2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020 9789811617263, 9811617260

This book covers cutting-edge and advanced research on data processing techniques and applications for cyber-physical sy

107 104 44MB

English Pages 1669 [1587] Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Foreword
Organization
Contents
Application of Big Data Technology in Enterprise Financial Management
1 The Connotation of Big Data and Its Application Background in Financial Management
2 The Impact of Big Data on Corporate Financial Management
3 Problems in Enterprise Financial Management Under the Background of Big Data
4 The Strategy of Financial Management Level in the Context of Big Data
References
Anomaly Detection Algorithm of Power Equipment Operating Environment Monitoring Images
1 Introduction
2 Technology Development Status Based on Image Abnormal Detection and Monitoring of Power Equipment
3 Analysis of Power Monitoring Image Abnormal Detection Algorithm
3.1 Person Identification
3.2 Cable Break Detection
4 Fire Detection
5 Conclusion
References
Application of Artificial Intelligence Technology in Electrical Automation Control
1 Introduction
2 Overview of AI Technology
3 The Advantages of AI Technology Applied to Electrical Engineering Automation
3.1 Convenient Operation and High Efficiency
3.2 Less Affected by External Factors
3.3 Improve the Automation Performance of Equipment
4 Application of AI Technology in Electrical Engineering Automation
4.1 Electrical Engineering Design Technology
4.2 Electrical Engineering Automation Control Technology
4.3 Fault Diagnosis Technology
4.4 Application in Power System
5 Conclusion
References
Research on the Boundary and Extension of Network Publishing in Network Culture
1 Introduction
2 Common Commercial Activities of Network Culture
2.1 Network Literature
2.2 Network Audio-Visual Services
2.3 Online Games
2.4 Online Advertising
2.5 Network News
2.6 Network Animation
2.7 Online Education
3 Common Commercial Activities of Online Publishing
3.1 Online Public Publishing
3.2 Online Academic Publishing
3.3 Online Education Publishing
4 Convergence of Network Commercial Activities
4.1 The Boundary Between Network Publishing and Other Network Commercial Activities
4.2 Boundary Extension of Network Publishing
5 Conclusion
References
Denoising 3D Metallic Deposits Seismic Data of Ashele Mining Camp by a Combined Domain Strategy
1 Introduction
2 Analysis on Data
2.1 Acquisition Geometry
2.2 Time and Frequency Analysis
2.3 Apparent Velocity Analysis
3 Denoising
3.1 Time–frequency Domain
3.2 Frequency-Wavenumber Domain
3.3 Time-Slowness Domain
3.4 Curvelet Domain
3.5 Denoising Results
4 Conclusions
References
Simulation Study on Layout Optimization of Urban Public Charging Infrastructure Based on Electric Vehicle Charging Demand
1 Introduction
2 Optimal Layout Calculation
2.1 Main Calculation Logic
2.2 Key Factors
2.3 Charging Demand Algorithm
3 Charging Demand Simulation
3.1 Road Network Information Simplification and Traffic Simulation
3.2 Data Sources and Sample Size
3.3 Scenario and Parameter Settings
3.4 Simulation Results and Conclusions
4 Construction Layout Design Optimization
4.1 Construction Proportion
4.2 Spatial Distribution
5 Conclusion
References
Research on Urban Spatial Structures in Enclave-Type Regions Based on Urban Gravity—Taking Jingyuan County as an Example
1 Introduction
2 Research Regions and Research Methods
2.1 Research Regions
2.2 Research Methods
2.3 Research Data
3 Research on Spatial Structures Based on Urban Gravity
3.1 Trend Characteristics of Urban Spatial Structures
3.2 The Organizational Characteristics of the Urban Spatial Structures
3.3 Interactive Characteristics of the Urban Spatial Structures
4 Conclusion
References
The Research on Personal Information Security Protection in Big Data Era
1 Introduction
2 Overview of AI
3 Internet Personal Information Security Issues in Big Data Era
3.1 Insufficient Information Security Literacy of Citizens
3.2 Lack of Personal Information Security Supervision
3.3 Irregular Use of Internet Data
3.4 The Network Platform Has Large Security Vulnerabilities
4 Measures of Personal Information Protection in Big Data Era
4.1 Research and Development of Supporting Increasing for Information Security and Privacy Protection Technology
4.2 Awareness Enhancing of Private Information Protection
4.3 Supervision and Management Attention of Big Data and Privacy Protection
4.4 Continuously Improve the Legal System
5 Conclusion
References
The Application of Computer Communication Technology and Electronic Information in Artificial Intelligence Field
1 Introduction
2 Overview of AI
2.1 Characteristics of AI
2.2 The Important Role of AI
3 The Characteristics of Computer Communication Technology and Electronic Information Technology
4 The Relationship Between AI and Electronic Information Technology
5 The Communication Technology and Electronic Information Application in AI
5.1 Computer Communication Technology and Electronic Information Application in AI Driving
5.2 The Computer Communication Technology and Electronic Information Technology Application in Network Intelligent Management
5.3 The Computer Communication Technology and Electronic Information Application in Network Intelligence Security
6 Conclusion
References
The Research on Optimization Strategy of Wuhan Tourism Transportation System Under the Background of Smart Tourism
1 Introduction
2 Overview of Smart Tourism
3 Problems of Tourism Transportation in Wuhan's Tourism Economy
3.1 The Function of Tourism Transportation Construction Project is Insufficient
3.2 Imbalance of Transportation Facilities Planning
3.3 Transportation Construction Lags Behind the Development of Tourism Economy
3.4 The Travel Safety and Service Quality of Tourism and Transportation Construction Need to Be Improved
4 Strategies to Optimize Wuhan's Tourism Transportation System
4.1 Ticket Booking System and Access Control System
4.2 Smart Parking Guidance Service for Parking Spaces
4.3 Automatic Charging Service
4.4 Traffic Information Collection System
4.5 Smart Transportation Requires Emergency and Safety Systems
4.6 Traffic Information Detection System
5 Conclusion
References
The Application of Computer Communication Technology in Electronic Information Engineering
1 Introduction
2 Basic Theory
2.1 The Concept of Computer Communication Technology
2.2 The Concept of EIE
3 The Connection Between Computer Communication Technology and EIE
4 The Application of Computer Communication Technology in EIE
4.1 Technical Equipment Development
4.2 The Computer Communication Technology Application in the Security of EIE
4.3 Realize Signal Processing
4.4 Computer Communication Technology Application via Wide Area Network
5 Conclusion
References
Numerical Study of Lateral Bearing Capacity of Conical Composite Pile Based on Data Analysis
1 Introduction
2 Methodology
2.1 Test Schemes
2.2 Properties of the Model
2.3 Computational Procedure
3 Simulated Results and Analysis
3.1 Load Displacement Curve
3.2 Displacement Comparison
4 Conclusion
References
Coupling Model of Adsorption Capacity-Temperature-Pressure and Its Prediction for Methane Adsorption on Coals
1 Introduction
2 Experiment Section
2.1 Coal Samples
2.2 Isothermal Adsorption Experiment
3 Results and Discussion
3.1 Adsorption Equilibrium Behaviors
3.2 Adsorption Characteristic Curve
3.3 Coupling Model of Adsorption Capacity-Temperature–Pressure
3.4 Application of Coupled Adsorption Model to Dark Lignite and Meta-anthracite
3.5 Prediction Method of Adsorption Capacity
4 Implications for CBM Exploration and Production
5 Conclusion
References
The Application and Development of Network Technology in College Physical Education
1 Introduction
2 Basic Concepts of the Internet
3 Features and Benefits of the Internet
3.1 Internet Information Exchange Is not Restricted by Space
3.2 Information Exchange Is Time-Domain, and the Update Speed Is Fast
3.3 The Use Cost of Information Exchange Low
4 The Network Technology Application in College Physical Education
4.1 The Micro-classes Application in Physical Education
4.2 The New Media Technology Application in Physical Education
4.3 Standard Technical Action Videos Are Introduced into Physical Education Teaching
4.4 The Video Recording Technology Application in Physical Education
4.5 The Artificial Intelligence Technology Application and Wearable Devices in Physical Education
5 Conclusion
References
The Practical Research on the Teaching Reform of College Sports Information in the “Internet+” Era
1 Introduction
2 The Basic Connotation of “Internet+”
3 The Positive Significance of Internet Information Technology to College Physical Education
3.1 Promoted the Expansion of College Physical Education Content
3.2 The Lack of Physical Education in Universities to a Certain Extent
4 The Status Quo of Physical Education in Chinese Universities
4.1 Lack of Information Teaching Awareness
4.2 The Proportion of Sports Information Teaching Is Low
4.3 Teachers Lack the Awareness of Applying Information Technology
4.4 Incomplete Information Teaching Infrastructure
5 The Reform of College Sports Information Teaching in the “Internet+” Era
5.1 Building an Information Network
5.2 Building an Informatization Evaluation System
5.3 The Internet Promotes Innovation in College Physical Education Teaching Methods
5.4 The Internet Helps Universities Establish a New Model of Physical Education
5.5 Information Literacy and Informatization Ability Improved
6 Conclusion
References
The Cultivation Research of Management Accounting Talents in Universities Under the Background of Artificial Intelligence
1 Introduction
2 Overview of AI
3 Changes in the Demand for Accounting Talents Under the Background of AI
3.1 The Decline in Demand for Talents in Basic Accounting Positions
3.2 Increasing Demand for Accounting Talents for New Positions
3.3 The Shortage of High-Level Management Accounting Talents
4 The Innovation of Accounting Talent Training Model Under the Background of AI
4.1 Update Educational Concepts and Cultivate Students’ International Vision
4.2 Improve the Quality of Professional Teachers
4.3 Improve the Curriculum System
4.4 Optimize Teaching Methods
4.5 Improve the Evaluation System
5 Conclusion
References
Design and Management of Students’ Homework of Advanced Mathematics Based on Online Teaching
1 Introduction
2 Research Background
3 Online Homework and Requirements
3.1 The Operability of Online Homework
3.2 General Requirements for Online Homework
3.3 Types of Online Homework
4 Homework Design and Management
4.1 Design and Management of Homework Before Class
4.2 Design and Management of Classroom Assignments (Classroom Exercises)
4.3 Design and Management of Homework After Class
4.4 Design and Management of Unit Work
5 Conclusion
References
The Application of Computer Information Technology in Environmental Analysis
1 Introduction
2 The Significance of Applying Computer Information Technology to Environmental Analysis
3 The Application of Computer Information Technology in Environmental Analysis
3.1 The Application of GIS Technology in Environmental Analysis
3.2 Realize the Technologicalization of the Environmental Quality Monitoring System
3.3 Realize the Automation of Environmental Analysis Communication and Evaluation
3.4 Realizing the Real-Time Transmission of Environmental Analysis Information
3.5 Realize the “Digitization” of Environmental Analysis Engineering
4 Conclusion
References
Evolution Characteristics of the Urban Spatial Pattern of Enclave-Type Regions Based on Data Analysis Technology
1 Introduction
2 Research Basis
2.1 Research Area
2.2 Research Methods
2.3 Research Data
3 Evolution of Urban Spatial Pattern
3.1 Evolution of Urban Quality Spatial Pattern
3.2 Evolution of Urban Population Spatial Pattern
3.3 Evolution of Urban Economy Spatial Pattern
4 Conclusion
References
The Application of Internet in the Educational Management of College Students
1 Introduction
2 The Status Quo of Education Management in Universities
2.1 The Concept is Relatively Backward
2.2 Educational Management Under the Traditional Model is Restricted
2.3 Insufficient Quality of Education Management Personnel
2.4 Simplification of Resource Acquisition Channels
3 The Connotation of College Education Management in the Internet Age
4 The Application of the Internet in the Education and College Students’ Management
4.1 Innovative Management Concepts
4.2 Innovative Management Model
4.3 Establish an “Internet+” Student Management Platform
4.4 Innovate Student Ideological and Political Education Model
4.5 Innovative Teacher-Student Relationship
5 Conclusion
References
The Research on Cultural Communication Path Based on Big Data Analysis Technology
1 Introduction
2 Large-Scale Audience for Online Cultural Communication
3 Characteristics of Internet Culture Communication
3.1 The Discrete Nature of the Communication Organization
3.2 Imbalance of the Target of Communication
3.3 Transformation of the Object
3.4 Commodity Is Greater Than Cultural
4 Big Data Methods and Cultural Communication Innovation
5 Cultural Communication Path Based on Big Data Analysis Technology
5.1 Change the Way of Thinking
5.2 Change Analysis Model
5.3 Change the Direction of Conclusion
5.4 Application of Traditional Paper Media
5.5 Emphasize the Power of Micro-communication Platforms
5.6 Target Audience Accurately
6 Conclusion
References
The Innovative Application of “Supply Chain + Agriculture” in Hunan Agriculture from the Internet Perspective
1 Introduction
2 Operation Status of Agricultural Product Supply Chain in Hunan Province
2.1 Operation Model of the Main Agricultural Product Supply Chain
2.2 Agricultural Supermarket Docking Mode
2.3 A Supply Chain Model Led by the Wholesale Market
3 The Significance of Internet Supply Chain to Agricultural Development
3.1 Promote Agricultural Restructuring and Reduce Agricultural Production Costs
3.2 Promote the Transformation from Traditional Agriculture to Knowledge-Based Agriculture
3.3 Promote the Development of Agriculture in the Direction of Ecological Agriculture and Sustainable Agriculture
4 The New Model of Hunan’s Agricultural Product Supply Chain Under “Internet+”
4.1 A New Model Led by Third-Party Logistics
4.2 A New Model Led by E-Commerce Platforms
5 Conclusion
References
Research on the Development of Modern African Legal Culture Based on Data Analysis
1 Introduction
2 African Customary Law and Its Characteristics
3 Data Analysis of the Development of African Legal Culture in Africa
3.1 Formally Expressed as “Oral African Law”
3.2 Spiritually Reflects the Special Values of Africans
3.3 The Connotation Is Mainly the Norms of Civil Law
3.4 The Prevailing Method of Divine Judgment in Litigation
4 Conclusion
References
Characteristics of Energy Consumption and Energy Saving Potentiality of Hotel Power System Based on Big Data of Electrical Power
1 Introduction
2 Method
2.1 Construction of Energy Consumption Standard for Economic Hotels
2.2 Energy Saving Potential of Economic Hotels
3 Experiment
3.1 Data Source
3.2 Characteristics of Energy Saving and Renovation Hotel
4 Discussion
4.1 Energy Saving Renovation Plan and Energy Saving Potential Analysis of Hotel Lighting
4.2 Analysis of Measures to Improve Energy Saving Rate
5 Conclusion
References
Artificial Intelligence Random Forest Algorithm and the Application
1 Analysis on Random Forest Algorithm
1.1 Classification Effect Index
1.2 Generalization Error
2 The Application of Artificial Intelligence Random Forest Algorithm
2.1 Support Vector Machines (SVM)
2.2 Algorithm Flow
2.3 Support Vector Machine Random Forest Algorithm
2.4 Experimental Results and Analysis
3 Conclusion
References
Optimization Path of Coal Equipment Management Based on Information System from the Perspective of Large Data Consumption
1 Introduction
2 Current Status of Construction and Operation of Coal Equipment Management Information System
3 Problems in the Design and Operation of the Current Equipment Management Information System
3.1 Failure to Truly Achieve the Goal of Integrated Financial and Equipment Management
3.2 The Friendliness and Convenience of the Operation Interface Design Are Not Well Considered
3.3 Difficult to Meet the Individualized Management Needs of Grassroots Departments
3.4 Inconsistent Data Standards Cause Difficulties in Connecting the Old and New Systems
3.5 The Fidelity of System Data Needs to Be Further Improved
3.6 Insufficient Development and Utilization of System Decision Support Functions
4 Optimize the Strategic Path of the Current Coal Equipment Management Information System
4.1 Make a Mid- and Long-Term Overall Plan for Continuous Improvement of Information Systems
4.2 Increase the Development and Application of Decision Support Systems
5 Conclusion
References
Power Marketing Inspection and Anti-stealing Power Based on the Clustering and Correlation Analysis
1 Introduction
2 Clustering and Correlation Analysis in Power Marketing Audit
3 Power Marketing Audit Method Based on Clustering and Correlation Analysis
3.1 Carry Out Data Source Model Design
3.2 Conduct Power Marketing Audit
4 Research on the Anti-stealing Operation
4.1 Anti-theft Operation Method
4.2 Countermeasures Against Electricity Theft
5 Conclusion
References
Testing Methods of Computer Software
1 An Overview of Software Testing
2 Testing Methods for Computer Software
2.1 Program Misclassification
2.2 Classification for Error Level
2.3 Tests for Black Box and White Box
3 Testing Procedures of Computer Software
3.1 Unit Testing
3.2 Integration Testing
3.3 System Testing
3.4 Acceptance Testing
4 Conclusion
References
Application of Data Processing Analysis in Microbial Identification of Fermented Food
1 Introduction
2 Application of Data Processing Analysis Method in Identification of Microorganisms in Fermented Food
2.1 The Overall Design of Identification Methods for Microorganisms in Fermented Food with Data Processing and Analysis
2.2 Measurement of Microbial Diversity in Fermented Foods
2.3 Screening of Microorganism in Fermented Food
2.4 Identification of Microorganisms in Fermented Foods
2.5 Analysis and Processing of Identification Results
3 Conclusion
References
Data Architecture of Monitoring Platform for Marketing Operation Under Smart Grid
1 The Framework Design of Monitoring Platform
2 Design of Monitoring System
2.1 Monitoring and Analysis Module
2.2 Scheduling and Plan Module
2.3 Data Collection Module
2.4 Fault Diagnosis Module
3 System Verification
4 Conclusion
References
Volatility Modeling of S&P500 Returns: A Comparative Study of GARCH Family Models and VIX
1 Introduction
2 Research Method
2.1 Models
2.2 Order Determination
2.3 Testing
2.4 Data
3 Results
3.1 S&P500 and VIX
3.2 Model Selection
3.3 Numerical Accuracy
3.4 Diagnostic Testing
3.5 Comparison Between GARCH and VIX
4 Conclusion and Limitations
References
Review on the Lightweight Materials for Robots in Coal Mine
1 Introduction
2 Lightweight Flameproof Shell Material for Coal Mine Robot
3 Lightweight Metal Structural Materials of Robots in the Coal Mine
4 Lightweight Transmission Materials of Robots in the Coal Mine
5 Conclusion
References
Optimization of Management and Control Strategy of Security Vulnerabilities in Power Monitoring System
1 Power Monitoring System
2 Management and Control Strategy of Security Vulnerability
2.1 Vulnerability Scanning
2.2 Verification and Confirmation
2.3 Security Rating
2.4 Vulnerability Elimination and Defect Elimination Retest
2.5 Registration and Warehousing
3 Conclusion
References
Application of Operations Research Models and Algorithms in Intelligent Logistics System Parks
1 Intelligent Logistics System Park
2 Relationship Between Logistics and Operations Research
2.1 Contents of Operations Research
2.2 Characteristics of Operational Research
2.3 Mathematical Model of Operations Research
2.4 Procedures Operational Research
3 The Application of Operations Research Models and Algorithms in Intelligent Logistics System Parks
3.1 Vehicle Routing and Its Model
3.2 Loading and Dynamic Planning
3.3 Work Sequencing Model of Circulation Processing
3.4 Inventory Optimization Model
4 Application Effect of Operational Research Model and Algorithm in Intelligent Logistics System Park
5 Conclusion
References
Software Proof Security Mechanism Based on Internet of Things Network Security
1 Introduction
2 Software Security Mechanisms in the IoT
2.1 IoT Network Security
2.2 Security Mechanism Algorithm
3 Design of the Experiment
3.1 Experimental Background
3.2 Experimental Design
4 The IoT and Software Prove Security Mechanisms
5 Conclusions
References
Research on the Competitiveness of Thailand Golf Tourism Industry Based on Big Data
1 Introduction
2 Research Method of Thailand Golf Tourism Competitiveness Analysis Based on Big Data
2.1 Big Data Technology
2.2 Analysis on the Competitiveness of Golf Tourism in Thailand
3 Experimental Correlation Analysis
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 Research Status of Thailand Golf Tourism Competitiveness Analysis Based on Big Data
4.2 Suggestions on Research and Development of Thailand Golf Tourism Competitiveness Analysis Based on Big Data
5 Conclusions
References
Simulation and Research of Multi-machine Automatic Stamping Production Unit Based on Robot
1 Introduction
2 Methods
2.1 Realization of Simulation Path Between Unit and Multiple Punch Production Units
2.2 Kinematics Analysis and Modal Analysis of Collaborative Production Unit Robot
3 Experiments
4 Results and Discussion
5 Conclusion
References
Application of Internet of Things Technology in Artificial Intelligence Image Detection System
1 Introduction
2 IOT and Image Detection
2.1 IOT Technology
2.2 AI Image Detection Systems
3 Design of the Experiment
3.1 Experimental Background
3.2 Experimental Design
4 IOT in Image Detection
4.1 Analysis of the Application of IOT Technology in AI Image Detection System
4.2 Suggestions on the Application of IOT Technology in AI Image Detection System
5 Conclusions
References
A Review of Computer Technology in TCM Transmission and the Teaching of TCM Translation
1 Introduction
2 Discussion of Research on TCM Transmission and the Cultivation of TCM Translation Talents Based on Computer Technology
2.1 The Application of Corpus
2.2 The Application of Internet and Network Platform
2.3 The Cultivation of TCM Translation Talents with Computer-Aided Translation
3 Conclusion
References
Intrusion Detection Technology of Internet of Vehicles Based on Deep Learning
1 Introduction
2 Research on Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning
2.1 Commonly Used Deep Learning Models
2.2 DBN Algorithm Basis
2.3 The General Architecture of Network Intrusion Detection the Main Component of the NIDS General Model
3 Experimental Research on Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning
3.1 Experimental Environment
3.2 Experimental Data Collection
4 Experimental Research and Analysis of Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning
4.1 Validity Verification
4.2 Experimental Analysis of Important Parameters
5 Conclusions
References
The Development of Financial Intelligence Driven by Financial Technology in the Background of Artificial Intelligence
1 Introduction
2 Intelligent Finance and the Application of Artificial Intelligence in China's Financial Field
2.1 Intelligent Finance
2.2 Application of Artificial Intelligence in China's Financial Field
3 Investigation and Analysis on the Development of Financial Intelligence Driven by Financial Technology
4 Discussion
4.1 Research and Analysis on Financial Technology
4.2 Advantages of Internet Finance
5 Conclusions
References
Analysis of Human Factors in Hazardous Chemical Storage Accidents Based on HFACS and Bow-Tie Model
1 Introduction
2 Human Factor Analysis Model of Hazardous Chemical Storage Accident
3 Case Study
3.1 Accident Description
3.2 HFACS Analysis
3.3 Bow-Tie Analysis
4 Conclusion
References
Research on the Control System of Intelligent Discrimination of Electricity Stealing and Omission
1 Introduction
2 Algorithm Establishment
2.1 Current Source of Stealing Power Based on Addition
2.2 Algorithm of Electricity Omission Control System
2.3 Digital Circuit System
2.4 Determination of the Number of BP Neural Network for Electric Theft Detection Algorithm
3 Modeling Method
3.1 Construction of Improved BP Neural Network Model
3.2 Actual Model Based on Comparative Equivalent Circuit
4 Evaluation Results and Research
4.1 The Relationship Between the Amount of Electricity Theft and Current
4.2 Electricity Theft Protection Measures Based on the Control System of Intelligent Discrimination of Electricity Stealing and Omission
5 Conclusion
References
Ancient Literature and Art Based on Big Data
1 Introduction
2 Big Data and Ancient Literature
2.1 Big Data
2.2 The Internal Relationship Between Big Data and Ancient Literature Research
3 Research Methods of Ancient Literature
4 Ancient Literature and Art
4.1 Analysis of the Artistic Characteristics of Ancient Chinese Literature
4.2 Ranking Analysis of Ancient Literature Research
4.3 Comparative Analysis of Painting, Calligraphy and Literature in Ancient Literature
5 Conclusions
References
Analyze Ming and Qing Literature Under Big Data Technology
1 Introduction
2 Big Data Technology Ming and Qing Literary Research Methods
2.1 Big Data Technology
2.2 Ming and Qing Literature
2.3 Little Reading Thinking
3 Big Data Technology Algorithm Improvement Experiment
4 Big Data Technology Research Ming and Qing Literary Analysis
4.1 Analysis of the Impact of Big Data Technology on the Development of Ming and Qing Literature
4.2 Analysis of the Advantages of Ming and Qing Literature Under Big Data Technology
4.3 Evaluation and Analysis of Big Data Technology
5 Conclusions
References
Training Strategy of China's New Industrial Workers Based on Big Data
1 Introduction
2 Training Strategy Design of China's New Industry Workers Team Based on Big Data
2.1 China's New Industrial Design Under Big Data
2.2 Training Strategy Design of New Industrial Workers in China
2.3 Research and Design of Training Strategy for Workers in New Industries
3 Experimental Research on the Training Strategy of China's New Industrial Workers Under Big Data
3.1 Experimental Study on the Cultivation of New Industrial Workers
3.2 Experimental Study on the Matching of Workers in New Industries
3.3 Experimental Research on the Training Strategy of New Industry Workers Under Big Data
4 Experimental Analysis on the Training Strategy of China's New Industrial Workers Based on Big Data
4.1 Experimental Analysis on Training Strategy of New Industry Workers
4.2 Experimental Analysis on the Training of New Industrial Workers in China
5 Conclusions
References
Development Trend of Enterprise Human Resource Management Driven by Big Data
1 Introduction
2 Development Design of Enterprise Human Resource Management Driven by Big Data
2.1 Enterprise Human Resource Management Development Design
2.2 Enterprise Human Resource Management Design Driven by Big Data
3 Experimental Research on the Development of Enterprise Human Resource Management Driven by Big Data
3.1 Experimental Research on Human Resource Management Development
3.2 Experimental Research on Human Resource Management Driven by Big Data
3.3 Experimental Research on the Development Mode of Human Resource Management
4 Experimental Analysis on the Development Trend of Enterprise Human Resource Management Driven by Big Data
4.1 Experimental Analysis of Enterprise Human Resource Management Driven by Big Data
4.2 Experimental Analysis on the Development of Enterprise Human Resource Management
5 Conclusions
References
Teaching Idea Reform and Regulation Innovation of Economic Law Course Based on Big Data Technology
1 Introduction
2 Teaching Idea Reform and Regulation Innovation of Economic Law Course Based on Big Data Technology
2.1 The Composition and Main Characteristics of the Concept of Economic Law
2.2 The Reform of Economic Law Concepts in the Era of Big Data
2.3 Reform of Teaching Ideas and Innovation of Regulations in the Course of Economic Law
2.4 Research on Decision Tree Algorithm
3 Experiments on the Reform of Teaching Ideas and Regulation Innovation of Economic Law Courses Based on Big Data Technology
3.1 Experimental Object Selection and Research Methods
3.2 The Purpose of Using the Online Teaching Platform Under Big Data
4 Discussion on Reform of Teaching Ideas and Regulation Innovation of Economic Law Course Based on Big Data Technology
5 Conclusion
References
Cake Customization System Based on Unity3d
1 Introduction
2 System Design
3 Development Process of Stand-Alone System
4 System Key Technologies
4.1 Gesture Operation
4.2 Dynamic Loading
5 Conclusion
References
Design and Inheritance of Iron Painting Intangible Cultural Heritage Based on Modern Information Technology
1 Introduction
2 Feature of Iron Painting Intangible Cultural Heritage Design Style
3 Iron Painting Design and Inheritance Method Based on Modern Information Technology
3.1 Digital Collection of Intangible Cultural Heritage Information
3.2 Storage and Display of Iron Painting Information Based on Database
3.3 Visual Design of Iron Painting Based on Virtual Reality Technology
4 Conclusion
References
Mobile Violation Detection Robot for Expressway Based on Machine Vision
1 Introduction
2 Machine Vision and Moving Object Detection Method
2.1 Machine Vision
2.2 Moving Target Detection Method
3 Experimental Design
4 Mobile Violation Detection Robot for Freeway Based on Machine Vision
4.1 General Design of Expressway Mobile Violation Detection Robot System Based on Machine Vision
4.2 Test Results Analysis of Mobile Violation Detection Robot Based on Machine Vision
5 Conclusions
References
Network Data Processing Based on Cloud Computing Platform
1 Introduction
2 Cloud Computing and Data Mining
2.1 Cloud Computing
2.2 Data Mining Based on Cloud Computing
3 Experimental Environment and Evaluation Index
4 Experimental Analysis of Network Data Processing Based on Cloud Computing Platform
4.1 Design of Clustering Algorithm for Network Data Processing Based on Cloud Computing Platform
4.2 Analysis of Experimental Results
5 Conclusions
References
Construction of Green Logistics Evaluation System for Agricultural Products Cold Chain Based on Data Analysis
1 Introduction
2 Green Logistics is the Link Between Green Production and Green Consumption
2.1 Evaluation Index Selection
2.2 Model Establishment
3 Establishment of Evaluation Index Model for Agricultural Cold Chain Green Logistics
4 Conclusion
References
A Study on Virtual Reality Technology for College Oral English Online Self-help Learning System
1 Introduction
2 Overall System Design Framework
3 Function Module Analysis of the System
4 Algorithm Design of Online Self-Help Learning Software for College Oral English
5 Analysis of Simulation Experiment
6 Conclusions
References
Construction of Motivation Analysis Model for College Students’ Online Information Query
1 Introduction
2 Big Data Modeling and Characteristic Analysis of College Students’ Online Information Query Motivation
2.1 Big Data Modeling of College Students’ Online Information Query Motivation
2.2 Feature Mining of Data
3 Prediction and Optimization of the Development Direction of College Students’ Online Information Query Motivation
3.1 Descriptive Statistical Feature Analysis
3.2 Segmentation Test and Prediction of the Development of College Students’ Online Information Query Motivation
4 Simulation Experiment and Result Analysis
5 Conclusions
References
Design of Parallel Power Supply System Controlled by DSP and MCU
1 Introduction
2 Design of Overall Scheme of the System
2.1 Design of Overall Structure of the System
2.2 Control Principle
3 Circuit Design
3.1 DC–DC Step-Down Chopper Main Circuit
3.2 Control Circuit
3.3 Driving Circuit
4 System Test and Result Analysis
5 Conclusion
References
Badminton Trajectory Tracking Based on D-H Kinematics Model
1 Introduction
2 Badminton Trajectory Detection and D-H Kinematic Array Structure Analysis
2.1 Badminton Movement Track Detection
2.2 Kinematics D-H Kinematics Parameter Fusion of Badminton Trajectory
3 Trajectory Feature Extraction and Kinematics Model Construction of Badminton
3.1 Badminton Trajectory Motion Feature Extraction
3.2 Analysis of Badminton Trajectory Tracking Model
4 Simulation Experiment Analysis
5 Conclusion
References
Fuzzy Evaluation Model for Oral English Test Based on Automatic Scoring System
1 Introduction
2 Design of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System
2.1 Voice Evaluation System Analysis and Main Function Design
2.2 Based on MFCC Feature Parameter Extraction
2.3 Automatic Prosodic Annotation Based on Co-training
3 Experimental Design of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System
3.1 Basic Settings of the Co-training Algorithm
3.2 Establishment of Voice Evaluation Model and Data Collection
3.3 Establish Fuzzy Relationship Matrix
4 Experimental Design Analysis of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System
4.1 Performance Analysis and Experimental Comparison of Voice Evaluation Algorithms
4.2 Functional Module Design Based on Co-training
5 Conclusions
References
Changes in the Operation Mode of Real Estate Investment Trusts in the Era of Big Data
1 Introduction
2 Big Data Technology and Real Estate Investment Trust
2.1 Changes and Characteristics of Big Data
2.2 Real Estate Investment Trusts
3 Challenge Analysis of Big Data Technology Application in REITs Operation Mode
4 Discussion
4.1 Comparison Between the Operation Mode of Big Data and the Traditional Operation Mode
4.2 Analysis of the Operation Mode of REITs
4.3 Path Choice of Developing REITs Operation Mode in China
5 Conclusions
References
Construction of Music Teaching Effect Evaluation Model Based on 5G Technology
1 Introduction
2 Method
2.1 5G Technology
2.2 Music Teaching
2.3 System Model and Problem Modeling
3 Experience
3.1 Subjects
3.2 Experimental Design
4 Discussion
4.1 Teachers’ Understanding of 5G Teaching
4.2 Analysis of Teachers’ Effect on 5G Teaching
4.3 Analysis on Whether Students have been Exposed to 5G Technology Music Education
4.4 Students’ Views on Using 5G Technology in Music Class
5 Conclusion
References
On the Demand for Financial Science and Technology Talents Under the Background of Big Data
1 Introduction
2 Contents and Characteristics of Big Data
2.1 The Data Capacity is Huge. Big Data Has an Amount of Data that is Currently Difficult to Directly Store, Manage and Use by Any Unit Device
2.2 High Speed. There is a One-Second Law for Fast Data Flow and Dynamic Data Changes, and the Acquired Data Will Change with Time and Environment
2.3 Diverse Data Types. The Diversity of Data Types Can Describe the Characteristics or Laws of Specific Things
2.4 Data is of Great Value. Potential Data Contains Huge Value
2.5 Intelligent Data Mining
3 Technical Embodiment of Big Data Finance
3.1 Data Analysis
3.2 Data Management
3.3 Data Processing
3.4 Data Presentation
4 Demand for Financial Science and Technology Talents in the Context of Big Data
4.1 The Total Demand for Middle and Junior Financial Technology Talents is Huge
4.2 Compound Talents are Favored and Become the Main Trend of Talent Development in the Financial Industry
4.3 High-End Financial Talents are in Short Supply and Become the Mainstream of Talent Flow
5 Conclusion
References
Application of Big Data in Corporate Internal Control
1 Introduction
2 Overview of Big Data
2.1 Big Data Refers to the Company Obtaining Valuable Data Information from Various Types of Data After Reasonable Analysis and Aggregation. Big Data Technology is the Core Technology of Big Data
2.2 Massive Data, Diverse Data, High-Speed Data, and Low Value Density are the Four Major Advantages of Big Data
3 Status Quo and Existing Problems of Corporate Internal Control
3.1 Corporate Internal Control Replaces Internal Control System
3.2 Ignore System Management and Replace the Nepotism System
3.3 The Interests of Minority Shareholders are Violated
4 Innovation of Big Data Technology in Internal Control
4.1 Mining Data Information for Internal Control
4.2 Strengthen Planning and Execution in Internal Control
4.3 Predictive Analysis of Internal Control Data
5 Conclusion
References
The ATR Algorithm for Reactive Power/Voltage in Power Grid Based on AVC Control Frame
1 Introduction
2 Research on the ATR Algorithm for Reactive Power/Voltage in Power Grid Based on AVC Control Frame
2.1 AVC Control Framework
2.2 ATR Algorithm for Reactive Power/Voltage in Power Grid
3 Experimental Results and Analysis
4 Conclusion
References
Design of Distribution Automation System and Terminal Conforming to IEC61850 Standard
1 Introduction
2 Design of Distribution Automation System and Terminal Corresponding to IEC61850 Standard
2.1 Hardware Design of Distribution Automation System Conforming to IEC61850 Standard
2.2 Software Design of Distribution Automation System Conforming to IEC61850 Standard
2.3 Complete Terminal Design of Distribution Automation System from Point of View of Power
3 Experimental Results and Analysis
4 Conclusion
References
Intelligent Automated Operation and Operation Management of Large Enterprise Cloud Data Center Based on Artificial Intelligence
1 Introduction
2 Algorithm Establishment
2.1 AdaBoost Algorithm
3 Model Building
3.1 Security Risk Rating Modeling
4 Evaluation Results
4.1 Data Cloud Processing Data Risk Rating Identification
4.2 Data Cloud Operations Management
5 Conclusion
References
Efficiency Evaluation of Main Ports in the Bohai Rim Region Based on Data Envelopment Analysis
1 Introduction
2 Research Methods and Sample Data
2.1 DEA Model
2.2 Super Efficiency DEA Model
2.3 Malmquist Productivity Index
2.4 Selection of Decision-Making Unit and Evaluation Index
3 Empirical Analysis
3.1 Analysis Based on DEA Method
3.2 Index Analysis Based on Malmquist Method
4 Conclusion
References
Analysis of Port Efficiency and Influencing Factors Based on DEA-Tobit
1 Introduction
2 Model Evaluation Design
2.1 Data Envelopment Model and Efficiency Evaluation
2.2 Tobit Model
3 Empirical Analysis
3.1 Index Selection and Data Source
3.2 DEA Model Efficiency Analysis
3.3 Tobit Regression Analysis
4 Conclusion
References
Spectrum Allocation Technology of Elastic Optical Networks Based on Power Business Perception
1 Introduction
2 Power Business Awareness System Structure
3 Spectrum Fragmentation Optimization Model and Optimal Allocation Scheme
3.1 A Spectrum Fragmentation Optimization Model Based on Service Time Difference
3.2 Optimization of Spectrum Fragmentation Allocation for Bidirectional Continuum of Spectrum
4 Analysis of Simulation Results
5 Conclusions
References
Construction of Information Teaching Mode in the Universities Under the Background of Big Data
1 Introduction
2 The Necessity of Constructing Information Teaching Mode in Colleges and Universities
3 Challenges Faced by the Construction of Informatization Teaching Mode in the University Under the Background of Big Data
3.1 The Investment Guarantee of Informatization Construction Funds
3.2 Data Mining Problem Comprehensively and Effectively
3.3 The Guarantee Problem of Information Security
4 Construction of University Information Teaching Mode Under the Background of Big Data
4.1 In the Preparation Stage Before Class
4.2 In Class Stage
4.3 After Class Stage
5 Conclusions
References
Analysis of the Impact of Cloud Computing-Based Financial Development on Employment Growth in the Era of Big Data
1 Introduction
2 The Transmission Mechanism of the Development of the Financial Industry Affecting Employment
2.1 The Direct Effects of the Development of the Financial Industry
2.2 Indirect Effects of the Development of the Financial Industry
2.3 The Impact of Financial Constraints on Employment
3 An Empirical Analysis of the Impact of My Country’s Financial Industry Development on Employment
4 Analysis of the Differences in the Impact of Financing Constraints on the Employment of Different Enterprises
5 Summary and Policy Discussion
References
Influence of Human Capital on Consumer Expenditure Under Big Data
1 Introduction
2 Data and Theoretical Basis
2.1 The Theory of Household Savings Demand
2.2 The Consumption Structure Theory
2.3 The Consumption Theory
3 Empirical Research
4 Conclusion
References
The Impact of Changes in RMB Real Effective Exchange Rate Based on Cloud Computing Technology on Employment in the Context of Big Data
1 Introduction
2 The Discuss of the Impact of RMB Exchange Rate Changes on Employment
2.1 Data Selection and Description
2.2 Data Analysis Results
3 Conclusions and Suggestions
3.1 The Research Conclusion
3.2 Suggestions
References
Classification Rule Maintenance Method Based on Incremental Genetic Algorithm
1 Introduction
2 Classification Rule Maintenance Based on Incremental Genetic Algorithm
3 Simulation Analysis
4 Conclusions
References
Support Vector Regression Prediction Method of Text Data Based on Correlation Analysis
1 Introduction
2 Text Data Prediction
3 Support Vector Regression Prediction
4 Simulation Analysis
5 Conclusions
References
Is Virtual Currency a Standard Financial Bubble? Blockchain Industry Research
1 Introduction
2 Blockchain
2.1 Origin and Development of Blockchain
2.2 Introduction to Blockchain
3 Virtual Currency
3.1 Definition and Types of Virtual Currency
3.2 Virtual Currency-Bitcoin
3.3 A Standard Financial Bubble
3.4 It’s not Technology, It’s Blindness and Conformity
References
Application of Air Traffic Control Communication, Navigation and Surveillance Equipment in the Aviation Field Based on Data Analysis
1 Introduction
2 Analysis of the Application of Data in Air Traffic Control Equipment Data
3 Experimental Thinking and Design
3.1 Experimental Ideas
3.2 Experimental Design
4 Discussion
4.1 Application Research of Air Traffic Control Communication Navigation Surveillance Equipment Based on Data Analysis
4.2 Design Principles of Air Traffic Control Communication Navigation and Surveillance System
4.3 Recommendations for Air Traffic Control Communication Navigation and Surveillance Equipment Based on Data Analysis
5 Conclusions
References
VR Technology in Physical Education from the Perspective of 5G
1 Introduction
2 VR Technology
2.1 Definition of VR Technology
2.2 Characteristics of VRT
3 Research Object and Experimental Design
3.1 Research Object
3.2 Experimental Design
4 Application of VRT in PE from the Perspective of 5G
5 Conclusions
References
Big Data and VR Technology in University Sports Stadium Training
1 Introduction
2 Big Data and VR Technology in Sports Stadium Training
2.1 Using “VR” Technology to Achieve Virtual and Virtual Comparison of Action
2.2 The Basic Theory and Related Algorithms of DTs
3 Application Experiment of Big Data and VR Technology in Sports Stadium Training
4 Discussion on the Application of Big Data and VR Technology in Sports Stadium Training
5 Conclusion
References
Artificial Intelligence Simulation System in Sports Training Under VR Technology
1 Introduction
2 Research on Artificial Intelligence Simulation System in Sports Training Under VR Technology
2.1 The Role of Virtual Reality Technology in Sports Training
2.2 The Key Technology of Virtual Reality Technology in Sports Training
2.3 Virtual Scene Location Mapping
3 Experiment of Artificial Intelligence Simulation System in Sports Training Under VR Technology
3.1 Experimental Analysis
3.2 Experimental Method
4 Discussion on Artificial Intelligence Simulation System in Sports Training Under VR Technology
5 Conclusion
References
The Application Status and Future Prospects of Computer-Based Social Media in the Sports Industry
1 Introduction
2 Methods
2.1 Adjustment of Constant-Dew-Point, Constant-Air-Volume and Changing Supply-Air-State
2.2 Sports TV Media
3 Experiment
3.1 Research Objects
3.2 Research Design
4 Discussion
4.1 The Impact of Social Media on the Sports Industry
4.2 Experimental Research Report Statistics
5 Conclusions
References
Computer Technology in the Network Construction and Practice of Management Equipment in Gymnasium
1 Introduction
2 On the Application Research of Computer Technology in the Network Construction and Practice of Management Equipment in Gymnasium
2.1 Application of Computer Technology in the Management Network of the Gymnasium
2.2 The Actual Benefits of the Stadium Network Management System Established by Computer Technology
2.3 Invalid Data Processing and Equipment Status Prompt
3 On the Application Experiment of Computer Technology in the Network Construction and Practice of the Management Equipment in the Gymnasium
3.1 Experimental Construction
3.2 Experimental Equipment
4 Discussion on the Application of Computer Technology in the Network Construction and Practice of Management Equipment in Gymnasiums
5 Conclusion
References
Citespace-Based Live Broadcast Legal Issues in the Context of Big Data
1 Introduction
2 Live Legal Visualization Method Under the Background of Big Data
2.1 Big Data Clustering Algorithm
2.2 The Issue of Live Broadcast Law
2.3 Document Visualization Methods in the Context of Big Data
2.4 The Knowledge Graph Method of Citespace
3 Literature Visualization Experiment in the Context of Big Data
3.1 Data Collection
3.2 Data Preprocessing
4 Analysis of Legal Issues of Live Broadcast Based on Citespace in the Context of Big Data
4.1 Document Visualization Analysis Based on Citespace in the Context of Big Data
4.2 Analysis of the Legal Structure of the Legal Right of Webcast
4.3 Literature Analysis of Legal Issues in Live Broadcast Based on Citespace
5 Conclusions
References
Application of Embedded Intelligent Monitoring Chip Based on Internet of Things Technology
1 Introduction
2 ZigBee Technology and Sensor Network Technology
2.1 ZigBee Technology
2.2 Sensor Network Technology
3 ZigBee Signal Transmission Test Experiment
4 Discussion
4.1 Circuit Design and Performance Test Analysis
4.2 Design of Monitoring Platform
4.3 Terminal App Design
5 Conclusions
References
Analysis of SDN Multi-controller Placement
1 Introduction
2 SDN Network Architecture
3 Challenges of SDN Control Plane
4 SDN Multi-controller Placement Problem Description
4.1 Controller Placement Based on Delay
4.2 Controller Placement Scheme Based on Reliability
4.3 Controller Placement Scheme Based on Deployment Cost
5 Algorithms for SDN Multi-controller Placement
6 Summary and Outlook
References
A Novel Sentiment Classification Architecture Based on Self-attention Mechanism
1 Introduction
2 Overview of Research Theories and Introduction of Relevant Technologies
2.1 Correlation Theory
2.2 Introduction of Relevant Technologies
3 Research on Sentiment Classification Algorithm Based on the Integrated Part of Speech Embedding Mechanism of Self-attention
4 Experimental Results and Analysis
4.1 Parameter Optimization Experiment
4.2 Algorithm Performance Analysis
5 Conclusion
References
A Novel Dynamic Corporate Credit Rating Classification and Analysis Model Based on Self-attentive Mechanism
1 Introduction
2 Dynamic Corporate Credit Rating Architecture
2.1 Dynamic Weighting Module
2.2 Credit Rating Classifier
2.3 Credit Rating Classifier
3 Dynamic Financial Analysis
4 Data Sets and Credit Ratings
4.1 Credit Rating Classifier
4.2 Data Sets
5 Conclusion
References
Innovation and Influence of Fresh Supply Chain Operation Mode Under COVID-19 Based on Network Data Analysis
1 Introduction
2 Innovative Operation Mode of Fresh Supply Chain Under COVID-19
2.1 Live Delivery Mode
2.2 Contactless Distribution Mode
2.3 Shared Employee Model
3 Analysis on the Impact of Fresh Supply Chain Operation Mode Innovation Under COVID-19
3.1 Analysis on the Impact of Live Delivery Mode Under COVID-19
3.2 Analysis of the Impact of Contactless Distribution Under COVID-19
3.3 Analysis of the Impact of Sharing Employee Mode Under COVID-19
4 Relevant Policies and Suggestions on Deepening Fresh Supply Chain Operation Mode Innovation
4.1 Analysis of Existing Problems and Suggestions for Improvement of Live Delivery Mode
4.2 Analysis of Existing Problems and Improvement Suggestions of Contactless Distribution Mode
4.3 Analysis of Existing Problems and Suggestions for Improvement of Shared Employee Mode
5 Conclusions
References
A Louvre Emergency Escape Model Based on Ant Colony Algorithm
1 Introduction
2 Assumptions
3 Model Establishment
3.1 Principle of Ant Colony Algorithm
3.2 Mathematical Model of Ant Colony Algorithm
3.3 Multi-ant Colony Algorithm Based on Ant Colony Algorithm
3.4 Application of AG in Evacuation Model
3.5 Algorithm Implementation
4 Model Solution
4.1 Tourist Evacuation Routes
4.2 Security Personnel Entry
5 Policy and Recommendations
References
Ubiquitous Power Internet of Things and IPv6 Technologies in Wireless Access Terminals and Intelligent Meter Reading Applications
1 Introduction
2 Ubiquitous Power Internet of Things and IPv6 Technologies
2.1 Intelligent Ubiquitous Power Internet of Things Technology
2.2 Key Technologies of IPv6 Perception Layer
3 Technical Scheme and Algorithm Description
4 Analysis of Application Examples
4.1 Case of Urban and Rural Fringe
4.2 Case Analysis of High-Rise Residential Area
4.3 Peak Rate
5 Conclusion
References
Fast Ultrasonic Testing Technology of Steel Plate Based on Drum Structure
1 Introduction
2 Analysis of Ultrasonic Testing Characteristics of Drum Structure
3 Multi-Gaussian Beam Theory Model Establishments
4 Ultrasonic Testing of Internal Defects of Steel Plates
4.1 Steel Plate Test Block and Ultrasonic Testing Device
4.2 Detection Results of Drum Probe for Defect
5 Conclusions
References
A Bearing Fault Diagnosis Method Based on Optimized Hierarchical Extreme Learning Machine
1 Method
1.1 Variational Mode Decomposition
1.2 Improved Hierarchical Extreme Learning Machine
2 Experimental Verification
3 Conclusions
References
Construction of Urban Smart Sports Tourism Service Platform Based on Big Data
1 Introduction
2 Research Theory Overview and Related Technology Introduction
2.1 Related Theories
2.2 Related Technology Introduction
3 Construction of City Smart Sports Tourism Service Platform Based on Big Data
4 Experimental Results and Correlation Analysis
5 Conclusion
References
Communication Effect of Traditional Minority Sports Based on Artificial Intelligence
1 Introduction
2 Artificial Neural Network and Traditional Minority Sports
2.1 Artificial Neural Network
2.2 Traditional Sports of Ethnic Minorities
3 Principle of Index Selection and Experimental Design
4 Analysis of Research Results
4.1 Analysis on the Transmission Channels of Traditional Ethnic Sports
4.2 Evaluation Index System of Traditional Minority Sports Communication Effect Based on Artificial Intelligence
4.3 Application Analysis of Communication Effect Evaluation System of Traditional Minority Sports Based on Artificial Intelligence
5 Conclusions
References
Optimization of Human Resource Management in Small and Medium-Sized Enterprises Based on Artificial Intelligence
1 Introduction
2 Impact of Artificial Intelligence on Corporate Talent Selection
2.1 Improve the Efficiency of Corporate Human Resources
2.2 Information and Data Processing in Human Resource Management
3 Experimental Thinking and Design
3.1 Experimental Ideas
3.2 Experimental Design
4 Discussion
4.1 Intelligent Research on Human Resource Management of Small and Medium-Sized Enterprises
4.2 Suggestions for the Reform of Human Resource Management in the Artificial Intelligence Era
5 Conclusions
References
Legal Dilemma and Outlet of Privacy Protection in the Era of Big Data
1 Introduction
1.1 Research Background
2 Method
2.1 Big Data
2.2 Personal Privacy
2.3 Privacy Protection
2.4 Literature Analysis
3 Experiment
3.1 ESF Encryption Algorithm
3.2 ESF Decryption Algorithm
4 Result
4.1 Enforcement of the Privacy Protection Law
4.2 Importance of Privacy Protection
5 Conclusion
References
Legal Nature of Artificial Intelligence Products
1 Introduction
2 Method
2.1 Ownership of AI Creations
2.2 Artificial Intelligence Creation
2.3 Components of Artificial Intelligence Products
3 Experience
3.1 Data Sources
3.2 Data Analysis
4 Discussion
4.1 Statistical Analysis of Relevant Case Literature
4.2 Statistical Analysis of Questionnaire
5 Conclusion
References
Application Status and Prospect of Artificial Intelligence Big Data in Stadium Management
1 Introduction
2 Conceptual Explanation and Theoretical Elaboration
2.1 Application of AI and Stadiums
2.2 The Cornerstone of AI Big Data in Stadium Management
3 Research Ideas and Key Points
4 Application Analysis of AI Big Data in Stadium Management
4.1 Application of AI Big Data in Stadium Construction Management
4.2 Optimization Application of Transformation Mode Under BD of AI
4.3 The Prospect of AI Big Data in Stadium Management
5 Conclusion
References
Training Model of Applied Talents in Universities in the Era of Big Data
1 Introduction
1.1 Background and Significance
1.2 Related Work
1.3 Main Content
2 Training Method of Big Data Talents
2.1 Big Data Teaching Development Method
2.2 Accurate Method Parameter Estimation
3 Practical Training Experiment of Applied Talent Cultivation
4 Analysis of Training Model of Applied Talents in Colleges and Universities
4.1 Analysis of a Three-Body Talent Training Model
4.2 Analysis of Training of Applied Talents
5 Conclusions
References
A Mobile Data Recovery Device
1 General Structure Description
2 Structural Design of Outer Box
3 Structural Design of Inner Box
4 Conclusion
References
Construction of Wisdom Logistics System Based on Supply Chain for Intelligent Manufacturing in Post-epidemic Era
1 Introduction
2 Problems with Intelligent Manufacturing and Wisdom Logistics
3 Build Wisdom Logistics System for Manufacturing
3.1 Time Window Supply Control
3.2 SPS Parts Ingredient Sorting
3.3 LES Production Information Pull
3.4 WMS Warehouse Material Control
3.5 RFID Production Material Tracking
4 Conclusions
References
Performance Improvement and Evaluation of Computer Communication Network Based on Artificial Intelligence
1 Introduction
2 Artificial Intelligence Communicates with Computers
2.1 Computer Communication Network
2.2 Artificial Intelligence Technology
3 Design of the Experiment
3.1 Experimental Background
3.2 Experimental Design
4 Computer Communication Improvement Based on Artificial Intelligence
4.1 Performance Improvement Analysis of Computer Communication Network Based on Artificial Intelligence
4.2 Suggestions for Improving the Performance of Computer Communication Network Based on Artificial Intelligence
5 Conclusions
References
Network Security and Countermeasures from the Perspective of Overall National Security
1 The Content and Structure of the Overall National Security Concept
1.1 The Content of the Overall National Security Concept
