research, we can know that the algorithm of this study has certain validity and can provide theoretical reference for subsequent related research. Keywords: Automation software Picking

 Control system  Tea garden machinery 

1 Introduction In view of the shape characteristics of the tea bud itself, mechanical picking will destroy the young leaves and shoots of the tea and reduce the quality of the picking. While improving the picking efficiency of the tea garden machinery, it is also necessary to ensure the quality of the tea picked. Therefore, the control process of mechanical picking needs to be analyzed [1]. Since the 1970s, American scholars have proposed using computer vision in agriculture to harvest fruits and vegetables by using robots. With the development of science and technology, more and more objects can be harvested using computer vision-based robots, including the Belgian apple picking robot (Baeten et al. 2008) [2], the British mushroom picking robot (Xi et al. 2001) [3], Dutch cucumber picking robot (Henten et al. 2006) [4], American melon picking machine (Edan et al. 2000) [5], Japanese grape picking robot (Monta et al. 2002) [6] and sweet pepper picking robot (Kitamura et al. 2007). Foreign studies on the image processing of tea have been carried out in the analysis of tea quality classification and composition detection. The tea or tea soup is analyzed by image processing method, and then information about the quality or composition of tea is obtained. AS Borah et al. used the HIS color space model to process the image of the tea soup and compared the processed image with the © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1830–1836, 2020. https://doi.org/10.1007/978-3-030-25128-4_241

Research on the Application of Automation Software Control System

1831

established standard database for the detection of tea quality (Borah 2003) [7]. Luypaert used a combination of near-infrared spectroscopy and PLS to quickly estimate green tea quality (Luypaert et al. 2003) [8]. In recent years, domestic research on tea image processing has been launched, mainly for the identification of tea buds. Northwest Agriculture and Forestry University in 2009 (Yang et al. 2009) extracted the G component of the tea image and used the double threshold method to segment the image, and then detected the edge of the bud according to the shape characteristics of the tea bud, and effectively recognized the tea bud [9].

2 Research Method The grayscale image is regarded as a topographic map, and the grayscale is used to represent the topography. The high gray level corresponds to the high landform, and the low gray level corresponds to the low landform. This relationship is used to study the spatial variation of the image gray scale. The specific idea of watershed segmentation is to assume that a hole is made in the local grayscale minimum region of the image, and then water is injected into the region at the same speed, and these regions are submerged from low to high. When water in different areas is to be merged, a dam is built at the confluence to prevent convergence. Finally, when the water is completely submerged in the entire image, the dam has been built and formed a watershed, which is the dividing line we need. Although the watershed transformation has a strong segmentation effect, it often produces over-segmentation. Meyer proposed a priority-queue-based watershed transformation method different from the immersion model. The traditional immersion model begins to immerse from the area minimum. However, the Meyer watershed transform suppresses the local minimum region in the segmentation process according to the mark, thereby effectively reducing the over-segmentation phenomenon, as shown in Fig. 1.

Fig. 1. Comparison image of watershed algorithms for different immersion models

1832

G. Ya

It can be seen from Fig. 1 that, compared to the watershed algorithm immersed in the minimum region, the over-segmentation can be effectively reduced by the Meyer watershed algorithm based on the mark. The effect of the two segments is shown in Fig. 2. The first column image is the effect map of the Vincent watershed algorithm segmentation, and the second column is the effect map of the Meyer watershed algorithm segmentation. The time consumption of the two is 0.39 s and 0.22 s, respectively. The PC configuration used in this experiment is CPU: Intel(R) Core(TM) i3 2.13 GHz, memory: 2 GB.

Fig. 2. Comparison image of the splitting effect between the Vincent watershed and the Meyer watershed

3 Discriminant Model Establishment Commonly used kernel functions of the SVMs model include linear kernels, polynomial kernels, RBF kernels, and sigmoid kernels. In general, in most cases, RBF is used as the preferred kernel function for SVMs. Firstly, unlike the linear kernel, the RBF kernel can effectively deal with nonlinear classification problems by mapping the original samples to a high-dimensional space in a nonlinear form. Secondly, the penalty coefficient C of the linear kernel has the same performance as some parameter pairs of the RBF kernel, and the linear kernel can be regarded as a special form of the RBF kernel. Thirdly, the sigmoid kernel function and the RBF kernel function have similar performance in some cases. Fourthly, the number of hyperparameters has an impact on the complexity of the SVMs model. The super-parameters of the RBF kernel are much less than those of the polynomial kernel, which makes it possible to effectively build a suitable SVMs model using the RBF kernel. Finally, after mapping the sample features

Research on the Application of Automation Software Control System

1833

using the RBF kernel function, the kernel values very little. Moreover, the kernel value obtained using the polynomial kernel may fill the entire one-dimensional real space and make the data change range too large. However, the RBF core also has its own drawbacks. When the feature dimension of the sample is too large, the linear kernel is a better choice than the RBF kernel. In order to determine the optimal kernel function of the model, In this test, four different kernel functions (the kernel function parameters using the LIBSVM default parameters) were tested separately by selecting different training data sets and test data sets. Prior to testing, the data for the training and test sets has been processed by scaling. The test results are shown in Table 1 and Fig. 3. (1) 100 samples were randomly selected as the training data set, and 100 samples were used as test data sets. (2) 120 samples were randomly selected as the training data set, and 80 samples were used as the test data set. (3) 140 samples were randomly selected as the training data set and 60 samples were used as the test data set. Table 1. Experimental results under different nuclear functions Group number 1 2 3

Linear core (%) 78 81.25 83.33

Polynomial kernel (%) 80 81.25 83.33

RBF kernel (%) 83 83.75 85

Sigmoid kernel (%) 79 82.5 83.33

It can be seen from Table 1 that in three different experiments, the discrimination model established by using RBF kernel is ideal. In order to ensure better classification effect, this paper selects RBF kernel as the kernel function to construct the SVMs discriminant model.

4 Software Control This section will analyze the cutter riding machine cutter control software in detail from two aspects: functional requirements and performance requirements. The basic functions of the crawler-type tea picker cutter control software are mainly divided into four parts: the acquisition display function, the automatic adjustment function, the abnormal alarm function and the human-computer interaction function. (1) Acquisition display function In this paper, the industrial camera is used to image the cutter and the tea shoots and display them in real time. At the same time, the current driving speed of the crawler-type tea picker should be displayed synchronously, so that the operator can understand the current tea picking progress. (2) Automatic adjustment function The tea picking work through the automatic height adjustment function of the cutter is the core content of this paper. This paper uses image processing

1834

G. Ya

Fig. 3. Sample cross-validation results under different kernel functions

technology and machine vision technology to achieve automatic adjustment of the height of the left and right sides of the cutter, which requires multiple threads to work together. First, the system needs a main thread for interface operations. Second, a sub-thread is required to collect and display the cutter and tea video. Again, another sub-thread is needed to analyze the cutter and tea video images, calculate the adjustment parameters of the height of the two sides of the cutter, and send them to the lower computer. After that, the lower machine adjusts the cutter to the desired position. Finally, a sub-thread is required to display the current running state of the tea picker. (3) Abnormal alarm function Due to the complicated outdoor environment, when the crawler-type tea picker cuts the sprouts, there may be a problem that the camera is deflected by the impact, which causes the deviation of the video shooting angle and causes the cutter positioning rail to disappear from the camera field of view. At the same time, due to the long-term work of the tea-picking machine, some parts are subject to wear and tear, which causes problems such as abnormal knife control. In response to these situations, an abnormal alarm module must be added to the cutter control software to notify the operator in time when the above abnormal conditions occur, thereby reducing losses and improving the safety of the tea picker. (4) Human-computer interaction function Human-computer interaction is a bridge between people and machines. An excellent human-computer interaction function can not only provide a good experience, but also effectively improve work efficiency. Therefore, it is necessary to design a simple and clear human-computer interaction interface. In the humancomputer interaction interface, first, a switch area is needed to safely start and close the knife action. Secondly, a camera parameter setting area is needed to adjust the camera parameters for different illuminations to obtain high quality video images,

Research on the Application of Automation Software Control System

1835

and to improve the accuracy of tea bud recognition and curved cutter positioning. Once again, the manual adjustment zone is indispensable. Before the automatic tea picking function is started, it is necessary to manually complete the calibration of the camera’s external reference and the optimal tea picking position. In the process of tea picking, in order to increase safety and reliability, an emergency brake button is required. When an accident occurs, the operator manually stops the cutter action of the tea picker to prevent damage to the tea tree and the tea picker. In addition, a debugging area is also required, which is mainly used to locally save the original video image when the problem of abnormality of the cutting height is abnormal, so that the debugging personnel can analyze the abnormality. Finally, the knife and tea video display area and the tea picker status display area are required, and the captured video image and the current information such as the current speed and the tilt angle of the tea picker are displayed.

5 Conclusion Aiming at the more complicated outdoor environment, a more accurate method for identifying buds is proposed. The initial sprouting region is obtained by performing OSTU dynamic threshold segmentation on the difference enhancement images of G and B. Moreover, for the feature that the misidentification area in the initial bud area is far away from the actual bud area, an expansion denoising method is adopted to eliminate the misrecognition area, and the final bud area is obtained quickly and accurately. In addition, taking the image of tea obtained in the field as the research object, this paper proposed a hybrid image segmentation algorithm. The algorithm uses an improved marker-based watershed transform and a statistical-based fast region merging algorithm to segment tea shoots from tea images. Finally, using the segmented buds to extract the characteristic parameters, the training classifier models (SVMs) were used to classify and identify Longjing tea, and the experimental results were analyzed and discussed. Acknowledgement. Jiangsu Natural Science Foundation Project (16KJB520047); Key R&D projects of science and technology in Jiangsu Province (BE2017067); Key R&D Subprojects of the Ministry of Science and Technology (2018YFB1703505).

References 1. Correll, N., Bekris, K.E., Berenson, D., et al.: Analysis and observations from the first amazon picking challenge. IEEE Trans. Autom. Sci. Eng. 15(1), 172–188 (2016) 2. Ayodeji, S.P., Adeyeri, M.K., Yakubu, A.M., et al.: Design of a control system for an automated Roselle tea process plant. IFAC-PapersOnLine 50(2), 251–252 (2017) 3. Krug, R., Stoyanov, T., Tincani, V., et al.: The next step in robot commissioning: autonomous picking and palletizing. IEEE Robot. Autom. Lett. 1(1), 546–553 (2017) 4. Yu, X., Liao, X., Li, W., et al.: Logistics automation control based on machine learning algorithm. Clust. Comput. 3, 1–9 (2018)

1836

G. Ya

5. Tozlu, B.H., Okumuş, H.I.: A new approach to automation of black tea fermentation process with electronic nose. Automatika 59(3–4), 374–382 (2018) 6. Shi, J., Koonjul, G.S.: Real-time grasping planning for robotic bin-picking and kitting applications. IEEE Trans. Autom. Sci. Eng. 14(2), 809–819 (2017) 7. Zhao, J., Mao, X., Hu, H., et al.: Behavior-based SSVEP hierarchical architecture for telepresence control of humanoid robot to achieve full-body movement. IEEE Trans. Cogn. Dev. Syst. 9(2), 197–209 (2017) 8. Low, J.H., Lee, W.W., Khin, P.M., et al.: Hybrid tele-manipulation system using a sensorized 3-D-printed soft robotic gripper and a soft fabric-based haptic glove. IEEE Robot. Autom. Lett. 2(2), 880–887 (2017) 9. Wang, Z., Torigoe, Y., Hirai, S.: A prestressed soft gripper: design, modeling, fabrication, and tests for food handling. IEEE Robot. Autom. Lett. 2(4), 1909–1916 (2017) 10. Chen, Y., Guo, S., Li, C., et al.: Size recognition and adaptive grasping using an integration of actuating and sensing soft pneumatic gripper[J]. Robot. Auton. Syst. 104, 14–24 (2018)

Open Community Education Model Based on Internet of Things and Intelligent Technology Li Li(&) Jiangyin Polytechnic College, Jiangyin 214400, China [email protected]

Abstract. With the continuous development of the Internet of Things technology, the educational model of the open community has undergone major changes, so it is necessary to conduct model analysis in light of the actual situation. This paper firstly investigates the learner’s learning style, and then builds a model based on the learner’s learning style based on the research results. Moreover, this topic provides the research basis for personalized learning services. In this research, the main work is as follows: First, according to relevant theories and standards, the learner style recognition model and the learning strategy recommendation model are established, and the serviceoriented architecture is used to build the system. The second is to identify the model based on the established learning style. Keywords: Internet of Things Educational model



Intelligent technology



Open community



1 Introduction The application of information technology in education is a hot research direction at home and abroad. Information technology has been used to develop a wide variety of educational software, from early computer-based training systems, multimedia courseware, puzzle games to today’s web-based adaptive hypermedia systems. Such a system can adapt to the learner’s personalized learning style and use recommendation techniques and propose the most suitable online learning path for the learner based on the learner’s interest, knowledge level and learner’s browsing history [1]. Foreign scholars introduced RSS into the learning system earlier and designed adaptive learning systems that can provide personalized services. Most web-based adaptive learning systems adapt to simple content or system navigation using a predefined set of rules to accommodate different learners [2]. Considering the different learning behaviors and preferences of each learner, it may be difficult to generalize and design appropriate recommendation rules in advance. In 2003, Triantafillou and Pomportsis were inspired by the Adaptive Hypermedia System (AHS) to design an Adaptive Education System (AES) to accommodate individual differences among learners, including learning styles and cognitive styles [3]. In 2005, Kristofic proposed to apply RSs to the learning

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1837–1842, 2020. https://doi.org/10.1007/978-3-030-25128-4_242

1838

L. Li

community. The Web-based network recommendation architecture was used to organize the curriculum resources, provide learners with suggestions for further study, and continuously improve the recommendation methods to adapt to the learners [4]. In 2006, Rosta Farzan and Peter Brusilovsky designed the community-based adaptive hypermedia system CourseAgent. The system first evaluates the learner’s learning behavior and other factors, provides learning suggestions for completing specific goals according to the learner’s situation, and obtains learner feedback to correct the model [5]. In 2010, Bachari and Abelwahed designed a system framework that was adaptive to learners’ learning preferences by using the Borders Types (MBTI) tool to match the teaching strategies and learners’ learning styles. The system first initializes the learner’s learning style through the way of questionnaire survey, and then uses the Bayesian model to make the recommended fine-tuning according to the learner’s learning results in the system. In the “National Medium- and Long-Term Education Reform and Development Plan (2010–2020)” issued in 2010, it is clearly proposed to build a flexible and open lifelong education system. It will be realized by strengthening network education construction, developing community education resources, and vigorously developing modern distance education. Therefore, we should clearly know that research and construction of the open and continuous education and public service platform based on the Internet is a hot research direction [6]. With the continuous development of the Internet of Things technology, the educational model of the open community has undergone major changes, so it is necessary to analyze the model in light of the actual situation. This study analyzes the open community education model in this context.

2 Research Method The Intelligent Learning Community is an Internet-based online adaptive learning system that provides rich learning capabilities. Compared with the traditional education model, the virtual learning community has the following main advantages: it is not subject to the number of learners and professional restrictions, and learners can choose learning resources freely according to their own interests and wishes [7]. Unlimited by time and space, users can learn at anytime, anywhere, as long as they have access to the Internet. In addition, virtual learning can increase the enthusiasm of learning. The virtual learning community does not passively learn students like the traditional teaching model, but encourages students to learn actively, so that students who are learned are more interested and more acceptable and mastered. Reduce the pressure on the teacher. The teacher can arrange tasks for the students through the virtual community, such as homework, exams, and then the teacher can ask the students to complete within the specified time. Moreover, if students do not understand, they can go to the forum to ask questions, and teachers and students can reply to answer [8] (Fig. 1).

Open Community Education Model Based on Internet of Things

1839

Fig. 1. System architecture diagram

In this architecture, the database layer mainly involves a personalized learning community database, which is the cornerstone of the entire system, and the data involved in the system is stored in the system. The database contains 17 tables including teacher information table, student information table, curriculum, learning style table, learning object sequence table and learning log [9]. Among them, the teacher information table stores the basic information of the teacher, the student information table stores the basic information of the student, the administrator table stores the administrator information, the curriculum records the relevant information of the course, the course resource table stores course information corresponding to the learning resource and the path stored on the server, the student selection table stores the student’s course selection information, the learning style table stores the learning style classification information supported by the system, the learning glyph table stores the learning log information of the learner, the learning object sequence table is stored as the learning resource path information recommended by the learner, the media type table stores the media type information, the video type table stores the video type information, the picture type table stores the image type information, the login log table stores log information of the user login system. The system function table stores the function category information of the system. The chapters, sections, and knowledge points respectively store chapters, sections, and knowledge point information to which the learning resources belong. The service layer includes learning style recognition services, data services, recommendation services and other services. Among them, the learning style recognition service is used for providing a query service for identifying a learner’s learning style and providing a learner’s learning style for other systems, the data service is used to provide addition, retrieval, update, and deletion services for the data required by the application layer, and the recommendation service is used to provide learners with a learning path recommendation service suitable for their own learning style [10]. The front-end and back-end clients correspond to the server and the client used by ordinary users. The client includes three categories, the client used by the student, the

1840

L. Li

teacher and the client used by the teacher on duty. The working principle and process of the server and client will be shown in Fig. 2 below.

Fig. 2. Working principle and process

3 Database Design The client itself does not need to store data. The client itself is equivalent to a relay station used to temporarily store data sent from the server. All data includes: The problem hall, user information, etc. are stored in the server for overall management. An obvious benefit of such an architecture is that it reduces the workload of the background maintenance staff and the size of the client. There are four main entities: users, specific problems, specific disciplines, and entities in the knowledge point resource database. User entity attributes are as follows, account number, password, user type (student or teacher), etc. User-related tables include: uInfo (user information table), stutMoneyLog, tSubject, uImage, and uShare (user sharing record table) (Tables 1 and 2).

Table 1. User information table Field name ID UserID Usertype UserNick Score

Field type Int (10) Varchar (10) Varchar (10) Varchar (30) Varchar (50)

NULL N N N

Content Identification of the primary key User ID Types of Nickname Integral

Open Community Education Model Based on Internet of Things

1841

Table 2. Question table Field name ID StudentID Teachertype Status Score Viewpoint Subject P1 P2 P3 Evaluate

Field type Int (10) Varchar (10) Varchar (10) Varchar (30) Varchar (50) Int (10) Int (10) Varchar (10) Varchar (10) Varchar (10) Int (5)

NULL N N N N N Y Y Y Y Y Y

Content Identification of the primary key User ID Types of Nickname Integral Teacher’s opinion Subject Problem point 1 Problem point 2 Problem point 3 Evaluation

4 Analysis and Discussion There are some problems in the existing learning community. One is the organization and presentation of learning resources. At present, the learning resources in the learning community come from a wide range of sources, and the variety is huge. Moreover, most learners, when faced with a large amount of learning resources, will not know how to make choices and trade-offs, and they are prone to the phenomenon of trekking. Second, there are differences in the requirements of learning resources in different learner styles. Because learners have different levels of professional knowledge, cognitive ability, learning style, learning motivation and current knowledge, their needs for learning resources are also different. However, when different learners access the existing learning community system, the pages displayed by the system and the classification of learning resources accessed by the learners will not change. Learners need to decide for themselves how to choose efficient and useful learning resources and learning paths. Therefore, similar online learning systems do not consider that different learners may have different learning styles and cannot actively provide referral services to learners to support learners’ personalized learning and cannot effectively help learners to conduct online learning. Therefore, when designing a community system, I should also consider that it should have certain intelligent recommendations. For these reasons, it is very valuable to study intelligent learning communities with learning style recognition and personalized recommendations.

5 Conclusion The concept of virtual learning community is no longer unfamiliar. It serves as a powerful learning platform to meet people’s needs for knowledge, and gradually transitions from the early stage of exploration and development to the stage of practical application. Moreover, people pay more and more attention to the development of virtual learning community, and the virtual learning community has gradually become

1842

L. Li

an important part of the modern distance education system. The research of virtual learning community should focus on the communication and interaction between members, and each member completes the construction of new knowledge in continuous interactive learning and cultivates good cooperation ability and team awareness. The author first analyzes the service-oriented architecture design of the personalized intelligent learning community. Since there are few studies on the service design of personalized learning systems, there are not many relevant documents that can be checked, and the situation and research level of self-learning still needs to be improved. Therefore, there are still many shortcomings in the research process of this thesis, and continuous research will be carried out in future research. Acknowledgement. Project of Jiangsu University Philosophy and Social Sciences Research Fund in 2018: Research on the Integration and Development of County Open University and Community Education: A Case Study of Jiangyin Open University (Fund No. 2018SJA0866).

References 1. Liu, M., Ma, J., Lin, L., et al.: Intelligent assembly system for mechanical products and key technology based on internet of things. J. Intell. Manuf. 28(2), 271–299 (2017) 2. Wei, Y.: Study on the application of internet of things-based intelligent microscope in blood cell analysis. J. Comput. Theor. Nanosci. 14(2), 1199–1203 (2017) 3. Min, H., Yinong, C.: Guest editorial: internet of things and intelligent devices and services. CAAI Trans. Intell. Technol. 3(2), 73–74 (2018) 4. Baiyu, L., Guitang, W., Zhisheng, C., et al.: Intelligent manufacturing executing system of heat treatment based on internet of things. Heat Treat. Met. 42(3), 195–197 (2017) 5. Jia, G., Han, G., Rao, H., et al.: Edge computing-based intelligent manhole cover management system for smart cities. IEEE Internet Things J. 5, 1648–1656 (2017) 6. Dong, S., Yuan, Z., Gu, C., et al.: Research on intelligent agricultural machinery control platform based on multi-discipline technology integration. Trans. Chin. Soc. Agric. Eng. 33 (8), 1–11 (2017) 7. Kayali, F., Bartmann, C., Hödl, O., et al.: Intelligent technologies for interactive entertainment. Lect. Notes Inst. Comput. Sci. Soc. Inform. Telecommun. Eng. 9(3), 47– 48 (2017) 8. Cohen, C., Kampel, T., Verloo, H.: Acceptability among community healthcare nurses of intelligent wireless sensor-system technology for the rapid detection of health issues in home-dwelling older adults. Open Nurs. J. 11, 54–63 (2017) 9. Liu, C., Liu, J., Jiang, Z.: A multiobjective evolutionary algorithm based on similarity for community detection from signed social networks. IEEE Trans. Cybern. 44(12), 2274–2287 (2014) 10. Locatelli, M.P., Loregian, M., Vizzari, G.: Artificial societies in a community-based approach to ambient intelligence. Comput. J. 53(8), 1152–1168 (2010)

Open University Participation in Community Education Based on Smart Network and Artificial Intelligence Ji Xian(&) Jiangyin Polytechnic College, Jiangyin 214400, China [email protected]

Abstract. How to combine artificial intelligence to promote colleges and universities to participate in community education in a smart network environment is a problem that many universities need to focus on. From the perspective of practical application, with reference to the literature analyzed by scholars at home and abroad, this paper integrated the development and improvement methods of current community education. At the same time, this paper analyzed the current situation of colleges and universities and the practice of community education, found out the problems affecting the development of community education, and proposed reasonable solutions, which is not only conducive to the promotion of community education, but also has certain practical significance for the transformation and upgrading of community education. Keywords: Intelligent network Community education



Artificial intelligence



Open University



1 Introduction The development of community education activities, the development of community education, the construction of a lifelong education system, and the improvement of the moral quality of all members of society cannot be separated from the support of community education resources. Community education resources provide a material basis for the realization of the above objectives and are an important part of them [1]. The theoretical cognition and practical exploration of community education resources have laid a solid foundation for the research of this paper. The community is the nearest neighbor of the university, an indispensable external environment for its survival, operation and development, and plays an important role in the university’s numerous external public relations. The relationship between learning and community is far-reaching and complex. There are both reciprocal symbiotic relationships and heterogeneous conflicts. However, interaction and cooperation between the two are the best choices and the future development trend. Through the study, it has been found that Chinese researchers mostly explore the relationship between the two from the macro level of culture and economy, and less on the relationship between the two from the meso level of resources [1]. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1843–1849, 2020. https://doi.org/10.1007/978-3-030-25128-4_243

1844

J. Xian

First, the cultural level. From the existing literature, the research results of university and community relations at the cultural level are mainly divided into two aspects, namely, the cultural interaction and interaction between the two. First, in terms of culture, universities and communities interact with each other. University culture plays a leading, inheriting and creative role in community culture, and community culture has an infiltration and normative effect on university culture [2]. Second, the cultural interaction between universities and communities. Some researchers believe that the interaction between universities and the community is mainly reflected in the teaching level and research level. The specific expressions of interaction at the teaching level are service learning, community training, and participation in academic and community-based participation research at the research level. At the cultural level, some researchers are concerned about the university’s participation in community education and pay particular attention to the participation of radio and television universities or open universities in community education. Some researchers believe that TVU’s participation in community education has obvious advantages, such as system advantages, resource advantages, technological advantages and management advantages. Therefore, participation in community education has become an important trend in the development of TVU [3]. Education is an important part of the cultural level. Tracing the relationship between community education and school education is conducive to our in-depth exploration and understanding of the relationship between universities and communities [4]. The rise of community education in China began in the mid-1980s. Its rise is not a product of community development, but a predicament of school youth education (Including the moral education of school youth needs social support, the shortage of education funds needs social assistance, etc.). It can be said that it is an extension of the development of the original education system. At this time, community education has not yet been able to differentiate from school education. At this stage, community education is mainly aimed at young people. The main task is to promote the ideological education and moral education of young people through the joint efforts of schools, families and society, and provide a harmonious and stable development space for young people’s off-campus education [5].

2 Research Method The network configuration of the community higher education information management system generally has the following types. (1) Stand-alone mode: that is, the server and client are on one computer [6]. (2) 100M mode: The speed of the computer network is 100 megabytes. The server and the terminal are separated and connected through a switch [7]. Different network configurations can be selected according to the user’s situation. A small system can adopt a stand-alone mode, so that the investment is small, but the user’s business processing can be better realized. Medium-sized systems can use a 100megabit mode to separate user terminals from servers. The topology design of the intra-school network is shown in Fig. 1 [8].

Open University Participation in Community Education

1845

Fig. 1. Topology diagram of the LAN

The network center is connected to the external network through a router, and then data is exchanged through the primary switch, and each server is connected to the switch for data sharing. For the second-level network, the network including the dormitory subnet, the classroom subnet, and the office subnet is connected through the secondary switch. The secondary switch is connected to the primary switch to obtain data, and the users in each subnet are connected to the secondary switch. According to the needs, the switch can be set up in the subnet to form a smaller network [9].

3 Functional Modules According to the system function design and division, the system mainly has four different identity users: super administrator, administrator, teacher, student. In the database, a table for storing user information, basic teacher information, basic student information, class basic information, course information, student achievement, and the like needs to be established. The following is the structure of these key tables. Next, we research the user information table and the student information table. The user information table is used to store administrator information. The fields mainly include user name, user password, user name, and user related information. When the user logs in, if the user selects the administrator identity, they will go to this table to query and see if the username and password match. At the same time, the system returns the identity of the user, and assigns different permissions according to the identity of the user. The table structure of the user information table is shown in Table 1 [10]. Table 1. User information table Serial number

Field meaning Field name Types

1 2 3 4 5

User Password Name Telephone Identity

User Password Name Telephone Shenfen

Width Empty or not

Varchar 20 Varchar 20 Varchar 20 Varchar 10 Varchar 100

N N

Keyword Remarks Y

1846

J. Xian

The student information form is used to store the basic information of the student. The fields mainly include the student’s student number, name, enrollment time, date of birth, contact number and other information. In addition, we can add more fields to store the student information that needs to be stored according to actual needs. The student number is the primary key that is used to uniquely identify a student. The table structure of the student information table is shown in Table 2.

Table 2. Student information form Serial number 1

Field meaning Student ID

Field name Types Stutid

Int

2 3 4 5 6 7

Name Class Gender Nationality Address Date of birth Identity number Mobile phone Graduated school Political status Enter year

stuName Class Gender Nation Addr Birth

Varchar 20 Varchar 20 Varchar 2 Varchar 50 Varchar 100 Date

Cerid

Varchar

18

Mobile

Varchar

15

8 9 10 11 12

Width Empty or not 4 N

Keyword Remarks Y

Automatically add one

Fromschool Varchar 100 Politics

Varchar

Enteryear

Date

10

After the student logs into the elective system, the student logs in according to the account and password registered by the school for each student. Of course, students can change their password after logging in to the system. If the student logs into the system for the first time, the system will force each student to modify their login password before the course selection, thus ensuring that each student’s own basic information will not be used by others. In addition, because the student’s personal password may be lost, the system also provides a password recovery function, which can retrieve the password according to each student’s student number or ID number. Figure 2 is a state diagram of the student login verification.

Open University Participation in Community Education

1847

Fig. 2. Verification status map of student login

4 Analysis and Discussion With the rapid development of computer network technology, software applications are also spread all over the industry. With the reform of information technology in colleges and universities, the role of software applications in colleges and universities is becoming more and more obvious. Traditionally, college education management is basically handled by hand. This artificial method is not only inefficient, but also extremely error-prone, which brings various inconveniences to college education. Therefore, having a fully informatized intelligent education system for community education has become an urgent need of more and more colleges and universities. After years of development, the information system has become more and more intelligent and humanized, and has become an indispensable helper for people to learn. The software architecture model is also gradually changing. From the initial C/S mode MIS system to the later popular B/S mode MIS system development, the rapid development of the information system structure is reflected. The community education information management system is based on the campus network. In order to better realize the system, the following points should be noted in the design: (1) It has strong dynamic interaction ability. The system does not simply realize the problem of mutual access of information resources between multiple departments of the school. It can also deal with other problems that need to be established between departments in the future, and the interaction is relatively strong. In addition, for different system platforms, there should be cross-platform functions, and the data interface can handle the required data functions at any time. (2) Good inclusiveness and scalability. The existing system functions of the system have better containment capabilities for new functions developed in the future, and the system is easy to expand in the future software and hardware upgrades, and it meets the needs of future upgrades while meeting current needs. (3) More reasonable teaching management. The system is mainly for community higher education services. In order to be responsible for students, attitudes towards school services, educational information, the

1848

J. Xian

whole school uses a unified data format description, and the educational business work is standardized and standardized. (4) Practical requirements. The design of this system is based on the actual situation of the management of higher education business, which accurately reflects the business process. At the same time, the system pays attention to the friendliness of the operation interface, which is convenient for the operator to grasp the use. (5) Information Sharing and Security Requirements. The system should have the ability to support local users, remote users, and mobile users to share data simultaneously. Moreover, the system can ensure the security of sensitive information so that it is not viewed or deleted by unauthorized users. (6) System Reliability Requirements. The system should have a high degree of fault tolerance and special processing capabilities to ensure high system reliability and data integrity.

5 Conclusion The system is a community higher education information platform and intelligent management system based on the mixed structure model of C/S and B/S, which satisfies the demand of centralized education and large amount of data. Aiming at the advantages and disadvantages of C/S and B/S structure community higher education information platform and intelligent management system, a mixed structure model of C/S and B/S is adopted. The module structure adopting C/S mode is simple and fast, which greatly improves the work efficiency, and the module adopting B/S mode is convenient to maintain, simple to operate, and has a wide application range. In this way, the system integrates the advantages of the C/S and B/S structures, meets the different characteristics of the community higher education information platform and the intelligent management system, and achieves the predetermined goals. Acknowledgement. Project of Jiangsu University Philosophy and Social Sciences Research Fund in 2018: Research on the Integration and Development of County Open University and Community Education: A Case Study of Jiangyin Open University (Fund No. 2018SJA0866).

References 1. Cao, G., Lu, Z., Wen, X., et al.: AIF: an artificial intelligence framework for smart wireless network management. IEEE Commun. Lett. 22, 400–403 (2017) 2. Alvina, P., Bai, X., Chang, Y., et al.: Smart community based solution for energy management. Energy Procedia 143, 635–640 (2017) 3. Bajaj, R., Sharma, V.: Smart education with artificial intelligence based determination of learning styles. Procedia Comput. Sci. 132, 834–842 (2018) 4. Howard, C., Jordan, P., Di Eugenio, B., et al.: Shifting the load: a peer dialogue agent that encourages its human collaborator to contribute more to problem solving. Int. J. Artif. Intell. Educ. 27(1), 101–129 (2017) 5. Fellnhofer, K., Nisar, T.: Facilitating entrepreneurial discovery in smart specialisation via stakeholder participation within online mechanisms for knowledge-based policy advice. Cogent Bus. Manag. 4(1), 1296802 (2017)

Open University Participation in Community Education

1849

6. Kumar, R., Mukherjee, A., Singh, V.P.: Traffic noise mapping of Indian roads through smartphone user community participation. Environ. Monit. Assess. 189(1), 17 (2017) 7. Pereira, G.V., Cunha, M.A., Lampoltshammer, T.J., et al.: Increasing collaboration and participation in smart city governance: a cross-case analysis of smart city initiatives. Inf. Technol. Dev. 23(2), 526–553 (2017) 8. Bose, B.K.: Artificial intelligence techniques in smart grid and renewable energy systems— some example applications. Proc. IEEE 105(11), 2262–2273 (2017) 9. Otu, S.E., Okon, O.N.: Participation in fraud/cheat in the buying and selling of meats without legal metrology: a theoretical and empirical investigations. Deviant Behav. 40, 205– 224 (2019) 10. Hulme, C.A., Tomnay, J., Stephens, K., et al.: Facilitators of community participation in an Aboriginal sexual health promotion initiative. Rural Remote Health 18(2), 4245 (2018)

Community Education Course Recommendation Based on Intelligent Recommendation Algorithm Wenjun Liu(&) Jiangyin Polytechnic College, Jiangyin 214400, China [email protected]

Abstract. The user interest model based on the intelligent recommendation algorithm designed in this study realizes the recommendation of community education courses. Considering the tag information in the educational resource library in the research, based on the LDA topic model, this paper establishes a topic model for the resources in the educational resource library. At the same time, combined with the distribution of the project on the theme and the user project scoring matrix, the user interest model based on the topic model is further established to reflect the user’s interest more comprehensively. In addition, this paper uses the advantages of the topic model itself to reduce the dimension of the user project scoring matrix, thereby reducing the computational complexity of the recommendation algorithm. Research shows that the proposed algorithm has certain effects. Keywords: Intelligence  Personalized recommendation Algorithm improvement  Community education



1 Introduction Personalized recommendation technology is gradually applied to the community teaching resource network. It provides users with personalized services, which not only improves learning efficiency and user experience, but also discovers and mines potential points of interest for users, so that learning resources can be fully utilized, and the relevance of users and resources is increased [1]. Personalized recommendation technology mainly provides resource recommendation services to users through the correlation between users, between items, and between users and objects. Similar users have similar hobbies or learning needs. Therefore, by recording the behavior information of each user, when the target user needs to recommend, according to the information of the target user, the user who is similar to the user is found, and the learning resources that are of interest to the user with higher similarity are recommended to the target [2]. Personalized recommendation was proposed as an independent concept until the mid-1990s. Later, through the joint efforts of relevant personnel, relevant research was carried out and it was rapidly developed and widely used in various fields. It was originally used primarily for e-commerce and was used for product recommendations. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1850–1856, 2020. https://doi.org/10.1007/978-3-030-25128-4_244

Community Education Course Recommendation

1851

With the development of e-commerce, the number and variety of products are increasing, so users find that they need to spend a lot of time to browse information that is not related to the purchase of their own products, which will cause information overload and poor user experience. In order to solve this problem, some e-commerce systems apply personalized recommendation technology to their own platforms. Some representative examples are Amazon, Eba, etc. Amazon is one of the early introductions of personalized recommendation service. When the user selects a product in Amazon.com, the system will automatically recommend other products to the user under the product, which successfully promotes the sales volume of the product [3]. Since the introduction of the concept of “personalized recommendation” in the 1990s, personalized recommendation technology has been continuously applied in other fields, and is widely used in the fields of film, news, music, webpage, advertising, education, etc. [4]. Typical examples are MovieLens, AdWards, and others. Among them, MovieLens is a movie recommendation system, which was founded by the Group Lens project team. It stores a large amount of video resources in the Movie Lens system and uses Collaborative Filtering and association rules to recommend movies that interest them to users. AdWards is an advertising recommendation system created by Google. It analyzes users’ recent search records to understand users’ needs and interests, and more accurately recommend ads to users. In the field of education, the research on personalized recommendation is relatively lagging, and the related research content is relatively small. At the beginning of the 21st century, foreign scholars began to try to apply personalized recommendation technology to the field of education. The more famous research institution is the Education Technology Experimental Center of the Netherlands University, which researches different recommendation techniques in different situations, gives full play to the advantages of different recommendation technologies, and has achieved relatively good results [5]. This paper combined the current common community education to carry out research and analysis, built community education personalized education resource recommendation through intelligent recommendation algorithm, and strived to promote the development of personalized recommendation in education industry.

2 Research Method Based on the preliminary analysis of the tag information in educational resources, the use of tags in the actual use of educational resources has the characteristics of describing accurately and reflecting the theme of educational resources [6]. Therefore, in this section, the LDA model is introduced into the resource modeling of the educational resource library. Projects in different formats in the educational resource library are used as documents in the LDA model, and these items are used as words by user-defined labels, and items are obtained through statistics. The label matrix is the document-word matrix in the LDA model. Based on the project label matrix, the Gibbs sampling method is used to determine the project theme distribution and label topic distribution. For convenience of description, such an educational resource tag-based topic model is hereinafter referred to as the Etag-LDA model [7]. Assuming that there are M number of educational resource items in the educational resource library, and the

1852

W. Liu

user has a total of V number labels for all educational resource items, the Etag-LDA model needs to map all educational resources to the subject of K numbers [8]. Similar to the LDA topic model, the introduction of the Etag-LDA model maps each item in the educational resource library to the subject of K numbers. In commonly used educational platforms such as MOOC, the number of educational resources is often greater than the corresponding number of topics K, so the Etag-LDA model can reduce the computational dimension of the project matrix [9] (Figs. 1 and 2).

Fig. 1. Topic-based user interest model

Fig. 2. Matrix in Etag-LDA

The structure in the distance education system based on personalized recommendation is B/S. The user selects the client layer interface resources and services on the client side by means of the web browser, and the system saves the user information on the server side. Specifically, it is stored in the user database, and the corresponding

Community Education Course Recommendation

1853

page is given according to user requirements [10]. The system designed in this paper includes four modules, namely user layer, service layer, data layer and network layer. Figure 3 is the logical structure of the system.

Fig. 3. Logical structure of the network education teaching platform with personalized recommendation function

The three level modules are responsible for different functions. Among them, the user layer is responsible for contacting the user, accepting user input, and inputting user information to the service layer. The service layer is the only channel through which the user contacts the system, and the service layer checks the user information and provides services according to the requirements given by the user. This level has many modules, each module has a corresponding algorithm, respond to the request given by the user, and at the same time contact with the upper and lower layers to achieve information communication. There are many databases in the data layer, and different databases are maintained by the corresponding system administrators (Table 1). Table 1. Account category table Field name *SubjectTypeId

Type of data INTEGER

Length 50

SubjectTypeName

VARCHAR2

50

Constraint Primary VARCHAR2 Not null

Specific description Account category number Account category name

1854

W. Liu

3 System Test By testing the distance education system based on personalized recommendation, it is possible to specifically examine whether the various functional modules in the system can truly achieve the planned goals of the system. The main test focuses on functions and requirements. In the test steps, detailed scripts must be prepared, and the entire steps of the test should be systematically recorded, and the test process should be followed as a whole. At the same time, the test must be repeated, and the existing deficiencies must be corrected and improved in time to ensure that all functions of the system can meet the requirements before they can be put into use. In the test, 130 students from 6 professional departments were selected as the students to pre-learn the curriculum resources. They perform the operations of registering, logging in, changing passwords, modifying information, and saving information. Through testing, it is found that the correct registration rate of students in this system is 100%, the correct registration rate of students is 97.6%, the correct rate of correct password is 96.9%, and the correct rate of information modification is 100%. This shows that the system can accurately manage the information of each student, which ensures the security of the system. At the same time, 77 students were selected from 130 students to conduct the course resource use test. After the student successfully logs in, they can click anywhere in the learning center and learn freely. The statistics found that there were 133 person-times in the course selection, of which 56 completed the course, 51 completed the exam, and 30 completed the course evaluation. In the test, there were no empty links, empty resources, and so on. Moreover, the data sheet can update the study record form, the test record form, the score record sheet, and the student’s personalized customization can be recommended for similar courses when re-entering the “select course”. In addition, the entire system test runs stably.

4 Analysis and Discussion This paper focuses on the analysis of personalized recommendation algorithms and designs a personalized recommendation algorithm for distance education systems based on personalized recommendations. Firstly, the collaborative filtering recommendation algorithm is introduced in detail, including user-based collaborative filtering algorithm, project-based collaborative filtering algorithm and model-based collaborative filtering algorithm. Then it focuses on the algorithm design idea of the distance education system based on personalized recommendation, the user interest acquisition and representation based on content recommendation and the collaborative filtering of application project to achieve the recommendation, which lays a theoretical foundation for the design and implementation of the system. The system elaborates the design and implementation process of the distance education system based on personalized recommendation. The focus of this paper is on requirements analysis, including functional and non-functional analysis, and introduces the logical structure design and system design flow of the system. Then it focuses on the design process of the system function module, including user management module, education information resource management module, user interest analysis module,

Community Education Course Recommendation

1855

and personalized recommendation module. Moreover, UML modeling technology is used to design the implementation flow chart of each functional module, and the pseudo code and system function interface diagram of some functional modules are given. Finally, the functional modules of the system are tested. The results show that the functional modules of the system can well realize the functions required by the system.

5 Conclusion This research system elaborates the personalized recommendation technology and focuses on several commonly used personalized recommendation techniques. This paper first expounds the research background and significance of personalized recommendation and introduces the research status at home and abroad. Although the domestic resource network has developed rapidly, it has been investigated that many resource networks do not provide personalized recommendation services. In the face of a large number of learning resources, users are vulnerable to information overload. Therefore, this paper designs a resource recommendation system to alleviate the problem of information overload. Personalized recommendations were first applied to the business field, and with the development of recommended technologies, they were continuously used in different fields, and the development in the field of education was relatively slow. Finally, through the comparison of common recommendation techniques, the characteristics of different recommendation technologies and their respective advantages and disadvantages are described, and the scope of their adaptation is also introduced. Acknowledgement. Project of Jiangsu University Philosophy and Social Sciences Research Fund in 2018: Research on the Integration and Development of County Open University and Community Education: A Case Study of Jiangyin Open University (Fund No. 2018SJA0866).

References 1. Yang, F.: A hybrid recommendation algorithm–based intelligent business recommendation system. J. Discrete Math. Sci. Cryptogr. 21(6), 1317–1322 (2018) 2. Li, X., Wang, Z., Hu, R., et al.: Recommendation algorithm based on improved spectral clustering and transfer learning. Pattern Anal. Appl. (2017) 3. Zhang, T.W., Li, W.P., Wang, L., et al.: Social recommendation algorithm based on stochastic gradient matrix decomposition in social network. J. Ambient Intell. Humanized Comput. (2), 1–8 (2019) 4. Saeed, M., Mansoori, E.G.: A new slope one based recommendation algorithm using virtual predictive items. J. Intell. Inf. Syst. 50(6), 1–21 (2017) 5. Yi, H., Niu, Z., Zhang, F., et al.: Robust recommendation algorithm based on kernel principal component analysis and fuzzy C-means clustering. Wuhan Univ. J. Nat. Sci. 23(2), 111–119 (2018) 6. Ferdaous, H., Bouchra, F., Brahim, O., et al.: Recommendation using a clustering algorithm based on a hybrid features selection method. J. Intell. Inf. Syst. (2018)

1856

W. Liu

7. Feng, W., Zhu, Q., Zhuang, J., et al.: An expert recommendation algorithm based on Pearson correlation coefficient and FP-growth. Cluster Comput. (2018) 8. Mao, Q., Dong, A., Miao, Q., et al.: Intelligent costume recommendation system based on expert system. J. Shanghai Jiaotong Univ. (Sci.) 23(2), 227–234 (2018) 9. Xin, M., Zhang, Y., Li, S., et al.: A location-context awareness mobile services collaborative recommendation algorithm based on user behavior prediction. Int. J. Web Serv. Res. (IJWSR) 14(2), 45–66 (2017) 10. Yin, C., Shi, L., Sun, R., et al.: Improved collaborative filtering recommendation algorithm based on differential privacy protection. J. Supercomput. (7) (2019)

Research on Quanzhou Sports Brand Communication Based on Neural Network Recommendation Algorithm Fengsheng Zeng(&) Yang-En University, Quanzhou 362014, FuJian, China [email protected]

Abstract. How to enhance the brand value in the fierce market competition is the main factor for the sports brand to stand on the market. In the actual marketing process, it is necessary to combine the actual needs of customers and accurately recommend the sports brand to the user interface through the personalized recommendation algorithm. Based on the neural network recommendation algorithm, this study combined the personalized recommendation requirements to construct a network brand promotion model suitable for sports brand communication and used Quanzhou sports brand communication as a verification model case. The research shows that the proposed algorithm has certain effects and can provide theoretical reference for subsequent related research. Keywords: Neural network Promotion communication

 Recommendation algorithm  Sports brand 

1 Introduction With the continuous improvement of living standards, people’s demand for sports brands continues to increase. The current sports brand market competition is relatively strong, so how to enhance the brand value in the fierce market competition becomes more important. Therefore, in the actual marketing process, it is necessary to accurately recommend the sports brand to the user interface through the personalized recommendation algorithm in combination with the actual needs of the customer, thereby increasing the connection between the user and the brand and promoting the further development of the brand. In order to solve the so-called “information explosion” and “information overload [1] problems, the concept of personalized recommendation system came into being, which was proposed as an independent concept (Resnick et al. 1994) in the 1990s. With the rapid development of e-commerce and the rapid development of Internet technology, the research of recommendation systems in various fields is constantly being carried out by scholars and company professionals. ACM’s data mining team SIGKDD established the WEBKDD seminar group in 1999, whose topic focuses on Web mining technology and recommended technologies in e-commerce. Beginning

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1857–1863, 2020. https://doi.org/10.1007/978-3-030-25128-4_245

1858

F. Zeng

in 2001, SIGIR under ACM began to specifically recommend the recommendation system as a topic of discussion. The 17th International Joint Conference on Artificial Intelligence [2], E. Business & the Intelligent Web was used as an independent research group. The 15th Artificial Intelligence Conference AAAI. 98, the first Knowledge Management Application Conference PAKM, the 96-year collaborative work conference CSCW’96, etc. also adopted the e-commerce recommendation system as the research theme. After the 21st century, important international academic conferences in the fields of data mining, machine learning, and artificial intelligence, such as AAAI, IDCM, ICML, SIGIR, and ECML, all contain the subject matter of recommendation systems or related algorithm technologies. For the research of personalized recommendation technology, experts and scholars in China have also followed the pace of foreign countries and have joined the research. China’s formal research on personalized recommendation system began in 2000. Firstly, Lu Haiming of Tsinghua University proposed the multi-mixing intelligence based on Agent to realize personalized recommendation [3]. Later, Feng Wei (Tsinghua University) and others proposed the Agent-based personalized information filtering system OpenBookmark in 2001 and Pan Jingui (Nanjing University) and others designed and implemented the personalized information collection agent DOLTRL. Agent [4]. In addition, Zhou Tao et al. proposed a personalized recommendation method based on network structure [5]. The personalized information recommendation technology has been applied from theory to practice and has begun to be deployed and applied on a large scale [6]. This paper fully analyzed the development status and prospects of cross-border ecommerce in China, and systematically expounded the personalized recommendation algorithm, and enriched the relevant theoretical knowledge of the personal recommendation system. At the same time, this paper focuses on the collaborative filtering algorithm used in the traditional e-commerce recommendation system and the characteristics of the cross-border e-commerce customer target group and proposes an improved algorithm of traditional collaborative filtering algorithm for cross-border ecommerce, which effectively improves the recommendation accuracy of the product. Finally, the traditional e-commerce collaborative filtering algorithm and improved algorithm are applied to the personalized recommendation system of the cross-border ecommerce platform.

2 Research Method User interest modeling is the basis and core of personalized recommendation algorithm, and the quality of user interest model construction is directly related to the quality of personalized recommendation service. Only when we have a good understanding of the user’s interest needs, can we recommend satisfactory information to them. In this paper, the vector space model is used to represent the user’s interest model. The modeling process of user interest extraction based on vector space model is shown in the following Fig. 1:

Research on Quanzhou Sports Brand Communication

1859

Fig. 1. User interest modeling flow chart based on vector space model

Chinese word segmentation. The network published by the user is a short text with a certain number of words, so it is first necessary to use a word segmentation tool to divide it into words. In this paper, the ICTCLAS Chinese word segmentation system of the Chinese Academy of Sciences is used to segment the collected network texts and part-of-speech and obtain the word list with part-of-speech tagging information. Data denoising. The word string processed by the Chinese word segmentation system contains some noise data. If it is not processed, it will not only increase the time complexity of the algorithm, but also affect the accuracy of the algorithm. For pause words, they appear frequently and have no specific meaning, so they are directly deleted [7] (Table 1). Table 1. Example of user project scoring matrix u1 u2 u3 u4 u5

Ad1 3 0 2 1 3

Ad2 2 1 3 2 0

…… …… …… …… …… ……

Adi 0 2 3 3 2

…… …… …… …… …… ……

Ad10 1 2 1 3 0

Feature selection and weight calculation. Words of the same word differ in expressing the meaning of the text. For online advertising, the core content to be disseminated to users is the product and the words that can characterize the product. Moreover, this paper considers that nouns are more distinguishable than words of other parts of speech. Therefore, based on the part of speech, this paper proposed a method combining TF and TF-IDF to score the keyword features. For nouns, the TF-IDF method is used for weight calculation, and other parts of speech are directly calculated by TF. The specific weight calculation function is [8]: For other parts of speech: f ðk; d Þ ffi Wðk; d Þ ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi P 2 f ð k; d Þ kd

ð1Þ

1860

F. Zeng

For nouns: f ðk; d Þ  logðN=nk Þ Wðk; d Þ ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi P 2 kd ½f ðk; d Þ  logðN=nk Þ

ð2Þ

Among them, Wðk; d Þ is the weight of the word k in the document d, f ðk; d Þ is TF, that is, the word frequency of the word k in the document d, N is the total number of documents, nk is the number of times the word k appears in all documents, logðN=nk Þ is IDF, that is, the ability of word k to distinguish documents, and the denominators of both formulas are normalization factors [9]. User-item scoring matrices are mostly used in collaborative filtering recommendation algorithms. The user-item scoring matrix Rmn is used in the system to represent the user model. Among them, m is the number of users of the system and n is the number of items in the system. Each item in the matrix represents the user’s rating value for the item. If there are unrated items, it is usually filled with 0. The user’s rating value is an integer value within a certain range (for example, between 0 and 5). The user gives a displayed score to represent the degree of preference after the experience of the item. Generally, the larger the value, the higher the preference level [10].

3 Quanzhou Sports Brand Communication The recommendation of brand advertisement can be regarded as one kind of recommendation for web content. However, unlike ordinary web content, online advertisement can be classified according to the classification of products. When recommending advertisements to network users, it is more targeted to recommend certain types of online advertisements according to different preferences of different network users. Therefore, this study proposes a classification-based recommendation algorithm that uses the K-nearest neighbor algorithm to classify online advertisements and users and recommends certain types of advertisements that may be of interest to users through category matching. The main idea of the classification algorithm designed in this paper is to analyze and process the network advertisement text and the network published by the user according to the existing advertisement categories and classify the network advertisement and the user. Then, according to whether the category is the same or not, it is judged whether to recommend to the user. The implementation steps of the specific algorithm are as follows (Figs. 2 and 3):

Research on Quanzhou Sports Brand Communication

1861

Fig. 2. Classification-based recommendation algorithm steps

Fig. 3. Mixed recommendation process based on project classification

4 Discussion and Analysis This paper uses the K-nearest neighbor algorithm to classify online advertisements. The core idea of the K-nearest neighbor algorithm is to treat the network content to be classified as a vector of feature words and find the K nearest neighbors of the feature word vectors of the network to be classified in the feature word vectors of all networks in the training set. If the data of the K nearest neighbor belongs to a certain category, then the network to be classified is considered to belong to this category.

1862

F. Zeng

The advantage of the K-nearest neighbor algorithm is that it can add new training texts at any time and classify and predict them, thus helping to continuously adjust the text classification based on the user’s feedback information. Based on this, this paper improved the traditional K-nearest neighbor classification algorithm and added user feedback to achieve the purpose of dynamically adjusting the classification. The specific steps for classification are as follows: Network (1): An initial network content training set S is obtained (the number of networks in the training set is recorded as m). Network (2): All network text networks in S are represented as n-dimensional vectors according to the feature word set of the network (the number of feature words is denoted as n). Network (3): After the new network content arrives, it is also expressed as an ndimensional network quantity according to the characteristic word set of the network and is recorded as A. Network (4): In the feature word vectors of the training set S, the K pieces most similar to the new network are found according to the similarity distance calculation formula. Network (5): Among the K vectors found in (3), the weights of each class network are calculated according to the TF-IDF weight calculation formula. Network (6): The weights of all classes are compared, and the network to be classified is assigned to the category with the highest weight. Network (7): According to the behavior of the user in the network (forward, comment, like), it is judged whether the text classification is accurate or not. If the user has the above behavior, the classification is considered correct, and the category of the text to be classified is output. The system then returns to the network step (3) to process the new network text. Otherwise, the system needs to ask the user to mark the correct category of the network and feed back to the sub-network system. Network (8): The system adds the network text that the user misses to S to obtain a new network text training network set (the number of networks in S is M+1). After that, the system returns to step (2).

5 Conclusion This paper taken network marketing as the research object and discussed the research status of network brand promotion. At the same time, based on the shortcomings of current network marketing research, this paper proposed a research method combining personalized recommendation and network marketing. Firstly, according to the behavior characteristics of network users, the article establishes the user’s interest model, and classifies the network advertisements based on the categories in traditional advertisements and proposes a hybrid recommendation algorithm based on project classification. At the same time, this paper studied and analyzed the Quanzhou sports brand communication. In addition, the classification recommendation algorithm and collaborative filtering algorithm were improved. The hybrid recommendation algorithm based on item classification was proposed by cascade combination, which solves the problem of recommendation inaccuracy and sparseness of scoring data to some extent. Empirical studies show that the algorithm has certain effects. Acknowledgement. Research Center of Private Economy and Brand) Project No. (FBJG20170283), Research Project of Education and Teaching Reform in Fujian Undergraduate Colleges and Universities.

Research on Quanzhou Sports Brand Communication

1863

References 1. Zhang, T.W., Li, W.P., Wang, L., et al.: Social recommendation algorithm based on stochastic gradient matrix decomposition in social network. J. Ambient Intell. Hum. Comput. 2, 1–8 (2019) 2. Xin, M., Zhang, Y., Li, S., et al.: A location-context awareness mobile services collaborative recommendation algorithm based on user behavior prediction. Int. J. Web Serv. Res. (IJWSR) 14(2), 45–66 (2017) 3. Dai, H., Zhao, G., Lin, M., et al.: A novel estimation method for the state of health of Lithium-Ion battery using prior knowledge-based neural network and Markov chain. IEEE Trans. Ind. Electron. 66(10), 7706–7716 (2018) 4. Yin, C., Shi, L., Sun, R., et al.: Improved collaborative filtering recommendation algorithm based on differential privacy protection. J. Supercomput. (7) (2019) 5. Jiang, M., Zhang, Z., Jiang, J., et al.: A collaborative filtering recommendation algorithm based on information theory and bi-clustering. Neural Comput. Appl. (2) (2019) 6. Xie, Q., Xiong, F., Han, T., et al.: Interactive resource recommendation algorithm based on tag information. World Wide Web 21, 1655–1673 (2018) 7. Yi, H., Niu, Z., Zhang, F., et al.: Robust recommendation algorithm based on Kernel principal component analysis and fuzzy C-means clustering. Wuhan Univ. J. Nat. Sci. 23(2), 111–119 (2018) 8. Vilakone, P., Park, D.S., Xinchang, K., et al.: An efficient movie recommendation algorithm based on improved k-clique. Hum.-Cent. Comput. Inf. Sci. 8(1), 38 (2018) 9. Wang, T., Wang, M.: Distributed collaborative filtering recommendation algorithm based on DHT. Cluster Comput. (2018) 10. Linna, L.I., Wang, L., Jiang, X., et al.: A new algorithm for literature recommendation based on a bibliographic heterogeneous information network. Chin. J. Electron. 27(04), 99–105 (2018)

Home Environment Simulation and Interior Design Based on Neural Network Zhang Xin(&) Ningbo City College of Vocational Technology, Ningbo 315000, Zhejiang, China [email protected]

Abstract. As contemporary people’s pursuit of spiritual quality becomes more and more personalized, the traditional two-dimensional design concept cannot meet the needs of modern people. Based on the neural network, this study combined intelligent simulation technology to simulate the home environment and carried out the corresponding interior design. The system simulated indoor and outdoor scenes by combining smart home and virtual reality technology. At the same time, this paper focused on simulating the demonstration control of indoor home functions and analyzed them according to the actual design situation. The research shows that the proposed algorithm has certain effects and can provide theoretical reference for related research. Keywords: Neural network Interior design

 Home  Environmental simulation 

1 Introduction Smart home is the inevitable result of computer technology, network technology and control technology infiltrating into traditional homes [1]. With the changes of the times, home has not only provided people with a comfortable, convenient and efficient environment. The personalization of the home has gradually become the focus of attention. Even homes are required to be able to simulate and simulate the perceptions of hearing, sight, taste and smell [2]. The three characteristics of virtual reality are ① immersion; ② sense of interaction; ③ conception [3], which can meet people’s requirements for the above feelings. The world’s first intelligent building was born in the United States in 1984 [4]. After that, countries with developed economies, such as Canada, Germany, and Japan, have successively proposed various design ideas for smart homes. Because the ideal design and the real market are not relatively balanced, there has not been a unified intelligent standard for a long time [5]. The intelligent system was launched in Singapore in 1998. The system associates multiple appliances inside the home through hardware devices to realize the function of one-key multi-control. It mainly includes visual intercom function, security alarm function, home appliance control function, etc. [6]. At first, foreign household products mainly focused on the realization of internal functions, the cost price was relatively expensive, and the network connection ability was weak. Some internationally renowned technology companies, led by IBM in the © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1864–1869, 2020. https://doi.org/10.1007/978-3-030-25128-4_246

Home Environment Simulation and Interior Design

1865

United States, have successively developed a number of home automation projects. Typical representatives have dream space [7]. After that, the Intelligent Room developed by the MIT Artificial Intelligence Laboratory, the Interactive Workspace of Stanford University, and the Aware Home of the Tech Institute of Technology in Georgia, all pushed the home to intelligence. The level of smart homes in China was relatively weak and was not introduced until around 2000. Smart home, which is a sunny direction, is favored by the industry. There have been many companies trying to integrate the Internet of Things into the virtual, intelligent, and networked homes, but they have not achieved the desired results. Three years later, in 2003, many domestic enterprises, such as Haier, Great Wall, and China Power Grid, jointly established “e Jiajia”. Its main goal is to use Internet technology to create China’s own smart home platform [8]. The platform also supports sharing with digital media information. On this basis, Hisense-based electrical companies have launched home solutions and related products for the above problems. However, due to the high cost of the products and the relatively large amount of engineering, it is difficult to reach the state of popularization of smart homes. At this time, the virtual reality technology is integrated into the display of smart home, which brings people a sense of freshness in the visual, completely subverts the traditional two-dimensional display concept, and uses threedimensional to promote the popularity and development of smart home. Tsinghua University mainly focuses on the interactive research of intelligent display systems. For example, in remote video, users can interact with multimedia signals by sending language signals or gesture signals to the computer [9]. Other domestic universities have also developed a series of smart home services, such as the smart home server of Hefei University of Technology and the smart home control system developed by Hisense [10]. In 2009, the U.home technology platform was launched to realize the control of lighting and curtains in the home through the hardware equipment, as well as the visual intercom function of the access control system. Based on neural network, this study developed home environment design simulation, adopt intelligent technology combined with modern design concept, constructed a system suitable for modern home design, and provided theoretical reference for subsequent related research.

2 Research Method The main functions implemented by the intelligent control module of the current smart home system include the “starting function” function such as timing control and scene control alarm control, and the implementation mainly relies on the cooperation of the combination keys. The realization of the intelligent control module designed in this project is to introduce the BP neural network into the data processing module to process the system environment data collected by the system. Then, according to the processing result of the data processing module, the control scheme of the home environment is formulated. The intelligent control module is designed using the simplest three-layer BP neural network structure to verify the feasibility of introducing BP neural network into the smart home control system. The data comes from the user life data stored in the system library. The BP neural network topology diagram of the

1866

Z. Xin

system’s intelligent control module is shown in Fig. 1. The input to the neural network uses four inputs, and the hidden layer uses two inputs, and the output is a control signal for temperature, humidity, or illumination.

Fig. 1. BP neural network topology diagram of intelligent control module

The training process of BP neural network is essentially a process of training network weights and thresholds. The initial threshold and the weight take a random value on (0, 1) with a learning precision of 0.5. The maximum number of trainings N and the maximum error e are set. If the error is less than or equal to the maximum error e within the range of the maximum number of trainings N, the training ends. Otherwise, the training is continued until the calculation error is less than or equal to the maximum error e or the number of trainings reaches the maximum number of trainings N. BP algorithm process: (1) Initialize the network: input X, input layer to hidden layer weight W, hidden layer threshold a, hidden layer to output layer weight V, output layer threshold b, expected output D. (2) The input samples are taken forward calculations. (3) The error signal is calculated and compared with the maximum error e. If the maximum error e is greater, the inverse calculation is performed, and the network weight and the threshold are adjusted until the calculation error is less than or equal to the maximum error e.

3 Design Result In order to realize the control of the door in the home of the simulation system house model, when building the model in Sketchup, each door is divided into a group, and cannot be grouped with the wall of the house. The reason is that when the built model is imported into Unity3D, the model of a group will be merged into an object on the grid, and it is not convenient to control the door separately. First, the model of the gate is selected, and then the Pivot and Local properties in the upper left corner are selected (Pivot means that the door rotates around the axis. Local defines the local coordinate

Home Environment Simulation and Interior Design

1867

system of the used door. The result of the combination of the two options is that the model of the door rotates around the Y-axis of the local coordinate system of the door with the lower right corner as the base point. Figure 2 shows a schematic diagram of rotation along the Y axis). Next, through the menu Window ! Animation, the Add Curve is clicked, the components of the gate are added, the Rotation option under the gate transformation component is selected, and the key start frame node and the end frame node are set to make a coherent animation play. In these three key nodes are set, 0 to 3.9 is the door opening animation, and 3.9 to 6.9 is the closing animation. Figure 2 shows the animation recording interface of Animation.

Fig. 2. Schematic diagram of the door rotating along the Y axis

First, we add a box to the door and select the trigger option so that the collider is set to trigger mode. Therefore, two colliders need to be added, one collider with the same size as the door is placed on the door, and another slightly larger collider surrounds the door and is set to trigger. Figure 3 below shows the schematic diagram of the collision detection principle. Using this principle, the door in the entire house scene is correspondingly added with a box-shaped impactor, and Fig. 3 is a living room door with a box collider added. Since all animations are automatically played in the default settings of Unity3D, the frames between the animations will affect each other, so we need to cancel the autoplay option in the inspector of the door. In this way, the collision is

1868

Z. Xin

triggered only when an object is close to the door, and then the code of the collision detection is added to the door to realize the opening and closing of the door.

Fig. 3. Door that the box-shaped collider is added

4 Analysis and Discussion The data acquisition module, control module and data processing module are three components of the intelligent home control system based on BP neural network. The collection of indoor temperature, humidity and illumination constitutes the data acquisition module of the system. The control module includes control of indoor air conditioners, humidifiers, curtains and LED lights. The data processing module provides support for system data storage, and also supports the system to support the calculation of the collected data. In a three-dimensional virtual scene, there are three common ways of scene roaming: walking roaming, flight roaming, and automatic path roaming. Each type of roaming has its own specific use environment. In the development process of this system, the common needs of potential users are fully considered, and three roaming methods are organically integrated into the program to achieve the best display effect. Each roaming is discussed in detail below. The research introduces the roaming method of the virtual simulation system, the production method of each roaming method, the effect achieved, and the key program code. The indoor environment simulation runs through the entire simulation system day and night scene. At the same time, this paper gives a detailed introduction to the functions that can be realized in the daytime scene, night scene and villa scene of the whole simulation system. In addition, the entire interactive operating system is produced with associated images to illustrate, so that everyone has a complete understanding of the entire simulation system.

Home Environment Simulation and Interior Design

1869

5 Conclusion Virtual reality technology is to construct a simulated world by virtualizing real objects through computers. By combining smart home and virtual reality technology, the system simulated indoor and outdoor scenes, and focused on simulating the demonstration control of indoor home functions, thereby improving the quality of the smart home 3D display platform and laying the foundation for different customers to customize the private home control mode. At the same time, the simulation system has sufficient portability, which greatly reduces the cost of marketing. All in all, this article conducted in-depth research on various functions in smart home, and used virtual reality technology to simulate the realization of intelligent control functions in the home, which makes the smart home visualized.

References 1. Raja, M.A.Z., Samar, R., Manzar, M.A., et al.: Design of unsupervised fractional neural network model optimized with interior point algorithm for solving Bagley-Torvik equation. Math. Comput. Simul. 132, 139–158 (2017) 2. Yahiaoui, A.: Design of a distributed simulation environment for building control applications based on systems engineering methodology. Build. Simul. (2017) 3. MNSIM: simulation platform for memristor-based neuromorphic computing system. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 37(5), 1009–1022 (2018) 4. Wang, J.G., Yu, Y.G., Zhou, L.L., et al.: Numerical simulation and optimized design of cased telescoped ammunition interior ballistic. Def. Technol. 14(02), 39–45 (2018) 5. Meyrueis, V., Paljic, A., Leroy, L., et al.: A template approach for coupling virtual reality and CAD in an immersive car interior design scenario. Int. J. Prod. Dev. 18(5), 395–410 (2013) 6. Murtadha, M.K., Noordin, N.K., Ali, B.M., et al.: Design and simulation analysis of network-based fully distributed mobility management in flattened network architecture. Telecommun. Syst. 65(2), 253–267 (2017) 7. Chiadamrong, N., Piyathanavong, V.: Optimal design of supply chain network under uncertainty environment using hybrid analytical and simulation modeling approach. J. Ind. Eng. Int. 13(4), 465–478 (2017) 8. Brown, A.D., Chad, J., Kamarudin, R., et al.: SpiNNaker: event-based simulationquantitative behaviour. IEEE Trans. Multi-Scale Comput. Syst. 4, 450–462 (2017) 9. Jokar, E., Abolfathi, H., Ahmadi, A., et al.: An efficient uniform-segmented neuron model for large-scale neuromorphic circuit design: simulation and FPGA synthesis results. IEEE Trans. Circuits Syst. I. Regul. Pap. 66(6), 2336–2349 (2019) 10. Zhu, H.L., Wang, S.F., Yin, G.J., et al.: Study of the numerical simulation of tight sandstone gas molecular diffusion based on digital core technology. Petrol. Sci. 15(5), 68–76 (2018)

Using Barrage Technology to Support Traditional Classroom Teaching Research Xiaohui Zhou(&) School of Marxism, Harbin Commercial University, Harbin 150028, Heilongjiang, China [email protected]

Abstract. Compared with the online classroom, the traditional classroom has not changed greatly. Therefore, it is necessary to apply the intelligent teaching technology to the traditional teaching, so as to effectively improve the efficiency of traditional classroom teaching. Barrage technology can effectively interact with teachers, improve students’ enthusiasm for teaching, and will not adversely affect classroom education. Therefore, it is an effective tool to assist traditional classroom teaching. This study studied the barrage technology that adapts to the interaction between teachers and students in the classroom, and built a suitable barrage communication system, so that teachers and students can engage in classroom interaction through the barrage, and effectively improve classroom teaching efficiency. Keywords: Barrage technology Intelligent education

 Classroom teaching  Interaction 

1 Introduction With the continuous development of network technology, online course broadcasts will be more and more popular. In today’s electronic device, where everyone has a musthave smartphone, it is very meaningful to build a live online webcast system that can be viewed and interacted online. Compared with the online classroom, the traditional classroom has not changed greatly. Therefore, it is necessary to apply the intelligent teaching technology to the traditional teaching, so as to effectively improve the efficiency of traditional classroom teaching [1]. Computer companies in the United States, Japan, and Europe began research on multimedia technologies in the early 1980s, and these studies were first applied to personal computers [2]. The Ethernet phone studied by Xerox Corporation of the United States is a LAN-based multimedia communication system [3]. In the 1990s, when network multimedia developed rapidly, IP telephony began to practice marketization and marketization, and continued to develop. With the continuous enhancement of personal computer processing capabilities and the continuous development of Internet construction, the enrichment of multimedia technology has made people no longer limited to transmitting voice information on the network, and people want to obtain video and obtain more information. It is precisely because of this that the webcasting technology is constantly developing at a high speed [4]. Thanks to the © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1870–1876, 2020. https://doi.org/10.1007/978-3-030-25128-4_247

Using Barrage Technology to Support Traditional Classroom

1871

continuous development of various new technologies, network multimedia technology has received extensive attention. Motorola successfully implemented real-time viewing of movies on mobile phones, and Toshiba has also developed MPEG-4 codec chips, which can be easily developed based on this chip [5].

2 Client Software Module Structure The client is the design focus of this system. The MVC pattern is now the main client structure, and we divide the client into three parts: the user interaction layer, the logical interaction layer, and the data information transmission layer. The user interaction layer includes a main interface session interface and the like. The logic control layer is mainly used to process the logic of the program and respond to the user’s operation. The data information transmission layer is responsible for sending and receiving information between the client and the outside world. The specific structure is shown in the figure [6].

Fig. 1. Structure image of the client

The interface layer is usually the part visible to the user, namely, the UI layer. This layer contains controllers and views, and it mainly performs display of controls, reception of user input data, provision of user manipulation objects, and the like. The interface layer does not correspond to the user’s operation, nor does it have any logicrelated functions. It is associated with the logic control layer, transmits the user’s operation actions and input information, and displays the results of the logic control layer processing [7]. The interface layer is mainly concentrated in the Activity of the Android platform, and the Activity registers all the controls and listens, so that the user’s operations can be responded to in time. The system will process the message queue one by one according to the sequence of operations performed by the user on the screen [8]. The logic control layer corresponds to the “Models” part of the MVC pattern and is the most important part of the client. For example, database access, logical judgment, and other user input information and operation actions are logically processed at the logic control layer. The logic control layer can be analogized to the human brain [9] and is responsible for processing data and performing various functions of the client. Different logic modules are responsible for handling different user operations. For example, the listening module monitors the zoom-out gesture made by the user on the

1872

X. Zhou

screen, and reduces the image, and the sensor detects the user’s rotation operation, and then notifies the program to refresh the screen and adjust the interface. The data transport layer is at the bottom, connecting to the server and communicating. This layer does not interact directly with the interface but is called through the logical control layer. For example, when a user accesses data, the data transfer layer establishes a connection with the server under the control of the logical control judgment. When the server sends a message, the logic control layer gets the data transmitted by the data transport layer, and then the control interface layer displays the result [10] (Fig. 2).

Fig. 2. System architecture

3 Functional Module Design The main interface is mainly used to display the list of teaching live broadcasts. Each list jumps to the live broadcast page, and the related interface can be accessed in the upper right corner of the interface. The main interface is implemented by defining a com.roomlist. View control, and the control forms a Main.xml file in a relative layout with controls such as buttons. The room interface is divided into the upper half of the player area and the lower half of the chat area. The player area is based on the width of the phone and the player height is calculated based on the ratio of the video to 4:3. The chat area is populated with the rest of the remaining areas. At the bottom of the chat area is the chat input box, which is displayed by calling TextView. All components together form a room.xml file in a relative layout. The interface mainly displays software related information and check update buttons. Check the update button is implemented by the Button control. The interface forms an about.xml file (Fig. 3).

Using Barrage Technology to Support Traditional Classroom

1873

Fig. 3. Communication flow chart

Due to the numerous brands and models of Android phones, the screen sizes and resolutions of different models of mobile phones are vary widely. In order to make the software have good compatibility and can be fully adaptive in different size screens and resolutions, the program defines width and height as fill-parent in xml. Using the inverse ratio of weight, the UI can be adapted to any resolution terminal. The chat interaction module is an important part of implementing the teaching interaction and the chat interaction module is used to display the message information sent by itself and other users. The user can also click on the input box to evoke the virtual keyboard, enter the message content and click Send to send the message. The user can also send an expression at the same time, by clicking the emoticon button, the emoticon selection box is called, and the emoticon is added to the input box. In actual teaching, the client first registers with the message server. When a client sends a message, the message is first pushed to the server via a socket connection. After the server processes the message, it sends it to the push server, and then the push server broadcasts the message. The message processing flow is shown in the Fig. 4.

Fig. 4. Flow chart of message processing

1874

X. Zhou

In a changing network environment, the data received by the client may be lost, delayed or even out of order, which will seriously affect the quality of streaming media playback. We designed the client transmit buffer to eliminate delay and jitter as much as possible and ensure that the order of the packets is correct. The working principle of the buffer is that after receiving the audio and video data, the player puts it into the transmission buffer instead of immediately taking out the data frame for decoding and playing. The data frame does not begin to be output until the data in the data buffer reaches the defined output location. In this way, even in the case of network jitter, the data can be transferred to the client at a variable speed, but the client can still read the data at a fixed speed and keep playing consistently. At the same time, in the case of outof-order packet transmission sequence, the buffer also plays a role in correcting data out of order. The buffer can better solve the loss of data stream and the sequence error and ensure that the player can play audio and video content normally. However, the size of the buffer design has a great impact on system performance. If the buffer is set too small, the packet that is late due to network fluctuations does not have enough space to save, which directly causes the buffer to overflow, so the packet must be discarded. At the same time, there is no better solution to the problem of video coherence. If the buffer is too large, it will consume a lot of system resources, which is very fatal in the smartphone, and also causes the playback delay to be extremely large, and the real-time performance is deteriorated. In this design, we set the buffer area to 3 s. When the buffer time reaches 3 s, the system starts to play, which not only solves the network jitter problem, but also avoids real-time impact.