1.2 The Composition of the Overall National Security Concept
2 The Connotation and Importance of Network Security
3 Threats to Network Security
4 Countermeasures for Network Security Construction
4.1 Firmly Grasp the Main Connotation of the Overall National Security Concept and Xi Jinping’s Important Discussion on Cyber Security
4.2 Enhance Scientific and Technological Innovation Capabilities and Consolidate the Foundation of Network Security
4.3 Promote the Legalization of Network Governance
4.4 Strengthen International Cybersecurity Cooperation
4.5 Do a Good Job in the Construction of Cyber Ideology Security
5 Conclusion
References
Education Informatization: An Effective Way to Promote Educational Equity
1 Introduction
2 Educational Equity
2.1 The Connotation of Educational Equity
2.2 The Real Challenge of Educational Equity
3 Education Informatization
3.1 The Connotation of Education Informatization
3.2 Optimization of Technical Advantages
4 Measures to Promote Educational Equity
4.1 Sharing of Quality Resources and Digital Teaching
4.2 The Innovation-Driven Development of Education Information
4.3 The Role of Big Data
5 Conclusion and Outlook
5.1 Update the Concept of Information Literacy and Ability Training
5.2 Further Develop High-Quality Resources
5.3 Establish Systematic Project Design and Promotion Concept
5.4 Establish a Diversified Funding Investing Mechanism
5.5 Improve Network Security
References
A Comprehensive Energy Consumption Measurement Model for Building Envelope Components Based on Thermal Imaging Detection
1 Introduction
2 Proposed Method
2.1 Thermal Imaging Detection Technology
3 Experiments
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 Comprehensive Energy Consumption Measurement Model Analysis of Building Envelope Components Based on Thermal Imaging Detection
4.2 Suggestions on the Comprehensive Energy Consumption Measurement Model of Building Envelope Components Based on Thermal Imaging Detection
5 Conclusions
References
Computer Financial Accounting Information System for International Trade Enterprises
1 Introduction
2 Overview of Relevant Basic Knowledge
2.1 Cloud Computing
2.2 Overview of Basic Accounting Knowledge
3 Test Environment and System Test
4 Computer Financial Accounting Information System for International Trade Enterprises
4.1 Analysis of Functional Requirements of Computer Financial Accounting Information System for International Trade Enterprises Based on Cloud Computing
4.2 Module Function Design of International Trade Enterprise Computer Financial Accounting Information System Based on Cloud Computing
4.3 System Test Analysis
5 Conclusions
References
Information Security of Internet of Things Based on Perception and Interaction Technology
1 Introduction
2 Concept Analysis of IOT
2.1 Overview of IOT
2.2 IOT Security Awareness and Interaction Technology
3 Research Methods and Experimental Tests
3.1 Research Methods
3.2 Experimental Test
4 Information Security Analysis of IOT Based on Perception and Interaction Technology
4.1 Information Security Threat Analysis of IOT
4.2 Analysis of Test Results
4.3 IOT Information Security Protection Measures Based on Perception and Interaction Technology
5 Conclusions
References
Enlightenment of MOOCS Teaching Method in the Practical Course of Radio and TV Editing and Directing
1 Introduction
2 MOOC Teaching Method and Its Application in the Practical Course of Radio and TV Editing and Directing
2.1 MOOC Teaching Method
2.2 Application Significance of MOOCS Teaching Method in the Practical Course of Radio and TV Editing and Directing
3 A Questionnaire Survey on the Change of Teaching Ability Before and After MOOC Teaching Method Adopted by Radio and TV Editing and Directing Practical Course Teachers in School B
3.1 Experimental Ideas
3.2 Experimental Design
4 Discussion
4.1 Analysis of Problems in Practical Teaching of Radio and Television Editing and Directing Major
4.2 Choice of MOOC Teaching Method in Radio and TV Editing and Directing Practice Course
4.3 MOOC Teaching Should Strengthen the Cultivation of Students’ Habit and Ability of Autonomous Learning
5 Conclusions
References
Application of MOOC Teaching Mode in the Practical Course of Editing and Directing
1 Introduction
2 MOOC and Practical Course of Editing and Directing
2.1 Practical Course of Editing and Directing
2.2 Application of MOOCs in Radio and TV Editing and Directing Teaching
3 A Questionnaire Survey on the Current Situation of the Teaching Reform of Editing and Directing Practical Courses Under the Background of MOOC Teaching
4 Discussion
4.1 Investigation and Analysis on the Teaching Reform Effect of Practical Course of Editing and Directing Under Background of MOOC Teaching
4.2 Basic Principles of MOOC Platform Construction
4.3 Optimization Strategy of MOOC Teaching and Evaluation System
5 Conclusions
References
The Impact of Big Data Technology on International Trade
1 Overview of International Trade in the Context of Big Data Technology
1.1 The Concept of Big Data Technology
1.2 Characteristics of International Trade in the Context of Big Data Technology
2 The Impact of Big Data Technology on International Trade
3 International Trade Countermeasures Under the Background of Big Data Technology
4 Conclusion
References
Challenges and Countermeasures of International Trade Under the Background of Big Data
1 Introduction
2 Reform Measures
3 Experiments
4 Discussion
4.1 Challenges Faced by International Trade in the Context of Big Data
4.2 Countermeasures of International Trade Under the Background of Big Data
5 Conclusions
References
The Application of Big Data Analysis Technology in the Value Evaluation of Cultural Enterprises—Taking the Value Evaluation of Wanda Film Co., Ltd. as an Example
1 Introduction
2 Method
2.1 The Discount Model of Enterprise Free Cash Flow
2.2 Determination of Forecast Period and Profit Period
2.3 Forecast of Free Cash Flow of Enterprises
2.4 Determination of Discount Rate
3 Results
3.1 Results of the Prediction of Free Cash Flow of the Enterprise
3.2 Weighted Average Cost of Capital (WACC)
3.3 Wanda Film Co., Ltd. Corporate Value Assessment Results
4 Discussion
5 Conclusions
References
Online ESP Translation Teaching Via Mobile Translation App
1 Introduction
2 The Development of Translation Teaching Platform
3 The Technology Used in Translation Teaching Platform
4 The Design of Teaching APP for ESP Translation
5 Using the APP to Improve Translation Competence
6 Conclusions
References
Stock Forecasting Based on BP Neural Network Optimized by Improved Particle Swarm Optimization
1 Introduction
2 Proposed Method
2.1 Concept and Architecture of BP Neural Network Optimized by Particle Swarm Optimization
2.2 Design and Implementation of PSO-BP Neural Network
3 Experiments
3.1 Data Sources
3.2 Standardization
4 Discussion
4.1 Prediction of Shanghai Composite Index by Introducing Qualitative Index into PSO-BP Network
4.2 Performance Comparison of PSO-BP Network Before and After Introducing Qualitative Indicators
5 Conclusions
References
Summary and Analysis of Typical Technologies in 5G
1 Introduction
2 Wireless Transmission
3 Multiple Access Technology
4 Application Problems of AI in 5G System
5 Conclusion
References
Application of Information Technology in Economic Management
1 Introduction
2 Proposed Method
2.1 Cost Management
2.2 Performance Evaluation Function
3 Experiments
3.1 Group Overview
4 Discussion
4.1 Informatization Cost Accounting
4.2 Information Performance Management
5 Conclusions
References
Data Analysis of Marketing Development Status Under the Background of Big Data
1 Introduction
2 Big Data and Mobile Internet Marketing
2.1 Big Data Era
2.2 Current Situation of Mobile Internet Marketing
3 Comparative Experiment of Marketing Effect Between Big Data Precision Marketing and Traditional Marketing
4 Discussion
4.1 Analysis of Mobile Internet Marketing Deficiency Based on Big Data
4.2 Development Trend of Mobile Internet Marketing Under the Background of Big Data
4.3 Mobile Internet Marketing Optimization Measures Under the Background of Data Age
5 Conclusions
References
Challenges and Corresponding Strategies of Network Marketing in the Era of Big Data
1 Introduction
2 Network Marketing and Big Data Technology
2.1 Network Marketing
2.2 Significance of Big Data Technology in Network Marketing
3 A Questionnaire Survey on the Problems Existing in the Network Marketing of Chinese Enterprises
4 Discussion
4.1 Analysis of Advantages of Network Marketing Based on Big Data Technology
4.2 Challenges of Network Marketing
4.3 Enterprise Network Marketing Strategy and Measures in the Era of Big Data
5 Conclusions
References
Design of Kiwifruit Orchard Temperature Information Real Time Acquisition System
1 Introduction
2 System Design
3 System Function Test
4 Conclusion
References
Design of Fruit Florescence Tracking and Classification Management Based on RFID
1 Introduction
2 System Design
3 System Application
4 Conclusion
References
Design of Automatic Intelligent Water Saving System for Faucet
1 Introduction
2 System Design
3 System Function Test
4 Conclusion
References
On the Development of Computer Technology in Music Education Under the Background of 5G
1 Introduction
2 The Development Method of Computer Technology in Music Education Under the Background of 5G
2.1 Computer Technology
2.2 Music Education
3 Experimental Correlation Analysis
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 Analysis of the Development of Computer Technology in Music Education Under the Background of 5G
4.2 Prospect of Computer Technology in Music Education Under 5G Background
5 Conclusions
References
Research on Multiple Features and Performance of Visual Communication Design Based on Digital Media Environment
1 Introduction
2 New Needs in the Digital Media Era of Visual Communication Design
2.1 Information Transmission of Digital Media Technology
2.2 Characteristics of Visual Communication Design in the Era of Digital Media
3 Experimental Thinking and Design
3.1 Experimental Ideas
3.2 Experimental Design
4 Discussion
4.1 Analysis of the Multiple Characteristics and Performance of Digital Media Technology Based on the Digital Media Environment
4.2 Suggestions for Adaptable Changes in Visual Communication Design Concepts
5 Conclusions
References
New Model of China’s Financial Field Based on Cloud Computing and Big Data Under the Background of Digital Economy
1 Introduction
2 Proposed Method
2.1 The Connotation of the Digital Economy
2.2 Characteristics of the Digital Economy
3 Experiments
3.1 Research Object
3.2 Experimental Methods
4 Discussion
4.1 Average Profit of Corporate Business
4.2 Risk Control Analysis of Supply Chain Financial Credit Model Under the Background of Digitization
5 Conclusions
References
China’s Financial Poverty Alleviation Mechanism Under the Background of Digital Economy Based on Information Technology
1 Introduction
2 Proposed Method
2.1 Theoretical Analysis of the Quality of Digital Economic Development
2.2 Mechanism of the Existence of Poverty Alleviation Finance
3 Experiments
3.1 Experimental Object
3.2 Experimental Methods
4 Discussion
4.1 Analysis of Changes in Disposable Income of Rural Residents in Different Poverty-Stricken Areas
4.2 The Relationship Between Financial Development and Poverty Level
5 Conclusions
References
Optimization of Intelligent Elderly Care Industry Under the Background of Big Data
1 Introduction
2 Related Issues About the Intelligent Elderly Care Industry
2.1 What is Intelligent Elderly Care?
2.2 Why Develop Intelligent Elderly Care?
3 Future Optimization Direction–Combining Big Data Technology
3.1 Smart Devices
3.2 Information Platform
3.3 Network Security
4 Conclusion
References
A Super Resolution Algorithm Based On Content Regional Division
1 Introduction
2 Theory Support for Content Information Partition
3 Processing
3.1 Image Database Processing
3.2 Image Division
3.3 Image Matching
3.4 Synthesis of Result
4 Experimental Result
5 Conclusions
References
Construction of Dynamic Early Warning Mechanism for Economic Risks Based on Hybrid Ant Colony Algorithm
1 Introduction
2 Models of Explanatory Variables and Control Variables for Dynamic Early Warning of Economic Riskss
2.1 Variable Model
2.2 Descriptive Statistical Analysis
3 Optimization of Dynamic Early Warning Mechanism for Economic Riskss
3.1 Hybrid Ant Colony Algorithm
3.2 Regression Analysis Model of Dynamic Early Warning of Economic Risk
4 Empirical Analysis and Simulation Test
5 Conclusions
References
Analysis of Medical Image Segmentation
1 Introduction
2 Definition and Process of Image Segmentation
3 Main Methods of Medical Image Segmentation
3.1 Region—Based Image Segmentation
3.2 Edge-Based Image Segmentation
3.3 Based on Specific Theory Image Segmentation
4 Conclusion
References
Surface Defect Recognition Classification Based on Multi-Scale Convolutional Neural Network
1 Introduction
2 Multiscale Convolutional Neural Network
2.1 Convolutional Neural Network
2.2 Multiscale Feature Map Detection
2.3 Dataset
2.4 Configuration
2.5 Defect Detection Process
3 Conclusions Model Testing and Analysis
4 Conclusions
References
Application of Blockchain Technology in Short Video Ecosystem
1 Introduction
2 Development of Short Video Industry in China
2.1 Short Video has Gradually Become the Main Source for People to Obtain Information
2.2 Short Video has Gradually Become the Main Marketing Tool
2.3 The Rapid Growth of Short Video Users
2.4 Supervision is More Difficult, Low Content Leads to User Trust Crisis.
3 Short Video New Ecosystem Based on Blockchain Technology
3.1 Key Technologies and Application Scenarios of Blockchain
3.2 The Necessity of Building a New Ecosystem Based on Blockchain
3.3 Short Video New Ecosystem Model Based on Blockchain
4 The Application of Blockchain Technology in the New Ecosystem of Short Video
5 Conclusions
References
Safety Management of Prefabricated Building Construction Based on BIM-RFID
1 Introduction
2 Analysis of Safety Issues in the Construction of Prefabricated Buildings
2.1 Analysis of Safety Issues in the Transportation of Prefabricated Components
2.2 Analysis of Safety Issues in Stacking Operations of Prefabricated Components
2.3 Analysis of Safety Issues in Hoisting Operations of Prefabricated Components
2.4 Analysis of Issues Related to the Security Management of Personnel
3 BIM-RFID-Based Safety Management System for Prefabricated Building Construction
3.1 Transportation Safety Management of Prefabricated Building Components Based on BIM-RFID
3.2 BIM-RFID-Based Safety Management of Stacking of Prefabricated Building Components
3.3 BIM-RFID-Based Hoisting Safety Management for Prefabricated Buildings
3.4 BIM-RFID Based Personnel Safety Management
4 Conclusion
References
Energy-Saving Transformation of Rural House Enclosure Structure in Yichang Based on DeST
1 Introduction
2 Typical Rural House Construction Status
2.1 Basic Situation
2.2 Typical Rural House Construction Method
3 Dest Software Simulation Analysis
3.1 Modeling
3.2 Rural House Energy Consumption Simulation
4 Energy-Saving Optimization and Transformation of Rural Houses
4.1 Factor Selection and Analysis
4.2 Analysis of Simulation Transformation Results
5 Conclusions
References
Automatic Adjustment Method of Urban Deceleration Belt Based on Intelligent Sensor Equipment
1 Introduction
2 Research on Automatic Adjustment Method of Deceleration Belt Under Intelligent Sensor Equipment
2.1 Intelligent Sensing Equipment
2.2 Automatic Adjustment Method
3 Background and Process of the Experiment
4 Results and Discussion
4.1 Automatic Adjustment Model
4.2 Effect Comparison of Vibration Frequency
4.3 Questionnaire Survey Results
4.4 Vibration Principle of Vehicle Passing Through Deceleration Strip
5 Conclusions
References
Analysis of Yunnan Flower Logistics Demand Based on Grey GM (1, 1) Model
1 Introduction
2 Current Situation of Flower Logistics in Yunnan Province and Prediction Model of Flower Logistics
2.1 Current Situation of Flower Logistics in Yunnan
2.2 Model of Flower Logistics Forecast
3 GM (1,1) Model Test and Analysis
4 Discussion
4.1 Analysis of the Challenges of Yunnan Flower Industry Development
4.2 Suggestions on the Development of Flower Logistics Based on Grey GM (1,1) Model
5 Conclusions
References
Signal Interpretation of Magnetic Resonance Technology Based on Compressed Sensing
1 Introduction
2 Compressed Sensing Method
3 The Basic Principle of Magnetic Resonance
3.1 MR Theory
3.2 Detection of Free Attenuation of Signal
4 Instrument Signals Processing Based on Compressed Sensing
5 Conclusion
References
Modeling and Simulation of Neutral Grounding Operation Mode of 10 kV System
1 Introduction
2 Analysis on the Operation Mode of Neutral Point Grounding Through Arc Suppression Coil
3 Automatic Tracking Compensation Arc Suppression Coil Type
4 Modeling of Automatic Tracking Compensation Arc Suppression Coil Circuit
5 Proposal of the Parallel Arc Suppression Coil with Low Resistance Ground
6 Conclusions
References
Development and Change of Computer Science and Technology in Big Data Time
1 What is the Big Data Age?
2 Summarize Its Advantages and Disadvantages
3 Analysis of the Problem
3.1 Information Collection and Processing
3.2 Data Security
3.3 Information Storage
3.4 Information Processing
4 Summary
References
Algorithm Design of Computer Aided Traditional Art Pattern Design
1 Traditional Art Design and Computer Art Design
2 The Basic Position of Traditional Art Design
3 Characteristics and Advantages of Computer Art Design
3.1 Powerful Design Function
3.2 An Algorithm of Pattern Filling Area in Computer Art Design
3.3 Rich and Diverse Art Design Software
3.4 Design Materials for Mass Storage
4 The Relationship Between Computer Art Design and Traditional Art Design
5 Conclusion
References
Product Modeling Innovation Design Method Based on Evolutionary Algorithm
1 Introduction
2 Product Modeling Evolutionary Design
2.1 Cluster Analysis
3 Theory of Cellular Genetic Algorithm
4 Innovative Refinement Design of Product Modeling Based on Standard Genetic Algorithm
4.1 Standard Genetic Algorithm
4.2 The Convergence of Genetic Algorithm
5 Conclusions
References
Optimization of Labor Value and Relationship Distribution Under the Blockchain
1 Introduction of Weak Artificial Intelligence
2 Related Algorithms of Artificial Intelligence Technology
3 The Classical Labor Theory of Value is No Longer Applicable to the Era of Weak Artificial Intelligence
4 The Theoretical Basis of the Renewal of Labor Value Theory: The Laborer Status of Weak Artificial Intelligence
5 New Production Mode Combining Capital Principle with Weak Artificial Intelligence Labor
6 The Critical Path of Historical Materialism to the New Mode of Production
7 Conclusion
References
Mobile Data Security Detection Technology Based on Machine Learning
1 Intrusion Detection Model
2 Safety Detection Model Design
3 Intrusion Detection System
4 Intrusion Detection Method Based on Machine Learning
4.1 Bayesian Classification Based Approach
5 Discussion and Concluding Remarks
References
Construction of Art Design Based on Newton Iterative Algorithm
1 Introduction
2 Advantages of Computer Art Design
2.1 Computer Art Influences the Concept and Creation Communication Mode of Traditional Art
2.2 Through the Development of Computer Art, Many New Works and Technologies have been Produced
3 Application of Interactive Genetic Algorithm in Fractal Art Design
4 Inheritance of Traditional Art
4.1 The Accumulation of Traditional Art Laid the Foundation of Computer Art
4.2 Many Aspects of Computer Art Are Influenced by Traditional Art Techniques
4.3 Some Important Categories of Traditional Art Cannot be Replaced by Computer Art
5 Conclusion
Reference
Fault Location for Small Current Grounding System Based on Injection Method
1 Introduction
2 Off Line Location Method for Single Phase to Ground Fault Based on Injection Method
2.1 Injection and Pursuit of Signal Current
3 Recovery of Insulation After Power Failure
3.1 Rough Calculation of Fault Distance
4 Ty-04 Single Phase Grounding Point Locator
5 Conclusion
References
Movement Arrangement Auxiliary Systems Design for Cheerleading Complete Set
1 Cheerleading Complete Set of Action Arrangement Auxiliary System
2 Design and Establishment of the Auxiliary System for the Arrangement of Complete Sets of Movements in Lala La La La
2.1 Motion Capture
2.2 Post processing of Captured Motion Data
3 The Design Principle of Cheerleading Complete Set Movement Arrangement Auxiliary System
3.1 Standardization Principle
3.2 Personalized Principle
3.3 Educational Principle
4 Design and Establishment of Cheerleading Complete Set of Action Arrangement Auxiliary System
4.1 The Design Content of Cheerleading Complete Set Action Arrangement Auxiliary System
4.2 Material Collection of Cheerleading Complete Set of Action Arrangement Auxiliary System
4.3 Introduction of Development Tools Needed for the Establishment of Cheerleading Complete Set of Action Arrangement Auxiliary System
5 Conclusion
References
Mathematical Model of Genetic Algorithm Based on Pattern Theorem
1 Introduction
2 Pattern Theorem
2.1 Selection Operation in Genetic Algorithm
2.2 The Function of Crossover Operator
3 Genetic Algorithm Based on Logic Operator and Its PCS
3.1 Logic Operation of Gene
3.2 Fusion Inheritance of Genes
4 Building Block Hypothesis, Implicit Parallelism and Convergence
4.1 Building Block Hypothesis
4.2 Implicit Parallelism
4.3 Astringency
5 Surface Shape Error Calculation Based on Genetic Algorithm
6 Conclusion
References
Optimization of Database Security Mechanism in the Supporting Platform of Distance Education
1 Introduction
2 Basic Concepts of Cloud Computing
2.1 Definition of Cloud Computing
3 Problems and Solutions of Cloud Computing in Distance Education
4 Virtual Teaching Mode of Law Course Based on Cloud Computing and Cloud Classroom
4.1 The Basic Structure and Functions of Cloud Classroom
5 Conclusions
References
Legal Issues of SaaS Model in Cloud Computing
1 The Concept of Cloud Computing
2 SaaS Model Service Correlation
3 Analysis of Legal Issues of SAS Software Business Model Under the Current Copyright System
3.1 Core Copyright Protection Items of Traditional Software Business Model
3.2 The Business Model of SAS Software Brings New Problems to the Current Copyright System
4 Comparative Analysis of Solutions Under the Current Copyright System
4.1 The Feasibility of Incorporating the Right of Information Network Dissemination
4.2 A Possible Way to Reconstruct the Connotation of Leasehold Under the Current Legal System
4.3 Responsibility Regulation of Cloud Service Providers as Platform Providers
5 Conclusion
References
Network Security and Computer Virus Prevention in the Internet
1 Introduction
2 The Necessity of Network Security
2.1 Complex Network Information
2.2 High Penetration Rate of Network Technology
2.3 System Software Vulnerability
2.4 The Awareness of Network Security is Poor
3 Machine Learning Technology
3.1 k-Nearest Neighbor
3.2 Support Vector Machine
4 Conclusion
References
Evaluation of Human Resource Management Benefit Based on Neural Network
1 Introduction
2 The Development and Problems of Human Resource Management System
3 Research on the New Model of Configurable Human Resource Management Based on “Cloud Computing”
3.1 Data Collection of Human Resource Management Under Cloud Computing
3.2 Human Resource Decision Management Under Cloud Computing
4 Conclusions
References
Application of Deep Learning in Keyword Extraction in English and American Literature
1 The Conception of Multimodal English and American Literature Teaching
1.1 The Theoretical Basis of Multimodal Teaching
1.2 The Characteristics of English and American Literature Teaching
1.3 The Construction of Multimodal English and American Teaching Mode
2 The Disadvantages of Multimodal English and American Literature Teaching—Cultural Loss
3 Systemic Functional Linguistics
4 Second Language Acquisition Theory
References
Deep Learning for Copyright Protection
1 Introduction
2 “One Belt, One Road” Language Data has Increased Dramatically Under Cloud Environment
2.1 The Rise of Translation Network Promotes the Explosion of Language Data
2.2 “One Belt, One Road” Strategy, Demand for Language Data
3 “One Belt, One Road” Language Data Copyright Object Category Under Cloud Environment
4 Copyright Risk Category of One Belt, One Road Language Data Under Cloud Environment
5 One Belt, One Road Language Data Copyright Risk Mitigation Strategy in Cloud Environment
6 Conclusions
References
Algorithm Design and Function Realization of Home Decoration Design Software Based on BIM
1 Introduction
2 Main Function Realization
3 Software Algorithm Design
3.1 Modeling and Drawing
3.2 2D-3D View Switch
4 Function Realization Effect
5 Summary and Prospect
References
Intelligent Back Analysis of Geotechnical Mechanical Parameters Based on Differential Evolution Algorithm
1 Introduction
2 Differential Evolution Algorithm
2.1 Elastoplastic Finite Element Based on D-P Criterion
2.2 Differential Evolution Algorithm
3 Back Analysis of Parameters Based on Elastoplastic Finite Element Method and Differential Evolution Algorithm
4 Back Analysis of Mechanical Parameters of Tunnel Surrounding Rock
5 Conclusions
References
Research on Virtual Human Animation Based on Motion Capture Data
1 Introduction
2 Motion Capture Data
3 Building a Hierarchical Human Skeleton Model
4 Virtual Human Motion Driven by Motion Capture Data
4.1 Motion Principle of Virtual Human Skeleton
4.2 Driving of Virtual Human Skeleton Animation
5 Conclusions
References
Prediction and Analysis of the Relationship Between Porous Structure and Strength of Concrete Based on Artificial Neural Network
1 Introduction
2 Bearing Capacity Calculation
3 Two Kinds of Neural Networks
3.1 Brief Introduction of BP Network and Algorithm
3.2 Introduction of RBF Network and Algorithm
4 Problems and Modeling
5 Learning Training and Prediction Results of the Model
6 Conclusions
References
Effectiveness Evaluation of Business English Practice Teaching Based on Decision Tree Algorithm
1 Introduction
2 Teaching Effectiveness Evaluation Based on ID3 Decision Tree
3 ID3 Decision Tree Algorithm
3.1 Information Gain Optimization
3.2 Simulation Experiment of Improved Algorithm
4 On the Practical Teaching of Business English
5 Conclusions
References
Back Analysis and Numerical Simulation of Surrounding Rock Parameters of Tunnel Close Construction Based on PSO-BP Algorithm
1 Introduction
2 Characteristics of Close Construction
3 Parametric Constitutive Model of Rock and Soil
4 Influence of Different Excavation Methods on Stability of Tunnel Surrounding Rock
5 Back Analysis of Rock Engineering Parameters
6 Conclusions
References
Design of Machine Vision Teaching Experiment System Based on HALCON
1 Introduction
2 Introduction to Machine Vision
2.1 Machine Vision Software Halcon
3 Design Method of Machine Vision Experiment System
3.1 Selection Method of Light Source
4 Common Machine Vision Light Source
4.1 Imaging Distortion
5 Depth of Field of Machine Vision
6 Conclusions
References
BP-Neural Network for Business Administration
1 Introduction
2 The Current Situation of Business Administration Teaching in Colleges and Universities
3 The Importance of Application of Simulation Teaching Method in Business Administration Teaching
3.1 The Role of Simulation Teaching Method in Improving Students’ Participation
3.2 The Role of Simulation Teaching Method in Teaching Practice
3.3 The Effect of Simulation Teaching Method on Teaching Pertinence
4 Syntax and Running Environment of 3D Simulation Technology
4.1 Simulation Teaching
4.2 Introduction of 3D Simulation Technology Syntax
4.3 Editing and Operation Environment
5 The Application of Simulation Teaching Method in Business Administration Teaching in Colleges and Universities
6 Conclusions
References
Research on Performance Monitoring of PPP Project Based on Genetic Neural Network
1 Introduction
2 Construction of PPP Project Performance Index System
2.1 Analysis of PPP Project Performance Formation Mechanism
3 The Combination of Genetic BP Neural Network and Genetic Algorithm
3.1 Performance Evaluation Method Based on Genetic BP Neural Network
4 Determine the Matter Element of PPP Project Performance Monitoring
5 Conclusions
References
Experimental Study on Calibration Model of Vehicle Bridge Coupling Vibration Algorithm for Highway Bridge
1 Introduction
2 Similarity Theory of Vehicle Bridge Coupling Vibration Model Test
2.1 Test Requirements
2.2 Similarity Law of Dynamic Model
3 Manufacture of Model Test Device
3.1 Model Bridge
4 Dynamic Performance Verification
4.1 Verification of Dynamic Characteristics of Model Bridge
4.2 Dynamic Characteristic Verification of Model Car
5 Conclusions
References
Innovation of Employment and Entrepreneurship Education Based on K-means Clustering Algorithm
1 Introduction
2 Current Situation of Entrepreneurship Education in Colleges and Universities
3 Evaluation Model of Entrepreneurial Thinking
3.1 The Structure of K-Means Clustering Algorithm
3.2 Algorithm Practice
4 Innovation Strategy of Entrepreneurship Education Based on K-means Algorithm
5 Conclusions
References
Green Building Analysis and Carbon Emission Calculation Based on BIM
1 Introduction
2 Establishment of BIM Model
3 Secondary Development of Revit
4 Engineering Quantity Statistics and Carbon Emission Calculation Based on BIM
5 Conclusions
References
Language Recommendation Algorithm Serves the “Belt and Road” Strategic Language
1 Introduction
2 Language Service and Language System Module Theory
3 Realization of Anti Noise Speech Recognition Algorithm Based on DSP
4 Voice Input and Output Module
5 The Internal Module Structure of Language System
6 Conclusions
References
Statistical Analysis of Ecological Mathematical Model Based on Differential Equation
1 Introduction
2 Model of Biological Population Interaction
3 Statistical Modeling of Logistic Equation
3.1 First Order Autoregressive Model
3.2 Two Way Difference Generalized Least Squares Estimation of Logistic Equation Parameters
4 Students Statistical Modeling of GM (1,1) Model
5 Conclusions
References
Research on Parallel Finite Element Algorithm Based on PVM and Its Implementation in Geotechnical and Underground Engineering Software
1 Introduction
2 Network Parallel Program Development Environment PVM
3 Finite Element Distributed Parallel Algorithm a Substructure Parallel Algorithm
4 Engineering Application
4.1 Finite Element Forward Analysis Method of Underground Structure
4.2 Serial and Parallel Finite Element Calculation Steps
4.3 Parallel Finite Element Calculation Steps
5 Conclusions
References
Data Mining for Badminton On-the-Spot Tactics Analysis System
1 Introduction
2 Research on Data Mining and Association Algorithm
3 Research on Data Mining of Sports and Badminton
4 The Application of Association Rule Mining in Badminton is Still in Its Infancy
5 Basic Concepts of Data Mining
5.1 Basic Concepts of Association Rules
5.2 On the Spot Tactics Analysis System of Badminton
6 Conclusions
References
Integral Factor and Conserved Quantity of Lagrange System Based on Fractional Order Model
1 Introduction
2 Fractional Derivative
3 Fractional Lagrange System and Its Integral Factors
4 Conservation Theorem
5 An Example
6 Conclusions
References
Multi Objective Optimization of Construction Project Based on Ant Colony Algorithm
1 Overview of Construction System Reliability of Construction Project
2 Multi Objective Optimization Based on Ant Colony Algorithm
2.1 Basic Principle of Ant Colony Algorithm
2.2 Multi Objective Optimization Mechanism of Improved Ant Colony Algorithm
3 Implementation of the Algorithm
4 Multi Objective Optimization with Construction System Reliability as Constraint
4.1 Multi Objective Collaborative Optimization Model with Construction Reliability Constraints
4.2 An Algorithm for Solving Multi Objective Optimization Problems
5 Conclusion
References
On the Early Warning of Internet Financial Risk Based on Big Data
1 Overview of Internet Financial Risks
2 Data and Characteristics in Internet Finance
3 Strategies for the Construction of Internet Financial Risk Early Warning Mechanism Based on Big Data
References
BP Neural Algorithm for Mode of Scientific Protection of Art Heritage
1 Research Background
2 The Research Method to Eye Movement Tracking Technology
2.1 The Fundamental Principles of Eye Movement Experimental System
2.2 The Main Parameters of Eye Movement Tracking Technology
3 The Equilibrium Algorithm
3.1 The Influence of Different Background Color in Traditional Art Pattern Towards Observer’s Attraction Degree
3.2 The Influence of Pattern’s Figurative Degree Towards Observer’s Attraction Degree
3.3 The Influence of Pattern’s Strong and Faint Contrast Towards Observer’s Attention Degree
4 The Analysis of Eye Movement Tracking Result
4.1 The Influence of Different Background Color Towards Observer’s Attraction Degree
4.2 The Influence of Pattern’s Figurative Degree Towards Observer’s Attraction Degree
4.3 The Influence of Pattern’s Strong and Weak Contrast Towards Observer’s Attraction Degree
5 Conclusion
References
Research on the Development of Artificial Intelligence into VR Practice Teaching
1 Introduction
2 Core Concept Definition
3 Research on Integrated Development
3.1 AI Enhances the Interactivity of VR Practice Teaching Activities
3.2 AI Improves the Authenticity of VR Practice Teaching Scenes
3.3 AI Improves the Intelligence of VR Practice Teaching Feedback
4 Conclusion
References
Fatigue Measuring System Using Wearable Sensor
1 Introduction
1.1 Research Background
2 Theoretical Consideration
2.1 Emotional Information and Fatigue
2.2 Wearable Device
3 Research Content
3.1 Fatigue Measuring System Design
3.2 Ontology Health Information Service
4 Conclusion
References
Study on the Growth of Bionic Mineralized Coating Induced by Different Magnetic Field Strength
1 Introduction
2 Experiment
2.1 Material Preparation
2.2 Coating Preparation
2.3 Coating Representation
3 Results and Discussions
3.1 Microstructure Analysis
3.2 XRD Analysis
3.3 Biocompatibility Evaluation
4 Conclusion
References
Anti-opening Measures for Pre-fabricated Cable of Secondary Circuit of Current Transformer
1 Introduction
2 Anti-open Current Type Connector Structure and Working Principle
2.1 Connector Socket and Plug Structure
2.2 Connector Anti-open Circuit Working Principle
3 Prefabricated Cable “Bridge” Connection Technology
3.1 Working Principle of Bridge Type Prefabricated Cable Connector
3.2 Grounding Analysis of Prefabricated Cable Anti-opening Under Different Working Conditions
4 Prefabricated Cable Connection Reliability
5 Conclusion
References
WSR Algorithm for the Campus Cheerleading
1 Introduction
2 Analysis on the Current Situation and Main Problems of the Management Mode of Cheerleading Teams in Colleges and Universities
3 The Construction of “WSR Three-Dimensional Management Model” for Cheerleading Teams in Colleges and Universities
3.1 Structure of W (Physical) Facility Support Subsystem
3.2 Structure of S (Administrative) Rules and Regulations Subsystem
3.3 The Structure of R (Human Resource) Human Resource Subsystem
4 Taking the Cheerleading Team Economic College as the Research Object
4.1 Analysis and Improvement of Physical (W) Support Facilities System
4.2 Analysis and Improvement of Management (s) Rules and Regulations Subsystem
4.3 Analysis and Improvement of R (Human Resource) Human Resource Subsystem
5 Conclusion
References
Model and Algorithm of Logistics Distribution Path in Model and Algorithm of Logistics Distribution Path in B2C e-Commerce Environment Based on Genetic Algorithm
1 Introduction
2 Influence of B2C Environment on Vehicle Scheduling of Logistics Distribution
3 General Vehicle Routing System
4 Vehicle Routing System Optimization Based on Genetic Algorithm
5 Conclusion
References
Dynamic Learning of Cheerleading Rehearsals Based on Moodle2.0 Module
1 About Moodle2.0
1.1 Fuzzy C-means Clustering Algorithm
1.2 Web Service Ice in Moodle
1.3 Web Service Access Service Settings
2 Advantages of Modular Cheerleading Dynamic Learning Based on Moodle 2.0
2.1 Moodle2.0 Modular Cheerleading Dynamic Learning Platform Can Improve the Cheerleading Education and Teaching Methods, and Improve the Teaching Efficiency
2.2 Moodle2.0 Modular Cheerleading Dynamic Learning Platform Can Improve the Theory Examination System and Prevent the Same Papers and Papers
2.3 Moodle 2.0 Modular Cheerleading Dynamic Learning Platform Can Strengthen the Teaching Evaluation Process and Results, and Make the Evaluation More Fair and Comprehensive
3 Conclusion
References
The Application of Financial Analysis Model Based on SAS in Enterprise Financial Decision-Making Process
1 Introduction
2 Overview of SAS Financial Analysis Model
2.1 Three Dimensions of SAS Financial Analysis Model
3 Application of Statistical Methods in Enterprise Financial Analysis
4 Improvement of Statistical Methods in Enterprise Financial Analysis Under the Background of Big Data
5 Conclusion
References
The Development of Excellent Courses of BP Neural Network Teaching Platform
1 Introduction
2 The Necessity of Applying the Network Teaching Platform of B to the “Thought Course”
2.1 Improve the Teaching Effect of “thinking Course”
3 The Design Principle of “Thinking Course” BP Network Teaching Course
3.1 Adhere to the Principle of “Student Oriented”
3.2 Adhere to the Principle of Synchronization with Classroom Teaching
4 The Design Content of Network Teaching Course “Thinking Course”
4.1 Basic Information of the Course and Clear Learning Orientation
4.2 The Introduction of Teaching Content and the Expansion of Classroom Teaching
4.3 Interaction Between Teachers and Students to Promote Spiritual Communication
5 Conclusions
References
Consumption Pattern of Tourist Souvenirs Based on Apriori Algorithm
1 Introduction
2 Association Rule Mining Algorithm Apriori Algorithm
2.1 Overview of Apriori Algorithm
2.2 Analysis of Apriori Algorithm
3 Improved Apriori Algorithm
3.1 Support
3.2 Confidence
3.3 Strong Association Rules
4 Introduction of Personalized Recommendation Technology
4.1 Content Based Recommendation
5 Conclusion
References
Influence of Improved Apriori Algorithm on Predictive Public Management
1 Improved Apriori Algorithm
1.1 Algorithm Description
1.2 Algorithm Analysis
2 Practical Application of Apriori Algorithm
2.1 Data Preprocessing
2.2 Frequent Itemsets
3 Conditions for the Realization of Predictive Public Management in the Intelligent Era
4 Conclusion
References
Research on Security Detection and Response Technology of Edge IOT Agent Based on Behavior Analysis
1 Introduction
2 Behavior Analysis Algorithm
2.1 Time Series Prediction Algorithm
2.2 Behavior Prediction Model Based on Decision Tree
3 Power Internet of Things System Architecture
4 Agency of Edge Internet of Things
5 Conclusion
References
Design of Ceramic Art Design Assistant Teaching System Based on Cloud Computing Technology
1 Introduction
2 The Characteristics and Significance of Ceramic Hand-Painted Renderings
2.1 The Characteristics of Ceramic Hand Drawn Renderings
2.2 The Teaching Value of Ceramic Hand Drawing Renderings
3 Design of Assistant Teaching System
4 Principles of Cloud Computing
5 Conclusion
References
Virtual Reality Chinese Teaching System Based on Deep Learning Algorithm
1 Introduction
2 Basic Concepts of Multi-objective Optimization of Genetic Algorithm
3 Standard Genetic Algorithm
4 Implementation of Coding
5 Improving Teaching Methods and Strengthening Chinese Thinking Training
6 Conclusion
References
Application of Cloud Computing in Ceramic Design
1 Clustering Analysis Algorithm for Large Scale Data in Cloud Computing
2 Cluster Center
3 Ceramic Art Concept
4 Innovative Application of Cloud Computing in Ceramic Art Design
4.1 Inheriting the Development of Ceramic Art
4.2 Provide New Design Ideas for Modern Product Design
5 Innovative Application Method of Cloud Computing in Ceramic Art Design
5.1 Individualized Design of Ceramic Art Products
5.2 Humanized Design of Ceramic Art Products
5.3 Localization Design of Ceramic Art Products
Reference
Design of English Teaching Post Competency Evaluation System Based on K-means Clustering Algorithm
1 Introduction
2 Data Analysis Model of English Teaching Post Competency Evaluation
2.1 Data Analysis of Constraint Parameters
2.2 Quantitative Recursive Analysis of Evaluation
3 Simulation Experiment and Test Results
4 System Function Design
5 Conclusion
References
Design of Electrical Automation Engineering Control System
1 Introduction
2 Current Situation of Electrical Automation Engineering Control System
3 Function of Electrical Automation Engineering Control System and Its Bad Problems
3.1 Function
3.2 Bad Problems
4 Suggestions on Strengthening the Construction of Control System of Electrified Automation Project
4.1 Innovative Electrical Automation Products Come Out
4.2 Integration of Electrical Automation Control System and Artificial Intelligence Technology
5 Development Trend of Electrical Automation Engineering Control System
5.1 Distributed Control Method is More Widely Used in Electrical Automation System
6 Conclusion
References
Fault Detection Method of Electrical Automation Equipment Based on Neural Network
1 Introduction
2 Control and Detection
3 Principle of State Recognition Based on RBF Network
3.1 Introduction to RBF Network
3.2 State Recognition Based on RBF Network
4 State Recognition of High Voltage Circuit Breaker Based on (RBD) Neural Network
4.1 State Recognition Algorithm with Learning New State Types
4.2 Application of Improved State Recognition Algorithm in Circuit Breaker State Identification
5 Conclusion
Reference
Traffic Signal Machine Learning Controller Based on Genetic Algorithm
1 Introduction
2 System Design
3 Genetic Algorithm
4 Simulation Comparison
5 Conclusion
References
Design and Implementation of Cloud Computing Platform Monitoring System Based on Nagios
1 Introduction
2 Introduction to Related Technologies
2.1 SNMP Protocol
2.2 SNMP Management Information Structure
3 System Design
3.1 System Design Principles
3.2 Overall Design of the System
4 Conclusion
References
Research on Medium Voltage Distribution Network Planning Method Based on Improved Genetic Algorithm
1 The Concept of Genetic Algorithm
2 Basic Characteristics of Genetic Algorithm
3 Mathematical Method of Distribution Network Planning
3.1 Traditional Optimal Algorithm
3.2 Modern Optimization Methods
4 Distribution Network Planning Based on Improved Multi Population Genetic Algorithm
4.1 Mathematical Model of Single Source Planning in Distribution Planning
4.2 Distribution Network Planning Based on Improved Multi Population Genetic Algorithm
4.3 Repair of Radial Grid of Distribution Network
5 Conclusion
References
Design of Incomplete 3D Information Recognition System Based on SIFT Algorithm
1 Application of SIFT Algorithm in Incomplete 3D Information Image Recognition
2 SIFT Algorithm Flow
2.1 Scale Space Generation
2.2 Constructing Scale Space
3 Direction Assignment of Key Points
4 Modeling of Incomplete 3D Image Recognition System
4.1 Cycle Matching Vector Modeling Steps
4.2 Circular Matching Vector Modeling
4.3 Image Matching
5 Conclusion
References
Real-Time Detection Technology of URL Attack Behavior Based on Machine Learning
1 Research Status of URL String Detection
1.1 Blacklist Detection Technology
1.2 Research on Malicious URL Detection Using Machine Learning
2 Feature Extraction Technology
3 Construction of Malicious URL Detection Model Based on Machine Learning
3.1 Construction of Malicious URL Detection Model
3.2 Construction of SVM Detection Model
4 Architecture Design of Malicious URL Detection System
4.1 Architecture Design of Malicious URL Detection System
4.2 Design and Implementation of Data Analysis Layer
5 Conclusion
References
Application Value and Path of Computer Technology in Student Management in the Internet Era
1 Introduction
2 Challenges Faced by College Student Management Under the Background of Big Data
2.1 The Personal Ideological Understanding of Student Management Personnel
2.2 Lack of Students’ Quality and Skills
3 The Era Characteristics of Big Data
4 New Path of College Student Management in the Era of Big Data
4.1 Improve the Skills and Ideological Understanding of College Student Management Personnel
4.2 Build Internet Big Data Awareness
5 Conclusion
References
Application of Computer Technology in Engineering Cost Management
1 Introduction
2 Analysis on the Application of Computer Technology in Project Cost Management
2.1 Imbalance of Software Application in Engineering Cost
2.2 There are Many Kinds of Engineering Cost Management Software and the Existing Problems
3 Work Procedure of Value Engineering
4 Application Analysis of Computer Technology in Cost Management of Construction Project in Various Stages
5 Conclusion
References
Short Term Power Load Forecasting Based on Meteorological Accumulation and AcA-GRNN
1 Introduction
2 Analysis of Meteorological Factors
2.1 Accumulation of Meteorological Conditions
2.2 Evaluation Function of “similarity” of Meteorological Conditions
3 Generalized Regression Neural Network
4 Ant Colony Optimization Algorithm
4.1 Establishment of Objective Function
4.2 Basic Ant Colony Optimization Algorithm
5 Conclusion
References
Reform and Practice of Traditional Chinese Medicine in Information Teaching Method Promoted by ID3 Algorithm
1 Basic Concepts of ID3 Algorithm
2 Construction of Integrated Platform for Informatization Teaching of Traditional Chinese Medicine
3 Reform of Deep Integration of Classroom Teaching and Network Teaching of Traditional Chinese Medicine
3.1 Promote Deep Integration Based on Micro Idea
3.2 Promotion of Teacher Student Interaction Based on Problem Discussion Guidance
4 Reform and Practice of Traditional Chinese Medicine in Information Teaching Method
4.1 Carrying Out Research Teaching to Promote Deep Integration
4.2 Introducing Student Teaching Assistants to Promote Deep Integration
5 Conclusion
Reference
Research on the Development and Application of Sports Video Analysis Platform in Sports Training
1 Introduction
2 Requirements of Motion Video Analysis System
3 Design of Motion Video Analysis System
3.1 Function Design of Motion Video Analysis System
3.2 Hardware Structure of the System
3.3 Design of Image Processing Algorithm
4 Development and Implementation of Sports Video Analysis System Based on Sports Training
5 Conclusion
References
Calligraphy Teaching System in Primary and Secondary Schools Based on Artificial Intelligence
1 Introduction
2 Design and Implementation of Teaching System Based on Artificial Intelligence
2.1 Design and Implementation of Visual Teaching Module
2.2 Determination of Students’ Learning Speed Calligraphy
3 Structure Design of Calligraphy Interactive Teaching System in Primary and Secondary Schools
3.1 Model Design of Calligraphy Interactive Teaching System
4 Module Division of Calligraphy Interactive Teaching System
5 Interface Design of Calligraphy Interactive Teaching System in Primary and Secondary Schools
6 Conclusion
References
Automatic Generation Algorithm of Electrical Wiring Diagram for Distribution Network Based on Topology Stratification
1 Hierarchical Topology Model of Distribution Network
2 Construction of Hierarchical Topology Model
3 Preliminary Layout of Automatic Mapping
3.1 Calculation of Node Coordinate Moving Distance
3.2 Layout End Condition
4 Automatic Mapping and Complete Drawing
5 Epilogue
References
Neural Network Prediction Model of Real Time Data of Thermal Power Plant Based on L-M Algorithm
1 Introduction
2 Basic Principles of Time Series Prediction
2.1 BP Neural Network
2.2 L-M Training Algorithm
2.3 Principle of Time Series Prediction
3 Real Time Data Prediction Model of Thermal Power Plant
4 Data Preprocessing
5 The Significance of Neural Network
6 Conclusion
References
The Design and Application of Dance Teaching System Based on Moodle Platform
1 Introduction
2 The Current Situation of Dance Teaching in Colleges and Universities and the Problems Solved by the Platform
3 Overview of Moodle Platform
4 Design of Dance Teaching System Based on Moodle Platform
4.1 Design of Dance Teaching System Based on Crud Operation of Database Access
4.2 Moodle Platform Structure
5 Specific Application Analysis
6 Conclusion
References
Remote Digital Management Resource Base Mode Based on Cloud Computing
1 Cloud Computing Technology
2 Optimization of Energy Saving Scheduling Algorithm for Cloud Computing Data Center
2.1 3D Reconstruction of Cloud Computing Data Center Resources
2.2 Energy Saving Scheduling Algorithm for Cloud Computing Data Center
3 The Model of Distance Education Digital Teaching Resource Database Based on Cloud Computing
3.1 The Logical Framework of Resource Network Model
3.2 Platform Architecture of Mode
3.3 Large Scale Learning Resource Processing Technology
4 Conclusion
References
Research on Post Production of Film and Television Based on Computer 3D Technology
1 New Media Background
2 Synthesis and Treatment Effect of the Technology
3 Computer Aided Design
3.1 3D Reconstruction Algorithm of Point Cloud Segmentation and Matching Based on 3D Technology
3.2 Advantages of 3D Technology in Film and Television Processing
4 Research on the Application of 3D Technology in Film and Television Post Production
5 The Development Prospect of 3D Technology in Film and TV Post Processing
6 Conclusion
Reference
Research on Security Situation Analysis and Intelligent Disposal Technology of Edge Side Area
1 Introduction
2 Edge Side Area Calculation Model
3 Intelligent Level Division Calculation of Edge Computing
4 Research Motivation
4.1 Apt and Other New Attack Methods Emerge in Endlessly References
4.2 Security Risks of Cloud Computing and Big Data
4.3 The Existing Safety Protection Measures Are Difficult to Cope with the New Security Situation
5 Intelligent Disposal Technology
5.1 Network Security Situation Awareness System Architecture
5.2 Main Functions of Network Security Situation Awareness
6 Conclusion
References
Fractal Method Algorithm for Art Pattern Generation and Design
1 Introduction
2 The Basic Principle of Fractal Art Pattern Generation and Design
3 Using Periodic Function to Adjust and Generate Different Styles of Art Patterns
3.1 Fractal Distribution Composition of Patterns
4 Conclusion
References
Design and Implementation of Remote Indoor Monitoring System for Empty Nest Elderly Based on Internet of Things
1 Introduction
2 Introduction of System Development Related Technology
2.1 Android Platform
2.2 Nodes, Express and Mongodb
3 Implementation of Mobile Client in Monitoring System
4 Realization of Indoor Location Algorithm
5 Conclusion
References
Study on Fuzzy Soil Balanced Fertilization Model System Based on Neural Network
1 Introduction
2 Key Technology Principle
2.1 RBF Neural Network
2.2 Orthogonal Least Square Method
3 Research and Application of RBF Neural Network Algorithm Based on FCM Optimization
3.1 Characteristics of FCM Algorithm
3.2 RBF Neural Network Optimized by FCM Algorithm
4 Conclusion
References
Optimization and Embedded Implementation of Gesture Recognition Algorithm Based on Convolutional Neural Network
1 Introduction
2 Gesture Recognition Based on Convolution Neural Network
2.1 Gesture Recognition Process
2.2 Hand Gesture Region Reconstruction
3 Forward Propagation and Back Propagation Algorithm
4 Construction of Embedded Linux System
5 Conclusion
References
Research on BIM Assembly Building Cost Accounting Model Based on Genetic Algorithm
1 Genetic Algorithm
1.1 Overview of Genetic Algorithm
1.2 Basic Principles
1.3 Coding Problem of Genetic Algorithm
2 Cost Control Based on Genetic Algorithm
3 Building Information Model BIM
4 The Necessity of the Combination of Prefabricated Building and BIM
5 Conclusion and Prospect
References
Intersectional Leading Industry Based on Data Mining
1 Introduction
2 Overview of Image Classification
2.1 The Concept of Image Classification
2.2 The Process of Image Feature Extraction
3 Type of Classifier
4 Conclusion
References
Clustering Algorithm for the Spread of Traditional Culture in Jilin Region
1 Introduction
2 The Mode of Transmission of Chinese Traditional Culture at the Present Stage
2.1 Oral Communication
2.2 Graphic Communication
2.3 Mass Communication
3 Creative Transformation and Innovative Development: The Internal Driving Force of Traditional Culture Communication
4 Conclusion
References
Research and Implementation of Layering and Path Planning Algorithm in 3D Printing Technology
1 Layered Algorithm in 3D Printing Technology
1.1 The Concept of Stratification
1.2 Hierarchical Process and Algorithm of STL File
1.3 Hierarchical Processing Algorithm
2 The Importance of Path Planning
3 Research on Path Planning Algorithm
3.1 Research on Filling Algorithm of Offset Path Planning
3.2 Analysis of Existing Scanning Path Planning Methods
3.3 Implementation of Offset Offset Algorithm
4 Conclusion
References
Research on Smart Home-Community-Based Pension Model of Combination of Medical and Health Care Based on “Internet +”
1 Introduction
2 Analysis of the Elderly’s Needs and Preferences in Smart Elderly Healthcare
2.1 Basic Situation of the Respondents
2.2 The Elderly’s Needs and Preferences in Smart Elderly Healthcare
2.3 Build an Internet + Smart Community Pension Model Platform that Combines Medical and Health Care
3 Analysis the Obstacles of Home-Community-Based Pension Model of Combination of Medical and Health Care
4 Suggestions and Countermeasures
References
Design Problems of Bridge Pile-Soil Interaction Based on Machine Learning
1 Overview of Bridge Pile Foundation Problems
2 Mechanism of Lateral Resistance of Single Pile
3 Mechanism of End Resistance of Single Pile
4 Conclusion
References
Development of Multi-Parameter Wireless Sensor Network Monitoring System Based on ZigBee Technology
1 Introduction
2 Design of a Network Monitoring System Based on Zigbee Wireless Sensors
3 Performance Test of Wireless Sensor Network Monitoring System Based on Zigbee
4 Conclusion
References
Intelligent Logistics Based on the Internet of Things and Cloud Computing
1 Introduction
2 Logistics Model Algorithm
3 Construction of Logistics Model
4 Logistics Model Test
5 Conclusion
References
Design of Horse Health Management System Based on Wireless Network and Simulation System
1 Introduction
2 System Construction
3 Horse Epidemic Prevention and Health Supervision Application Platform
4 Performance Test
5 Conclusion
References
Design of Horse Race Registration System Based on Wireless Network and Simulation System
1 Introduction
2 Registration System Process
3 System Architecture Design
4 System Performance Test
5 Conclusion
References
Recommend Papers

2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020
 9789811617263, 9811617260

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Advances in Intelligent Systems and Computing 1379

Chuanchao Huang Yu-Wei Chan Neil Yen   Editors

2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems DPTA 2020

Advances in Intelligent Systems and Computing Volume 1379

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong

The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. Indexed by DBLP, EI Compendex, INSPEC, WTI Frankfurt eG, zbMATH, Japanese Science and Technology Agency (JST). All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/11156

Chuanchao Huang · Yu-Wei Chan · Neil Yen Editors

2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems DPTA 2020

Editors Chuanchao Huang Huazhong University of Science and Technology Wuhan, Hubei, China

Yu-Wei Chan Department of Computer Science and Information Management Providence University Taichung, Taiwan

Neil Yen University of Aizu Fukushima, Japan

ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-981-16-1725-6 ISBN 978-981-16-1726-3 (eBook) https://doi.org/10.1007/978-981-16-1726-3 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Foreword

DPTA2020 is dedicated to address the challenges in the areas of data and information engineering, thereby presenting a consolidated view to the interested researchers in the related fields. The conference looks for significant contributions to advanced data and information engineering in theoretical and practical aspects. The conference will be held in Laibin City, Guangxi Province, China during December 11, 2020. The main objective of DPTA2020 is to present the latest research and results of scientists related to data processing techniques and applications for cyber-physical systems topics. This conference provides opportunities for the delegates to exchange new ideas face to face, to establish business or research relations as well as to find global partners for future collaborations. We hope that the conference results will lead to significant contributions to the knowledge in these up-to-date scientific fields. We would like to express our thanks to Prof. Ding Yong, Guilin University of Electronic Science and Technology, and Prof. Junchi Yan, Shanghai Jiaotong University, for being the keynote speakers at the conference. We thank the General Chairs, Program Committee Chairs, Organizing Chairs and Workshop Chairs for their hard work. The local organizers’ and the students’ help is also highly appreciated. Our special thanks are due also to editors Dr. Thomas Ditzinger and Jasmine Dou for publishing the proceedings in Advances in Intelligent Systems and Computing of Springer.

v

Organization

General Chairs Xiaoming Pan, Guangxi Science and Technology Normal University, China Jianhuan Su, Hechi University, China

Program Chairs Chuanchao Huang, Huazhong University of Science and Technology, China Yu-Wei Chan, Providence University, Taiwan, China Neil Yen, University of Aizu, Japan

Publication Chairs Juan Du, Georgia Institute of Technology, USA Shunxiang Zhang, Anhui University of Science and Technology, China Wei Xiao, Shanghai University, China

Publicity Chairs Junyu Xuan, University of Technology Sydney, Australia Vijayan Sugumaran, Oakland University, USA Junchi Yan, Shanghai Jiaotong University, China

vii

viii

Organization

Local Chairs Yinjun Zhang, Guangxi Science and Technology Normal University, China Zhengjie Lu, Hechi University, China

Program Committee Members Shunxiang Zhang, Anhui University of Science and Technology, China Guangli Zhu, Anhui University of Science and Technology, China Tao Liao, Anhui University of Science and Technology, China Xiaobo Yin, Anhui University of Science and Technology, China Xiao Wei, Shanghai University, China Huan Du, Shanghai University, China Zhiguo Yan, Fudan University, China Zhiming Ding, Beijing University of Technology, China Jianhui Li, Computer Network Information Center, Chinese Academy of Sciences, China Yi Liu, Tsinghua University, China Kuien Liu, Pivotal Inc., USA Feng Lu, Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences, China Wei Xu, Renmin University of China, China Ming Hu, Shanghai University, China Abbas K. Zaidi, George Mason University, USA Amine Chohra, Paris-East University (UPEC), France Davood Izadi, Deakin University, Australia Filip Zavoral, Charles University Prague, The Czech Republic Florin Pop, University Politehnica of Bucharest, Romania Gustavo Rossi, Universidad Nacional de La Plata, Argentina Habib Shah, Islamic University of Medina, Saudi Arabia Hocine Cherifi, University of Burgundy, France Ibrahim Kamel, University of Sharjah, UAE Irina Mocanu, University Politehnica of Bucharest, Romania Jakub Yaghob, Charles University Prague, The Czech Republic Ke Gong, Chongqing Jiaotong University, China Kun-Ming Yu, Chung Hua University, Taiwan, China Laxmisha Rai, Shandong University of Science and Technology, P.R. China Lena Wiese, Universität Göttingen, Germany Ma Xiuqin, Northwest Normal University, China Oguz Kaynar, Cumhuriyet Üniversity, Turkey Qin Hongwu, Northwest Normal University, P.R. China Pit Pichapan, Al Imam University Riyadh, Saudi Arabia

Organization

Prima Vitasari, National Institute of Technology, Indonesia Simon Fong, University of Macau, China Somjit Arch-int Khon Kaen University, Thailand Sud Sudirman, Liverpool John Morres University, UK Tuncay Ercan, Yasar University, Turkey Wang Bo, Hechi University, China Yinjun Zhang, Guangxi Science and Technology Normal University, China Lu Zhengjie, Hechi University, China

ix

Contents

Application of Big Data Technology in Enterprise Financial Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hong Yan

1

Anomaly Detection Algorithm of Power Equipment Operating Environment Monitoring Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Pin Xia

7

Application of Artificial Intelligence Technology in Electrical Automation Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chunhong Zhao, Li Chen, and Jiehua Zong

15

Research on the Boundary and Extension of Network Publishing in Network Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Beibei Cao

21

Denoising 3D Metallic Deposits Seismic Data of Ashele Mining Camp by a Combined Domain Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiangbo Gong, Xiaojie Wan, Zhuo Xu, and Zhiguo Meng

31

Simulation Study on Layout Optimization of Urban Public Charging Infrastructure Based on Electric Vehicle Charging Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Zhang, Yunlin Liang, and Pengfei Wu Research on Urban Spatial Structures in Enclave-Type Regions Based on Urban Gravity—Taking Jingyuan County as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liang Cheng The Research on Personal Information Security Protection in Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jinlan Guo

41

51

61

xi

xii

Contents

The Application of Computer Communication Technology and Electronic Information in Artificial Intelligence Field . . . . . . . . . . . . Ting Cao

69

The Research on Optimization Strategy of Wuhan Tourism Transportation System Under the Background of Smart Tourism . . . . . Juan Huang

77

The Application of Computer Communication Technology in Electronic Information Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yuan Cao

85

Numerical Study of Lateral Bearing Capacity of Conical Composite Pile Based on Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yixin Yang, Jinbi Ye, Chuanxiong Hong, Chaozi Chen, Liyu Lian, and Lanyu Mao

93

Coupling Model of Adsorption Capacity-Temperature-Pressure and Its Prediction for Methane Adsorption on Coals . . . . . . . . . . . . . . . . . Wenping Jiang, Qun Zhang, and Baigen Liu

103

The Application and Development of Network Technology in College Physical Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shuang Zhang and Mairu Liu

115

The Practical Research on the Teaching Reform of College Sports Information in the “Internet+” Era . . . . . . . . . . . . . . . . . . . . . . . . . . Shuang Zhang and Mairu Liu

123

The Cultivation Research of Management Accounting Talents in Universities Under the Background of Artificial Intelligence . . . . . . . . Hongli Jin

131

Design and Management of Students’ Homework of Advanced Mathematics Based on Online Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . Min Sun and Xiaomin Tang

139

The Application of Computer Information Technology in Environmental Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoning Fu

147

Evolution Characteristics of the Urban Spatial Pattern of Enclave-Type Regions Based on Data Analysis Technology . . . . . . . . . Liang Cheng

155

The Application of Internet in the Educational Management of College Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jie Zhao

165

Contents

xiii

The Research on Cultural Communication Path Based on Big Data Analysis Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Huijun Liu, Nianqing Tang, Jie Zhuang, Yujie Ma, and Jianyu Wang

173

The Innovative Application of “Supply Chain + Agriculture” in Hunan Agriculture from the Internet Perspective . . . . . . . . . . . . . . . . . Nianqing Tang and Huijun Liu

181

Research on the Development of Modern African Legal Culture Based on Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ya Wang

189

Characteristics of Energy Consumption and Energy Saving Potentiality of Hotel Power System Based on Big Data of Electrical Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiang Fang, Yi Wang, Zhiqing Sun, Lin Xia, and Jian Jiang Artificial Intelligence Random Forest Algorithm and the Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yan Huang and Xiong Zhou Optimization Path of Coal Equipment Management Based on Information System from the Perspective of Large Data Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Feng Meng, Zhen Ding, and Yunjie Jia Power Marketing Inspection and Anti-stealing Power Based on the Clustering and Correlation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . Weimin He Testing Methods of Computer Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qichao Shan

197

205

215

225 231

Application of Data Processing Analysis in Microbial Identification of Fermented Food . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yan-chun Ruan and Ning-hai Liu

239

Data Architecture of Monitoring Platform for Marketing Operation Under Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lei Zhao, Junhua Deng, Hai Zhu, and Yan Zhu

249

Volatility Modeling of S&P500 Returns: A Comparative Study of GARCH Family Models and VIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xinran Liu

257

Review on the Lightweight Materials for Robots in Coal Mine . . . . . . . . Xiao Huang, Guanya Xie, Chunhao Li, and Guohua Li Optimization of Management and Control Strategy of Security Vulnerabilities in Power Monitoring System . . . . . . . . . . . . . . . . . . . . . . . . Rui Bai, Hao Tian, and Qian Zhang

265

271

xiv

Contents

Application of Operations Research Models and Algorithms in Intelligent Logistics System Parks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Long Zhang and Jieshun Li

277

Software Proof Security Mechanism Based on Internet of Things Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jing Chen

285

Research on the Competitiveness of Thailand Golf Tourism Industry Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ke Sun, Chih-cheng Fang, and Hui Du

291

Simulation and Research of Multi-machine Automatic Stamping Production Unit Based on Robot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Songqing Liu and Ying Chen

299

Application of Internet of Things Technology in Artificial Intelligence Image Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Aixia Hou

307

A Review of Computer Technology in TCM Transmission and the Teaching of TCM Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xinyu Duan and Yongmei Peng

315

Intrusion Detection Technology of Internet of Vehicles Based on Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rongxia Wang

323

The Development of Financial Intelligence Driven by Financial Technology in the Background of Artificial Intelligence . . . . . . . . . . . . . . Wangsong Xie

331

Analysis of Human Factors in Hazardous Chemical Storage Accidents Based on HFACS and Bow-Tie Model . . . . . . . . . . . . . . . . . . . . . Wei Jiang, Wei Han, Mingqing Su, Jiankai Zhou, Zhishun Huang, Xueqing Zhou, and Haotang Zhang Research on the Control System of Intelligent Discrimination of Electricity Stealing and Omission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chang Su, Chao Yang, and Cong Tian

339

347

Ancient Literature and Art Based on Big Data . . . . . . . . . . . . . . . . . . . . . . Luchen Zhai

357

Analyze Ming and Qing Literature Under Big Data Technology . . . . . . . Qinglv Huang and Liang Yan

367

Training Strategy of China’s New Industrial Workers Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoxu Liu and Qinglan Luo

375

Contents

xv

Development Trend of Enterprise Human Resource Management Driven by Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . He Yu, Yanli Li, and Qinglan Luo

383

Teaching Idea Reform and Regulation Innovation of Economic Law Course Based on Big Data Technology . . . . . . . . . . . . . . . . . . . . . . . . . Xinran Zheng and Caiping Qin

391

Cake Customization System Based on Unity3d . . . . . . . . . . . . . . . . . . . . . . Shuaibin Wang and Mingsi Sun

401

Design and Inheritance of Iron Painting Intangible Cultural Heritage Based on Modern Information Technology . . . . . . . . . . . . . . . . . Li Ma and Bin Wang

407

Mobile Violation Detection Robot for Expressway Based on Machine Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Juan Shao

415

Network Data Processing Based on Cloud Computing Platform . . . . . . . Dapeng Zhou and Yong Zhu

423

Construction of Green Logistics Evaluation System for Agricultural Products Cold Chain Based on Data Analysis . . . . . . . . Lu Zheng

431

A Study on Virtual Reality Technology for College Oral English Online Self-help Learning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenjuan Dong and Guoliang Wang

439

Construction of Motivation Analysis Model for College Students’ Online Information Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qiusheng Hu and Zhenyu Lai

447

Design of Parallel Power Supply System Controlled by DSP and MCU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ruihan Li

457

Badminton Trajectory Tracking Based on D-H Kinematics Model . . . . . Xiaocheng Wang

465

Fuzzy Evaluation Model for Oral English Test Based on Automatic Scoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haibin Liu

475

Changes in the Operation Mode of Real Estate Investment Trusts in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lu Xiao

485

xvi

Contents

Construction of Music Teaching Effect Evaluation Model Based on 5G Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Miao Zhang and Hongjuan Zhang

493

On the Demand for Financial Science and Technology Talents Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zesen Xiong

501

Application of Big Data in Corporate Internal Control . . . . . . . . . . . . . . . Jinwei Zhang and Zesen Xiong

509

The ATR Algorithm for Reactive Power/Voltage in Power Grid Based on AVC Control Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changle Yu, Shengjun Qiu, and Shuo Zhang

515

Design of Distribution Automation System and Terminal Conforming to IEC61850 Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shengjun Qiu, Changle Yu, and Shuo Zhang

523

Intelligent Automated Operation and Operation Management of Large Enterprise Cloud Data Center Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guoli Feng and Ang Li

531

Efficiency Evaluation of Main Ports in the Bohai Rim Region Based on Data Envelopment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Lin and Beibei Zhu

539

Analysis of Port Efficiency and Influencing Factors Based on DEA-Tobit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Beibei Zhu

547

Spectrum Allocation Technology of Elastic Optical Networks Based on Power Business Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xian Yang

555

Construction of Information Teaching Mode in the Universities Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Binbin Yu

563

Analysis of the Impact of Cloud Computing-Based Financial Development on Employment Growth in the Era of Big Data . . . . . . . . . Penghui Fu

569

Influence of Human Capital on Consumer Expenditure Under Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiuli Shi

577

Contents

The Impact of Changes in RMB Real Effective Exchange Rate Based on Cloud Computing Technology on Employment in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lingyan Zhang

xvii

583

Classification Rule Maintenance Method Based on Incremental Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tongfei Shang, Junfeng Geng, Jingwei Yang, and Jiaqing Zhao

589

Support Vector Regression Prediction Method of Text Data Based on Correlation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jianfeng Ma, Tongfei Shang, Jingwei Yang, and Jiaqing Zhao

595

Is Virtual Currency a Standard Financial Bubble? Blockchain Industry Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qian Wang

603

Application of Air Traffic Control Communication, Navigation and Surveillance Equipment in the Aviation Field Based on Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tao Shu VR Technology in Physical Education from the Perspective of 5G . . . . . Quanan Gui

611 621

Big Data and VR Technology in University Sports Stadium Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rufei Ma

629

Artificial Intelligence Simulation System in Sports Training Under VR Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ziying Sheng and Kai Wen

635

The Application Status and Future Prospects of Computer-Based Social Media in the Sports Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhong Wu and Chuan Zhou

643

Computer Technology in the Network Construction and Practice of Management Equipment in Gymnasium . . . . . . . . . . . . . . . . . . . . . . . . . Qian Zhang

651

Citespace-Based Live Broadcast Legal Issues in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sisi Chen

659

Application of Embedded Intelligent Monitoring Chip Based on Internet of Things Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ruoyan Xia

669

Analysis of SDN Multi-controller Placement . . . . . . . . . . . . . . . . . . . . . . . . Xinzhi Tian, Haijie Shen, Xiaofan Chen, and Caihong Li

677

xviii

Contents

A Novel Sentiment Classification Architecture Based on Self-attention Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rui Zhang, Binbin Chen, and Hongbo Tang

685

A Novel Dynamic Corporate Credit Rating Classification and Analysis Model Based on Self-attentive Mechanism . . . . . . . . . . . . . . Binbin Chen, Rui Zhang, Long Chen, and Hongbo Tang

693

Innovation and Influence of Fresh Supply Chain Operation Mode Under COVID-19 Based on Network Data Analysis . . . . . . . . . . . . Caiyu Shi

703

A Louvre Emergency Escape Model Based on Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenwen Cao

713

Ubiquitous Power Internet of Things and IPv6 Technologies in Wireless Access Terminals and Intelligent Meter Reading Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Liang Dong, Yan Zhuang, Jie Xu, Hao Xu, Yue Guo, Ning Xu, Liang He, and Jie Wang

725

Fast Ultrasonic Testing Technology of Steel Plate Based on Drum Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zicheng Qi, Guobin Zhang, Ruolan Wang, and Xiangqun Xu

735

A Bearing Fault Diagnosis Method Based on Optimized Hierarchical Extreme Learning Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . Yijin Liu

745

Construction of Urban Smart Sports Tourism Service Platform Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chang Chen and Kewei Yu

751

Communication Effect of Traditional Minority Sports Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yang Li, Ting Yuan, and Kewei Yu

759

Optimization of Human Resource Management in Small and Medium-Sized Enterprises Based on Artificial Intelligence . . . . . . . Fuzhang Tian

767

Legal Dilemma and Outlet of Privacy Protection in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xueping Liu

775

Legal Nature of Artificial Intelligence Products . . . . . . . . . . . . . . . . . . . . . . Xueping Liu

783

Contents

xix

Application Status and Prospect of Artificial Intelligence Big Data in Stadium Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jianmin Ding, Chang Chen, and Kewei Yu

791

Training Model of Applied Talents in Universities in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shaobiao Deng

799

A Mobile Data Recovery Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jinyu Liu and Luhan Wang

807

Construction of Wisdom Logistics System Based on Supply Chain for Intelligent Manufacturing in Post-epidemic Era . . . . . . . . . . . . Jing Wang and Suhua Yang

813

Performance Improvement and Evaluation of Computer Communication Network Based on Artificial Intelligence . . . . . . . . . . . . . Wei Huang

821

Network Security and Countermeasures from the Perspective of Overall National Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yin Dan

829

Education Informatization: An Effective Way to Promote Educational Equity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Luyao Zhang and Yun Zhou

837

A Comprehensive Energy Consumption Measurement Model for Building Envelope Components Based on Thermal Imaging Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xingzuo Yue and Lei Wu

847

Computer Financial Accounting Information System for International Trade Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wenwen Yang

855

Information Security of Internet of Things Based on Perception and Interaction Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Haijun Huang

865

Enlightenment of MOOCS Teaching Method in the Practical Course of Radio and TV Editing and Directing . . . . . . . . . . . . . . . . . . . . . . Yao Huang

871

Application of MOOC Teaching Mode in the Practical Course of Editing and Directing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yao Huang

879

The Impact of Big Data Technology on International Trade . . . . . . . . . . . Luanping Zhou and Yaling Fu

889

xx

Contents

Challenges and Countermeasures of International Trade Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping Ju The Application of Big Data Analysis Technology in the Value Evaluation of Cultural Enterprises—Taking the Value Evaluation of Wanda Film Co., Ltd. as an Example . . . . . . . . . . . . . . . . . . Haijun Kang Online ESP Translation Teaching Via Mobile Translation App . . . . . . . . Xiang Li and Juan Liu Stock Forecasting Based on BP Neural Network Optimized by Improved Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . Xueyan Zhang Summary and Analysis of Typical Technologies in 5G . . . . . . . . . . . . . . . . Wei Qin

897

905 915

923 929

Application of Information Technology in Economic Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhongzhen Qiu

937

Data Analysis of Marketing Development Status Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yishu Liu

945

Challenges and Corresponding Strategies of Network Marketing in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yishu Liu

953

Design of Kiwifruit Orchard Temperature Information Real Time Acquisition System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zuliang Wang, Chenhui Li, and Shi Zhao

961

Design of Fruit Florescence Tracking and Classification Management Based on RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shaofei Wang, Zuliang Wang, and Chenhui Li

967

Design of Automatic Intelligent Water Saving System for Faucet . . . . . . Ting Zhang, Lianglin Li, Mengjie Wang, and Binxin Wang

973

On the Development of Computer Technology in Music Education Under the Background of 5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chen Wang

979

Research on Multiple Features and Performance of Visual Communication Design Based on Digital Media Environment . . . . . . . . Hongbo Sun

987

Contents

New Model of China’s Financial Field Based on Cloud Computing and Big Data Under the Background of Digital Economy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yanni Zhao

xxi

997

China’s Financial Poverty Alleviation Mechanism Under the Background of Digital Economy Based on Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005 Yanni Zhao Optimization of Intelligent Elderly Care Industry Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013 Yifan Ji A Super Resolution Algorithm Based On Content Regional Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021 Xinyi Liang, Kaiyan Zhou, Chenlei Lv, Xin Zheng, and Qian Yin Construction of Dynamic Early Warning Mechanism for Economic Risks Based on Hybrid Ant Colony Algorithm . . . . . . . . . 1031 Jingbo Yu Analysis of Medical Image Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041 Xiaoli Wang, Zhanbo Liu, and Kui Su Surface Defect Recognition Classification Based on Multi-Scale Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1047 Zhengcun Wang, Zhongjun Xiao, and Zhilong He Application of Blockchain Technology in Short Video Ecosystem . . . . . . 1055 Bin Ye and Gang Chen Safety Management of Prefabricated Building Construction Based on BIM-RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065 Jie Li and Xionghui Wu Energy-Saving Transformation of Rural House Enclosure Structure in Yichang Based on DeST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073 Jie Li and Jing Yuan Automatic Adjustment Method of Urban Deceleration Belt Based on Intelligent Sensor Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Lingzhen Sun, Haozi Zhou, Chujie Zhu, Haitong Qiu, and Jiankun Deng Analysis of Yunnan Flower Logistics Demand Based on Grey GM (1, 1) Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089 Pingping An Signal Interpretation of Magnetic Resonance Technology Based on Compressed Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097 Li Li

xxii

Contents

Modeling and Simulation of Neutral Grounding Operation Mode of 10 kV System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103 Beibei Song Development and Change of Computer Science and Technology in Big Data Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111 Jian Huang and Zichen Bai Algorithm Design of Computer Aided Traditional Art Pattern Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1117 Lin Pan Product Modeling Innovation Design Method Based on Evolutionary Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1123 Peng Cong Optimization of Labor Value and Relationship Distribution Under the Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1131 Ding Yingying Mobile Data Security Detection Technology Based on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137 Xin Lu, Mingchen Du, Lin Pang, Xingpei Wu, and Meiming Fu Construction of Art Design Based on Newton Iterative Algorithm . . . . . 1143 Lin Pan Fault Location for Small Current Grounding System Based on Injection Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149 Xingyuan Li Movement Arrangement Auxiliary Systems Design for Cheerleading Complete Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155 Wang Peng Mathematical Model of Genetic Algorithm Based on Pattern Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163 Jingyou Zhang Optimization of Database Security Mechanism in the Supporting Platform of Distance Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1169 Xiao Yin Legal Issues of SaaS Model in Cloud Computing . . . . . . . . . . . . . . . . . . . . 1177 Fen Li Network Security and Computer Virus Prevention in the Internet . . . . . 1183 Liang Zhao

Contents

xxiii

Evaluation of Human Resource Management Benefit Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189 Zhi Li Application of Deep Learning in Keyword Extraction in English and American Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1193 Haimin Qian Deep Learning for Copyright Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1199 Chunlan Wu and Honghua Zhu Algorithm Design and Function Realization of Home Decoration Design Software Based on BIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205 Zhang Lantu Intelligent Back Analysis of Geotechnical Mechanical Parameters Based on Differential Evolution Algorithm . . . . . . . . . . . . . . . 1211 Xiu Zhang and Li Zhang Research on Virtual Human Animation Based on Motion Capture Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1217 Yan Zhao Prediction and Analysis of the Relationship Between Porous Structure and Strength of Concrete Based on Artificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1223 Chaohua Zhao Effectiveness Evaluation of Business English Practice Teaching Based on Decision Tree Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1229 Hongmin Nie Back Analysis and Numerical Simulation of Surrounding Rock Parameters of Tunnel Close Construction Based on PSO-BP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1237 Yang Chen Design of Machine Vision Teaching Experiment System Based on HALCON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1245 Peng Cong BP-Neural Network for Business Administration . . . . . . . . . . . . . . . . . . . . 1251 Yan Dong Research on Performance Monitoring of PPP Project Based on Genetic Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257 Xiaoke Gu and Hui Chen Experimental Study on Calibration Model of Vehicle Bridge Coupling Vibration Algorithm for Highway Bridge . . . . . . . . . . . . . . . . . . 1265 Qiang Lu

xxiv

Contents

Innovation of Employment and Entrepreneurship Education Based on K-means Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 1273 Zhongguo Lv Green Building Analysis and Carbon Emission Calculation Based on BIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281 Li Rao Language Recommendation Algorithm Serves the “Belt and Road” Strategic Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1287 Chunlan Wu Statistical Analysis of Ecological Mathematical Model Based on Differential Equation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1293 Jingyou Zhang Research on Parallel Finite Element Algorithm Based on PVM and Its Implementation in Geotechnical and Underground Engineering Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1301 Xiu Zhang and Li Zhang Data Mining for Badminton On-the-Spot Tactics Analysis System . . . . . 1309 Haifu Li Integral Factor and Conserved Quantity of Lagrange System Based on Fractional Order Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1317 Juqing Liu Multi Objective Optimization of Construction Project Based on Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1325 Jin Chen On the Early Warning of Internet Financial Risk Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331 Yangfeng Hu BP Neural Algorithm for Mode of Scientific Protection of Art Heritage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337 Xiaona Xie and Yitong Yang Research on the Development of Artificial Intelligence into VR Practice Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1351 Ning Ding Fatigue Measuring System Using Wearable Sensor . . . . . . . . . . . . . . . . . . 1357 Qiangqiang Fan and Hyoung SungEun Study on the Growth of Bionic Mineralized Coating Induced by Different Magnetic Field Strength . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1365 Chenyang Xu and Yan Ji

Contents

xxv

Anti-opening Measures for Pre-fabricated Cable of Secondary Circuit of Current Transformer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1373 Shijiang Yang, Xiaoxia Cao, Jiawei Li, Yiheng Zhao, Yachang Guo, and Yaode Huang WSR Algorithm for the Campus Cheerleading . . . . . . . . . . . . . . . . . . . . . . 1379 Xin Feng Model and Algorithm of Logistics Distribution Path in Model and Algorithm of Logistics Distribution Path in B2C e-Commerce Environment Based on Genetic Algorithm . . . . . . . . . . . . . . 1387 Peng Guo and Xueli Zhang Dynamic Learning of Cheerleading Rehearsals Based on Moodle2.0 Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1393 Linna Hua The Application of Financial Analysis Model Based on SAS in Enterprise Financial Decision-Making Process . . . . . . . . . . . . . . . . . . . . 1399 Tao Huang and Yang Liu The Development of Excellent Courses of BP Neural Network Teaching Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1405 Pinzhu Jiang Consumption Pattern of Tourist Souvenirs Based on Apriori Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1411 Yizhi Jiang and Xi Li Influence of Improved Apriori Algorithm on Predictive Public Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1417 Min Kuang and Lingling Qu Research on Security Detection and Response Technology of Edge IOT Agent Based on Behavior Analysis . . . . . . . . . . . . . . . . . . . . . 1425 Jiyuan Li, Changhua Sun, and Hong Xu Design of Ceramic Art Design Assistant Teaching System Based on Cloud Computing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1431 Qi Li and Yizhi Jiang Virtual Reality Chinese Teaching System Based on Deep Learning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1437 Qian Li Application of Cloud Computing in Ceramic Design . . . . . . . . . . . . . . . . . 1443 Shuai Li Design of English Teaching Post Competency Evaluation System Based on K-means Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 1449 Wei Li

xxvi

Contents

Design of Electrical Automation Engineering Control System . . . . . . . . . 1455 Xingyuan Li Fault Detection Method of Electrical Automation Equipment Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1461 Mengdan Lin Traffic Signal Machine Learning Controller Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1467 Hui Liu Design and Implementation of Cloud Computing Platform Monitoring System Based on Nagios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1473 Jia Liu, Chengzhang Qu, and Tianhong Zhou Research on Medium Voltage Distribution Network Planning Method Based on Improved Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . 1479 Xingdong Liu, Daolin Xu, Hui Peng, Xiaochuan Xu, and Huideng Liu Design of Incomplete 3D Information Recognition System Based on SIFT Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1485 Zhendong Liu Real-Time Detection Technology of URL Attack Behavior Based on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1491 Xin Lu, Kang Wang, Bo Xu, Shuming Xu, and Pei Wang Application Value and Path of Computer Technology in Student Management in the Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1497 Yanmei Lyu, Yizhuo Zhang, and Camiwet David Application of Computer Technology in Engineering Cost Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1503 Suofeiya Ma and Yiju Wang Short Term Power Load Forecasting Based on Meteorological Accumulation and AcA-GRNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1509 Yiming Ma, Yongliang Li, Rui Ma, and Dongge Zhu Reform and Practice of Traditional Chinese Medicine in Information Teaching Method Promoted by ID3 Algorithm . . . . . . . . 1515 Shumin Mao Research on the Development and Application of Sports Video Analysis Platform in Sports Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1521 Zili Niu and Fei Wang Calligraphy Teaching System in Primary and Secondary Schools Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1527 Xuxia Ouyang

Contents

xxvii

Automatic Generation Algorithm of Electrical Wiring Diagram for Distribution Network Based on Topology Stratification . . . . . . . . . . . 1533 Lin Qiao Neural Network Prediction Model of Real Time Data of Thermal Power Plant Based on L-M Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1539 Yanfang Qiao The Design and Application of Dance Teaching System Based on Moodle Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1545 Jianxing Shi Remote Digital Management Resource Base Mode Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1551 Meie Shi Research on Post Production of Film and Television Based on Computer 3D Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1557 Zaijun Song Research on Security Situation Analysis and Intelligent Disposal Technology of Edge Side Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1563 Xin Sun, Jiyuan Li, and Qinyuan Li Fractal Method Algorithm for Art Pattern Generation and Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569 Yulin Tan Design and Implementation of Remote Indoor Monitoring System for Empty Nest Elderly Based on Internet of Things . . . . . . . . . . 1575 Yan Tang Study on Fuzzy Soil Balanced Fertilization Model System Based on Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1581 Zheqing Tang, Shan Ning, Xiqiang Sun, and Qiuduo Zhao Optimization and Embedded Implementation of Gesture Recognition Algorithm Based on Convolutional Neural Network . . . . . . 1587 Hong Wang, Liyuan Chang, Lina Yu, and Xiangli Dong Research on BIM Assembly Building Cost Accounting Model Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1593 Huan-yu Wang Intersectional Leading Industry Based on Data Mining . . . . . . . . . . . . . . 1599 Liming Wang Clustering Algorithm for the Spread of Traditional Culture in Jilin Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1605 Ping Wang

xxviii

Contents

Research and Implementation of Layering and Path Planning Algorithm in 3D Printing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1611 ShanShan Wang Research on Smart Home-Community-Based Pension Model of Combination of Medical and Health Care Based on “Internet +” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1617 Caifen Han, Lei Liu, and Caixin Han Design Problems of Bridge Pile-Soil Interaction Based on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1623 Wenyu Xu Development of Multi-Parameter Wireless Sensor Network Monitoring System Based on ZigBee Technology . . . . . . . . . . . . . . . . . . . . 1633 Jun Lu Intelligent Logistics Based on the Internet of Things and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1643 Zhengnan Wu Design of Horse Health Management System Based on Wireless Network and Simulation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1653 Shuang Zhang and Mairu Liu Design of Horse Race Registration System Based on Wireless Network and Simulation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1661 Shuang Zhang and Mairu Liu

Application of Big Data Technology in Enterprise Financial Management Hong Yan

Abstract The emergence of the Internet technology and mature, the social economy into the era of big data. Not only have many emerging industries emerged, but they have also brought new development opportunities to many traditional industries. Financial management in enterprise management is very important. How to better manage financial management of enterprises in the context of big data is a question that every enterprise should consider first. This paper first describes the concept of big data and its application in the background of financial management, then studies the important role of big data in corporate financial management, then discusses the problems existing in corporate financial management under the background of big data, and finally discusses how to enhance the specific strategy of corporate financial management. Keywords Big data · Enterprise financial management research · Corporate financial accounting The significance of data refers to the use of certain information technology methods, the collected data to sort out, and on this basis for scientific analysis, the analysis results applied to financial management, and ultimately to effectively improve the level of enterprise financial management results. In practical application, big data, from a perspective, avoids the constraints of traditional management concepts on consciousness, and can provide guidance for enterprises to make decisions by analyzing and fully mining the data [1]. On the other hand, big data can comprehensively predict and analyze big data. On the other hand, big data can comprehensively predict and analyze big data. Let the enterprise avoid some potential risks. If big data is applied to enterprise financial management, the transformation of enterprise financial management can be realized, and the financial management can be further promoted to play its due role in enterprise management.

H. Yan (B) Shandong Institute of Commerce & Technology, Jinan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_1

1

2

H. Yan

1 The Connotation of Big Data and Its Application Background in Financial Management (1)

Connotation of big data

Big data is the product of Internet technology. It refers to the integration, analysis and transmission of chaotic data information through new computing and processing methods, and then provides scientific guidance for data users to make decisions. In the context of economic globalization, competition in the economic field is becoming more and more fierce. If enterprises want to obtain better development opportunities, they must have a full understanding of their actual situation. Financial management is of great importance to business management. With the advent of big data, enterprises should follow the trend of The Times and give full play to the advantages of big data in data processing, integration and output, so as to provide impetus for the sustainable development of enterprises [2]. (2)

The application status of big data in enterprise financial management

Data technology has been used in many industries since its emergence. As far as corporate financial management is concerned, it has brought a strong impact on traditional financial management methods and puts forward new requirements for corporate financial management. Big data integrates the data used in corporate financial management and analyzes it in multiple dimensions, which not only improves the effectiveness of corporate financial management, but also makes corporate financial decisions more precise, thereby reducing the cost of financial management. So, many companies are trying to improve their financial management in the context of big data to help improve their competitiveness.

2 The Impact of Big Data on Corporate Financial Management (1)

Impact on corporate financial accounting

In the traditional corporate financial accounting, the reimbursement processing of corporate expenses and the processing of sales and purchase transactions all start from the inspection and entry of invoices and contracts. There are also companies that use manual ledger accounts for accounting. The efficiency of corporate financial management is relatively low. In the era of big data, enterprises can choose to buy some software equipment, such as code scanners, make certain marks on pre-prepared bills or contracts, and then scan the one-time entry system by the corresponding hardware equipment, thereby greatly shortening Time required for financial accounting. Not only that, when further accounting, big data can collect some basic data, and can be divided into categories, and can also perform financial accounting

Application of Big Data Technology in Enterprise …

3

during non-working hours, which not only reduces labor expenses, but also reduces the possibility of errors [3]. (2)

Impact on the financial management level of the enterprise

In the context of the advent of big data, enterprise financial management can be completed through the financial management system, so the efficiency of financial management has been significantly improved. In the financial management system, there are not only professional financial management modules, but also some auxiliary modules. These modules are especially professional and can greatly improve the level of financial management of enterprises. (3)

Impact on corporate financial decisions

Based on large data, construct the framework of financial management system to classify most of the problems in the enterprise financial management. The business activities of the enterprise are composed of different links. The financial data that appear in these links will be carried out by the financial department Collect, if there is a financial problem in a certain link, the financial management system will classify the problem, analyze the cause of the error and avoid this error from recurring.In addition, the financial management system can also put forward corresponding solutions and record, which can improve the scientific nature and accuracy of enterprise decisions.

3 Problems in Enterprise Financial Management Under the Background of Big Data (1)

The lack of corporate financial management concepts

This factor in market plays a decisive role in the allocation of resources. If enterprises want to gain more market share, they must have a correct understanding of the laws of the market and timely understand market information. The internal staff of the enterprise is dealing more with daily financial information when performing financial management. Little is known about the development trend of finance. The concept of financial management also needs to be reformed. The failure to collect and analyze financial data makes financial management difficult Many changes have taken place in the transformation of corporate financial management [4]. (2)

Lack of relevant technical talents

The wide application of Internet technology has brought convenience to people, but also exacerbated the imbalance between talents and actual needs. Lack of technical personnel has become an important factor restricting the improvement of enterprise financial management level. When the era of big data comes, the enterprise’s workflow and system will change greatly. Some companies are not ready. The existing financial management system can not meet the needs of practical development

4

H. Yan

factors. Enterprise financial management personnel need to possess professional information knowledge, and be able to operate analytical software proficiently, and discover the development direction of financial management work from data analysis. (3)

Lack of effective financial management software

The development of Internet technology in the field of enterprise financial management application can greatly improve the level of enterprise financial management, but at present many enterprises still do not pay enough attention to software upgrade, software version is still difficult to meet the actual needs of financial work. In addition, because the construction of financial management software requires a lot of capital investment, in order to save money, many companies have not included software development in their plans, and work efficiency has always been difficult to improve [5]. (4)

Big data background increases the technical difficulty of enterprise financial management

Although enterprises generate a lot of financial information every day, many companies do not have the technology for information integration and analysis, which results in a waste of data resources. In addition, there is no effective procedure between the organizational structure of the enterprise, and the division of labor is relatively vague. Once a problem occurs, it is difficult to blame.

4 The Strategy of Financial Management Level in the Context of Big Data (1)

Train financial personnel, collect and analyze financial data

In the context of big data, in order to better carry out financial management work, financial personnel should be provided with systematic training and a professional data analysis team should be established to ensure that the company’s financial management work can be carried out with patents. In addition, companies should provide financial managers with a learning platform and give them more development opportunities and growth paths. Talent is an important means to improve the competitiveness of an enterprise. If an enterprise wants to achieve sustainable development, it must be backed by highly qualified professionals. Data aggregation is the foundation of the development of big data technology. The lack of data may lead to errors in analysis results. The computer can save all the data, prevent the loss of important information, and make the data analysis more complete and accurate. The financial staff of the enterprise should ensure the collection and recovery of data, and conduct further analysis on this basis, and continuously provide corresponding help for the enterprise’s financial decision-making.

Application of Big Data Technology in Enterprise …

(2)

5

Take advantage of big data and establish a financial supervision mechanism

Under the background of big data coming, the enterprise’s financial work cannot leave the big data to help. Through the collection and analysis of financial plan activities, activities can be effectively controlled. First, establish a forecast index system according to the strategic development goals of the enterprise, and implant it into the financial management system through a certain information language, and improve the big data early warning model through the corresponding auxiliary procedures. Secondly, if the plan has a realistic possibility, the company’s financial personnel must carry out timely monitoring, and if a problem occurs, it needs to be resolved in a timely manner. Finally, big data technology can analyze the implementation results of the program on the basis of combining relevant data, and provide certain reference opinions for the further development of enterprises [6]. (3)

Strengthen data governance

In the context of big data, one of the most obvious characteristics of corporate financial management is the large amount of data that is exposed every day. This can provide a certain basis for corporate decision-making, but not all information is valuable in actual work. All the information is absorbed, but it will make the effect of financial management more efficien Therefore, for financial management in the context of big data, you can set up corresponding identification procedures in advance to distinguish between internal and external data, and choose information that is closely related to yourself, such as industry information, policy conditions, business development, etc. Information that has nothing to do with itself can be ignored directly [7]. In addition, enterprises should also strengthen the connection between financial management and business management activities, such as combining business activities, human resource changes, and financial modules, so as to ensure that financial management is more effective. (4)

Innovative enterprise financial risk management model under big data

Economic development is changing rapidly, and companies must avoid potential risks in production and operation in order to achieve longer-term development. The traditional financial management method is not strong enough to avoid the risk, can not carry out good risk management. Therefore, it is necessary to innovate the financial risk management mode. Enterprises need to carefully evaluate the possible financial risks in financial management, learn advanced risk management concepts and methods, and develop corresponding risk prevention methods according to the predicted results, so as to ensure that losses will be minimized when risks come. The emergence of the Internet has brought a lot of information resources to the development of enterprises, but it is necessary to screen the complex and unknown information. If you choose some irrelevant or wrong information, not only does the enterprise not help you, but it will also have a certain obstacle [8]. At the advent of the era of big data, traditional financial management methods can no longer meet the actual needs of enterprise development, we must pay great attention to the innovation of financial management. In the realistic financial management

6

H. Yan

of enterprises, big data technology must be fully applied, so that it can really play a role, and better use the advantages of data technology in financial management. In addition to this, the overall quality of the financial management personnel must be improved to ensure that the enterprise is developing steadily.

References 1. Zou, L.: Research on the transformation of enterprise financial management under the background of big data. Bus. News 16, 36–37 (2020) 2. Xue, W.: On the challenge of enterprise financial management under the background of big data. Chin. Foreign Entrepreneurs 14, 58 (2020) 3. Zhou, X.: On the strategy of doing a good job in financial management of enterprises under the background of big data. Account. Chin. Township Enterprises 04, 234–235 (2020) 4. Lin, T., Kang, J.: Discussion on enterprise financial management model under the background of big data. In: Proceedings of 2020 International Conference on World Economy and Project Management (WEPM 2020), Institute of Management Science and Industrial Engineering, pp. 248–252 (2020) 5. He, R.: Research on the development of enterprise financial management under the background of big data. In: Proceedings of 2019 International Conference on Global Economy and Business Management (GEBM 2019), Institute of Management Science and Industrial Engineering, pp. 216–220 (2019) 6. You, M.: Research on innovation strategies of enterprise management mode in the background of big data era. In: Proceedings of 2019 International Conference on Emerging Researches in Management, Business, Finance and Economics (ERMBFE 2019), Institute of Management Science and Industrial Engineering, pp. 831–834 (2019) 7. Duan, D.: Research on optimization of enterprise innovation management mode in big data era. In: Proceedings of 2019 4th International Symposium on Management, Economics, E-business and Marketing (ISMEEM 2019), Institute of Management Science and Industrial Engineering, pp. 218–223 (2019) 8. Chen, X.: Research on the optimization of financial management system in chinese universities based on big data technology. In: Proceedings of 2019 6th International Conference on Machinery, Mechanics, Materials, and Computer Engineering (MMMCE 2019), Institute of Management Science and Industrial Engineering, pp. 459–463 (2019)

Anomaly Detection Algorithm of Power Equipment Operating Environment Monitoring Images Pin Xia

Abstract The monitoring of the operating environment of power equipment is of great significance to ensure its stable and reliable operation. With the development of technology, traditional manual monitoring has gradually changed to equipment monitoring. Through the detection algorithm, the collected monitoring images can be quickly analyzed and processed to confirm the specific conditions of the current operating environment of the device and promptly warn of abnormal conditions in time. Cable equipment environmental monitoring mainly includes personnel detection, cable break status detection, fire detection, etc. The detection algorithm is researched and analyzed according to these situations. Keywords Power equipment · Environmental monitoring · Image anomaly detection · Algorithm

1 Introduction The stable operation of power equipment is inseparable from the reliable external environment. To this end, technicians need to set up corresponding monitoring devices, combine image processing technology with monitoring equipment, realize the identification and processing of the monitoring area equipment image or area image, automatically identify the changes in the environment within the monitoring range, and make reference to abnormal references Intelligent alarms are of great significance to ensure the stable operation of power equipment.

P. Xia (B) Chongqing Vocational College of Transportation, Chongqing 402247, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_2

7

8

P. Xia

2 Technology Development Status Based on Image Abnormal Detection and Monitoring of Power Equipment The detection range and efficiency of traditional sensor monitoring equipment have many shortcomings, and people who enter the corresponding area cannot be detected and warned in a timely manner; for the detection of cables, if a large number of sensors are installed, the cost will often increase, which also leads to When the cable breaks, it cannot be discovered and handled in time; for fires in power equipment rooms, the distance detected by the temperature sensor is often only a few meters. Only when the fire spreads to the equipment can problems be discovered, which affects the alarm and handling efficiency of the accident. A serious threat to equipment and personnel [1]. The technology of using image recognition algorithm to monitor and detect the cable equipment environment can effectively improve the abnormal alarm efficiency of the equipment operating environment. This technology can be used as a supplement to sensor monitoring equipment and effectively make up for the shortcomings of traditional equipment monitoring methods. However, the current application scope of the image abnormality detection method is relatively small, and it has not been widely used in power monitoring. The abnormality judgment and alarm are often carried out by the personnel to view the monitoring image independently. This method consumes a lot of human resources and cannot to ensure the quality of monitoring, even because of the slackness of personnel, it is impossible to find abnormal conditions in the operating environment of the power equipment in time, which affects the efficiency of handling abnormal conditions [2].

3 Analysis of Power Monitoring Image Abnormal Detection Algorithm 3.1 Person Identification 3.1.1

Characteristics of Personnel in Monitoring Images

In the monitoring images of power equipment, the distribution and number of people in it are often random, and different people often show different behavior states and different ways of gathering in them. The construction of the algorithm for personnel identification should not rely on the color of the clothing or the texture characteristics of the person to analyze, but also needs to be combined with the stationary or nonstationary state of the person’s standing and walking, and the speed of walking.

Anomaly Detection Algorithm of Power Equipment …

3.1.2

9

Algorithm for Personnel Area Extraction

Combined with the dynamic situation of personnel around the operating environment of the cable equipment, the image can be extracted and processed. The specific algorithms include inter-frame difference method, optical flow method, and background difference method. The following three types of algorithms are discussed in detail below: (1)

Inter-frame difference method

The inter-frame difference method is to distinguish the images in the monitoring video according to the interval of one frame, and finally divide the monitoring images into one frame, and process the adjacent images through differential operation to obtain the corresponding differential image. Based on this The image is binarized. For the binarized image, certain processing needs to be performed again to clarify the motion contour of the target, which can be processed by the technical means of corrosion and expansion [3]. (2)

Optical flow method

The optical flow method can apply vector assignment to all pixels of the monitoring image, and determine the area where the person is located by changing the vector difference between the pixels of each point to distinguish it from the background environment. The optical flow method does not need to standardize the background image during the application process, which can effectively eliminate the impact of image vibration, but this algorithm has high requirements for hardware devices, and the specific algorithm program is more complicated, which requires a lot of time to calculate Image of the person’s area. (3)

Background difference method

The background difference method is an algorithm that uses the unmanned image as the background and compares the difference between the current monitoring image and the background to extract the image of the person’s area. If the monitored image is quite different from the background, you can quickly obtain the image of the required personnel area. The application of this algorithm needs to build the corresponding background image and model, taking into account the background changes to do a real-time update work. In the specific application process, this algorithm calculation procedure is relatively simple, the requirements for the quality of the equipment are low, and the practicability is strong [4].

3.1.3

Algorithm for Personnel Image Feature Extraction

The person image features can be extracted by constructing a histogram in the person area image, and Canny operator can be used to perform corresponding calculations during specific operations. I [i, j] is used to represent the extracted image of the

10

P. Xia

person area, and G [i, j; σ] is set as the Gaussian filter. The specific formula is as follows:   I 2 +J 2 G i, j;σ = e σ 2 By performing convolution calculation on the above formula and setting S [i, j] as the image after the convolution calculation, the formula S [i, j] = G [i, j; σ] * I [i, j] In the actual calculation process, the threshold of the Gaussian filter needs to be reasonably controlled to avoid affecting the extraction quality of the image edges.

3.1.4

Classification Algorithm of Personnel Behavior

After the person image features are extracted from the area image, the corresponding algorithm needs to be used to quickly determine and classify the person’s behavior. This requires technicians to collect image samples of existing personnel and image samples of non-existent personnel to train the machine, which is convenient for quickly classifying non-sample images and effectively identifying personnel. Specific algorithm types include Adaboost algorithm, decision tree, artificial neural network algorithm and support vector machine.

3.2 Cable Break Detection 3.2.1

Analysis of Cable Break Characteristics

Multiple transmission lines are connected in parallel at the same time, and the positions between the cables are relatively parallel. From the plan view, it can be found that the tangents of the same longitudinal plane of the multiple cables and the intersection of the cables are parallel to each other, and the angle between them is 0 degrees. After the cable breaks, it will cause its two ends to sag. At this time, select a longitudinal plane and the intersection of the cable to draw a tangent. You can find that the tangent at the broken cable intersects the tangent at the normal cable and there is a certain angle. According to this principle, the monitoring and detection of cable breakage can be carried out through the algorithm [5].

3.2.2 (1)

Algorithm for Cable Break Feature Extraction Image enhancement

Image enhancement is used to improve the image clarity of the monitored cable, which is convenient for improving the efficiency and quality of subsequent computer processing. Specifically, it can be performed by gray-scale transformation, which is

Anomaly Detection Algorithm of Power Equipment …

11

used to highlight the characteristics of the cable image. The transformation algorithm mainly includes two types of linear and non-linear transformation. The principle of linear transformation algorithm is as follows: Firstly, the gray space of the cable image f (i, j) is [a, b], and the gray space of the linear transformation cable image g (i, j) is [c, d]. The specific formula relationship is as follows: Relying on this algorithm can expand or compact any gray space, and enhance the enhancement effect of the image. (2)

Image denoising

After the enhancement work of the cable monitoring image is completed, the image denoising work needs to be performed to avoid the unused influence of the noise on the cable edge extraction project, which requires noise reduction processing through the filter. The current commonly used filtering algorithms mainly include bilateral filtering and Gaussian filtering. Among them, the bilateral filtering algorithm can comprehensively consider the similarity of image pixels and the spatial spacing of pixels to avoid serious interference with edge images during noise reduction; Gaussian filtering can not take into account the similarity of pixel values relative to bilateral filtering, Resulting in a more blurred image after noise reduction, affecting the extraction quality of subsequent cable images [6]. (3)

Image binarization

The binarization of the cable image is consistent with the above method for extracting the human area image. The binarization method is used to split the cable from the overall monitoring image, which is convenient for subsequent analysis and calculation to confirm the broken state of the cable. The key of binarization lies in the selection of threshold. You can use an algorithm based on fuzzy set theory to calculate the threshold and perform binarization. (4)

Edge detection and expansion corrosion treatment

The edge detection of the cable image is carried out on the basis of the binary extraction of the image of the cable area. The specific detection algorithm can refer to the Canny operator in Sect. 2.1.3 for the corresponding calculation. After the edge detection is completed, the image needs to be dilated and corroded, which is used to fully connect the scattered short lines after the previous processing. Corrosion needs to be done by eliminating pixels at the image boundary, and expansion needs to add corresponding pixels. The specific operation needs to be combined with the image structure size, and finally the cable image becomes more complete and smooth. (5)

Image straight line detection

When performing straight line detection on power images, you can choose the algorithm of Hough transform to map image points in two-dimensional space to image curves in parameter space [7, 8].

12

P. Xia

4 Fire Detection Fire detection is similar to personnel detection. First of all, it is necessary to extract the flame area image from the monitoring image through an algorithm. The current commonly used extraction methods mainly include single-frame image extraction and multi-frame image extraction. The algorithms of fire area extraction from single frame images relying on surveillance video mainly include area growth method, threshold extraction method and fuzzy clustering method, but the method of single frame fire area extraction cannot guarantee accuracy and has poor practicability. The algorithms of fire area extraction from multi-frame images relying on surveillance video mainly include optical flow method, inter-frame difference method, codebook method and background difference method. The algorithm of the codebook method is relatively simple to implement, can use image information more efficiently, and is suitable for real-time monitoring of power equipment.