4 Analysis and Discussion Teaching interaction is a process in which learners interact with and interact with the learning environment to pursue their own development and is a process attribute of learning and teaching. Among them, the teaching interaction is based on the interaction between learners. Moreover, it focuses on facilitating learner changes, allowing learners to gradually approach the teaching goals, so that teaching interaction makes sense. As shown in Fig. 1, the teaching interaction hierarchy proposed by Professor Chen Li divides the teaching interaction into three levels: operational interaction, information interaction, and concept intersection. It is concrete to abstract and from low to high. Students start with interactions with the media, then with the information interaction between the teaching subjects, between students and teachers, between students and students, and between students and learning resources. Eventually, it is upgraded to conceptual interaction, where students interact with new concepts and form the growth of knowledge systems. It corresponds to the six levels of memorization, understanding, application, analysis, evaluation and creation of Bloom’s cognitive goals. It can be seen that classroom interaction plays a role in improving the understanding and application of students’ knowledge. Barrage technology can effectively

Using Barrage Technology to Support Traditional Classroom

1875

interact with teachers, improve students’ enthusiasm for teaching, and will not adversely affect classroom education. Therefore, it is an effective tool to assist traditional classroom teaching.

5 Conclusion The traditional classroom format is too dull, so it is necessary to introduce multimedia and use animation and video to attract students’ attention. However, it is easy to overlook that multimedia is ultimately just a means of teaching. It must be used in conjunction with the teaching process. If we use multimedia in the classroom blindly, the knowledge points carried by the media are too dense, and the rapid pace of teaching content will lead to more dispersed attention, which exceeds the cognitive load of students. Compared with traditional teaching classrooms, the use of barrage in the classroom can improve students’ understanding of knowledge. In the classroom, for a certain knowledge point of the teaching process, students can ask questions through the barrage, and the teacher can understand the students’ problems through the barrage, and the moderate use of the barrage can enhance the students’ participation in the class. All in all, in the era of the rise of new media, only through the mixed use of multiple media, teaching can achieve the desired results, and the use of the barrage in the classroom will make classroom teaching enter a new era. Acknowledgement. The key project of teaching reform and teaching research of Harbin Commercial University in 2018 is “Application of Micro-Barrage Technology in the Course of Situation and Policy” (HSDJY201807 (Z)).

References 1. Gao, J., Chen, Y., Wanshun, L.I., et al.: Mixed teaching mode combining SPOC, flipped classroom, traditional classroom, and whole process examination: teaching practice based on the course of fundamentals of modern chemistry (Organic Chemistry). Univ. Chem. 33(11), 47–52 (2018) 2. Fardoun, H.M., Awada, H.: Mobile technology to support the interactive classroom. Int. J. Web-Based Learn. Teach. Technol. 12(4), 38–47 (2017) 3. Lo, C.K., Hew, K.F.: A critical review of flipped classroom challenges in K-12 education: possible solutions and recommendations for future research. Res. Pract. Technol. Enhanc. Learn. 12(4), 1–22 (2017) 4. Hargreaves, E., Elhawary, D., Mahgoub, M.: ‘The teacher who helps children learn best’: affect and authority in the traditional primary classroom. Pedagogy Cult. Soc. 26(1), 1–17 (2017) 5. Unal, Z., Unal, A.: Comparison of student performance, student perception, and teacher satisfaction with traditional versus flipped classroom models. Int. J. Instr. 10(4), 145–164 (2017) 6. Gregorius, R.: Performance of underprepared students in traditional versus animation-based flipped-classroom settings. Chem. Educ. Res. Pract. (2017). https://doi.org/10.1039/c7rp00130d

1876

X. Zhou

7. Freeman, D.: The case for teachers’ classroom english proficiency. RELC J. 48(1), 31–52 (2017) 8. Roehling, P.V., Root Luna, L.M., Richie, F.J., et al.: The benefits, drawbacks, and challenges of using the flipped classroom in an introduction to psychology course. Teach. Psychol. 44(3), 183–192 (2017) 9. Lee, T.-K.: Using virtual role-play to enhance teacher candidates’ skills in responding to bullying. Technol. Teach. Educ. 25, 91–120 (2017) 10. Pantic, M., Zwitserloot, R., Grootjans, R.J.: Teaching introductory artificial intelligence using a simple agent framework. IEEE Trans. Educ. 48(3), 382–390 (2005)

Research on Cultural Resource Information Management System in Internet + Times Jiang Jie(&) School of Management, Henan University of Technology, Zhengzhou 450001, Henan, China [email protected] Abstract. This paper takes the national characteristic cultural digital resource cloud storage management system as the research topic. In order to solve the problems in the current cultural field, this paper summarized the knowledge of cloud storage and public culture and systematically learned cloud storage technology. At the same time, this paper studied distributed open source software FastDFS file system, distributed cache database Redis, server load balancing technology Nginx, lightweight high-availability software Keepalived and RPC SOA framework Dubbo. In addition, this paper analyzed the technology from the aspects of system architecture, application points, advantages and disadvantages, and integrated various technologies. On this basis, the research and implementation of the digital storage cloud storage management system of ethnic characteristics culture is completed. Keywords: Internet+  Cultural industry Information management

 Cultural resources 

1 Introduction The diversity of modern culture and the integration of diverse cultures have accelerated the demise of some traditional cultures. If there is no effective protection, these traditional cultures will one day become unknown and lose their status and change appearance during the slow process of ablation. China has a long history and culture, and many ethnic groups have rich cultural connotations. Moreover, our country has excellent humanities and natural cultural resources. In recent years, the state has introduced many measures in the protection of cultural resources, advocated the development of cultural resources sharing projects, and built electronic information libraries through some means of informatization to realize the open and global sharing of local cultural resources [1]. This has realized the dissemination, inheritance and protection of cultural resources to a certain extent, and it is an effective and referable cultural resource protection measure. However, some of the current protection measures are limited by cultural resources. Moreover, it is only for the informatization of some paper data, the content and scope are limited, and there is a lack of a collection and management process of cultural resources [2]. Therefore, in order to better protect and inherit cultural resources, a rich and complete cultural resource management system is needed. As early as 2002, China has started the work related to the protection and management of cultural resources and has introduced relevant policies and innovation © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1877–1883, 2020. https://doi.org/10.1007/978-3-030-25128-4_248

1878

J. Jie

projects [3]. In 2002, with the approval of the State Council, a new cultural innovation project, the “National Cultural Information Resources Sharing Project”, was established. Up to now, after more than ten years of construction and development, the cultural sharing project has basically formed a networked management and service system covering the whole country and has become a public cultural innovation project that provides digital information services such as digital information, literature, and knowledge for the masses. The cultural sharing project carries out digital processing and integration through the essence of the traditional culture of the Chinese nation and the modern social and civilized information resources that are close to the masses and serve the life. Through the transmission methods such as satellite, Internet and mobile storage, the use of a network framework composed of national centers, provincial subcentres, city-level sub-centers and grass-roots service points to display cultural services, the sharing of cultural information resources across the country is realized. In the past ten years, the cultural sharing project has embarked on a scientific and innovative approach to cultural innovation with its courage and innovative practice of reform. Practice has proved that the cultural sharing project is a cultural practical project to build China’s public cultural service system, narrow the gap between urban and rural areas, eliminate the digital divide, and benefit thousands of families. It is a booster for realizing the great development and prosperity of China’s culture [4]. In the past ten years, there have been many studies on the development of cultural resources and the development of cultural industries in China. The following four characteristics are summarized: Firstly, there are many studies that tend to improve the cultural soft power of the national macro level and the international competitiveness of the cultural industry, while the research on regional cultural resources development and cultural industry is insufficient. Secondly, there are many studies on cultural industries that tend to be developed in the eastern regions, but there is insufficient research on cultural development and industry in the backward regions of the west. Thirdly, there are many studies in the content industry such as online games, animation industry, and film industry, but the research on national cultural resources development and industry is insufficient. Fourth, there are many studies on the development of cultural resources and cultural industries in the province, but there is insufficient research on the multicultural areas of the nature of the provincial joints [5].

2 Storage Service There are three basic concepts involved in S3 storage systems: objects, keys, and buckets. The object is the basic storage unit of S3, which is mainly composed of two parts: data and metadata. The data can be of any type, and the metadata is data used to describe the data, which is generally associated with specific data and does not exist alone. The metadata stored in S3 is additional description information of the object data content, which may be system metadata defined by the system by default or may be customized user metadata. Among them, the size of user metadata must not exceed 2048B [5]. Metadata is defined by a pair of key-value collections [6], and the object’s unique identifier is a distinguishing key, which is similar to an identity card number for a person. Moreover, each object must also specify only one key, otherwise the object is

Research on Cultural Resource Information Management

1879

meaningless. The role of the bucket is equivalent to a folder. The basic structure of S3 is shown in Fig. 1 [7]:

Fig. 1. The basic structure of S3

With the increasing voice of domestic cloud computing, cloud storage technology is the first to lead the development trend of cloud computing. In addition to providing data storage functions, cloud storage can also be used for functions such as digital asset management, which has led to investment research by companies such as Alibaba, Yunchuang Storage, Tencent, Huawei, Jinshan, and Inspur [8]. The original intention of TFS design is to deal with the storage and reading of many image files on the network. It can be seen from the TFS architecture of Fig. 2 that the

Fig. 2. TFS architecture diagram

1880

J. Jie

cluster is composed of a name service node and a data service node, and the dual-name service nodes are mutually hot standby [9]. At the same time, each data service node runs on the Linux system and stores data files in the form of a 64M block file. To ensure the security of data files, block files are stored in multiple copies. Moreover, the correspondence between the metadata information and the TFS file name and the actual file needs to be stored by the user according to his own needs [10].

3 System Architecture Diagrams This research system uses the Dubbo architecture system, and Dubbo is an excellent RPC SOA framework. Dubbo is a Java high-performance premium service framework open sourced by Alibaba Group, and it can realize the output and input functions of services through high-performance RPC and realize seamless integration with Spring framework. The architecture of Dubbo is shown in Fig. 3:

Fig. 3. Dubbo architecture diagram

As can be seen from the above figure, the five nodes Provider, Registry, Consumer, Monitor, and Container represent the service provider, service registry, remote call service consumer, monitoring center (statistical service call times and call service time), and the container in which the service runs. In order to support the construction of the public culture cloud platform, it is necessary to construct a national characteristic cultural digital resource cloud storage management system. The system is mainly constructed to support the needs of the entire public cultural cloud platform for data storage. By aggregating public cultural digital resources, a service platform is provided for the public who need access to public cultural services. As shown in Fig. 4, each application system data (Data of each venue information, user data, resource catalog data, behavioral activity data, cultural infrastructure data, etc.) of the data sensing layer is processed by the wired network and the wireless

Research on Cultural Resource Information Management

1881

network to aggregate the data into the basic database. Finally, the corresponding data is stored and managed by the cloud storage management system. Moreover, it provides application services to the public (It refers to the public or non-genetic people interested in culture, etc.), government departments (It refers to cultural agency staff who provide a platform for the public to disseminate and promote public culture and provide public services to the public), cultural venues (workers in each venue), cultural industry businesses (users who provide products related to the cultural industry), and the like through various related forms, such as event reservations, through various related applications through the network.

Fig. 4. Cluster architecture diagram of FastDFS+Redis+Nginx+Keepalived+LVS

4 Analysis and Discussion The call relationship is shown in Fig. 3:0. The container assumes the task of the service startup and initially loads and runs the Provider. 1. When the service producer starts, the service provided by the service producer is registered in the Registry. 2. When the Consumer starts, it subscribes to the Registry for its required services. 3. The Registry returns the service address required by the Consumer to the service consumer. If the Address changes, the Registry returns to the Consumer via the HTTP long connection. 4. Based on the soft load balancing algorithm, the Consumer selects a Provider from the Provider address list to invoke, and if it fails, it selects another one to execute the call. 5. The Provider and the Consumer periodically count the number and time of service calls in the memory, and periodically send statistics to the monitoring center such as Zookeeper. There are three reasons why Zookeeper is the registry of services: Firstly, the Zookeeper cluster can achieve high availability. Second, it is a sub-project of Apache Hadoop with relatively good strength. Third, through the combination of Dubbo and Zookeeper, Zookeeper does not need to modify itself, and all registry logic adaptations are completed when the Zookeeper client is called.

1882

J. Jie

National characteristic cultural digital resources cloud storage management system is mainly to provide users with a personalized, scalable data storage and service platform. The cloud storage management system is mainly to solve the problem of data storage related to cultural digital resources of ethnic characteristics. Moreover, it mainly provides storage, access and sharing of various data resources for cultural departments at all levels, group organizations, cooperative enterprises, cultural direct institutions, operation management teams, and venues at all levels, including resource data generated by activities such as event reservations, venue reservations, space presentations, community styles, competition interactions, art appreciation, and art training. At the same time, it provides personal storage space and data sharing platform for these institutions, departments and individuals, and stores the resource data generated by it. In addition, it can save a lot of space and energy, reduce costs and improve the security of data storage.

5 Conclusion This chapter mainly studied the application scenarios of cloud storage management systems, problem analysis and requirements analysis that need to be solved. According to the analysis of cloud storage system architecture, the architecture model of cloud storage system based on FastDFS was designed, and the interaction relationship of main functional modules in cloud storage management system was analyzed. At the same time, this paper used LVS and Keepalived to design load balancing and high availability during access. In addition, in order to realize the communication between the function module and the FastDFS cluster, reduce the coupling between the various functional modules and realize the convenience of the user and application service interface, this paper used the distributed service framework Dubbo to design the system distributed service. Finally, this paper proposed a digital storage cloud storage scheme for ethnic characteristics to design the data storage layer of the cloud storage system.

References 1. Benfer, M., Williams, E.: Assessing the impact of fire extinguisher agents on cultural resource materials. Fire Technol. 54(1), 289–311 (2018) 2. Westerheijden, D.F.: A solid base for decisions - use of the VSNU research evaluations in Dutch Universities. High. Educ. 33(4), 397–413 (2017) 3. Hefner, J.L., Hilligoss, B., Knupp, A., et al.: Cultural transformation after implementation of crew resource management. Am. J. Med. Qual. 32(4), 384–390 (2017) 4. Barfuss, W., Donges, J.F., Wiedermann, M., et al.: Sustainable use of renewable resources in a stylized social-ecological network model under heterogeneous resource distribution. Earth Syst. Dyn. 8(2), 255–264 (2017) 5. Brugnach, M., Craps, M., Dewulf, A.: Including indigenous peoples in climate change mitigation: addressing issues of scale, knowledge and power. Clim. Change 140(1), 19–32 (2017)

Research on Cultural Resource Information Management

1883

6. Dalton, K., Bingham, C.: A social institutionalist perspective on HR diffusion: historical and cultural receptivity to HRM in a post-communist context. Int. J. Hum. Res. Manag. 28(6), 1– 27 (2017) 7. Fadaizadeh, L., Najafizadeh, K., Shafaghi, S., et al.: Using home spirometry for follow up of lung transplant recipients: “a pilot study”. Tanaffos 12(1), 64 (2017) 8. Breeze, T.D., Dean, R., Potts, S.G.: The costs of beekeeping for pollination services in the UK – an explorative study. J. Apic. Res. 56(3), 310–317 (2017) 9. Ho, J.R., Hoffman, J.R., Aghajanova, L., et al.: Demographic analysis of a low resource, socioculturally diverse urban community presenting for infertility care in a United States public hospital. Contracept. Reprod. Med. 2(1), 17 (2017) 10. Jessica Hwang, L.J., van Westering, J., Chen, H.H.: Exploration of the linkages between the gastronomy and heritage of Tainan city, Taiwan. Adv. Hosp. Leisure 1(1), 223–235 (2017)

Structural Health Monitoring Based on BP Network and Magnetic Memory Zhigang Gao(&) School of Architecture and Civil Engineering, Xi’an University of Science and Technology, Xian 710054, China [email protected]

Abstract. Although many magnetic memory testing devices developed in China can diagnose the surface or near surface damage of metal components, there is still a certain gap from the non-contact detection technology of Russian Dynamic Diagnostics. This study combined the damage situation of petroleum transportation pipelines to construct a detection model based on BP neural network. At the same time, according to the different magnetization properties of ferromagnetic materials in different deformation states, the corresponding magnetic model was established respectively, and the magnetic memory method was used to detect structural damage in combination with the pipeline structure. In addition, this paper designed a control experiment to conduct research and analysis. The experimental results show that the proposed algorithm has certain detection effects and can provide theoretical reference for subsequent related research. Keywords: BP neural network  Magnetic memory Structural health monitoring  Structural damage



1 Introduction As early as the 1960s, some advanced countries in the world noticed the problem of safe transportation of pipelines and began the development of pipeline inspection equipment. Pipeline inspection technology has gone through stages of development from blind excavation to location diagnostics and from contact to non-contact inspection. Conventional detection techniques for pipe internal corrosion without excavation generally include leakage flux detection technology, radiographic detection technology, ultrasonic pulse reflection detection technology, optical-based endoscopic non-destructive testing technology and eddy current electromagnetic induction detection technology [1]. For the magnetic signal feature extraction method, British scholar Daniel J [2] quantified the defect features by extracting the signal characteristics such as standard deviation, variance, wavelet energy and maximum value and through the network training model and experimental test methods. Yan Chunxi [3] of Tianjin University proposed using wavelet multiresolution analysis and fast Fourier transform to judge cracks and other defects. Zhang [4] of Harbin Institute of Technology gave the noise reduction method from different angles of magnetic signal time domain characteristics © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1884–1890, 2020. https://doi.org/10.1007/978-3-030-25128-4_249

Structural Health Monitoring Based on BP Network and Magnetic Memory

1885

and singular propagation characteristics. Liang Zhifang [5] of Tianjin University pointed out six parameters (Signal zero-crossing position, wavelet analysis energy maximum point, Fourier analysis phase sudden change point, difference between local maximum value and local minimum value signal, signal gradient value in detection direction, signal perpendicular to detection direction gradient value) reflecting the characteristics of magnetic signals, and comprehensively considered these factors to avoid misjudgment. Jin Li [6] found that the denoising effect of the multi-scale translation invariant wavelet denoising method is better than the Fourier low-pass filtering effect. Yi Fang [7] proposed to use the improved wavelet threshold noise reduction method to deal with the magnetic signal with interference, which can avoid the constant deviation and discontinuity caused by the classical soft and hard threshold processing. Ren Jilin [8] used wavelet packet to reduce the noise of the magnetic signal, improve the signal-to-noise ratio, and upgrade the sharpness of the representation. Sun Yanru [9] proposed using the Daubechies wavelet denoising method to denoise the vertical magnetic signal and using the wavelet detail component and the gradient signal as auxiliary parameters to achieve multi-parameter multi-channel characterization of the magnetic signal. In summary, since the wavelet transform has local time domain and frequency domain features, it is very suitable for processing unstable magnetic signals with randomness. According to the different magnetization properties of ferromagnetic materials in different deformation states, the corresponding magnetic model is established respectively, and the corresponding effective field model and the influence law of model parameters are obtained. At the same time, the finite element method is used to simulate the magnetic signal distribution characteristics of the member under the action of uniform magnetic field and different stresses, and the influence law of different defect parameters on the magnetic signal characteristics is obtained.

2 Research Method The finite element model and principle of pipeline damage are shown in Fig. 1. The pipe diameter is 120 mm, the wall thickness is 10 mm, the pipe length is 1000 mm, and it is placed in a uniform magnetic field, and the damage defect is in the middle of the pipe. In the finite element software simulation, in order to ensure the simplicity and rationality of the calculation, in this paper, the free meshing method is adopted, and the mesh refinement operation is performed in a local area (such as a pipeline defect) (as shown in Fig. 2), so that the computer resources can be better utilized to make the solution more accurate. The magnetic permeability at the defect of the material is determined by the magnetic properties of the different deformation stages, and changes in the magnetic domain structure such as the magnetic domain wall expansion and the magnetic domain angular deflection caused by the stress concentration cause the magnetic permeability of the material to change. Combining the relationship between magnetic permeability and stress concentration, the magnetic parameters of the material are set in the finite element software, and the magnetic field distribution of the leakage magnetic field in the stress concentration region is calculated, thereby indicating the

1886

Z. Gao

correspondence between the magnetic signal and the degree of damage or stress concentration of the ferromagnetic material [10].

Fig. 1. Finite element simulation model diagram

Fig. 2. Finite element meshing

Artificial Neural Networks (abbreviated as ANNs) implement various complex information processing functions by simulating the structure and neural network behavior of human brain synaptic connections. It is a mathematical model with selflearning and adaptive ability information processing algorithms. Since its introduction in the 1940s, dozens of network models have been developed, including MP model, Hopfield neural network model, Boltzmann model, Kohonen network, BP network, RBF network and so on. Among them, BP neural network is a multi-layer feedforward network trained according to the error back propagation algorithm. It uses the learning rule of the steepest descent method and the weights and thresholds are constantly adjusted by backpropagation to minimize the sum of squared errors. Moreover, the method is mainly used in the fields of pattern recognition, system identification, function fitting, cluster analysis, and optimal prediction. This topic is a quantitative analysis of the type of damaged pipeline defects, which belongs to the pattern recognition problem. Therefore, BP neural network is used for intelligent identification of signals.

Structural Health Monitoring Based on BP Network and Magnetic Memory

1887

Commonly used data fusion methods are weighted average, Bayesian estimation, Kalman filtering, D.S evidence reasoning, neural network, fuzzy set theory and cluster analysis. Neural networks have strong fault tolerance and self-learning, self-organizing, and adaptive capabilities, which can simulate complex nonlinear mapping. With the development of neural networks, its unique properties and nonlinear analysis capabilities provide an innovative and good technical guarantee for data fusion. At the same time, information fusion based on neural networks is essentially an uncertainty reasoning process. It makes full use of all the information provided by the outside world, automatically recognizes the knowledge required for extraction, and conducts learning reasoning on this basis. In addition, the neural network processes the uncertain and complex information provided by the outside world into a system and a language that people can understand through large-scale learning and association based on the sample. Therefore, the research of neural network provides a good method for data fusion of characteristic information of pipeline fault signals. Moreover, the introduction of neural network technology to fuse the magnetic memory signal characteristic data in different states of the pipeline has some advantages that other methods do not have. For example, it can adaptively learn various states of the steel cord conveyor belt, classify and identify different states of the pipeline, and has certain anti-interference ability, and can accurately identify the current state of the pipeline.

3 Result This subject taken the oil transportation pipeline as the research object, actually measured the geomagnetic signals collected under different factors, and attempted to make damage assessment of the pipeline under test (This study is based on the material properties of Q235 steel under simulation and test conditions, and there is still no relevant data on the actual operating conditions of other pipelines. Therefore, whether the method is suitable for the detection of other types of ferromagnetic materials in service is unknown.). The experiment meets the following requirements: (1) The initial magnetic memory signal of the intact defect-free component was tested before the experiment and used as a reference basis. It has been confirmed by a large number of experiments that the pipeline anti-corrosion layer does not affect the detection of magnetic signals. (2) The sensor moves directly above the fixed measuring point, which ensures that the data detected by the sensor each time is the magnetic signal value of the same measuring point. Moreover, the detection signal directly above is obvious, which is conducive to making an accurate judgment on the in-service situation of the pipeline. (3) In order to avoid the missed detection of the magnetic field information of the defect position, the probe moving speed is suitable to be 0.3 m/s–0.5 m/s, and is Uniform speed. (4) The detection is repeated to improve the measurement accuracy. In this paper, the magnetic field distribution under the same position of the same pipe is tested. Figure 3 shows the pipe with a diameter of 159 mm and there is obvious

1888

Z. Gao

perforation at 150 mm. The magnetic memory test sample is used to detect the pipeline to obtain the waveform of the magnetic signal processed by the wavelet threshold denoising method, as shown in Fig. 4. Fluctuations in the magnetic memory signal reflect the actual yield stress state: The axial magnetic signal component has an extreme value, and the normal magnetic signal component changes the sign and has a zero value in the abnormal region, which fully conforms to the principle of magnetic memory detection technology and the simulation result.

Fig. 3. Magnetic field strength of the pipe surface

Fig. 4. Gradient energy of the pipe surface

4 Analysis and Discussion From the data collected, it can be seen that the data is repetitive, and the data collected three times is basically the same. Moreover, single-point repeated measurements found that single-point data was very stable. (1) It is feasible to develop a prototype and evaluate the defect of the ferromagnetic pipeline by the principle of metal magnetic memory. The method selects the high reliability sensor and designs a high signal to noise ratio filtering and amplifying circuit and a high precision analog to digital converter. The control circuit of STM32F407 has large storage capacity and fast working speed, the stability of the

Structural Health Monitoring Based on BP Network and Magnetic Memory

1889

RS-485 communication circuit is high, and the design of the peripheral shielding device effectively reduces the interference signal and energy loss. (2) The improved db wavelet adaptive threshold denoising method is used to denoise the magnetic signal, which solves the soft threshold distortion problem and the hard threshold oscillation deviation problem, and achieves the adaptive noise reduction effect. At the same time, combined with a large number of ground experiments, it shows that this wavelet algorithm can effectively reflect the magnetic signal characteristics of ferromagnetic pipelines. (3) The BP neural network is used to take the six-dimensional parameters such as the peak value of the axial component of the magnetic memory of the pipeline and the peak-to-valley value of the normal component as the feature input vector, and encode the pipeline damage as the output vector. At the same time, the matlab language is used to compile and train the three-layer BP network model, which is a good way to evaluate the in-service situation of the pipeline.

5 Conclusion This paper carries out research and exploration from the theoretical analysis of magnetic memory, to numerical simulation, to the development of magnetic memory testing equipment, magnetic signal denoising and quantitative evaluation systems. At the same time, this study fills in the gaps in the three-dimensional simulation of magnetic memory detection methods, clarifies the characteristics of each threedimensional component of magnetic signals, solves the problems of difficult magnetic signal detection, difficult noise reduction, and difficulty in evaluation, and establishes a quantitative evaluation system for intelligent detection of pipeline defects. In addition, this study uses wavelet analysis technology to denoise the magnetic signal, analyzes the magnetic memory signal characteristics of the ferromagnetic pipeline with defects, and determines the magnetic memory signal characteristics of each defect factor. Moreover, this study uses it as the input eigenvalue, and establishes a BP neural network evaluation system based on the combination of experimental database and simulation, which realizes the intelligent identification and evaluation of pipeline defect characteristics. Acknowledgement. This research was supported by The National Natural Science Foundation of China (51478383, 51878548), and The Key Project of Natural Science Foundation Research of ShaanXi Province (Grant No: 2018JZ5013).

References 1. Liu, S.J., Li, S.L., Jiang, M., et al.: Quantitative identification of pipeline crack based on BP neural network. Key Eng. Mater. 737, 4 (2017) 2. Singh, W.S., Stegemann, R., Kreutzbruck, M., et al.: Mapping of deformation-induced magnetic fields in carbon steels using a GMR sensor based metal magnetic memory technique. J. Nondestr. Eval. 37(2), 21 (2018)

1890

Z. Gao

3. Hou, C., Yu, X., Cao, Y., et al.: Prediction of synchronous closing time of permanent magnetic actuator for vacuum circuit breaker based on PSO-BP. IEEE Trans. Dielectr. Electr. Insul. 24(6), 3321–3326 (2018) 4. Xia, R., Zhou, J., Zhang, H., et al.: Experimental study on corrosion of unstressed steel strand based on metal magnetic memory. KSCE J. Civ. Eng. 23(1), 1320–1329 (2019) 5. Ni, C., Hua, L., Wang, X.: Crack propagation analysis and fatigue life prediction for structural alloy steel based on metal magnetic memory testing. J. Magn. Magn. Mater. 462, 144–152 (2018) 6. Haihong, H., Xiong, B., Qian, Z., et al.: Evaluating the wear state of ferromagnetic material using magnetic memory signals based on tribo-magnetisation. Insight - Nondestr. Test. Cond. Monit. 60(6), 335–342 (2018) 7. Kiraly, B., Rudenko, A.N., van Weerdenburg, W.M.J., et al.: An orbitally derived singleatom magnetic memory. Nat. Commun. 9(1), 3904 (2018) 8. Shi, P., Jin, K., Zhang, P., et al.: Quantitative inversion of stress and crack in ferromagnetic materials based on metal magnetic memory method. IEEE Trans. Magn. 1–11 (2018) 9. Singh, W.S., Kumar, S.S., Mukhopadhyay, C.K., et al.: Modeling and experimental studies on 3D-magnetic flux leakage testing for enhanced flaw detection in carbon steel plates. Res. Nondestr. Eval. 1–16 (2018) 10. Soni, A.K., Rao, B.P.: Lock-in amplifier based Eddy current instrument for detection of subsurface defect in stainless steel plates. Sens. Imaging 19(1), 32 (2018)

Multi-cluster Fast Information Statistics Algorithm Based on Probability Xiaohui Tian(&) and XiaoHan Sun School of Network Security and Informatization, Weinan Normal University, Weinan 714099, Shaanxi, China [email protected] Abstract. Information collection and target tracking are key technologies for wireless sensor network applications. Signal interference will cause the node to frequently jitter between cluster members and independent nodes. In order to improve the signal transmission efficiency, this study analyzed the current common sensor networks and theoretically analyzed and optimized various parameters. At the same time, based on the behavior characteristics, this paper proposed a mobile phone algorithm for positioning information. In addition, this paper used a probability-based state notification mechanism to perform cluster maintenance. Finally, the experiment was designed to analyze the performance of the proposed algorithm. Research shows that the proposed algorithm has certain effects. Keywords: Information collection

 Target tracking  Probability  Statistics

1 Introduction Wireless sensor networks are new research hotspots in the information field today, and it is a comprehensive technology combining micro-electromechanical systems, computers, communications, automatic control, artificial intelligence and many other disciplines. Current research involves communication, networking, management, and distributed information processing. Specifically, key technologies of wireless sensor networks include routing protocols, MAC protocols, topology control, positioning techniques, time synchronization, data fusion, and energy management. The RADAR [1] system relies solely on Rf for position assessment, which collects key points during the configuration phase. In the system, three WFi base stations act as backbone contacts. The mobile node is responsible for collecting the signal strength and signal-to-noise ratio of the three base stations to form a 6-ary data item, and the units are all dBm. The 6-element position data items of each reference position point in the area are collected before the system is put into use. Then, the collected data of the reference location points are stored in the database. At runtime, the backbone contacts obtain the 6-tuple data sent by the wiFi interface on the moving object. After that, the system attempts to match the real-time data to one or more of the databases. Moreover, the entity will be positioned at the best matching point, or at the center of multiple matching points. The disadvantage of this method is that it requires information acquisition of the reference point before use. The LANDMARC system [2] uses active RFID technology for positioning. Moreover, it requires a large number of reference beacons to be placed in the environment. The advantage of this method is that the parameters of the reference © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1891–1897, 2020. https://doi.org/10.1007/978-3-030-25128-4_250

1892

X. Tian and X. Sun

beacon are dynamically determined, so that it is robust to fluctuations in the wireless signal. However, the arrangement of reference beacons poses a major challenge in practical applications. The reason is that moving objects often place active beacons on wrists and the like. Therefore, the reference beacon needs to be placed at a similar level and requires a larger density (even one to 1–2 m). Cisco [3] uses signal strength (RSSI) and fingerprint technology to track 802-11 devices in WLANs, and the system can reach a precision of a few meters. The disadvantage of this method is that it requires on-site surveys and floor plans. Ubisense [4] is a commercial product that uses UWB as a positioning technology. It does not depend on the signal strength but is located by the wireless signal arrival time difference (Time Difference of Arrival, TDOA) and the angle of arrival (Angle of Arrival, AOA). Moreover, the sensor uses a hybrid of TDOA and AOA techniques to calculate the location of the transmitted beacon. Since the transmission speed of Rf is extremely fast, the system requires a very accurate clock. In addition, it increases the manufacturing cost of the sensor, making Ubisense more suitable for the supervision of facilities than individual users. The MERIT system [5] is aimed at indoor positioning, which takes into account possible signal interference in the room. The advantage of this method is that it does not require a site survey or floor plan and does not rely on any signal model. The disadvantage is that the signal is too dense and frequent, which greatly increases the network load and energy consumption. This paper combined computer statistical methods to conduct research, and developed a system based on wireless sensor networks for downhole source and personnel location and emergency linkage. It requires that the location information of large-scale mobile nodes can be collected in real time within the range allowed by the network load.

2 Research Method When a mobile node is close to another, it will detect its neighbors through idle listening. If the RSSI satisfies the preset threshold, the mobile node will be declared as the cluster head, and other mobile nodes that detect the cluster header will be marked as cluster members [6].

Fig. 1. BMC state transition diagram (a) State 0–3 is a cluster build (b) State 4–7 is cluster maintenance

Multi-cluster Fast Information Statistics Algorithm

1893

Fig. 2. Example of a cluster

When a mobile node is close to another, it will detect its neighbors through idle listening. If this RSSI satisfies the preset threshold, the mobile node will be declared as the cluster head, and other mobile nodes that detect the cluster head will be marked as cluster members [7]. The state transition diagram for this phase is shown in Fig 1(a). At the beginning, the mobile node is in state 0 and periodically transmits its own positioning information to the network. When the RSSI of an isolated neighbor node satisfies RSSIind  ki, it will be declared as the cluster head, and the state will be changed from 0 to 3, and the clustering request of other nodes will be received. During the period as a cluster head, it will be responsible for periodically transmitting the location information of the entire cluster to the network. When an isolated node receives an RSSI from the cluster head that satisfies RSSIind  ki, it will change from state 0 to 1. In state 1, the mobile node will send a request to the cluster to the neighboring cluster. If it successfully joins a cluster, the move point will be converted to state 2 and the transmission of its periodic location information will be stopped [8]. When the cluster head or cluster member is away from the cluster, the cluster’s maintenance mechanism will start. In the usual method (referred to as GW), when a cluster member detects that the cluster head is invalid ðRSSIind \kiÞ, the cluster member sends a message to inform the cluster head that it will exit the cluster and restart its periodic transmission. Taking the cluster shown in Fig. 2 as an example, (a) is a stable cluster at time t, and (b) and (c) are two possible states of the cluster at time t + 1 [9]. Considering the obvious nature of the minority’s departure from the majority, it is illustrated that Fig. 2 is representative. For the case of (b), the method using GW is simple and effective. For case (c), since the cluster head is out of most mobile nodes, if the GW is still used, the network will have a sudden message growth. Moreover, it is particularly evident in large-scale dense networks, which will greatly reduce the efficiency of the system [10]. Based on this, the very intuitive way to deal with these two situations is to take a different approach to get better performance. For (b), these few nodes leave the cluster by sending messages, while the remaining nodes remain as they are. For (c), we will select a better node from the cluster members instead of the original cluster head node and remove the original cluster head from the cluster. The key problem to be solved in

1894

X. Tian and X. Sun

this way is to distinguish the above two situations with the lowest possible cost, that is, the mobile node in the cluster can clearly know which the situation is, thereby performing the corresponding algorithm. We have designed a state notification mechanism based on probability to distinguish. The PSI algorithm is described as follows: Step 0: When a node (cluster member) detects itself away from the cluster head ðRSSIind \k0Þ, it starts a single clock with the I1 time parameter. Step 1: After a random small interval, the node broadcasts the message with probability P and announces network that it has left the state of the cluster head. Step 2: Before the clock is not triggered, the point listens to the notification messages of all mobile nodes and counts the number, which is a total of L. L is the number of message packets that are listening when idle. Step 3: This point compares p * N with L when the clock is triggered. N is the number of cluster members in the cluster where the current point is located, which is extracted from the periodic broadcast of the cluster head. If: L  dðN Þ; 0\dðN Þ\1 Np

ð1Þ

the current point will be treated as the first case. otherwise, if L [ dð N Þ Np

ð2Þ

the algorithm result is the second case, which will be discussed later. Assuming that the number of cluster members leaving the cluster head is k, the expected message complexity of performing PSI is k  p.

3 Result In our experiments, the following two statistic data was used as the cost evaluation of the algorithm: (1) The number of messages generated by each mobile node per cycle. It includes not only the messages generated by the mobile node for reporting location information, but also the communications required by the BMC algorithm to create and maintain clusters. (2) The number of messages sent by the network per cycle. It calculates the transmission, forwarding and routing of all mobile node messages. Moreover, the collection node (base station) is deployed in the center of the entire simulation area. The simulation platform we built will count the values of the above two in the network. For more persuasiveness, we have designed two types of experiments: (1) Network density increment: The network size IV is incremented from 100 to 2000 in steps of 40, U = 100, and other parameters remain unchanged. We collected 4000 rounds of data for each IV and then averaged them as final values. The

Multi-cluster Fast Information Statistics Algorithm

1895

reason we collect as much data as possible for averaging is that the statistics at the beginning of the network are unstable. (2) Independent time increment of the mobile node: We increase the number of independent nodes of the mobile node from 0 to 1500 in steps of 30, N = 1000, and other parameters remain unchanged. For each U, we collect 4000 rounds of data and then average them as final values. The reason we collect as much data as possible for averaging is that the statistics at the beginning of the network are unstable. After a mobile node leaves the group, it will not join any group in the subsequent U round (Figs. 3 and 4).