5 Conclusion The application of image anomaly detection algorithm to the monitoring of power equipment environmental status can effectively improve the monitoring efficiency and quality. It has a positive significance for personnel detection, fire detection and cable status detection, etc., and further research work on the algorithm is needed to improve the quality of power monitoring applications. Acknowledgements This work is partially supported by the Research Project Foundation of Chongqing Education Committee (Research on the energy consumption control of the BAS based on the subway station, Grant KJQN201805703)

References 1. Yin, Y.: Research on anomaly detection algorithm of power equipment operating environment monitoring image. Kunming University of Science and Technology, pp. 01–52 (2016) 2. Qu, Y.: Research on automatic recognition of power equipment based on digital image processing. Manage. Technol. Small Medium-sized Enterprise 04, 168–169 (2019) 3. Xing, Y., et al.: A dual-functional smartphone-based sensor for colorimetric and chemiluminescent detection: a case study for fluoride concentration mapping. Sens. Actuators B. Chem. 319 (2020) 4. Silva, E.B.D., et al.: Background concentrations of trace metals As, Ba, Cd, Co, Cu, Ni, Pb, Se, and Zn in 214 Florida urban soils: different cities and land uses. Environ. Pollution 264 (2020) 5. Nowak, M.M., et al.: Mobile GIS applications for environmental field surveys: a state of the art. Global Ecol. Conser. 23 (2020) 6. Kim, S., et al.: Occurrences of benzalkonium chloride in streams near a pharmaceutical manufacturing complex in Korea and associated ecological risk. Chemosphere 256 (2020)

Anomaly Detection Algorithm of Power Equipment …

13

7. Brasil, L.S., et al.: The habitat integrity index and aquatic insect communities in tropical streams: a meta-analysis. Ecol. Indicators 116 (2020) 8. Can, F., et al.: Thermodynamically designed target-specific DNA probe as an electrochemical hybridization biosensor. Bioelectrochemistry 135 (2020)

Application of Artificial Intelligence Technology in Electrical Automation Control Chunhong Zhao, Li Chen, and Jiehua Zong

Abstract As a new and popular technology, intelligent technology is widely used in all walks of life, especially for the realization of electrical engineering automation control. The establishment of the structure of intelligent technology mainly relies on two elements, namely artificial intelligence and computer network technology. The two are integrated and coordinated to produce a new technical field. Looking to the future, intelligent technology will continue to introduce new and better services to all walks of life, and the future development path will inevitably be bright. Based on this, this article briefly introduces the application of intelligent technology to electrical engineering automation control, so as to help intelligent technology to be better used in electrical automation. Keywords Artificial intelligence · Intelligent technology · Electrical · Automatic control

1 Introduction Nowadays, society is changing with each passing day under the guidance of science and technology, and the degree of automation of electrical engineering has been greatly improved compared with the past. This is a brand-new development direction for the electrical engineering industry. Intelligent control technology is often regarded as artificial intelligence (AI) technology. The system can independently collect relevant information and use computers to organize data, which can be quickly given in a short time. Analyzing reports and making corresponding judgments at the same time can effectively respond to emergencies and deal with complex problems. In the process of realizing the transformation of electrical engineering to automation control, if we make full use of intelligent technology as the core solution, it will be a revolutionary progress for the electrical engineering industry [1]. C. Zhao (B) · L. Chen · J. Zong Jiangxi Vocational College of Industry and Engineering, Pingxiang, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_3

15

16

C. Zhao et al.

2 Overview of AI Technology The rapid development of science and technology gave birth to a new technology-AI technology. The emergence of this new technology has played an important role in the development of modern socialism. The formation of AI technology is supported by computer technology theory and built under the interaction of other disciplines. Its essence is to create robots that can replace people in complex tasks by simulating human intelligent thinking. In the current AI technology, there are two fields, one is the robot system; the other is the expert system. In real life, AI has been applied in various fields and has achieved good results. The realization of this practical application fully proves the application value and significance of AI technology. But with the continuous development of technology, AI technology will also be continuously developed and optimized [2]. Intelligence has the following three characteristics in the field of electrical engineering: First of all, it shows high efficiency. Because electrical engineering automation control mainly relies on CNC computers to complete the control process, it uses a variety of advanced dedicated control and arithmetic chips as the core of the automation control, ensuring extremely high precision and at the same time [2]. Secondly, it shows that a variety of processes can be coordinated at the same time without interfering with each other, which greatly reduces the process connection and waiting time, and the efficiency has been doubled [2]. This is also the main direction of the future development of electrical engineering, which will be comprehensive in the future achieve. Finally, the calculation and processing are visible and controllable. The system uses an extremely efficient automated system to analyze and process data and other information in real time, putting the concept of visualization into practice [3].

3 The Advantages of AI Technology Applied to Electrical Engineering Automation 3.1 Convenient Operation and High Efficiency In the field of electrical engineering automation, there are three main forms of application of AI technology, neural network and fuzzy system. In the process of data acquisition and processing, real-time acquisition of analog and switching values can be achieved. Under different circumstances, targeted processing can be combined with actual needs. In addition, the technology also has special event alarm and monitoring functions, which can monitor the relevant parameters of electrical equipment in real time [3]. The staff can perform control operations only through the mouse and keyboard, and effectively adjust the isolation switch lights.

Application of Artificial Intelligence Technology …

17

3.2 Less Affected by External Factors Compared with previous control technology, AI technology is less affected by other external factors in the process of practical application, so there are fewer resistances and restrictions [4]. For example, AI does not require an accurate dynamic model, so it does not need to be restricted by model-related parameters, and there is no high requirement in the operating environment. Therefore, AI technology is relatively stable and has high accuracy in the field of automation control [4].

3.3 Improve the Automation Performance of Equipment In the process of practical application, AI technology has super computer programming functions, and is well-designed and accurate. In the production process of electrical automation equipment, through the application of precise algorithms, the accuracy and efficiency of equipment automation control can be greatly improved, while the automation performance of the equipment can be improved and the investment in the automation process can be reduced [5].

4 Application of AI Technology in Electrical Engineering Automation 4.1 Electrical Engineering Design Technology In electrical engineering automation air control, the design of electrical equipment is a key link, and it also has a certain degree of complexity and system city. It has high requirements for the work level and professional technology of the personnel [6]. Therefore, the personnel must be professional training enables them to master relevant knowledge of electrical, electromagnetic, circuit, etc., and can apply it flexibly to design, as shown in Fig. 1. In the past design mode, manual design technology is often the mainstay. This method not only has low work efficiency, but also cannot guarantee its exquisiteness. Once a problem occurs, it is difficult to repair [7]. Through the application of AI technology, the effective combination of Computer Aided Design (CAD) software and computer technology is realized.

4.2 Electrical Engineering Automation Control Technology The generation of electrical engineering automation control is mainly to ensure that the equipment can still work efficiently and autonomously without being guarded,

18

C. Zhao et al.

Fig. 1 AI technology applied to the architecture of automatic control

and the operating system can also achieve efficient operation under the remote control of AI technology, thereby providing automation [7]. The realization of control has laid a good foundation, and at the same time, it also provides a good space for the application of AI technology, shown as Fig. 2. If you want to realize the automatic control of electrical engineering, generally you need to meet the following principles: (l) AI technology can meet the control requirements of mechanical production and related processes to the greatest extent in the specific application process [8]. (2) To meet the control requirements as the basic goal, it is required to achieve the goals of durability, simplicity, economy and safety in the process of automatic control. (3) From the economic and technical point of view, select appropriate electrical components. (4) In the process of automatic control, it is necessary to carry out key control on quality and safety inspection [8]. (5) If the production technology conditions permit, large-scale production and application can be carried out, and the convenience of application and production can be ensured. In the process of applying AI technology, it mainly includes expert system control, fuzzy control, and neural network control, which guarantees the accuracy of automatic calculation from multiple angles [9]. At the same time, it also saves a lot of material and manpower for the enterprise, and the application effect. It is very prominent and has unlimited market development prospects. In addition, AI technology can also control the related equipment of the power system, combine the actual requirements of equipment automation, enter the corresponding algorithm, and comprehensively organize and collect the analog data

Application of Artificial Intelligence Technology …

19

User

Man-machine Interface

Learning system

Case base

Knowledge acquisiƟon

Reasoning machine

Interpreter

Knowledge process

Rule library

Database

Fig. 2 The structure of AI system in power system

and switch data of the equipment. It also has online analysis functions to achieve Real-time storage and retrieval of data information [9].

4.3 Fault Diagnosis Technology In the actual operation of electrical engineering systems, many fault problems often occur, and these problems often have a certain degree of complexity and diversity, and it is difficult to accurately judge and find the location and cause of the fault. Through the application of AI technology, the above-mentioned problems can be effectively solved, and the technology can also be applied to the fault diagnosis of motors and generators, which is currently widely used. Electrical equipment faults have the characteristics of non-linearity, uncertainty and complexity, which directly affect the refinement of equipment fault diagnosis [10]. Although the diagnosis time is relatively long, the actual effect is not ideal. The application of AI technology mainly uses expert systems and fuzzy theory to realize the double guarantee of fault diagnosis accuracy and speed.

20

C. Zhao et al.

4.4 Application in Power System The application of AI technology in the automated power system of the Department of Electrical Engineering includes fuzzy theory, artificial neural network (ANNS), and expert system (ES). Among them, ES can combine the knowledge and decision storage of the expert system to solve and judge related power system problems; ANNS can accurately locate and analyze the faults generated during the operation of the system; and fuzzy theory can fuzzy the system management and control [11].

5 Conclusion The proposal of intelligent theory is of great significance today. Intelligent technology is based on AI as the core point, and is deeply involved in the realization of electrical automation control systems, thereby effectively reducing failures and accurately analyzing, while intelligent control belt the high degree of unmannedness and high efficiency that come has created a new future for the electrical industry. In summary, the electrical engineering industry must be vigorously promoted to achieve comprehensive intelligence, so as to ensure the overall level of the electrical industry to a higher level.

References 1. Lou, H., You, Y., Liu, S.: Promote the application of artificial intelligence to electrical engineering automation. China’s New Technol. New Prod. 4(01), 14–16 (2017). (in Chinese) 2. Tian, Y., Xue, H.: Analyze the development prospects of electrical automation based on artificial intelligence technology. Electron. Technol. Software Eng. 15, 252–255 (2017). (in Chinese) 3. Zhang, G.: Explore the application of current intelligent technology in electrical engineering automation control. Commun. World 9(19), 245–248 (2015). (in Chinese) 4. Zhai, L.: Intelligent technology analysis in electronic engineering automation control. Fire Protect. (Electron. Version) 13(06), 23–25 (2016). (in Chinese) 5. Zhang, X., Ma, Q., Gao, J.: Analysis of the specific application of intelligent technology in electrical engineering automation control. Technol. Outlook 10(05), 77–79 (2015). (in Chinese) 6. Xu, Z.: Discussion on the application of intelligent technology in electrical engineering automation control. Electron. Technol. Softw. Eng. 8(21), 112–114 (2015). (in Chinese) 7. Liu, Z.: The application of artificial intelligence technology in electrical automation. Sci. Technol. Promote Develop. 4(12), 145–146 (2011). (in Chinese) 8. Yang, S.: On the application of electrical control circuit design. China’s New Technol. New Prod. 5(05), 1–3 (2019). (in Chinese) 9. Jia, G., Zhang, M.: Talking about artificial intelligence technology in electrical automation control. SME Manage. Technol. 10(9), 44–46 (2018). (in Chinese) 10. Ma, Z.: The application of artificial intelligence technology in electrical automation control. Sci. Technol. Innov. Herald 11(32), 92–94 (2017). (in Chinese) 11. Wang, H.: Discussion on the application of artificial intelligence technology in electrical automation control. China Sci. Technol. Expo 2(30), 277–279 (2016). (in Chinese)

Research on the Boundary and Extension of Network Publishing in Network Culture Beibei Cao

Abstract This paper studies the commercial activities of network publishing in the current network culture, clarifies the boundary between network publishing and other network culture activities, as well as the extension of network publishing in technology, products, business and the market. It is of great practical significance for the state to regulate the network publishing market and network publications, and to train network publishing talents. Keywords Network publishing · Network culture · Boundary extension

1 Introduction With the rapid development of network technology, traditional culture has entered the era of network culture. From the perspective of various media industry associations, mainstream media consulting companies and mainstream media with the government’s endorsement, online games, online animation, online music, online video and other industries are rising rapidly, greatly enhancing the overall strength of the cultural industry.

2 Common Commercial Activities of Network Culture 2.1 Network Literature With the help of the Internet, especially the open and two-way interactive environment like Web2.0, network literature has gradually formed a unique narrative circle B. Cao (B) Department of Printing Equipment Engineering, Shanghai Publishing and Printing College, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_4

21

22

B. Cao

and built an increasingly perfect narrative system [1]. China’s network literature market has high concentration, and there is a trend of a further improvement. China Literature firmly occupies the position of industry leader [2]. According to statistics, China Literature achieved total revenue of 2.97 billion yuan in the first half of 2019, including 1.66 billion yuan of online business income. In terms of content production, the trend of high-quality online literature is obvious; realistic subjects are increasing [3]. Chinese online literature, American Hollywood blockbusters, Japanese anime and Korean idol dramas are called as “the four cultural wonders of the world”.

2.2 Network Audio-Visual Services Network audio-visual services refer to audio and video broadcasting services provided through the information network, including network videos, network audios, network music and network live broadcast. Network video services refer to the broadcast of movies, TV dramas, documentaries and variety shows through the network. Users can control this kind of program and playback contents, which is different from the network broadcast. Network audio includes audio books, network broadcasts and other non-music audio services. The scale of China’s network audio-visual industry continues to grow; the industry is favored by the capital. Network video has become the just need for Internet users in entertainment consumption, and the core pillar of the network entertainment industry [4]. The development of network short videos is the most prominent. Himalaya is the giant company in network radio stations, followed by Litchi, Dragonfly FM and Penguin FM [5]. In terms of online music, NetEase Cloud Music and QQ music continued to expand their competitive advantages through financing, showing strong capability of creating income [6]. Mobile phones are the most popular equipment for watching network audio-visual programs, and TV screen has the greatest potential [5]. As of December 2018, the numbers of mobile online music users and mobile online video users in China have reached 553 million and 590 million, respectively accounting for 50.2 and 72.2% of total mobile Internet users.

2.3 Online Games Online games rely on the Internet and TCP/IP protocols, and enable multiple people to participate in the game at the same time [7]. In the last decade, the market sales revenue of China’s self-developed online games continued to grow, reaching 164.39 billion yuan in 2018 [8]. The distribution channels of online games were continuously widened; exports were significantly increased. The overseas game market has become an important source of income [9]. In 2018, the actual sales revenue of China’s self-developed online games reached US $9.59 billion in overseas markets, with a year-on-year increase of 15.8%. Mobile games have gradually become the main

Research on the Boundary and Extension …

23

driving force. In 2018, the actual sales revenue was 133.96 billion yuan, accounting for 62.5% of the game market.

2.4 Online Advertising Internet advertising is a form of advertising that takes the Internet as the media. Since 1990s, it has grown into the fifth largest media after televisions, the radio, newspapers and magazines. Network advertising is a two-way and digital information communication form, while traditional advertising is a linear way of communication. At present, China has become the world’s second largest advertising market after the United States. In 2018, the revenue of China’s online advertising industry reached 371.7 billion yuan, ranking first in the digital publishing industry, and far exceeding revenue of mobile publishing, online education and online games [10].

2.5 Network News Network news can be divided into two parts. On the one hand, news organizations and journalists use Internet technology to collect, process and transmit news; on the other hand, users obtain, browse and subscribe to news through the Internet. The transformation from traditional news media Internet media is accelerating in China; media integration enters a new stage of development. The competition among Internet news platforms shifted from pure traffic competition to multi-dimensional competition including contents, forms and technologies. On the whole, China’s network news presents four major characteristics: dominated by mobile devices, visual communication, platform aggregation and intelligent driving [11]. As of December 2018, the number of online news users reached 675 million, with an increase of 4.3% compared with the end of 2017; the proportion of Internet users was 81.4%. The number of mobile network news users reached 653 million, accounting for 79.9% of mobile Internet users, with an annual growth rate of 5.4%.

2.6 Network Animation Network animation refers to the form that directly transmits the copies of animation and comic works to audiences through the terminal of network servers. Compared with the traditional animation, it has stronger technical dependence, timeliness and interactivity [12]. Since 2013, with the help of mobile Internet and the capital market, China’s animation has entered a period of rapid development and has become one of the most potential industries in cultural and creative industries. In 2018, the base of online animation continued to expand; the stickiness increased; the income structure

24

B. Cao

became increasingly stable [13]. The number of online animation users reached 219 million, and the penetration rate increased in post-80s and post-90s; the market scale of online animation contents (excluding peripheral products) increased by 53% yearon-year; the “advertising + user payment + IP authorization” mode constituted the diversified profit model of the animation industry [14].

2.7 Online Education Network education is also known as “Internet learning". Internet learning means, through the Internet, learners can acquire information and knowledge, develop themselves and communicate with others, improve their autonomous learning abilities, stimulate their learning motivation, enhance their learning experiences and realize self-worth. It has three main characteristics: original ecology, fragmentation and high interconnection [15]. As of December 2018, the number of online education users reached 201 million in China; the utilization rate of online education users was 24.3%. The utilization rate of mobile online education users was 23.8%, higher than the figures of 2017. In the future, the network education will deeply utilize AI, VR/AR and other technologies to meet the diversified and personalized learning needs of users; the development and application of artificial intelligence will promote the popularization of personalized education.

3 Common Commercial Activities of Online Publishing In the process of transforming from traditional publishing to online publishing, the three vertical fields of mass publishing, educational publishing and academic publishing are maintained. In addition to the digitization of books and newspapers and the network communication, the development of audio books has attracted great attention. With the help of digital technology and network environment, online education publishing provides more abundant teaching resources and services.

3.1 Online Public Publishing 3.1.1

Online Publishing of Digital Books

Popular books, newspapers and magazines, the three traditional forms of publication are deeply impacted by the wave of digitalization and Internet. In 2018, the growth rate of digital income of traditional books and newspapers continued to decline. At the moment that all media development has become an inevitable trend, the

Research on the Boundary and Extension …

25

gradual decline of traditional books and periodicals’ digital business has become an irreversible trend [16].

3.1.2

Online Publishing of Audio Books

On the whole, China’s audio book market is in a booming stage. In 2019, the number of users of audio books is expected to increase to 478 million. The total market size will reach 4.63 billion yuan. Users’ preference for in-depth books will increase significantly [17]. The competition pattern of audio books in China has basically taken shape. Himalaya has the audio copyrights of 70% of best sellers, the audio adaptation rights of 85% of online literature, and the copyrights of more than 6600 original English best-selling books. It has obvious leading advantages.

3.2 Online Academic Publishing The market scale of China’s Internet periodical publishing industry has increased from 1.585 billion yuan in 2015 to 2.010 billion yuan in 2017, maintaining a stable growth rate of more than 10% annually. But compared with the rapid growth of the whole digital publishing industry in the past three years, there is still a certain gap. China’s online journals are developing towards the direction of integrating journals and the Internet [18]. There are two main types of online journal publishing, namely digitize traditional journals and publish them on the Internet, and publish the online database of journals. With the development of mobile Internet technologies and the popularity of mobile terminals, especially smart phones, people have new channels to obtain, read and use academic papers. There is an obvious trend of replacing paper reading with digital reading. The development of digital publishing technology provides technical conditions for the integration of publication and network, and reduces the cost of integration.

3.3 Online Education Publishing There is no consensus on the definition of “digital education publishing” in the industry and academia at home and abroad. However, it is generally believed that the digital education publishing has three elements: digital education, teaching contents and services, as well as digital technology means and network communication channels. For example, some people hold that digital education publishing means, “in the context of digitalization, and supported by digital technologies, publishing institutions or organizations carry out all kinds of cross media and diversified publishing activities in education and teaching fields with the purpose of disseminating teaching resources and providing knowledge services” [19]. In theory, online education

26

B. Cao

publishing belongs to the category of digital education publishing; the two industries tend to converge.

3.3.1

Publishing of Digital Teaching Materials and Online Education Audio-Visual Programs

The twenty-first century is the era of Internet and information technology. The publishing of traditional paper textbooks is undergoing a digital transformation. There are three development trends in the construction of teaching materials in various countries: digital teaching materials, open teaching materials and intelligent teaching materials. There are two forms of online education audio-visual publishing; one is the distribution and wholesale of digital education audio-visual products with the help of the Internet; the other is the course recording and broadcasting with the help of Internet platforms. On the whole, the rich media improves the technical threshold of teaching material production. The concepts and tools of collaborative creation, modular design and open architecture can effectively reduce the threshold and liberate the productivity of textbook contents, and gradually become the mainstream mode. The development of digital teaching materials in China started from developed areas; many cities have joined the operation of digital textbooks and e-book packages [20]. In 1999, the Ministry of Education set up a leading group for the development of a modern database of distance education resources, and drafted national plans and technical specifications for the construction of educational resources, which triggered the upsurge of online teaching materials.

3.3.2

Publishing of Open Education Resources

In 2012, UNESCO issued the 2012 Paris Declaration on World Open Educational Resources, which advocates countries to develop and adapt OER with various cultural backgrounds, so as to create convenient conditions for OER search, access and sharing. As far as China is concerned, with the strong support of the government, MOOC has become the best open education resources. In addition, textbooks, as an important form of teaching resources, bred a new branch of open teaching materials in the open education resources movement, and formed a unique mode of production, research, development, publication and dissemination. ICT technology, represented by Internet and mobile Internet, provides the driving force for the development of open teaching materials. First, the ICT technology promotes the development of digital learning and distance education. Second, the ICT technology promotes the digital transformation of the production and publishing of teaching materials; therefore, open textbooks can have unique market and industry backgrounds which are different from those of other OERs. Third, the ICT technology provides digital storage and communication channels for open textbooks, such as ebook platforms and MOOC platforms. Openstax, UK e-tips and other open textbook

Research on the Boundary and Extension …

27

projects use the Amazon Kindle as an important publishing channel. At present, the development potential of MOOC has been widely recognized in China.

4 Convergence of Network Commercial Activities 4.1 The Boundary Between Network Publishing and Other Network Commercial Activities Under the premise that the connotations of digital publishing and online publishing are becoming increasingly similar, there are disputes on the standards of online publishing industry both in academic circles and in the industry at home and abroad. To a large extent, the boundary of network publishing follows the definition of the traditional publishing industry, and is still relatively independent from other media industries. The main difference between online publishing and other online cultural commercial activities is that, online news, online shopping and online advertising provide factual information which can meet the needs of material life, while “publications” of online publishing are the fruits of creative labor and can meet people’s spiritual and cultural needs. Therefore, it can be regarded as a knowledge intensive industry that emphasizes intelligence and creativity.

4.2 Boundary Extension of Network Publishing The boundary extension and integration of network publishing are based on the integration of digital technology and media, which is mainly reflected in the extension of technologies, products, businesses and markets. In terms of technology, network publishing technology is the integration of many information technologies and has a strong coincidence effect. The development of information technology promotes the formation of technology convergence, which in turn promotes the further development of network information technologies. For example, if the digital technology transforms different information forms such as voice, video and data into the same “bit” form represented by “0, 1”, these “bits” would be able to mix with each other, and can be reused at the same time or separately; the integration of “bit” and the network technology has developed into the Internet Protocol (IP) technology, making the transmission of digital information more extensive and popular. In terms of products, the integration of online publishing refers to the integration based on products, or the integration of independent products after the adoption of digital technologies. There are four ways to integrate products. The first method is to use information technologies to transform traditional physical products into intelligent products or digital products. The second method is to use information

28

B. Cao

technology to comprehensively transform existing products, so as to make these products more powerful. The third is to develop new products by using information technology; the fourth is to develop “virtual products” by using digital technologies and the Internet. In terms of business, network publishing constantly integrates resources according to the guidance of technology integration, and actively develops new services suitable for technology integration, so as to realize the business integration of different industries on the basis of technology integration. From the perspective of enterprises, business integration can connect more information sources with information users, and realize the resource integration within and between enterprises. This can reduce the transaction costs of enterprises, improve the operation efficiency and enhance the core competitiveness of enterprises. In terms of the market, the integration of technology, products and business in the market will inevitably lead to the market convergence. The integration of online publishing is of great practical significance for optimizing resources allocation, promoting market innovation, accelerating the survival of the fittest and improving the comprehensive efficiency of the market. Therefore, the integrated industry should replace the vertical integrated market structure with the horizontal market structure, and integrate markets which are separated previously to realize the integration of various market resources, and form a new value chain.

5 Conclusion Under today’s environment, in order to further develop the publishing industry, it is necessary to divide the scope and boundary of network publishing industry and other network culture activities, which is of great significance for the authority to formulate relevant laws and regulations, for practitioners to carry out effective management, and for institutions to train professional talents. Acknowledgements This paper is the outcome of the research, Design and Production of Digitally Published Products, which is supported by the Foundation for Basic Computer Education and Teaching Research Projects of the Association of Fundamental Computing Education in Chinese Universities; the Project Number is 2019-AFCEC-224.

References 1. Wang, Y.M.: Motivation, process and narrative system of network literature narrative circle. Publishing J. 26(01), 90–95 (2018) 2. In Depth Report of China Literature: leader of online literature in China, [online]. Available: https://img3.gelonghui.com/pdf201802/pdf20180205173326852.pdf 3. Report on the Development of Digital Publishing Industry in China from 2017 to 2018, [online]. Available: https://www.cbbr.com.cn/mini_site/mini_con/123613.html

Research on the Boundary and Extension …

29

4. Research Report on the Development of China’s Online Audio Visual in 2018, [online]. Available: https://www.199it.com/archives/802136.html 5. Research Report on the Development of China’s Online Audio Visual in 2019, [online]. Available: https://www.asiaott.com/2019/05/27-180236.html 6. Statistics Report on the Development of China’s Internet, [online]. Available: https://www.cac. gov.cn/wxb_pdf/0228043.pdf 7. Xi, S.H.: Economic Analysis of Online Game Industry. Shanghai Academy of Social Sciences (2007) 8. Working Committee on Games of China Audio-video and Digital Publishing Association: Report on China’s Game Industry in 2018 (Abstract Edition), pp. 11–27. Book Publishing House, Beijing, China (2019) 9. The Annual Revenue of China’s Digital Publishing Industry Exceeds 800 billion yuan, [online]. Available: https://www.xinhuanet.com/book/2019-08/27/c_1210257442.htm 10. Report on the Development of China’s Journalism Industry (2017), [online]. Available: https:// www.cac.gov.cn/2018-06/20/c_1123007697.htm 11. Zhang, R., Xu, Y.: Report on the development of online animation industry in capital. Chin. Film Market 01, 25–30 (2018) 12. Report on the Development of China’s Internet Copyright Industry (2018), [online]. Available: https://www.ncac.gov.cn/chinacopyright/upload/files/2019/4/2817404494.pdf 13. Yang, X.J., Zuo, X.J.: Interpretation of the 2017 white paper on internet learning in China. Mod. Educ. 04, 25–28 (2018) 14. Annual Report on China’s Digital Publishing Industry in 2018–2019, [online]. Available: https://m.cfbond.com/zclb/detail/20190823/100020000002025156651782697946 6733_1.html 15. Research Report on China’s Audio Book Market, [online] Available: https://www.iimedia.cn/ c400/63471.html. 16. Yao, L.: Research on the integration of academic journals and the internet. Publish. Print. 04, 29–34 (2018) 17. Ding, J.J.: Research on Digital the Development Mode of Educational Publishing, Wuhan University of Technology (2011) 18. Wu, D.: Research on the Characteristics and Application of Rich Media Digital Textbooks. Beijing Institute of Graphic Communication (2015) 19. Wu, X.O.: Ten year review and trend prospect of textbook construction of new curriculum reform. Educ. Sci. Res. 01, 57–62 (2012) 20. Patterson, L., Rivera, E., Smyth, K., et. al.: Challenges for the uUniversity as a E-textbook publisher of scholarly work. In: The international Technology, Education and Development Conference, pp. 15–21, Dece 2018

Denoising 3D Metallic Deposits Seismic Data of Ashele Mining Camp by a Combined Domain Strategy Xiangbo Gong, Xiaojie Wan, Zhuo Xu, and Zhiguo Meng

Abstract The seismic shot records of metallic deposits have a low signal to noise ratio (SNR) because of the weak reflection wave of the small scale of orebody, the steep structure underground, and the complex mineral media. In this paper, a combined domain denoising strategy is proposed to improve the SNR of 3D metallic deposits seismic data, which is applied in Ashele mining camp in Xinjiang, China. For the different types of noise, we combine the time–frequency domain, the frequencywavenumber domain, the slowness-time domain, and the curvelet domain to eliminate the noise gradually. The denoising results show our strategy is robust and effective for 3D metallic deposits seismic data. Keywords Denoising · Seismic data · Metallic deposits · Combined domain · Ashele mining camp

1 Introduction The 3D seismic survey is a powerful way to explore deep mineral deposits. However, it is a challenge to processing the 3D seismic data of metallic deposits. One reason is the non-layered structure of the ore body which causes the relatively weak signal of reflection wave on the strong noise background [1]. The case of 3D metallic deposits seismic data in Ashele mining camp located in Xinjiang, China. It is difficult to interpret the spatial distribution of ore body because of the low signal to noise ratio (SNR) of raw 3D seismic data. Apart from the effective signal of orebody, the raw 3D seismic data contain the surface waves, the multiple reflections, the side waves, the linear noise, the industrial electrical noise, the wild noise, the high-frequency noise, the random noise and so on. It is impossible to eliminate all the noise by a single method. To remove the random noise, the discrete curvelet transform decomposes the 3D data to curvelet domain X. Gong · X. Wan · Z. Xu (B) · Z. Meng College of Geoexploration Science and Technology, Jilin University, Changchun, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_5

31

32

X. Gong et al.

could significantly improve the SNR of 3D seismic data [2], the matching-pursuitbased spatial-trace time–frequency peak filtering is proposed to attenuate the random noise [3], the unsupervised sparse feature learning method is employed to obtain the high SNR seismic data [4], and the way of modeling land random noise is to separate the noise theoretically [5]. To remove the regular noise, such as the surface waves or the linear noise, the 3D Radon transform can focus the coherent signals on the small area in the 3D Radon domain which easy to separate the signals and the noise [6–8]. To remove the multiple reflections, the adaptive randomized-order empirical mode decomposition was applied on each frequency slice to attenuate the multiple [9]. To remove the blending noise, structuring median constraint and structural low-rank decomposition both are powerful tools [10, 11]. Principal component analysis can be used to denoising the stacked seismic profile [12]. Recently, machine learning and deep learning gradually become the mainstream denoising technique [13–16]. For the targeted denoising, we analyze original 3D seismic shot records in the time and space domain (the original domain), sort the signal in the frequency domain, and distinguish the effective reflection wave and noise by the apparent velocity. In terms of the different characteristics of signals, the effective reflection waves and the noise are separated in the time–frequency domain, the frequency-wavenumber domain, the time-slowness domain, and the curvelet domain, respectively.

2 Analysis on Data 2.1 Acquisition Geometry The multi-fold stack technique in the 3D seismic survey is used to enhance the resolution of ore body target underground. To balance the cost and the effectiveness in Ashele mining camp, the 16 receiver lines, 3 parallel shots and the middle-position of the shot pattern are involved in a single swath. The distance between receivers is 20 m, the distance between receive lines is 60 m, the distance between shots is 20 m, the distance between shot lines is 80 m, and the distance between swaths is 60 m. In this case, the maximum of folds is 240. One raw shot record named SP1200 is shown in Fig. 1. Note that, this gather has been corrected statics according to the measuring geodetic coordinates and elevation.

2.2 Time and Frequency Analysis Figure 3 is the first two receive line gathers of SP1200 which zooms in for the detail of shot record. Figure 5 is the raw stack seismic profile after normal moveout and vertical stack without denoising. From the raw shot record (Figs. 1 and 3) and raw stack seismic profile (Fig. 3), the surface wave ranges from 500 to 1500 ms is the main

Denoising 3D Metallic Deposits Seismic Data …

33

Fig. 1 One raw 3D metallic deposits seismic shot record numbered as SP1200 which contains 16 receive lines, each receive line has 240 receivers

noise source that blurs the stack seismic profile on the middle and deep structure. Through spectrum analysis, the main frequency of reflection wave is between 40 and 50 Hz, the main frequency of the surface wave is about 17 Hz which is much lower than that of the reflection wave. The linear noise below 1000 ms is near to the source which smears the deep structure. Furthermore, the random noise randomly distributes in the shot record due to the small scale of complex metallic deposits, which significantly reduces the SNR of data [17] (Figs. 2 and 4).

Fig. 2 The combined domain denoising results of SP1200

34

X. Gong et al.

Fig. 3 The first two receive line gathers of shot record, located at the red rectangle part in Fig. 1. Note that, the red ellipse denotes the strong low-frequency noise and the red arrow denotes the linear noise

2.3 Apparent Velocity Analysis The quaternary overlay is eroded at most of the surface in the acquisition area. The thickest cover on the shallow surface locates in the southwest, and the thinnest cover is in the northeast. Weak weathering and rock outcropping on the surface make the raw seismic data have a relatively high apparent velocity. The apparent velocity of the first break range from 4800 to 5500 m/s. The surface waves are considered as the composite waves of integral body wave and first break. Their apparent velocities are relatively low which are between 1500 and 2500 m/s. The deep linear noise has the apparent velocity of about 2000 m/s. The reflection waves from the underground tend to have high apparent velocities, and they are greater than 8000 m/s. In the southern area, a few first breaks have the lowest apparent velocity which serves as the basic parameter for 3D filtering.

3 Denoising 3.1 Time–frequency Domain For 3D seismic data, the main survey direction on the surface is along with the receive line named as inline (x), and the perpendicular direction on the surface is named as crossline (y). Before denoising, we divide the frequency section of the

Denoising 3D Metallic Deposits Seismic Data …

35

seismic data according to the main frequency of the signal (Sect. 2.2) using the time–frequency analysis and grade the apparent velocity of the signal (Sect. 2.3) both on inline and crossline direction. Selecting the time window of noise, such as the surface wave locates between 500 and 1000 ms, we employ the statistical adaptive noise suppression method to remove the surface wave and linear noise in the time–frequency domain [18].

3.2 Frequency-Wavenumber Domain By the 3D Fourier transform, the seismic shot record d(t, x, y) transform to the frequency-wavenumber domain D(ω, k x , k y ), where k x and k y are the wavenumbers along the inline and crossline direction. In this domain, the seismic signals are distributed on the slope band following the apparent velocity (Sect. 2.3). We design the bandpass fan-shape filter to suppress the low apparent velocity noise on either panel of inline or crossline slice [8].

3.3 Time-Slowness Domain Original 3D seismic shot record d(t, x, y) transform to the 3D Radon space m(τ, px , py ) by the linear or hyperbolic accumulation. Note that, the Radon space is the same as the time-slowness domain. The basic equation is: m(τ, px , p y ) =

 x

d(t = τ + x px + yp y , x, y)

(1)

y

where τ is the interception time of the time axis, px and py are the slowness along the inline and crossline direction, respectively. In the Radon space, the regular signals, such as the linear noise and the multiple reflection wave, are focus on the different parts in terms of the differences of the interception time and the apparent velocity, which are convenient to separate from each other [7].

3.4 Curvelet Domain 3D Curvelet transform can represent the detail information of 3D seismic data, especially with complex directional smooth event planes. We simply decompose the shot records to curvelet coefficients in the sparse Curvelet domain. The related signals in the original shot records are the large value in the Curvelet domain, but the random noise is the small value in the Curvelet domain. Therefore, by sparsity-promoting

36

X. Gong et al.

Fig. 4 The denoising results of the first two receive line data, which is the red rectangle part zoomed-in Fig. 2. Note that, the strong low-frequency noise and the linear noise have been removed clearly

threshold iterative denoising method, the random noise is easy to remove from the coherence signals [2].

3.5 Denoising Results Figure 2 is the denoising results of SP1200. Figure 4 is the denoising results of the first two receive line of SP1200, it zooms in the red rectangle part of Fig. 2. Figure 6 is the stack seismic profile after the shot records denoising. From the receive line gathers, the low-frequency surface waves and linear waves are well diminished along the inline direction. For the middle and deep structure from 500 to 2000 ms, the SNRs are improved by the combined domain denoising strategy. From the spectrum analysis, the main frequency of the denoising results has increased to 45 Hz, which compresses the seismic wavelet to enhance the resolution of the seismic profile (Fig. 5).

4 Conclusions In this paper, a combined denoising strategy is employed in the 3D metallic deposits seismic data of Ashele mining camp of Xinjiang, China. In the time–frequency domain, the surface waves are easy to be suppressed with the low frequency and the low apparent velocity. In the frequency-number domain, the bandpass filter facilitates

Denoising 3D Metallic Deposits Seismic Data …

37

Fig. 5 The raw stack seismic profile without denoising

Fig. 6 The stack seismic profile after combined domain denoising. Note that, compared with the same part of the seismic profile marked by red ellipses, the clear underground geological structures appear to interpret the locations of the metallic deposits

to remove the linear noise and the surface waves. In the time-slowness domain, the coupled seismic signals are detached by the focused features of Radon transform. In the curvelet domain, the random noise change to the small coefficients to be discarded from the effective signals. The denoising results show our method performs well both on the raw seismic gathers and the stack seismic profiles.

38

X. Gong et al.

It is not enough to obtain the 3D spatial distribution of ore body above 1000 m depth only with denoising, and the other seismic data processing, such as migration and imaging, deserve to be further researched in the future. Acknowledgements This work was supported by National Key Research and Development Project (2018YFC0603203), National Natural Science Foundation of China (41674119) and the 2D/3D Seismic Survey Project of Ashele copper-zinc deposits in Haba River county of Xinjiang.

References 1. Lü, Q.T., Zhang, X.P., Tang, J.T., et al.: Review on advancement in technology and equipment of geophysical exploration for metallic deposits in China. Chin. J. Geophys. 62(10), 3629–3664 (2019) 2. Gorszczyk, A., Adamczyk, A., Malinowski, M.: Application of curvelet denoising to 2D and 3D seismic data—practical considerations. J. Appl. Geophys. 105, 78–94 (2014) 3. Lin, H.B., Li, Y., Ma, H.T., et al.: Matching-pursuit-based spatial-trace time-frequency peak filtering for seismic random noise attenuation. IEEE Geosci. Remote Sens. Lett. 12(2), 394–398 (2015) 4. Zhang, M., Liu, Y., Bai, M., et al.: Seismic noise attenuation using unsupervised sparse feature learning. IEEE Trans. Geosci. Remote Sens. 57(12), 9709–9723 (2019) 5. Li, G.H., Li, Y., Yang, B.J.: Seismic exploration random noise on land: modeling and application to noise suppression. IEEE Trans. Geosci. Remote Sens. 55(8), 4668–4681 (2017) 6. Zhang, Y.Q., Lu, W.K.: 2D and 3D prestack seismic data regularization using an accelerated sparse time-invariant Radon transform. Geophysics 79(5), V165–V177 (2014) 7. Gong, X.B., Wang, S.C., Zhang, P.: Three-dimensional sparse hyperbolic Radon transform and its application to demultiple. J. Seismic Explor. 27, 137–150 (2018) 8. Gong, X.B., Feng, F., Jiao, X.M., et al.: Deblending using an improved apex-shifted hyperbolic Radon transform based on the Stolt migration operator. J. Geophys. Eng. 14, 1115–1123 (2017) 9. Chen, W., Xie, J.Y., Zu, S.H., et al.: Multiple-reflection noise attenuation using adaptive randomized-order empirical mode decomposition. IEEE Geosci. Remote Sens. Lett. 14(1), 18–22 (2017) 10. Huang, W.L., Wang, R.Q., Gong, X.B., et al.: Iterative deblending of simultaneous-source seismic data with structuring median constraint. IEEE Geosci. Remote Sens. Lett. 15(1), 58–62 (2018) 11. Zhou, Y.T., Shi, C.J., Chen, H.M., et al.: Spike-like blending noise attenuation using structural low-rank decomposition. IEEE Geosci. Remote Sens. Lett. 14(9), 1633–1637 (2017) 12. Xie, J.Y., Chen, W., Zhang, D., et al.: Application of principal component analysis in weighted stacking of seismic data. IEEE Geosci. Remote Sens. Lett. 14(8), 1213–1217 (2017) 13. Wang, E.N., Nealon, J.: Applying machine learning to 3D seismic image denoising and enhancement. Interpretation 7(3), SE131–SE139 (2019) 14. Zhang, Y.S., Lin, H.B., Li, Y., et al.: A patch based denoising method using deep convolutional neural network for seismic image. IEEE Access 7, 156883–156894 (2019) 15. Zhao, Y.X., Li, Y., Dong, X.T., et al.: Low-frequency noise suppression method based on improved DnCNN in desert seismic data. IEEE Geosci. Remote Sens. Lett. 16(5), 811–815 (2019) 16. Zhao, Y.X., Li, Y., Yang, B.J.: Low-frequency desert noise intelligent suppression in seismic data based on multiscale geometric analysis convolutional neural network. IEEE Trans. Geosci. Remote Sens. 58(1), 650–665 (2020)

Denoising 3D Metallic Deposits Seismic Data …

39

17. Gong, X.B., Wang, S.C., Han, L.G.: Sparse least-squares reverse time migration of small scatters in seismic exploration. Chin. J. Geophys. 62(10), 4028–4038 (2019) 18. Wang, Y.Q., Peng, Z.M., Wang, X.Y., et al.: Matching pursuit-based sliced wigner higher order spectral analysis for seismic signals. IEEE J. Selected Topics Appl. Earth Observ. Remote Sens. 10(8), 3821–3828 (2017)

Simulation Study on Layout Optimization of Urban Public Charging Infrastructure Based on Electric Vehicle Charging Demand Bo Zhang, Yunlin Liang, and Pengfei Wu

Abstract With the purpose of further improving the convenience of urban electric vehicle users and the comprehensive utilization efficiency of charging facilities, typical cities are chosen as the research object. According to urban road information, regional population distribution, residents’ trip characteristics, the as-built charging facilities and other information, the charging demand model of electric vehicles is constructed, and the optimized layout of public charging infrastructure in typical cities is developed in combination with traffic flow model, which provide an effective solution for rational allocation of urban charging systems. Keywords Charging infrastructure · Electric vehicle · Charging demand model · Optimized layout · Simulation research

1 Introduction China is the largest country in the global electric vehicle industry, but “grim situation of difficulty in charging” is still one of the major problems facing the development of the industry [1]. Urban public charging facilities make a key link in the charging service system of electric vehicles, and their reasonable layout directly affects the vehicles users’ convenience and the comprehensive utilization efficiency of charging facilities [2–4]. According to the trip characteristic data of urban residents, this study analyzes the charging demand logic of electric vehicles, establishes the charging demand model, and calculates the charging demand, so as to reasonably determine the construction site of fast charging pillars in public sectors [5]. The established charging demand logic and charging demand model are applicable to cities or urban agglomerations nationwide, and have guiding significance for the rational layout of charging facilities in public sectors [6]. B. Zhang (B) · Y. Liang · P. Wu China Automotive Technology & Research Center Co., Ltd., Beijing, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_6

41

42

B. Zhang et al.

2 Optimal Layout Calculation 2.1 Main Calculation Logic The charging infrastructure in the public sectors should be built at the charging demand point for electric vehicles. That is, when the battery capacity warning lamp lights up, the electric vehicle will change its original path and turn to the nearest fast charging station for charging [7, 8]. The basic logic can be described as: (1) Mark the starting point and destination in the road network map according to the trip characteristics of urban residents. (2) Plan the travel path for the residents by taking the principle of shortest time in the driving process. (3) Assuming that the private car starts from the starting point, set the characteristic parameters of the electric vehicle and allow driving along the established path. (4) When the battery SOC (i.e. state of charge) is lower than a certain threshold, consider moving to the charging station. (5) When the destination is close to the charging station, go directly to the destination; otherwise, go to the public charging station for charging. The configuration logic of charging infrastructure for electric vehicles is shown in Fig. 1.

2.2 Key Factors The charging infrastructure in the public sectors should be set at the location where the electric vehicle needs to be charged. The objective basic information affecting infrastructure layout involves a large number of investigation data and statistical data, including digital map information, main road information, demographic data, traffic flow data and private car trip characteristic data [8].

2.2.1

Road Map Information

Road map is mainly composed of urban road data, including national highway, expressway, express road, branch road, trunk road, administrative boundaries, coastlines, rivers, buildings and so on. Urban road map information can be downloaded through the public website (e.g. OpenStreetMap [9]), which can provide road map information within some cities or regions.

2.2.2

Vehicle Trip Characteristic Data

The traffic data can be obtained based on mobile phone and other communication signals [10]. This data source has the characteristics of (1) it does not distinguish between mobility modes of travel, (2) the signal is updated in time, and (3) the data sources are generally in possession of China Mobile, China Unicom and China

Simulation Study on Layout Optimization of Urban … Fig. 1 Configuration logic of charging infrastructure

43

Set the starting point and end point

Set the driving path

Start from the starting point or charging station

Battery capacity is less than threshold

The charging station is closer to the end point

Set the path to the charging station for charging

Set the path to the end point and drive to the end point

Reach the end point

Telecom. This kind of data needs to be processed and spliced by means of traffic simulation. The acquired data include: longitude and latitude information of vehicles within 24 h, number of trips, travel time consumption, travel distance, characteristics of travel modes, etc. Based on the availability, timeliness and reliability of data, this study uses mobile communication tools to obtain the 24 h travel time–space trajectory of vehicles [11].

2.3 Charging Demand Algorithm The power battery remaining energy and vehicle energy consumption calculation process in the model are shown in Formula (1) and Formula (2), and the calculated values are shown in Table 1. chrg

Ei

(t) = Ci S OCistar t − E iloss (t) + E iadd (t)

(1)

Battery capacity at EV departure Kilometers driven per unit electric quantity Power of accessories such as air conditioning Alarm threshold Vehicle battery capacity at moment t Power supplemented Loss of power during vehicle movement Accumulated distance in vehicle movement

SOC start

L fm

Pac

E alarm

E chrg

E add

E loss

L EV (t)

Process parameters

Power battery capacity

Ci

Vehicle characteristic parameters

Interpretation

Mathematics symbol

Type

Table 1 Input parameters and values in the model

km

kWh

kWh

kWh

kWh

kW

km/kWh



kWh

Unit



Energy consumption model

Investigation on electric car owners

Model of state of charge

Investigation on electric vehicle owners

Investigation on mainstream models in typical areas

Investigation on mainstream models in typical areas

Investigation on electric vehicle owners

Investigation on mainstream models in typical areas

Data source

Calculated according to the starting point and road network speed

Calculated according to Formula (2)

Charge 80% in 40 min

Calculated according to Formula (1)

SOC state less than 10% to 30%

3 kW

5.88–8.33 km/kWh (12 kWh/100 km to 17 kWh/100 km)

100% or fit function according to consumer survey data

25–45 kWh

Value

44 B. Zhang et al.

Simulation Study on Layout Optimization of Urban …

45

Fig. 2 Simplification of urban road network map in Tianjin

E tloss (t) =

L iE V (t) + P ac tir un (t) L fm

(2)

where: E i chrg (t) is the remaining energy of electric vehicle power battery, kWh. C i is the capacity of battery, kWh. SOC i start is state of charge at the starting point of electric vehicle, %. E i loss (t) is the energy consumption of electric vehicle, kWh. E i add (t) is the energy recharged at the charging station or from other charging equipment, kWh. L i EV (t) is electric vehicle driving distance, km. L fm is vehicle energy consumption rate, km/kWh. Pac is the air conditioning power, kW. t i run (t) is the electric vehicle driving time, h.

3 Charging Demand Simulation 3.1 Road Network Information Simplification and Traffic Simulation Taking Tianjin as an example, the demand of urban public charging facilities is simulated. On the premise of both calculation speed and simulation accuracy, the urban road network is simplified, as shown in Fig. 2. Based on NEXTA (Network Explorer for Traffic Analysis) software, the dynamic simulation and path planning of vehicle movement are carried out. After batch processing of vehicle trajectory information, the charging demand points of vehicles are calculated by using the charging demand model of electric vehicles. The charging demand points are marked and the video output is carried out in the three-dimensional map.

3.2 Data Sources and Sample Size Relying on 170,000 entries of mobile-phone-based travel data, the project team selected 2396 entries of traffic demand data for long-distance travel to simulate

46

B. Zhang et al.

Table 2 Scenario settings for typical urban electric vehicle models Parameter

Symbol

Unit

Scenario 1

Scenario 2

Scenario 3

Range



km

150

220

300

Battery capacity

Ci

kWh

18

33

48

km/kWh

10

6.67

6.25

Mileage per unit electric quantity L fm Electric quantity threshold (theoretical)

E alarm

kWh

9(50%)

10(30%)

10(20%)

Power of accessories such as air conditioning

Pac

kW

3

3

3

State of charge of vehicle at departure

SOC start



100%

100%

100%

the daily travel of electric vehicles. The travel distance distribution of the processed data show that the daily travel distance is 20–50 km, accounting for 65% of the total sample size.

3.3 Scenario and Parameter Settings Based on the model structure of urban electric vehicles and the actual range of vehicles, the project team has created three vehicle model scenario settings (150, 220 and 300 km), with specific parameters shown in Table 2. Among them, the battery capacity of the corresponding models with different ranges is 18, 33 and 48 kWh. The threshold data of charging demand is obtained by referring to the vehicle warning value for charging and consumer investigation. The power value of accessories such as vehicle air conditioning is obtained by interviewing electric vehicle test experts.

3.4 Simulation Results and Conclusions With the increase of vehicle range, the charging demand points decrease sharply. When the vehicle range is 150 km, the number of charging demand points in Tianjin is 505. When the range increases by 47% to 220 km, the number of occurrence points of charging demand decreases by nearly 93% to 38; and when the range of vehicles continues to increase by 36% to 300 km, it further drops to 5 (Fig. 3). As vehicle range is different, and the distribution of charging demand points may also vary greatly. With the increase of vehicle range, the occurrence point of charging demand shifts from the central city to the city outskirts and suburban counties. The occurrence time of charging demand points presents two peaks. The first peak occurs between 9:00 am and 12:00 am, and the occurrence number of charging demand points in this interval accounts for 25% of the total charging demand points.

Simulation Study on Layout Optimization of Urban …

(1) Scenario 1

(2) Scenario 2

47

(3) Scenario 3

Fig. 3 Locational distribution of charging demand points

The second peak occurred between 17:00 pm and 21:00 pm, and the occurrence number of charging demand points in this interval accounted for 42.3%.

4 Construction Layout Design Optimization 4.1 Construction Proportion Through the proportional relationship between charging demand points and area, the density of charging demand points in each district is obtained. The number of public charging pillars to be constructed in different districts can be configured with reference to the proportion between the number of occurrence points of charging demand in the districts. (i.e., Central City: Binhai New District: Dongli District: Ninghe District: Xiqing District: Jizhou District: Jinnan District: Beichen District: Baodi District: Wuqing District: Jinghai District = 43: 153: 26: 70: 26: 72: 19: 21: 49: 50: 17).

4.2 Spatial Distribution According to the distribution of occurrence points of charging demand, the construction scheme of public charging pillars in each district of Tianjin is determined as follows.

4.2.1

Central City

As shown in Fig. 4. It is suggested to arrange charging facilities in “➀ Hongqi South

48

B. Zhang et al.

Fig. 4 The charging demand points distribution in central city

Fig. 5 Charging demand points distribution in Binhai New District

Road–Heiniucheng Road–Kunlun Road” and “➁ the northern section of Metro Line 1 and the southern section of Metro Line 5”.

4.2.2

Binhai New District

As shown in Fig. 5. It is suggested to arrange charging facilities in “➀ Along G2501 Binhai New District–Baoding Expressway”, “➁ Haibin Expressway–Central Avenue”, “➂ Changchun-Shenzhen Expressway–Binhai-Shijiazhuang Expressway”, “➃ Tangshan-Chengde Expressway–Jinbin Highway” and “➄ Jingang Expressway”.

4.2.3

Other Territories

The charging facilities construction layout of other districts, which are Donglim, Ninghe, Xiqing, Jizhou, Jinnan, Beichen, Baodi, Wuqing, Jinghai, are shown in Fig. 6.

Simulation Study on Layout Optimization of Urban …

49

(1) Dongli District

(2) Ninghe District

(3) Xiqing District

(4) Jizhou District

(5) Jinnan District

(6) Beichen District

(7) Baodi District

(8) Wuqing District

(9) Jinghai District

Fig. 6 Spatial layout scheme of charging facilities in each district

5 Conclusion In this study, typical cities are chosen as the research objects. According to urban road information, regional population distribution, residents’ travel characteristics, the asbuilt charging facilities and other information, the charging demand model of electric vehicles is constructed. The optimized layout of public charging infrastructure in typical cities is developed in combination with traffic flow model, which provide an effective solution for rational allocation of urban charging systems. The charging demand simulation result shows that: (1)

(2)

With the increase of vehicle range, the charging demand point decreases sharply, and the occurrence point of charging demand shifts from the central city to the city outskirts and suburban counties. 42.3% of charging demand points occurs between 17:00 and 21:00, and 25% of charging demand point occurs between 9:00 and 12:00.

50

B. Zhang et al.

Acknowledgements This research was supported by the National Key Research and Development Program (Project No. 2019YFE0101900 and 2018YFE0105500).

References 1. Zhang, A., Kang, J.E., Kwon, C.: Multi-day scenario analysis for battery electric vehicle feasibility assessment and charging infrastructure planning. Transport. Res. Part C: Emerg. Technol. 111, 439–457 (2020) 2. Palomino, A., Masood, P.: Advanced charging infrastructure for enabling electrified transportation. Electr. J. 32(4), 21–26 (2019) 3. Chakraborty, D., Bunch, D.S., Lee, J.H., Tal, G.: Demand drivers for charging infrastructurecharging behavior of plug-in electric vehicle commuters. Transport. Res. Part D: Transp. Environ. 76, 255–272 (2019) 4. Xie, F., Liu, C., Li, S., Lin, Z., Huang, Y.: Long-term strategic planning of inter-city fast charging infrastructure for battery electric vehicles. Transp. Res. Part E: Logistics Transp. Rev. 109, 261–276 (2018) 5. Roni, M.S., Yi, Z., Smart, J.G.: Optimal charging management and infrastructure planning for free-floating shared electric vehicles. Transp. Res. Part D: Transp. Environ. 76, 155–175 (2019) 6. Funke, S.Á., Plötz, P., Wietschel, M.: Invest in fast-charging infrastructure or in longer battery ranges? A cost-efficiency comparison for Germany. Appl. Energy 235, 888–899 (2019) 7. Hiwatari, R., Iwatsubo, T., Ikeya, T.: A layout method of quick charging infrastructure for electric vehicle by road traffic simulation: Japanese model plan of quick charging infrastructure network. In: 2014 Vehicle Power and Propulsion Conference, pp. 1–5 (2014). https://doi.org/ 10.1109/VPPC.2014.7006998 8. Gnann, T., Klingler, A.-L., Kühnbach, M.: The load shift potential of plug-in electric vehicles with different amounts of charging infrastructure. J. Power Sour. 390, 20–29 (2018) 9. Alhamwi, A., Medjroubi, W., Vogt, T., Agert, C.: OpenStreetMap data in modelling the urban energy infrastructure: a first assessment and analysis. Energy Procedia 142, 1968–1976 (2017) 10. Rominger, J., Farkas, C.: Public charging infrastructure in Japan—a stochastic modelling analysis. Int. J. Electr. Power Energy Syst. 90, 134–146 (2017) 11. Lv, Z.: Observations and reflections on electric automobile industry developments. Int. J. Front. Eng. Technol. 1(1), 98–104 (2019)

Research on Urban Spatial Structures in Enclave-Type Regions Based on Urban Gravity—Taking Jingyuan County as an Example Liang Cheng

Abstract Enclave-type regions are special spaces in the administrative division of cities; the urban space structures there are different from the modes of normal regions. On the basis of urban gravity theories, this paper improves the gravity model, and quantitatively analyzes the urban spatial structure of enclave-type regions. Especially, the urban spatial structure characteristics of Jingyuan County, a typical enclave-type region, are analyzed as an example. Keywords Urban spatial structures · Enclave-type regions · Urban gravity

1 Introduction Urban areas are gathering places for human activities which include cities and small towns with mainly non-agricultural population. They are residential areas with a certain scale of industrial and commercial activities. There are continuous activities of exchange such as logistics, human resources flow and information flow between cities and towns within an area, which are called urban space interactions. Urban space interactions combine many cities and towns scattered from each other in various areas into an urban spatial structure system with a certain spatial structure, which influences and determines the spatial distribution, connection and structural states of the cities and towns therein the region. With the continuous development of regional urban systems, the exchanges between cities and towns have become more frequent. Enclave-type regions under special administrative divisions are more likely to be separated because they are different from normal complete administrative areas. Enclaves are a special type of human geography phenomenon, which refer to the geographical space under the jurisdiction of a certain administrative area but not adjacent to this area. In a general sense, they are based on the overall perspective of a complete administrative area. An L. Cheng (B) College of Geography and Environmental Science, Northwest Normal University, Lanzhou, Gansu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_7

51

52

L. Cheng

enclave is the edge area in comparison to the main area (usually the area where the regional administrative center is located) [1]. Therefore, an enclave-type region refers to a complete administrative area that includes the main area and the enclave area. Most enclave-type areas are created by special administrative divisions in historical periods. Academic research on enclaves mainly focuses on enclave economic models [2, 3], enclave-type urbanization [4, 5] and other non-spatial areas that are separated from administrative divisions. The research on the urban spatial structures in a certain region is rarely affected by the spatial patterns of enclaves. The urban spatial structures of the enclave-type areas show that although some cities and towns are not adjacent to the main area geographically, the administrative power under the same jurisdiction makes the urban space interaction exist regardless, and forms special urban spatial structure characteristics. There are a certain number of enclave-type regions in China. The enclave-type regions in the western regions comprise wide tracts of land, a small population, and a scattered urban spatial structure. Due to the influence of the enclave spatial structures, the urban spatial layout is unreasonable, and the overall urban and rural development faces many problems that need to be resolved. Based on this situation, this paper draws on the theoretical methods of urban gravity and improves the gravity model. Taking Jingyuan County as an example, it conducts a systematic study on the spatial structures of cities and towns within county areas. Based on the analysis and comparison of the spatial structure evolution characteristics of Jingyuan County in 2005, 2010, and 2015, this paper explores the characteristics of the urban spatial structures of Jingyuan County, a typical enclave-type region in the past 20 years, so as to provide guidance and reference for such areas in the construction of global human settlements, urban system planning, and territorial space planning.

2 Research Regions and Research Methods 2.1 Research Regions Jingyuan County belongs to Baiyin City, Gansu Province in Northwest China. It is located at 104° 13 –105° 15 east longitude and 36°–37° 15 north latitude. Pingchuan district divides the county into the southern part and the northern part. The southern part becomes the main area where the county center is located. The northern part becomes the enclave area. This condition makes Jingyuan County a typical enclave area (Fig. 1). The county has a total area of 5809.4 km2 . State-level transportation lines such as Beijing-Tibet Expressway (G6) and National Highway 109 run through the north and south of the county. The southern and northern areas of the county are connected by Provincial Highway 207 and Provincial Highway 308 respectively. By the end of 2016, the county had over 13 towns and 5 villages [6].

Research on Urban Spatial Structures in Enclave-Type …

53

Fig. 1 Current situation of urban space in Jingyuan County

2.2 Research Methods 2.2.1

Nodularity Index

“Nodularity” was first proposed by Preston [7]. That is, the absolute importance in the central place theory corresponds to the “centrality” emphasizing relative importance, and is widely used in the related research of economic geography and regional science. This paper chooses nodularity instead of centrality, which is more in line with the importance of townships in the economic development of Jingyuan County, which has a low urbanization rate. Considering the comprehensive development

54

L. Cheng

status and potential influencing factors of each township, and based on the principles of objectivity, comprehensiveness, and data availability, this paper constructs an indicator system with 5 primary indicators and 15 secondary indicators. First, standardizing the original data using the dispersion standardization method. The calculation formula is:   Xkj − min Xj      (1) Xkj = max Xj − min Xj In the formula: X kj is the generated variable of the j index of the k town by the standardized process; Xkj is the original variable of the j index of the k town; max (Xj ), min (Xj ) refering to the maximum and minimum values of j index of all villages and towns in the county region. According to the administrative division of Jingyuan County, k = 18, j = 19. Secondly, using the principal component analysis method to further calculate, selecting the factors with eigenvalues greater than 1, and performing the variance maximization rotation. The formula for calculating the nodularity index of each township is: Pk =

m 

[Ai ×

i=1

19 

Cij × Xkj ]

(2)

j=1

In the formula: Ai is the contribution rate of the principal component variable of i; X kj is the value after standardization of the dispersion; Cij is the load of the variable j in the principal component variable of i.

2.2.2

Gravity Model

The gravity model was first applied in the field of physics. Later, sources within academia introduced the gravity model into regional economic research, and then formed a space gravity model to measure the interaction strength Fij of the regional cities and towns. Specifically, Fij refers to the strength of mutual attraction and interconnection between cities and towns, which is affected by factors such as the spatial distance and economic scale of cities and towns. The magnitude of its value reflects the closeness of the connection between cities and towns. The relationship can be expressed by the following formula: Fij =

Pi Pj Dbij

(3)

In the formula: Fij and Dij are the interaction quantity and spatial distance between the ith and jth towns respectively; Pi and Pj are the town scales of the ith and jth towns respectively; b is the index to measure the friction effect of spatial distance.

Research on Urban Spatial Structures in Enclave-Type …

55

Considering that the population of Jingyuan County is small and the area is large, this paper improves on the model. In this paper, the urban nodularity is used instead of urban scale, and the fastest transit time between towns is used to replace the spatial material distance between towns. The fastest transit time between towns and villages is obtained by OD analysis in ArcGIS, and related research results are used for Ref. [8]. b takes the standard value 2. The traffic travel time is mainly related to transportation speed. This paper refers to the setting method of transportation speed in related research results [9], comprehensively considers the actual situation of the study area, and sets the speed of different grades of roads (highway 100 km/h, national road 60 km/h, provincial highway 40 km/h, county highway 30 km/h, township highway 20 km/h).

2.3 Research Data This paper takes 18 villages and towns in Jingyuan County as the basic research unit. The research data includes the socio-economic data and geospatial data of each village and town in 2005, 2010, and 2015. The socio-economic data are taken from China County Statistical Yearbook (Township Volume), Gansu Rural Yearbook, Baiyin Statistical Yearbook, Jingyuan Yearbook and some township government work reports and socioeconomic statistics bulletins. The geospatial data mainly comes from the road vector data and other geospatial data in the New Urbanization Planning of Jingyuan County (2014–2020) and the scanned and digitized map in Administrative Division Map of Jingyuan County published by Xi’an Map Publishing House in 2005. (drawing number: Gan S2009). At the same time, considering the actual traffic conditions of the road at each time point, referring to the TM remote sensing image at the corresponding time point (from the geospatial data cloud website) and Google Earth, the paper makes corresponding supplementary corrections to road data and high-speed entrances and exits.

3 Research on Spatial Structures Based on Urban Gravity 3.1 Trend Characteristics of Urban Spatial Structures The index system is built by 15 indicators from the following five aspects: economic level, social development, public services, infrastructure, and living standards. The 15 indicators are: GDP, gross industrial output value, fixed asset investments, fiscal revenue, total population, township employees, staff in secondary and tertiary industries, proportion of non-agricultural population in total population, the total number of schools, the total number of students at school, the total number of hospitals, the total number of hospital beds, the proportion of the number of users of tap water to

56

L. Cheng

the total number of households, the per capita income, and the total retail sales of consumer goods. All these indicators jointly quantify the urban nodularity index of each village and town in Jingyuan County. This paper uses the deviation standardization method to standardize the data, and then uses the SPSS19 statistical software to perform principal component analysis on the standardized data. The value of KMO is 0.761, greater than 0.7, indicating that the correlation between variables is small. The sig value of Bartlett’s sphere test is 0.000, less than 0.01, which is suitable for principal component analysis. According to the principle that the eigenvalue is greater than 1, three principal component factors are selected, and the cumulative contribution rate of the variance of the first three principal component factors reaches 80.154%, which can basically reflect the information of all indicators. According to formula (2), the urban nodularity index of each township in Jingyuan County is calculated. The trend analysis uses a threedimensional view to analyze the distribution of urban spatial data, and then the urban nodularity index is calculated by the trend analysis tool of ArcGIS 10.1 software to generate a spatial trend map of the urban nodularity index of Jingyuan County (Fig. 2), which can directly reveal the overall temporal characteristics and evolution trend of the urban spatial structures of Jingyuan County. The X-axis represents the east–west direction on the two-dimensional ground, the Y-axis represents the north– south direction on the two-dimensional ground, and the Z-axis represents the urban nodularity index value. According to Fig. 2, it can be found that the characteristics of the urban spatial structures of Jingyuan County in these three years are significant. In the north–south direction, the nodularity index of the main area in the southern part is slightly higher than that of the enclave area in the northern part, indicating that the urban development situation in the southern part is stronger than the northern part. An inverted U-shape in the east–west direction indicates that the urban development situation in the north– south direction presents a spatial situation with low edges and a high center; In these three years, the north–south and east–west directions both increased year by year, indicating that the overall urban spatial structures of Jingyuan County is developing towards a global rationalization trend.

Fig. 2 The trend map of urban nodularity index space in Jingyuan County

Research on Urban Spatial Structures in Enclave-Type …

57

3.2 The Organizational Characteristics of the Urban Spatial Structures Using formulas (2) and (3), the number of maximum gravitational line connections of Jingyuan County’s urban spatial connection within a period of 3 years is calculated, which forms the maximum gravitational line map of economic spatial connection (Fig. 3). Figure 3 can reflect the organizational characteristics of the urban spatial structures of Jingyuan county in these three years. The overall structures of the maximum gravity in the urban space is stable and distinctive. The largest number of gravitational line connections in Jingyuan County is in the town of Wulan, where the county of the southern main area is located. There are 4 connections, covering most towns in the southern main area of Jingyuan county. The main area and the enclave area are separated by the enclave-type regions and lack the connection of the maximum gravitational line. This shows that whether it is the southern main area or the northern enclave area, the connection across the two districts is not the main connection in the county’s township structures. The maximum gravity of urban space in the northern enclave area of Jingyuan county presents a two-segment “thwartwise I” structure pattern, and the connection between the urban spatial structures obey the principle of internal proximity.

Fig. 3 The maximum gravitational line map of spatial connection in Jingyuan County

58

L. Cheng

Fig. 4 Period characteristic map of the urban spatial structures in Jingyuan County

3.3 Interactive Characteristics of the Urban Spatial Structures Setting the government’s resident locations of each village and town as the OD points and the road traffic network as the path, calculating the shortest traffic time between the government’s resident locations of the 18 villages and towns through the OD tool of the Network in ArcGIS 10.1 software. Then, putting the value into formula (2) to obtain the relative intensity of the urban spatial structures of Jingyuan county in each period (Fig. 4). The 153 gravity values in each period are divided into 5 levels, namely super high intensity (>14), high intensity (5–14), medium intensity (5–2), normal intensity (2–1), low intensity ( 7%) [7]. Some researchers have raised various doubts about the Langmuir model. Moreover, they used other models or established new models to describe the adsorption characteristics of coals, including Adsorbed Solution Theory [8–10], Simplified Local Density (SLD) Theory [11–14], One-Kondo(OK)model [15], BrunauerEmmett-Teller (BET) model [16–18], Adsorption potential adsorption model [19, 20], Theory of Volume Filling of Micropore (TVFM) [21–25], Two dimensional equation of state [26]. Some researchers have performed comparative analysis on several types of adsorption models to find a more suitable model [27–29]. The adsorption model regarding coals studied by the researchers can be divided into three following categories. The first is a single reservoir parameter variable model which is represented by the Langmuir model widely used in CBM industry. The second is the theoretical model of adsorption potential. Although there are two variables of temperature and pressure in the equation, the key parameters involved cannot be accurately obtained, resulting in the uncertainty of the results. The third is the mathematical relationship model, in which the variables are mainly mathematical function relations, lacking of theoretical basis. Due to technical conditions and economic cost constraints, it is impossible perform isothermal adsorption test on coal sample under every buried depth in the early stage. Moreover, researchers have been expecting to gain further insight into CBM in advance without the adsorption test. However, up to now, none of the adsorption models, including the Langmuir adsorption model, have completely solved these problems.

2 Experiment Section 2.1 Coal Samples Coal samples including Huainan coal, Liulin coal, Tunliu coal and Qinshui coal were collected from the four places in China. They were marked with samples 1, 2, 3 and 4 separately. The Chinese Standard GB/T 212–2008 was used in proximate analysis; the Chinese Standard GB/T 6948–2008 was used in vitrinite reflectance. The detailed analytic results are tabulated in Table 1.

Coupling Model of Adsorption Capacity-Temperature-Pressure …

105

Table 1 Properties of coal samples Sample

location

M ad a (%)

Aad (%)

V daf b (%)

Rmax (%)

Coal type

Sample 1

Huainan

1.19

10.34

33.30

0.88

Gas coal

Sample 2

Liulin

0.64

4.72

20.26

1.32

Coking coal

Sample 3

Tunliu

1.06

11.78

13.56

2.06

Meagre coal

Sample 4

Qinshui

1.11

13.89

7.09

3.56

Anthracite

a Air

dried basis;

b Dried

ash free basis

2.2 Isothermal Adsorption Experiment Isothermal adsorption experiments were performed on samples at 20 °C, 30 °C, 40 °C and 50 °C respectively based on the static capacity method. The test was undertaken on the ISO-300 high-pressure isothermal adsorption instrument of TerraTek Company. The experimental temperature of each coal sample was 30 °C. The moisture-equilibrated coal samples were tested. The preparation of moistureequilibrated samples were performed at temperature 30 °C, humidity 96–97%, and balance time about 5 days.

3 Results and Discussion 3.1 Adsorption Equilibrium Behaviors The experimental results are displayed in Fig. 1. The same coal sample exhibits similar pattern. The shape of isotherm adsorption curve at four temperatures is indentical, which conforms to the type I by International Union of Pure and Applied Chemistry (IUPAC) [30, 31]. In addition, the adsorption capacity decreases when temperature increases. The coals with higher the metamorphic degree is, the greater adsorption capacity of methane. The Langmuir volume and pressure are the adsorption parameters derived from the Langmuir model and methane adsorption isotherm. For the same coal, the lower the experimental temperature is, the larger the Langmuir volume of methane is, the smaller the Langmuir pressure is; and the stronger the methane adsorption capacity of coal is.

3.2 Adsorption Characteristic Curve Once the gas molecules fall into this range, they will be adsorbed and form an adsorption layer. The space where the attraction field exists is called the adsorption

106

W. Jiang et al.

Fig. 1 Experimental adsorption isotherms at 20 °C, 30 °C, 40 °C, 50 °C, a sample 1, b sample 2, c sample 3, d sample 4

space. The adsorption potential (ε) distributes within the adsorption space. It is defined as the compression work of 1 mol ideal gas compressed from the equilibrium pressure (P) in the gas phase to the saturated vapor pressure (P0 ) in the adsorption phase at constant temperature, which is also equal to the increment of free energy (g) of the system. The expression for quantitatively describing the adsorption potential is given as [32]: P0 ε = −G =

V d P = RT ln

P0 P

(1)

P

The critical temperature of methane is very low, and the adsorption temperature of methane is high. Therefore, the methane cannot be liquefied, that is, there is no saturated vapor pressure. The saturated vapor pressure of methane here has no clear physical significance. For this reason, the empirical Eq. (2) proposed by Dubinin [33] is generally used to calculate the quasi saturated vapor pressure. Amankwan

Coupling Model of Adsorption Capacity-Temperature-Pressure …

107

and Schwarz [34] proposed an improved empirical Eq. (3) for calculating Dubinin quasi saturated vapor pressure. In the previous study, the experimental data were in good agreement when k equals 2.7 [19].  P0 = Pc  P0 = Pc

T Tc T Tc

2 (2) k (3)

The curve obtained from the plot of adsorption potential ε and adsorption phase volume V ad is called adsorption characteristic curve. Assuming that the adsorption phase has constant density, the adsorption capacity is directly proportional to the volume of the adsorption phase (Eq. (4)), whereρ ad is the density of the adsorption phase, V ad is the volume of the adsorption phase, V is the adsorption capacity. The density of the methane adsorption phase is 0.375 g/cm3 [7, 19]. V =

22400Vad × ρad 16

(4)

The adsorption capacity and adsorption potential V-ε of each coal sample at different temperatures are plotted. It is found that the data points of the same coal sample are almost concentrated on the same curve (Fig. 2), that is, the relationship curve between the adsorption capacity and the adsorption potential is also independent on the temperature, which can be regarded as curve of the same sample. The characteristic curves of 4 samples at four different temperatures were analyzed by unified regression analysis. The adsorption capacity and adsorption potential were exponential (Eq. (5)). The multiple correlation coefficients were above 0.95. V = A × e B×ε

(5)

3.3 Coupling Model of Adsorption Capacity-Temperature–Pressure When ε equals 0, the space between the adsorption potential surface and the adsorbent is the adsorption limit space, equivalent to the saturated adsorption capacity. The significance of the adsorption limit space is equivalent to the Langmuir volume. For ε = 0, the formula (5) changes to V = A representing the ultimate adsorption capacity of methane in coals; and A can be expressed as V max . Substituting formula (3) into Eq. (1):

108

W. Jiang et al.

Fig. 2 Characteristic curve and expression equation. a Sample 1, b sample 2, c sample 3, d sample 4

 k ⎤

⎡ ⎢ ε = RT ln⎣

Pc

T Tc

⎥ ⎦

P

(6)

Substituting Eq. (6) into Eq. (5), A is changed to V max :

V = Vmax × e

B RT ln

Pc

( TTc )k P



(7)

Equation (7) is a coupling model of methane adsorption capacity under the combined action of temperature and pressure. Among these, PC and T C are the critical pressure (4.59 MPa) and temperature (−82.6 °C) of methane, respectively; R is the gas constant (8.31); V max is the limit adsorption capacity; B is the parameter related to coal rank and K is the empirical parameter, always assigned as 2.7.

Coupling Model of Adsorption Capacity-Temperature-Pressure …

109

Table 2 Ultimate adsorption capacity and Langmuir volume (V L ) of 4 coal samples Parameters

Sample 1

Sample 2

Sample 3

Sample 4

V L (cm3 g−1 )a

29.87

28.70

43.61

56.81

23.39

29.16

43.25

56.85

V max (

cm3

a Average

g−1 )

value of at 20 °C, 30 °C, 40 °C and 50 °C

According to the mentioned method, the limit adsorption capacity of each coal sample is obtained; Compared with the average Langmuir volume at each temperature, it is found from Table 2 that the values regarding the limit adsorption capacity and the average Langmuir volume of at 20 °C, 30 °C, 40 °C and 50 °C are very close; and the relationship between the limit adsorption capacity and the coal rank is more reasonable. The coupling adsorption model established in this study has the following advantages. First, the curve is directly used to avoid the error caused by improper selection of adsorption phase density when calculating the volume of adsorption phase. Furthermore, the physical meaning of parameters in the model is relatively clear. Finally, the adsorption capacity of other equilibrium conditions can be predicted. Based on the isotherm adsorption data of a coal at a specific temperature, calculate ε according to Eq. (6), and fit the limit adsorption capacity V max and B according to Eq. (5), then the adsorption model expression (7) of the coal sample can be obtained. Substitute any temperature and pressure into the model expression, then the adsorption capacity under the balance condition can be obtained. Combining with the ground temperature gradient and reservoir pressure gradient of coal seam, the adsorption capacity of methane at different depths can be obtained.

3.4 Application of Coupled Adsorption Model to Dark Lignite and Meta-anthracite Based on the isotherm adsorption tests of two samples of dark lignite and metaanthracite at 30 °C, the characteristic curves of adsorption capacity and adsorption potential of each coal sample were generated (Fig. 3 and Table 3), and the ultimate adsorption capacity of each coal sample was obtained (Table 3). The ultimate adsorption capacity of 2 coals was comparable with that of other coal rank coals.

3.5 Prediction Method of Adsorption Capacity The isotherm adsorption data of more than 40 different rank coals (Rmax = 0.28– 7.05%) at 30 °C in typical areas of China are collected. The limit adsorption capacity

110

W. Jiang et al.

Fig. 3 Characteristic curve and expression equation

Table 3 Ultimate adsorption capacity and Langmuir volume (V L ) of 2 coal samples

Parameters L

Dark lignite sample Sample meta-anthracite

(cm3 g−1 )

V max

(cm3

g−1 )

13.03

17.65

7.12

−46.79

and B value of each coal are obtained by using the established adsorption capacitytemperature-pressure coupling model. All coal samples are collected from the core coal samples on surface of CBM wells. In addition, the isothermal adsorption test is carried out. It is found that the limiting adsorption capacity and B value have a good correlation with vitrinite reflectance as shown in Figs. 4 and 5. Particularly, the relationship is as follows: Fig. 4 Relation of ultimate adsorption capacity and vitrinite reflectance of different coals

Coupling Model of Adsorption Capacity-Temperature-Pressure …

111

Fig. 5 Relation of B and vitrinite reflectance of different coals

2 Vmax = Rmax + 27.89Rmax + 1.92

(8)

2 B = Rmax + 27.89Rmax + 1.92

(9)

Substituting Eq. (8) (9) into Eq. (7), the following equation is derived:  2 +0.1Rmax −0.34) RT ln   (−0.02Rmax 2 V = −3.53Rmax + 27.89Rmax + 1.92 e

Pc

( TTc )k



P

(10) By substituting the vitrinite reflectance value of a coal into Eq. (10) and inputting different temperature and pressure, the methane adsorption capacity can be obtained. The isothermal adsorption experiments of coal samples (Rmax = 0.88%) at 35 °C, and coal samples (Rmax = 2.69%) at 45 °C were carried out. The data were compared with the prediction results of Eq. (10). As shown in Fig. 6, the prediction results are well consistent with the experimental data. The prediction of methane capacity of coal established in this study is based on the regression statistics of the core test data, thus it may have some limitations in the application of other areas or other test methods. In future, we will collect and sort out the test data of CBM wells in more areas, and further improve the database and prediction methods.

4 Implications for CBM Exploration and Production The coupling adsorption model of adsorption capacity-temperature-pressure established in this study can generate the adsorption capacity and gas content under any

112

W. Jiang et al.

Fig. 6 Comparison of conjectural and laboratorial adsorption capacity

temperature and pressure, and further more accurately predict the CBM resources in the depth of the coal seam. The prediction equation of the adsorption capacity can provide a preliminary understanding of the adsorption characteristics, gas content and CBM resources of the coal seam for the areas without any CBM exploration and production projects.

5 Conclusion 1. 2.

3.

The characteristic curve of adsorption capacity and adsorption potential of methane on different rank coals was revealed. The coupling model of adsorption capacity-temperature-pressure is improved. This model can well describe the adsorption characteristics of different rank coals including dark lignite and meta-anthracite. Furthermore, it can predict the adsorption capacity under different equilibrium conditions in the experimental range. The prediction expression of methane capacity can be used to predict the adsorption capacity of any coal seam under different equilibrium conditions, which can provide some geological information for the early evaluation and production of CBM resource.

Funding This work is conducted with funding from the topics of National Natural Science Foundation of China (No. 41972167).

Coupling Model of Adsorption Capacity-Temperature-Pressure …

113

References 1. Langmuir, I.: The adsorption of gases on plane surfaces of glass, mica and platinum. J. Am. Chem. Soc. 40(9), 1361–1403 (1918) 2. Markham, E., Benton, A.: The adsorption of gas mixtures by silica. J. Am. Chem. Soc. 53(2), 497–507 (1931) 3. White, C., Smith, D., Jones, K., et al.: Sequestration of carbon dioxide in coal with enhanced coalbed methane recovery—a review. Energy Fuel 19(3), 659–724 (2005) 4. Perera, M., Ranjith, P., Choi, S., et al.: Estimation of gas adsorption capacity in coal: a review and an analytical study. Int. J. Coal Prep. Utilization 32(1), 25–55 (2012) 5. Okoloa, G., Eversona, R., Neomagusa, H., et al.: Comparing the porosity and surface areas of coal as measured by gas adsorption, mercury intrusion and SAXS techniques. Fuel 141, 293–304 (2015) 6. Kang, Y., Huang, Y., Zhang, B., et al.: Formation conditions for deep oversaturated coalbed methane in coal-bearing basins. Acta Petrolei Sinica 40(12), 1426–1438 (2019) 7. Zhang, Q., Cui, Y., Zhong, L., et al.: Temperature-Pressure comprehensive adsorption model for coal adsorption of methane. J. China Coal Soc. 33(11), 1271–1278 (2008) 8. Myers, A., Prausnitz, J.: Thermodynamics of mixed-gas adsorption. AIChE J. 11(1), 121–127 (1965) 9. Chen, J., Loo, L., Wang, K.: An ideal absorbed solution theory (IAST) study of adsorption equilibria of binary mixtures of methane and ethane on a templated carbon. J. Chem. Eng. Data 56(4), 1209–1212 (2011) 10. Walton, K., Sholl, D.: Predicting multicomponent adsorption: 50 years of the ideal adsorbed solution theory. AIChE J. 61(9), 2757–2762 (2015) 11. Rangarajan, B., Lira, C., Subramanian, R.: Simplified local density model for adsorption over large pressure ranges. AIChE J. 41(4), 838–845 (1995) 12. Soule, A., Smith, C., Yang, X.: Adsorption modeling with the ESD equation of state. Langmuir 17(10), 2950–2957 (2001) 13. Fitzgerald, J., Sudibandriyo, M., Pan, Z., et al.: Modeling the adsorption of pure gases on coals with the SLD model. Carbon 41(12), 2203–2216 (2003) 14. Wu, X., Ning, Z., Han, G., et al.: Modified SLD model for coalbed methane adsorption under reservoir conditions. Arab. J. Geosci. 12(18), 1–7 (2019) 15. Sudibandriyo, M., Mohammad, S., Robinson, R., et al.: Ono-Kondo model for high-pressure mixed-gas adsorption on activated carbons and coals. Energy Fuels 25(7), 3355–3367 (2011) 16. Sakurovs, R., Day, S., Weir, S.: Relationships between the sorption behaviour of methane, carbon dioxide, nitrogen and ethane on coals. Fuel 97, 725–729 (2012) 17. Brunauer, S., Emmett, P., Teller, E.: Adsorption of gases in multimolecular layers. J. Am. Chem. Soc. 60(2), 309–319 (1938) 18. Sing, K.: The use of nitrogen adsorption for the characterization of porous materials. Colloids Surf. A 187–188, 3–9 (2001) 19. Cui, Y., Li, Y., Zhang, Q., et al.: The characteristic curve of methane adsorbed on coal and its role in the coalbed methane storage research. Chin. Sci. Bull. 50(S), 76–81 (2005) 20. Wang, Y., Tao, C., Ni, X., et al.: Amount of adsorbed gas in deep coal reservoir based on adsorption potential theory. J. China Coal Soc. 43(6), 1547–1552 (2018) 21. Polanyi, M.: Theories of the adsorption of gases: a general survey and some additional remarks. Trans. Faraday Soc. 28(2), 316–333 (1932) 22. Dubinin, M., Astakhov, V.: Description of adsorption equilibria of vapors on zeolites over wide ranges of temperature and pressure. Adv. Clin. Chem. 102(2), 69–85 (1971) 23. Clarkson, C., Bustin, R.: Binary gas adsorption/desorption isotherms: effect of moisture and coal composition upon carbon dioxide selectivity over methane. Int. J. Coal Geol. 42(4), 241– 271 (2000) 24. Wood, G.: Review and comparisons of D/R models of equilibrium adsorption of binary mixtures of organic vapors on activated carbons. Carbon 40(3), 231–239 (2002)

114

W. Jiang et al.

25. Harpalani, S., Prusty, B., Dutta, P.: Methane/CO2 sorption modeling for coalbed methane production and CO2 sequestration. Energy Fuels 20(4), 1591–1599 (2006) 26. Jiang, W., Zhang, Q.: Simplified De Bore model of coal adsorption gas. Adv. Mater. Res. 838–841, 1847–1851 (2014) 27. Wu, Y., Pan, J.: Isothermal adsorption model of coalbed methane. J. China Coal Soc. 42(S2), 452–458 (2017) 28. Durra, P., Harpalani, S., Prusty, B.: Modeling of CO2 sorption on coal. Fuel 87(10), 2023–2036 (2008) 29. Li, W., Chen, T., Song, X., Gong, T., et al.: Reconstruction of critical coalbed methane logs with principal component regression model: a case study. Energy Explor. Exploi. (2020). Epub ahead of print 2 March 2020. https://doi.org/10.1177/0144598720909470 30. Sing, K., Everet, D., Haul, R., et al.: Reporting physisorption data for gas/solid systems with special reference to the determination of surface area and porosity. Pure Appl. Chem. 57(4), 603–619 (1985) 31. Rouquerol, J., Avnir, D., Fairbridge, C., et al.: Recommendations for the characterization of porous solids. Pure Appl. Chem. 66(8), 1739–1758 (1994) 32. Zhao, Z.: Principle of Adsorption Application. Chemical Industry Press, China (2005) 33. Dubinin, M.: The potential theory of adsorption of gases and vapors for adsorbents with energetically nonuniform surface. Chem. Rev. 60(2), 235–241 (1960) 34. Amankwah, K., Schwarz, J.: A modified approach for estimating pseudovapour r pressure in the application of Dubinin—Astskhove Equation. Carbon 33(9), 1313–1319 (1995)

The Application and Development of Network Technology in College Physical Education Shuang Zhang and Mairu Liu

Abstract With the development of society, Internet applications are born. The birth of the Internet has also made our lives richer and more colorful. With the Internet development and the reform of education, Internet technology has also stepped into college physical education. Internet+ education has also attracted more and more attention. This article mainly focuses on the related concepts, characteristics and benefits of the network, and studies the network technology application in college physical education. Keywords Network technology · Internet · College sports · Physical education

1 Introduction Called by the concept of “Sports Powerful Country”, physical education, as an important public course in the construction of universities, plays an important role in ensuring the healthy development of students and improving sports skills. Because of that, college sports networked courses have developed rapidly. Judging from the collected data of national high-quality online courses in the first half year of 2014, the quantity of teaching courseware included has been 35,000, more than 50,000 teaching cases, more than 310,000 electronic teaching plans, and 90,000 teaching practice programs. These resources have laid the foundation for the networking of college physical education [1].

S. Zhang Wuhan Business University, Wuhan, Hubei, China M. Liu (B) Central China Normal University, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_14

115

116

S. Zhang and M. Liu

2 Basic Concepts of the Internet The Internet refers to the huge network formed by the series connection between networks. The Internet refers to a huge network formed between networks and networks. The Internet is widely used in real life [2]. With the development trend of the current era, computer technology and Internet technology have been widely used all over the world. Because modern teachers are young and promising, most teachers can master and use computer office software to write teaching plans and conduct statistical analysis of data. Students will also receive teacher’s teaching plans for autonomous learning on the computer. Some colleges and universities also cooperate with computer software companies to build application management systems that are convenient for their colleges and universities, such as “table tennis match arrangement, college news overview”, etc., effectively saving a lot of working time [2]. The application of Internet technology in physical education has added many ways to students’ final assessment methods. Not only are there various assessment methods, but also automatic scoring can be performed on the Internet, which reduces the burden on teachers, is more fair and just, and effectively reduces [1]. The integration of Internet technology and modern education methods has greatly promoted the development of physical education and provided a broader path for new teaching models.

3 Features and Benefits of the Internet 3.1 Internet Information Exchange Is not Restricted by Space The Internet can exchange information without being restricted by space. The Internet is an earth network, connecting people and information all over the world [2]. No matter where you are, you can instantly get the information you want through the Internet, without being restricted by space.

3.2 Information Exchange Is Time-Domain, and the Update Speed Is Fast Internet information spreads more rapidly. People can get news from all over the world through the Internet [3]. Make teaching and learning no longer restricted by time and space, as shown in Fig. 1.

The Application and Development of Network Technology …

117

Computer aided instrucon server

Internet

Student System administrator Teacher

Fig. 1 Internet remote architecture

3.3 The Use Cost of Information Exchange Low The information exchange tends is easy to meet the individual needs of everyone, and there are many users. Mobile network technology, mobile terminal technology, and integrated application service protocol are the main technologies of the mobile Internet [3]. Among them, the most personalized technology is the mobile terminal technology. Its use is mainly tied to Internet consumers. The personalized choice of network services also provides people with different forms of service experience [4]. For example, personalized network mobile service communication platforms such as QQ, WeChat, Douyin, Weibo, and blog.

4 The Network Technology Application in College Physical Education 4.1 The Micro-classes Application in Physical Education Micro-course is a new teaching resource and an innovative method, which includes comprehensive teaching models such as Internet technology, modern information technology, and innovative multimedia technology. In the process of physical education, the video data, picture data, text data and interactive platform of the micro-class online platform can be used on physical education classroom teaching [4]. Figure 2 is

118

S. Zhang and M. Liu

Micro-class design

Micro-class support

Micro-class activity design

Media choice design

Micro-class theme design

Micro-class scenario

Micro-class evaluation

Fig. 2 Design process of micro-class

the construction of the micro-class teaching platform. At the meantime, the teaching materials on the platform can also be used by students in their spare time, which effectively improves the extensibility of the physical education classroom, extends physical education to the students’ lives, and provides guidance and evaluation to individual students to fully improve students’ Interest and enthusiasm in physical education content [5].

4.2 The New Media Technology Application in Physical Education With the rapid development of society, people have entered an era of information and technology. In the education reform, physical education has also undergone deepening reforms and innovations [5]. Apply new media technology to physical education. For example, online information exchange platforms such as Superstar Learning Link, Weibo, WeChat, QQ, etc. Applying these platforms to physical education teaching not only provides an additional platform for students and teachers to communicate and learn, but also allows students to learn anytime and anywhere, and teachers can answer questions anytime, anywhere. The media technology in physical education not only provides teachers and students with a good learning exchange platform, but also helps teachers and students save valuable time [6].

The Application and Development of Network Technology …

119

Fig. 3 Application of standard technical action video in physical education

4.3 Standard Technical Action Videos Are Introduced into Physical Education Teaching At present, Chinese sports educators are limited and each sports educator has different skills, so it is very important to introduce standard technical action videos into physical education. By watching standard technical videos, teachers can better find their own shortcomings, make timely modifications, set a good example for students’ learning, and provide guidance. Figure 3 shows the introduction of standard technical action videos into physical education [7]. At the same time, standard technical action videos are introduced into the physical education classroom, allowing students to observe and study carefully. Teachers can unify standards in the process of teaching and knowing, and students can find good role models in the process of learning, and they can do their movements better.

4.4 The Video Recording Technology Application in Physical Education At the learning process, only by understanding your own shortcomings can you learn better and make faster progress, so that time will not be wasted. Video recording technology is used in physical education. Students’ learning process and training process can be photographed. Students and teachers can use video to find out where students’ actions are not standard or correct [8], as shown in Fig. 4. In this way, it is more convenient, more accurate and more accurate for teachers to guide students.

120

S. Zhang and M. Liu

Fig. 4 Application of video recording technology in physical education

4.5 The Artificial Intelligence Technology Application and Wearable Devices in Physical Education Now all kinds of smart devices can better synchronize data and information, which provides greater convenience for physical education. In the past, the registration, conversion and input of various physical test scores of students was a very tedious task. A physical education teacher often needs to wake up and deal with the performance data of students of the entire age [9]. With the assistance of smart devices and software, physical education teachers only need to operate mobile smart devices. For example, install the Excel365 cloud version and Baidu network disk on smart phones, tablets, notebooks, etc., you only need to enter the calculation formula on the software, and the results can be directly entered on the mobile device in the subsequent testing process, and the software can automatically Converting grades and uploading them to cloud storage simplifies a series of tedious processes such as registering grades on paper documents, converting grades, and then inputting them to a computer. Teachers can also use software to quantitatively analyze student performance, so as to design the next stage of course content more reasonably [10]. Through artificial intelligence technology and wearable devices, rope skipping technology, running timing, performance analysis, etc. are more convenient and faster.

The Application and Development of Network Technology …

121

While saving manpower and financial resources, the synchronization of data information also allows physical education teachers to better understand students’ learning and training conditions [10].

5 Conclusion The university sports networked teaching platform provides a good learning platform for improving student sports. From the perspective of college sports network development, the construction of college sports network courses and the improvement of related technologies are the future development trend of college sports teaching. Colleges and universities should strengthen the construction of network platform, give full attention on the advantages of combining classroom teaching and network teaching mode, and promote the formation of sports literacy. Acknowledgements Teaching Reform Research Project of Wuhan Business University, Project Name: Study and Practice of Comprehensively Improving Teachers’ Teaching and Education Ability—Take Wuhan Business University as an Example; Project Number: 2019Z001.

References 1. Gao, Z.: Research on the innovative model of college physical education under the background of the Internet. Chin. J. Multimedia Netw. Teach. 9(07), 62–64 (2018). (in Chinese) 2. Guo, H.: Practical research on the reform of college sports information teaching in the Internet+ era. J. Changzhi Univ. 35(05), 21–23 (2018). (in Chinese) 3. Cai, X., Xie, Y.: The reform of college sports information teaching under the background of the “Internet+” era. J. Hum. Soc. Sci. 38(3), 87–89 (2018). (in Chinese) 4. Tang, L.: The construction of a networked teaching model for college physical education. Contemp. Sports Technol. 8(13), 32–34 (2018). (in Chinese) 5. Feng, W.: Research on the teaching innovation of college physical education from the perspective of Internet media. J. Hubei Correspondence Univ. 7(30), 15–17 (2018). (in Chinese) 6. Zhu, F.: Research on the promotion strategy of multimedia network teaching platform in college physical education. Inner Mongolia: Inner Mongolia Normal University 4(03), 43–46 (2017). (in Chinese) 7. Li, S.: Multimedias and modern network application in college physical education teaching. J. Liaoning Univ. Sci. Technol. 36(06), 64–66 (2018). (in Chinese) 8. Gao, X.: Research on the application status of information technology in physical education. Yantai: Ludong Univ. 11(12), 206–209 (2015) (in Chinese) 9. Song, B.: Analysis of university sports networked teaching and management mode. Electron Technol. 28(05), 179–183 (2019). (in Chinese) 10. Huang, X.: The application of network technology in the reform of college sports information teaching. China Phys. Educ. 19(22), 142–144 (2018). (in Chinese)

The Practical Research on the Teaching Reform of College Sports Information in the “Internet+” Era Shuang Zhang and Mairu Liu

Abstract With the development of the Internet, the concept of “Internet+” came into being and was a key role in the process of realizing the informatization upgrade and transformation of traditional industries. The reform of college sports informatization teaching aims to integrate college sports teaching and informatization teaching in order to implement the new curriculum reform requirements and realize the innovative development of traditional sports teaching. The state attaches great importance to the development of higher education and actively explores effective ways of using the Internet in the field of education, and has achieved ideal teaching results. Based on the basic connotation of “Internet+”, this article analyzes the status quo of physical education in Chinese universities, and discusses how to reform college sports informatization in the “Internet+” era. Keywords “Internet+” · College physical education · Physical education · Informatization · Teaching reform

1 Introduction At present, China’s informatization construction is continuously advancing, and all walks of life are vigorously promoting and applying informatization technology to promote industrial upgrading. Major universities are also actively participating in this process and widely applying informatization in education and teaching to improve the school’s own teaching level. The implementation of physical education is a key way for universities to implement quality education and promote the comprehensive development of students. It is of great significance to building a healthy China,

S. Zhang Wuhan Business University, Wuhan, Hubei, China M. Liu (B) Central China Normal University, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_15

123

124

S. Zhang and M. Liu

Fig. 1 “Internet+” new teaching model

building a country with strong human resources, and realizing the great Chinese dream [1].

2 The Basic Connotation of “Internet+” The “Internet+” new teaching model means that teachers are guided by “health first”, with new curriculum standards and new concepts as guidelines, and students as the main body. The teaching content provide relevant information and videos for each special item, encourage students to actively use the Internet outside of class, and have a sensory understanding of the basic common sense and basic skills of the selected special item, so that they can choose the correct course, and then through the classroom teaching, independent learning and practice, a teaching system that communicates, explores, summarizes and improves teaching measures to complete teaching tasks [2]. It can not only avoid the blind selection of students when choosing courses, but also provide enough time and space for students to actively become familiar with various sports. Its structural form is: inspire interest-elective study-communication and discussion-summary evaluation-strengthen and improve, as shown in Fig. 1.

3 The Positive Significance of Internet Information Technology to College Physical Education 3.1 Promoted the Expansion of College Physical Education Content Traditional physical education classroom teaching is often teacher-centered, allowing students to repeatedly practice the technical movements demonstrated by the teacher. Therefore, to improve the efficiency of physical education, it is needed to enrich the content of physical education and enhance its interest and diversity [3]. In the design of physical education content and activities in universities, through the introduction

The Practical Research on the Teaching Reform …

125

of information technology and the combination of sports professional knowledge, not only can the advantages of Internet information technology be used, but also the content of physical education can be enriched, thereby attracting students’ attention and inspiring students to learn independently motivation, cultivate students’ good exercise habits and awareness of exercise [3].

3.2 The Lack of Physical Education in Universities to a Certain Extent Traditional physical education is difficult to teach students due to factors such as venues and equipment. The rapid development and widespread application of network information technology has brought mankind into a new and rapidly developing information age [2]. With the application of network information technology in various fields of teaching, the ways for students to acquire knowledge has increased exponentially.

4 The Status Quo of Physical Education in Chinese Universities 4.1 Lack of Information Teaching Awareness With the information technology development, universities have gradually applied information technology in actual education and teaching practice. However, among many college courses, physical education is the most basic course, which has a different teaching mode and teaching focus from other college courses [4].

4.2 The Proportion of Sports Information Teaching Is Low Chinese universities generally have solidified thinking, that is, physical education aims to cultivate students’ physical fitness, develop psychological quality, and in actual teaching, achieve the teaching goal through a single physical education activity [4].

126

S. Zhang and M. Liu

4.3 Teachers Lack the Awareness of Applying Information Technology In the practice of physical education in universities, teachers play a vital role, and their cognition of informatization teaching will directly affect the reform effect of college sports informatization teaching. However, the traditional solidified teaching concept is deeply ingrained in the minds of college physical education teachers, which leads to teachers’ lack of awareness of applying information technology [5].

4.4 Incomplete Information Teaching Infrastructure For smoothly promoting the reform of sports informatization teaching, universities should be equipped with complete informatization teaching infrastructure. However, in fact, the construction of informatization teaching facilities in most universities in China is more reflected in supporting the examination of key subjects in the traditional sense [5].

5 The Reform of College Sports Information Teaching in the “Internet+” Era 5.1 Building an Information Network Information teaching and network technology are inseparable. Traditional physical education in universities emphasizes the theory and practice combination, and few information networks provide corresponding technical support. To promote the reform of sports teaching informatization, universities can provide support for sports informatization teaching by establishing a website platform, set up special sports teaching modules on the website, and enrich the teaching content of the website on teaching planning, preview content, information feedback, etc. [6]. Colleges should mind the interactivity of the website platform, increase the promotion of the website, guide more students to actively participate in online communication activities on the platform, and help students broaden their knowledge of sports through the website, and provide more ways and opportunities for learning in sports [7].

The Practical Research on the Teaching Reform …

127

Fig. 2 Physical education information evaluation system

5.2 Building an Informatization Evaluation System The physical education in universities at this stage, the use of “Internet+” can better carry out diversified evaluations, so that the auxiliary evaluation indicators and evaluation system are more scientific and reasonable, optimize the final effect and the final evaluation effect, and assist students in the existing sports knowledge and skills [7]. The effectiveness of the final evaluation directly reflects the current abilities of students, so the role of objective evaluation is very obvious. It needs to be evaluated effectively in combination with the actual situation, so as to conduct diversified evaluations from various aspects such as exercise habits and athletic ability [8]. Figure 2 shows the physical education information evaluation system.

5.3 The Internet Promotes Innovation in College Physical Education Teaching Methods The application of multimedia equipment and Internet technology has caused major changes in the teaching methods of teachers and expanded the channels of college physical education. Informatization teaching of physical education in universities has changed the traditional linear teaching of teachers and students face-to-face on the playground, and has evolved into an auxiliary and diversified teaching method, which is based on information education resources [9]. Good learning atmosphere, mobilize students’ learning passion, and enable students achieve the dual purpose of physical exercise and personality cultivation [9].

128

S. Zhang and M. Liu

Fig. 3 Internet+ physical education model

5.4 The Internet Helps Universities Establish a New Model of Physical Education The Internet technology development has accelerated the transformation of physical education from the traditional one-way model to a diversified model. For example, teachers make teaching courseware, teaching level and teaching results into digital resources, and deliver the required course resources to students in the form of network communication. Since college physical education is mainly based on outdoor courses, it is unavoidable to be affected by venues and sports facilities. If teachers use mobile clients or other auxiliary teaching tools, they can help realize the audiovisual teaching of sports [10]. Digital processing of physical education resources and implementation of audio-visual teaching are conducive to perfecting physical education resources and promoting changes in physical education models, as shown in Fig. 3.

5.5 Information Literacy and Informatization Ability Improved Teachers’ information literacy determines the depth of physical education courses. Physical teachers should keep up with the pace of information development, on the basis of improving their own knowledge structure, actively learn computer knowledge and multimedia technology, master modern network teaching methods, learn to use and maintain multimedia equipment, and apply information skills to physical education. For example, if teachers want to make courseware, they need to learn to

The Practical Research on the Teaching Reform …

129

collect and download relevant information online, learn to use software such as Photoshop, Flash, Author ware, and master the processing methods of audio and video, so as to integrate the teaching concept of physical education with the curriculum design [11].

6 Conclusion To sum up, the processing of developing college physical education, teachers should carry out information-based teaching reforms. Starting from the basic teaching content, keep up with the development of Internet informatization. At the same time, starting from the specific college sports information teaching mode, it provides students with good and high-quality classrooms. With the help of Internet information teaching, students can grow and develop better in the rich physical education system. Acknowledgements The Wuhan Equine Industry Development and Horse Racing Event Transformation and Upgrading Project , Project Number: WHSM-2019122401.

References 1. Wang, J.: A preliminary probe into the teaching mode of physical education in universities in the internet age. J. Hunan City Univ. 7(05), 299–301 (2016). (in Chinese) 2. Gao, Z.: Research on the innovative model of college physical education under the background of the Internet. Chin. J. Multimedia Netw. Teach. 9(07), 62–64 (2018). (in Chinese) 3. Guo, H.: Practical research on the reform of college sports information teaching in the Internet+ era. J. Changzhi Univ. 5(05), 21–23 (2018). (in Chinese) 4. Cai, X., Xie, Y.: The reform of college sports information teaching under the background of the “Internet+” era. J. Hum. Soc. Sci. 38(03), 87–89 (2018). (in Chinese) 5. Tang, L.: Some discussions on the teaching mode of college sports information based on the theory of constructivism. Contemp. Sports Technol. 8(13), 32–34 (2018). (in Chinese) 6. Yang, J.: Analysis of the predicament of college sports informatization teaching in the new era and discussion on improvement measures. Vocat. Technol. 16(06), 65–68 (2017). (in Chinese) 7. Wu, J., Li, P.: Research on how college physical education informatization requires physical education teachers to respond during the transition period. Sports Sci. Technol. Lit. Bull. 24(03), 36–39 (2016). (in Chinese) 8. Xu, K., Li, Y.: Research on the reform and development of college physical education under the background of the “Internet+” era. Youth Sports 21(05), 110–111 (2019). (in Chinese) 9. Yang, X.: Exploration of the blended learning model of college physical education teaching under the background of “Internet+” . Contemp. Sports Technol. 9(13), 12–13 (2019). (in Chinese) 10. Feng, W.: Research on the teaching innovation of college physical education from the perspective of Internet media. J. Hubei Correspondence Univ. 7(30), 15–17 (2018). (in Chinese) 11. Huang, M.: The reform of college sports information teaching under the background of the “Internet+” era. China Rural Educ. 9(24), 42–44 (2018). (in Chinese)

The Cultivation Research of Management Accounting Talents in Universities Under the Background of Artificial Intelligence Hongli Jin

Abstract With the application of artificial intelligence (AI) technology in the field of accounting, it brings opportunities and challenges to traditional accounting work. This not only speeds up the pace of business transformation of financial personnel, but also puts forward higher requirements for the training model of accounting professionals in colleges and universities. This article combines the reforms caused by AI technology in the accounting industry, deeply analyzes the current situation of college accounting personnel training mode, points out the problems in college accounting personnel training, and proposes strategies for college management accounting personnel training under the background of AI. Keywords Artificial intelligence · Universities · Management accounting · Talent training

1 Introduction The rapid development of information technology has caused great changes in accounting theory and practice, and changes in the external environment have placed higher requirements on the knowledge and skills of accounting talents. The accounting work has changed from the traditional static mode of financial accounting to the dynamic mode of management accounting, and the functions of accounting, such as planning, decision-making, and analysis, have been highlighted. In the current AI environment, society needs high-quality comprehensive accounting talents who are proficient in accounting business, strong in information technology, and familiar with international rules. Colleges and universities are an important position for the cultivation of accounting talents, and they should innovate the training model of accounting talents based on professional needs to adapt to the new requirements of accounting talents put forward by enterprises in the AI era [1]. H. Jin (B) Wuchang Shouyi University, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_16

131

132

H. Jin

Fig. 1 Artificial intelligence

2 Overview of AI The so-called AI is actually what is often referred to as “AI”. This is a new technological science, mainly used for research and development of theories, methods and application systems that simulate, extend and expand human intelligence [2]. The embodiment of “intelligence” lies in the intelligence shown by the artificially manufactured system. Today, AI has begun to be applied in many fields. From a certain perspective, the emergence of AI will also bring changes to all walks of life in society to a large extent, as shown in Fig. 1. In the accounting industry, the introduction and application of AI will also lead to a change in accounting from simple accounting to management, thereby promoting the better development of the accounting industry [2]. Moreover, this can also promote changes in the training objectives and models of accounting professionals in secondary vocational colleges.

3 Changes in the Demand for Accounting Talents Under the Background of AI Since the development of AI in the 1940s, it has been widely used in the computer industry, banking industry, and accounting industry. In the traditional accounting industry, most of the accounting work is done manually, but most of the current accounting work can be done with accounting software, which saves manpower [3]. The impact of AI on accounting is shown in Fig. 2.

3.1 The Decline in Demand for Talents in Basic Accounting Positions With the help of financial AI, the intrinsic value of accounting data has been truly reflected. With the support of AI, massive amounts of data are integrated and classified

The Cultivation Research of Management Accounting Talents …

133

Fig. 2 The impact of AI on accounting

through automatic search systems and knowledge processing systems; data mining technology analyzes basic accounting data, conducts in-depth data mining, discovers hidden patterns in the data, and improves the quality of the data., And convert it into practical information such as financial statements and accounting decision-making information; the interactivity in the decision-making process can then be realized through the AI decision-making system, through man–machine dialogue, combined with the expert system, to narrate and diagnose the relevant content of financial management Questions and analyze the data to complete the final decision. Financial data is fully utilized, financial analysis is more comprehensive and clear, financial forecasting and control are more realistic, financial decision-making is more scientific, accurate, and convincing [4]. At the same time, the efficiency of financial work has been greatly improved.

3.2 Increasing Demand for Accounting Talents for New Positions The application of financial AI technology has spawned new accounting positions. For example, in terms of accounting, a large number of companies use process automation software to automatically generate various reports, build an information sharing platform, and realize communication between upstream and downstream enterprises, bank-enterprise reconciliation, and online tax filing. The development and maintenance of these automated software relies on the common wisdom of R&D personnel and accounting personnel. The specific operation requires talents with financial expertise, computer technology and cross-field work experience, and new accounting positions have emerged. However, in the survey, it is found that at this stage accountants are not paying enough attention to cross-field development

134

H. Jin

[5]. Most accountants only focus on their own professional development, and lack of attention and learning in computer knowledge, marketing, finance and other related fields, thus restricting accountant career re-planning and development. Accounting talents must have a deep understanding of this new technological change in order to actively respond to the impact and challenges of AI on the accounting industry.