Fig. 3. Number of messages generated (N changes)

Fig. 4. Number of messages forwarded or sent (N changes)

1896

X. Tian and X. Sun

4 Discussion and Analysis This study introduces the BMC clustering algorithm in detail, and it is a clusteringbased location information collection algorithm that makes full use of human behavior characteristics for clustering. In the algorithm, only the cluster head periodically sends a positioning message to the network, and the cluster member idlely listens to the cluster head message to detect the current state of cluster head and it. In cluster maintenance, we use PSI (probability-based state notification mechanism), which can efficiently maintain clusters. After a lot of simulation, it shows that BMC saves 64% of message traffic compared to the traditional positioning algorithm (TPTS). Moreover, it enables the network to perform stable tracking and positioning for a larger number of mobile workers. In addition, we also conducted a theoretical analysis of some parameter selection problems of the algorithm.

5 Conclusion In this study, we first introduced the algorithm implementation details of BMC (Behavior based Mobile Clustering Mechanism). Like the previous positioning system, in BMC, RSSI is still used to calculate the distance between mobile nodes. Since it fully utilizes the idle listening characteristics of the wireless system, the acquired RSSI between mobile nodes does not require additional message overhead. We divide the algorithm into two phases: cluster construction and cluster maintenance. Moreover, we introduce the two separately. In the last section, we discuss the validity and correctness of the BMC and give some enhanced mechanism that can be used in practice. Acknowledgement. 1. Ministry of Education Industry-University Cooperation Collaborative Education Project (Project No.: 201802314001). 2. Shaanxi Provincial Science and Technology Department Project (Project No.: 2017JM6036). 3. Electronic Information (Computer Technology) Master’s Degree Construction Project (Project No.: 18TSXK06).

References 1. Cheung,Y.M., Zhang, Y.: Fast and accurate hierarchical clustering based on growing multilayer topology training. IEEE Trans. Neural Netw. Learn. Syst. 1–15 (2018) 2. Chen, J., Zheng, H., Lin, X., et al.: A novel image segmentation method based on fast density clustering algorithm. Eng. Appl. Artif. Intell. 73, 92–110 (2018) 3. Wu, D., Ren, J., Sheng, L.: Representative points clustering algorithm based on density factor and relevant degree. Int. J. Mach. Learn. Cybern. 8(2), 641–649 (2017) 4. Lei, T., Jia, X., Zhang, Y., et al.: Significantly fast and robust fuzzy c-means clustering algorithm based on morphological reconstruction and membership filtering. IEEE Trans. Fuzzy Syst. 26(5), 3027–3041 (2018) 5. Huang, D., Wang, C.D., Peng, H., et al.: Enhanced ensemble clustering via fast propagation of cluster-wise similarities. IEEE Trans. Syst. Man Cybern. Syst. 1–13 (2018)

Multi-cluster Fast Information Statistics Algorithm

1897

6. Fernandes, C.M., Mora, A.M., Merelo, J.J., et al.: KANTS: a stigmergic ant algorithm for cluster analysis and swarm art. IEEE Trans. Cybern. 44(6), 843–856 (2014) 7. Ge, H., Sun, L., Yu, J.: Fast batch searching for protein homology based on compression and clustering. BMC Bioinf. 18(1), 508 (2017) 8. Park, S., Choi, H., Lee, B., et al.: hc-OTU: a fast and accurate method for clustering operational taxonomic unit based on homopolymer compaction. IEEE/ACM Trans. Comput. Biol. Bioinform. 15(2), 441–451 (2018) 9. Unsupervised hyperspectral remote sensing image clustering based on adaptive density. IEEE Geosci. Remote Sens. Lett. 15(4), 632–636 (2018) 10. Sun, L., Guo, C., Liu, C., et al.: Fast affinity propagation clustering based on incomplete similarity matrix. Knowl. Inf. Syst. 51(3), 941–963 (2017)

Intelligent Classroom Control System with Early Warning Function Feiyun Yan, Huifang Niu, Na Feng(&), and Qing Meng North University, Changning Street, Shuocheng District, Shuozhou, Shanxi, China [email protected]

Abstract. With the rapid development of electronic technology and network technology, the popularity of smart devices is getting faster and faster, and the human lifestyle is undergoing tremendous changes, and there is a higher pursuit for their own lives. Intelligentization and informationization are the inevitable development direction of today’s society. The purpose of this paper is to design a control system for college intelligent classrooms, which can realize the intelligentization of classrooms. The main function is to automatically adjust the window and lighting according to the detection of the classroom environment, and connect with the mobile APP to realize the student’s fingerprint check-in, plus the voice broadcast classroom now; outside, can detect whether there is fire, smoke around the classroom Wait for risk factors to alert the classroom in advance. Keywords: Automatic control WIFI protocol

 Automatic identification  Sensor 

1 Introduction As far as colleges and universities are concerned, classrooms and laboratories in colleges and universities are important places for teachers and students to carry out theoretical study and practice innovation [1]. Classroom teaching is the most important part of students receiving systematic education. However, at this stage, the teaching facilities of ordinary colleges and universities are still basically under the traditional teaching facilities, which can no longer meet the needs of modern teaching [2]. On the other hand, as the enrollment scale of colleges and universities continues to expand, the number of students continues to increase, which makes it difficult for universities to manage students and improve the quality of teaching [3]. The system researched the intelligent classroom and proposed an intelligent classroom control system based on Android and wifi [4, 5]. The system can collect and transmit information using various sensors and wirelessly transmit the data information to the host computer [6]. The system compares the collected information with the parameters in the database [7]. Through system integration, the installation and commissioning of the entire system will be more systematic, reduce duplication of investment, reduce installation and commissioning costs, and produce high-quality and low-cost products to better promote and popularize intelligent classroom management systems [8–10]. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1898–1903, 2020. https://doi.org/10.1007/978-3-030-25128-4_251

Intelligent Classroom Control System with Early Warning Function

1899

2 The Overall Framework Design of Intelligent Classroom Control System with Early Warning Function The overall design of the intelligent classroom control system based on Android and Wii is shown in Fig. 1. The main control unit adopts STM32F103, which is ST’s costeffective controller STM32F103RCT6 (hereinafter referred to as STM32). The controller uses AFRM Cortex-M3 as the core with 48 KB. SRAM, 256 KB FLASH, meets the system’s storage and operation speed requirements; the chip is packaged in a 64-pin LQFP with 51 GPIOs for easy system expansion and maintenance: with a rich serial interface such as USART, SPI, etc. Controller and external chip data exchange is more flexible and flexible.

Fig. 1. System overall design block diagram

3 System Design 3.1

Fingerprint Sign-in System Design

The fingerprint identification device is based on the STM32F103x series main control chip and the FPM10A optical fingerprint recognition module [3]. The fingerprint recognition device will upload the generated recognition result to the Android-based smartphone application through the ESP8266-based wifi module. In

1900

F. Yan et al.

general, fingerprint recognition usually requires four steps: fingerprint image acquisition, fingerprint image feature code extraction and synthesis, feature code storage, and fingerprint comparison. The whole process is realized by serial communication between the STM32F103x series main control chip and the FPM10A optical fingerprint module. The FPM10A Optical Fingerprint Module has a specific communication protocol and instruction set that specifies the rules for exchanging information between the FPM10A module and the MCU. During communication, the module accepts and sends commands, data, and results in the form of data packets. The module includes 23 instructions such as GenImg, Img2Tz, RegMode1 and so on. The MCU combines different control commands to implement various fingerprint recognition functions, and finally completes accurate comparison confirmation. And the comparison result is uploaded to the Android mobile terminal through wifi. Fingerprint processing consists of three processes: fingerprint input, fingerprint image filtering and fingerprint matching fingerprint matching is divided into 1:1 (fingerprint matching) and 1:N (fingerprint search). In the fingerprint input process, in order to ensure the correctness of fingerprint input and reliability, where two fingerprints are required for each fingerprint, and the images that are scrambled and binarized twice are removed to make the combined fingerprint template easier to recognize, and the combined template is stored in the corresponding stack of the module. During the fingerprint matching process, the fingerprint image to be verified is input through the fingerprint sensor and processed accordingly, and then compared with the stored fingerprint template, the matching successfully returns true value 1, and the matching failure returns 0. Among them, a method of extracting a feature layer is employed for image recognition processing. That is, a convolutional neural network is used. Convolutional neural network is a pattern recognition method combining artificial neural network and deep learning theory. In general, the basic structure of a convolutional neural network consists of two layers, one is a feature extraction layer, the input of each neuron is connected to the local acceptance domain of the previous layer, and local features are extracted. Once the local features are extracted, the positional relationship between the local features and other features is also determined. The second is the feature mapping layer. Each computing layer of the network consists of multiple feature maps. Each feature map is a plane, and the weights of all neurons on the plane are equal. The feature mapping structure uses the sigmoid function with the smallest impact function as the activation function of the convolutional network, so that the feature map has displacement invariance. Furthermore, because the neurons on the mapping plane share weights, the number of network free parameters is reduced. Each convolutional layer in the convolutional neural network is followed by a computational layer for local averaging and secondary extraction. This unique secondary feature extraction structure reduces feature resolution.

Intelligent Classroom Control System with Early Warning Function

3.2

1901

Temperature and Humidity Detection First-Level Infrared Emitter System Design

The temperature and humidity sensor adopts DHT11 module, and its measurement parameters are as follows: Humidity measurement range: 20%–95% (0°–50° range), humidity measurement error: ±5%. Temperature measurement range: 0°–50°, temperature measurement error: ±2° measurement range meets the requirements, and its D0 port directly outputs digital quantities, without additional access to AD conversion. The collected temperature is compared with the preset human comfort temperature value. If the measured temperature value does not meet the requirements, the control unit STM32 transmits a control signal to the infrared transmitting module through the WIFI, and sends an infrared control signal to the air conditioner to complete the control of the air conditioner. Adjust the ambient temperature until the measured value is within the preset range [4]. Infrared remote control is an equipment that uses an infrared light-emitting diode to transmit key information to the receiving end using infrared light as a carrier. Infrared light is invisible to the human eye, so the use of infrared remote control does not affect human vision, and infrared transmission uses NEC protocol, which is more convenient (Figs. 2 and 3).

Fig. 2. Infrared emission map

Fig. 3. NEC typical coding chain diagram

1902

3.3

F. Yan et al.

Lighting, Window Control Open Module Design

In the entire intelligent lighting system, the projector start signal is the highest priority. Followed by the detection of external light. If neither of them meets the required light intensity value, then the classroom lighting system is controlled according to the infrared detection system, so that only some people’s local lights will be illuminated to achieve energy saving effect. On the other hand, the outdoor air is detected, if the smoke or PM2.5 and other pollutants account for a relatively high proportion, the window is automatically closed; if the classroom environment temperature is too high, the window is opened, and the former is prioritized high. The design block diagram of the intelligent lighting control part is shown in Fig. 10. The light control section mainly performs the following functions: 1. When the projector is started, the lighting system is turned off and the window glass is darkened; 2. When the projector is not activated, if the external light source is strong enough, the lighting system will be turned off and the window glass will become transparent; 3. When the projector is not activated, if the external light source is not strong enough, the infrared detecting device will detect which area of the classroom is occupied, then the lighting system of the area will be activated, and the window glass will become transparent; The human body infrared module mainly uses the integrated sensor module HCSR501, and the photosensitive module adopts the integrated TEMT6000. The working principle is to use a photodiode to detect the intensity of the light, and to determine the attraction and closure of the relay by the change of the light intensity near the threshold, thereby turning the circuit on or off. 3.4

Outdoor Detection and Alarm Device Design

The outdoor air concentration detecting device and the temperature detecting device are installed outdoors, and if the temperature is too high, the air conditioner can be controlled to be turned on within a certain range to perform cooling. To enable students to have a better comfortable learning environment; if the temperature refers to far beyond the safe range, accompanied by a higher smoke value, a buzzer alarm is issued indoors and the fire extinguishing device is turned on. 3.5

WIFI Transmission Protocol Settings

What is to be achieved here is that the APP on the Android side is directly connected to the ESP8266 for two-way communication. The ATK_ESP8266 module supports three operating modes of STA/AP/STA AP, namely: (1) STA mode: The ESP8266 module is connected to the Internet through a router, and the mobile phone or computer realizes remote control of the device through the Internet.

Intelligent Classroom Control System with Early Warning Function

1903

(2) AP mode: The default mode ATK_ESP8266 module is used as a hotspot to realize direct communication between the mobile phone or computer and the module, and realize wireless control of the local area network. (3) STA AP mode: coexistence mode of two modes, (STA mode) can be connected to the Internet through a router, the control device can be connected to the Internet through the Internet; (AP mode) can also be used as a wifi hotspot, and other wifi devices are connected to The module. In this way, seamless switching between the local area network and the wide area network can be realized, and the operation is convenient.

4 Conclusion Here, the AP mode is set. In this design, the communication between the esp8266 and the mobile phone is very stable. After many debugging and modification, there will be no packet loss. When the mobile APP transmits data to the esp8266, the receiving pin of the MCU is received byte by byte, byte by byte, and receives a byte for each receiving interrupt. In the process of using it, I found that the interrupt handler of STM32 MCU can accept the data completely and store it but it is difficult to retrieve the required data, so I use the instructions in the AT command set to do data transmission and mobile APP. Communication, using a single-byte communication method, this method is simple to implement, high accuracy, and fast response.

References 1. Wu, L., Zhou, H.: Design of student attendance system and intelligent classroom management system. Program. Home (5), 65 (2015) 2. Wang, J.: Design and implementation of intelligent attendance system in colleges and universities. Inf. Comput. (16), 78–79 (2015) 3. Ma, D.: Intelligent classroom based on WiFi control. China Inf. Technol. Educ. (20), 58–60 (2014) 4. Zhang, X., Hua, Z.: Construction of intelligent classroom control system based on CC2530. Ind. Technol. Pract. (7), 183–184 (2017) 5. Gregorius, R.: Performance of underprepared students in traditional versus animation-based flipped-classroom settings. Chem. Educ. Res. Pract. 18(4), 841–848 (2017). https://doi.org/ 10.1039/C7RP00130D 6. Freeman, D.: The case for teachers’ classroom English proficiency. RELC J. 48(1), 31–52 (2017) 7. Roehling, P.V., Root Luna, L.M., Richie, F.J., et al.: The benefits, drawbacks, and challenges of using the flipped classroom in an introduction to psychology course. Teach. Psychol. 44(3), 183–192 (2017) 8. Lee, T.K.: Using virtual role-play to enhance teacher candidates’ skills in responding to bullying. J. Technol. Teach. Educ. 25, 91–120 (2017) 9. Finelli, C., Gottfried, M.: Utilizing instructional consultations to enhance the teaching performance of engineering faculty. J. Eng. Educ. 97, 397–411 (2008) 10. Pantic, M., Zwitserloot, R., Grootjans, R.J.: Teaching introductory artificial intelligence using a simple agent framework. IEEE Trans. Educ. 48(3), 382–390 (2005)

Private Cloud Storage Technology and Platform Security Analysis Based on Cloud Computing and Intelligent System Chang Jian(&) and Qi Yong College of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, Shaanxi, China [email protected]

Abstract. Cloud computing provides storage and computing platform for the diversification of mass data, and data mining technology such as distributed computing can also enhance the ability to analyze and judge trends in data. Under the background of the private cloud, the definition of the data security risk assessment index system is basically consistent. Aiming at the potential threat and attack mode in the current big data environment, we carry out the evaluation and analysis of the security risk. In this paper, a method of building a data security risk assessment index system is proposed. It is built under the background of private cloud, and the data is optimized. At the same time, it effectively constructs the equivalent weight of data security risk, and gives an analytic expression of data security risk assessment. Keywords: Cloud computing Storage technology

 Intelligent systems  Private cloud 

1 Introduction Big data, cloud computing, Internet of things, mobile Internet, block chain and other technologies are the typical applications of the post information technology era. It not only changes people’s thinking mode, but also changes people’s life and work way, making society and individual more and more dependent on data and the products based on the post information technology era. It makes all kinds of data showing explosive growth. Cloud computing provides storage and computing platform for the diversification of mass data, and data mining technology such as distributed computing can also enhance the ability to analyze and judge trends in data. Under the background of the private cloud, the definition of the data security risk assessment index system is basically consistent. It refers to that taking the newly observed data as the basic object, combining it with the current state, strengthening the accuracy of the current state and improving the evaluation accuracy. A relatively accurate description of the real state of the data security risk assessment index system is made as far as possible. From the perspective of security risk assessment, we studied the risk of cloud service system, and comprehensively evaluated the system security risk, which is conducive to the safety management of the system, and is conducive to enhance the system’s ability to prevent © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1904–1914, 2020. https://doi.org/10.1007/978-3-030-25128-4_252

Private Cloud Storage Technology and Platform Security Analysis

1905

potential risks and attacks. The evaluation of the traditional information system is based on the information assets and the security risk faced by the assets. It ignores the evaluation of the system and internal management ability and management belief, and despises the importance of the safety management belief to the risk transfer and evasion. In the context of private cloud, if the direct measurement is not feasible, it is because that the accuracy of data security risk data security risk assessment system will far exceed that of observation accuracy, and the best observed data can be selected for evaluation. In addition, because the nonlinearity of the model is particularly complex, the effective data can hardly be provided, and the data security risk assessment deviates from the real state. Therefore, what kind of methods should be taken to improve the effectiveness of the observation data and how to improve the accuracy of the evaluation are the hot topics of the industry in recent years. Taking consistency analysis as the core, the difference between observed value and analytical value is used instead of error statistics. In order to reduce the risk of the data security risk assessment index system, it is necessary to reduce the observation random error and its relative error, and the method is to take the average value of the observation data. The symmetric Toeplitz cycle matrix is especially similar to the error covariance matrix. The error covariance matrix is generally treated with discrete Fourier, so as to make more accurate observations. If the evaluation data is based on the maximum set variance, it has more advantages. In the evaluation, the data security risk assessment is dependent on the data, which should be taken to obtain more accurate observation data, thus effectively reducing the analysis error. Aiming at the potential threat and attack mode in the current big data environment, we carry out the evaluation and analysis of the security risk. Security risk, on the one hand, is always accompanied by the existence of the system, which cannot be thoroughly eradicated, only the prevention of risk. That is all potential risks that may cause security events can be suppressed, transferred, dispersed, or reduced to tolerable risk. In this paper, a method of building a data security risk assessment index system is proposed. It is built under the background of private cloud, and the data is optimized. At the same time, it effectively constructs the equivalent weight of data security risk, and gives an analytic expression of data security risk assessment. Finally, the new method is verified and compared with the traditional method to verify the validity and scientificity of the data security risk assessment index system.

2 Construction Process of Data Security Risk Assessment Index System The security of large data has been paid much attention by many experts and scholars at home and abroad, and it has been deeply analyzed from the multidimensional degree to the problem. To explore a new high efficient and secure new model of large data processing is the hot spot of current research. In this paper, the Ensemble Transform Kalman Filter (ETKF) is used as the basis of the algorithm. The Euclidean distance is calculated first, then the security risk of the data is evaluated, and then the weight is

1906

C. Jian and Q. Yong

given. We use the observed data to reduce the evaluation error and reduce the false correlation so as to assess the value approaching the real situation. 2.1

Private Cloud Introduction

Because the impact of robustness is too obvious, the effect of evaluation will inevitably be affected. Especially in the background of private cloud, the data security risk assessment index system will show stronger nonlinearity and instability. In the evaluation system, the importance of observation data at different observation points is usually determined by the weight of observation. In Fig. 1, the image shows a data assessment map under the private cloud background. In the graph, the status update location is represented by the seven horns, and the data security risk is represented by Pentagram. If it is a traditional scheme, a smooth filter is used. Taking the central lattice as the basic object, using the sequential loop method, all the objects are processed into the analysis network. First we calculate the Euclidean distance and then quantify it according to certain rules, so as to determine the size of the weight value, the closer the update position, the greater the weight, and if the longer the update position, the smaller the weight.

3 Optimization Training of Data Security Risk Assessment By using data security risk assessment and optimization training, the weight of corresponding observation points can be obtained, and the state update vector can be calculated accordingly. The detailed calculation process is as follows: (1) Based on the change of the Euclidean distance (with the letter L), the domain of the language variable is set, and its range is usually set to {0, 40}; then the equivalent weight l is output, and then the scope of the variable domain is set, and it is set to {0, 1}. Then the quantization factor is reset, and usually it is set to 0.025. The Euclidean distance can be expressed by the following formula. qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  2ffi 2 l¼ ðOi  Vi Þ þ Oj  Vj

ð1Þ

In the above expression, Oi represents the abscissa of the observation point, Oj represents the value of the longitudinal coordinates of the observation point, and Vi is the value of the abscissa corresponding to the state renewal point, and Vj represents the value of the ordinate corresponding to the state renewal point. (2) The reasoning of dynamic data security risk assessment. The equivalent weight is dependent on the variation of Euclidean distance. If the Euclidean distance is farther away, the equivalent weight will be smaller, and the trigonometric membership function should be taken again.

Private Cloud Storage Technology and Platform Security Analysis

1907

Fig. 1. Data assessment sketch map under private cloud background

(3) The determination of the equivalent weight u. From the theory, the data of the observed data determines the data of the weight u. Under the condition of the evaluation rules, the optimal output weight u of the data security risk assessment is obtained. According to the algorithm synthesis rules, the following formula can be obtained. u ¼ Dl  M

ð2Þ

In the above expression, u represents the output equivalent weight, and Dl is Euclidean distance (that is the distance between the observation point and the update grid point of the state). M represents the overall data security risk assessment optimization relationship. (4) The optimization of data security risk assessment. Through the above reasoning, we get the optimized value of data security risk assessment (that is, the optimal output weight u of the data security risk assessment). This process is usually called data security risk assessment optimization, and the method of maximum membership is selected in this paper. (5) State update process. Physical space distance is obtained by using data security risk assessment to optimize the weight of training. To get each step of the state update variable, it can be obtained by the following formula:   i 1  i i i i i i y  H ix f pi;: ui;: Ai;:f ST S ST f a pffiffiffiffiffiffiffiffiffiffiffiffi xi ¼ xi þ N1

ð3Þ

1908

C. Jian and Q. Yong

0

112

i

i

Aai;: ¼ Ai;:f @I þ ST SA

ð4Þ

i

In the above expression: Ai;: represents the i line of the set perturbation matrix A; y i

i

refers to the local observation data; H refers to the local observation operator; pi;: uii;: refers to the weight value of the observation in i position; the corresponding local set of  i i pffiffiffiffiffiffiffiffiffiffiffiffi i 1 i N  1, and in this forobservation disturbances is expressed with S  R2 H A f i

i

mula, the covariance is expressed by R, and A is used for the local set perturbation. In i

i

the formula (3) and (4): Ki;: ¼ Ai;:f ST i

i T

!1 ,

I þ SS

pffiffiffiffiffiffiffiffiffiffiffiffi i N  1; T ¼

i i T

!12

Iþ S S

i

i

; U ¼ pi;: ui;: ;

Then the above formula is arranged, we can get xai

¼

Aai;:

xif

¼

i þ Ki;:

Ai;:f

i

i

i

yHx i i T

Iþ S S

! f

i

U

ð5Þ

!12 ð6Þ

Taking every step as the basic object, we update the variables to get the data set disturbance. Then the data is fused in the system, then the covariance matrix and the analysis mean are obtained in the range of the optimization training of the data security risk assessment, thus the status update value and the state analysis set are calculated. The background value of this time is the last data security risk assessment, and then it is returned to the evaluation model, which is constantly reciprocating according to this process. The position background error covariance matrix is detailed in Fig. 2. The analysis of Fig. 2 shows that the false correlation can be reduced by new methods, thus effectively eliminating the negative effects of remote observation on state updating.

Private Cloud Storage Technology and Platform Security Analysis

(a) range of weights covariance matrix

(b) background error

1909

(c) dependent background error covariance matrix

Fig. 2. The influence of data security risk assessment training on covariance matrix

4 Numerical Simulation Results and Analysis In this paper, we need to test the performance of data security risk assessment index system, so we need to simulate it. In the simulation experiment, the Sphere function and the Rastrigin function are used effectively, and the data security risk assessment algorithm is used in the private cloud background to get the convergence result and time consuming of the equilibrium point training under the private cloud background. The details are shown in the following two figures (Figs. 3 and 4). Through the evaluation of the figures, the efficient use of the text algorithm can reduce the computational cost as much as possible. It can not only save a lot of running time, but also can evaluate the efficiency of data security risk assessment.

Fig. 3. Training time under different data sizes

1910

C. Jian and Q. Yong

Fig. 4. Convergence of data equilibrium point in private cloud background

In the process of research, data security risk assessment function can be expressed in the following formula: vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi !ffi u n u1 X RMSEa ¼ t ðx  xi Þ2 n i¼1

ð7Þ

In the above formula, the dimension is expressed with n, the evaluation value is expressed by x, and the true value of the state is expressed by xi . In order to verify the validity of FETKF (Fuzzy Control Ensemble Transform Kalman Filter, Model under private cloud background), it is discretized in this study. At the same time, it compares ETKF with LETKF (Localized Ensemble Transform Kalman Filter) to N (set), P (number of observations), T (model step size), infl (covariance amplification factor), F (coercive parameter), LETKF localization coefficient and FETKF weight coefficient. In the experimental research, parameter setting is as follows: the setting of parameters in Experiment 1 is shown in Table 1. The change interval of N is [5–50], and the interval is 5. Figure 5 shows a contrast diagram of the root mean square. After careful observation of Fig. 5, we can draw 3 conclusions as follows: conclusion 1: the root mean square error is closely related to the number of sets. If the aggregate number is increased, the root mean square of the 3 methods is decreasing, and the accuracy of the evaluation is enhanced. Conclusion 2: if the set number is 2, the root mean square of the 3 methods all appears very obvious. At this time, it is difficult to achieve the evaluation requirements. If the set number continues to increase, the convergence speed based on FETKF method is the fastest. If the set number is 20, then the assessment

Private Cloud Storage Technology and Platform Security Analysis

1911

accuracy is higher. If the set number is 40, 3 kinds of methods to evaluate the effect are the same. Conclusion 3: the calculation burden is closely related to the set number. The more the aggregate number is, the heavier the calculation burden is. In the 3 methods, the FETKF method presents an obvious advantage, and it presents the best evaluation effect.

Table 1. Experimental design scheme

Experiment Experiment Experiment Experiment Experiment

1 2 3 4 5

Set number N 5–50 20 20 20 20

Observation number P 10 1–20 10 10 10

Model step T 25 25 5–60 25 25

Magnifying factor infl 1.01 1.01 1.01–1.12 1.01 1.01

Forced parameter F 8 8 8 8 4–12

Fig. 5. Effect of set number on the assessment results

Figure 6 shows the comparison diagram of the root mean square errors of the 3 methods. Through the analysis of the chart, we can get the following rules: (1) the root mean square error is closely related to the observation data. If the observation data is increased, the 3 methods all have the tendency to decrease the root mean square root, and the accuracy of the evaluation is also improved accordingly. (2) Using discrete random observation and ETKF method in the process of evaluation. It didn’t make full use of data, which brought great error, and the evaluation effect was very poor. The

1912

C. Jian and Q. Yong

observation data obtained by LETKF are within the specified range, which makes the observation data more effective, and the error is smaller than the ETKF method. But because the radius of the LETKF method is too large, the influence of set number on the analysis value is too small. The far data on the grid point is much thinning compared with the mode resolution, which leads to the covariance matrix error evaluation [20–21]. There is a close relation between the lattice point and the influence radius. If the influence radius is smaller, the influence is greater. (3) With the increasing observation data, the FETKF method can make the observation data more accurate. The accuracy of the evaluation is the highest and the root mean square error is the smallest. (4) If the object of the observation is uncertain, but a random state, the best weight should be added in order to get the best observation data. At this time, the false correlation is removed and the effect is best.

Fig. 6. Effects of observations on the evaluation results

By analyzing the comparison diagram of the 3 root mean square error and its correlation parameters, if the coercive parameters are different, it will present different performance states (Fig. 7). After careful observation of Fig. 7, the following rules can be obtained: the nonlinearity of the chaotic system and the forced parameters of the two are positively correlated. If the forced parameters are increased, the performance of the nonlinear degree will be more obvious. The ETKF method shows that the root mean square of this method is divergent, and that is the reason why the real data security risk assessment cannot be obtained in the system. Then the LETKF method and the FETKF method have been observed that the root mean square error and the forced parameter are mutually different, indicating that the stability is stronger. If the size of the forcing

Private Cloud Storage Technology and Platform Security Analysis

1913

parameter is 8, the root mean square error of the LETKF method and the FETKF method is the smallest, showing a little difference. If the size of the forced parameter is more than 8, the error of the LETKF method will be larger than that of the FETKF method, in other words, the robustness of the LETKF method is more obvious.

Fig. 7. Influence of forced parameter changes on evaluation results

5 Conclusion In the age of information technology, people are more dependent on data. The traditional data security mechanism cannot meet the security needs of the current big data system. Users’ data security and personal privacy protection have many potential security threats. In the optimization training of data security risk assessment, the best data security risk assessment requires constant modification of the observed values, and a data security risk assessment index system in the private cloud environment is proposed. In this paper, we not only give the solving algorithm of the nonlinear system, but also give the calculation process of the nonlinear system with the ETKF method. The research results show that under the background of private cloud, the new method can effectively improve the false correlation and avoid the effect of more variables. It can effectively reduce the errors caused by observation data, and further reduce the computation cost, so that the data security risk assessment index can be further upgraded.

1914

C. Jian and Q. Yong

References 1. Arnot, J.A., Brown, T.N., Wania, F., Breivik, K., Mclachlan, M.S.: Prioritizing chemicals and data requirements for screening-level exposure and risk assessment. Environ. Health Perspect. 120(11), 1565–1570 (2012) 2. Khoury, M., Manlhiot, C., Mccrindle, B.W.: Role of the waist/height ratio in the cardiometabolic risk assessment of children classified by body mass index. J. Am. Coll. Cardiol. 62(8), 742–751 (2013) 3. Sekhon, B.S., Bhumbla, D.K., Sencindiver, J., Mcdonald, L.M.: Using soil survey data for series-level environmental phosphorus risk assessment. Environ. Earth Sci. 72(7), 2345– 2356 (2014) 4. Allodi, L., Massacci, F.: Security events and vulnerability data for cybersecurity risk estimation. Risk Anal. 37(8), 1606–1627 (2017) 5. Yin, Y., Zhang, X., Lin, D., Yu, H., Wang, J., Shi, P.: GEPIC-V-R model: a GIS-based tool for regional crop drought risk assessment. Agric. Water Manag. 144(144), 107–119 (2014) 6. Agency, E.: Further development of Poppie database: development of a groundwater contamination risk assessment methodology. Syst. Bot. 38(3), 795–804 (2013) 7. Noer, M.C., Sperling, C.D., Antonsen, S.L., Ottesen, B., Christensen, I.J., Høgdall, C.: A new clinically applicable age-specific comorbidity index for preoperative risk assessment of ovarian cancer patients. Gynecol. Oncol. 141(3), 471–478 (2016) 8. Yusà, V., Coscollà, C., Millet, M.: New screening approach for risk assessment of pesticides in ambient air. Atmos. Environ. 96(7), 322–330 (2014) 9. Han, L., Song, Y., Duan, L., Yuan, P.: Risk assessment methodology for Shenyang chemical industrial park based on fuzzy comprehensive evaluation. Environ. Earth Sci. 73(9), 5185– 5192 (2015) 10. Paredes, S., Rocha, T., Carvalho, P.D., Henriques, J., Morais, J., Ferreira, J.: Integration of different risk assessment tools to improve stratification of patients with coronary artery disease. Med. Biol. Eng. Comput. 53(10), 1–15 (2015)

Analysis of E-commerce Customer Consumption Model Based on Artificial Intelligence and Computer Aided Jiang Leilei and Dong Ke(&) Anhui Radio and Television University, Hefei 230022, Anhui, China [email protected]

Abstract. Based on the network marketing system of cloud computing is that the entire e-commerce trading platform and external database connected to the database connection terminal users can master data and timely update, build a collaboration between the seller and the buyer, and master the rapid transfer of relevant information and products to speed up the electronic commerce and circulation system. Maximize the whole e-commerce links fluency and benefits. E-commerce marketing is a kind of marketing on the Internet, which is a process of completing a series of marketing links with the help of the Internet to achieve marketing goals. Network marketing system uses the characteristics of cloud service platform technology to achieve cloud-based services on demand. At the same time, enterprises can set up their own network marketing application system without independent investment, and can utilize various services provided by cloud computing manufacturers and build application systems and databases with their own enterprise characteristics. Keywords: Artificial intelligence Consumption model

 Computer aided  Electronic commerce 

1 Introduction Along with the development of information technology and the penetration of industries, IT giants such as Google, Amazon and Ali have launched their own “cloud” plan, promoting the revolution and development of information technology [1]. For users, users can enjoy “cloud services” anytime and anywhere as long as they have a mobile portable device connected to the Internet [2, 3]. Along with the rapid development of ecommerce and the social security system gradually perfect, in the face of more and more complex user information structure, the amount of information is more and more large, so the user will obtain the information of the massive businesses how to get the same at a loss, effective customer relationship in the massive user information has become the focus [4]. Based on the network marketing system of cloud computing is that the entire e-commerce trading platform and external database connected to the database connection terminal users can master data and timely update, build a collaboration between the seller and the buyer, and master the rapid transfer of relevant information and products to speed up the electronic commerce and circulation system. Maximize the whole e-commerce links fluency and benefits [5]. © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1915–1922, 2020. https://doi.org/10.1007/978-3-030-25128-4_253

1916

J. Leilei and D. Ke

E-commerce is the use of the Internet and related technologies to conduct the comprehensive business activities that is the traditional commercial electronic and digital, is a global economic development of new industries. With the modern information technology as the core of the network economy, communication technology and computer services technology has greatly affected and changed the social and economic fields, industry integration and new business models continue to emerge in the tide of network economy driven by the electronic Business has shown many new formats, such as O2O, C2B, travel e-commerce, foreign trade e-commerce, e-commerce and other new formats of agriculture [6, 7]. Behind these new formats are e-commerce in the operation mode, technology, value chain, division of labor in the industrial chain and cross-border integration of revolutionary innovation while showing a new model of E-commerce. Ecommerce marketing is a kind of marketing on the Internet, which is a process of completing a series of marketing links with the help of the Internet to achieve marketing goals [8]. E-commerce marketing campaigns on the Internet include marketing and after-sales service activities such as online shopping, ordering, payment, logistics, customer service, etc., as well as a number of the commercial activities utilizing Internet development such as the market research and analysis, financial accounting and production scheduling [9, 10]. Advantages and characteristics of network marketing can be generally summarized as the following aspects. Customers can interact with merchants through the Internet, and the two-way exchange of the core information between merchants and customers enables the two sides to better understand each other. Modern Internet covers a wide range of areas, without borders and regional restrictions, is a wide range of marketing. The Internet has the characteristics of fast information transmission. It can easily convey information to customers at any time and place, and let customers know the information they need in time (Fig. 1).

Fig. 1. Cloud service platform

Analysis of E-commerce Customer Consumption Model

1917

2 Cloud Service Platform 2.1

Cloud Service Platform and Cloud Computing

With the development and improvement of distributed processing, parallel processing and grid computing in the information age, cloud concepts and cloud computing are more and more valued and applied. At present, all walks of life are actively exploring the application of cloud computing and development trends. The core idea of cloud computing is to integrate resources, share, and access as needed (Fig. 2).

Fig. 2. The organizations of the marketing models

The essence of cloud computing is allocated on demand, according to billing. The use of Internet technology, distributed in the computer network in the information infrastructure (mainly hardware, software and service platform provided) unified integration, rational distribution, unified scheduling, providing a unified interface, in order to achieve a large number of users to provide services (Fig. 3).

Fig. 3. The cloud platforms

1918

J. Leilei and D. Ke

The main features of cloud service platform include the following aspects. Internet-centric. The terminal gradually weakens the processing capacity. A large number of storage and computing capabilities are unified by all nodes connected to the network. The computing architecture of the Internet is converted from “server + client” to “cloud service platform + client”. Virtualization. The underlying resource pool consists of the underlying hardware, including servers, storage and networking equipment, and is fully virtualized to create a resource that can be shared and allocated on demand. Dynamic expansion. The basic resource pool can be allocated on demand and grow automatically. However, the data and applications in the upper layer can be dynamically allocated according to business needs to form various applications of cloud computing, so that cloud computing services gradually lead to the IT architecture. Support system can handle business. Cloud computing services platform for business operations support system that can complete the network capacity planning, billing, monitoring, security, scalability, upgrades and other functions. 2.2

Safety Indicators

At present, the cloud computing system provides real-time monitoring functions. The system maintainer can obtain the system running status in real time. The reasonable safety indicators formally describe the measurement requirements that need to support the average and immediate values, but also cover different angles, different granularities, and multi-dimensional Analysis needs and you can facilitate system maintenance personnel to optimize system security strategy. The state of the system in the model can be divided into two major categories: Operational and Failed. The Operational state can be further refined into Recovering and Ready states. While the system is in the Accessible state, integrity intact, but may be DOS and other security attacks and transferred to the Inaccessible state. In addition, security recovery mechanisms such as attack removal are required to relocate the system to the Accessible state, so the two system states can be connected by an event such as AttackRemoval or DOS attack. The system state transition diagram describes the relevant states and events of the system security. Different security indicators correspond to different states of the system, so the formal description of the system security indicators can be obtained. The probability of the system being in a safe state is: AI ðtÞ ¼ PfXðtÞ 2 SA g

ð1Þ

For the system, the steady-state availability of the system is more important, that is, the probability that the system is in a safe state under steady state is as follows: Rt AS ¼ lim AI ðtÞ ¼ lim t!1

t!1

0

AI ðuÞdu t

ð2Þ

Analysis of E-commerce Customer Consumption Model

1919

In addition, it can also be obtained by solving the steady-state probability vector of the state in the state transition diagram. Then the steady-state availability can be expressed as follows: X AS ¼ pi ð3Þ t2SA

2.3

Internet Technology

Through the Internet technology users from the cloud center efficient and quick access to cloud services. According to the service types obtained by users in the cloud computing center, the types of services provided by the cloud computing are classified into the following types. Infrastructure as a Service (IaaS). Cloud computing encapsulates the hardware infrastructure resource pool and provides it to users in the form of virtualization. For example, Amazon’s EC2 and S3 provide infrastructure services. Platform as a Service (PaaS). Third-party developers are provided in the form of a development environment that includes an application development and deployment platform that provides the service platform with databases, middleware, and development tools through the Internet primarily through the Internet. For example, Microsoft’s Windows Azure provides this type. Software as a Service (SaaS). By providing the software service mode required by the user through the Internet, the user can obtain the web-based software in the form of renting or the like without purchasing the software, which can save the software development cost and reduce the cost. Data as a service (DaaS). Information sharing is the biggest advantage of the Internet, the user for the mass data storage, computing can be achieved through the cloud computing platform.

3 Construction of Electronic Marketing System Based on Cloud Service Platform The essence of network marketing is mainly based on the Internet as a new marketing tool, which plays an important role in the realization of the goal of business strategy. It is also the basis and practice guarantee for the realization of network marketing value. At present, enterprise network marketing mainly uses its own portal website to publish information on enterprise products, market demand information and services and guarantees provided by enterprises. Consumers mainly use the Internet to obtain relevant product information and services provided by businesses, including detailed specification of products, technology Indicators, specifications, the latest market demand information, products, services provided, you can also use the Internet to provide online customer service, online consulting, and other related product information and Internet marketing on the one hand to provide convenience for businesses, on the other hand to

1920

J. Leilei and D. Ke

bring convenience to consumers, thus achieving the network marketing functions, reflecting the value of goods, but also reduce costs. The function of network marketing is based on the traditional marketing mix 4P theory (including products, prices, sales channels and promotions) based on the development. Main functions include network branding, website promotion, information dissemination, sales promotion, sales channel, customer relationship and online research, and the various functions are interrelated, mutually influential and mutually reinforcing, and network marketing is realized through the interaction among various functions The overall effect. Web site promotion, customer relationship, information dissemination, online research and customer service belong to the basic functions of the network marketing resources input and performance, and sales promotion, online sales and brand image is the embodiment of network marketing. 3.1

Information Technology Support System

Information technology support system mainly includes computer network technology and database technology. Computer network technology is the network marketing system infrastructure, the general investment by the government to complete. At present, China’s network infrastructure invested a lot of money to establish a backbone network, but also the establishment of a variety of professional websites, such as product trading network, the Chinese agricultural product sales network, the Chinese clothing network, etc. However, these professional sites than the people on Taobao, Alibaba and other third-party platform, familiar with the government departments to guide or integrate product network marketing strategy, you can use search engine marketing strategy, online advertising affiliate, website links and other online marketing tools to promote products and create services or product-related networks Community, guide customers to actively participate, so as to attract potential customers to participate, to achieve zero distance communication with customers, zero point, the formation of a new network marketing system. At the same time, the construction of database technology occupies a very important position in the network marketing system. It uses various information resources to set up database resources such as product, customer and market supply and demand. Mainly take market database as the main line, establish customer relationship management database and product database respectively. Promote the rapid development of customer relationship management system. 3.2

Value Chain Management

As technology advances, the dependence of enterprises on production personnel will gradually decrease, but enterprises will never survive and develop without relying on consumers. Customer satisfaction is the initial motivation and final destination of enterprise production. Therefore, putting consumers at the core and enabling consumers and enterprises to understand each other and fully integrate them is the new direction for the development of enterprise e-commerce. Traditional enterprises to enter the Internet to start sales overall carried out is not good, but with the popularity of computer technology and the Internet, gradually, most companies are more or less involved come in and start their own business network marketing from the following aspects.

Analysis of E-commerce Customer Consumption Model

1921

The search engine promotion, is based on the use of search engine users, users retrieve information using the opportunity possible marketing information to the target user. In simple terms, search engine marketing is the search engine platform based on network marketing and the people rely on and use habits of search engines, when people retrieve information as much as possible marketing information to the target customers. Search engine marketing is the main promotion according to the keywords related products. Licensed email marketing refers to the delivery of valuable information to the user through E-mail in the context of user permission. There are three basic factors in licensed email marketing: user license, E-mail delivery information, and the information value to users. None of the three factors can be called effective Email marketing. Community marketing is an online virtual community that is also unique to the Internet. Communities mainly aim to communicate with each other by concentrating visitors with common interests in a virtual space. The online community is one of the services commonly used by users. Due to the participation of a large number of users, the online community has not only provided the function of communication but also has become an online marketing place in fact. Sub-commerce provides an efficient platform for general network marketing, which enables enterprises to carry out marketing extensively and can face more consumers. At the same time, e-commerce under the network marketing environment is bound to affect the marketing of enterprises (Fig. 4).

Fig. 4. The finalized data for further analysis

The so-called CRM refers to a customer-centric business strategy, which uses information technology as a means, from 7P analysis (Profiling, Persistency, Profitability, Performance, Prospecting, Product, Promotion), from three levels of core product, tangible product and additional product starting to fully meet customer needs.

1922

J. Leilei and D. Ke

4 Conclusion With the gradual popularization and application of information technology, grid computing, cloud computing and big data gradually penetrate and popularize and the innovation of Internet technology and the update and application of business mode. Ecommerce marketing system based on cloud service platform integrates the cloud computing information technology, economic and the business fields and management mode. Network marketing system uses the characteristics of cloud service platform technology to achieve cloud-based services on demand. At the same time, enterprises can set up their own network marketing application system without independent investment, and can utilize various services provided by cloud computing manufacturers and build application systems and databases with their own enterprise characteristics.

References 1. Dias, S.E.F., dos Santos, R.M., Martins, V., Isabella, G.: Effects of strategies marketing of collective buying about impulsive behavior. REMark: Revista Brasileira de Marketing 13(3), 138–151 (2014) 2. Shang, X., Liu, X., Xiong, G., Cheng, C., Ma, Y., Nyberg, T.R.: Social manufacturing cloud service platform for the mass customization in apparel industry. In: 2013 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 220–224. IEEE, July 2013 3. Iglesias-Pradas, S., Pascual-Miguel, F., Hernández-García, Á., Chaparro-Peláez, J.: Barriers and drivers for non-shoppers in B2C e-commerce: a latent class exploratory analysis. Comput. Hum. Behav. 29(2), 314–322 (2013) 4. Xia, L., Li, B., Tang, T., Gu, P., Chen, P.Y., Yu, S., Yang, H.: MNSIM: simulation platform for memristor-based neuromorphic computing system. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(5), 1009–1022 (2018) 5. Wang, J.G., Yu, Y.G., Zhou, L.L., et al.: Numerical simulation and optimized design of cased telescoped ammunition interior ballistic. Def. Technol. 14(02), 39–45 (2018) 6. Meyrueis, V., Paljic, A., Leroy, L., et al.: A template approach for coupling virtual reality and CAD in an immersive car interior design scenario. Int. J. Prod. Dev. 18(5), 395–410 (2013) 7. Murtadha, M.K., Noordin, N.K., Ali, B.M., et al.: Design and simulation analysis of network-based fully distributed mobility management in flattened network architecture. Telecommun. Syst. 65(2), 253–267 (2017) 8. Chiadamrong, N., Piyathanavong, V.: Optimal design of supply chain network under uncertainty environment using hybrid analytical and simulation modeling approach. J. Ind. Eng. Int. 13(4), 465–478 (2017) 9. Lartigau, J., Xu, X., Nie, L., Zhan, D.: Cloud manufacturing service composition based on QoS with geo-perspective transportation using an improved Artificial Bee Colony optimisation algorithm. Int. J. Prod. Res. 53(14), 4380–4404 (2015) 10. Yang, X., Shi, G., Zhang, Z.: Collaboration of large equipment complete service under cloud manufacturing mode. Int. J. Prod. Res. 52(2), 326–336 (2014)

Research on Vehicle Routing Planning Algorithm for Supply Chain Logistics Distribution Pengwen Xiao(&) Guangdong University of Science and Technology, Dongguan 523083, China [email protected]

Abstract. In recent years, with the rapid development of the national economy, the status of the logistics industry is becoming more and more prominent, and the scale is also expanding rapidly. At the same time, the concentration and operation efficiency of the logistics industry need to be further improved, but the high transportation cost has always been the pain point of the logistics industry. As the main link of logistics activities, distribution has also become an important breakthrough point for many scholars. Among them, the vehicle routing problem is the most important aspect of logistics distribution. Whether the vehicle routing is reasonable directly affects the speed, cost and benefit of distribution. In recent years, researchers have proposed various intelligent algorithms to solve the transportation vehicle routing problem in distribution. This paper mainly studies the exact algorithm and heuristic algorithm. Keywords: Logistics

 Transportation vehicle problem  Path  Algorithm

1 Introduction In recent decades, the rapid development of economy and technology has promoted the sustained and rapid development of logistics industry. As an important part of logistics [1] transportation activities, vehicle routing problem has increasingly become the focus of research. Whether the vehicle routing planning is appropriate or not has a great impact on the speed, cost and benefit of logistics distribution. Especially when the scale of logistics enterprises expands, the scope of distribution centers, warehousing centers and network points becomes wider and wider. How to determine the optimal vehicle distribution path is a complex system engineering. Choose a reasonable vehicle distribution route to meet the various requirements of the transportation process, such as the shortest total driving mileage, the shortest total driving distance, the smallest total fuel consumption, the least required transport vehicles, the lower no-load rate, balancing the mileage and time of each vehicle, and the highest rate of receipt in time. The main purpose of this research is to shorten the total service time, improve the service quality and reduce the total cost of distribution process under the condition of satisfying customers’ needs and all constraints.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1923–1929, 2020. https://doi.org/10.1007/978-3-030-25128-4_254

1924

P. Xiao

2 Supply Chain Transmission Management In the 1980s, Steven put forward the concept of supply chain for the first time in the United States. The so-called supply chain is a whole which includes many nodes such as suppliers, manufacturers, transporters, retailers, customers and so on. The main task and content of supply chain management is to plan, coordinate, operate, control and optimize all kinds of actions and activities in the whole supply chain system. Its goal is to deliver the products required by customers to the right place under the given constraints such as the specified time, the given supply quantity, the quality and condition of the goods required, so as to minimize the cost of each member [2] in the supply chain and maximize the overall benefits. Among them, logistics, known as the “third profit source” of enterprises, is playing an increasingly prominent role in the supply chain. Figure 1 is a schematic comparison between traditional logistics and modern logistics. As can be seen from the graph, the rapid development of logistics industry has gradually established a bridge between production and circulation, which has increasingly become an indispensable place for enterprises to compete. Under the constraints given by customers, planning and controlling logistics activities, optimizing logistics system and minimizing logistics costs have become the research hotspots.

Fig. 1. Comparison of traditional logistics and modern logistics

3 Vehicle Route Planning Specifically, logistics distribution is the process of sorting, distributing and loading in the distribution center after confirming the customer’s demand for goods and other conditions, and the activity of transporting the customer’s goods to the designated location. Because of the complex conditions of transportation vehicles in the specific delivery process, not only the large number of customer points, the crisscrossing roads between different customer points, the variety of goods, but also the uneven distribution of logistics distribution centers. Therefore, whether the vehicle distribution route is planned reasonably will have a significant impact on the cost, speed of distribution and customer satisfaction.

Research on Vehicle Routing Planning Algorithm

1925

4 Vehicle Routing Problem and Its Algorithms 4.1

Definition of Vehicle Routing Problem

Vehicle routing problem is generally defined as: for a certain number of customers who need services, call a reasonable number of transport vehicles, design a reasonable route, so that transport vehicles from the distribution center, in accordance with a certain sequence of access to customers, in order to meet specific constraints, to achieve the minimum total cost of transportation. Vehicle routing problem [4, 5] can also be explained from the perspective of graph theory. It can be described as an undirected graph G ¼ ðV; AÞ. V is a set of customer points and distribution center points, expressed as V ¼ fv0 ; v1 ; . . .vN g. v0 represents the distribution center, v0 ; v1 ; . . .vN represents the  location of N customer points. E is a set of lines between vertices, expressed as E ¼ vi ; vj : vi ; vj 2 V; i 6¼ j . The cost of  each line segment is represented by cost matrix D ¼ dij ; i 6¼ j . Figure 2 is a schematic diagram of vehicle routing problem with one distribution center and 27 customers. The black dots in the picture represent the customer (delivery point) fv0 ; v1 ; . . .vN g, the black square represents the distribution center v0 , and the line segment represents the vehicle route E between the two points. Each segment corresponds to a cost dij (vehicle distance or travel time). The encircled part represents a vehicle’s route (from the distribution center to the distribution center after delivery).

Fig. 2. Vehicle routing problem

4.2

Vehicle Routing Problem Algorithms

According to its essence, vehicle routing problem can be solved by two methods: exact algorithm and heuristic algorithm. Exact algorithms can usually find the optimal solution of the problem, but the complexity of this algorithm increases exponentially with the scale of the problem, so it is not suitable for large-scale practical problems. Therefore, more and more scholars turn to heuristic algorithms. Next, we mainly introduce the algorithms for solving these vehicle routing problems.

1926

P. Xiao

4.2.1 Exact Algorithms The commonly used precise algorithms include branch and bound method, dynamic programming method, etc. (1) Branch and Bound Method [6] Branch and bound method is one of the most classical algorithms in dealing with non-linear integer programming problems. This method is an improvement based on enumeration method, which is called implicit enumeration method or partial enumeration method. This method can be used not only for pure integer programming problems, but also for mixed integer programming problems. Branchand-bound method has been used to solve vehicle routing problem with time windows, but when the scale of the problem increases and the number of nodes increases, the computational complexity of the algorithm is too high and the computational time is greatly prolonged. Therefore, the branch-and-bound method is not suitable for solving practical large-scale problems. (2) Dynamic programming [7] In the early 1950s, the dynamic programming method was first proposed in document [7]. The main strategy of this method is to decompose a complex decisionmaking process into different stages. By choosing appropriate state variables, decision variables and defining the objective function of the algorithm, a large and complex problem is transformed into a series of sub-problems, and then each problem is broken down. For the dynamic programming method, it is difficult to find a general method to build a dynamic programming model for solving the problem. When facing a more complex problem, due to the lack of general selection criteria, the construction of the model relies on experience and imagination to a certain extent, which limits the wide application of dynamic programming. 4.2.2 Heuristic Algorithms For large-scale problems, the exact algorithm usually can not get the optimal solution in effective time, so scholars turn to solve the sub-optimal solution or satisfactory solution. Most of the classical heuristic algorithms were proposed before 1990. Satisfactory solutions were obtained by using local search technique. Most of the modern heuristic algorithms have been proposed since 1990, which integrates the idea of artificial intelligence. The following two heuristic algorithms are introduced respectively. (1) Traditional heuristic algorithms (1) Saving method This method is the most classical and one of the most representative traditional heuristic methods to solve vehicle routing problems. It was first proposed by Clarke and Wright in 1964. The main idea of this method is that according to the principle of maximizing the savings value of the connection between customer points, different customer nodes are allocated to different vehicles at first, and then two transport loops are merged into one according to the magnitude of the savings in transportation cost after merging, until the load of the vehicle reaches its maximum rated load, and the next vehicle is

Research on Vehicle Routing Planning Algorithm

1927

selected for optimization. This method adopts the method of successive approximation to the optimal solution, and obtains the approximate optimal solution of the problem efficiently. (2) Scanning method This method was first proposed in document [9]. The main steps of this method are as follows: A. Establish the polar coordinates with the distribution center as the center of the circle, arbitrarily select a customer point, and set the number of angles on the polar coordinates of this point to 0. B. Start the scanning (clockwise or counter-clockwise) with the line between the distribution center and the customer and arrange it in ascending order according to the angle of each customer node. C. Select an unused transport vehicle. D. Customer nodes are allocated to the vehicle in the order of the number of clamping angles of each customer until the maximum rated load of the vehicle is reached, starting from the customer point with the smallest number of clamping angles that has never been assigned to any vehicle. If all the customer nodes have been assigned, step e is changed; otherwise step C is changed. E. Line optimization. Solve the corresponding freight forwarder problem for each line, and determine the order of access for each customer in the line. (2) Modern heuristic algorithms (1) Tabu Search Algorithms Tabu search algorithm is proposed for the first time in document [10]. This algorithm is considered as an extension of the local search algorithm. This method first constructs the initial solution, then improves the initial solution continuously, and adds a variable storage structure and corresponding tabu criteria. Unlike the traditional optimization algorithm, tabu search algorithm pardons some taboo states by flouting the criterion. By flouting the criterion, the diversity of the algorithm is guaranteed, the local optimum is jumped out, and the global search ability is enhanced. However, tabu search algorithm also has two obvious shortcomings: the search process is serial iteration and too dependent on the initial solution. (2) Genetic Algorithms The genetic algorithm was first proposed by Professor John Holland of Michigan University in 1975 [11]. The algorithm simulates the evolution process of survival of the fittest in the biological world and equates the problem-seeking with the evolution process of chromosomes in genetics. The objective function of the generation and characterization problem of “the most suitable environment” individuals obtains the optimal solution. Because of the extensive parallel searching in the whole space, the algorithm improves the searching ability and avoids falling into the local optimum, so as to achieve the goal of global searching.

1928

P. Xiao

4.2.3 Advantages and Disadvantages of Heuristic Algorithm The advantages of heuristic algorithms include: (1) (2) (3) (4)

The accuracy of the algorithm is high; It is more intuitive and simple. Timely feedback and fast convergence; The procedure is simple and easy to modify. The shortcomings of heuristic algorithms are as follows:

(1) The optimization result of the problem is only approximate optimal solution, not necessarily optimal solution. (2) The advantages and disadvantages of the algorithms are greatly influenced by the external conditions, and there are differences among different algorithms. It’s hard to compare.

5 Conclusion Firstly, this paper gives an overview of the basic theory of supply chain and vehicle routing problem, then describes the algorithm of vehicle routing problem studied in this paper, and expounds the advantages and disadvantages of heuristic algorithm. Reasonable planning of vehicle distribution routes is a key link in distribution activities. Reasonable and effective vehicle distribution routes can reduce the number of vehicles needed, reduce the total mileage, make full use of vehicles and save the time and cost of distribution. Vehicle routing optimization is mainly based on the existing distribution centers, vehicle resources, customer groups, the application of modern mathematical methods and computer technology methods to design the optimal transport vehicle routes. According to the planned optimal route, the transport vehicles arrive at each destination in a certain order, and strive to achieve the goal of the least vehicle, the shortest time and the best transport route under the conditions of meeting the constraints of customer goods quantity, time and vehicle load limitation.

References 1. China Information Network: China logistics industry analysis and investment advisory report [OB/OL] (2006) 2. Li, L.: Research on Several Issues of Supply Chain Membership Relationship. Southwest Jiaotong University, Shanghai (2004) 3. Li, J.: Theory and Method of Logistics Distribution Vehicle Optimization Scheduling. China Materials Publishing House, Beijing (2001) 4. Zhao, Z., Wang, J., Qi, C.: Research on model and algorithm of vehicle routing problem in logistics distribution. Logistics Sci. Technol. 01, 98–100 (2007) 5. Wang, T., Cai, Y., Zhang, X.: Research on vehicle routing problem in modern logistics. Logistics Sci. Technol. 28(1), 32–34 (2005) 6. Belenguer, J.M., Benavent, E.: A cutting plane algorithm for the capacitated is routing problem. Comput. Oper. Res. 5, 705–728 (2003)

Research on Vehicle Routing Planning Algorithm

1929

7. Cesar, R.: A sub-path ejection method for the vehicle routing problem. Manag. Sci. 10, 1447–1459 (1998) 8. Clarke, G., Wright, J.W.: Scheduling of vehicles from a central depot to a number of delivery points. Oper. Res. 12, 568–581 (1964) 9. Gillett, B., Miller, L.: A heuristic algorithm for the vehicle dispatch problem. Oper. Res. 22, 340–349 (1974) 10. Glover, M., Hertz, A., Laporte, G.: A Tabu search heuristic for the vehicle routing problem. Manag. Sci. 40(1), 1276–1290 (1994) 11. Chen, G., Wang, Y., Zhuang, Z., et al.: Genetic Algorithm and its Application. People’s Posts and Telecommunications Press, Beijing (1994)

Research on Overseas Communication Mechanism of Moyan Novels Based on Network Cloud Computing Jinghui Zhou and Yingjie Nie(&) Dalian Polytechnic University (DPU), Dalian 116034, Liaoning, China [email protected]

Abstract. Platform services in cloud computing services can provide a more reasonable platform for cloud computing in the application process. The IT resources and infrastructure needed during the operation are provided to users as a service. In this service, users only need to use this platform to test, create and manage their own services. The virtual computer laboratory can not only improve the phenomenon of uneven resource allocation, but also improve the utilization of system resources. All the things described in Mo Yan’s works and the colorful artistic descriptions presented in his works, as well as the real China displayed to the greatest extent, contain the unique outlook on life, history and life of the Chinese people. It is for this reason that foreign translators and scholars are attracted to carry out translation publicity. Nowadays, as one of the most influential Chinese writers in the world, the development of the Internet has promoted the overseas promotion of Mo Yan’s works. Keywords: Cloud computing  Network platform Communication mechanism  Translation method



1 Introduction Mo Yan is a famous contemporary Chinese writer who emerged in the mid-1980s with a series of local works. His appearance has injected a new blood into the Chinese literary arena, which is different from the past. Looking back on Mo Yan’s 20-year creative process, we can find that his works have many common points: the theme is mainly to show rural stories, the plot is tortuous, the language has Chinese local characteristics but always highlights the color of magical realism. He expressed the local cultural content of China with Western descriptive techniques, combining the characteristics of Chinese local novel and foreign Magic Realistic novel, so that readers at home and abroad can return to the real and magnificent modern China from the description of the novel. Just as the Nobel Prize Committee of the Royal Swedish Academy of Sciences gave Moyan the reason for winning the Nobel Prize for Literature in 2012: “Moyan combines reality with fantasy, history and social perspectives. The world in his creation is reminiscent of the amalgamation of Faulkner’s and Marquez’s works. At the same time, he finds a starting point in Chinese traditional literature and oral literature. This remarkable feature has become an important reason © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1930–1936, 2020. https://doi.org/10.1007/978-3-030-25128-4_255

Research on Overseas Communication Mechanism of Moyan Novels

1931

why he has attracted the attention of many readers. As a vigorous writer in contemporary Chinese literary world, Mo Yan’s works not only enjoy a high reputation at home, but also have a great impact abroad. Especially after winning the Nobel Prize for Literature in 2012, Mo Yan’s works are well-known both at home and abroad as the first native Chinese to win the Nobel Prize for Literature. At present, the concept of cloud computing has not yet formed a more unified theory. The definition of cloud computing in a broad sense is the usage mode and the delivery mode. Specifically, it refers to the expansion of related information through the network and can realize the required services. This related service has a certain relationship with software, IT and the Internet, and also refers to any other service. Cloud computing has the concept of virtualization and the combination of technology and concept and theory. Nowadays, scholars have begun to study the structure of cloud computing technology. The management middleware and resource pool of cloud computing are highlighted. It can be seen from the structural diagram of cloud computing that resource pools and management middleware are important engineering parts in cloud computing. In a cloud computing system, it is possible to classify different types according to the hierarchy of each service. In the construction of cloud computing, it includes infrastructure services, platform system services, and system software services. At present, people are more concerned about the ability to provide certain infrastructure services, mainly including, etc. The main software that is used to implement infrastructure service engineering is Apache Hadoop. They provide the calling function for Web API.

2 Cloud Computing Architecture At present, there are many enterprises that can provide services for cloud computing, but the solutions for cloud settlement between different companies are different. According to the research and application of cloud computing today, According to the research and application of cloud computing today, the system architecture of cloud computing can be divided into three framework layers: core service layer, service management layer and access interface of terminal users, as shown in Fig. 1. The application of cloud computing in the VCL system mainly includes the following technologies: Firstly, Web and SOA services. This technology belongs to a service-oriented architecture, using a set of construction patterns to build software system modules, which can effectively use different functions of the unit. The interface has used the standard way, and can independently realize the service language compilation and the system operation refinement. In building, different systems can interact with each other in a unified way. Generally speaking, cloud computing services are implemented in the form of Web services. Through cloud computing system, a reasonable use of cloud computing and cloud storage to help the network provide a certain number of services, which is divided into two categories of storage and computing services. The application of cloud computing information service automation technology can encapsulate information resources into service types and submit them to users. In addition, it is convenient for users to deliver and develop through standard usage, which can shorten the service time of customers to go online and save time for customers.

1932

J. Zhou and Y. Nie

Fig. 1. Cloud computing architecture

The core service layer in cloud computing is to provide users with the operation environment, hardware facilities, application procedures and application services. According to the types of services that cloud computing can provide, the service architecture of cloud computing is divided into software services, platform services and infrastructure services. Firstly, the infrastructure service system, which is subordinate to the lower level of three hierarchical structures, can help the upper layer and service provide basic hardware resources, such as savings, networks, servers, and so on. The hardware used can use all kinds of applications on the basis of this operation. In addition, in order to allocate the hardware resources more reasonably, the virtualization technology in the infrastructure service layer and the rational use of virtualization tools can provide infrastructure services with strong customizability, high reliability and extensibility (Fig. 2).

Fig. 2. Cloud computing service

Research on Overseas Communication Mechanism of Moyan Novels

1933

3 Overseas Translation of Mo Yan’s Works The reason why Mo Yan’s works can be widely spread abroad and arouse strong repercussions is, in the final analysis, closely related to the efforts of translators in various countries. The most important translator of Mo Yan’s works in English is Professor Ge Haowen of the Department of East Asian Language and Literature, Notre Dame University. Professor Xia Zhiqing, who lives abroad, once said that Professor Ge was “the chief translator of modern Chinese literature”, while American novelist Updike said that Professor Ge was “the midwife” of modern and contemporary Chinese literature. Since 1986, Professor Ge has been tirelessly introducing many of Mo Yan’s works to English readers. In his works, Mo Yan’s writings have become quite contemporary in English and American literature. In this regard, even Professor Gu Bin, a famous German Sinologist who has a critical attitude towards Mo Yan’s works, admires: “A trademark like Ge Haowen has made Mo Yan gain unprecedented influence in the English world”. Ge Haowen’s translation is very ingenious, not word-for-word, paragraph-by-paragraph, but the whole translation, and this way can well avoid the author’s weaknesses. It can almost be said that without him to translate many of Mo Yan’s novels into English, Mo Yan’s influence would be difficult to penetrate into the West. In translating Mo Yan’s novels, Ge Haowen paid great attention to the understanding of Chinese special vocabulary by Western readers and respected the special effects of some unconventional vocabulary in the original text. For example, in the book “Red Sorghum Family”, because its language description is quite Chinese traditional novel color, and even a lot of vocabulary can only appear in China, Ge Haowen translated the “rash hero” into “a green wood hero” and “noon” according to the characteristics of Chinese and Western novels. “Rabbit” is translated as “you little shit” and so on, which is vivid and charming. Anna Chen, a Swedish translator, is the main translator of the Swedish version of Moyan’s works and the most important foreign woman behind Moyan’s awards. The translators of Red Sorghum Family, Song of Garlic Bolt in Heaven and Fatigue of Life and Death are all Anna Chen. After Mo Yan won the prize, Peter Engelon, Permanent Secretary of the Swedish Academy of Literature, said, “When Mo Yan’s works were translated into Swedish, the original flavor was ensured”. The original translation enables foreign readers to understand more accurately the reality of China in Mo Yan’s works. After Mo Yan won the prize, Chen Anna also received warm praise from Chinese scholars and netizens, calling her the “uncrowned king” behind Mo Yan (Fig. 3). There are two main translators of the Japanese version of Mo Yan’s novels: Fujii Sanji and Fukuda Yoshida. Yoshida Fufufu, a translator, has been personally affirmed by Moyan because they share the same life experience and living background, which enables him to fully understand the life described by the writer when translating Moyan’s works. For example, when he translated “Breast Button”, he once said: “There is a lot of mysterious content in it”. Mo Yan often said that he was a peasant, and I also said that I was a peasant, our origin is the same. I grew up in the countryside of Japan and worked in agriculture as a child. My father was an iron-beater, and there were similar people around Mo Yan. There were iron-beaters in Buckles and Bucks. The image of my mother in this novel is exactly the same as that of my mother. Really, it is not my fiction. After I began to translate “Bucks and Bucks” carefully, I completely

1934

J. Zhou and Y. Nie

Fig. 3. Mo Yan’s works

integrated into Moyan’s world. I met Mo Yan for the first time in March 1997. Now, 14 years later, I feel closer and closer to him. Maybe it is because of the same origin of peasants. In addition, when translating “Life and Death Fatigue”, “Forty-one Guns” and “Sandalwood Penalty”, I also felt: “Mo Yan’s works have strong local characteristics”. They are all set in Gaomi, Shandong Province, etc. I try to turn them into a language world with the background of my hometown Hiroshima, but it’s not good to turn them into Hiroshima dialect entirely. It’s mainly standard words. I try to add as much as possible to them. In terms of language and environment, I try to moisten and moisturize the taste of my hometown, Hiroshima, which I am familiar with.

4 The Reasons Why Mo Yan’s Works Attracted Attention Abroad Moyan sweeps away the traditional Chinese realistic style and boldly integrates Latin American magic realism and stream of consciousness into his novel creation. His masterpiece Red Sorghum is an outstanding representative of this writing paradigm. But Mo Yan’s novel, which is called “magical realism”, can better penetrate into the world of Western readers. When Western readers come into contact with such novels, they will feel their familiar magic style and their strange rural realism peculiar to China at the same time. This temperament of modern literature makes Mo Yan’s works more open to the world of Western literature. Mo Yan once said that he wanted to “write as a common people” and thought that. Such writing can really be called “folk writing”. It is the unique Chinese experience and folk standpoint in Mo Yan’s novels and his writing attitude for the common people

Research on Overseas Communication Mechanism of Moyan Novels

1935

that arouse the strong desire of foreign scholars and readers to understand and explore modern Chinese history and culture. Mo Yan’s involvement in Chinese reality and his individualized reflection on Chinese history also satisfy the Western public’s desire to understand Chinese society through Chinese contemporary literary works. Wish. As translator Ge Haowen once said, “American readers want more Chinese works to be translated. They think they can see the reality of China through literature.” Therefore, “a Chinese work, even if the Chinese people like it very much, but if I think there is no market abroad, I will not turn it over.” Basically, I still look at Chinese literature from the perspective of a foreigner. Western readers prefer works that “expose the dark side of China”, which has nothing to do with Sinologists’ own taste. “I have to take responsibility for this, I just like serious and pessimistic works,” he said. Overseas readers are eager to understand the real China. They also want to see more works reflecting the real China, rather than simply praise and praise. The main body of literature is language. A good literary work, besides having a fascinating plot, is fluent. Language description is also very important. The language mentioned here is not only the unique charming language in Mo Yan’s own novel creation, but also the Indo-European language family which is more easily accepted by Western readers after the translators’ reorganization and modification. Especially as a well-known writer like Mo Yan, the quality and ability of a translator is the key to the success of his novel. Including plots, characters, dialogues, narrative rhythms, perspectives and examples, in fact, it mainly depends on the translator’s sensitivity, grasping the insignificant but very important cultural connotations, so as to regain life in the translated text.

5 Conclusion All the things described in Mo Yan’s works and the colorful artistic descriptions presented in his works, as well as the real China displayed to the greatest extent, contain the unique outlook on life, history and life of the Chinese people. It is precisely because of this that foreign translators and scholars are attracted to carry out translation propaganda and famous directors are attracted to bring their works onto the screen. Nowadays, as one of the most influential writers in the world, Mo Yan has more or less integrated Western theories and thoughts into his writing, but the most essential part of his writing still comes from Chinese folk culture. After years of precipitation, this literary work, which contains Chinese local color and national culture, can finally emerge in the world literary arena and gain a place of its own. Acknowledgement. Dalian Polytechnic University 2016 Scientific Research Project, project number: 2016J012).

1936

J. Zhou and Y. Nie

References 1. Romantsev, B.A., Skripalenko, M.M., Huy, T.B., et al.: Computer simulation of piercing in a four-high screw rolling mill. Metallurgist 61(9–10), 729–735 (2018) 2. Miranda, D., Costa, C.M., Almeida, A.M., et al.: Computer simulation of the influence of thermal conditions on the performance of conventional and unconventional lithium-ion battery geometries. Energy 149, 262–278 (2018) 3. Zhang, T., Li, R., Potter, T., et al.: Frequency-dependent anisotropic modelling and analysis using mfEIT: a computer simulation study. Int. J. Numer. Methods Biomed. Eng. 34(7), e2980 (2018) 4. Hrach, R., Novotný, D., Novák, S.: Study of initial stages of thin film growth by means of atomistic computer simulation and image analysis: comparison with experimental data. Vacuum 149, 279–283 (2018) 5. Liu, F., Liu, Y., Liu, Y., Wang, H.: A novel construction paradigm of multimedia awareness system for mobile network. Cluster Comput. 1–17 (2017) 6. Sarstedt, M., Ringle, C.M., Smith, D., Reams, R., Hair, J.F.: Partial least squares structural equation modeling (PLS-SEM): a useful tool for family business researchers. J. Fam. Bus. Strategy 5(1), 105–115 (2014) 7. Wang, C., Tang, T.: Recursive least squares estimation algorithm applied to a class of linearin-parameters output error moving average systems. Appl. Math. Lett. 29, 36–41 (2014) 8. Muse, A.R., Lamson, A.L., Didericksen, K.W., et al.: A systematic review of evaluation research in integrated behavioral health care: operational and financial characteristics. Families Syst. Health J. Collaborative Fam. Healthc. 35(2), 136 (2017) 9. Kadziński, M., Labijak, A., Napieraj, M.: Integrated framework for robustness analysis using ratio-based efficiency model with application to evaluation of Polish airports. Omega 67, 1–18 (2017) 10. Koutsoukos, X., Karsai, G., Laszka, A., et al.: SURE: a modeling and simulation integration platform for evaluation of secure and resilient cyber-physical systems. Proc. IEEE 106(1), 1–20 (2017) 11. Pereira, L.O., Freitas, C.C., Santaanna, S.J.S., et al.: Evaluation of optical and radar images integration methods for LULC classification in Amazon region. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 11(9), 1–13 (2018)

Tourism Design of Forest Park Based on Artificial Intelligence and GIS System Zhang Rui1,2(&) and Wang Wukui1 1

School of Economics and Management, Beijing Forestry University, Beijing 100083, China [email protected] 2 Shanxi University of Finance and Economics, Taiyuan, China

Abstract. In order to meet the requirements of real-time observation data acquisition, storage, management, analysis and visualization of dynamic objects and sensors, we adopted a new geographic information system to design the forest park. Each complex geographical phenomenon is composed of an indefinite number of geographic objects, represented by multiple temporal geographic objects and their interactions, and the interactions among geographic objects are transmitted through events. The construction of Forest Park has become an effective means to improve the ecological environment of the city. Starting from the perspective of forest aesthetics, taking Forest Park as the research object, this paper summarizes the situation of parks, introduces the principles of park planning, and analyzes the configuration of plants and the strategies of landscape planning. Therefore, we should recognize the plant landscape in a dynamic perspective by a long-term view. Keywords: Artificial intelligence System development

 GIS system  Park tourism design 

1 Introduction Plant landscape is one of the main landscapes of Forest Park. However, the natural plant landscape is not equal to the beautiful plant landscape. It also needs the excavation, development, and processing of the day after tomorrow [1]. There are more than 25000 species of seed plants in China. There are more than 8000 species of seed plants. Among them, there are more than 8000 species of trees. They are known as the “flower kingdom” [2]. Many famous ornamental plants are distributed in China. In view of the species of plants in China and the development of Forest Park in recent years, the planning and design of plant landscape are very necessary [3, 4]. When we plan and plan the plant landscape in Forest Park, we must strictly follow the relevant requirements of modern forestry and forest aesthetics according to the actual natural conditions and plant characteristics of the region. To ensure that the plant configuration and landscape design of Forest Park can achieve the best ecological and economic benefits [5]. In this paper, an example is given to analyze how the park can be configured and landscape planning from the perspective of forest aesthetics [6, 7]. At the present stage, the process of urbanization © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1937–1948, 2020. https://doi.org/10.1007/978-3-030-25128-4_256

1938

Z. Rui and W. Wukui

has been accelerated, and a more serious problem of ecological environment deterioration has been produced, and people’s love for green plants is enhanced. Urban Forest Park is a large green system in a city, which plays an important role in improving the ecological environment of the city and improving the quality of the environment [8, 9]. Forest Park is rich in plant species, undulating terrain, beautiful landscape, and this series of landscape elements to build a colorful park landscape. Forest plant landscape mainly includes trees, shrubs, and herbs and so on. Through the reasonable collocation of these plants, the unique plant characteristics and landscape effects of a region are revealed. With the rapid development of social economy, some of Forest Park has begun to transform, such as the big barrier Forest Park. The transformation methods in different areas are different because of their soil, climate, and vegetation [10].