3.3 The Shortage of High-Level Management Accounting Talents Liu Hongwei, President of the Chinese Association of Chief Accountants, stated at the World Accounting Forum in May 2018: Management accounting has entered a historical period of major changes and development in the world. Financial AI technology has realized the standardized process of accounting information, and the accounting function is gradually replaced by financial robots. This change in accounting functions brought about by technological innovation has released a large number of basic accounting personnel. This part of the staff must comprehensively learn accounting, financial management, taxation and information system related knowledge, and transform to management accounting talents [6]. This is the ideal transformation path for accountants. Under the guidance of corporate development strategy, from the perspective of management accounting, analyze and refine data, prepare budget plans, control corporate operations, evaluate performance, and provide guidance for corporate development and governance.

4 The Innovation of Accounting Talent Training Model Under the Background of AI 4.1 Update Educational Concepts and Cultivate Students’ International Vision The current changes in the global economic structure, the adjustment of industrial structure, the acceleration of knowledge update, the transformation of high-quality scientific and technological achievements and the development of productivity all require the integration of different fields [6]. Therefore, it is necessary to continuously broaden students’ knowledge horizons, carry out interdisciplinary learning, and break through the boundaries of a certain subject. The essence of accounting is a business language that communicates economic and trade exchanges between various countries and regions. Therefore, the training of accounting talents should not be limited to the domestic accounting education system. It is necessary to strengthen the explanation of international accounting standards and strengthen students’ understanding of international accounting standards. Mastery of accounting standards [7].

The Cultivation Research of Management Accounting Talents …

135

4.2 Improve the Quality of Professional Teachers Teachers are the implementers and implementers of the teaching process. In the context of AI, the role of teachers should be re-examined and the guiding role of teachers should be brought into play. To ensure that the education team is advanced and innovative, colleges and universities should actively organize teachers to receive training on information technology and modern teaching technology, encourage teachers to use modern teaching methods to teach, and promote new teaching models [7]. You can invite experts and scholars in the accounting industry outside the school, such as corporate executives, Internet pioneers, etc., to give teachers and students the latest knowledge lectures and training in the industry, and use the most authentic teaching methods to make up for the lack of classroom teaching.

4.3 Improve the Curriculum System Accounting teaching in colleges and universities should add practical courses such as financial information simulation practice and computer auditing. By embedding in the business management environment, improve students’ ability to integrate theory with practice, and cultivate students’ comprehensive ability and overall quality [8]. For example, through the ERP sand table to simulate the teaching of the business management system, the abstract financial management is presented in an intuitive way, so that students can experience it, so that students can use various resources and plans to timely and effectively use accounting information in market analysis, financial management and other activities. Formal expression. Reasonably set up courses on the basis of knowledge, abilities and literacy, clarify the relevance of various courses and teaching links to students’ knowledge, abilities, and literacy, build a multi-disciplinary theoretical framework system and professional backbone courses to form professional courses and general education A diversified curriculum system composed of education courses, elective courses and practical courses.

4.4 Optimize Teaching Methods In terms of teaching methods, attention should be paid to integrating information into the basic courses of the subject and the teaching of practical courses to form an informative and practical curriculum system. According to the actual situation of the school, the proportion of credits in each knowledge system should be set, and the public basic courses should be streamlined to provide sufficient time for students to study professional courses [9]. We should give full play to the advantages of modern information technology, develop new teaching methods with information embedded theory, and cultivate accounting professionals who meet the needs of

136

H. Jin

professional ability [9]. Classroom teaching is an important method of accounting education. Traditional classroom theory teaching lacks vividness. College accounting theory education should make full use of advanced information technologies such as Internet big data and cloud computing to enable accounting students to understand the application of computer information technology and stimulate students Initiative in learning. Such as teaching financial analysis theory courses, you can use a company’s financial report, use XBRL financial reporting tools to analyze the company’s financial reports [9].

4.5 Improve the Evaluation System Under the background of AI, accounting education should aim at cultivating students’ knowledge and comprehensive abilities, disciplines that require a solid mastery of theoretical foundations, and examine students’ mastery of theoretical connotations [10]. For analysis courses, subjective assessments should be the main. Design the exam content based on industry cases to examine students’ analytical ability. In the new environment, the traditional examination method should be changed, and a combination of written examinations, report submissions, and defenses can be used to give full play to the motivational and guiding role of the examination. In addition, increase the proportion of students’ usual grades [10].

5 Conclusion The development of the intelligent age has had a significant impact on accounting theory and practice. The focus of the work of financial accountants is to develop management fields such as internal control analysis and risk management. In the era of AI, high-quality accounting talents with strong analytical and decision-making capabilities are urgently needed by enterprises. Accounting education in colleges and universities should analyze the current situation of the demand for accounting talents in the development of enterprises, accelerate the transformation of accounting education mode, lead the innovation of educational concepts and models with informatization, and cultivate more high-quality comprehensive accounting majors that meet the needs of society and enterprise talent development.

The Cultivation Research of Management Accounting Talents …

137

References 1. Zhang, H.: The impact of artificial intelligence on the financial and accounting industry and its talent demand. Chin. Township Enterprise Account. 12, 189–191 (2016). (in Chinese) 2. Zou, L.: Challenges and countermeasures of accounting talent cultivation under the background of artificial intelligence. Econ. Trade Practice 11(07), 235–237 (2017). (in Chinese) 3. Lu, S.: College professional literacy education from the perspective of artificial intelligence. Educ. Vocation 8(07), 104–108 (2018). (in Chinese) 4. Zhang, W., Guo, Y.: Analysis of the impact of artificial intelligence on human resources in the accounting industry. Shanxi Youth 6(18), 22–24 (2018). (in Chinese) 5. Tang, Q.: Overview and prospects of accounting in the era of artificial intelligence. Hebei Enterprise 7(09), 32–34 (2018). (in Chinese) 6. Qi, D.: Transformation and reconstruction of accounting talent training model under the background of artificial intelligence. Comm. Account. 4(16), 88–90 (2018). (in Chinese) 7. Zhang, J.: Research on the transformation and development of financial accounting under the background of artificial intelligence. Admin. Bus. Assets Finance 3(16), 112–114 (2018). (in Chinese) 8. Liu, F.: Teaching research on management accounting courses for higher vocational accounting majors. Bus. Account. 11(11), 61–63 (2018). (in Chinese) 9. Liu, N.: Research on the innovation of higher vocational accounting talents training in the artificial intelligence era. J. Hebei Softw. Vocational Tech. Coll. 8(03), 44–46 (2018). (in Chinese) 10. Zhao, C., Zhang, P., Liu, W.: Construction of a practical teaching system for the cultivation of accounting information management professionals in higher vocational education in the era of artificial intelligence. Account. Learn. 9(08), 11–13 (2019). (in Chinese)

Design and Management of Students’ Homework of Advanced Mathematics Based on Online Teaching Min Sun and Xiaomin Tang

Abstract Students’ homework is an important link in the education of advanced mathematics course. It can test the teaching effect and promote students’ active learning; it is also the key to improving the teaching quality. Through the design, requirement and management of students’ homework in each link of online teaching, this paper explores the design and management of before class homework, classroom homework, after-school homework and unit work, so as to play a role in effectively improving the quality of online teaching of the advanced mathematics course, and make the homework a breakthrough point of constructing the advanced mathematics curriculum. Keywords Advanced Mathematics · Online · Homework

1 Introduction Advanced mathematics is a very important required course in science and engineering universities; it is also a course which is relatively difficult to learn. To improve the teaching quality of advanced mathematics, a platform is built based on the Internet and information technology to provide an effective way for teaching reform and innovation [1]. In the platform, the mode of students’ homework is changed fundamentally, while students’ homework is exactly a very important link in the whole teaching activity. It is the comprehensive embodiment of the teaching content, the teaching method and the management of teaching resources. This paper discusses students’ homework under the online teaching mode [2], in order to provide a reference for improving the quality of online advanced mathematics teaching.

M. Sun (B) · X. Tang School of Science, Huzhou University, Huzhou, Zhejiang, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_17

139

140

M. Sun and X. Tang

2 Research Background First, under the background of rich teaching resources like excellent national courses and sharing courses, it is an effective way for advanced mathematics teachers to introduce network resources into the traditional teaching and give full play to the advantages of network platforms and online resources [3–6]. Second, under the teaching concept of taking students as the main body and teachers as the leading role, homework is a way to promote students’ active learning. The homework mode based on network platform is a breakthrough and innovation of the traditional one, which makes it necessary to publish and review students’ homework and provide feedback with the help of the network platform [7–9]. Third, under the background of complete online teaching (during the period of epidemic), it is necessary to study the management of online homework [10] in order to explore the advantages of the online platform.

3 Online Homework and Requirements 3.1 The Operability of Online Homework There are a lot of online teaching resources which can be used for the online teaching platform. But at present, most students use mobile phones for online classes; they are not suitable for installing too many applications. Meanwhile, considering the traffic jam on the Internet, as well as poor network signals in remote areas such as Tibet, we should choose the platform that is easy to operate. Therefore, the author uses two platforms to publish online homework: QQ group [11] and Xuexi Tong, which are used interactively. According to the objective situation of homework and teaching needs, they can be switched in flexible.

3.2 General Requirements for Online Homework Before the online class, communication platforms (QQ group and Xuexi Tong) are established, on which the specific requirements of online homework are clearly put forward. For example, homework published in QQ group should to be submitted online in the format of (clean and tidy) pictures and submitted on time. (The posted homework specifies its deadline on the header.) For homework on the Xuexi Tong platform, the submission time can be set. The submitted homework with a lot of errors can be sent back to the student; the student can do the homework again and submit it before the time limit. All assignments are required to have separate exercise books, and provide detailed solution process. The page format is the same as the format of offline homework of the last semester. Each time when students receive the results,

Design and Management of Students’ Homework …

141

they should timely record them in the exercise book. They need to record the date, marking right and wrong answers, and correcting errors (with a red pen). After the school opens, the homework book will be collected and submitted to the teacher by the subject representative; the teacher will check the homework and correct them, and record the score of homework as a part of students’ final grade.

3.3 Types of Online Homework In order to effectively manage and give full play to the advantages of online teaching (this paper only discusses the issue from the perspective of giving full play to the advantages), according to the needs of classroom teaching and from the perspective of promoting students’ independent and effective learning, online homework can be divided into following types: homework before class (encourage the preview and review and test the results), classroom homework (supervise and inspect students’ learning situation in online classroom), after-class homework (check the teaching effect and students’ mastery of teaching contents), and unit work (check the online teaching situation and students’ mastery of teaching contents for a period of time).

4 Homework Design and Management 4.1 Design and Management of Homework Before Class The analysis of students’ situation before class is an indispensable part of lesson preparation. The teacher and students have studied together for one semester before, so they have certain understanding of each other. In order to facilitate the before class preparation according to the characteristics of online teaching, the teacher need to use the homework before class to promote and test students’ preview and review of knowledge points, so as to understand the learning situation, timely supplement or strengthen teaching contents, adjust the teaching plan and arrange teaching activities. For some online homework tasks before class, students can provide feedback to the teacher in advance through Wechat and QQ; other tasks can become interactive questions before class. For example, the preparation of an example for the first order linear differential equation requires students to do the preview homework as below. (The preview homework is not to be  Rsubmitted).  Erequired m L dt dt in which R, L , E , ω are all sin ωt e To solve the equation, m L constants. The question is simple, but it is directly related to students’ understanding process in the class. Therefore, it is necessary to design this preview assignment. How to manage it if it is not submitted? The following three methods are adopted: communication at any time, random inspection by conversation and random inspection by questioning. Communication at any time means that in the chat interface,

142

M. Sun and X. Tang

some students actively communicate with the teacher on this assignment, and the teacher also gives timely feedback online. Random inspection by conversation is happened in a relaxed atmosphere; the teacher can ask for some students in the QQ group. Random inspection by questioning refers to the spot check of instructions and requirements when setting up. On one hand, students need to upload the calculus process online in real-time; on the other hand, they can ask questions related to the solution of this problem. The teacher can design several small questions in advance. Examples include, from the integral method, which integral can you use to solve that problem? Is that the formula  axmethod and formula 1 ax (a sin bx −b cos bx)+C? Feedback information obtained e sin bxd x = a 2 +b 2e from several ways can be used to understand the situation of students and carry out targeted classroom teaching.

4.2 Design and Management of Classroom Assignments (Classroom Exercises) We know that theory teaching in the classroom is the most important form for the education of advanced mathematics. Therefore, the classroom of advanced mathematics should be the main position for students to acquire knowledge and develop and improve their ability. It is necessary to consolidate basic knowledge points and improve basic operation abilities through timely classroom practice. No matter online or offline teaching, classroom practice is indispensable. Due to the heavy task of classroom teaching, the time allocated for classroom practice should be “short and fast”. Classroom exercises based on online teaching are divided into two types: questioning and writing. Questioning exercises are scattered in the teaching of multiple knowledge points. The questioning exercise is random and interactive; students can be asked at any time. Therefore, it can also check whether students are concentrated in online listening. The number of written exercises should be appropriate, and with moderate difficulty levels. Students are required to submit a single picture of the problem-solving process. The evaluation of “speaking and describing” of questioning exercises and the accuracy of the format of writing exercises are recorded in the column of class record. In the follow-up teaching, problems can be designed according to the situation found and mastered in the classroom exercise; teachers can also determine which students should be asked in advance.

4.3 Design and Management of Homework After Class Homework after class is an important feedback on the achievement of students’ learning objectives. Homework can reflect students’ mastery, consolidation, understanding and promotion of knowledge; it is also an important carrier for students to

Design and Management of Students’ Homework …

143

develop good habits. Homework reflects the achievement of knowledge objectives and emotional goals. Students can know their own shortcomings and improvement points through the feedback of homework, so as to develop learning ability. Students can improve the quality of homework in the interaction of expectation and evaluation, and then improve the quality of classroom teaching. Therefore, scientific and reasonable design and management of homework are indeed an important part of the teaching activity. There are various types and sources of online homework questions. Teachers can choose appropriate subjective and objective questions according to the teaching content. Both platforms can upload pictures of the detailed solution process of subjective questions. Generally, QQ online is the most frequently used. The homework submitted by QQ group can receive feed back on the same day. Objective questions are mainly submitted by Xuexi Tong, and the system will provide results in time. In the distribution of quantity, questions on strengthening basic knowledge should take 60%; consolidation and improvement problems should take 30% and comprehensive thinking questions should take 10%. Homework is assigned in each class and submitted twice a week. Although the teachers’ workload is increased, timely feedback does promote the understanding and absorption of knowledge, which is obviously reflected in the overall score of the final examination. From the perspective of timely feedback, online homework is better than offline homework.

4.4 Design and Management of Unit Work Unit work of advanced mathematics refers to stage work which can be integrated according to teaching contents in the textbook. It is generally arranged after the teaching of one unit. For example, the differential calculus unit work can be arranged after learning derivative application. According to the teaching plan, unit work can be completed online in class or after class. For example, the unit work of differential science is designed with 20 objective questions on strengthening the foundation, consolidate and improvement, as well as comprehensive thinking. The test has 100 points, which should be completed in the Xuexi Tong platform within the specified time period. After the time limit, students can get feedback of their scores in time. For individual cases like network problems, delay submission and other measures are adopted. After all students submit the homework, the scores are saved and counted. In view of the space limitation, no specific unit assignments are listed here.

5 Conclusion Through the design, development and accumulation of advanced mathematics homework on the online platform, course construction materials are enriched. Through the requirements and display of course assignments, students can develop the good

144

M. Sun and X. Tang

habit of being rigorous, conscientious, practical and honest. As the famous educator Shengtao Ye said, “what is education? Education is to develop good habits.” In the process of doing homework, students can sort out key points of knowledge and carry out review and preview pertinently. The feedback information for students’ homework is more timely in online platforms, which is reflected in the system’s function of instant feedback, teachers’ timely correcting and feedback twice a week, as well as teachers’ online tutoring at any time. Timely feedback as well as timely correction and supplement have become an important way to effectively improve the teaching quality. Through the online homework, we can learn more about the learning platforms of Xuexi Tong and QQ group, which is conducive to improving the ability of information teaching. Online homework also has obvious drawbacks. For instance, various functions of the application of QQ group are limited. Through the QQ group, online homework can only be submitted by pictures of handwriting. In the classroom exercise in which questions are shared by the QQ group screen, students cannot directly input mathematical formulas or graphs. Although the formula can be input with the help of pictures or software like Word, it is not convenient and fast. It is believed that with the popularity of electronic products, the problem can be solved if each student can have a tablet computer with handwriting. The convenient and timely online communication can be realized with handwriting pens. Acknowledgements This paper is the outcome of the study, Exploration and Practice of Training Outstanding Science Teachers in Local Normal Universities Based on the Co-Education of Schools and Local Authorities, which is supported by the Foundation for Teaching Reform Projects of the “13th Five Year Plan” of Zhejiang Province on Higher Education. The project number is jg20180325.

References 1. Wang, C.: Implementing advanced mathematics teaching reform according to students’ learning status. Adv. Math. Res. 23(4), 112–117 (2020). (in Chinese) 2. Li, X., Luo, L., Cheng, M.: Exploration of online teaching mode of linear algebra course during epidemic period. Heilongjiang Educ. 9, 8–9 (2020). (in Chinese) 3. Sun, Z., Peng, X., Xia, X., Li, S.: Research on teaching method of advanced mathematics in Internet online teaching. J. Higher Educ. 26, 44–47 (2020). (in Chinese) 4. Zhou, G., Wang, F., Chen, Z., Zhou, J.: Exploration of online course platform resource construction to assist higher mathematics classroom teaching. J. Zhejiang Shuren Univ. 3, 39–43 (2018). (in Chinese) 5. Zheng, Y.: Improving the teaching effect of “higher mathematics” with the help of network and software. Microcomput. Appl. 35(5), 33–34 (2019). (in Chinese) 6. Fang, M., Cai, H.: Optimization and integration of higher mathematics teaching resources. Educ. Forum 7(30), 205–206 (2019). (in Chinese) 7. Wang, W., Mao, Z.: Research on the application of network aided teaching platform for Higher Mathematics. J. Yangtze Univ. (Sci. Ed.) 10(13), 151–152 (2013). (in Chinese) 8. Li, M.: Research on advanced mathematics curriculum reform based on information teaching. J. Jilin Radio Television Univ. 3, 54–55 (2020). (in Chinese)

Design and Management of Students’ Homework …

145

9. Yuan, J., Lv, Z.: Research and practice of hybrid teaching based on network platform—taking higher mathematics as an example. J. Chaohu Coll. 19(3), 144–147 (2017). (in Chinese) 10. He, H.: Reform and implementation of standardized management of higher vocational mathematics homework. China New Technol. New Prod. 4, 373 (2011). (in Chinese) 11. Liu, L.: Application and analysis of learning platform based on QQ group of smart phones in higher mathematics teaching. China Educ. Light Ind. 5, 93–95 (2015). (in Chinese)

The Application of Computer Information Technology in Environmental Analysis Xiaoning Fu

Abstract In the process of continuous development of China’s computer information technology, it has been widely used in various fields, and it is no exception in the field of environmental analysis. Combining computer information technology with specific environmental analysis, using modern environmental science theories and methods to protect the environment in a planned way, prevent the deterioration of environmental quality, and control the environment from pollution, which can promote the coordinated development of mankind and the environment. Therefore, in order to better study computer information technology in the field of environmental analysis, this article specifically discusses the application of computer information technology in environmental analysis. Keywords Environment · Environmental analysis · Computer · Information technology

1 Introduction For environmental analysis, computer information technology plays an important role and has a profound impact on the development of society. Nowadays, computer information technology has gradually developed as an important service and support method that China’s environmental protection work depends on. The use of modern information science technology and specific pollution prevention and control technology combined to form environmental information technology can provide the basis and support for environmental analysis. The key support can improve the comprehensive decision-making ability of environment and development, and can further strengthen the government’s public service ability. To build an environmentfriendly society to ensure the rapid realization of strategic goals of environmental analysis [1]. X. Fu (B) Science and Technology, Hunan University of Humanities, Loudi, Hunan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_18

147

148

X. Fu

2 The Significance of Applying Computer Information Technology to Environmental Analysis Computer information technology is widely used in today’s society and has become an indispensable device for many industries. Computer information technology has the characteristics of realizing resource sharing, diversified data communication forms, and decentralized data processing methods [2]. It can not only manage environmental resource information on the Internet, but also retrieve, collect, manage, and exchange data. The first is resource sharing. The application of computer networks has taken root in every department, among which computer hardware and software and data have realized resource sharing. Numerous computers are connected to form a huge network in different regions, and the performance of resource sharing is further improved. The second is the diversity of data communication forms. Computers are currently the main way for people to exchange information. Communication services include e-mail, chat, fax, remote file transmission, remote login, information browsing, etc., which effectively promote communication between people Communication and information dissemination [3]. There is also the decentralization of data processing methods. The decentralized computer data processing system has been applied to the specific work of various industries. In the major functional departments, the application of this system has realized the connectivity of data processing, so that the data there is a strong guarantee for collection and processing [2]. The actual operation of the environmental analysis project is very complicated, and the amount of information is huge. The application of computer information technology can solve this problem well. The application of computer information technology can realize the establishment of a large-scale data information library for environmental analysis, the establishment of statistical analysis of data and the establishment of reports and data release [2]. Environmental analysis will involve models involving pollution, ecology, water quality, etc., as well as a large number of calculation operations. The computer’s data analysis model can carry out programming work while solving the huge amount of data calculation.

3 The Application of Computer Information Technology in Environmental Analysis Environmental analysis informatization application mainly involves network communication technology, application development technology, database technology, model computing technology, data storage technology, remote sensing technology (RS), geographic information technology (GIS) and other information technology fields [4]. In recent years, environmental analysis and management

The Application of Computer Information Technology …

149

departments at all levels have widely applied information technology in environmental management fields such as environmental quality monitoring and management, pollution prevention and supervision and management, ecological protection management, environmental emergency management, etc. to carry out business management information construction, and provide an environment for environmental management and decision-making Information technology support and services [4].

3.1 The Application of GIS Technology in Environmental Analysis Use GIS to establish a map database, output full-element topographic maps for users, and output various thematic maps hierarchically according to user needs; use GIS to establish various environmental spatial databases, and combine various environmental information with their geographic locations for comprehensive analysis In the process of environmental monitoring, GIS technology can be used to store, process, display, and analyze the data collected in real time to achieve the purpose of providing auxiliary means for environmental decision-making; the current situation of natural ecology [5]. During the analysis process, GIS can be used to accurately calculate soil erosion, desertification, deforestation, etc., and to objectively evaluate the degree of ecological damage and the scope of the impact; GIS is used for environmental emergency early warning and forecasting, and can determine the location and location of accident risk sources [5]. At the same time, GIS technology is also important in water environment management and environmental quality assessment. It can also develop various emergency plans, mainly for various air and river pollution accidents. Application example is shown in Fig. 1.

3.2 Realize the Technologicalization of the Environmental Quality Monitoring System Using local area network, wide area network, environmental analysis system internal monitoring statistics, analysis system, online monitoring system and data reporting system to realize the analysis, reference, and printing of various monitoring data can be completed on the Internet, which greatly improves work efficiency. Figure 2 shows the application framework of computer information technology in environmental quality monitoring [6]. The person in charge of the environmental analysis project or regional environmental analysis can understand the local environmental conditions in time, make accurate judgments and decisions, and can make accurate reports to the local government so that the government can make scientific countermeasures [6].

150

X. Fu

Fig. 1 Application of GIS technology in environmental analysis

Fig. 2 Application of computer information technology in environmental quality monitoring

So as to promote the extension of the system from internal connections to external connections, thus forming a network system centered on business management.

The Application of Computer Information Technology …

151

3.3 Realize the Automation of Environmental Analysis Communication and Evaluation Through the reporting online acceptance system and online chat system, we can accept all-weather uninterrupted acceptance. At the same time, we can establish a database for case clue management, time-limited acceptance, handling communication alarm management system and authority management system support to realize the confidentiality and rapid processing of management cases [7].

3.4 Realizing the Real-Time Transmission of Environmental Analysis Information Using local area networks and automated office systems, the person in charge of environmental analysis projects or regional environmental analysis can communicate and consult online information to grasp the overall business dynamics, the dynamics of ideological work of cadres, employees and the masses, and the focus of attention. Bureau leaders and department leaders can discuss and deal with relevant issues on the Internet according to their own situation, and can promote the process of family-style communication [8].

3.5 Realize the “Digitization” of Environmental Analysis Engineering The “digitization” of environmental analysis projects is prominently reflected in environmental monitoring and environmental evaluation. Environmental monitoring is the foundation of environmental analysis [9]. Only when timely and sufficient environmental monitoring data are grasped can various environmental management and decision-making work be carried out smoothly. As an important means of environmental quality monitoring, computer information technology has played an important supporting role in environmental monitoring. The national environmental quality monitoring network covers the whole country and is composed of water quality monitoring stations involving major rivers, lakes and reservoirs, urban air monitoring stations, coastal sea monitoring substations, and acid rain and sandstorm monitoring stations. The monitoring information management system realizes accurate collection and timely transmission of environmental quality data, and provides timely and accurate environmental monitoring data for environmental analysis and management departments at all levels, scientifically judges the environmental situation, objectively evaluates environmental quality and pollution, and responds to environmental emergencies in a timely manner to provide information support [10], as shown in Fig. 3.

152

X. Fu

Fig. 3 Application of computer information technology in environmental assessment

4 Conclusion In recent years, China’s environmental pollution has become more and more serious, and the country has paid more and more attention to work in the field of environmental protection. Under the background of computer information technology, the integration of computer information technology in the field of environmental protection has become an irreversible trend. At present, the informatization of China’s environmental analysis work has achieved certain results in some fields, such as remote sensing technology and information transmission equipment. But on the whole, it is still in the stage of construction and development, there are still not enough areas, and there is still more room for improvement, such as the intelligent management and operation of environmental protection enterprises. Therefore, in order to enable environmental protection informatization to develop in the direction of more intelligent and environmental protection in the future, we should focus on cultivating

The Application of Computer Information Technology …

153

comprehensive talents with both professional and technical capabilities and strong environmental awareness. Acknowledgements Teaching Research Reform Projects of Hunan University of Humanities, Science and Technology.

References 1. Dong, J.: Talk about the application of information technology in the field of environmental analysis. China Sci. Technol. Expo 13, 255–259 (2017). (in Chinese) 2. Qiao, Y.: Talking about the application of remote sensing information technology in the field of environmental analysis. Technol. Life 11(02), 55–57 (2018). (in Chinese) 3. Wang, Z., He, S., Qiu, Z.: Problems and countermeasures in the construction of environmental inspection information. Environ. Develop. 9(06), 143–144 (2018). (in Chinese) 4. Li, Y.: Application of computer information technology in environmental analysis information system. Sci. Technol. Innov. Appl. 8(02), 167–170 (2017). (in Chinese) 5. Zhang, J.: The promotion of environmental testing on environmental governance. Contemp. Chem. Res. 11(03), 10–12 (2019). (in Chinese) 6. Zhang, J.: The application of electrochemical sensors in environmental testing. Energy Saving 14(02), 91–93 (2019). (in Chinese) 7. Liu, M., Yin, C.: Application of computer graphics technology in environmental monitoring. Electron. Technol. Softw. Eng. 14(18), 69–72 (2016) (in Chinese) 8. Zhao, J., Jia, M., Dong, X.: Research status and application analysis of irradiation technology in environmental analysis. Tianjin Sci. Technol. 8(03), 15–19 (2016). (in Chinese) 9. Li, B., Li, Q.: Information security in the field of environmental analysis in the era of big data. Inform. Secur. Technol. 10, 23–26 (2015). (in Chinese) 10. Zhu, J., Liang, T., Xu, G.: The application progress of UAV remote sensing technology in the field of environmental analysis. Environ. Anal. Sci. 7(04), 97–100 (2013) (in Chinese)

Evolution Characteristics of the Urban Spatial Pattern of Enclave-Type Regions Based on Data Analysis Technology Liang Cheng

Abstract As special administrative spaces, enclave-type regions are complete regions in the administrative division, but they are split combinations in the geographical space. The evolution of urban spatial pattern is the embodiment of the spatial organization of special regions, which has the research significance. This paper focuses on the spatial characteristics of the “whole and split” enclaves. Based on data analysis technology, this paper selects the center of gravity model and the standard deviation ellipse analysis method to systematically study the evolution of urban spatial pattern of Jingyuan County through the comparison of the overall area and different regions, and discusses the characteristics of urban spatial pattern evolution in such areas under the influence of the features of enclave-type regions. Keywords Enclave-type regions · Urban space · Spatial pattern · Data analysis

1 Introduction The spatial pattern of regional cities and towns is the embodiment of urbanization in regional space, and an important research field in regional science. The evolution of spatial patterns in regional cities and towns is a time and space composite process with multiple coupling elements of time and space; it takes human behaviors as the subject, social economy as the power and space as the carrier [1]. Academic circles have always attached great importance to the research on the evolution of regional spatial patterns of cities and towns. Most of the research objects are in the complete regional system [2]. However, in the process of interaction between human and land, there are a few special regional units, such as enclave regions, which are often ignored by mainstream research. This kind of region is a complete region in the administrative division, but it is a split combination in the geographical space. Generally speaking, enclave is a concept based on the overall L. Cheng (B) College of Geography and Environmental Science, Northwest Normal University, Lanzhou, Gansu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_19

155

156

L. Cheng

perspective of a complete administrative region; it is an independent area to the main region (generally refers to the area where the regional administrative center is located). Therefore, enclave is a relative concept to the main area. The enclave-type regions proposed in this paper refers to complete administrative regions composed of the main area and the enclave area [3]. The evolution of urban spatial pattern in enclave-type regions strongly reflects the response to the natural division of the main area and the enclave area, but it is also under the unified management of administrative divisions. It is the embodiment of the spatial organization of special regions and has research significance. Taking Jingyuan County in Northwest China as an example, based on data analysis technology, this paper analyzes the evolution of urban spatial pattern in enclavetype regions through the center of gravity model and the standard deviation ellipse method in data econometric analysis, and discusses the characteristics of spatial pattern evolution in such areas under the influence of enclave-type regions, so as to provide reference for optimizing the regional urban system.

2 Research Basis 2.1 Research Area Jingyuan County, located in the middle of Gansu Province, is a gully region of the Loess Plateau. With a total area of 5809.4 square kilometers, the space of the county is separated by Pingchuan District of Baiyin City. The county is divided into northern and southern parts, forming a typical enclave-type region. The southern area is the main area with the county government, and the northern area is the enclave area (Fig. 1). The Yellow River, the Baiyin Jingyuan branch of railway line, the Beijing Tibet Expressway (G6), the 109 national highway and other important rivers and transportation lines run through the county. In addition, the 207 and 308 provincial highways also run through the county. There are 18 townships under its jurisdiction, including 13 towns and 5 villages, of which 4 villages are located in the enclave area of north [4].

2.2 Research Methods Considering the “whole and split” spatial characteristics of the research object, based on data analysis technology, this paper selects the gravity center model and the standard deviation ellipse analysis method to systematically study the evolution of the urban spatial pattern of Jingyuan County through the overall and regional comparison.

Evolution Characteristics of the Urban Spatial Pattern …

157

Fig. 1 Area of the Jingyuan County

The concept of gravity center originated from physics, and was then extended to space science and regional science. Its original meaning refers to the action point of resultant forces of gravity on all parts of the object, and can be regarded as the average center of the spatial distribution in space science [5, 6]. Regional development is also affected by various forces such as geography, economy, society and administration. Therefore, the concept is often used in the research of regional economic space, regional town layouts and so on [7]. Jingyuan County, as a typical enclave type region, has representative characteristics in the study of regional urban space. This paper uses the gravity center model to calculate the spatial distribution center of Jingyuan County in different periods, and identify the geographical changes and moving directions of centers of gravity. The formula which calculates the center of gravity [6] is as follows. M(X t , Yt ) =

n   n u i xi i=1 u i yi i=1  , n n i=1 u i i=1 u i

(1)

158

L. Cheng

In the equation, M (X t , Y t ) is the coordinate of the regional center of gravity in t period; n is the number of towns; (x i , yi ) is the center coordinate of the i-th town; ui is a certain attribute value of the town. The standard deviation ellipse method (SDE) is mainly used to recognize and reflect the layout of spatial elements through ellipses with specific characteristics [8]. The algorithm of standard deviation ellipse was first proposed by Welty Lifer of the University of Southern California in 1926. It can show the dynamic changes of the spatial distribution of discrete data sets in a large-scale regional space over time, such as the location of the center of gravity, the scope of the field, the degree of density, and the direction of morphology [9]. The standard deviation ellipse is mainly composed of three elements, namely the angle θ, the principal axis (major axis) and the auxiliary axis (minor axis). The rotation angle θ represents the main trend direction of spatial development; the major axis is the direction with the most spatial distribution, representing the dispersion degree of geographical elements in the main trend direction. The auxiliary axis is the direction with the least spatial distribution, representing the dispersion degree of geographical elements in the secondary direction [10]. The standard deviation ellipse can reflect the characteristics of urban spatial pattern evolution in Jingyuan County. Comparing the changes of standard deviation ellipse in different periods, we can grasp the overall change trend and spatial distribution characteristics of the urban spatial pattern of Jingyuan County in different periods from a macro perspective. Using the Ellipse_Size module in ArcGIS10.2, we can calculate the spatial center of gravity and parameters of the standard deviation ellipse of Jingyuan County from 2005 to 2014. This paper mainly selects four time points in 2005, 2010, 2013 and 2014. In 2013 and 2014, Jingyuan County began to resettle population of other counties in other places; the scale of urban population changed greatly. The work of replacing villages with towns was also carried out in these two years. From the perspective of research needs, it can also be combined with external factors of the evolution of urban spatial pattern.

2.3 Research Data This paper takes 18 villages and towns in Jingyuan County as the basic research unit. The research data includes the social-economic data and geospatial data. The socialeconomic data are taken from Baiyin Statistical Yearbook, Jingyuan Yearbook and some township government work reports and socioeconomic statistics bulletins. The geospatial data mainly comes from the scanned and digitized map in Administrative Division Map of Jingyuan County (drawing number: Gan S2009) as well as road vector data and other geospatial data in the New Urbanization Planning of Jingyuan County (2014–2020).

Evolution Characteristics of the Urban Spatial Pattern …

159

3 Evolution of Urban Spatial Pattern 3.1 Evolution of Urban Quality Spatial Pattern As urban quality involves a lot of contents, this paper uses composite indicators to measure the urban quality. Referring to relevant research results, this paper selects 19 indicators from five aspects of urban level, economic level, public service, infrastructure and living standards to construct the urban quality index system. The paper uses the time series global principal component analysis method [11] to determine the weight of each index, and calculate the comprehensive score of each town (Table 1). According to the analysis of regional urban quality in Jingyuan County, the average urban quality of each township in the enclave area is lower than that in the main area, and the difference between the comprehensive scores of two areas increases year by year from 0.18 to 0.47. The results show that the strength of towns in the main area of Jingyuan County is stronger than that in the enclave area, and the gap of urban strength between the north and the south is widening year by year. The overall urban quality of Jingyuan County is increasing, which shows that all towns in Jingyuan County are in good development. On the whole, the spatial evolution of the urban quality in Jingyuan County shows obvious differences between the south and the north. The overall moving direction of the urban quality gravity center of Jingyuan County is roughly consistent with that of the southern main area, which indicates that the evolution of the urban spatial pattern of Jingyuan County is greatly affected by towns in the main area. The quality gravity centers of cities and towns in the main region basically move in the direction around Wulan Town, where the county government is located, while the quality gravity center of towns and cities in the enclave region generally moves in the direction around Beitan Town. Based on the analysis of the standard deviation circle distribution and the standard deviation ellipse parameters of urban quality (Fig. 2), the rotation angle of urban quality in the enclave area changed from 114.67° to 116.34° and that of the urban quality in the main area changed from 108.92° to 108.66° (Table 2), indicating that there is a large development space for cities and towns in the enclave area. The main area has the county government and the largest number of towns in the whole county; the urban quality space is relatively stable. The principal axis and auxiliary axis of Table 1 Results of urban quality of different regions in Jingyuan County Type of region

2005

2010

2013

2014

The main region

0.19

0.33

0.46

0.50

The enclave region

0.37

0.68

0.87

0.97

The total region

0.29

0.52

0.69

0.76

Difference between main region and enclave region

0.18

0.35

0.41

0.47

160

L. Cheng

Fig. 2 Spatial analysis of urban quality in Jingyuan County

the urban quality space in the two areas both grow slowly, which also reflects the trend of spatial equalization of urban quality.

3.2 Evolution of Urban Population Spatial Pattern Compared with the urban quality, the spatial evolution of urban population in Jingyuan County is more simple, showing a trend of hinterland expansion. The spatial center of urban population in Jingyuan County mainly moves along the Yellow River, especially in Dongwan town and Santan town in the east of the county. It shows that in the main area, the valley along the Yellow River is an important potential area of population concentration, and the urban population space of the whole county presents a trend of “gathering in valleys and scattering in mountains”. Based on the analysis of the standard deviation circle distribution of urban population space and the ellipse parameters of standard deviation (Fig. 3), it is found that the angle θ of urban population space in the enclave area changed from 113.86° to 115.17° and that of urban population space in the main area changed from 112.22° to 111.55° (Table 2). It indicates that urban population in the enclave area tends to

Total region

4.75

28.17

Semi-minor axis (km)

15.82

Semi-minor axis (km)

39.22

23.31

Semi-major axis (km)

Semi-major axis (km)

112.22

angle θ (°)

Angle θ (°)

10.11

Semi-minor axis (km)

Enclave region

36.90

28.49

37.38

10.38

14.98

23.93

111.86

8.98

35.91

114.05

28.41

38.01

9.97

14.93

24.09

111.70

9.38

35.60

114.62

28.32

38.65

9.63

14.89

24.26

111.55

9.66

35.26

115.17

26.23

34.25

18.11

16.49

21.84

97.36

10.33

38.16

113.10

113.86

Semi-major axis (km)

25.59

36.70

20.03

21.23

18.15

89.50

7.32

36.80

117.53

25.39

37.48

15.01

18.06

22.00

109.48

8.40

34.67

117.75

25.66

36.49

15.71

17.93

22.25

110.97

8.19

35.29

117.60

2014

Angle θ (°)

2013

Main region

2010

2005

2014

Economic standard deviation ellipse

2013

2005

2010

Population standard deviation ellipse

Standard deviation elliptic parameter

Region

Table 2 Parameters of the standard deviation ellipse of Jingyuan County from 2005 to 2014

26.46

36.97

12.42

15.31

22.65

108.92

9.61

34.32

114.67

2005

26.15

36.30

18.39

15.64

22.08

105.53

8.90

34.75

116.05

2010

26.86

37.35

16.50

15.71

22.56

108.25

9.27

35.37

116.35

2013

27.05

37.20

16.76

15.79

22.70

108.66

9.27

35.82

116.34

2014

Urban quality standard deviation ellipse

Evolution Characteristics of the Urban Spatial Pattern … 161

162

L. Cheng

Fig. 3 Spatial analysis of urban population in Jingyuan County

expand; rural population flows to scattered towns. The main region still has a high urbanization rate, and the population capacity is basically stable. But people in the enclave area are still attracted by the main area, and the county town is still the main population inflow area. The principal axis and the auxiliary axis of urban population space in the enclave area decrease slowly, while the principal axis and the auxiliary axis of urban population space in the main area grow slowly. It further shows that in the whole county, the main area is the primary region of urbanization and population growth.

3.3 Evolution of Urban Economy Spatial Pattern The spatial evolution characteristics of urban economy in Jingyuan County are most obviously affected by the enclave administrative division. The economic spatial center of Jingyuan County is mainly along the north bank of the Yellow River, while the economic center of the enclave area is more dispersed and less affected by the main area.

Evolution Characteristics of the Urban Spatial Pattern …

163

Fig. 4 Spatial analysis of urban economy of Jingyuan County

Based on the analysis of the standard deviation circle distribution of urban economic space and parameters of the standard deviation ellipse (Fig. 4), the angle θ of urban economic space in the enclave area changed from 113.10° to 117.60° and the angle of urban economic space in the main area changed from 97.30° to 110.97° (Table 2). It which shows that the two areas have strong development potentials in economic space. It can be seen from the moving of the economic centers of gravity that the economic spaces of 8 towns in the enclave area are far away from the main area due to the influence of the spatial pattern of enclave, and only a small part of enclave area in the north is close to the standard deviation ellipse of regional economy of the whole county. The principal axis and the auxiliary axis of urban economic space in the enclave area and the main area are stable, which reflects the independent economic development of two areas.

4 Conclusion Based on the data analysis technology, and through the gravity center model and the standard deviation ellipse method in the data quantitative analysis, this paper makes a quantitative analysis on the urban quality, urban population and urban economic

164

L. Cheng

space of Jingyuan County, and systematically studies the evolution of urban spatial pattern in enclave type regions. Urban quality is the comprehensive performance of urban development and the gathering point of population and economy in one region. It is closely related to the level of town and public service facilities. Urban population is affected by geographical environment, public management and service facilities, and urban economy is related to economic and industrial conditions as well as administrative management. Therefore, through the study of this paper, it is found that, affected by the spatial pattern of enclave, the evolution of urban spatial pattern in enclave type region presents following characteristics. The evolution of urban spatial pattern between enclave-type regions and the main region lacks coordination. Although the power of administrative division makes Jingyuan County a complete administrative unit on the surface, due to the characteristics of enclave type region, the main area does not have enough attraction to enclave areas. Meanwhile, the enclave area is separated from the main area in space, so it often forms regional inward agglomeration.

References 1. Ni, P., Yang, H., Zhou, X.: Temporal and spatial evolution of economic and population gravity centers: evidence from provincial capitals. Chinese Journal of Popul. Sci. 01, 44–54 (2014). (in Chinese) 2. Zhang, R., Zhang, X., Li, C.: Study on the evolution and mechanism of County town spatial pattern: a case study of Lishui County, Jiangsu Province. Resour. Ind. 15(02), 143–149 (2013). (in Chinese) 3. Yu, C., Cheng, L., Chen, C., Tang, L.: Research on the spatial structure characteristics of the urban system in enclave regions: based on the perspective of spatial interaction. Chin. Overseas Architect. 12, 102–107 (2017) (in Chinese) 4. Cheng, L., Yuan, J., Tang, Y.: Research on optimization strategies of urban and rural spatial system in enclave-type regions: taking Jingyuan county as an example. In: The 4th National Planning and Implementation Symposium, pp. 15–33, Aug 2016 (in Chinese) 5. Tao, G.: Quantitative analysis of china’s population and economic gravity shift. Econ. Res. Guide 35, 1–4 (2017). (in Chinese) 6. Zhang, Y., Ren, J.: Study on spatial differentiation and dynamic change of county population economy in Shandong Province. Resour. Develop. Market 34(12), 1629–1636 (2018). (in Chinese) 7. Fang, Y., Huang, Z., Chen, W., Xie, H.: Spatial evolution of county economy in Anhui Province from 2001 to 2010. Progr. Geogr. 32(05), 831–839 (2013). (in Chinese) 8. Hao, L.: Research on urban economic convergence in China Based on Spatial Spillover Effect. Southeast University (2017) (in Chinese) 9. Gangopadhyay, K., Basu, B.: City size distributions for India and China. Phys. A Statistical Mech. Appl. 388(13), 2682–2688 (2009) 10. Wei, L., Zhang, Y., Li, Q., Song, J.: Spatial differentiation of China’s land ecological space based on standard deviation ellipse. Ecol. Econ. 36(07), 176–181 (2020). (in Chinese) 11. Luo, R., Cai, X.: Dynamic research on comprehensive evaluation of urbanization level in Fujian Province based on global principal component analysis. Fujian Forum (Human. Social Sci. Ed.) 12, 135–139 (2013). (in Chinese)

The Application of Internet in the Educational Management of College Students Jie Zhao

Abstract The rapid development of the Internet has a significant impact to all aspects of our lives and work. Education has also changed from a classroom, a teacher and a desk to a mobile terminal, a giant network and millions of people. In the form of teachers, this brings new development opportunities for the management of college students, but it also highlights many management problems. Based on the study of the current situation of college student management under the background of the Internet, this article focuses on the application of the Internet in college education management. Keywords Internet · Universities · Student education · Education management

1 Introduction The emergence of the Internet has greatly changed our production and life. In all areas of today’s society, earth-shaking changes have taken place because of the emergence of the Internet [1]. Whether it is technology, humanities or education, all have to change themselves to the pace of changes of the times. When college student management work is combined with the Internet, network technology is a very good auxiliary role in education management, but more practical problems have become prominent. How to realize the smooth and efficient development of college student management under the Internet background of the requires continuous learning and exploration by researchers and school workers. This article will analyze the situation of college student management under the current Internet background, and focus on the innovative measures management of college student under the Internet background, to provide theoretical and operational references for college student management workers [1].

J. Zhao (B) Sichuan University Jinjiang College, Meishan, Sichuan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_20

165

166

J. Zhao

2 The Status Quo of Education Management in Universities 2.1 The Concept is Relatively Backward In the face of the Internet+ era, the overall environment of college education management is more complicated. Today’s educational management concepts are rapidly changing and innovating, and in some colleges and universities, their educational management concepts are still stuck in the traditional stage, adopting vertical management methods, and administrators issue administrative instructions to carry out educational management of students [2]. Such management concepts and methods cannot adapt to the current basic principles of people-oriented, and are out of touch with modern education management thoughts. In order to fully adapt to the current value orientation of building service-oriented management organizations, colleges and universities must seize the time to change traditional ideas and establish new educational management concepts and systems.

2.2 Educational Management Under the Traditional Model is Restricted At this stage, the development of educational management in universities will no longer be restricted by traditional teaching methods. By the advent of the Internet+ era, the duck-filling teaching model has undergone earth-shaking changes, and various scientific research experiments in universities no longer need to be restricted to the scope of the laboratory. Under such conditions, the traditional education model has received huge challenges and impacts. The educational management activities that had to be carried out in classrooms or laboratories in the past can now be achieved without the shackles of time and space [3]. Therefore, for the sustainable development achievement in the future, colleges and universities must change the educational management model so as students can freely choose suitable learning methods according to their own preferences.

2.3 Insufficient Quality of Education Management Personnel People are the main body and direct implementer of education management in universities, so the quality of education management personnel will have impact on the final results of related work. From the current situation, it can be seen that some university managers have insufficient awareness of self-development and improvement, have not actively learned advanced Internet technology and information technology, and have relied too much on past experience in practical management work, showing a more serious empiricism. Thinking cannot independently realize the integration

The Application of Internet in the Educational Management …

167

with the Internet+ era. That led to the improvement of the quality level of university education managers not keeping up with the development speed of modern social education management [4]. Therefore, managers must improve their comprehensive literacy in a targeted manner, learn and master more network technology and information technology, to ensure that they are competent for their positions.

2.4 Simplification of Resource Acquisition Channels As far as the current situation is concerned, the Internet is used more and more widely in college students life, and students have a very rich information acquisition channel. Therefore, if universities continue to adopt a single classroom teaching and management method, it will be difficult to meet the learning needs of students [4]. Facing the background of the Internet+ era, colleges and universities should adopt corresponding strategies to open and expand access to educational resources, so that the effectiveness of educational resources can be further improved [5].

3 The Connotation of College Education Management in the Internet Age The Internet is a core element that changes traditional productivity, and it is also an important manifestation of the modern information technology. The advent of the current Internet+ era has led to the further development of education management in colleges. Relevant technologies can efficiently achieve the coordination of various factors, and at the same time optimizing the allocation of limited resources, so as to effectively achieve the educational management goals [6]. In this era, the main development direction of education and management in colleges and universities is to closely integrate education with the Internet, and improve the educational model on the premise of improving the management quality and efficiency. The educational management model of colleges and universities is based on the Internet platform and information technology, which has formed a brand-new form [6]. This requires continuous optimization of Internet education resources, allowing college education management and network information technology to influence and promote each other, and achieve fundamental reform and innovation.

168

J. Zhao

4 The Application of the Internet in the Education and College Students’ Management The college students’ management is cumbersome and complicated. It is necessary not only to look at the ideological and students’ political education, but also to the daily affairs of students. With the continuous popularization of Internet technology, university student management workers can leverage the Internet to innovate traditional management methods, innovate in management concepts of educational models, change the management relationship between teachers and students, and establish an effective Internet communication platform [7].

4.1 Innovative Management Concepts In the macro background of the Internet technology widespread application, it is necessary for college student management workers to make full usage of computers and the Internet to transform and upgrade themselves, change management thinking and management concepts, penetrate into students’ study and life, and grasp their real ideas and dynamics, to design management methods of students. Student management workers must always adhere to the student-oriented work philosophy, take students as the main body and think about problems from the perspective of students, and respect the individual of students [7]. It is need to pay the absorption and adoption of students’ opinions, seriously reflect on the shortcomings in the work, to participate in the management of students, improve students’ awareness of innovation [8].

4.2 Innovative Management Model The rapid development of Internet technology has enabled more and more technology products and application software to enter the students life [8]. The wide application of WeChat, QQ, Weibo, etc. has greatly expanded the social network of students, enabling students to quickly understand social dynamics even without leaving school. In response to this situation, student work managers and university educators should make full use of these social tools to publicize and disseminate information, so that students can learn about school work in a timely manner, mobilize students’ enthusiasm for participating in school affairs, and draw students closer together [9]. The distance between schools is shown in Fig. 1.

The Application of Internet in the Educational Management …

169

Fig. 1 Internet education management model

4.3 Establish an “Internet+” Student Management Platform It is impossible for college student management to become an island under the macro background of the Internet. It is necessary to make full usage of Internet technology for student management [8]. Through tools such as WeChat and QQ, create a school WeChat official account and establish a student management platform, as shown in Fig. 2. Enrich and develop the student management platform, establish library services, and realize online book borrowing and self-return; establish teaching and talent training services to realize effective inquiry of student credits, grades, and class hours; establish a student card service platform to realize student living expenses Various services such as fund transfer and tuition payment. At the meantime, try the best to use QQ groups and WeChat groups to strengthen communication and exchanges with students, so that students can understand recruitment information, lecture information, examination information, etc. in a timely manner; optimize the publication of scholarships, grants and other information, so that students can grasp the selection methods and results in a timely manner [9]. Through such measures, the student work manager can effectively grasp the students’ thought dynamics and living conditions.

4.4 Innovate Student Ideological and Political Education Model The focus of college student management is to conduct ideological and political education for college students. Facing the rapid development of technology and

170

J. Zhao

Fig. 2 “Internet+” student management platform

economy today, college students’ ideological and political education are facing tremendous impact and challenges [9]. University administrators must actively innovate student political education management methods, the “Internet+”, through the promotion of online media, do a good job in student ideological and political work. Innovate the party class education model, use micro-classes and MOOCs to promote socialist core values; innovate party and league branch activities, and encourage students to learn from outstanding student party/ league members through Weibo and WeChat, and set an example to take the lead, to guide students to discuss social hot spots through Weibo, etc. [10].

4.5 Innovative Teacher-Student Relationship The teacher-student relationship is the key to the management of college students. The traditional teacher-student relationship tends to lead the teacher to the students in an all-round way, requiring no detail. This not only increases the complexity of student management, but also makes it difficult for many teachers to take care of all aspects of students [10]. Therefore, it is necessary to establish a student self-management model, establish a reliable class leadership team, realize the self-management of students through WeChat groups and QQ, and realize effective management and control of the class by the class committee. Students can speak freely in their class WeChat group, express their needs and ideas, sort them by class members [10].

The Application of Internet in the Educational Management …

171

5 Conclusion In summary, in the Internet era, the reform and innovation of college education management must follow the main trends of the development of the times, establish a new education management concept, create a new Internet-based education management model, and improve faculty, staff and management personnel. The informatization level of universities and colleges has been continuously increased. On this basis, we should keep pace with the times, pioneer and innovate, and drive our education management work to a higher level.

References 1. Li, Y.: A preliminary study of the new model of university education management in the “Internet+” era. Chin. Foreign Entrepreneurs 12(14), 140–144 (2020). (in Chinese) 2. Feng, J.: Path analysis of innovative university education management from the perspective of “Internet+”. Sci. Technol. Econ. Tribune 28(08), 157–160 (2020) (in Chinese) 3. Shao, Y.: Ways to optimize the education management of colleges and universities in the “Internet +” era. Heilongjiang Sci. 10(21), 92–93 (2019). (in Chinese) 4. Qiu, X., Wu, L., Feng, G.: Research on collaborative innovation of university education management based on “Internet+”. China Educ. Informationization 8(17), 11–14 (2019) (in Chinese) 5. Shi, G., Nong, C.: Research on higher education management model based on “Internet+”. J. Jilin Educ. Coll. 34(12), 141–143 (2018) (in Chinese) 6. Sun, Y.: Analysis of the reform and development trend of college education and management under the background of “Internet+”. Think Tank Era 159(43), 298–299 (2018) (in Chinese) 7. Li, H., Liu, R.: Research on the innovation of university teaching mode under the background of “Internet+”. Inform. Comput. Theory Ed. 36(06), 246–247 (2017) (in Chinese) 8. Wang, Z.: Innovation and enlightenment of university education management model under the background of “Internet+” . China Adult Educ. 12(08), 37–40 (2017) 9. Cheng, Y.: Thoughts on the reform of accounting undergraduate education and teaching in the “Internet+” era. Account. Newsl. 12(01), 40–44 (2010). (in Chinese) 10. Jing, Q., Xing, P.: Research on the innovation of college teaching mode under the background of “Internet+” . Educ. Explor. 9(09), 102–104 (2015). (in Chinese)

The Research on Cultural Communication Path Based on Big Data Analysis Technology Huijun Liu, Nianqing Tang, Jie Zhuang, Yujie Ma, and Jianyu Wang

Abstract The development of network platforms has greatly impacted the traditional means and methods of cultural communication. Big data methods have natural advantages in information dissemination, and traditional cultural dissemination methods have been challenged enormously. Due to the development of network technology, information dissemination is faster and faster, and cultural dissemination has huge opportunities while facing huge challenges. Based on the technical characteristics of the big data era, this article analyzes its impact on cultural communication, and analyzes a more effective way of cultural communication innovation, which will help promote the further development of cultural communication. Keywords Big data · Analytical technology · Culture · Cultural communication · Communication path

1 Introduction In view of the current domestic big data development status and the development conditions of Internet technology [1], research the opportunities and challenges that traditional cultural communication is facing, so as to change the cultural communication mode in time to make it more in line with the characteristics of current technological development. In terms of it, it is an inevitable choice. In the context of the era of big data, innovating the path of cultural communication and strengthening the effect of cultural communication play an important role in the theoretical development of communication and the reality of cultural development [2].

H. Liu (B) · N. Tang · J. Zhuang · Y. Ma · J. Wang Hunan Biological and Electromechanical Polytechnic, Changsha, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_21

173

174

H. Liu et al.

Fig. 1 The size and growth rate of China’s internet users

2 Large-Scale Audience for Online Cultural Communication According to data from CNNIC (China Internet Network Information Center), up to December 2018, the number of Internet users in China reached 840 million, and a total of 39.51 million were new Internet users added throughout the year [3, 4]. The growth rate reached 12.8%, which exceeded the global average by 3.9 percentage points. The Asian average is 10.1 percentage points, and the growth rate of netizens has increased (Fig. 1). The number of online audiences in China is huge and growing every year. Therefore, it is imperative to improve the quality of online cultural communication [2].

3 Characteristics of Internet Culture Communication 3.1 The Discrete Nature of the Communication Organization Traditional media is a single-center, one-dimensional communication from point to surface, while the communication of network culture is a multi-center, discrete communication. The advantages of network communication, interpersonal communication and mass communication have broken through the limitations between interpersonal communication and mass communication [4]. All netizens can discuss and exchange various hotspots and focal issues on the Internet, and can directly and quickly feedback information, forming multiple discussion centers and opinion groups.

The Research on Cultural Communication Path Based …

175

3.2 Imbalance of the Target of Communication The Internet is supported by information technology, and the unbalanced economic development of various countries will inevitably lead to the unbalanced technological development, thus resulting in the network development unbalanced. For countries and regions with imperfect network development, network cultural communication will be at disadvantage [5]. This imbalance is reflected not only between countries, but also between different parts of the same country. In China, cultural structure imbalance, career distribution imbalance and the imbalance between urban and rural areas leads to the difference of Internet cultural communication.

3.3 Transformation of the Object Through the Internet, people can not only spread various cultural information, but also discuss and communicate. There is no clear boundary between the disseminator and the recipient of information, and they change roles at all times [6]. For example, cultural communicators continue to accept new cultures while spreading culture; cultural recipients can become new cultural communicators after accepting culture. The identities of the two are constantly changing.

3.4 Commodity Is Greater Than Cultural The creation and dissemination of Internet culture has the cultural and commercial characteristics of information products. With the network technology development, the forms of expression of network culture have become more abundant and diverse, cultural products have emerged from time to time, and the commercial nature of network cultural communication has become more prominent [7]. With the development of instant messaging, the prosperity of online shopping, the rapid expansion of online payment and online banking, and the commercial nature of Internet culture communication is greater than its cultural nature.

4 Big Data Methods and Cultural Communication Innovation The operating method of big data is very different from the traditional way. Big data can be processed with special programs and algorithms, and it becomes easier to use its results to predict future development trends. It conducts comprehensive research and analysis on the overall situation and dynamics of society [8]. Therefore, in this

176

H. Liu et al.

Cultural Disseminator

Internet Network

Receiver

Fig. 2 The path of big data dissemination culture

context, the innovation of cultural communication needs to emphasize two aspects: one is that cultural forms need to be innovated, the proportion of text is reduced, and pictures and tables are added [7]. And other content that can be quickly understood; the second is that cultural content needs to be innovated, and cultural content needs to be integrated and analyzed to reduce cultural uncertainties. Figure 2 is the path of big data technology to spread culture.

5 Cultural Communication Path Based on Big Data Analysis Technology 5.1 Change the Way of Thinking In the era of big data, the culture emphasizes not the complete chain of causality of “cause and effect”, but the degree of connection between different information. As long as they have a high degree of connection, even if they cannot understand the causality, they can be put together as a part of “culture”. Under this circumstance, when cultural workers conduct cultural communication, they need to change the traditional way of thinking of investigating reasons, and instead look for connections in different information, find connections in seemingly irrelevant information, and carry them out. Sort out and integrate to improve the communication value of cultural content [9].

5.2 Change Analysis Model There is a huge difference between the data analysis mode of the big data era and the traditional analysis method, which has professional analysis software for data analysis. Cultural workers can use effective data analysis methods to transfer huge data analysis to the computer. In this way, the data and information analysis mode can be changed to reduce their own workload, improve work efficiency and high accuracy of cultural content [9].

The Research on Cultural Communication Path Based …

177

5.3 Change the Direction of Conclusion The increase of data samples in the era of big data, although mechanical information processing technology will certainly bring some problems, it can handle massive amounts of data, and the results derived from it will therefore be more biased towards speculation on macro issues [10]. Therefore, cultural workers need to change the direction of drawing conclusions, from analyzing the causes and consequences of various “small problems” existing in society, and turning to a macroscopic analysis and prediction of the direction of changes in society as a whole [10].

5.4 Application of Traditional Paper Media Even in the era of big data, the living space of paper media is getting smaller and smaller, but traditional paper media cannot be completely abandoned. In the current cultural development of paper media, its shortcomings are mainly reflected in its timeliness, and its authenticity, depth, and guiding role in thinking have not been affected [11]. It is still necessary for cultural workers to pay attention to publishing relevant content in paper media that has a high degree of authenticity and can conduct in-depth discussion of the event to guide people’s thinking.

5.5 Emphasize the Power of Micro-communication Platforms The micro-communication platform refers to the online social platform represented by WeChat and Weibo. This type of platform has great advantages in the speed and breadth of information dissemination [11]. Through data analysis, it can analyze the issues that are generally concerned by the followers of a certain official account or Weibo big V, launch targeted cultural content, and use the push function strengthens the report effect of emergent culture [12].

5.6 Target Audience Accurately When people obtain information on the Internet through search engines such as Google and Baidu, they can quickly enjoy the summary of information. In addition, a large number of traces of personal IP addresses and search keywords are recorded in the background. For example, you have browsed a certain product on the Internet. Later, when you search for other content, you will be provided with a lot of content related to the previously viewed product [12]. This is the system that marks the user’s sensitivity to a certain product at the back. Everyone has become a data source in the

178

H. Liu et al. Big data

Cultural Disseminator

Internet Network

Receivers

Database

Accurate delivery

Fig. 3 Precise push mode of big data

Internet big data environment. The system can accurately follow each user according to the user’s personal characteristics and needs. It can also learn about the user’s relationship with other people in a circle based on the degree of relevance between the user and other groups on the Internet, and use big data Correlation and analysis methods to tailor communication content (see Fig. 3). The most obvious example is Tencent’s WeChat. The information that everyone sends on it is Tencent’s precious information. He will push different information to everyone based on the results of big data analysis, and some people will receive automobile promotion information., Some people will receive information about beauty, some will receive information about childcare, etc. [12].

6 Conclusion With the advent of the era of big data, cultural dissemination is facing severe tests while also ushering in a good opportunity for development. However, how to apply the methods and technologies of the big data era to cultural communication and to innovate the path of cultural communication is a question that requires in-depth thinking. This article analyzes the relationship between big data methods and cultural communication innovation in view of the massive data, extremely high relevance and real-time in the era of big data, and points out that the two basic principles that must be followed in the use of big data methods to innovate cultural communication paths are data. Effectiveness and reliability of the platform. In view of the characteristics of the big data method, the cultural communication innovation path needs to change the way of thinking, change the analysis mode, and change the direction of the conclusion. While not abandoning the traditional paper media, it emphasizes the power of the micro-communication platform to promote the significant improvement of cultural communication capabilities.

The Research on Cultural Communication Path Based …

179

Acknowledgements 1. Project name: Research on the Status Quo and Path Expansion of Hunan Chinese International Communication, Subject number: XSP20ZDI010; 2. Subject name: Vocational Education in the Intelligent Era boost the rural inheritance of excellent cultural models study, Subject number: 19C1106.

References 1. El-Hasnony, I.M., Barakat, S., Elhoseny, M., Mostafa, R.R.: Improved feature selection model for big data analytics. IEEE Access 8(1), 66989–67004 (2020) 2. Chen, B.: Research on the influence and promotion of new media on cultural communication. Cult. Res. Guide 21(11), 42–45 (2018) (in Chinese) 3. Zhang, Y., Zhang, R.: Research on media communication paths to enhance regional cultural communication, vol. 12, no. 06, pp. 44–46. China Press (2017) (in Chinese) 4. Zaher, M., Shehab, A., Elhoseny, M., Farahat, F.F.: Unsupervised model for detecting plagiarism in internet-based handwritten Arabic documents. J. Organ. End User Comput. (JOEUC) 32(2), 42–66 (2020) 5. Guo, S.: The influence and role of Weibo in the development of cultural communication. Cult. Res. Guide 5(03), 67–70 (2017) (in Chinese) 6. Deng, B., Zhen, W., Xu, Q.: Innovative research on cultural communication methods in the context of new media. J. Shijiazhuang Railway Vocat. Tech. Coll. 23(04), 88–90 (2017) (in Chinese) 7. Zhao, A.: Big data has changed the traditional way of cultural transmission. Cult. Res. Guide 11(18), 212–214 (2016) (in Chinese) 8. Yu, G., Li, B.: The big data era of cultural communication. Cult. Commun. 11, 161–163 (2013) (in Chinese) 9. Lu, H., Zhang, Y.: On copyright protection in the era of big data. J. Zhengzhou Univ. 3(08), 23–26 (2015) (in Chinese) 10. Ma, J., Ma, R.: Innovative path of cultural visualization in the era of big data. Cult. Res. Guide 8(03), 152–154 (2017) (in Chinese) 11. Hua, X.: An innovative path for visualized cultural communication in the era of big data. Cult. Res. Guide 8(02), 153–156 (2017) (in Chinese) 12. Yan, S.: Big data methods and cultural communication innovation from theoretical definition to operational routes. Cult. Commun. 6(02), 59–62 (2017) (in Chinese)

The Innovative Application of “Supply Chain + Agriculture” in Hunan Agriculture from the Internet Perspective Nianqing Tang and Huijun Liu

Abstract In recent years, relying on the unique climate environment, abundant labor resources and land resources, Hunan has provided very favorable conditions for diversified agricultural production. Hunan’s agriculture has maintained stable development and the overall economic strength has been further enhanced. But at the same time, many problems have been exposed. If the quality and structure of agricultural products are not in line with market demand, the quality of science and technology and the management level are low, and the agricultural ecological environment deteriorates, these problems will restrict the development of agricultural modernization in Hunan Province. This article will promote the modernization of Hunan agriculture through how to make full use of the continuous application and popularization of the Internet in the agricultural supply chain of Hunan Province. Keywords Internet · Perspective · Supply chain · Agriculture · Hunan agriculture

1 Introduction The society has entered the Internet era. Traditional agriculture will evolve from a decentralized traditional small-scale peasant economy to agricultural modernization, to large-scale mechanization, and finally to a highly intelligent and intelligent agriculture model that integrates the Internet. At present, more and more Internet technologies such as logistics networks, big data, and e-commerce are applied in the field of agricultural production. The integration of Internet technology with agricultural production, processing, and sales has been realized, which has promoted the standardization and standardized production of agriculture. It can be said that the modernization of agriculture under the “Internet+” is the direction of the future development of Hunan agriculture, and it has a very good development prospect [1].

N. Tang · H. Liu (B) Hunan Biological and Electromechanical Polytechnic, Changsha, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_22

181

182

N. Tang and H. Liu

Farmer

Distributor

Retail Store

Fig. 1 Traditional agricultural product supply model

2 Operation Status of Agricultural Product Supply Chain in Hunan Province 2.1 Operation Model of the Main Agricultural Product Supply Chain Traditional agricultural product supply chain model. Through the production and operation of farmers dominate the market structure, the role of the supply chain is minimal, which is more in line with the meaning of the circulation chain. In the traditional agricultural product supply chain, the information flow is not smooth, resulting in low efficiency of agricultural product circulation, unable to meet people’s increasing consumer demand, and it is very easy to cause mismatches in production and sales, unsalable products, and the resulting high output and low quality, and farmers’ problems such as high input and low return. Figure 1 shows the traditional agricultural product supply chain [2].

2.2 Agricultural Supermarket Docking Mode Agricultural supermarket docking means that farmers and supermarkets sign an agreement to directly deliver high-quality agricultural products to supermarkets and convenience stores. In the process of agricultural products circulation, supermarkets play an irreplaceable role. The supply chain operation model dominated by supermarkets has a relatively complete information system, and is more sensitive to a series of value-added services that have room for development in the circulation of agricultural products. It can more quickly understand consumer preferences and analyze market data [3]. Agricultural super docking can effectively reduce unnecessary links in the operation of the agricultural product supply chain, improve circulation efficiency, and ensure the stability of long-term cooperation.

The Innovative Application of “Supply Chain + Agriculture” …

183

2.3 A Supply Chain Model Led by the Wholesale Market As an important link between farmers and retailers, the wholesale market can transmit information well, and the effectiveness of the connection with the front and back links provides help for the decision-making of the entire supply chain. Professional agricultural product wholesale markets, after obtaining agricultural products from farmers or agricultural sales cooperatives, sell them to retailers in a concentrated manner, greatly increasing the sales volume of agricultural products and expanding the logistics of agricultural products [4]. However, the cost of this operation model is relatively high, and the logistics system of most wholesale markets is imperfect and needs to be continuously optimized.

3 The Significance of Internet Supply Chain to Agricultural Development 3.1 Promote Agricultural Restructuring and Reduce Agricultural Production Costs The guiding role of market information for agricultural production is extremely important. In the “Internet + agriculture”, agricultural producers can quickly, accurately, and comprehensively understand the needs of the market, and be marketoriented, so as to make the structure of the agricultural industry [5]. Adjusting, improving the level of agricultural management, and promoting the production and sales of products can not only reduce the waste of resources, but also improve the economic benefits of agriculture.

3.2 Promote the Transformation from Traditional Agriculture to Knowledge-Based Agriculture In the modern market economy, knowledge economy has gradually become the trend of market development. Among them, technology, information and other elements are becoming more and more important in the development of agricultural economy. Compared with traditional agriculture, knowledge-based agriculture relies on biological engineering and technological development [4]. And other high-tech, “Internet + agriculture” enables the rapid development of agricultural science and technology.

184

N. Tang and H. Liu

3.3 Promote the Development of Agriculture in the Direction of Ecological Agriculture and Sustainable Agriculture In traditional agriculture, due to the lack of knowledge of agricultural producers, agricultural production has caused great damage to the environment, causing a series of ecological problems such as soil erosion, land degradation, and reduction of biodiversity. In “Internet + Agriculture”, the environmental awareness of agricultural producers has been improved, and the use of fertilizers and pesticides has been reduced, more green agriculture can be realized, and the sustainable development of agriculture has been promoted [5].

4 The New Model of Hunan’s Agricultural Product Supply Chain Under “Internet+” “Internet+” represents a new social form that can give full play to the optimization and integration role of the Internet in the allocation of social resources, so that the advanced achievements of the Internet are highly integrated with all fields of society, and social creativity is continuously stimulated. With the continuous development of Internet technology, China’s economic form is also in an era of major changes, and the continuous changes of core enterprises have also caused continuous changes in the operating mode of the agricultural product supply chain [6]. The application of Internet technology ensures the efficient operation of all links in the production, supply, sales and consumer purchase of agricultural products.

4.1 A New Model Led by Third-Party Logistics The new model dominated by third-party logistics, namely, the wholesale market of origin, collects agricultural products produced by scattered farmers, and delivers them directly to consumers or offline consumer stores through third-party logistics, where consumers enter the store for consumption [7]. First of all, this new model allows consumers to participate in the production decisions of agricultural products. In the traditional agricultural product supply chain, consumers obtain agricultural products through direct transactions with retailers, but they are unaware of the entire production, processing, and distribution links. Food safety issues arising from production and processing, and logistics [7]. The situation that affects the quality of agricultural products during the distribution process has existed for a long time [8]. The agricultural product supply chain under the “Internet+” allows consumers to have the most direct communication with the front-end producers. Consumers have a variety of needs. They can propose their own individual needs to farmers and give play to their own subjective initiative [9]. This directly affects the production

The Innovative Application of “Supply Chain + Agriculture” …

185

Fig. 2 Internet supply chain model

and processing links of agricultural products, family farms and field picking and other operating modes provide consumers with good channels, as shown in Fig. 2. In addition, this new model significantly reduces unnecessary links in the middle, simplifies the connection process between the supply and demand sides [8].

4.2 A New Model Led by E-Commerce Platforms In recent years, the rise of B2C and C2C e-commerce companies such as JD.com, Alibaba, and Suning.com has greatly impacted the traditional physical marketing model. The rapid development of these leading companies has also driven countless companies to imitate [10]. The agricultural product e-commerce platform is centered on e-commerce companies, with the help of third-party logistics or self-developed logistics distribution technology to complete the complete transportation path of agricultural products from agricultural production areas to consumers [11]. With the help of e-commerce platforms, agricultural product e-commerce logistics can first ensure the circulation of information and eliminate information barriers [12]. Secondly, the use of e-commerce companies as the core operation of the supply chain has greatly reduced circulation links, avoided unnecessary processes [9]. The new agricultural product supply chain operation model dominated by ecommerce platforms perfectly integrates information flow and logistics. The emergence of e-commerce platforms breaks the conventional supply chain model. Both parties can no longer be constrained by time and space [10]. The virtual supply chain model centered on the Internet platform conducts transactions directly, as shown in Fig. 3. The borderless nature of the agricultural product supply chain has expanded the scope of supply and demand for agricultural products and effectively improved the allocation of market resources. Farmers only need to register merchants on the Internet platform, and then put their own-grown agricultural products on the Internet,

186

N. Tang and H. Liu

Fig. 3 Agricultural product e-commerce supply chain

and they can trade with interested buyers. Consumers can log on to the e-commerce platform, browse the products displayed by the seller, and click to place an order after a number of comparisons [10].

5 Conclusion As the main food supplies in people’s daily life, Hunan agricultural products have many varieties and large demand. Hunan’s agricultural product supply chain started late and is still in its infancy. Compared with the coastal areas, the gap is obvious. Hunan’s agricultural product supply chain models include traditional supply chain models, agricultural supermarket docking models, and wholesale market-led supply chain models. From the actual operating situation, the shortcomings are obvious. The supply chain of Hunan’s agricultural products has undergone new changes under the Internet, which has brought consumers great convenience and good consumption experience. The emergence of the Hunan agricultural product e-commerce platform, with e-commerce companies as the core, eliminates information barriers, speeds up information transmission, and simplifies the operation process of the supply chain. Consumers can complete transactions without leaving home and improve the circulation efficiency of agricultural products.

The Innovative Application of “Supply Chain + Agriculture” …

187

Acknowledgements Subject name: Hunan agriculture international cooperation research in the context of new international agricultural supply chain, Subject number: 19TD01.

References 1. Yan, B., Shi, P., Ding, D.: Risk assessment and control of agricultural product supply chain under the internet of things environment. J. Manag. Eng. 11(03), 196–198 (2014) (in Chinese) 2. Ji, L., Liu, D.: The dilemma and breakthrough of agricultural product supply chain integration. J. Beijing Technol. Bus. Univ. Soc. Sci. Ed. 9(01), 16–19 (2015) (in Chinese) 3. Zhang, B., Yang, X.: Multi-dimensional mode and realization path of quality and safety management of core enterprises in agricultural product supply chain. Agric. Modernization Res. 4(11), 46–51 (2015) (in Chinese) 4. Gao, G., Sun, J.: Supply chain risk assessment of “Internet+” agriculture in the internet of things environment. Jiangsu Agric. Sci. 16, 1–5 (2018) (in Chinese) 5. Liu, H., Huang, J., You, W.: Analysis and countermeasures of the quality and safety elements of agricultural product supply chain under the “Internet+” situation. Agric. Prod. Process. 16(12), 90–93 (2018) (in Chinese) 6. Shen, T.: “Internet +” agricultural product supply chain business ecology construction strategy. Bus. Econ. Res. 15, 121–124 (2018) (in Chinese) 7. Shi, P., Liu, D.: The development of agricultural product supply chain under the Internet environment. J. Manag. Eng. 7(12), 19–22 (2017) (in Chinese) 8. Sun, J.: “Internet+” agriculture supply chain risk assessment under the big data environment. Jiangsu Agric. Sci. 16(12), 206–209 (2018) (in Chinese) 9. Huang, J., Li, W.: Analysis of quality and safety elements of internet agricultural products supply chain. Agric. Prod. Process. 16, 101–104 (2018) (in Chinese) 10. Lu, H., Shen, T.: Construction of the commercial ecology of the internet agricultural product supply chain. Bus. Econ. Res. 10, 21–23 (2018) (in Chinese) 11. Rizk-Allah, R.M., Hassanien, A.E., Elhoseny, M.: A multi-objective transportation model under neutrosophic environment. Comput. Electr. Eng. 69, 705–719 12. Shankar, K., Elhoseny, M.: Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J. Univ. Comput. Sci. 25(10), 1221–1239 (2019)

Research on the Development of Modern African Legal Culture Based on Data Analysis Ya Wang

Abstract With the development of data analysis technology, the collection, storage, use and expression of data require the use of smart technology, which makes the current data and the traditional small and isolated data form a huge difference, showing “intelligence”. However, the distance between people and the original data has also been widened by more and more smart devices. The data has accidental errors, intelligent algorithm defects, or human-made results that are not in line with the actual situation but are believed by people. Circumstances, that is, the “data trap” problem occurs. As the data develops to the fifth stage, the smart data stage, the problem of data traps becomes more prominent. This article conducts research and analysis on the development of modern African legal culture based on big data. Keywords Data analysis · African law · Legal culture · Cultural development

1 Introduction The history of law is, in its essence, a history of change. The ancient and unique legal culture of Africa has also undergone constant changes during the long process of development due to the constant impact of foreign religious laws and modern Western methods. This article believes that the development of African legal culture has undergone three major changes. It was mainly the intersection and fusion of Islamic law and traditional African customary law, and formed a new legal cultural structure. The second occurred in the middle of the century and lasted until the 1950s and 1960s. It was mainly the Western method that was fully transplanted in Africa along with European colonial rule. As a result, the legal structure of the Western method and the remaining and tenacious African customary law and applicable Islamic law coexisted for the third time [1]. After the independence of African countries in the Y. Wang (B) Southwest University of Political Science and Law, Chongqing, China e-mail: [email protected] Chongqing Technology and Business University, Chongqing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_23

189

190

Y. Wang

1950s and 1960s, contemporary African countries have inherited the legal heritage of the colonial era and value traditional legal resources. They are striving to explore a future legal culture development path suitable for Africa. This is likely to a certain extent. The above represents the development direction of the legal culture of the third world countries and will be Africa’s great contribution to the legal civilization of mankind. The study of the changes in African legal culture is an extremely weak link in both foreign legal history and African historians. Therefore, this article intends to conduct a preliminary investigation of the historical process of this change, with a view to attracting ideas and seeking advice from the academic circles [1].

2 African Customary Law and Its Characteristics In the origin era of ancient African law, the legal systems of various nations generally experienced a long historical period of developing from custom to customary law and then to statutory law. The emergence and development of ancient African states have been relatively slow, and they have more prominent imbalances than other continents. On the whole, it can be called a state of high north and low south [2]. The state organizations in northern Africa appeared very early and were generally more developed. The further south, the later the state organizations appeared and the lower the level of development. Until the recent AD century, many areas of southern Africa did not have the conditions for the emergence of states [3]. Therefore, the characteristics of the legal status of most countries and nations are still in the stage of customary law, and only a few countries, such as Egyptian papyrus documents, inscriptions, and pictures, reflect the historical facts of the existence of statutory law. The statutory code of ancient Egypt has long been lost, and it is difficult to conduct systematic research. “We can only find some words from some of the remaining words written on papyrus and stone tablets, as well as some remnant reports, deeds and contracts” [3]. Therefore, the ancient African laws we need to understand usually refer to the customary laws that existed in the daily lives of ancient Africans [4]. To explore ancient African customary law, we must first have a clear understanding of the concept of “African customary law” itself. There have always been multiple understandings in the academic community. For example, it is believed that “African customary law” is a product of modern times. A kind of creation during the colonial period, as a historical phenomenon, developed in a special historical environment and had close ties with colonial countries [4]. In support of the abovementioned viewpoints, he believes that this kind of customary law is only a kind of law that is somewhat related to the past, supported by the colonial system, and even vividly described by some as “traditions created.” Simon Roberts further said that the “African customary law” in the above sense was applied to the court system established in the colonial era. It exists in the minds of government officials who emigrated abroad, and it also exists widely in the minds of Africans [5]. In this way, the customary law may be passed down to this day. Some jurists and anthropologists studying African culture in their works, especially those reflecting the colonial era,

Research on the Development of Modern African …

191

Legal Entity

Division (Law)

Division (Conventions)

Legislative data group

Legislative data group

Social legal system Fig. 1 The legal composition system in Africa

often refer to the laws that exist in traditional African societies with various names, such as “indigenous law” and “indigenous law” [2]. “Customary law”, “indigenous laws and customs”, “local law”, “tribal law”, etc., and when marginal notes and citations are for a specific ethnic legal system, it is called “Buganda Law” In their view, the laws of the civilized society of Christianity in Europe are dominant, while Africa, especially sub-Saharan Africa, is an uncivilized area of paganism [5]. What we have here is not the law, but just the convention. Figure 1 shows the legal system in Africa.

3 Data Analysis of the Development of African Legal Culture in Africa 3.1 Formally Expressed as “Oral African Law” Language is the carrier of culture. The traditional culture of all ethnic groups in Africa is basically an oral culture, a culture without writing. This kind of culture does not “have all the books and books” like traditional Chinese culture, but “has all the books

192

Y. Wang

Fig. 2 Legal penetration rate in Southern Africa

without books”. In other words, African traditional culture is not a book written in words, but a language stored in people’s minds. Figure 2 shows the changes in the legal penetration rate in Southern Africa. In the same way, African customary law is expressed as “oral African law” in form. Because its form is oral rather than written, it exists alive in the daily lives of the people of all ethnic groups in Africa, passed on from generation to generation, and applied repeatedly [6]. Conventional rules and procedures have been formed, which have deeply affected the way people behave. Social negotiation depends on the value of words and respect for words. Even in the way of litigation, the characteristics of “oral African law” are vividly reflected. For example, the Idioms in northeastern Nigeria use a traditional judicial procedure, which uses semi-chorus to judge cases in a basically dramatic scene, combining music and debate into a formal judicial system. The specific procedure is based on a chorus-style response. Both parties in the dispute state their reasons like formal actors. The trial process lasts from two days to one week [7].

3.2 Spiritually Reflects the Special Values of Africans Affected by traditional polytheistic religions, ancient Africans formed a special worldview in the minds of ancient Africans. God is fundamentally a god, and he is the ultimate authority in all disputes. Under God are the ancestral spirits, who are always in awe. Human beings are a complex of non-material and material bodies. The body is decomposed after death, and the soul is still alive. Therefore, death does not end life, but is only an extension of life [8]. Human society is a continuous home

Research on the Development of Modern African …

193

composed of the dead, the living, and the unborn. The relationship between man and society means that the individual belongs to the entire society, and the performance of individual rights lies in the fulfillment of their obligations, which makes society into a series of mutual relations. The customary law that had an authoritative status in the daily lives of ancient Africans originated from this particular value concept. The American anthropologist Hobel analyzed the legal status of the Ashanti people in Ghana through a case study, fully confirming how important gods, ancestors, and social harmony are in the concept of African customary law [9]. This is so because the ancestors are considered guardians of tribal customs and laws. Before restricting their behavior, the Ashanti always thought that their ancestors were watching them and worried that they would be blamed by their ancestors when they met in heaven in the future [10]. These ideas will produce a very strong moral binding force, which is the basis of the law. This shows that customary laws with special concepts are in an authoritative position in ancient African legal culture, and even profoundly affect the thinking and litigation methods of Africans. For example, reconciliation is the key to resolving disputes. The first step is to ensure group unity and restore coordination and understanding among group members. For individuals, social morality advocates tolerance and humility, and those who win the case often give up the execution of judgments [9]. This is very insightful. So, spiritually, the most distinctive feature of African customary law is to respect gods, worship ancestors, respect tradition, pay attention to group standards, and emphasize social harmony [6]. Figure 3 shows the development index of the law.

Fig. 3 African legal development Index

194

Y. Wang

3.3 The Connotation Is Mainly the Norms of Civil Law In traditional African societies, social organizations are established and maintained on the principle of blood relationship. This kind of social organization is also the basic community of social life. The establishment, operation and maintenance of families, clans, and tribes must follow a complex set of principles and social norms. The objects of adjustment are mainly civil social affairs, such as how to divide kinship relationships, and how to deal with the mutual relations between members of the family and clans. Relationship and inheritance rules, internal marriage prohibition principles, etc. [10]. For example, among the Bambini, the customary law stipulates the rules of collective life and how to maintain ecological balance in the equatorial forest. The property belongs to the collective, and the unfair distribution of food among the members is considered serious damage. Ethical behavior. It is forbidden to abuse children, beat wives or husbands, kill animals indiscriminately, eat eggs that are considered “sprouts of life”, cut down trees, and do not steal or slander others [10].

3.4 The Prevailing Method of Divine Judgment in Litigation The ancient African customary law bears strong traces of primitive tribes, especially closely related to the popular totem worship among the tribes. Totem taboos restrict people’s behavior and make judicial proceedings full of mystery. For example, in a tribe in Central Africa that uses ivy as a totem, when there are more serious disputes about land, houses, killing, theft, etc., the chief will summon the parties involved in both parties, pick up the green vine leaves, and let the wizard chant the spell. Please chew and eat [11]. It is said that people who are unreasonable and wrong will die if they eat it. Being timid on the spot is tantamount to surrendering. In another example, in the Barolan tribe of South Africa, if there is a dispute, the chief will take out the treasured totem symbol hammer and ask both parties to swear against the hammer. The one who loses is said to be punished by the gods. The reason for this is that “in tribes, the dominant thought is not rationality, but gods [11]. For tribes, god’s judge is fair, but rational judges are unfair. In tribal trials, there is no need to explain Reason, because it is irrational.”

4 Conclusion Based on the data analysis of the above-mentioned cultural development, this article believes that the concept of customary law of ancient Africans is quite different from Western ideas in terms of connotation and manifestation, and is quite similar to the legal concepts and values of Eastern nations. But precisely because of the authority

Research on the Development of Modern African …

195

and uniqueness of customary law, in Africa, especially in sub-Saharan Africa and Madagascar, customary law has ruled for several centuries.

References 1. Hao, S.: African legal culture and modern rule of law. J. Binzhou Univ. 11, 161–163 (2014) (in Chinese) 2. Jin, M.: Reference significance of African traditional legal culture. Legal Syst. Soc. 15(09), 34–36 (2017) (in Chinese) 3. Si, C.: The enlightenment of traditional legal culture to the construction of the rule of law in the new era. Legal Expo 7(04), 88–90 (2019) (in Chinese) 4. Liu, T.: The regeneration path of traditional legal culture in the construction of rule of law in the new era. J. Liaoning Inst. Socialism 6(02), 77–79 (2019) (in Chinese) 5. Tang, Y.: Audience issues in legal empirical research. Law Sci. 4, 28–31 (2016) (in Chinese) 6. Liu, H., Hu, X.: A preliminary study on the construction of data philosophy. Philos. Trends 12, 82–84 (2015) (in Chinese) 7. Ma, C.: Legal changes in the era of intelligent internet. Legal Stud. 21(04), 25–28 (2018) (in Chinese) 8. Xia, J.: A preliminary study of the new South African judicial system. West Asia Africa 9(05), 11–13 (2017) (in Chinese) 9. Zhen, W., Xu, Q.: Changes in African legal culture. Legal Expo 17, 55–58 (2016) (in Chinese) 10. Lu, H., Zhang, Y.: Big data analysis is developing in the legal industry. Legal Res. 23(06), 76–79 (2018) (in Chinese) 11. Ma, J., Ma, R.: The influence of British laws on the laws of British African colonies. Foreign Soc. Sci. 14, 114–117 (2017) (in Chinese)

Characteristics of Energy Consumption and Energy Saving Potentiality of Hotel Power System Based on Big Data of Electrical Power Xiang Fang, Yi Wang, Zhiqing Sun, Lin Xia, and Jian Jiang

Abstract China’s economic hotel development has been more than 20 years, and the current proportion accounts for 30% of the national hotel market share. The building resource consumption of economic hotels is estimated to account for one third of the total energy consumption of the society through statistics, and the energy consumption of the proportion of economic business hotel buildings in China is still huge in the next few decades. According to the analysis of the daily business activities of the economic business hotel, the corresponding energy saving transformation model is established, and the best scheme which can roughly budget the energy saving potential is given. This paper studies the simulation data of hotel energy consumption from the aspect of energy saving potential. This paper discusses in detail the energy consumption of all kinds of energy in the hotel from the beginning of transportation, as well as the energy consumption of various functional equipment in the transportation process and the energy consumption of the equipment itself, until the consumption of the energy consumption provided by the terminal energy consumption equipment. Finally, the list of energy consumption is listed with reference to GBOM. The energy consumption parameters of each functional equipment are described, and the name and number of each function to be investigated are listed in the general material list of manufacturing industry. Each functional area and energy consumption device of the system are connected with the energy consumption controller. Finally, according to the national standard “energy saving and transformation energy consumption standard” to the constraint value or guidance value of energy consumption distribution process of economic hotel to judge the energy saving potential. Keywords Economy hotel · Energy consumption benchmark · Composite index · Energy saving potential

X. Fang (B) · Y. Wang · Z. Sun · L. Xia · J. Jiang State Grid Hangzhou Power Supply Company, Hangzhou 310000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_24

197

198

X. Fang et al.

1 Introduction The research on energy consumption standard of hotel buildings is the basis of energy conservation and emission reduction of hotels, but because of the particularity of hotels, the experiment has suffered many obstacles [1]. Compared with other commercial buildings, hotel buildings have many service functions, such as catering, accommodation, rest, entertainment and the use of a variety of energy using equipment [2]. The types of its customers are dynamic groups, which also have an impact on energy consumption control, resulting in more uncertainty in energy consumption, and the variety of star hotels is difficult to calculate accuracy [3]. Therefore, there will be some difficulties and particularity in the process of energy budget for hotel buildings. Because it is difficult to collect the relevant information of hotel buildings and the vast territory of our country, there are great differences between provinces, so it is necessary to conduct a detailed investigation and Research on the social energy consumption of different types of hotel buildings included in various types of regions when formulating targeted energy conservation and emission reduction work [4]. At present, the research direction of energy conservation and energy consumption at home and abroad mainly focuses on the social energy consumption of public buildings, while the research on the social energy consumption of hotel buildings is few [5]. At present, economic hotels know little about social energy consumption [6]. The social energy consumption standard of economic hotels is to calculate the utilization rate of social energy, the quantity limited by social energy, and the necessary percentage of energy utilization. The scoring standard is 75 points as the qualified value [7]. The basic management level of the hotel can be estimated according to the scores of owners and the same industry [8]. From the aspect of energy saving potential, the energy saving transformation of economic hotels and the energy saving transformation of small lighting energy investment [9]. These proposed energy conservation and transformation are based on the characteristics of economic business hotels, and then the energy consumption standard of economic business hotels is estimated through the energy consumption standard of civil buildings in China. Until the budget result constraint value is consistent, the potential of energy conservation before and after the energy conservation and transformation can be calculated [10]. This paper analyzes the energy consumption measurement model of hotel energy classification system from the perspective of energy saving potential. This paper discusses in detail the energy consumption of all kinds of energy in the hotel from the beginning of transportation, as well as the energy consumption of various functional equipment in the transportation process and the energy consumption of the equipment itself, until the energy consumption provided by the terminal energy consumption equipment is consumed. All functional areas and energy consumption devices of the system are connected with the energy consumption controller. Finally, according to the national standard “energy saving and transformation energy consumption standard” to the constraint value or guidance value of energy consumption distribution process of economic hotel to judge the energy saving potential.

Characteristics of Energy Consumption and Energy Saving …

199

2 Method 2.1 Construction of Energy Consumption Standard for Economic Hotels At present, there are two main evaluation standards of building energy consumption in the related research at home and abroad: the way of building energy consumption statistics and the way of simulating energy consumption. Index method is a common method to evaluate the energy saving of buildings. Through the calculation of indicators, the indicator method is divided into single indicator method and comprehensive indicator method. Single indicator method is a more widely used method in today’s society; the other method is comprehensive indicator method. In this paper, the energy star method is used, and the specific establishment process is as follows: Step one: establish the regression model that needs to be designed. For the building type to be tested, the first thing to do is to find and collect the factors related to EUI from the established model, and then construct the regression model of EUI and the factors obtained from the analysis by the least square method. The predicted EUI is calculated by Formula (1): EU I = β0 + β1 x1 + · · · + βm xm

(1)

For example, if the calculated energy efficiency ratio EER < 1, it means that the energy consumption is less than the predicted value, then it can be determined that the energy consumption of the building is energy saving, otherwise, it can be determined that the energy consumption of the building is not energy saving. The second step is to generate eer distribution through the collected data. By fitting the cumulative eer distribution with the cumulative gamma distribution, the calculation formula of the building energy efficiency score of the target building complex is obtained (2): Scor e = 100{1 − Gamma Dist (E E R, α, β)}

(2)

Score represents the percentage of the target complex that has a higher eer than the building under test. 75 is the lowest score of Energy Star certification for the tested building.

2.2 Energy Saving Potential of Economic Hotels On the analysis of the potential of energy conservation in China, from the perspective of national and regional macro level, there are two basic ways to analyze the potential of energy conservation:

200

1.

2.

X. Fang et al.

Comparative method. Compare the energy efficiency of our country with other economies to determine the energy saving potential of our country. The methods used can be roughly divided into two ways: the first is the method of international comparison of similar levels. The second method is regional comparison. Compare energy efficiency with regional energy efficiency at the same level. Factor method. According to the correlation between the potential of building energy conservation and its influencing factors, an evaluation calculation of the potential of energy conservation is realized. Compare the ways of structural contribution rate predicting energy saving potential and point out the differences of energy intensity and technology contribution rate of the sector.

3 Experiment 3.1 Data Source In this paper, the eeui of 30 economical hotel buildings is selected as the sample. With a verification example attached, there are standard hotel s and two economic hotel targets (evaluated) a and B of the same level, all of which are located in different cities in cold regions (cold in winter and hot in summer) divided by climate regions in China. The energy sources of heating (heating) and air conditioning (cooling) in the hotel are electricity and gas. A. The number of rooms n of B and s hotels is 120,115 and 120 respectively, and the average room rate V is 190 yuan, 170 yuan and 200 yuan respectively. The data of average annual energy consumption e, building area m, environment envi, occupancy rate λ, number of rooms N and room price V of standard hotel s and target hotel a and B are respectively collected as shown in Table 1. A, B, S The environment Envi of three hotels B and S is different. Table 1 Data of each index of energy consumption model Evaluation index

S standard hotel

A hotel

B hotel

Star rating

3 star

3 star

3 star

Floor space (M)

4000

4000

3800

HDD18

3299

3460

3078

CDD26

189

57

196

Annual occupancy rate (λ)

95

84

72

Average house prices (N)

350

300

280

The total number of rooms (v)

120

120

115

Environment Envi

Characteristics of Energy Consumption and Energy Saving …

201

3.2 Characteristics of Energy Saving and Renovation Hotel An economic hotel is located in the cold zone of the northern hemisphere, with 4 floors and a building area of 3600 m2 . The number of guest rooms is 120, and the standard rooms are divided into two types: big bed room (single room) a (50 rooms in total), double bed room (double room) B (70 rooms in total). The area of type A and type B is 16.5 m2 and 20.7 m2 respectively. A. There is no difference in the configuration of type B guest rooms except for the number of beds. One day and night price of king bed room and double bed standard room is 350 yuan and 280 yuan respectively. The occupancy rate is 84%, the number of staff is 25, the hotel is open all year round, only breakfast is provided, and the lobby and kitchen restaurant are on the first floor. Daily use of two elevators in the building. There are many gas stoves and freezers in the kitchen. The energy consumption metering device is installed at the power and gas input end of the hotel, the equipment with high power (such as the power consumption of central air conditioning, gas consumption of boiler room) and the branch circuit of each floor.

4 Discussion 4.1 Energy Saving Renovation Plan and Energy Saving Potential Analysis of Hotel Lighting In the past, there was a lack of constraint value and allowable value index of hotel energy consumption. In the past, the calculation of energy saving potential at the micro level lacked reliable national standards. The calculation of energy saving potential mainly depended on the energy saving rate before and after energy saving. Now, after the national standard is issued, the calculation of energy saving potential at the micro level needs to first determine whether the energy saving technical transformation meets the requirements of the national standard, and then calculate the energy saving potential after meeting the national standard. The constraint value and guidance value of non heating energy consumption index of hotel buildings are shown in Fig. 1. The constraint value and guidance value of building heating energy consumption index in severe cold and cold areas are shown in Fig. 2. Take Beijing district central heating, the values of constraint value and guidance value are 13.7 kgce/(m2 · a) and 8.7 kgce/(m2 · a), respectively. Finally, in Beijing, the constraint value of building energy consumption is 22.4 + 13.7 = 36.1 kgce/(m2 · a), and the guidance value is 16 + 8.7 = 24.7 kgce/(m2 · a). Before and after the renovation of lighting energy conservation of the hotel, it is 420,000 kWh/(m2 · a) and 275,000 kWh/(m2 · a), and the standard coal coefficient is 420,000 × 0.32 = 134,400 kgce/(m2 · a), 275,000 × 0.32 = 88,000 kgce/(m2 · a), respectively.

202

X. Fang et al.

Fig. 1 Constraint value and guidance value of non-heating energy consumption index of hotel building

Fig. 2 Constraint value and guidance value of energy consumption index of building heating

1.

2.

In the case of non heating, euim = 134,400/4000 = 33.6 kgce/(m2 · a) before energy saving and transformation, exceeding the non heating constraint value of 22.4 kgce/(m2 · a). After energy conservation and transformation, euim = 88,000/4000 = 22 kgce/(m2 · a), meeting the non heating constraint value of 22.4 kgce/(m2 · a), but exceeding the guidance value of 16.7 kgce/(m2 · a). So the energy saving potential pi = l − euii/eulm = l − 22/33.6 = l − 65% = 35%. When heating, after the energy saving transformation and the constraint value of heating, the constraint value is 22 + 13.7 = 35.7 kgce/(m2 · a), which does not exceed the constraint value of heating, but exceeds the guidance value (does not meet the requirements of guidance value).

Characteristics of Energy Consumption and Energy Saving …

203

Table 2 Result of constraint value and guide value after energy-saving renovation Constraint value

Guide the value

Beijing

22.4 + 13.7 = 36.1 kgce/(m2 · a)

16 + 8.7 = 24.7 kgce/(m2 · a)

Non heating

134,400/4000 = 33.6 kgce/(m2 · a)



Heating

22 + 13.7 = 35.7 kgce/(m2 · a)



The specific results are shown in Table 2.

4.2 Analysis of Measures to Improve Energy Saving Rate Methods to improve energy saving rate through energy saving transformation: 1.

2.

3.

4.

Based on the constraint satisfaction problem, the mathematical model of the scheme is established. Based on the product configuration and man–machine combination, the complexity is reduced to simplicity. The method of small investment lighting energy saving transformation scheme led by the hotel management department is given, which breaks through the strict boundary between this technology and management, and breaks the habit of outsourcing regardless of the size of the project. Based on the idea of combination of technology and project management, this paper puts forward a method of integration of simplified management process and hotel leading technology and management. Because the recovery time of NPV BPV, IRR and dynamic investment recovery time pH is different, it is calculated as the maximum recovery time. The payback period can be determined by how much money is paid each year (discount rate). The empirical results show that compared with the original scheme, the annual energy saving rate of the new scheme is 35%, which meets the specified standard (constraint value) of GB/t5116-2016. The longest pH is about 5.7 years, and it has the economic benefit of energy saving. Small investment in energy conservation and transformation, although the project is small, it is in line with the green hotel’s spirit of saving everything, combined with the actual implementation of the detailed concept of energy conservation. China has a large number of economic hotels. If they bloom everywhere, they will make a lot of money. Energy conservation and emission reduction and economic benefits will be considerable, and they will play a good role in social demonstration.

5 Conclusion At present, the research on energy consumption benchmark, comprehensive index of energy consumption benchmark, energy saving potential and other aspects of

204

X. Fang et al.

economic hotels in China is still lacking. In this paper, from the perspective of energy saving potential of economic hotels, energy saving technology transformation projects are given, considering the implementation of economic and technical indicators. Finally, the energy consumption benchmark evaluation, energy consumption benchmark composite index evaluation and energy saving potential evaluation are given. Due to subjective and objective reasons, there are still many deficiencies in this paper, and the research object of this paper is the lack of economic hotel research. As the economic hotel is a hotel form introduced in the late 1990s, it is simple in scale and small in equipment, and provides limited services based on room service. It is welcomed by the working class and becomes the future development direction. However, it is not paid enough attention at present, so it is necessary to establish a perfect building energy consumption database of the economic hotel as soon as possible.

References 1. Ko, J.H., Kong, D.S., Huh, J.H.: Baseline building energy modeling of cluster inverse model by using daily energy consumption in office buildings. Energy Build. 140, 317–323 (2017) 2. Golden, A., Woodbury, K., Carpenter, J., et al.: Change point and degree day baseline regression models in industrial facilities. Energy Build. 144, 30–41 (2017) 3. Ghobaei-Arani, M., Rahmanian, A.A., Shamsi, M., et al.: A learning-based approach for virtual machine placement in cloud data centers. Int. J. Commun. Syst. 31(8), e3537.1–e3537.18 (2018) 4. Kang, W., Chung, J.: Energy-efficient response time management for embedded databases. Real Time Syst. 53(2), 228–253 (2017) 5. Hjortling, C., Bjork, F., Berg, M., et al.: Energy mapping of existing building stock in Sweden— analysis of data from energy performance certificates. Energy Build. 153, 341–355 (2017) 6. Bianco, V., Righi, D., Scarpa, F., et al.: Modeling energy consumption and efficiency measures in the Italian hotel sector. Energy Build. 149, 329–338 (2017) 7. Arco Diaz, J., Sanchez Ramos, J., Guerrero Delgado, M.C., et al.: A daily baseline model based on transfer functions for the verification of energy saving. A case study of the administration room at the Palacio de la Madraza, Granada. Appl. Energy 224, 538–549 (2018) 8. Lin, B., Liu, W.: Scenario prediction of energy consumption and CO2 emissions in China’s machinery industry. Sustainability 9(1), 87 (2017) 9. Chang, W.R., Hwang, J.J., Wu, W.: Environmental impact and sustainability study on biofuels for transportation applications. Renew. Sustain. Energy Rev. 67, 277–288 (2017) 10. Wang, L., Liu, X., Brown, H.: Prediction of the impacts of climate change on energy consumption for a medium-size office building with two climate models. Energy Build. 157, 218–226 (2017)

Artificial Intelligence Random Forest Algorithm and the Application Yan Huang and Xiong Zhou

Abstract Random forest (RF) refers to a combined classifier of machine learning algorithms or a representative algorithm of integrated learning. Bagging algorithm is used to realize the integration of multiple decision trees and output results by voting, which has been well evaluated in industry and academia. This paper analyzes the random forest algorithm of artificial intelligence, hoping to provide a foundation for the subsequent optimization research of the algorithm. Keywords Artificial intelligence · Random forest · Machine learning Artificial intelligence (AI) refers to the brand-new technology and science with development, research and application system. Artificial intelligence also affects our work and life, making people’s life more convenient and comfortable, and high and working efficiency can be achieved by application of AI. All intelligent robots are made for operation based on artificial intelligence algorithms that are adopted to make correct judgments on information. Different advantages and disadvantages can be shown in different algorithms in different situations [1]. Good effects are demonstrated by the adoption of the random forest algorithm in the process of utilization, so it is of great significance to analyze the principle of this algorithm.

Y. Huang Wuhan College of Arts and Science, Wuhan 430000, China X. Zhou (B) Tongji Hospital, Tongji Medical College, Huazhong University of Science and Technology (HUST), Wuhan 430030, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_25

205

206

Y. Huang and X. Zhou

1 Analysis on Random Forest Algorithm In the machine learning algorithm, the random forest algorithm includes multiple decision tree classifiers, and the output category is determined by scores of individual output category. Random forest algorithm is also known as integrated learning algorithm, which is a machine learning method comparing people at present. It is not a single machine learning algorithm by itself, but a learning task achieved by creating multiple machine learning machines. Ensemble learning can be used to realize integration of classification problem, integration of feature selection, regression problem integration, etc. Random forest is also bagging algorithm in ensemble learning algorithm, which is a combination of decision tree algorithm and bagging algorithm [2]. First the sample can be repeated through random sampling of the sample set. N sample training sets can be obtained through n times of sampling, and n decision trees generated by the training set can be used to vote for the final result through multiple classification trees. In the aspect of regression, the average of predicted values of multiple trees is used to determine the final prediction result. The main advantage of the random forest algorithm is that it has a high accuracy rate. It can be used to process discrete data but also continuous data can be processed, and the data set does not need to be normalized. However, it also has obvious disadvantages. When the number of decision trees in the random forest is relatively large, the time and space required for training are also relatively large [3]. The classification performance of random forest is affected by internal and external factors. Through analysis on internal factors, the maximum number depth, classification intensity and correlation of each decision tree are generally taken into consideration. Analysis on external factors is conducted on the distribution of the original data itself, such as sample size, positive and negative samples, etc. The generalization error and classification effect indexes are used to evaluate the random forest performance.

1.1 Classification Effect Index Random forest algorithm is, at the most conditions, used in the classification and prediction model. TP refers to the number of positive samples that are predicted to be positive by the model, TN refers to the number of negative samples that are predicted to be negative by the model, FN refers to the number of positive samples that are predicted to be negative by the model, and FP refers to the number of negative samples that are predicted to be positive by the model [4]. The accuracy rate is the calculation formula of the proportion where the prediction is positive and the sample is really positive: Pr ecesion =

TP T P + FP

(1)

Artificial Intelligence Random Forest Algorithm …

207

Classification accuracy refers to the overall classification accuracy of the classification model: Accuracy =

TP +TN T P + T N + FP + FN

(2)

1.2 Generalization Error Generalization ability refers to the adaptability of machine learning algorithms to fresh samples, that is, the model can be used to make a judgment to data outside the training set with the same distribution rules. In the field of industrial production, the generalization error is generally used to evaluate the generalization ability of machine learning algorithm. If the generalization error is relatively large, the learning performance of this model is also relatively poor; otherwise, the model will be proved with better performance. Based on theoretical analysis, generalization error can be calculated directly by formula. However, through analysis on practical application, accurate sample distribution and expected output fail to be obtained [5]. The estimation methods for generalization error of classifiers include analysis model and cross validation. For simple linear analysis, the analytical model is effective, but because the effective parameters of random forest cannot be reasonably estimated, the advantages of complex problems such as nonlinear cannot be highlighted. Crossvalidation is achieved by dividing the training data into test set and training set. The training set is used to validate train the algorithm so that the test set can be verified for algorithm and to further evaluate generalization error by validation set. In the process of creating the decision tree, the training set is extracted, so for the initial training set of the random forest model, part of the original data is not involved in the model training, which is OBB data [6].

2 The Application of Artificial Intelligence Random Forest Algorithm In the context of the continuous emergence of massive data, a single classifier is incapable of processing complex data types. Therefore, integration algorithm is the main research content. In data processing, a relatively high accuracy in data classification can be achieved by the random forest algorithm, and the algorithm is relatively stable, which is widely used in artificial intelligence, biological information, medicine, computer vision and other fields. Multicore support vector machine is a classification tool, which is a learning method with high classification accuracy in the field of artificial intelligence.