2 The Theoretical Basis of Forest Plant Landscape Planning 2.1

Guiding Ideology

According to natural conditions, plant ecological habits and people’s requirements for the ecological environment, plant landscape design should follow the modern forestry and forest aesthetics theory, aiming at maximizing the three benefits of ecology, society, and economy. According to the forest types, geographical location, the surrounding environment, we should choose a reasonable plant, combination collocation, make plants among different types of complement each other to create a rich, artificial plant community. We should maximize the amount of green and create a good ecological environment for the sustainable growth of plants and the sustainable use of landscape. The art of plant landscape in the creation of an extremely delicate and complex [2], in the design should make full use of the plant form, line, colour and texture design, and through the changes and the life cycle of the plant, making a living dynamic map (see Fig. 1).

Fig. 1. Selected scene of different types of Sisangan landscape

2.2

Planning Goals

On the basis of preserving, restoring and creating a natural ecological environment with biodiversity and landscape diversity [3], we should make full use of original plant resources to supplement landscape trees appropriately. The construction of Qi Ling Forest Park has become an important part of the ecological security pattern of Changing Town, providing a new space for urban residents to enjoy leisure, entertainment, and tourism (see Fig. 2).

Tourism Design of Forest Park Based on Artificial Intelligence

1939

Fig. 2. Place and the type of activities in Sisangan forest park (based on observation study)

2.3

Planning Principles

The first principle is an ecological priority. Improving the ecology is the most fundamental purpose of the landscape planning of Forest Park. In the process of plant landscape construction, local tree species should be preferred and native broad-leaved trees are the main species. Local tree species have good adaptability and can play a good ecological function. At the same time, we should introduce the exotic beautiful landscape tree species with morphological beauty, crown density, colourful and strong adaptability to build the Forest Park landscape, and configure them according to the growth and flowering characteristics of the tree species, so as to ensure that the forest landscape is flowering all year round [4]. FV = PV( 1 + k Þn

ð1Þ

The second principle is proper trees and trees. According to site conditions and landscape requirements, according to the degree of preference for light and tree species on soil adaptability, the selection of suitable trees and reasonable configuration, is to form a clear and reasonable structure of forest plant community, in order to give full play to the species of ornamental value and ecological benefits (Zhong, Luo& Yuan, 2004).   ð 1 + k Þn 1 FVA = PMT k

ð2Þ

1940

Z. Rui and W. Wukui

The third principle is combining scientific and maneuverability. The transformation of plant landscape is a scientific and complex technology. We should not only plan scientifically according to the current technology and material conditions but also consider the actual operability so as to make the plan implemented. In the plant landscape planning, the characteristics of high soil sand and stone content in the Forest Park are fully considered, so as to avoid the choice of soil demanding species (Wang, Zhong, Sen& Tourism, 2017). The last one is step by step and seeking actual effect. The construction of landscape forest is a long-term task. Some tree species used to create landscape forests, especially colourful and graceful trees which are not fast-growing tree species. Therefore, in the process of construction, we should not be anxious to succeed. We should adhere to the principle of “planting one piece and surviving one piece” [5].  PVA = PMT

2.4

1  ( 1 + k Þn k

 ð3Þ

Analysis of the Factors of Forest Plant Landscaping

The main factors that constitute the landscape of forest plants are mainly in the following aspects. First one is formed. The forest plant species, distinct style, its shape in different poses and with different expressions, in addition to the natural formation, but also through artificial cultivation, create all kinds of the odd state. The second one is color. The leaves, skin, flowers, and fruits of forest plants have different colours, which can give people a variety of colour beauty. The third one is incense. This is another characteristic of the plant, the fragrance to concentration into the aroma, flavour and fragrance, light, to make the site of Ye Xiang, flower and fruit, incense, incense and other wood skin, so that visitors can taste the flavour, and aroma, attractive. The fourth one is quality. Rough plants give people a heavy feeling, such as stout wisteria, Tang Huai, the ancient banyan tree; texture delicate plant to light and fine feeling. The last one is group. Planting more than 10*30 trees is meant to be planted. The main performance is the overall beauty of group planting trees, the trees change enjoy entity level and crown contour. The canopy density of the group is large and can be used as a barrier and a barrier (Wen, Zhou, Zhang& Lü, 2009).

3 Plant Configuration and Landscape Planning of Forest Park 3.1

In Order to Establish a Composite Layer

In the park slope and bad natural environment areas, by the way of closing hillsides to facilitate afforestation, strengthen the plant maintenance work is an important area of the park. The park is the core area of the Cave Scenic Park, where the growth of 20 thousand acres of secondary broad-leaved forest. The secondary forest has more advantages than the plantation, to strengthen the protection of the area, the scenic spots

Tourism Design of Forest Park Based on Artificial Intelligence

1941

around the cave to ensure adequate water, and for the rapid growth of trees, thus creating greater ecological benefits for the park (Yang, Kang, Du& Bao, 2012). PVperpetuity ¼ n=

PMT k

ln (FV/PV) ln (1 + k )

ð4Þ ð5Þ

According to the ornamental characteristics of the vegetation, the park makes a reasonable arrangement of Joe, irrigation, and grass to create a beautiful landscape with distinct layers. On both sides of the line, the greening landscape is composed of native broad-leaved tree species and precious tree species. There are some characteristic trees of evergreen flowers, such as Joe, irrigation, and grass, which are different from some foliage plants, native tree species, spring and summer flowers, autumn and winter leaf types (Zhang, 2008). There is a clear requirement for the spacing between the various planting trees in the park. The tree spacing is controlled around 3. The height of the middle shrub is between 1 and 2, which is planted in the middle of the tree. 3.2

Ornamental Plant Allocation and Planning

Trees and shrubs, flowering and foliage trees are planted in the open area of roads and lawns. We pay special attention to the rational collocation between the three elements of Joe, irrigation, and grass, and create a park landscape with a sense of hierarchy. In a relatively steep area, afforestation is the main means to create green belts according to the actual terrain of the park. With the help of corridors and other landscape patterns, we should establish plant scenes that are mutually exclusive, and rationally match the design of close range prospects, so as to ensure the coordination and integration of the overall landscape planning (see Fig. 3) (Fig. 4).

Fig. 3. Effects of different variables in relation to recreational preferences (activities and site selection).

1942

Z. Rui and W. Wukui

Fig. 4. Effects of different variables on scenic beauty (based on Questionnaires)

3.3

Overview of GIS

Geographic information system is based on theories of geography, based on cartography, computer science and technology as the support, with RS and GPS as a cross subject of the important data sources. The multidisciplinary nature of geography causes GIS to have the characteristics of multi discipline intersection. It not only absorbs the essence and nutrition of many related disciplines, but also gradually forms an independent marginal discipline, and applies it to many related disciplines, and promotes their development (Fig. 5).

Fig. 5. Five major stages and layers of the modern GIS

One of the reasons for geographic computing is the core content of geographic computing geographic information science is the need to explore the space complexity of the origin and development in computing science. Some scholars point out that geographic science is faced with the challenges of data intensive, computing intensive and massive spatio-temporal data concurrent access. Cloud computing is becoming a

Tourism Design of Forest Park Based on Artificial Intelligence

1943

general computing technology and it will change the traditional methods and patterns of GIS application, and solve the challenges of geographic science. For the vast majority of users, GIS means that data, software, development barriers have been broken, thus GIS resources become easy to obtain. The temporal and spatial changes are the eternal theme of the objective world. Various entities and phenomena always change along with the time axis, such as land use evolution, land and sea changes, urban expansion, riots and spread, spread of infectious diseases and so on. Each complex geographical phenomenon is composed of an indefinite number of geographic objects, represented by multiple temporal geographic objects and their interactions, and the interactions among geographic objects are transmitted through events. Positioning accuracy consists of two parts, deviation and precision, deviation is to describe the real location and the location of the system differences, the ideal deviation should be zero that indicating that there is no systematic position on the map with the position deviation which should be analyzed from the listed aspects. (1) The numerical map of the measured data cannot be larger than the corresponding scale in the elevation of elevation and contour line. Digitally collected digital map of the core elevation point height value should be correct. The elevation of the contour should not conflict with the elevation or the features of the adjacent elevation points, and can display the morphological features of the area. (2) Coordinates of the points, km, net and latitude and longitude lines at the point of intersection and control point shall be correct. On the replay chart, the error of the above points shall not exceed ±0.1 mm and the error of the edge of the contour shall not exceed ±0.2 mm, the diagonal error of the contour does not exceed ±0.3 mm. (3) The measured data of the digital topographic map and digital ground by figure as site points to the adjacent control points of the feature points or error in the position and the spacing between adjacent feature points in the error may not be greater than the corresponding scale mapping the norms.

4 Plant Landscape Design in Different Regions of Forest Park Forest Park zoning, generally include natural scenery tourist areas, tourist areas, scientific humanistic scenery resort, experimentation area, recreation and entertainment area, camping area, hunting in the forest area, tourism service area, park area, agricultural and sideline production areas, forestry production. In each area, the plant landscape is indispensable and it can be for the king, but also for the background. 4.1

Plant Landscape Design in the Sightseeing Area

The planning of Forest Park is based on the natural environment itself, while protecting the local nature and culture, and excavating the tourism value at the same time, driving the economic and social benefits. On the one hand, the planning of the Forest Park plays the ecological function of the forest, the function of education and science, and the adjustment of the climate function. On the other hand, it will be protected and utilized in the specific area in the form of parks, so that people and nature can achieve mutual accommodation and communication with the help of Forest Park, and become

1944

Z. Rui and W. Wukui

mutual helpers and providers, so as to achieve harmony and coexistence. For all types of resources, cannot be excessive in accordance with the so-called “people-oriented” principle of change, also should not let things drift, and should find a balance point between the human and nature by human power to complement each other, improve and enhance the landscape resources. Such a plan is comprehensive. Respecting the succession law of nature, giving the forest system enough space to develop and enough growth time, it is possible to achieve the goal pursued by the planning. The construction of Forest Park in accordance with the overall policy of five in one development, proposed by the government in the “12th Five-Year” plan, the ecological civilization has been promoted to the same importance with the national economic and political, cultural and social development status. Forests are just like the resources of the oceans, air, and sunlight, which are the gifts of the earth. They are quite different from the industrial materials that have gone through the gears of the age. They are not only limited to life but to life. Although these resources are free, they are not inexhaustible, and they need our protection and rational development and utilization. The planning and design of forest parks must also conform to the strategic ideas of sustainable development. We are trying to bring all kinds of benefits of Forest Park, especially the ecological benefits, into full play, and bring far-reaching implications for the benefit of future generations. In this way, the planning of Forest Park should be based on a long-term goal rather than just a temporary economic benefit. The planning and application of all kinds of natural resources and human resources can be taken and reserved, and can be utilized. If the resources are limited and need to be protected, the participation of too many artificial traces should be avoided, and the space for selfdevelopment and purification should be left out for the original natural features. Forest is an important part of the earth’s terrestrial ecology. It has an irreplaceable significance to the living of the earth, like the sea, the air, and the sun. Countless species of animals and plants depend on the forest to continue. A forest ecosystem, which has good plant community structure, perfect and less damaged wildlife resources and abundant biological level, is of high resource value. In a certain area, through the Forest Park model, we can play a role in protecting resources to a certain extent. Look at the whole environment, these scattered Forest Park can be formed from relying on overall ecological environment benefit, the role is immeasurable. Generally speaking, Forest Park is large in scale and its main body is a forest. Its functions of purifying air, reducing dust and reducing noise, conserving water and soil and improving urban microclimate are irreplaceable. Some primitive species also survive and continue only in such a complex and pure environment. So forests are also important for the protection of the rarity of wild animals and plants. For all that depends on the earth, the role of forests for sustainable development cannot be ignored (see Table 1). 4.2

Plant Landscape Design in Camping Barbecue Area

Going camping is one of the motives for tourists to go to Forest Park, so it is necessary to open a wild camp in the garden. People go camping in pursuit of a wild forest, do not have to design in this area in the artificial landscapes, but must cultivate a foil plant landscape. The combination of sparse forest and grassland is the ideal camping site. Refers to the level of forest canopy closure in 0.1–0.4 of the forest. Because the density

Tourism Design of Forest Park Based on Artificial Intelligence

1945

Table 1. Landscape types of Sisangan forest park Landscape type Landscape characteristics Natural Factors

A: designed landscape

B: wild landscape

C: intermediate landscape

Slope: 0–5% Soil type: brown forest

Slope: 0–5% Soil type: brown forest Plant coverage: multi-level Density*: 70–100% Dominant species: Quercus Sp, Buxus hircana, Rubus persicues Cluster of dense plants

Slope: 5–10% Soil type: brown forest Plant coverage: multilevel Density*: 20–60% Dominant species: Quercus Sp, Zelkova Carpinifilia, Buxus hircana Semi-dense cluster of various trees

Dense understorey No rise and falls

Topographic changes Signs of recreational use by people

Seasonal change not sensible due to presence of evergreen plants No human-made features or human activities Limited view due to dense plant coverage

Seasonal changes not sensible due to presence of evergreen plants Low human density

Plant coverage: single Density: 40–60%* Dominant species: Carpinus betulus, Quercus Sp, Acer laetum Cluster of single old deciduous trees with parallel trunks and wide crowns No rise and falls A collection of different types of facilities (camps, restaurants, etc.) Physical density: 70% (approx.)

Man-made Factors

High human density

Views

Wide view due to low density of understorey and existence of open spaces

Ability to see through the semi-dense plant coverage

of the sparse forest is sparse, it often combines the sparse forest and the grassland to form an independent aesthetic object. In common choice of flat or flat terrain, tree species in the sparse forest should be selected with strong vitality. The flower color, leaf color, crown shape and branch of the tree also need to have higher ornamental value. Some evergreen trees can be properly doped in the deciduous tree, which should be distributed in the form of clusters or clusters. Sparse forest selection should not be evenly distributed, most avoid rows, and otherwise, it will make the landscape stiff and monotonous. Considering the picnic and camping, with grass turf under afforestation should have ornamental value, and the quality of the grass tough, vigorous growth, trampling the grass.

1946

4.3

Z. Rui and W. Wukui

The Planning and Design of the Plant Landscape in the Recuperation Resort

The existence of forests can produce a large amount of oxygen necessary for human survival, effectively reducing the harm of solar radiation and ultraviolet radiation to human health. Data show that if we walk or stay within 100 m of the forest, we can really enjoy the forest air, the physical and mental convalescence, and walking in the forest often can prolong life. With the development of human civilization, tourism is becoming more and more popular for the purpose of restoring health. The emerging tourism projects such as “return to nature”, “green awakening”, and “forest bath” have been developing rapidly. In order to meet the needs of people, a health resort is very necessary for the opening of Forest Park. The infirmary should be selected in the forest microclimate is very obvious, convenient nursing staff and local recreational activities in convalescence. The forest coverage of the sanatorium should be 40% to 70%, and the forest stand should be the stable stand above the middle age forest of the coniferous and broad-leaved mixed forest. Forest tree species in pine, cypress, elm, cypress is better and growing more species with sterilization function. In addition, the sanatorium is better equipped with a large area of water and open lawn, and a certain number of sparse stands. 4.4

Planning and Design of Plant Landscape on Both Sides of Forest Park Road

The curves of the garden road are generally very natural and fluent. Both sides of the plant configuration and products should also be natural and changeable. Visitors walk among them and experience the effect of different steps. The area of the garden road occupies a considerable proportion and is all over the place, so the landscape of the roadside plants directly affects the landscape of the whole garden. The main road is the main road connecting the various active areas. The number of visitors is large, and it is often designed as a loop, with a width of 3–5 m. If the main road in front of a beautiful building on the scene, the road on both sides of the plant can be planted, become a corridor, to highlight the main building. The entrance is also regularly configured to emphasize the atmosphere. Such as the two rows of towering Japanese fir at the entrance of the Mount Lu botanical garden, giving people an atmosphere into the forest. The main road is the main road in all areas in the garden. It is generally 2–3 m wide and the path is for visitors to walk in the quiet scenic area, 1 to 1.5 m wide. Planting on both sides of the road and the path can be more flexible. Because of narrow roads, some just planted at the side of the road, Joe shrubs can achieve both shading effect and flowers. Such as the garden road configuration such as Taiwan Acacia, oleander has arching branches of shrubs or small trees, forming the archway and visitors through the wild. Some of them become complex and mixed communities, and they feel very deep. Bamboo since ancient times is a beautiful garden, in the south of the Yangtze River, beside the path configuration of bamboo, bamboo composition size, allowing visitors to follow the path probing. It shows that it is very suitable to create a zigzag, quiet and profound garden road environment with bamboo (see Table 2).

Tourism Design of Forest Park Based on Artificial Intelligence

1947

Table 2. User’s preferences in Sisangan park in relation to defined zones. (A: Designed Landscape, B: Wild Landscape, C: Intermediate Landscape) Method Preferences

First priority Second priority Third priority

Aesthetics Visual preferences (Q-sort) C A B

Textual preferences

Recreation Stated preferences

Revealed preferences

B C

B C

A C

A

A

B

5 Conclusion With the rapid development of the urbanization process and the deterioration of the ecological environment problems, people are seeking more places of vitality and culture. The construction of Forest Park has become an effective means to improve the ecological environment of the city. Starting from the perspective of forest aesthetics, taking Forest Park as the research object, this paper summarizes the situation of parks, introduces the principles of park planning, and analyzes the configuration of plants and the strategies of landscape planning. The planning and design of plant landscape must be designed with the idea of dynamic and comprehensive thinking. Plant landscape is different from other natural and cultural landscapes. It is a regular dynamic landscape. As time goes on, tree growth and human activities, plant landscape will change accordingly according to certain rules and rhythm. In the early stage of forest plant landscape construction, the landscape effect is often not obvious, even very not ideal, but with the growth of trees, the landscape effect will be gradually enhanced. Therefore, we should recognize the plant landscape in a dynamic perspective by a long-term view. Plant landscape is natural scenery composed of all kinds of trees, shrubs, Fujimoto and herbaceous plants. It forms the beauty of forest landscape by many factors such as form, color, aroma, quality, and group. Therefore only consider the tree layer species composition, structure of Lin Xianghe is not enough in the planning and design, but also the main factors from the forest to the aesthetic characteristics of the design of grasp of plant landscape, should be considered under the forest, shrub and herb layer of the He Linzhong appendages landscape composition characteristics and aesthetic value. As for the ordinary people, walking into Forest Park is also a place to understand and learn the knowledge of forestry at the same time. By means of signs, radio and propaganda columns, we will publicize natural science knowledge for the public in combination with vegetation, flowers, birds, insects, and geology, and attract people’s attention with a relaxed and acceptable way to enhance the natural general knowledge level of the whole society. For young students, this is a good place to carry out excursions and extracurricular activities. The base of scientific knowledge education as the Forest Park campus, both give students out of school science relaxation pathway

1948

Z. Rui and W. Wukui

and guide them to effectively use the extra time to enrich the knowledge, but also to guide and cultivate the good health of their mind to form the correct scientific treat nature. From the perspective of scientific research, we can set up observation stations, provide research sites and objects, and carry out a series of researches related to forest, such as photosynthesis, energy conversion, and gas exchange. We should use forest resources to enrich the research purpose of scientific theory, and improve our understanding of the limited natural environment and build a natural atmosphere. At the same time, the design of the landscape should be properly managed and maintained.

References 1. Aminzadeh, B., Ghorashi, S.: Scenic landscape quality and recreational activities in natural forest parks, Iran. Int. J. Environ. Res. 1(1), 5–13 (2007) 2. Dan, X.Q., Gong, Y.: On forest landscape shape aesthetic feeling design. Contral South For. Inven. Plan. 19(4), 30–34 (2000) 3. Fang, S., Huang, C., Hong, D.: Plant configuration and landscape planning of Qilling forest park in Changping, Dongguan. Guangdong For. Sci. Technol. 30(2), 53–56 (2014) 4. Li, S., Wang, N.: The research on evaluation and development value of landscape resources in Junwu forest park of Liuzhou city in China. J. Anhui Agric. Sci. 3(9), 53–56 (2011) 5. Wang, G.S., Chu, X.M., Liang, Q.: The evaluation for forest landscape aesthetic quality based on digital image. J. Anhui Agric. Sci. 45(12), 157–159 (2017) 6. Norris, J., van der Mars, H., Kulinna, P., Amrein-Beardsley, A., Kwon, J., Hodges, M.: Physical education teacher perceptions of teacher evaluation. Phys. Educ. 74(1), 41 (2017) 7. Norris, J.M., Kwon, J., van der Mars, H., Kulinna, P.H.: A document analysis of physical education teacher evaluation systems. Res. Q. Exerc. Sport 87(S2), A130 (2016) 8. Sha, M., Zhang, Z., Gui, D., Wang, Y., Fu, L., Wang, H.: Data fusion of ion mobility spectrometry combined with hierarchical clustering analysis for the quality assessment of apple essence. Food Anal. Methods 10, 1–9 (2017) 9. Strong, A., Stoutenberg, M., Hobson-Powell, A., Hargreaves, M., Beeler, H., Stamatakis, E.: An evaluation of physical activity training in Australian medical school curricula. J. Sci. Med. Sport. 20(6), 534–538 (2017) 10. Ulrich, D.A.: Introduction to the special section: evaluation of the psychometric properties of the TGMD-3. J. Mot. Learn. Dev. 5(1), 1–4 (2017)

Analysis of Basketball Training Model Optimization Based on Artificial Intelligence and Computer Aided Model Gong Xiaohong1 and Wang Yu2,3(&) 1

2

Physical Education Center, Zhongnan University of Economics and Law, Wuhan 430073, China Postdoctoral Research Station, Zhongnan University of Economics and Law, Wuhan 430073, China [email protected] 3 ChangJiang Polytechnic, Wuhan 430074, China

Abstract. With the rapid development of electronic computer and its software in recent decades, the information of basketball has become more and more obvious. It has become the goal of sports computing to use computer technology to help the athletes to train, to improve their competition level, and to assist the coaches make decision. Existing basketball technical and tactical analysis and statistical software owns several shortcomings such as poor motion control and real-time performance, small database capacity, weak ability of extracting video, low efficiency of game statistics algorithm. It predicts changes of the state inside the system by calculating the probability of state transition, which makes the prediction method own advantage in application and a high practical quality. This paper based on data mining technology, aiming at the characteristics of the analyzed object, selects the appropriate data mining methods and statistical analysis methods to solve the various problems encountered in the basketball match, which can obviously improve the sports level and management level. Keywords: Artificial intelligence Algorithmic simulation



Basketball training



Machine learning



1 Introduction With the improvement of the degree of social informationization, sports informationization has become a trend, and with the rapid development of electronic computer and its software in recent decades, the informationization of basketball has become more and more obvious [1]. It has become the goal of sports computing to use computer technology to help the athletes to train, to improve their competition level, and to assist the coaches make decision. DM (Data Mining), also called KDD (Knowledge Discovery in Databases), is one of the most important topics of academic studies of Data base [2, 3], and so far, it is still a hot topic in the field of database and artificial intelligence research. Data mining is the process of discovering implicit, previously unknown, and potentially interesting information and knowledge from a large number © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1949–1956, 2020. https://doi.org/10.1007/978-3-030-25128-4_257

1950

G. Xiaohong and W. Yu

of data in databases. The application of data mining is not limited to scientific research and commercial application, but can be especially in competitive sports. The United States NBA coach use the data mining tool Advanced Scoutl which is developed by IBM company to make the decision of replacing player, and achieves good results [4]. These achievements have greatly promoted the development of information technology in ball games. Today, the application of computer technology in the field of competitive sports is still in its infancy, especially in the application of data mining technology in the field of sports computing [5–7]. Existing basketball technical and tactical analysis and statistical software owns several shortcomings such as poor motion control and real-time performance, small database capacity, weak ability of extracting video, low efficiency of game statistics algorithm. This paper based on data mining technology, aiming at the characteristics of the analyzed object, selects the appropriate data mining methods and statistical analysis methods to solve the various problems encountered in the basketball match, which can obviously improve the sports level and management level. This paper make analysis based on association rules of the technical and tactical characteristics of the basketball script data collected by basketball game information acquisition system, and it finds technical actions that have strong connections. The analysis results have the considerable guiding significance; Data mining algorithm based on the Markov process is used to analysis transfer steps of key points scoring and losing in basketball game data. The algorithm is able to find key action of scoring as well as the key actions of points losing in the game, so that the analysis results can guide basketball training and competition, having high practical value.

2 Analysis of Data Mining Algorithm 2.1

Analysis of Association Rules

Association analysis is to find the association rules among analyzed data and initially aims at market basket analysis. Because association analysis can be employed in many application areas, many researchers make deep studies of association analysis, including the optimization of the algorithm and improvement of the algorithm’s efficiency [8]. Agawal in 1993 first proposed the association rules mining in item sets of the customer transaction database. And its formal description is as follows. Association rules is defined as: set a items set I ¼ fi1 ; i2 ; i3    im g. Select a database for the transaction D ¼ ft1 ; t2 ;    ; tm g. Each ðTransactionÞt in the database is a non empty subset of I, namely, t 2 I. Each transaction is given a unique identifier ðTransactionIDÞ which is one-to-one correspondent. Association rules are implications like X ) Y, in which XI; YI; X \ Y ¼ ;, and X and Y are respectively the antecedent or left-hand-side(LHS) and consequent or right-hand side (RHS) of the association rules. The percentage of X [ Y in transactions D, namely the probability PðX [ Y Þ is called the support of association rules in the D; the percentage of containing X and Y at the same in transactions, namely the conditional probability PðYjX Þ, is called the confidence. The significant association rule is that satisfies the minimum

Analysis of Basketball Training Model Optimization

1951

support threshold and the minimum confidence threshold. These thresholds are set by the user or expert [9]. 2.2

Analysis of Data Mining Based on Markov Process

Markov process is a stochastic process that satisfies the Markov property. Markov property refers to at present condition of known system or process, its future state evolution does not rely on the previous state evolution. This property is called Markov property, also called memorylessness. Because of the memorylessness of Markov chain, it has few requirements for historical data. It predicts changes of the state inside the system by calculating the probability of state transition, which makes the prediction method own advantage in application and a high practical quality. The random variable Zn is located in E ¼ f0; 1;    ; kg and the random variables Tn is located in ½0; 1Þ, with n ¼ 0; 1;    ; and 0 ¼ T0  T1  T2   . If random process ðZ; T Þ ¼ fZn ; Tn ; n ¼ 0; 1;   g, satisfies PfZn þ 1 ¼ j; Tn þ 1  Tn  tjZn ; Zn1 ;    ; Z1 ; Tn ; Tn1 ;    ; T1 g ¼ PfZn þ 1 ¼ j; Tn þ 1  Tn  tjZn ¼ ig for all n ¼ 0; 1;    ;j 2 E with t  0, the process is referred to as Markov update process in the state space E. The above condition probability means that under the condition that the current system is known, the future state of the system is independent from the past state. The change of each state in the system is called state transition. If there is only one state moves in a unit time, the conditional probability PfXn þ m jXn ¼ ig is called the transition probability of system moves from state i to state j with m steps at time n, ðkÞ which can be marked as Pij ðnÞ ¼ PfXn þ m ¼ jjXn ¼ ig; i; j 2 I.In general, the tranðkÞ

sition probability Pij ðnÞ is not only related to the state i and j, but also to the time n. ðkÞ

When Pij ðnÞ has nothing to do with n, the Markov process is called homogeneous ðkÞ

ðkÞ

Markov process, and Pij ðnÞ is denoted by Pij . Suppose a system consists of n states. If use PðkÞ to represent the matrix made by transition probability with k steps of Markov process, the following is the probability matrix of state transition with step k. 0 ðk Þ

PðkÞ ¼ Pij

S

ð0Þ

ðk Þ

P B 00 B Pð10kÞ ¼B @  ðk Þ Pn0

ðk Þ

P01 ðk Þ P11  ðk Þ Pn1

ðk Þ

P02 ðk Þ P12  ðk Þ Pn2

1 ðk Þ    P0n ðk Þ C    P1n C C   A    PðnnkÞ

ð1Þ

If the states, and its initial probability vector is h above system ihas n different P ð0Þ ð0Þ ð0Þ ð0Þ ¼ S1 ; S2 ;    ; Sn , and Si ¼ 1. After transition with k þ 1 steps, the

probability vector is S ¼ ½Si ji ¼ 1; 2;    ; n. Then by Chapman, Kolmogorov P ðkÞ equation, it can be got that Sðk þ 1Þ ¼ Si  Pij ðj ¼ 1; 2;    ; nÞ, which is written in matrix form as follows:

1952

G. Xiaohong and W. Yu

0

1 0 10 ðk Þ ðk þ 1Þ ðk Þ P S1 S1 B ðk þ 1Þ C B ðkÞ CB 00 B S2 C B S2 CB Pð10kÞ B C¼B CB @    A @    A@    ðk Þ Sðnk þ 1Þ SðnkÞ Pn0

ðk Þ

P01 ðk Þ P11  ðk Þ Pn1

ðk Þ

P02 ðk Þ P12  ðk Þ Pn2

   

1 ðk Þ P0n ðk Þ C P1n C C  A PðnnkÞ

ð2Þ

A whole of the finite Markov process is called the Markov chain. System or process that belong to Markov chain has three characteristics: discreteness of process or system which means that it can be discretized to a finite number of states; the random nature of the process which means that the within a system transition of state is random; and the memorylessness of the process which means that the probability distribution of the next state depends only on the current state and not on the sequence of events that preceded it. Basketball technical and tactical analysis of key action is based on the above Markov model. First, make statistic of e system states of basketball game to form the state transition matrix, and calculate the state transition probability. Obtain the reliability of the system by the determinant calculation and then set the incremental to compute the reliability of system again. The difference between these two reliabilities is the reliability difference of the system.

3 Basketball Technical and Tactical Analysis Based on Data Mining 3.1

Data Collection

A common feature of the script description language of balls game is being able to describe the process of the game, so the collection method is designed as the process collection. After the classification and symbolization of the data in the table, the data table of basketball game is obtained. The related information of the table records the technical action and its related information of the competition. The data table of the basketball game is shown in Tables 1 and 2. Table 1. Encoding table of technical action No. 1 2 3 4 5 6 7 8 9

Name of technical action Code of technical action Assist A Two-point shot B Rebound C Steals D Three-point shot E Free throw F Breakthrough G Pick and roll H Block shot I

Analysis of Basketball Training Model Optimization

1953

Table 2. Transaction data of basketball match TID S1 S2 S3 S4 S5 S6 S7 S8 S9 S10

3.2

Appeared technical actions A, B, D, H A, B, C, E A, B, C, D, G C, G, F A, B, C, H B, D, F A, E, F B, C, F, I C, H B

Technical and Tactical Analysis of Basketball Characteristics and Technical and Tactical Analysis Orientation Analysis

Association rule mining includes single-dimensional Boolean association rules analysis, multilevel association rules mining and constraint-based association rule mining. The typical algorithm of the single dimensional Boolean association rules is Apriori algorithm, the core idea of which is to first find frequent item sets, and as long as those item sets appear sufficiently often in the database and meets the conditions of minimum support and confidence, the association rules can be generated. The iterative process generates frequent item sets. Based on the Apriori algorithm, the minimum support is set as 35%. Mine data in Table 1 and obtain large item sets that contain elements and lesions as shown in Table 3. Table 3. Results of Apriori algorithm Items set Support Items set Support ABC 50% ACD 33% ABG 50% BEG 45%

Based all what has mentioned above, it can be known that the most used in the database is (ABC) and(ABG), that is, (assists, two-point shot, rebound) and {assist, two-point shot, breakthrough). The mining algorithm process based on Markov process is shown as Fig. 1. 3.3

Technical and Tactical Analysis of Key Action of Basketball

The basketball match satisfies the characteristics of Markov chain, thus the basketball match can be regarded as a Markov chain. In this paper, mining algorithm based on Markov process is used to analysis the key action of basketball match data. It finds the

1954

G. Xiaohong and W. Yu Start

Design state transition matrix Calculate state transition probability

Calculate system reliability

Set increment of state transition probability N

Whether the increment is resonable Y

Calculate state transition probability anain Calculate system reliability again Calculate reliability difference

End

Fig. 1. Mining algorithm process based on Markov process

key transfer steps for winning and losing points in basketball match. The flowing chart of the algorithm is shown in Fig. 1. The main purpose of applying Markov process data mining method in basketball technical and tactical analysis system is to calculate the impacts of all the technical actions during the match on probability of winning the match, so as to find the key actions that influence the outcome of the match. The main process is using transfer probability matrix of a state of the game (technical action) to describe a ball match, and based on the Markov chain, calculate the probability of winning the match and determine the key actions influence the outcome of the match. Carry out analysis of key action on the above data and the following results are obtained Fig. 2. It can be seen from the above figure, jumper and shoot-offensive offensive rebound rebounds and lay up - offensive rebound are the key actions of the scoring. Results analysis shows that: after failing of the jump and shoot or lay up, offensive rebound is the key action of winning points. So in daily training, it is very necessary to strengthen the training of lay up and jump-shoot technology, and more attention should be put on training offensive rebound.

Analysis of Basketball Training Model Optimization

Jump and shootoffensive rebound

1955

Lay up-offensive rebound

Fig. 2. Scores of the key actions

4 Conclusions The traditional technical and tactical analysis method uses the simple statistical model to carry on the analysis process. Because of the lack of sample data, the result of the analysis is not detailed enough. The current technical and tactical analysis uses more statistical techniques. The shortcoming of statistical methods is that it needs to make samples, which will lose the useful information, and the effect on processing large volume of data is not very satisfactory [12]. In addition, most of the statistical analysis techniques are based on the perfect mathematical theory and superb skills, which make quite high request for the users. Therefore, in this paper, the database system and the data mining technology are applied into the basketball technical and tactical analysis to solve the problems such as small data storage, over-simplicity of statistical methods, and singularity of analyzing results [13], realizing a basketball technical and technical analysis system which has the functions of basketball technical and tactical characteristics analysis, technical and tactical orientation analysis and key action analysis. This system can analyze the association rules of technical actions in basketball game, action matching situation, and the key actions of scoring or losing points. Consequently, it owes great practical value. Acknowledgement. (1) National Social Science Foundation’s annual general project “Antitrust Economics Research on Vertical Restriction of Manufacturers” (15BJY002); (2) National Social Science Foundation’s later-stage funding project “Research on the Unbalance of Economic Development and the Adjustment and Upgrading of Industrial Structure” (17FJY014); (3) Research on the Evaluation System of the Quality of Higher Vocational Education in Hubei Province (2017ZDZB12), a major tendering project of the Educational Science Planning of Hubei Province in 2017; (4) Focus Research Base of Humanities and Social Sciences in Hubei Higher Education Institutions (Hubei Skilled Talents Training Research Center).

1956

G. Xiaohong and W. Yu

References 1. Huiqun, Z.H.A.O., Jing, S.U.N.: Sports computing: a new research domain of computer application. Comput. Sci. 31(8), 89–92 (2004) 2. Fang, Y.: Survey of data mining. Comput. Knowl. Technol, 17 (2007) 3. Wang, L.: The summarization of present situation of data mining research. Libr. Inf. 5, 41–46 (2008) 4. Zhang, C.: Current state of data mining research and its latest advance. J. Nanjing Inst. Ind. Technol. 3(2) (2003) 5. Costa, G., Ortale, R.: Model-based collaborative personalized recommendation on signed social rating networks. ACM Trans. Internet Technol. (TOIT) 16(3), 20 (2016) 6. Duwairi, R., Ammari, H.: An enhanced CBAR algorithm for improving recommendation systems accuracy. Simul. Model. Pract. Theory 60, 54–68 (2016) 7. Zhang, S., Wang, H., Huang, W.: Two-stage plant species recognition by local mean clustering and Weighted sparse representation classification. Clust. Comput. 20, 1–9 (2017) 8. Beel, J., Gipp, B., Langer, S., Breitinger, C.: paper recommender systems: a literature survey. Int. J. Digit. Libr. 17(4), 305–338 (2016) 9. Wang, Y., Li, J., Wang, H.H.: Cluster and cloud computing framework for scientific metrology in flow control. Clust. Comput., 1–10 (2017)

Technological Innovation of Manufacturing Industry Based on Genetic Network and Cloud Computing Information Wang Yu2,3 and Yuxiang Meng1(&)

2

1 School of Business Administration, Zhongnan University of Economics and Law, Wuhan 430073, China [email protected] Postdoctoral Research Station, Zhongnan University of Economics and Law, Wuhan 430073, China 3 ChangJiang Polytechnic, Wuhan 430074, China

Abstract. The neural network has a great advantage in the ability of the high bearing capacity of the noise data and the ability to classify the training data. Therefore, it is feasible and necessary to design a data mining method based on neural network, and to use it in real world problems. Neural Network Artificial has a strong computing power; it is an effective means of knowledge discovery. Manufacturing industry occupies a pivotal position in an economic society, Lean production reflects the advantages of product quality, cost and resource consumption. It has been paid close attention to by other enterprises, and has been applied by many enterprises. This paper intends to discuss the combination of modern cost management theory and lean production mode, so as to improve the cost management ability and reduce the enterprise cost. At the same time, lean thinking is carried out in the new cost management system, and a new cost management model is established to promote the cost management level of Chinese manufacturing enterprises. Keywords: Genetic networks Technological innovation

 Cloud computing  Manufacturing 

1 Introduction Manufacturing industry occupies a pivotal position in an economic society, manufacturing level directly on behalf of the national economic development level, the development of China’s manufacturing industry for the construction of socialist modernization of great significance. With the development of society and economy, the social needs are gradually divided, and the demands of the people are becoming different [1]. This requires the manufacturing industry to adapt to the changes in the market, and accordingly adjust the management. The traditional production line model of single species and large scale can not meet the change of social demand. In order to overcome the defects of large batch production, the Toyota Corporation of Japan has been actively exploring [2–4]. While reforming the traditional pipeline production mode and changing the enterprise management mode, Toyota Corporation has © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1957–1968, 2020. https://doi.org/10.1007/978-3-030-25128-4_258

1958

W. Yu and Y. Meng

gradually explored the lean production mode which can produce cars in many varieties and small quantities. Lean production reflects the advantages of product quality, cost and resource consumption. It has been paid close attention to by other enterprises, and has been applied by many enterprises [5, 6]. Lean production has been gradually promoted in the world manufacturing industry. And with the production of lean production, the corresponding enterprise management can not adapt to the new production methods, and many new production contradictions exist [7]. The traditional cost management method cannot follow the mode of lean production and market interaction, the traditional cost management system implementation issues such as lack of capacity control is prominent, so enterprises must carry out the transformation of the original cost management system, extensive application of modern management theory and tools, reconstruction cost management framework [8]. Our country began to introduce lean management thought from the seventy or eighty years of the last century, but for a long time, it has stayed in the theoretical research stage, and has less practical application in enterprises. However, since the reform and opening up, China’s relationship with the world market is becoming increasingly close, and the international competition is becoming increasingly fierce. Lean production has been widely applied by a large number of enterprises. The application of lean production promotes the development of China’s manufacturing industry, especially the development of the automobile industry [9, 10]. At present, most of the automobile enterprises in China have implemented the lean production mode. Lean production to reduce production resources and reduce production and operating costs, its influence on the enterprise production and management of more than, his constant pursuit of improvement, the pursuit of the perfect idea but also affect the development of enterprise culture, with stronger spiritual power for the development of enterprises [11]. With the introduction and promotion of lean production methods, the idea of enterprise cost management in our country needs to be improved step by step to suit the new mode of production [12]. This paper intends to discuss the combination of modern cost management theory and lean production mode, so as to improve the cost management ability and reduce the enterprise cost. At the same time, lean thinking is carried out in the new cost management system, and a new cost management model is established to promote the cost management level of Chinese manufacturing enterprises.

2 Data Mining and Prediction 2.1

Data Mining

In the complex target, the analysis of massive data sets, there is no ready-made and can meet the conditions of the general theory of the method of calculation. However, the neural network has a great advantage in the ability of the high bearing capacity of the noise data and the ability to classify the training data. Therefore, it is feasible and necessary to design a data mining method based on neural network, and to use it in real world problems. Artificial neural network can be used in data mining classification, clustering, feature mining, prediction and pattern recognition and so on. Therefore, artificial neural network plays an important role in data mining.

Technological Innovation of Manufacturing Industry

1959

Neural Network Artificial has a strong computing power. First of all, there is a huge parallel distributed structure; secondly, it has the ability to learn and the resulting induction. Data mining refers to the process from a large number of incomplete, noisy, fuzzy, random data, extracted implicit in which people do not know in advance, but also potentially useful information and knowledge of the process. It is an effective means of knowledge discovery. Discovered knowledge not only can be used for information management, query optimization, decision support, process control, etc., but also can be used for the maintenance of the data itself (Fig. 1).

Fig. 1. Data mining process

2.2

Data Prediction

During the process of data mining, data mining is the core content of the whole process: Classification and prediction: tutor supervision learning to find a group to be able to describe the data collection of the typical characteristics of the model, in order to be able to classification and recognition of unknown data belongs to a category is unknown cases mapping to a discrete categories. The main representation methods include: classification rules, decision trees, mathematical formulas and neural networks. Clustering analysis: unsupervised learning methods, according to the different aggregation between internal data object of maximizing the similarity, and the aggregation minimizing the similarity between objects “as the basic clustering analysis principle, the clustering analysis of data object is divided into several groups. Each cluster analysis to obtain the group can be considered for a similar don’t belong to the set of data objects, further from the same data set, and can obtain the corresponding classification prediction model (rules) through the classification study. In addition, a hierarchical model of the initial data set can be obtained by the repeated clustering analysis of the obtained clustering group. Outlier analysis: the analysis of isolated point data, in which the data is usually excluded from the data mining analysis of data mining analysis of the data (Fig. 2).

1960

W. Yu and Y. Meng

Fig. 2. Data prediction based on GMDH Shell

3 Cost Management Under Lean Production 3.1

Lean Production

Lean production is a kind of customer demand, minimizes enterprise resources, eliminates waste, reduces enterprise operating cost, makes the enterprise with minimum investment to get the best benefit and improve the response speed to the market as the main target of the mode of production. The core is streamlined by reducing has been to eliminate all non value activities in product design, product manufacturing, production management and related services, shorten the response to customer needs, enhance customer value, increase enterprise capital return rate and profit rate. JIT is oriented to market demand, according to the number of market specific needs and requirements of the rapid production of high quality products to meet market demand, it is based on the “leveling” expenditure rely on market pull production mode. The so-called market pull production, refers to the production of the factory should be based on market demand, according to specific market orders for production preparation. All the links and processes of factory production, parts or products are required to receive the unit from a process according to the required amount of product orders, such a step forward, pulling the control so as to form the whole production system, each process only the needed parts, not many, all the production line only the production orders to produce a product no more. Leveling is the control of parts and processes for production of a wide variety of products of different sizes on a single production line. The level of production, products in the future to the production line work station, professional personnel in accordance with the production time, quantity, variety and orderly qualifying, so each in the production process of the workpiece according to the production plan can smooth and orderly assembly of different products, which can ensure the smooth uninterrupted production line the operation, but also can make the product realization of hybrid production in variety and quantity, the market demand of multi variety and small batch to ensure rapid response and meet. Personnel autonomy means that the production line workers give full play to their initiative in the process of organic

Technological Innovation of Manufacturing Industry

1961

coordination of production equipment, and carry out product quality control. In the daily production process, once there is a device failure, it will automatically stop and have specific failure display, at this time, the corresponding staff members need to promptly troubleshoot and resume production. At the same time in the production process, any employee found quality problems, the number of varieties of products and products, and have the right to actively take the initiative to stop the production line, rapid troubleshooting, eliminate quality problems, solve the problem. This will put quality management into the whole production process, fully mobilize the initiative of each employee, and eliminate the product quality problems at the source of production, so that all the work has been transformed into high value effective labor (Fig. 3).

Fig. 3. Lean production

3.2

Cost Management Method Under Lean Production

With the Japanese automobile industry and the rise of the Japanese manufacturing industry, in 1990s under the lean production cost management attracts scholars in Europe and the United States, many scholars began to study it, quite a part of them have spent a lot of time on theoretical research and achieved fruitful results, for the cost management under the lean production in the theory also has a relatively clear understanding and definition. It involves three elements of value, function and life cycle cost. It takes the minimum cost to obtain the required functions as the core, and the goal is to reduce the cost of enterprises and improve the economic efficiency of enterprises. Value engineering to organized leadership activities based on the scientific method and technology as a tool, according to the theory of value engineering, product value theory, V = F/C formula, V refers to the value of the product function value coefficient, F refers to the functional importance coefficient, C refers to the cost coefficient. There are five ways to improve product value, namely: (1) function improvement, cost reduction and value enhancement. This is the ideal effect, but in general, it is often impossible to achieve, and in more cases, the value can only be increased through the following channels. (2) function is changeless, cost is reduced, value rises. (3) the function has been improved, and the cost

1962

W. Yu and Y. Meng

remains unchanged, thus increasing the value. (4) the function is slightly decreased, the cost is reduced, and the decrease rate exceeds the magnitude of the functional decline, thus increasing the value. (5) the proper improvement of the cost, the function of a substantial increase, the magnitude of the increase is greater than the cost increase, thereby increasing the value. Now, the value engineering method has been widely used in engineering construction, cost management of industrial enterprises and other fields. Inter organization cost management cost management breaks the traditional boundaries of traditional cost management in enterprise or organization boundary as the boundary, planning and cost control in enterprises or organizations within the scope of control, and the inter organization cost management cost management will be extended to the organization, through the planning and control of the cost of the fabric between the implementation. The lowest total cost target. Inter Organizational cost management is an interdisciplinary theory, which involves cost management theory, organization theory, contract theory, supply chain management theory, etc. As inter organizational cost management crosses the organizational boundaries, the implementation process is more than the traditional cost management obstacles. The target cost plan is a systematic product cost plan that releases the cost of a particular product with a specific function, a specific quality, and a quantity of the product, based on the market expected selling price and profit levels. He believes that the target cost includes direct cost, indirect cost and life cycle cost and target cost plan should not be considered a cost reduction and cost management, target cost plan should be as part of a new product design and the whole process of profit management. Once the product entered the manufacturing stage, the target cost must be constantly updated according to the customer’s expectations, the market environment and the cost of products, value engineering and value analysis (VE/VA) as reducing cost and realizing continuous improvement program of target cost. Detailed cost information, product knowledge, and VE/VA experience are important factors in ensuring that product design innovations meet design, functional, and target cost requirements. At the same time, through improving the operation of suppliers and raw material performance, to help them reduce costs, so as to achieve the target cost of the enterprise (Fig. 4).

Fig. 4. Cost management

Technological Innovation of Manufacturing Industry

1963

4 Construction of Cost Management System 4.1

Target Cost Planning

Target cost formulation is the primary task of lean production mode of cost management, the specific implementation steps are as follows: first, in the product design stage, through the “upside down” method to calculate the corresponding target cost of the corresponding products; two is the comparative analysis of the difference between the current product cost and product target cost calculation, and the difference between each function or cost factors; the three is the analysis of differences in motivation, mainly is the ABC (cost drivers, find out the different operations is the main product of no increase in the value of the operation), value engineering method (improved valueadded operations, the optimal portfolio is four); follow up state assessment of the target cost, the implementation of non financial index and financial index calculation of target cost; the five is the implementation phase, in the optimization of production cost reduction Product cost to achieve the expected cost target. Under the lean production management, the target cost is the key to the target cost planning in the cost management way. In this way, in the design and development period of products, you need to plan out on-line product cost tolerance, which is set in advance the cost of the product, so that products in the process of production practice, and the use of sending loss cost control in the cost range. In addition, due to variation of product market the University, if not able to effectively maintain the market competitiveness of products, it will quickly lose market, therefore, keep the good quality and low price, the outstanding performance of the product, has a very important strategic significance. And cost performance prominent, product realization, we must play the role of target cost planning. In the design and development stage of the product, the main process is the pre manufacturing process of the entity product, and the product cost control in the drawing design can effectively control the product design in the actual manufacturing process. Therefore, the product cost is controlled from the source (Fig. 5). The main contents of target cost planning include target profit, sale price and target cost: The first step is to determine the selling price. Generally speaking, there are many factors that affect the selling price, mainly including the positioning of consumer groups, the amount of sales expected, the concept of the product (positioning), the product life cycle, and the competitors’ responses. The second step is to determine the target profit margin. Generally speaking, the determination of target profit margin is the expectation of the profit of the operators according to their own management status, and the profit margin mainly depends on the supply and demand of the market. According to different market conditions, the enterprise price decision strategy mainly includes the following: one is the low price strategy (mainly applicable to the large quantity and product performance is not

1964

W. Yu and Y. Meng

Fig. 5. Cost planning

good, two) is the high price strategy (mainly applicable to mass production and good product performance), three is the strategic transfer strategy (applicable to products the small size and poor performance), four is the price maintenance strategy (mainly applicable to the product quantity is less and the good performance of the products). The third step is the determination of target cost. The target cost is equal to the difference between the target price and the target profit. The target cost is equal to the product of the target price and the gross profit margin of the target. In addition, the formulation of target cost must be based on the historical results of the previous operation. For similar products, the present production cost must be evaluated according to the existing products and the cost of new products should be readjusted. According to the company’s operation ability, technical level and product development phase components, materials, pay the price level to estimate the linear cost, and to add new features of the development costs, minus the invalid operation loss, obtain the actual target cost of new products (Fig. 6).

Technological Innovation of Manufacturing Industry

1965

Fig. 6. Target cost plan

4.2

Analysis of Operations in Target Cost Planning

In the enterprise production system under the requirements of cost accounting mainly reflects the enterprise production and management related cost driving factors, therefore, must be based on the cost drivers as the core to establish the cost calculation method, which leads to the production of the production cost accounting, namely, in the enterprise production management as the actual operation situation of accounting object according to the actual situation, loss of labor, the product according to the rational allocation of product cost, so as to effectively explain the real key factor of product cost, so as to provide a scientific practical production effectively, labor cost information, as a scientific and effective way and method for providing the corresponding improvement cost control. The operation mainly refers to the complex of technology, manpower, raw materials, environment and methods that the enterprise will consume in order to provide a certain service or product. The chain is mainly refers to set up in order to meet the actual requirements of the customer operation product operation based on the complex, and this complex is a business enterprise, is a key driver of production and management of enterprises. Activity based costing (ABC) plays an important role in the practice of target cost planning. It must be carried out around the operation according to the existing technical conditions. The reason is that the structure design and function of the product, through the value analysis to determine the structure of the product and the specific function, it is important to determine the process, we need on the basis of the existing production conditions of enterprises, according to the target cost and unit process of the actual loss cost value, it is possible to design process of the next step. Through the cost analysis method can analyze the detailed planning of the operation process, find out the useless

1966

W. Yu and Y. Meng

work, and by improving or eliminating useless operations to reduce costs, provide more useful information for decision makers. Job analysis is mainly from the two levels of job motivation and resource motivation. First of all, the analysis of resource drivers, mainly through the identification and measurement of the operation, confirm and collect the actual cost of the work, comprehensive evaluation of the effectiveness of the various operations. Resource reason analysis of the whole production process based on including product design, production, sales, storage, transportation to users, and in the process on the basis of the definition and measurement of work properly with high similarity, the establishment of operating cost base and operation center. Because the job center is pooled according to sub each resource drivers, therefore, analysis of causes of resources can reveal the operating loss of capital projects, through the corresponding relation between the project and operation, can determine the necessity of resources, and make the necessary restructuring of resources, and ultimately determine the best way to reduce the resource consumption of the work surface to improve the operation efficiency. Secondly, it is necessary to analyze the job motivation, which is mainly caused by job wastage, including the finished product, the output parts and the service. Job motivation analysis is to identify and measure each waste operation, and to collect operating costs and to allocate the cost of the cost library, and finally evaluate the valueadded of each operation. After the resource costs into the cost of operating the Treasury for, we have selected some representative job from the job cost center, through the center of the cost calculation rate of representative loss operation confirmation, calculate the cost of operation, with the corresponding operations on the corresponding output, so as to determine the the value of homework. Among them, the value-added operations mainly include: Operation clear function and can create for the final product or service value, in the whole process of product operations in the chain is indispensable, so cannot achieve the three characteristics of the homework is not value-added operations (Fig. 7).

Fig. 7. Activity based costing

5 Conclusions The western developed countries have applied the activity-based costing in a wide range. With the development of economy and the progress of science and technology, the enterprises of our country have the material conditions to implement the activity-

Technological Innovation of Manufacturing Industry

1967

based costing. In view of the problems existing in the implementation of lean production in Chinese enterprises, a lean production system model is designed for Chinese automobile manufacturers. Lean production compared with traditional production methods in value judgment, each production organization, process design and other aspects of the changes, the most important is to mass production, lean production has the advantages of There is nothing comparable to this. In order to cope with the increasingly fierce global market competition environment, enterprises adopt lean production, to maintain absolute superiority performance, quality or cost of products, improve their competitive ability, usually adopt two strategies: one is to develop new products, new features, beyond the competitors; the second is to rival products according to which of their products are targeted for the design and improvement, reduce the cost of products. The implementation of the two strategies must combine quality management, product development and cost management organically. It is necessary to apply the cost management method under the lean production mode effectively. Acknowledgement. (1) National Social Science Foundation’s annual general project “Antitrust Economics Research on Vertical Restriction of Manufacturers” (15BJY002); (2) National Social Science Foundation’s later-stage funding project “Research on the Unbalance of Economic Development and the Adjustment and Upgrading of Industrial Structure” (17FJY014); (3) Research on the Evaluation System of the Quality of Higher Vocational Education in Hubei Province (2017ZDZB12), a major tendering project of the Educational Science Planning of Hubei Province in 2017; (4) Focus Research Base of Humanities and Social Sciences in Hubei Higher Education Institutions (Hubei Skilled Talents Training Research Center).

References 1. Aghion, R.: Incomplete contracts and the theory of the firm: what have we learned over the past 25 years? J. Econ. Perspect. 25, 181–197 (2011) 2. González, M., González, L.: The co-creation as a strategy to address IT governance in an organization. RISTI-Revista Ibérica de Sistemas e Tecnologias de Informação 14, 1–15 (2015) 3. Jenkinson, T., Mayer, C.: The assessment: corporate governance and corporate control. Oxford Rev. Econ. Policy 8, 1–10 (2012) 4. Kaplan, R.: Using the balanced scorecard as a strategic management system. Harvard Bus. Rev. 74, 75–85 (1996) 5. Ganier, O., Schnerch, D., Oertle, P., Lim, R.Y., Plodinec, M., Nigg, E.A.: Structural centrosome aberrations promote non-cell-autonomous invasiveness. bioRxiv, p. 216804 (2017) 6. Garberoglio, C.L., Schoffstall, S., Cawthon, S., Bond, M., Caemmerer, J.M.: The antecedents and outcomes of autonomous behaviors: modeling the role of autonomy in achieving sustainable employment for deaf young adults. J. Dev. Phys. Disabil. 29(1), 107– 129 (2017) 7. Haerens, L., Vansteenkiste, M., Aelterman, N., Van den Berghe, L.: Toward a systematic study of the dark side of student motivation: antecedents and consequences of teachers’ controlling behaviors. In: Building Autonomous Learners, pp. 59–81. Springer, Singapore (2016)

1968

W. Yu and Y. Meng

8. Hughes-Morris, D., Roberts, D.: Transition to SCPHN: the effects of returning to student status on autonomous practitioners. Br. J. Sch. Nurs. 12(5), 234–243 (2017) 9. Lei, Z., Zhu, Z., Li, H., Zhang, S., Ma, C., Xu, W.: Outbreaks of epidemic keratoconjunctivitis caused by human adenovirus type 8 in the Tibet Autonomous Region of China in 2016. PLoS ONE 12(9), e0185048 (2017) 10. Luginbuhl, P.J., McWhirter, E.H., McWhirter, B.T.: Sociopolitical development, autonomous motivation, and education outcomes: implications for low-income Latina/o adolescents. J. Lat./o Psychol. 4(1), 43 (2016) 11. Nini, G., Smith, C.: Creditor control rights, corporate governance, and firm value. Rev. Financ. Stud. 25, 1713–1761 (2012) 12. Shleifer, A., Vishny, R.: A survey of corporate governance. J. Financ. 52, 737–783 (1997)

Research on Manufacturing Industry Transition in Guangdong-Hong Kong-Macao Greater Bay Area Based on Cloud Computing and Computer Aided Analysis Ying Liu1(&) and Jian Ma2 1

2

Guangzhou College of Technology and Business, Guangzhou 510000, Guangdong, China [email protected] Guangzhou Wanbao Group Co., Ltd., Guangzhou 510000, Guangdong, China

Abstract. Manufacturing industry is an important pillar of national security and economic growth. Innovation-driven has created conditions to promote the transformation of traditional manufacturing industry into service industry. At the global value chain, enterprises are engaged in various value-added activities such as design, product research and development, production and manufacturing, and sales. The position of enterprises in global value chain plays an important role in the competitiveness of enterprises. Against the Background of Guangdong-Hong Kong-Macao Greater Bay Area, according to the characteristics of the synergy of the service manufacturing hybrid enterprise, the requirements of the economic and social environment under the new situation are taken into consideration, and the synergy and innovation of the service type manufacturing hybrid enterprise is constructed. SOM oriented service innovation of manufacturing enterprises can enhance the market competitiveness of physical products and avoid vicious price competition due to homogenization of products. Keywords: Guangdong-Hong Kong-Macao Greater Bay Area Service manufacturing  Network service  Cloud computing  Manufacturing transition



1 Introduction With the further deepening of the social division of labor and the promotion of productive services, the manufacturing and service in the economy and society are constantly merged and symbiotic, and the boundary between the two has become increasingly blurred. Under this situation, enterprises that are suitable for the characteristics of the new era are produced, namely, service manufacturing hybrid enterprises. The service manufacturing hybrid enterprise is composed of the customers in the central position, and forms a service based manufacturing network through a series of original equipment manufacturers, contractor manufacturers, manufacturing service enterprises and productive service enterprises to capture the real needs of customers in time and © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1969–1980, 2020. https://doi.org/10.1007/978-3-030-25128-4_259

1970

Y. Liu and J. Ma

transfer them digitally to other network partners. The interaction synergy between the various network nodes in the mixed enterprise makes the multi enterprise body can find the comparative advantage of manufacturing resources in a wider range, reduce the manufacturing cost and improve the customer satisfaction. It can be said that the cooperative theory is the core theory of the mixed enterprise. On the basis of analyzing and arranging the related literature of service manufacturing and enterprise synergy, this paper analyzes the main components of the combination of qualitative and quantitative methods, combining the characteristics of service based manufacturing mixed enterprises. It includes service ability, management ability, integration ability, learning creation ability and logistics ability. Force, flexibility, information processing ability and development ability, at the same time, this paper puts forward the restrictive factors for the development of synergistic ability of the service type manufacturing hybrid enterprise. According to the characteristics of the synergy of the service manufacturing hybrid enterprise, the requirements of the economic and social environment under the new situation are taken into consideration, and the synergy and innovation of the service type manufacturing hybrid enterprise is constructed. The capability evaluation index system is put forward, and the maturity model of hybrid enterprise innovation capability is proposed. On this basis, a specific application analysis is made for an enterprise, and some conclusions are drawn and relevant suggestions are put forward. Since the beginning of the new century, the mode of resource integration and international division of labor in the world has undergone tremendous changes, from the initial international division of labor between industries to the international division of labor within the product. Transnational capital, which is driven by the pursuit of the highest interest, has organized economic activities around the world, and the crossborder economic transfer has become more and more frequent. In this globalized context, global trade with the integration of markets and the fragment of production links developed countries with developing countries. Fundamental changes have been made in the nature, flow direction and flow rate of world trade. In order to revitalize the economy of this region, the economic regions are increasingly dependent on embedding local economic activity into the global value chain to gain more value. The competition for high value added strategic links has also become the focus of the global competition for mobile space. In this context the competition between enterprises has been transformed from the initial product competition to the global value chain embedded in the enterprise. At the global value chain, enterprises are engaged in various value-added activities such as design, product research and development, production and manufacturing, and sales. The position of enterprises in global value chain plays an important role in the competitiveness of enterprises.

2 Service Innovation of Manufacturing Enterprises 2.1

Analysis of the Path of Service Innovation

The service innovation of manufacturing enterprises is to use new ideas and new technologies to enhance the service ability of the physical products, enrich the original and monotonous product after service and create greater value for the customers. The

Research on Manufacturing Industry Transition

1971

service innovation of manufacturing enterprises needs to clarify corporate social responsibility, release the potential demand of customers, and allow customers to participate in real-time and whole process. The form of innovation includes service innovation in prenatal, postnatal and postnatal life cycle, which is essentially an internal manifestation of service in manufacturing industry. The service of manufacturing industry refers to the transformation of the manufacturing enterprise from the physical product manufacturer to the “product + service package” provider. The existing research has not elaborate on the content contained in the service which is in the dominant position in the “package”, which leads to the fuzziness of the service innovation path of the manufacturing enterprise. The service innovation of manufacturing enterprises, which is the concrete manifestation of the service of manufacturing industry, is based on the original manufacturing and service ability, the accumulation of knowledge and experience, the carrier of physical product manufacturing, and more service content in the pre Natal, production and postpartum periods, and the realization of the product leading logic. The transformation from service oriented logic to service as the main source of value creation. The service innovation path of the manufacturing enterprise is: first, through the unrelated strategic transformation, it completely stripped the original manufacturing business and only provided the pure service solution to the customer. Two, the service was dominated by the service of manufacturing and products, and the service dominated by the service of manufacturing and products (Fig. 1).

Fig. 1. Enterprise innovation

There are two kinds of service innovation in the derivative of service in the manufacturing industry: horizontal service innovation means that enterprises weaken the original main manufacturing business through the outsourcing of manufacturing business, and provide customers with the process control, product R & D, marketing and customer relationship management related to the products. Producer services directly climb the two high-end of the value chain “smile curve”, such as Apple

1972

Y. Liu and J. Ma

Corp. The innovation of vertical service means that the enterprise expands the connotation of the physical product into the “generalized product”, and relies on the manufacturing business of the product to develop service business, that is, through the core manufacturing technology, the service innovation is carried out by the core manufacturing technology. The manufacturer has transformed into a service provider, such as Samsung Corp, which provides integrated products and system integration solutions to customers. 2.2

Analysis of Service Innovation Model

The scope of service innovation in manufacturing enterprises from small to large can be divided into three levels: the service innovation of the core products, the service innovation of the extended products and the service innovation of the broad sense products. (1) the service innovation of core products mainly through service integration (Service Integration), in the existing physical products to add new services, to meet the customer’s functional requirements for products, to provide customers with product oriented service innovation; (2) the service creation of the extended product mainly refers to the product extension service (Product Extension Service), by increasing the value of products such as upgrading, testing, maintenance and financing guarantee to solve the problem that the customer can use and can use, provide customer with process oriented service innovation; (3) the service innovation of the generalized product is mainly through the vertical integration, that is, by changing the delivery process of the product, the manufacturing enterprise can make the customer participate in the production process of the product in real time, so as to realize the customization and complete set of the product to the customer problem solution, and provide the customer with the result oriented service innovation. Product oriented service innovation: The product oriented service innovation stage is at the low end of the “smile curve”, which requires the product to better meet the market demand through service innovation, and to ensure the high satisfaction of the customer in the service while pursuing the low cost advantage, so as to retain the customer. At this time, the contribution of technological innovation to value creation is greater than service innovation, and service innovation mainly focuses on the change of business mode of after-sales service. process oriented service innovation: Customers purchase products not to have products, but to achieve the purpose of customers through product use. Under the condition of mature product technology, the enterprise can make use of service innovation oriented to the demand that the known customers are not satisfied. At this time, enterprises can provide complete sets of services for customers by the integration of external resources (such as supply chain and virtual enterprise), and reduce the transaction costs paid by customers because of the discrete needs. Result oriented service innovation: In the process of using the product, the customer can create an unforgettable experience for the customer, realize the customer’s lock, and then provide the service for the customer for life. Results oriented service innovation requires potential customers to release their invisible needs. This innovation phase is completed in the context of productive services, service production and the full participation of customers. This innovation model meets the basic characteristics of SOM (Fig. 2).

Research on Manufacturing Industry Transition

1973

Fig. 2. Service innovation model

2.3

Manufacturing Industry Transition in Guangdong-Hong KongMacao Greater Bay Area

The overall situation of manufacturing industry in Guangdong-Hong Kong-Macao Greater Bay Area: The overall level of manufacturing cooperation in Guangdong-Hong Kong-Macao Greater Bay Area is low. It mainly depends on quantity expansion and low-price competition to occupy the international market. It is facing the path dependence of “low-end lock-in” and “front store and back factory” mode. Now it has reached a new stage of innovation and transformation of the mode of economic growth. If the manufacturing industry of Guangdong, Hong Kong and Macao Great Bay Area wants to have strong competitiveness in the international market and achieve long-term success, it is necessary to prepare for a long and hard war, long-term planning and resources investment, and people are the most important. On March 7, 2018, General Secretary Xi Jinping attended the Guangdong delegation’s deliberations, emphasizing that development is the first priority, talent is the first resource and innovation is the first driving force. He proposed to Guangdong that “we should build a system and mechanism to promote high-quality economic development, build a modern economic system, form a new pattern of comprehensive opening up and build a Communist Party”. The ardent hope of “building common governance and sharing social governance pattern to be in the forefront of the country”. Taking the electronic information industry as an example, we should encourage Chinese enterprises with high level competitiveness, such as TCL, to expand the international market and to move towards the

1974

Y. Liu and J. Ma

global enterprise groups of intelligent products manufacturing and Internet services. At the same time, we should establish the mechanism of introducing overseas intellectual resources, formulate a long-term plan for the next 5–10 years, comprehensively improve the skills of workers in stock, and increase the scale of high-level talents in increment. In order to increase the quality dividend of human resources, we should upgrade the level of public services. Taking Dongguan as the “capital of skilled talents”, we should focus on building a large army of knowledge-based, skilled and innovative workers, increase the introduction of Guangdong, Hong Kong, Macao and international advanced evaluation standards system, and break down the obstacles of international talent introduction. At the same time, relying on the advantages of Neutron Science City, Songshan Lake, Binhai Bay New Area as well as industrial matching and cluster effect, high-level talents and innovative research teams are introduced to build high-level talent plateau in key areas, form a dislocation development pattern with Guangzhou, Shenzhen and other cities, and join hands in the talent competition of world-class urban agglomerations. In the context of the construction of Guangdong, Hong Kong, Macao and the Great Bay Area, Hong Kong, Shenzhen and Dongguan have formed good industrial cooperation relations. In the future, we should plan to strengthen the transformation function of scientific and technological innovation achievements under the global coordinate system. How to realize the flow of scientific and technological innovation resources between cities in Guangdong, Hong Kong and Macau? Hong Kong has a developed financial system and educational resources, Guangzhou has a number of well-known institutions of higher learning, scientific research institutes, Shenzhen has the forefront of innovative resources, Dongguan has a complete industrial support. “Guangdong, Hong Kong and Macao will jointly construct a new mode of Industry-UniversityResearch cooperation, vigorously promote the common development of high-tech and innovative industries, and form a network of inter-regional industrial division and cooperation, which will help to build a technological industry innovation center with global competitiveness as soon as possible and seize the commanding heights of international competition.

3 Main Influencing Factors of China’s Manufacturing Upgrading 3.1

Supply of Capital Elements of Senior Talent

Senior talent production elements and advanced human capital have a significant driving effect on the economic growth of a country. According to minssell’s theory, the addition of human capital can improve the marginal productivity of material capital, thus further improving the production efficiency of the production process. The advanced human capital that can play a role in the upgrading of a national industry is mainly embodied in the specialized human capital and entrepreneur human capital that the country possesses (Fig. 3).

Research on Manufacturing Industry Transition

1975

Fig. 3. Enterprise innovation ability

3.2

Technical Ability

Technical ability refers to the collection of technology and knowledge. The technical capacity required for enterprise upgrading could be an endogenous capability, that is, the ability of an organization to increase its technology through its own accumulation, or an exogenous capacity, that is, the spillover effect of foreign investment and the technical capacity gained from the GVC relationship. The key factor of industrial upgrading in our country lies in improving the ability of absorbing and digesting technology. 3.3

Development of Productive Service Industry

Producer service industry is a process industry that promotes the growth of other sectors of the national economy. It is the glue of economy and the main driving force for stimulating commodity production. After the reform and opening up, our government has made major adjustments to the past industrialization strategy, and put forward the development strategy of focusing on the market, demand orientation, and steadily developing the light industry, to promote the coordinated development of heavy industry and light industry. The C-H index defined by Chinese scholar Huang Zhicong and Pan Junnan is an indicator of the degree of change in the structure of the manufacturing industry. The mathematical expression is: C-H = total output value of capital products/total output value of consumer products. The higher the C-H value, the faster the manufacturing sector is moving to the heavy industry, and vice versa, the faster to the light industry. Taking into account the availability of data, this paper uses the gross output value of heavy industry instead of the total output value of capital products, with light industrial output value instead of total output value of consumer goods (Table 1).

1976

Y. Liu and J. Ma Table 1. C-H value and service industry growth value (208–215)

Countrywide

Total output value Gross output value of light industry of heavy industry 2008 22034 23455 2009 26897 29077 2010 32344 33976 2011 37489 39567 2012 41368 42894 2013 45286 47889 2014 51356 55457 2015 76893 79567 2016 99789 104562 Data sources: China Economic Statistics Yearbook 2016

C-H value 1.034556 1.047863 1.113456 1.153936 1.193456 1.289789 1.345768 1.645785 1.876590

Growth value of service industry 7.7 5.3 9.2 9.4 8.6 8 8 9.9 11.8

As can be seen from the table above, China’s service industry and manufacturing industry interact, influence each other and develop together. The growth of service industry plays an important role in upgrading the industrial structure of manufacturing industry. The coordinated development of service industry and manufacturing industry is an important guarantee to enhance the competitiveness of the manufacturing market and to promote the upgrading of its industrial structure. At present, the development of most producer service enterprises in China is still relatively backward compared with developed countries, and is in a period of rapid development. Due to the constraints of resources, environment and other factors, it is not possible to follow the old path of traditional industrial structure upgrade mode, namely, the living manufacturing industry is disconnected from the service industry. 3.4

Export Trade

As the process of production socialization has accelerated, the links between the world’s economies have become ever closer. The change of industrial structure in a country is increasingly influenced by the structure of foreign trade. In today’s economic globalization, the impact of export demand and import supply on the industrial structure adjustment of China’s manufacturing industry has been fully reflected. The adjustment of import structure has caused the adjustment of the production structure of our country’s manufacturing industry. For example, in 2008 the proportion of the textile industry in China’s manufacturing industry is up to 11.98%, but in 2014 the proportion of communication equipment, computer and other electronic equipment in manufacturing output is highest, up to 22.6%, and the proportion of the textile industry is down to 4%. The influence of import supply on industrial structure adjustment is mainly manifested in the accumulation of capital and technical elements brought by import. Generally speaking, imported products can be divided into capital products, intermediate products and consumer products according to their final use. The main characteristics of developing countries are insufficient capital products at home, so it is of great significance to develop capital products for capital accumulation and industrial restructuring in developing countries.

Research on Manufacturing Industry Transition

1977

4 Construction of Global Value Chain Upgrading Model for Chinese Manufacturing Enterprises 4.1

Selection of Variables

In order to improve the revealing ability of the calculation model, this paper increases the sample size. The panel data of 8 years are selected from 30 provinces in China. The sample size is 249. Variable declaration: The explanatory variable of the model is the manufacturing upgrading, and the per capita tax is used to express the development of the manufacturing industry. The qualitative changes represented by the variables of technological innovation are: (1) the amount of patent applications (Isper); (2) R & D expenditure (zl); (3) the proportion of local financial appropriation to the total local finance (bk). Based on the previous experience, this paper takes the degree of dependence on foreign trade (wm) and the degree of marketization (gz) as the institutional innovation variables. SPSS is used for descriptive statistical analysis of the above variables, the structure is as follows (Table 2): Table 2. Descriptive statistics analysis results of each variable Variable Isper zl yf bk wm gz

4.2

Obs Mean Std.Dev. 245 176.55 303.26 230 459.23 1810.24 247 63.24 86.10 247 1.60 0.94 247 0.17 0.22 247 0.55678 0.136787

Min Max 2.4 1754.0 1.0 20887.0 0.2 504.4 0.3 5.5 0 1.0 0 0.9

Correlation Analysis of Single Variables

Through coefficient matrix shown in Table 3, it can be found that the variables are positively correlated. That is to say, the development of China’s manufacturing industry has a correlation relationship in the same direction respectively with the amount of patent applications, R&D expenditure, local finance and technology funding accounted for the percentage of total local financial expenditure, foreign trade dependence, local non-state fixed assets accounted for the proportion of local total fixed assets investment, and the level of confidence is significant at 10%.

1978

Y. Liu and J. Ma Table 3. Correlation coefficient matrix of single variables Isper Isper Isper Isper Isper Isper Isper 1 zl 0.6487* 1 yf 0.6849* 0.5453* 1 bk 0.7425* 0.4023* 0.7238* 1 wm 0.7892* 0.5236* 0.6549* 0.7924* gz 0.4332* 0.2357* 0.5308* 0.4237* 0.4325* 1 Note: SPSS1.0 is used for calculation

4.3

Model Setting

This paper adopts panel data regression analysis to set the model as: yit ¼ ai þ Xit b þ eit; i ¼ 1; :. . .; N; t ¼ 1; :. . .; T Per capita industrial profit is expressed as yit , which is defined as The ratio of the local industrial profits tax in the t-th year of the i-th province to the local population of this province; Xit is a self variable vector, which represents the technological innovation and institutional innovation factors that affect the per capita tax. eit is a random error. The intercept ai indicates the influence of the individual, i.e. the variables that reflect the individual differences that are ignored in the model. In this paper, based on panel data, this paper adopts the bidirectional fixed effect model of province and year, which has the following advantages. First of all, there may be non-observable heterogeneity factors of different historical backgrounds or natural geographical conditions between different provinces and regions. These heterogeneity factors, once associated with the error term and the independent variable vector, will result in errors of regression results. The model will show endogenous problems caused by default variables. And these heterogeneity are all reduced by the order difference in the fixed effect model, which makes the regression results of this paper more robust. Secondly, based on the Chinese provincial fixed effect of panel data, the analysis can effectively expand the sample size, thus satisfying the gradual nature of large samples in statistics. 4.4

Result Analysis

The fitting results obtained by SPSS1.0 are shown in Table 4: Model fitting results show that the amount of patent applications, R&D expenditure, local finance and technology funding accounted for the percentage of total local financial expenditure, foreign trade dependence, local non-state fixed assets accounted for the proportion of local total fixed assets investment all have positive correlation relationships with development of manufacturing industry. But no matter in which model the number of patent applications, research and development expenditures, the estimated coefficient of foreign trade dependence are positive. The proportion of local science and technology appropriation to local fiscal expenditure is not significant in all

Research on Manufacturing Industry Transition

1979

Table 4. Model regression results Explanatory variables

Isper zl bk

Fixed effect model 0.013 (2.13)** 1.338 (7.64)*** 8.792 (0.45)

Stochastic effect model

Observation Number of provice R-squared

74.487 (2.30)** 228 29 0.40

Stochastic effect model

876.984 (7.26)*** 242.784 (2.74)*** −113.555 (2.37)** 245 30 0.28

945.336 (9.45)*** 934.356 (2.45)*** −108.508 (1.95)* 245 30

0.013 (1.98)** 1.348 (7.75)*** 27.375 (1.53)

wm Proportion of non-fixed assets investment Constant

Fixed effect model

35.163 (0.76) 228 29

equations. This can be explained by the fact that the impact of technology inputs on the economy is not “immediate” and there will be a time lag and a cumulative effect. In other words, the development of the manufacturing industry will not be immediately apparent to the development of the research funding, which will be seen in the years to come. There is also the possibility that our funding for science and technology is not fully invested in research and development, and there is room for improvement in the current technology funding system.

5 Conclusion SOM oriented service innovation of manufacturing enterprises can enhance the market competitiveness of physical products and avoid vicious price competition due to homogenization of products. As China’s manufacturing industry is relatively weak in the front and back of the value chain, as the carrier of physical products, more services will be a competitive strategy for the future development of the manufacturing enterprises. The priority of service in the many competitive indexes of the manufacturing enterprise will become more and more Guangzhou Wanbao Group Co., Ltd. Guangzhouhigh. Through service innovation, the manufacturing enterprise will extend the simple manufacturing business on the value chain, enrich the value creation, streamline the business process and eventually become the solid backing of the front service. At present, China’s manufacturing industry is facing the simultaneous development of industrialization and service. Transformation and upgrading become the core problem that China’s manufacturing industry urgently needs to solve. The manufacturing enterprises should not only strengthen the technological innovation with the core

1980

Y. Liu and J. Ma

of the physical products and the value creation as the core of the service innovation, but also consider the system innovation and management innovation, which aims to adapt to the development trend of the global industrial division of labor, and promote the transformation of manufacturing enterprises from “manufacturing manufacturing” to “service oriented manufacturing”. At the same time, enterprises should consider the inherent factors such as the technical level of the physical products, the management of the enterprises and the ability to create the network. Acknowledgement. Supported by 13th Five-Year Plan of Philosophy and Social Sciences of Guangdong Province: Research on Innovation Model of Service-oriented Manufacturing Industry in Guangdong-Hong Kong-Macao Greater Bay Area in 2017 (No. GD17XTQ01).

References 1. Bian, H.: Empirical research on global value chain and industrial structure upgrading of Shanghai Putuo district. In: Building Resilient Cities in China: The Nexus Between Planning and Science, pp. 1–5. Springer (2015) 2. Chuan-Heng, L.: Global value chain expansion and regional tourism upgrading: an empirical study of cruise industry. J. Shandong Univ. (2007) 3. Han, M.H., Chen, R.D.: A Research on influencing factors of global value chain upgrading of chinese small and medium manufacturing enterprises-an empirical analysis based on Zhejiang Province, East China Economic Management (2014). University N 4. Bach, S., Beznoska, M., Steiner, V.: An integrated micro data base for tax analysis in Germany (No. 86), Data Documentation, DIW (2016) 5. Bélanger, A., Carrière, Y., Sabourin, P.: Understanding employment participation of older workers: the canadian perspective. Can. Publ. Policy 42(1), 94–109 (2016) 6. Jia, Z.: Cross-border E-commerce personalized filtering recommendation model based on particle-level compression awareness, Boletín Técnico, 55(7) (2017). ISSN: 0376-723X 7. Miao, M., Jayakar, K.: Mobile payments in Japan, South Korea and China: cross-border convergence or divergence of business models? Telecommun. Policy 40(2), 182–196 (2016) 8. Tsaur, R.C., Chen, C.H.: Strategies for cross-border travel supply chains: gaming chinese group tours to Taiwan. Tourism Manag. 64, 154–169 (2018) 9. Wang, Y., Yu, L., Xie, H., Lei, T., Guo, Z., Qi, M., Lv, G., Fan, Y., Niu, Y.: Line detection algorithm based on adaptive gradient threshold and weighted mean shift. Multimedia Tools Appl. 75(23), 16665–16682 (2016) 10. Doménech, R., García, J.R., Ulloa, C.: The effects of wage flexibility on activity and employment in the Spanish economy, WP, 16, p. 17 (2016) 11. Farmer, S.A., Shalowitz, J., George, M., McStay, F., Patel, K., Perrin, J., Moghtaderi, A., McClellan, M.: Fully capitated payment breakeven rate for a mid-size pediatric practice. Pediatrics 138(2), e20154367 (2016)

Promotion of Morrison’s Realistic Novels Based on Information Technology and Artificial Intelligence Li Mei(&) and Wang Ying Nanchang Institute of Technology, Nanchang 330099, Jiangxi, China [email protected]

Abstract. Virtual reality is based on computer technology, combined with relevant science and technology, to generate a digital environment that is highly similar to a certain range of real environment in terms of sight, hearing and touch. Users interact with objects in the digital environment with the necessary equipment and interact with each other. Virtual reality technology can provide more comprehensive and effective research conditions and solutions for existing or potential problems in the real world. In Morrison’s works, Magic Realism is carried forward, which adds infinite charm to his works. Morrison reappears the heavy history and gloomy picture of black people’s life for readers, and profoundly reveals the evil of racial discrimination and its trauma to black people. In addition, Morrison is brave enough to face the tragic history of the black people and combine the real world with the nihilistic fantasy. Keywords: Virtual reality Promotion model

 Information technology  Artificial intelligence 

1 Introduction Toni Morrison is a well-known contemporary African-American woman writer and professor at Princeton University. Her representative works are Black Baby, Song of Solomon, Bluest Eyes and Black Book. She won the Nobel Prize for Literature in 1993. “Beloved” won a great reputation in literary circles when it was published in 1987. Most people regard it as Morrison’s representative work. Morrison also won the Pulitzer Prize for Literature in that year. In this work, magic realism is used thoroughly and vividly. Magic realism, a literary phenomenon, refers to a writing technique that integrates the description of realism with the fantastic fantasy, combines futurism, draws a large number of creative materials from myths, language legends and deeply reflects the reality of society. It originated in Latin America with strong beliefs in mythology and legend. Influenced by its simple customs and geo-civilization, it emerged with the tide of literary and artistic thoughts in the 20th century. In magic realism fiction, the protagonist can often fly eaves and walk the wall, tread the snow without trace, have superpowers and have unpredictable strange behavior, and often use symbolic and exaggerated means to describe in his works. Under the author’s brush, Beloved perfectly embodies the magic color in Morrison’s novel. Here, this © Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1981–1989, 2020. https://doi.org/10.1007/978-3-030-25128-4_260

1982

L. Mei and W. Ying

paper takes this novel as an example to discuss the characteristics of magic realism in Morrison’s novel from three aspects: the creation of magical characters, exaggeration, mysterious techniques and the use of mythological stories. As a new type of science and technology, virtual reality technology is the intersection and penetration of many disciplines. It is a new cross-disciplinary research field integrating materials science, computer graphics, mathematical analysis, mechanical mechanics, and sensory. Virtual reality scenes based on virtual reality will play an increasingly important role in sports training, competition, rehabilitation and other aspects of game environment simulation. Virtual reality is based on computer technology, combined with relevant science and technology, to generate a digital environment that is highly similar to a certain range of real environment in terms of sight, hearing and touch. Users interact with objects in the digital environment with the necessary equipment and interact with each other. Influence can produce feelings and experiences in the real environment. This feature is evident in China’s sports TV programs. However, if any medium develops excessively, it will put pressure on the external environment. This kind of pressure will turn to the inside and promote the reversal of the original hot and cold properties. Although the number of sports news broadcasts in early sports programs is small, there is no comprehensive sports commentary program, sports events are mostly broadcasted in video and broadcast, and there are problems such as unclear picture quality and single shooting angle, but the audience can watch the process with full concentration. Feel the fun of sports events and actively discuss and share the recognition with others. As the sports program warms up with the media, the resources of sports events are fully utilized (Fig. 1).

Fig. 1. The digital technology summary

Promotion of Morrison’s Realistic Novels

1983

2 The Proposed Methodology 2.1

Artificial Intelligence Technology

Artificial intelligence is widely used in the study of virtual reality, games and bionic robots with virtual characters. Virtual roles have autonomous behavior patterns that interact with users. When a virtual character makes decisions and actions in a way that is close to intelligent life, the user can truly feel the realism and intelligence of the virtual character. Therefore, the behavioral decision-making ability of virtual characters has become a research hotspot of virtual reality technology. The concept of virtual reality originated in the 1960s. Its core is to use computer technology and other modern technologies to model specific objects in the real world and to create virtual objects and virtual characters and virtual characters in the form of computer virtual or mechanical models. Users interact with each other to form an environment with interactivity and fictitious characteristics in a specific spatial region. The emergence of virtual reality makes users not subject to time and space constraints. It models and displays objects that exist objectively or fictitiously in reality, so that people can simulate and observe some realities that have already occurred in reality. It is possible to analyze problems such as the development of the virtual environment in a certain time in the future, and to provide a reference for the real world. Therefore, virtual reality technology can provide more comprehensive and effective research conditions and solutions for existing or potential problems in the real world. It is effective and intuitive in form, low in personnel investment, low in risk and high in profit, and quickly becomes the focus of scientific research and application (Fig. 2).

Fig. 2. The statistical data summary

The establishment of virtual character models often includes geometric model building, physical property design and behavior decision modules. A large number of solid objects in the virtual world, such as humans, animals and plants, buildings, etc.,

1984

L. Mei and W. Ying

not only have complex geometric forms, but also have autonomous behaviors, only when the virtual characters make decisions and actions in a way close to intelligent life, users really feel the realism and intelligence of the virtual character. Virtual reality technology is a technology that builds a virtual world to simulate reality. This technology enables users to observe or explore virtual objects in a virtual world in real time, across time and space constraints. In addition to the necessary related technical hardware devices, the construction of virtual scenes is often an extremely important part in the construction of virtual reality systems. The realism of virtual scenes will greatly affect the user’s experience in all aspects of virtual reality. Research on the sensory characteristics of humans shows that in the process of experiencing things, human visual senses often occupy a dominant position. Therefore, whether the virtual scene can provide users with an excellent visual experience determines whether the entire virtual reality system has realism. If the design of the scene is not detailed enough, the user will soon notice the falsehood of the scene and lose interest. However, if the scene design is too complicated, it will affect the real-time nature of the system to a large extent. The delay and the feeling of stagnation obviously affect other aspects of the interactive experience. These factors all increase the difficulty of interaction design, how to construct a real virtual scene, and at the same time ensure efficient real-time performance, which becomes one of the important research issues in the construction of virtual reality system. Texture mapping is an effective technique to enhance the realism of virtual scenes. It maps the image of the surface feature information of the model to the surface of the model and displays the specific features of the object. The multi-level detail technique is used to manage the display of the object model in the virtual scene, which is beneficial to Improve the efficiency of virtual scenes. The degree of freedom technology enables the virtual character to have an activity capability; the collision detection can determine whether a collision has occurred between the three-dimensional object models, between the model and the terrain scene, and at the same time give the position information of the collision. First, the points corresponding to each other in the texture pattern are determined, and the texture value of the corresponding point in the texture image is used as the display texture value of this point. Specifically expressed as: ðu; vÞ ¼ Fðx; y; zÞ

ð1Þ

Where (u, v) is the point coordinate of the pixel information in the texture image, and (x, y, z) is the point coordinate on the surface of the object. The parametric equation for the surface of a three-dimensional object is: Q ¼ Qðu; vÞ

ð2Þ

Qu and Qv are partial derivative vectors at any point on the surface of the object. Based on the cross product of the two vectors, the normal vector of this point on the surface of the three-dimensional object can be determined. n ¼ Qu  Qv

ð3Þ

Promotion of Morrison’s Realistic Novels

2.2

1985

Virtual Reality Technology

The application of virtual reality technology in sports programs is mainly based on the traditional TV program production method, and needs to be reworked according to the content of the program to enhance the program effect. At present, the application of virtual reality technology in sports programs has the following form. First, the virtual sports information display system. Sports programs are highly professional, especially in some popular programs that require a lot of sports commentary to make the audience feel the fun. The traditional interpretation of the game is mainly based on the mode of the host’s voice-over and subtitles, and the interpretation of some special rules and the ever-changing event data that are difficult to describe in language is not good. Combined with big data analysis technology, the virtual sports information display system can insert the event data, the rules of the game, and the surrounding information of the event into the program screen in the form of animation, image, text, etc., in conjunction with the host’s commentary, and improve the interpretation effect of the sports event. Second, the virtual advertising system. Sports advertising revenue is one of the important incomes of sports programs, so the virtual advertising system is the most widely used in sports programs. In the process of broadcasting professional sports leagues such as football and basketball, different TV broadcasting platforms can flexibly put virtual billboards in the event programs. At the same time, the virtual billboard is not affected by the picture quality, the weather of the event, the light, etc., and has better advertising effect than the real billboard on the spot. Third, virtual reality live. The combination of live sports events and virtual reality technology, on the one hand, gives the viewer an immersive experience. Not everyone can walk into the scene, and the use of virtual reality technology can replicate the feelings at the game site. On the other hand, it provides a 360-degree panoramic view of the movement, allowing viewers to choose from a variety of different perspectives to view the scene, capture the details of the scene, and even see the dynamics around the scene. Virtual reality technology for motion technology analysis Human-computer interaction research has a precondition that it is necessary to first obtain information about human motion. Motion capture, as an important factor in the interaction of information between humans and virtual environments, is an important area of V R technology development in recent years. Motion capture technology is a low-level motion control technology. It mainly uses sensors to record real human motion in three dimensions, and then the computer drives the virtual person on the screen based on the recorded data. The biggest advantage of this method is that it can capture the data of human real motion. Since the generated motion is basically a replica of the subject’s motion, the effect is very realistic and can generate many complicated motions. There are three main types of motion capture devices: optical devices, electromagnetic devices, and mechanical devices. Motion capture includes planning, raw data acquisition, tracking, identification, skeletal transformation, and mapping of virtual characters. Motion capture data processing methods include motion signal processing, offset mapping, motion mixing, motion texture, and motion graphics.

1986

L. Mei and W. Ying

3 Magic Character Moulding The content of the novel is not complicated. The story takes Negro Seth and her baby daughter’s darling as the core characters. It tells the story of the pregnant Negro Seth escaping from Kentucky Manor to Cincinnati, Ohio, by herself, only to find out the news of slavery. With the abolition of slavery, her beloved son, who was murdered by her own hands, came back from the dead to live in the same room with her daughter, Denver, and her lover, Paul. Beloved constantly punished her mother’s behavior with her own appearance, not only constantly seeking for the missing mother’s love, but also entangled Paul and seduced her, in order to disrupt and destroy her mother’s diluted and better life. One of the obvious features of magic realism fiction is to shape the magic of characters, and the novel Beloved is no exception. The characters in Morrison’s novels are not only true and credible, but also unreasonable and incomprehensible, which gives readers excellent magical feelings. Among them, the novel’s opening description of the terrible tranquility in No. 124 courtyard and the plot of Duff’s birth perfectly reflects the way in which the characters are portrayed. First of all, the opening description of No. 124 Hospital tells the readers about the current situation of the protagonist Seth. This narrative implies a terrible and oppressive atmosphere, which lays the foundation for the mystery of later characters. “No. 124 is full of malice. It’s full of the venom of a baby.” This opens with the reader thinking: Who is the so-called baby? What does the so-called resentment mean? How can an ordinary baby be said to be resentful? Morrison’s descriptive technique lasted until the arrival of the novel character Paul. Before Seth’s lover Paul arrived, although the author did not directly describe his beloved, the magic of the characters in the strange and magical atmosphere of the house has made the readers see at a glance. In the novel, the scar in the shape of a cherry tree on Ricci’s back is actually a symbol of slavery. This kind of characterization, which seems to have

Fig. 3. Toni Morrison’s beloved

Promotion of Morrison’s Realistic Novels

1987

superhuman and supernatural magical characteristics, embodies the unique attributes of the characters, gives the novel a mysterious atmosphere, and embodies the unique creative characteristics of magical realism (Fig. 3). Secondly, readers who have read the novel are generally impressed by Morrison’s description of the death of his beloved. From the perspective of the emotional state of the characters, Dave, Seth’s daughter, is still a naive and positive character. This feature, together with Morrison’s narrative of her birth jump, can be said to add a trace of vitality and vitality to the dark atmosphere of the novel. When Beloved was sleepy playing with Denver, curious Denver asked Seth how she was born on the boat. After agreeing to her pet’s request, Denver began to tell her birth from her personal perspective and what she saw and heard. The narrator then describes to the audience the midwifery of a white girl at Seth’s birth. The combination of these two narrative leaps will interpret the same event from different angles, and piece together fragments and intermittent fragments into a whole story. Morrison’s deep narrative ability is amazing.

4 Exaggeration and Mystery In Morrison’s works, exaggeration and mystery are often used to strengthen narrative skills. Especially, the use of exaggeration and mystery is supernatural. The connotation embodied in the novel’s style is expressed in three parts, which becomes a unique style with Morrison’s personal imprint. Exaggeration, but in order to achieve the effect of the characteristics of the author’s mind, artificially expand or narrow certain aspects of things. In Beloved, Paul laughs at other people’s “dull smoke” when he catches fish, and later describes Paul as a knowledgeable and knowledgeable person. “Like him, they lie in a cave and compete with owls for food: like him, they steal pig food; like him, they sleep in trees during the day and travel at night” all uses exaggerated techniques to reflect Paul’s personal experience. At the same time, despite Paul’s case, he still can not understand the heart of his beloved, in order to show the complexity and unpredictability of the image of beloved, which makes the plot more tense and expressive, and strengthens the narrative effect. In addition, mystery is also an important artistic feature of magic realism novels. In fact, the most important style and skill of magic realism is to combine the hero’s fantasy, which is both fantastic and absurd, with the things around him that can not be understood by conventional thinking, and turn the products of various realities into magical images. Morrison skillfully uses mysterious narrative techniques, which are not mysterious, but to attract readers and pave the way for the following text. It is easy to find that in Beloved, most of the protagonists’ actions seem to be mysterious, such as Beloved’s return from the dead, Paul’s extraordinary ability to survive, and so on. The opacity of character and the ambiguity of plot greatly increase the scope of doubts in people’s minds, make the plot both mysterious and untrue, and increase the magic color of the novel. Magic realism originates from Latin American mythological stories. Naturally, it can not be written without mythological stories. Beloved uses a large number of mythological archetypes, which has a very important relationship with the author Morrison’s own family growth environment. Born into a typical black family with strong traditional culture, Morrison’s mother, a white domestic servant, has been

1988

L. Mei and W. Ying

influenced by her parents since childhood. She has heard many myths and legends. At the same time, under the influence of the Bible, these stories have been presented imperceptibly in Morrison’s works. From the perspective of the whole story structure, Morrison undoubtedly draws on the traditional African mythological stories from the perspective of fate as a beloved. When the master came to arrest the escaped Seth aggressively, she desperately killed her beloved son, so that she escaped the fate of black Americans under slavery, and then her soul was reincarnated and returned to Seth, which is consistent with African mythology.

5 Conclusion To sum up, in Morrison’s works, Magic Realism is carried forward, which adds infinite charm to his works. Morrison reappears the heavy history and gloomy life picture of black people for readers, profoundly reveals the evil of racial discrimination and its mental trauma to black people, making Beloved an immortal masterpiece in the history of black literature. In addition, Morrison bravely faced up to the tragic history of the black people. Through the combination of the real world and the nihilistic fantasy, Morrison depicted the strange world in the black people’s hearts, opened up a new continent for preserving the unique values and beliefs of the black people and traditional culture, and was a rare master in the literary world. Acknowledgement. This paper is a phased achievement of the humanities subject WGW 17206 of Jiangxi Province’s universities in 2017, “Study of Magic Realism in Toni Morrison’s Novels”.

References 1. Jain, V., Sangaiah, A.K., Sakhuja, S., Thoduka, N., Aggarwal, R.: Supplier selection using fuzzy AHP and TOPSIS: a case study in the Indian automotive industry. Neural Comput. Appl. 29(7), 555–564 (2018) 2. DeBoer, M.D., Cherñavvsky, D.R., Topchyan, K., Kovatchev, B.P., Francis, G.L., Breton, M.D.: Heart rate informed artificial pancreas system enhances glycemic control during exercise in adolescents with T1D. Pediatr. Diabetes 18(7), 540–546 (2017) 3. Choi, C., Esposito, C., Wang, H., Liu, Z., Choi, J.: Intelligent power equipment management based on distributed context-aware inference in smart cities. IEEE Commun. Mag. 56(7), 212–217 (2018) 4. Rogers, J.D., Sanders, P., Piorkowski, C., Sohail, M.R., Anand, R., Crossen, K., Khairallah, F.S., Kaplon, R.E., Stromberg, K., Kowal, R.C.: In-office insertion of a miniaturized insertable cardiac monitor: results from the Reveal LINQ In-Office 2 randomized study. Heart Rhythm 14(2), 218–224 (2017) 5. Mansouri, I., Gholampour, A., Kisi, O., Ozbakkaloglu, T.: Evaluation of peak and residual conditions of actively confined concrete using neuro-fuzzy and neural computing techniques. Neural Comput. Appl. 29(3), 873–888 (2018) 6. Liu, F., Liu, Y., Liu, Y., Wang, H.: A novel construction paradigm of multimedia awareness system for mobile network. Clust. Comput. 1–17 (2017)

Promotion of Morrison’s Realistic Novels

1989

7. Sarstedt, M., Ringle, C.M., Smith, D., Reams, R., Hair, J.F.: Partial least squares structural equation modeling (PLS-SEM): a useful tool for family business researchers. J. Fam. Bus. Strategy 5(1), 105–115 (2014) 8. Wang, C., Tang, T.: Recursive least squares estimation algorithm applied to a class of linearin-parameters output error moving average systems. Appl. Math. Lett. 29, 36–41 (2014) 9. Muse, A.R., Lamson, A.L., Didericksen, K.W., et al.: A systematic review of evaluation research in integrated behavioral health care: operational and financial characteristics. Fam. Syst. Health. J. Collab. Fam. Healthc. 35(2), 136 (2017)

Construction and Empirical Research on the Competency Model of Rural E-commerce Innovation and Entrepreneurship Wen Yan(&), Chengjun Zou, Min Li, Lin Chen, and Yu Ye Chengdu Agricultural College, Chengdu, Sichuan, China [email protected]

Abstract. Based on the competency theory, the competency table of rural ecommerce entrepreneurship is designed on the basis of literature research and interviews. Fifty pre-test questionnaires were distributed to rural e-commerce entrepreneurs, and the scale was revised through reliability, validity and exploratory factor analysis. Through exploratory factor analysis and confirmatory factor analysis, the competency model of rural e-commerce entrepreneurship is constructed, which includes five dimensions: personal conduct, knowledge capital, thinking ability, psychological characteristics and executive ability. In order to provide reference and guidance for the training of rural ecommerce entrepreneurs and self-improvement of rural e-commerce entrepreneurs. Keywords: Rural e-commerce

 Competency model  Factor analysis

1 Introduction This research is based on the basic theory of competency, through empirical research, analysis and construction of rural e-commerce entrepreneurship competency model. In order to explore the special requirements of rural e-commerce entrepreneurship, entrepreneurs should have what kind of ability and quality. Firstly, we conduct in-depth research on relevant academic literature, and then through interviews with rural ecommerce entrepreneurs, determine the elements of competency characteristics. According to the literature research and interview data, the preliminary questionnaire of rural e-commerce entrepreneurship competency was established. By collecting a small number of sample questionnaires, the preliminary questionnaire was analyzed and revised. Finally, a formal questionnaire is determined, a large-scale survey is conducted, and then the questionnaire is collected for data analysis. Using SPSS19.0 statistical software, exploratory factor analysis is carried out on half of the sample data to extract the competency factors of rural e-commerce entrepreneurs. The other half of the sample data were analyzed by confirmatory factor analysis using AMOS 24.0 statistical software.

© Springer Nature Switzerland AG 2020 J. H. Abawajy et al. (Eds.): ATCI 2019, AISC 1017, pp. 1990–2002, 2020. https://doi.org/10.1007/978-3-030-25128-4_261

Construction and Empirical Research on the Competency Model

1.1

1991

Questionnaire Design

In order to improve the reliability and validity of the scale, the research scale published in top journals at home and abroad is selected as far as possible, and appropriate modifications are made according to the needs of the research. Referring to the above literature, this paper interviews 10 rural e-commerce entrepreneurs who have done well in a county by using the critical event interview method. According to the literature and interview data, a preliminary table of competency of rural e-commerce entrepreneurs with 24 entries has been compiled by our research group, as shown in Table 1. Table 1. Main items of rural e-commerce entrepreneurial competency forecast scale No. Project V1 Have leadership skills, focus on teamwork V2

Have good communication skills

V3

Organizational management ability

V4

Have good social skills and a network of relationships Resilience in the face of setbacks and blows

V5

No. Project V13 Customer pleading for analytical skills V14 Dare to take risks, dare to take risks V15 Opportunity identification and judgment V16 Internet thinking

V17 In-depth exploration and problem-solving skills V6 Confident in yourself and the future V18 With forward thinking and innovative consciousness V7 Open-minded, optimistic V19 Information seeking and selflearning ability V8 Resolute work, decisive decision V20 Service awareness V9 Individuals have accumulated a certain amount of V21 Have a strong sense of entrepreneurial funds and business experience responsibility V10 Have a certain cognitive ability to local V22 Good personal character agricultural products and services V11 Have certain e-commerce operation capabilities V23 Diligent and pragmatic V12 Network channel sales ability V24 Integrity for people

In order to make a direct judgment, the research group used the Likert 5-point scale to express the degree of recognition of the items, in which “5 means very consistent”, “4 means more consistent”, “3 means uncertain”, “2 means not very consistent”, “1 means very inconsistent”. 1.2

Questionnaire Pre-survey

In order to conduct a more scientific exploratory factor analysis, the questionnaire was tested in this study, and the number of samples recovered was 50 (N = 50). First, the sample data is analyzed for validity and reliability. Exploratory factor analysis was performed using SPSS19.0 statistical software to check the validity and reliability of

1992

W. Yan et al.

the data. The KMO value of the survey data is 0.897, which is greater than 0.7, which is suitable for factor analysis. The significance level of the Bartiett spherical test is 0.000, which is much less than 0.05. The results are very significant, indicating that the set of variables can be extracted as a common factor. The reliability test was tested using Cronbach’s Alpha, the Cronbach’s alpha coefficient, to observe the internal consistency of the questions in the questionnaire. Through the test, the alpha coefficient of the survey data is 0.893, which is greater than 0.8, indicating that the intrinsic reliability of the sample is ideal. In addition, the degree of commonality is the sum of variances of the load amount of each measurement variable on each common factor. From the degree of commonality, the relationship between the original measurement variable and the common factor can be judged [11]. In the survey data, except that the common degree of item V17 is less than 0.4, consider deleting it, the other items are more than 0.6, which meets the standard. Through testing and modifying the questionnaire, the formal Competency Scale of rural e-commerce entrepreneurship with 23 variables was finally formed.

2 Research and Analysis 2.1

Exploratory Factor Analysis

In this study, the exploratory factor analysis of half of the samples was carried out by SPSS 19.0 software [13]. Factor analysis mainly uses fewer and independent factors to reflect most of the information of the original variables. Firstly, KMO and Bartlett spherical test are used to test whether the sample data is suitable for factor analysis. The KMO value of the data is 0.818, greater than 0.7, which is suitable for factor analysis. The significance level of Bartlett spherical test is Sig. 0.000, much less than 0.05, and the results are very significant, which is suitable for factor analysis. Cronbach’s Alpha, i.e. Cronbach’s alpha coefficient is 0.828, and reliability coefficient is more than 0.8, which indicates that the number of samples meets the requirements of factor analysis. According to Lederer and Sethi’s research, the factor load value should be 0.35 as the most critical value of project selection [14]. The load of each item in this study data is greater than 0.7 (as shown in Table 2), so all items are retained. Table 2. Factor load table No. Project V1 V2

Have leadership skills, focus on teamwork Have good communication skills

V3

Organizational management ability

Factor load 0.815 0.73 0.757

No. Project

Factor load 0.83

V13 Customer pleading for analytical skills V14 Dare to take risks, dare 0.806 to take risks 0.796 V15 Opportunity identification and judgment (continued)

Construction and Empirical Research on the Competency Model

1993

Table 2. (continued) No. Project

No. Project

V4

V16 Internet thinking

V5

Factor load Have good social skills and a network 0.834 of relationships Resilience in the face of setbacks and 0.784 blows

V6

Confident in yourself and the future

0.771

V7 V8

Open-minded, optimistic Resolute work, decisive decision

0.808 0.837

Individuals have accumulated a certain amount of entrepreneurial funds and business experience V10 Have a certain cognitive ability to local agricultural products and services V11 Have certain e-commerce operation capabilities V12 Network channel sales ability

0.77

V9

V17 With forward thinking and innovative consciousness V18 Information seeking and self-learning ability V19 Service awareness V20 Have a strong sense of responsibility V21 Good personal character

Factor load 0.821 0.768

0.756 0.789 0.739 0.801

0.808

V22 Diligent and pragmatic 0.889

0.764

V23 Integrity for people

0.897

0.769

Through the principal component analysis of 23 items of the questionnaire, the factor whose eigenvalue is greater than 1 is extracted by the maximum variance orthogonal rotation method, and then orthogonal rotation is processed by the maximum variance method. The cumulative contribution rate of five common factors is 79.738% (e.g. Table 3). Five common factors (e.g. Table 4) are extracted from the software, which shows that these six common factors can better summarize the meaning of 23 competencies. After factor analysis, in order to further understand the validity and reliability, the reliability tests of the five common factors (e.g. Table 5) are also carried out. From Table 5, we can see that the reliability of the five common factors is above 0.9, reaching the ideal state. 2.2

Factor Naming

It can be seen from Table 4 that the first common factor covers five competencies: integrity, diligence, pragmatism, responsibility, good morality and service awareness. These competencies describe the factors of the individual moral quality of rural ecommerce entrepreneurs., we named F1 as a personal character. The second common factor covers five competencies: demand analysis ability, agricultural product cognition ability, personal capital and experience, network sales ability and e-commerce operation ability. These competencies are all necessary for rural e-commerce entrepreneurs. With the ability of knowledge and skill level, we named F2 as rural e-commerce

1994

W. Yan et al.

knowledge capital. The third common factor covering five competencies, namely the Internet thinking ahead, innovation, opportunity identification, risk-taking and the ability to learn and seek information, these competency describes the mindset of rural electricity providers entrepreneurs, we Name F3 as thinking ability. The fourth common factor covers four competencies: optimism, decisiveness, self-confidence and perseverance. These competencies describe the psychological aspects of rural ecommerce entrepreneurs, so we named F4 as a psychological trait. The last common factor covers four competencies: social, leadership, organization, and communication skills. These competencies reflect the ability of rural e-commerce entrepreneurs to actually act. We name F5 as executive ability. Table 3. Total variance of the analysis Ingredient Total Initial Ingredient Total Extract eigenvalue square sum loading Variance Variance % %

Ingredient

Total Rotation square sum loading Variance %

Ingredient

1.000 2.000 3.000 4.000 5.000

18.138 35 196 52.218 66.022 79.738

4.172 3.92 3.915 3.175 3.155

18.138 35.20 52.218 66.022 79.738

6.694 4.406 3.292 2.341 1.606

29.103 19.157 14.314 10.180 6.983

29.103 48.26 62.574 72.754 79.738

4.172 3.923 3.915 3.175 3.155

18.138 17.058 17.022 13.804 13.715

18.138 17.06 17.022 13.804 13.715

Table 4. Rotation component matrix No. Project V23 V22 V21 V19 V20 V13 V10 V9 V12 V11 V16 V14 V17 V15

Doing things for people, asking for honesty Diligent and pragmatic Good personal character Service awareness Have a strong sense of responsibility Customer pray for analytical skills Have a certain level of awareness of local agricultural products and services Individuals have accumulated a certain amount of venture capital and business experience Network channel sales ability Having a certain e-commerce operation capability Have internet thinking Dare to take risks, dare to take risks With advanced thinking and innovative ideas

Factor 1 2 3 0.915 0.907 0.858 0.857 0.825 0.891 0.872

4

5

0.864 0.848 0.814 0.901 0.893 0.874 0.865 (continued)

Construction and Empirical Research on the Competency Model

1995

Table 4. (continued) No. Project V18 V8 V7 V6 V5 V4 V1

V3 V2

Factor 1 2

Opportunity identification and judgment Information seeking and self-learning ability Resolute work, decisive decision Open-minded, optimistic Full of confidence in yourself and the future

3 4 5 0.851 0.865 0.854 0.825 0.820 0.901

Tough in the face of setbacks and blows Have good social skills and a network of relationships Organizational management ability Have good communication skills

0.887

0.857 0.829

Table 5. 5 common factor reliability test Common factor Fl F2 F3 F4 F5

2.3

Cronbach’s alpha Number of items 0.945 5 0.928 5 0.928 5 0.915 4 0.905 4

Confirmatory Factor Analysis

Five dimensions of rural e-commerce entrepreneurial competency model were constructed through exploratory factor analysis to test whether the fit of this model can meet the standard. In this study, the structural equation modeling software AMOS24.0 was used to verify the five-dimensional rural e-commerce entrepreneurial competency model constructed above through the confirmatory factor analysis method. This study selects the other half of the data sample for use in the structural equation model. The confirmatory factor analysis of the rural e-commerce entrepreneurship competency model is shown in Fig. 1. The fitting indicators of the rural e-commerce entrepreneurial competency model are shown in Table 6. It can be seen from the above fitting indicators that except for the GFI and NFI indicators, which are slightly lower than 0.9, the remaining indicators have reached the recommended value, which proves that the rural e-commerce entrepreneurial competency model fits well. According to the correlation coefficient of each dimension in Fig. 1, it is observed that the correlation coefficient between execution ability and psychological traits and thinking ability is the highest, which are 0.84 and 0.80 respectively. It reflects the potential effect of mental traits and thinking ability on executive ability. Execution ability can be promoted by improving the competency of the two dimensions of psychological traits and thinking ability.

1996

W. Yan et al. Table 6. Rural e-commerce entrepreneurship competency model fitness index Model x′/df CFI ACFI NFI IFI CFI RMSEA Recommended value 0.9 >0.8 >0.9 >0.9 >0.9 0.8 >0.9 >0.9 >0.9