208

Y. Huang and X. Zhou

2.1 Support Vector Machines (SVM) Support vector machine is a method for machine learning, which is used to create an optimal decision hyper plane and expand the distance between two types of samples closest to the plane on both sides of the plane, so that the ability in classification generalization can be developed. The support vector machines is divided into nonlinear and linear support vector machines according to the distribution of sample data [7]. If the data samples are linearly separable, the data space of the training samples can be assumed as: {(X 1 , y1 ), (X 1 , y1 ), ..., , (X N , y N )}

(3)

Optimized solution to problems is used in support vector machine optimization model to obtain the following:  1 min ω2 + c ξi 2 i=1 N

In the formula, C refers to the to maximal interval by equilibrium algorithm and the cost parameters of minimized misclassification samples, and ξi refers to the slack variable. For the linear non-fractional data, kernel function transformation is used to map the original eigenvector to the higher-order eigenspace, so as to realize linear separability and the decision function can be obtained as:  N   f (x) = sign ai yi k(xi , x) + b (4) i=1

k(xi, x) is kernal function, b is the classified threshold value. The kernel function is the key part of support vector machine (SVM). Different kernel functions are used to make the existing non-separable sample to be mapped into high-dimensional and separable linear space, which is the main tool for SVM nonlinear classification. Simple multicore learning is the synthesis learning algorithm in the weighted sum method. The kernel function is taken as the structure of the intermediate layer neural network, and the output is the linear combination of the output of the intermediate kernel function [8]. Figure 1 is the multicore learning frame diagram.

Artificial Intelligence Random Forest Algorithm …

209

Fig. 1 Multicore learning frame diagram

2.2 Algorithm Flow Lagrange multiplier is used in the support vector machine to transform the original optimization problem into equivalent dual model: max a

  1 ai a j yi y j βm km (xi , x j ) + ai 2 i, j m i

(5)

The standard SVM dual problem is defined by the combination of kernel functions. The problem model is strong dual. Therefore, the optimization objective of dual problem is as: J (β)

  1 ∗ ∗ ai a j yi y j βm km (xi , x j ) + ai∗ 2 i, j m i

(6)

In the formula, a ∗ is the optimal solution of the dual problem and the optimization objective can be obtained by solving the standard SVM problem. Therefore, the

210

Y. Huang and X. Zhou

overall complexity of this algorithm is the same as that of support vector machine algorithm.

2.3 Support Vector Machine Random Forest Algorithm The SVM random forest replaces the original base classifier model by multi-core learning, and compared with the single-core classifier, the multi-core classification system can be used to comprehensively describe different features and angles, and the selection of kernel parameters is proved with good applicability, so as the identification accuracy is improved. Therefore, this paper is made to create an integration algorithm based on multi-core support vector machine, see details above.

2.4 Experimental Results and Analysis In order to analyze the effectiveness of the algorithm in this paper, this section is made to test the classification data of UCI and compares it with support vector machine and single polynomial support vector machine. For each group of UCI classified data, 50% of the samples were randomly selected for training, and the other 50% samples were tested to estimate the algorithm accuracy of the 100 mean values. In this paper, the number of experimental fixed rotating subsets is set to be 3, so that the polynomial kernel function and radial basis kernel function become multi-kernel SVM kernel function [9]. Polynomial kernel function: k(xi , x j ) = [(xi .x j ) + 1]q

(7)

Radial basis kernel function:     xi − x j 2 k(xi , x j ) = exp − 2σ 2

(8)

Q in the formula refers to the polynomial order, σ refers to the standard deviation of Gaussian kernel function, which controls the range of function of radial basis kernel function. If the value is small, the SVM classifier will overfit. If the value is too large, the problem of underfitting will occur. In this paper, 3 different q and 10σ are used to become two kinds of basic kernel function parameters, q = [1, 2, 3], σ = [0.5, 1, 2, 5, 7, 10, 12, 15, 17, 20]. Table 1 shows the experimental data of classification data, and Fig. 2 shows the comparison results. In this way, multicore support vector machines are compared, the classification results of random forest algorithm proposed in this paper can be improved in most data sets.

Artificial Intelligence Random Forest Algorithm …

211

Table 1 The experimental data of classification data Data set

Algorithm 1

Algorithm 2

Algorithm 3

Anneal

89.25

83.52

83.52

Algorithm in this paper 93.52

Balance

87.25

89.54

89.25

92.62

Breast

94.52

96.45

96.36

96.63

Car

90.25

82.52

92.52

92.45

Glass

63.25

53.52

70.52

68.52

Libras

72.51

75.55

91.65

93.52

Lymphography

78.52

82.42

98.25

98.62

Horse-colic

75.41

81.54

90.52

92.52

Ionosphere

82.66

91.45

93.52

62.22

Image

82.54

87.52

86.54

85.11

Pima-Indians

68.62

76.52

75.52

47.52

Vertebral

75.44

82.52

83.52

90.52

Waveform

79.52

85.44

85.62

85.52

Wine

94.52

96.74

97.52

100.00

Zoo

93.64

94.52

94.52

100.00

Above said, the generalization performance of the random forest algorithm based on support vector machine is in good condition, which can improve the classification performance of the integrated system. Providing that the parameters of kernel function are the same, the integration scale keeps increasing, and the test structure of the experiment by each method can be constantly improved [10].

3 Conclusion The random classification algorithm enjoys some advantages in classification and can be used to deal with variables. However, there are some shortcomings in the way it is handled and the core code needs to be changed. Secondly, the accuracy of data classification can be guaranteed by the number of decision trees and the efficiency of the algorithm can be improved, so real-time processing fails to be made by this algorithm.

Fig. 2 Comparison results

212 Y. Huang and X. Zhou

Artificial Intelligence Random Forest Algorithm …

213

References 1. Zhang, X., Guo, Y., Zhou, Y., et al.: Raster DEM classification method based on random forest. Geomatics Spat. Inf. Technol. 042(010), 107–109, 115 (2019) 2. Yuan, Z.: Artificial intelligence—analysis on random forest technology. Technol. Innovation Appl. (006), 151–152 (2020) 3. Qiao, L., Wang, J., Guo, W., et al.: Prediction for electricity consumption in short and medium term based on random forest algorithm. J Electr. Power Sci. Technol. 035(002), 150–156 (2020) 4. Hu, Z., Yan, B., Peng, Y.: Cost-sensitive random forest algorithm for hierarchical sampling and the application. Comput. Eng. Des. (12) (2019) 5. Xiao, L.: Intelligent recognition of speech features based on random forest algorithm. Comput. Telecommun. (010), 51–53 (2019) 6. Sun, Y., Zhang, J., Xu, P., et al.: Load situational awareness and control method based on artificial intelligence agent. Autom. Electr. Power Syst. (2019) 7. Ping, R., Zhou, S., Li, D.: Cost-sensitive random forest classification algorithm for high-altitude unbalanced data. Pattern Recogn. Artif. Intell. 033(003), 249–257 (2020) 8. Yu, Y., Li, H., Xia, J., et al.: Application of artificial intelligence in refined grid forecasting in Beijing. In: The 35th Annual Meeting of the Chinese Meteorological Society S20 In-depth Informatization: Application Support and Intelligence Development (2018) 9. Zhang, J.: Research on clearing of Gaiya bigdata based on random forest algorithm. Comput. Sci. Appl. 009(009), 1747–1752 (2019) 10. Chen, Y., Mao, Y.: Automatic adjustment of Ceph parameters based on random forest and genetic algorithm. J. Comput. Appl. 40(2), 347–351 (2020)

Optimization Path of Coal Equipment Management Based on Information System from the Perspective of Large Data Consumption Feng Meng, Zhen Ding, and Yunjie Jia

Abstract The construction of equipment management information system for large coal enterprises started early, and the information platform was basically completed. In the face of the advent of the era of great intelligence and mobile cloud, what kind of optimization and adjustment the traditional informatization development strategy should make to meet the needs of my country’s energy development strategy transformation has become a focus of concern in the industry. Based on the background of big data technology, this paper deeply investigates the current status and existing problems of the construction and operation of equipment management information systems for large coal enterprises, proposes to carry out continuous evaluation and diagnosis to optimize and improve the existing systems, and to increase the development and utilization of decision support systems based on data mining technology And other suggestions to meet the needs of precise management decision-making, and promote the realization of the transformation goals of the development strategy of coal enterprises. Keywords Large coal company · Equipment management and information system · Big data technology · Decision support systems

1 Introduction The equipment management level of asset-heavy coal enterprises directly affects the safe, reliable and efficient operation of coal equipment and the realization of strategic goals. Most of the large coal enterprise groups in my country have established a multi-level coal equipment management information system covering coal enterprises, branch companies and grassroots mining enterprises, serving upper-level F. Meng · Z. Ding China Energy Investment, Beijing 100013, China Y. Jia (B) Nanjing Audit University, Nanjing 211815, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_26

215

216

F. Meng et al.

decision-making, middle-level control and lower-level management. With the advent of the Big Smart Cloud era [1, 2], what is the current status of the system, what are the bottlenecks, how to optimize and improve the existing system based on big data technology [3] to meet the needs of my country’s energy development strategy transformation, Achieving refined decision-making and control over the entire life cycle of equipment, and boosting the realization of the group’s development strategic goals, has become an urgent problem for large coal enterprise groups.

2 Current Status of Construction and Operation of Coal Equipment Management Information System The construction of the Group’s coal equipment management information system started from the asset management information system (EAM) that was put into operation in 2002. After EAM was upgraded to the Web system, to the integrated construction of EAM and other systems, it has formed an integrated, with certain decision-making analysis functions. ERP information platform. In 2017, the reorganized National Energy Investment Group promoted a coal equipment management system composed of ERP and cMES (digital mine) systems. The system covers the full life cycle management functions of equipment planning and reporting, model selection, bidding and procurement, installation and commissioning, acceptance, operation and maintenance management, spare parts management, technical transformation and scrap disposal [4], which meets the technical and economic management of equipment Requirement [5], the establishment of an integrated equipment information system for industry and finance is basically completed (see Fig. 1). After 18 years of operation, the equipment management information system has accumulated a certain amount of equipment operation and maintenance data [3], which provides basic conditions for using big data analysis technology to tap the decision value contained in the data itself. The existing information system has basically realized the scientific and reasonable determination of the purchase amount of new equipment, materials, and spare parts, saving more than 100 million yuan in material purchase funds each year. After the addition of the check function module, the ability to prevent general and major faults and accurately eliminate safety hazards has been continuously improved, and the annual economic loss has reached more than 100 million yuan [3]. The operation has achieved remarkable results, but there are also many problems.

Optimization Path of Coal Equipment Management …

Pre-equipment management

217

Interim management of equipment

Equipment post-production management

Operation, use and maintenance

Planning and planning Purchase (manufacture)

Update, scrap and dispose

Evaluation and analysis of equipment assets Project management report

Medium and long term planning of equipment assets

Annual plan

Installation and debugging Equipment acceptance

Equipment purchase

Equipment rental

Equipment manufacturing

Investment operation

Equipment management report

The tally management

Decision support analysis module (To be further developed)

Preventive maintenance

Performance Monitoring

Defect management

Maintenance management

Maintenance management

technical transformation

Scrap/Disposal Equipment allocation and adjustment

Outsourced maintenance

Equipment leasing

Specialized maintenance

Financial data Accounts receivable and accounts payable

Project master data Project data

Classification of equipment

Assets management

Cost accounting Center

Device master data

Material master data

Technical literature

Position of function

Equipment ledger

Fig. 1 Equipment full life cycle management information system

Fault code

Material data

218

F. Meng et al.

3 Problems in the Design and Operation of the Current Equipment Management Information System 3.1 Failure to Truly Achieve the Goal of Integrated Financial and Equipment Management Financial and business data are not fully integrated and managed. Except for materials and equipment data, the business data in the equipment management (PM) module has not been automatically transferred to the financial system. In daily accounting, there are some expenses and item data that need to be manually processed and then input into the system; individual items and data are different from the goals of one-time acquisition and sharing due to multiple management and repeated entry.

3.2 The Friendliness and Convenience of the Operation Interface Design Are Not Well Considered The PM module uses a mature foreign equipment management software system, with Chinese and English versions to choose from, and most users are accustomed to using the Chinese version. However, its interface design is difficult to adapt to the operating habits of the Chinese people, and because the field translation accuracy is not high and difficult to understand, it is necessary to review the original corresponding English fields, which increases the difficulty and workload of operation.

3.3 Difficult to Meet the Individualized Management Needs of Grassroots Departments As a group’s integrated construction system, it will inevitably face the problems of long vertical control chain and many horizontal industrial modules. Therefore, in the system integration design, general functional modules are often used, and the design of the underlying personalized functional modules is less considered. Some functional modules are no longer extended downwards at a certain level or level, failing to take into account the personalized management needs of secondary companies, factories and mines.

Optimization Path of Coal Equipment Management …

219

3.4 Inconsistent Data Standards Cause Difficulties in Connecting the Old and New Systems The data standard and field format of the new system launched after the reorganization of the group are different from the old system. As a result, the data in the original system cannot be directly imported into the new system. After the corresponding relationship is established manually, the data in the original system is adjusted according to the new system field format. Can upload later. In the process of conversion and import, the probability of errors is increased. The data that has not been cleaned and adjusted in the original system will no longer be saved, which is a great loss for the enterprise.

3.5 The Fidelity of System Data Needs to Be Further Improved The reliability of the existing system data is not high: First, there is a deviation between the material acquisition and actual consumption data; Second, the equipment output data is manually recorded and then entered into the cMES, which is difficult to avoid errors; Third, the maintenance labor cost It is impossible to accurately locate the specific equipment; fourth, data such as the location, type, and cause of the fault need to be manually input, which causes the description of similar faults to vary from person to person, which affects the accuracy of fault analysis and health diagnosis.

3.6 Insufficient Development and Utilization of System Decision Support Functions The biggest shortcoming of the existing system is that the value of big data [6] has not been fully exploited [7], and the development and design of functions for intelligent and refined management decision-making are insufficient. The design of its statistical report analysis function still stays at the daily accounting and simple query statistical analysis level. The design and selection of statistical indicators focuses on the needs of middle and lower-level segment management, lacks consideration of high-level macro-management decision-making needs, and fails to achieve decision support such as automatic collection, extraction, screening and analysis of coal equipment full life cycle operation and maintenance data Features.

220

F. Meng et al.

4 Optimize the Strategic Path of the Current Coal Equipment Management Information System 4.1 Make a Mid- and Long-Term Overall Plan for Continuous Improvement of Information Systems 4.1.1

Do a Good Job in Individualized Module Construction Planning and Improve the Efficiency of Project Construction

In view of the lack of personalized management modules for grassroots factories and mines in the current unified construction system, and the need for grassroots units to apply for project development on their own, the overall planning of the special construction of grassroots personalized management modules should be initiated from the group company level. Organize grassroots units to apply for system construction in batches to improve the efficiency of project approval and construction.

4.1.2

Open-up the Breakpoints of Data Flow and Realize the Smooth Operation of the Integration of Industry and Finance

The group-level informatization leading group and full-time department should work with the secondary and tertiary informatization departments to investigate the breakpoints of business and financial integration and unreasonable links in process design, and study dredging countermeasures based on the survey results to open up the automatic flow of business financial data Strengthen the integration of information resources between systems, optimize the division of responsibilities for original data entry, and change the unreasonable situation of multiple data entry being responsible for repeated entry of data.

4.1.3

Overall Planning System Performance Evaluation, Consolidating Defect Diagnosis and Continuous Optimization Work

Starting from the group level, attach importance to the annual performance evaluation and improvement of the information system, and increase resource input; ensure that the information system operation defect information feedback channel is unblocked and the defect can be dealt with in a timely manner; establish a special diagnostic evaluation of the information system once every three to five years To ensure the rigid implementation of the continuous evaluation system.

Optimization Path of Coal Equipment Management …

221

4.2 Increase the Development and Application of Decision Support Systems 4.2.1

Standardize the Collection of Original Data and Increase Investment in Data Cleaning

The accuracy of decision support analysis is highly related to data quality. Data may be a signal with decision-making value, or it may be disturbing noise [6], which puts forward high requirements on the normative and standard system of data input. To this end, we should do the following: First, strengthen the standard construction of data collection and transmission [8], formulate unified data element standards, information classification and coding standards, user view standards and database table standards, etc.; second, strengthen manual data input Normative requirements [9], using the method of drop-down menu selection, it is convenient for input personnel to automatically select the fault phenomenon, type and location. After completing all the specified sub-menu options, the input of a complete fault data can be submitted and completed; the third is to improve automation The degree of data collection is to minimize personnel participation and solve the problem of data fidelity [10] from the source.

4.2.2

Increase the Application of Data Analysis Technology, Plan the Development and Utilization Strategy of Decision Support System

The development and utilization of decision support systems is the main theme of future information system optimization. The group level should pay attention to and increase the development of decision support systems based on analysis techniques such as data mining [11–13]: establish equipment procurement, leasing, health analysis [7, 14], update and discard decision-making models; Build a scientific reserve prediction model based on spare parts (material) consumption curves to reduce inventory capital occupation; build the best daily maintenance and preventive maintenance decision-making model based on spot inspection, temperature monitoring, and oil sample test results to correct over-repair or The maintenance investment caused by under-repair is unscientific [15]. These decision support models are embedded in the existing equipment management analysis system, and the equipment life cycle refined management decision-making function of automatically running the analysis results on demand to support scientific decision-making is realized.

222

4.2.3

F. Meng et al.

Optimize the Establishment of Functional Institutions and Increase the Construction of Full-Time Talents

The construction of organizational structure and talent team is the basic guarantee for the optimization of information system and the development and application of decision support functions. Therefore, long-term overall planning should be done at the group level: First, optimize the existing informatization work function settings, establish a collaborative work mechanism between the informatization department and the business management department, and break the restrictions on informatization work caused by departmental barriers; the second is to coordinate internal integration The strength of professional and technical personnel to coordinate the development of cross-company informatization and the improvement of diagnosis; the third is to increase the introduction of informatization professionals, absorb and train various types of senior information technology and management talents, and continuously adjust the talent structure; the fourth is to improve decision-making Support system development and utilization personnel training and ability improvement mechanisms, strengthen informatization management and technical training for personnel at all levels, and better meet the requirements for professional talents and competence in the transformation of informatization development strategy.

5 Conclusion After the establishment and stable operation of the equipment management information system, the focus of subsequent work should shift to continuous system evaluation and optimization, and to increase the development and utilization of decision support functions. This paper investigates and analyzes the current status and existing problems of the design and operation of equipment management systems for large coal enterprise groups. Based on the development perspective of big data information technology, the strategy path for optimizing existing equipment management information systems is proposed from two categories and six aspects. It is helpful to improve the governance efficiency of the equipment management information system of large coal groups and to help realize the transformation goals of their development strategies. Fund Science and Technology Project: National Energy Investment Group “Evaluation of the Life Cycle Management Effectiveness of Coal Sector Equipment” (GJNY-19-02).

Optimization Path of Coal Equipment Management …

223

References 1. Gull, M.: Spark Big Data Analysis: Core Concepts, Technology and Practice. Machinery Industry Press (2017) 2. Guo, J., Xie, M., Bai, J.: Exploration of Shendong Coal Group’s equipment management information improvement based on “big data”. Coal Mine Saf. 49(8), 269–272 (2018) 3. Cui, Y., Gao, L.: Management information system upgrade and transformation under big data environment. Planners 31(11), 100–103 (2015) 4. Bo, G.: Design and Implementation of Coal Equipment Management Information System Based on B/S Structure. University of Electronic Science and Technology of China, Chengdu (2015) 5. Liu, Y., Ni, W.: Twenty Years of China’s Internet Culture Development (1994–2014): Network Technology. Hunan University Press, p. 150 (2014) 6. Raheja, D., Llinas, J., Nagi, R., et al.: Data fusion/data mining-based architecture for conditionbased maintenance. Int. J. Prod. Res. 44(14), 2869–2887 (2006) 7. Zhang, Y., Geng, M.: Evaluation and prediction of equipment operating status based on health index. J. Hefei Univ. Technol. (Natural Science Edition) 38(10), 1318–1323 (2015) 8. Wei, J., Wang, J.: Web data mining application based on python. J. Zhejiang Inst. Water Resour. Hydropower 31(4), 79–82 (2019) 9. (United States) Megan Squire: Clean Data: Introduction and Practice of Data Cleaning. People’s Posts and Telecommunications Press (2016) 10. Zhang, T., Xiao, W., Du, M.: Research and design of equipment management information system for coal mine enterprises. China Coal 44(7), 85–87 (2018) 11. Meng, P., Yue, J.: Several key issues in the construction of group enterprise equipment management information system. China Equipment Eng. (5), 28–30 (2015) 12. Industrial Internet Industry Alliance Industrial Big Data Ad Hoc Group: Industrial Big Data Technology and Application Practice. Electronic Industry Press, Beijing (2017) 13. Wang, J.: Overview of industrial big data technology. Big Data 3(6), 3–14 (2017) 14. Industrial Internet Industry Alliance: China Industrial Big Data Technology and Application White Paper. Beijing (2017) 15. Ding, X., Wang, H., Yu, S.: Industrial time series big data quality management. Big Data (6), 19–29 (2019)

Power Marketing Inspection and Anti-stealing Power Based on the Clustering and Correlation Analysis Weimin He

Abstract Electricity marketing audits can maintain the order of electricity prices and regulate users’ electricity consumption behavior. With the use of intelligent collection terminals and management systems, clustering and correlation analysis methods can be used to monitor users’ electricity consumption behavior, and users can instantly discover electricity theft and illegal usage. Electricity behavior, using the K-means algorithm for quantitative data such as electricity bills and load to analyze whether there are abnormalities in the user’s electricity consumption, focusing on analyzing the active power, accumulated electricity, electricity bills, etc., and using the FP-Growth algorithm and Apriori algorithm for data extraction Analyze the user’s maintenance records and user types, analyze the user status, obtain the characteristics of the stealing users, make a form for correlation analysis, and form the typical characteristic fields of stealing, which can achieve good economic benefits. Keywords Clustering · Correlation · Electricity marketing audit · Anti-stealing

1 Introduction Focusing on the new features of power consumption data for industrial and commercial users during the epidemic prevention and control and resumption of work and production, some companies have resumed power use after the epidemic, and the fluctuation of the distribution line loss is closely related to the time-sharing resumption of work by users [1], based on marketing business applications, Power consumption information collection, PMS, GIS and other systems, linking the current, voltage, power, medium and high voltage line loss rate and other line operating status data of the line gateway to the customer file, power consumption, current, voltage, power and other customer use Electricity data [2], innovatively build a power marketing audit and anti-electricity theft analysis model based on clustering and correlation analysis, monitor abnormal fluctuations of branch line loss, match and analyze the W. He (B) State Grid Jiangsu Marketing Service Center (Metrology Center), Nanjing, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_27

225

226

W. He

correlation between user power consumption and line loss power and user power consumption Load characteristics, accurate locking of customer adjustment ratios, bypassing metering devices and other types of electricity theft issues, effectively solving technical problems such as concealment of electricity theft and difficulty in matching customers [3].

2 Clustering and Correlation Analysis in Power Marketing Audit Filter and clean information such as user power consumption, and update data in the database. It is required that algorithms can be used in the management of electric power companies to fill in some incomplete data, as well as some ambiguous and erroneous data, summarize the information data in the data channel, and send the information to the data processing server to structure the data, And perform fuzzy matching processing on ambiguous and incorrect data, and process some incomplete data and fields in user power management through algorithms. As a result, multiple data tables are constructed for user information to cover user information [4]. The application of fuzzy matching algorithm can deal with some errors and ambiguous data, and obtain the ambiguous and wrong information data by scanning user data information, and classify them according to the reason, correct the error information, and use the algorithm to determine Data source, the algorithm can be used to correct some common problem data directionally, and improve the reliability of data operation [5].

3 Power Marketing Audit Method Based on Clustering and Correlation Analysis 3.1 Carry Out Data Source Model Design Combining the needs of different businesses, various data of power companies can be stored in the server, thus forming a data table structure. The use of big data algorithms can improve the efficiency of data processing. The current, voltage, reactive power and active power information during the user’s use are included in the real-time remote control data to provide data support for the abnormal analysis of the user’s electrical behavior. User data is shown in Table 1.

Power Marketing Inspection and Anti-stealing Power …

227

Table 1 Real-time data table Chinese names

Field name

Data type

Line name

Device filed name

varchar

End user code

Device filed name

int

Telemetry time

Device filed name

int

Load line number

Device filed name

int

Line header name

Device filed name

varchar

User address

Device filed name

varchar

Real-time current value

Device filed name

varchar

Real-time voltage value

Device filed name

int

Real-time active value

Device filed name

int

Real-time reactive power

Device filed name

int

Load side switch remote signal

Device filed name

int

Remote signal value of circuit breaker at the head end

Device filed name

int

3.2 Conduct Power Marketing Audit Analyze the main information in the power marketing service based on the content of the table, including user type, customer service content, user name, and electricity bill amount, etc., to construct a marketing data sheet for the power company, covering basic user information, electricity usage details, electricity usage date and account balance Wait. Construct user marketing data table [6], see Table 2. Carry out equipment maintenance on the user’s power consumption, focusing on analyzing the related content that may affect the user’s power consumption during the power grid maintenance, and constructing the maintenance list, covering the maintenance content, maintenance ID, maintenance result, and maintenance date, etc. Constructing relevant data tables for power audit, The requirements cover the relevant content of power audit, mainly including power audit content, audit time, audit ID and audit type [7]. The main manifestation of the abnormal electricity consumption behavior of marketing users is the abnormal sudden change of active and reactive power usage. In the audit, the active power threshold is set to 20 MW, and the reactive power threshold is set to 18 Mvar. If the user uses electricity within 24 h, if the value of active and reactive power changes exceeds The threshold range can be judged as abnormal electricity consumption [8]. The purpose of power marketing audits is to evaluate economic benefits. The audit requires cluster analysis of user electricity consumption and electricity costs. You can select user electricity costs and accumulated electricity to form ordinates and abscissas. Electricity is used as the abscissa. The electricity bill is used as the ordinate to perform K-means clustering on the data. K-means cluster analysis can effectively display suspected abnormal electricity users, and conduct correlation analysis on the electricity consumption of users. From this analysis, there are users with maintenance records, 95,598 complaints, important customers, and customers with high energy

228 Table 2 User marketing data table

W. He Chinese name:

Field name

Data type

User name

Device filed name

varchar

User ID

Device filed name

int

Registration date

Device filed name

datetime

Type of customer

Device filed name

int

Customer address

Device filed name

varchar

User account battery

Device filed name

int

Total user balance

Device filed name

int

First step power

Device filed name

int

First step electricity cost

Device filed name

int

Second step power

Device filed name

int

Second-tier electricity cost

Device filed name

int

Third step power

Device filed name

int

Third-tier electricity cost

Device filed name

int

Discounted price

Device filed name

int

fine

Device filed name

int

Total expenses

Device filed name

int

consumption. Through the application model, a total of 56 users of breach of contract and electricity theft have been verified, and economic losses of more than 40 million yuan have been recovered [9].

4 Research on the Anti-stealing Operation 4.1 Anti-theft Operation Method Establish the electricity theft detection process and technical route, use big data technology to analyze abnormal changes in electrical parameters, users and stations, analyze the user’s electricity consumption behavior, and have special auditors to verify the user’s abnormal electricity consumption on site to reduce the use of Onsite investigation of electrical abnormalities. Establish an information system for the user’s electricity consumption, use the K-means algorithm for quantitative data such as electricity bills and load to analyze whether there are abnormalities in the user’s electricity consumption, and focus on analyzing the relevant data of the user’s active power, cumulative electricity, electricity bill, etc., and use the algorithm Carrying out data screening and cleaning with big data, focusing on analyzing deviations from the normal range and missing data. Reduce unnecessary interference and impurities in cluster analysis. Use FP-Growth algorithm and Apriori algorithm for nonquantitative data such as electricity consumption status to analyze whether there is

Power Marketing Inspection and Anti-stealing Power …

229

any abnormality in users’ electricity consumption behavior. Find the suspected users of electricity theft, and use inspection tools for professional processing [10]. FP-Growth algorithm and Apriori algorithm use information technology to extract data, analyze the user’s maintenance records and user types, analyze the user status, and then filter and clean up the information, analyze the characteristics of the stealing user, and make a form Carry out correlation analysis to form a typical feature field of electricity theft, analyze whether there are users with similar characteristics, and focus on them once they are found, and deal with them effectively. The main power theft behaviors of users discovered so far include the use of high-frequency interference to reduce or omit to record metering devices, privately connect lines, use lead wires from distribution lines [11], and modify the secondary circuit of the device in a certain way, which affects the metering device normal operation. Change the low-voltage circuit so that the electricity usage bypasses the metering device. Electricity theft will cause the electric quantity of the metering device to remain unchanged for a long time, which affects the normal electric quantity statistics of marketing inspectors. Electricity theft is highly concealed and difficult to investigate. It is the main task of the electric power department’s marketing audit and has relatively high Wide scope of inspection work.

4.2 Countermeasures Against Electricity Theft Formulate technical preventive measures for users’ electricity theft, establish effective online monitoring methods, optimize internal management, avoid users from contacting the internal structure of electrical enterprises, and establish a closed electrical energy metering device to reduce the possibility of users contacting electrical energy metering devices Once the user visits, it can be discovered and managed through the sealed device. The establishment of cabled distribution lines can promote marketing inspections. Using a new generation of smart meters to standardize the wiring of electrical energy measurement devices, the current users’ main stealing behaviors include changing the secondary wiring or destroying the secondary wiring, and using different colors to mark the neutral and phase wires [12].

5 Conclusion The use of K-Means clustering algorithm and correlation analysis algorithm in the electricity consumption marketing audit can improve the efficiency of power maintenance, find abnormal data in time, and incorporate it into the scope of the marketing audit. It can be combined with big data to analyze users’ abnormal electricity consumption behaviors, quickly screen and predict a large amount of information, conduct anti-electricity theft research, find users’ electricity theft behaviors

230

W. He

in time, and deal with them in time, establish effective online monitoring methods, and optimize internal Management, establish cabled distribution lines, and optimize user management.

References 1. Hou, Q.: Problems and solutions in the management of electric power marketing auditing. Mingchenghui (010), 1 (2018) 2. Zhang, L.: Analysis of problems existing in electric power marketing audit work and research on solutions. Think Tank Times 184(16), 42–44 (2019) 3. Jia, M.: Analysis of the problems existing in the management of the electric power marketing audit and the treatment measures. Win Future (017), 564 (2018) 4. Cheng, Y.: Analysis of the existing problems and improvement methods in electric power marketing audit measurement. Encycl. Forum Electron. Mag. (023), 508 (2018) 5. Zhao, J.: Discussion on the existing problems and solutions in the management of electric power marketing inspection. Mod. State-owned Enterp. Res. (006), 141 (2018) 6. Zhang, L.: Analysis of problems existing in electric power marketing audit work and research on solutions. Intellectual Era 184(16), 42–44 (2019) 7. Zhang, L., Sun, D.: Analysis of existing problems and treatment measures in electric power marketing audit management. Architectural Eng. Technol. Des. (031), 2402 (2018) 8. Guo, M., Yu, W.: Analysis of problems existing in electric power marketing audit work and research on solutions. Electr. Power Syst. Equipment (17), 26–29 (2019) 9. Wu, J., Shi, L., Wu, X.: Discussion on the online information audit of power marketing based on business data analysis. Electron. World (024), 93–93 (2018) 10. Zhang, T.: Analysis of management problems and treatment measures in electric power marketing audit. Sci. Technol. Innovation Herald 016(030), 132–133 (2019) 11. Jiang, Q.: Analysis of the problems existing in the management of electric power marketing audit and treatment. Easy Learn. Comput. (003), 1 (2018) 12. Hong, Y.: Analysis of marketing audit problems and strengthening measures in electric power enterprise marketing management. Sci. Fortune (031), 46–47 (2018)

Testing Methods of Computer Software Qichao Shan

Abstract Software testing plays a very important role in the process of software development, which is the guarantee and premise of whether the software can be put into use normally. Besides, software testing can also help software designers and developers to find the defects in the software. As computer information technology is widely used in all walks of life, the testing of all kinds of software is very important. Based on this, this paper will be made with focus on the research of computer software testing methods. Keywords Computer software · Test method · Research Preface: The most important function of computer software is to conduct management by computers. This kind of management has replaced the management by manpower in the past, which was proved to be a great improvement in convenience, workload and accuracy. Therefore, it serves as a milestone in the history of human development. The characteristics of computer management are characterized with rigorousness and standardization that are closely related to the function of computer software, so the normal operation of computer software is the basis for these work. To ensure the normal operation of computer software, it is necessary to flexibly use various methods to test it and ensure that it can be put into use normally, so that it can serve different industries and even the whole society.

1 An Overview of Software Testing When computer software was initially developed, computer software was greatly influenced by demands of users and computer performance. While, software accounted for a relatively small proportion in the whole computer system. Therefore, Q. Shan (B) Northwest Minzu University, Lanzhou City 730000, Gansu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_28

231

232

Q. Shan

the concept of software testing was not put forward and used in the application of computer software. However, the emergence of computer software and related technology means that software and the technology must be continuously developed to meet the requirement of society and development, with the ever increasing improvement of computer performance, the tasks to be finished by software are becoming more and more complex with increasing requirements on operation. The data volume for storage and calculation is becoming more and more considerable. As a result, people start to have higher requirements on the properties of computer, testing for computer software come into being accordingly [1]. At present, computer software testing technology and other application technologies have been developed to a relatively mature level, and software has also become the key part in computer application. Logging in to the Internet or other operations can be carried out based on software. However, since the software is designed by human beings, it is inevitable that there will be some errors or bugs (i.e., bugs) in the application process, which will not only affect people’s using experience, but also may lead to data damage or loss in serious cases, resulting in adverse social impact and economic loss. In order to avoid the occurrence of this phenomenon as far as possible, after the software writing and development is finished, corresponding tests are required to ensure that the software can run in a stable state and the use effect of the software can be guaranteed.

2 Testing Methods for Computer Software There are many testing methods for computer software. In general, in order to ensure that the application of software in different computer systems is stable enough, the testing of software needs to be carried out on different platforms and in different ways, so as to discover the loopholes existing in the operation process of software and to ensure that the loopholes can be solved to the greatest extent. Current computer software testing methods can be summarized as the following ways.

2.1 Program Misclassification One of the main purposes and contents of software testing is to classify program errors. From the perspective of software testing, the current program error classification is mainly presented in the form of functional error, processing error, code error, data error and system error [2]. There are many functional errors, including differences between software functions and requirements, errors caused by different test standards, errors caused by incomplete or contradictory requirements, and errors caused by insufficient understanding of the system by testers. Processing errors are mostly arithmetic errors, operation errors, initialization errors, static logic and control

Testing Methods of Computer Software

233

or sequence errors. Code errors are mostly errors caused by errors in grammar, statement or instruction understanding and printing errors. Data errors are all kinds of errors involving data. System error refers to errors caused by unreasonable hardware structure or unclear instructions, program connection errors, and software errors associated with hardware structure [3].

2.2 Classification for Error Level Generally, computer software errors represent the overall running state of the software system, which can also be used as a basis to evaluate the ability of developers, while the classification of error states and levels determines the order of adjustment and maintenance. General computer software errors are classified into four levels, which is denoted by Roman numerals, and the severity can be divided from the highest to the lowest level. Level-1 errors, the fatal errors, are mainly presented in the functions and systems of software, which should be timely corrected. The second-level error is classified as serious error, and the level of correction is second only to the firstlevel error in importance, which is mainly caused by software processing error and data error. Level 3 error is regarded as a general error, which is less serious than the former two and more related to the integrity and standardization of data. Level 4 errors should be a warning for testers with the lowest severity, which are mainly manifested in the form of interfacial prompt errors and errors caused by unperformed prompt message [4].

2.3 Tests for Black Box and White Box The internal logical structure and characteristics of the program are generally not integrated into testing for black box in software testing. However, the function of the program can be checked and work can be done to check whether the functions are consistent with the instructions. Therefore, to some extent, black box testing can also be understood as functional testing, whose main purpose is to ensure the consistency between program functions and design requirements [5]. In the design of test cases, black box testing is usually carried out only for software functions, without involving the internal details and structure of the software. The main purpose is to ensure that the test cases can meet the inspection of all functions of the software. Therefore, black-box testing is often used to test whether the software has functional omissions, as well as initialization or termination errors, performance errors, errors in data access and interface errors. Contrary to testing for black box testing, testing for white box, on the other hand, is mainly used to test software internal logical structure and other related information. All logical paths of software are regarded as the testing standards when test cases are to be designed, which is also known as structure testing, and the selected test cases

234

Q. Shan

are derived from the application logic, which are usually used to test the integrity of different modules in the different logical paths and to check the logical judgment on different situation. As a result, the effectiveness of loop variables in various values and internal data structure can be checked [6]. General speaking, white-box testing can be used to detect logic errors in the program, unexpected paths, and typographical errors that fail to be discovered in grammar checks.

3 Testing Procedures of Computer Software Generally speaking, the test of computer software should be carried out according to certain procedures, which is to ensure the standardization and reliability of the test. When testing computer software, the sequence of unit test, integration test, acceptance test and system test is usually followed.

3.1 Unit Testing Unit test is the most basic test in testing for computer software with the main purpose to test the performance of the smallest unit that can be tested in the software.The essence of unit testing is to ensure that the software is consistent with the original design in details, as well as to ensure the correctness of each unit of the program.The correctness of software module needs to be conducted based on the correctness of unit, so certain requirements on the performance and function of each unit are needed in unit test. In general, the programmer is responsible for the unit testing of software, and the testing is usually carried out after the code is written and confirmed without errors [7]. Unit tests need to be carried out in accordance with the detailed design specification and the source program listing, which is required to check the various paths in the program and the logic structure of module testing as well as the unit function. Therefore, the unit test can be finished by integrating black box testing and white box testing. In few cases, gray- box testing can be used to ensure that the system can respond in various content of input [8]. In terms of testing methods, interface testing, boundary testing and functional testing are commonly used in unit testing.

3.2 Integration Testing Integration test can only be done after unit tests have been completed, so the former can be seen as the basis for the latter. The integration test is mainly used to assemble the complex modules according to the corresponding requirements to constitute the

Testing Methods of Computer Software

235

software subsystem, and then the subsystem can be tested. In terms of purpose, the integration test is conducted to ensure the normal operation of different software function modules after processed, the contents include whether the integrated relationship between major functions and modules can be developed after integration i finished in order to confirm the correctness of the data on the whole and error severity [9]. The application of integration test to test method is mainly incremental assembly test, because this test method is performed with high feasibility, and two different test methods can be implemented after classification: top down or bottom up. Top-down testing means that the vertex module of the program is taken as the starting point and the module of the next step is gradually assembled for testing. At this time, the practice of building dummy module or pile module is usually needed. The master control module is taken as the starting point, and each unit module is assembled according to the control level and some preferred way. Its advantage is that it can verify the main control blank point and judgment point as soon as possible, and at the same time can be used to prove the correctness of the system for people. However, the problem is that pile module needs to be built, and the verification of the bottom module is not sufficient.

3.3 System Testing System testing shall be confirmed by software as one of the many elements of a computer system, and the software and the each operation component (including hardware, peripherals, support software, data, and the operator) are taken by as a complete system in system testing and main characteristic is that the system testing is conducted by stimulating actual operation environment so as to perform implementation of a series of integrated testing and running state of a computer system validation tests. The purpose of this test is to contrast the performance, function and system software requirements and compatibility, which is made to find the incompatibility between software and systems, so functional specifications of software are not taken int account, rather to take reference of requirements analysis specification that demonstrates the standards for testing in the actual operating conditions. In terms of content, system test includes hardware environment, software environment, system installation, configuration and operation, etc. [10]. As far as the test points are concerned, system test is the test designed to ensure the accuracy and integrity of the software in the system environment, which is of great significance for the successful application computer software. In terms of test methods, black box tests, in certain conditions, are also applied.

236

Q. Shan

3.4 Acceptance Testing Acceptance testing shall be carried out in accordance with the assignment book of the project or the documentation reached by two sides in advance, which is conducted mainly for testing the whole system of the software. In addition to the test, review is required and it plays a critical role in determining whether the software can be put into use. The testing and evaluation results can be used to determine whether the software can be received. As far as purpose is concerned, acceptance testing is mainly conducted to prove to Party A that whether the corresponding functional requirements have been satisfied, and whether the software can be put into practical use in a safe and normal manner so as to provide customers with required services. Therefore, the satisfaction of users in relative requirements is regarded as the focus of the test rather than the implementation of the functions. It can be seen that the threshold of acceptance test for testers is relatively low. Unlike other tests that require professional testers, acceptance test can be conducted by users or third parties. In form, it is similar to the open test and inner test of some games.

4 Conclusion From the above research on computer software testing methods, it can be seen that computer software testing is generated with the increasing refinement of software requirements and the gradual strengthening of functions, and testing for computer software plays a decisive role in ensuring the normal operation and application of software. At present, various software development companies will actively adopt various testing methods on different platforms to ensure that the software can be put into use normally, so that the development of the software can successfully meet the needs of users.

References 1. Wang, Y., Zhang, B.: Research on testing methods of computer software. Digitization User (45), 150 (2017) 2. Zhao, Q.: Research on testing methods of computer software. Digital Space (6), 27 (2018) 3. Fu, M.: Research on testing method of computer software based on multi-platform. Comput. Prod. Circ. (10), 23 (2019) 4. Lu, S.: Testing method of computer software and application practice. Digital Users (32), 139 (2018) 5. Wang, H., Tan, H.: Research on testing methods of computer software. New Bus. Wkly (18), 243 (2017) 6. Dan, W.: Research on testing methods of computer software. Heilongjiang Sci. Technol. Inf. 9, 167 (2016) 7. Lei, Z.: Research on testing methods of computer software. Constr. Eng. Technol. Des. 28, 3248 (2018)

Testing Methods of Computer Software

237

8. Qin, G.: Research on testing methods of computer software. Electron. Test (14), 123–124 (2018) 9. Wang, J.: Research on testing methods of computer software. Inf. Wkly. (29), 1 (2019) 10. Li, Q.: Research on computer software testing method based on multi-platform. Wirel. Internet Technol. (6), 67–68 (2019)

Application of Data Processing Analysis in Microbial Identification of Fermented Food Yan-chun Ruan and Ning-hai Liu

Abstract Food fermentation is one of the traditional food processing and preservation methods. With the biological function of beneficial microorganisms and their enzymes, the nutrients in food are decomposed and transformed into the unique flavor and nutrients that food raw materials are not endowed with before fermentation. If there is a lack of understanding of the structure and composition of its microorganisms, the problem of food safety will be occurred in fermented food. Based on this, the application of data processing analysis method in the identification of microorganisms in fermented food is further studied, which can provide theoretical support and method reference for the identification of microorganisms in fermented food. Keywords Data processing analysis · Fermented food · Identification of microorganisms · Application research

1 Introduction Fermented food is a kind of special food which is fermented by beneficial microorganisms. The products of microbial metabolism and the decomposed products of food raw materials in the fermentation process constitute the unique flavor and texture characteristics of fermented food, which are favored by people. The microbial flora of fermented food is complex and diverse, the mixing of infectious microbe will lead to problems in food quality and food safety, and the identification of microorganisms in fermented food is the key to solve the quality and safety problems of fermented food.

Y. Ruan (B) · N. Liu Jiangsu College of Tourism, Yangzhou 225100, Jiangsu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_29

239

240

Y. Ruan and N. Liu

2 Application of Data Processing Analysis Method in Identification of Microorganisms in Fermented Food In the fermentation process of food, a variety of microorganisms are involved. These microorganisms can decompose nutrients such as proteins into organic compounds such as amino acids, while fats are mainly decomposed into short-chain volatile fatty acids and esters [1]. Due to the involvement and decomposition of microorganisms, fermented food is characterized with unique flavor and taste, and it is more and more popular among people. However, the involvement of too many microorganisms in the process of food fermentation will accelerate the decomposition and deterioration of food, thus leading to food safety accidents and bringing serious harm to people’s health [2]. Therefore, it can be seen that the microbial identification of fermented food is of great significance. A lot of data and information can be generated in the specific identification work, which can provide data support for the identification of microorganisms. Therefore, the data processing analysis method is adopted to facilitate the smooth development of microbial identification of fermented food and the scientific validity of the identification results.

2.1 The Overall Design of Identification Methods for Microorganisms in Fermented Food with Data Processing and Analysis The overall design of data processing analysis and identification method is consisted of four parts, namely, identification of microbial diversity of fermented food, screening of microorganism in fermented food, identification of microorganism in fermented food, and analysis and processing of identification data [3]. Among which, the identification of microbial diversity of fermented food is adopted to detect the microbial species contained in fermented food in order to determine its species, which is the prerequisite for subsequent identification. The screening of microorganisms in fermented food is adopted to extract and screen a variety of microorganisms already detected to identify the bacteria, fungi and other colonies with the best conditions as identification samples. The identification of microorganisms in fermented food is conducted to directly identify sample food based on the diversity measurement and microorganism screening. The analysis and processing of the identification data is accomplished by using the data processing analysis method to process the data information obtained from the identification, and the scientific and accurate identification results are obtained.

Application of Data Processing Analysis in Microbial …

241

2.2 Measurement of Microbial Diversity in Fermented Foods In the identification of microorganisms in fermented food, the species of microorganisms in the food should be determined first, which is a prerequisite for the subsequent identification of microorganisms. Taking the two fermented foods, Tempeh and stinky tofu as the example, sampling was initially carried out. Tempeh samples were collected from flavoured food companies, while stinky tofu brine was provided by bean companies, and the fermentation time of the collected raw materials of brine lasted over 5 years [4]. The collected tempeh samples were stored in the cold room at −80 °C, and the stinky tofu brine solution was stored in the refrigerator at 4 °C, which was diluted, coated and cultured. Bacterial colonies with different shapes were selected for repeated streak culture [5], and genomic DNA of bacteria was extracted again for further analysis. In measurement of microbial diversity of fermented food, the method of data processing and analysis was used to create a information database for identification of microorganisms in fermented food to protect the original data and required data for subsequent identification, which can provides important support in data for microbial metabolism of fermented food, the interaction of microbial communities [6]. The data processing analysis method can be used to add data associated attributes according to the sorted data association relationship, so that microbial genome data, speciesrelated data, annotations and functional-related data were included in data [5]. The data processing method can also be used to calculate the microbial diversity index. The greater the number of species, the greater the diversity; By analogy, the increase of the uniformity of individual distribution among species will also improve the diversity. The calculation formula is as follows: H = −



Pi log2 Pi, (i = 1, 2, 3, . . . S)

Among which, H is used to represent the diversity index of the community, S is used to represent the number of species of microbes, and Pi is adopted to show the proportion of individuals belonging to the i sample. By using this formula, the data obtained in the identification of microorganisms in fermented food can be calculated, so as to obtain accurate microbial diversity data and identification results. Taking the fermented black bean as an example, the microbial diversity was measured and the obtained information was analyzed, calculated and processed. The detailed information of the microbial diversity index obtained was shown in Table 1.

2.3 Screening of Microorganism in Fermented Food After the measurement of microbial diversity of fermented food, the screening of microorganisms in fermented food will be made to lay a good foundation for the subsequent identification and the production of fermented food with good flavor. The

Bacteria

21,913

21,469

20,365

22,484

897.16

20,900

22,727

23,100

23,348

22,510

21,557.75

Bacteria

17,092

17,809

18,797

16,509

985.82

15,994

17,731

19,848

19,047

19,323

7551.75

77.25

137

150

118

128

141

30.86

121

66

49

73

The number of OTU

Fungus

The number of reads

24.75

22

23

17

15

15

15.26

44

13

12

30

Fungus

1.04

1.87

1.48

1.35

1.58

1.64

0.30

1.47

0.84

0.82

1.05

Bacteria

Shannon index

Table 1 Microbial diversity and sequence abundance information in the samples

0.83

1.04

1.05

1.02

0.56

0.7

0.22

0.57

0.75

0.92

1.08

Fungus

253.08

530.92

526.62

432.11

424.29

461.57

161.00

476.79

240.13

96

199.43

Bacteria

Chao1 index

52.71

32.5

30

20

15.6

16.5

46.09

86.8

14

12

98

Fungus

11,325

208

214

161

188

222

59.70

200

87

65

101

Bacteria

The number of species

24.75

22

23

17

15

15

15.26

44

13

12

30

Fungus

242 Y. Ruan and N. Liu

Application of Data Processing Analysis in Microbial …

243

fermented food of Tempeh were also taken as the example, and reagents, medium and instruments were required to divide the fermented soya beans into different groups. Quantitative tempeh were selected and stored in 10 ml of normal saline respectively for whirlpool oscillation for a certain time. The plate dilution method was adopted, and 200 µl of bacterial liquid was selected and spread on the screening medium. After culture on the medium at 36 °C for 48 h, the colonies that could produce transparent circles or transparent hydrolytic circles were selected. The colonies were repeatedly marked on the plate for more than three times until single colonies were obtained [7], and finally microbial screening was conducted. A lot of microbial transparent hydrosphere or transparent hydrolysis circle information can be obtained in preliminary screening and affination of microorganism in fermented food. The diameter information of bacterial colony that can generate hydrosphere or transparent hydrolysis can be analyzed and processed by adopting data processing and analyse method. The method of sequence similarity can be used to analyze the gene functions, variable genes and microbiological data to achieve effective analysis of the microbial metabolic pathway and data structure so as to finally to achieve visualization of diameter data of microbial transparent hydrosphere [8]. The integrated data are arranged in a reference group sequence, marked with associated information, and the comparative information of the diameter value of the colony that produces transparent hydrosphere was obtained. The calculation formulas of similar matching are as follows:   y = a × exp − exp(b − ct)

(1)

  μ e m y = ln(Nmax /N0 ) = A × exp − exp (λ − t) + 1 A

(2)

Among which, y in Formula (1) is the number of microbes at the moment t, and a b c are the constant values of different colonies, and t is used to represent the moment. Besides, y in Formula (2) refers to similarity matching value, and A = ln(Nmax /N0 ) denotes the maximum value of colony transparent hydrolysis circle, λ is growth retardation period of transparent circle of bacterial colony, N 0 means the initial amount of transparent circle of microbial colony. N max is the maximum number of transparent circle of microbial colony [9]. This equations can be used to calculate the specific value of diameters of transparent circle of bacterial colony in microorganisms. See Table 2 for specific results.

2.4 Identification of Microorganisms in Fermented Foods Denaturing gel gradient electrophoresis technology was used for the final identification of microorganisms in fermented foods. Experiments on salt resistance, the growth temperature and heat resistance, alcohol related fermentation, methyl red, starch hydrolysis, sugar fermentation, lipid hydrolysis, gelatin hydrolysis, enzyme

244

Y. Ruan and N. Liu

Table 2 Comparative information of the diameters of the colonies producing transparent circles Order of bacterial strain

Diameter value 1 (cm)

Diameter value 2 (cm)

Diameter value 3 (cm)

Diameter value 4 (cm)

Diameter ratio (cm)

1

2.00

1.60

0.50

0.40

4.00

2

1.85

1.83

0.40

0.42

4.63

3

0.00

0.00

0.40

0.80

0.00

4

0.80

2.60

0.30

0.70

3.19

5

1.60

1.90

0.30

0.40

5.04

6

1.70

1.65

0.30

0.20

6.96

7

2.40

2.10

1.00

0.60

2.95

8

2.15

2.05

0.50

0.45

4.43

9

3.00

2.75

1.10

0.80

3.08

10

2.15

2.20

0.60

0.55

3.79

11

1.70

1.90

0.30

0.35

5.55

12

2.20

2.18

060

0.61

3.67

13

1.60

1.90

0.25

0.40

5.58

14

1.25

1.95

0.20

0.30

6.38

15

2.20

2.10

0.60

0.60

3.58

16

2.64

1.20

1.22

0.60

2.08

17

2.10

2.05

0.45

0.37

5.10

18

2.10

2.10

0.65

0.75

3.02

19

3.30

3.60

1.70

2.10

1.83

20

3.03

3.20

1.60

1.72

1.88

21

2.50

2.30

0.85

0.80

2.91

22

2.90

2.90

1.30

1.45

2.12

23

1.24

1.22

0.30

0.45

3.42

24

1.10

1.25

0.40

0.45

2.76

test were conducted to ultimately finish the identification of microorganisms in fermented food [10]. The data processing analysis method was used to conduct statistics, analysis and processing of the microbial information obtained from the identification, and the detailed study and generalization were conducted. Finally, the microbial identification results of the stinky tofu brine were taken as an example, and the specific information was referred to in Table 3.

+

+

+







+

+

+



+

+

1

2

3

4

5

6

+





+

+

+

Glucogenic acid

Note “+” denotes positive, “−” stands for negative

Spore coloration

Gram stain

Bacteria grouping

+





+

+

+

Glucose gas

Table 3 Results of physiological and biochemical identification of bacteria







+

+

+

Lactose acid







+

+

+

Lactose gas







+

+

+

Hydrolysis of starch

+



+

+





hydrolysis of lipid

+





+

+

+

Enzyme

Application of Data Processing Analysis in Microbial … 245

246

Y. Ruan and N. Liu

2.5 Analysis and Processing of Identification Results Data processing analysis method refers to a method that uses appropriate statistical analysis and processing methods to analyze and process a large number of collected data and extract effective information to reach a conclusion. Data processing analysis method includes data analysis and data processing [11]. As the food matrix of fermented food is complex, the identification of its microorganisms involves the analysis and processing of massive information. The application of data processing analysis method was expounded in the measurement, screening and identification of microorganisms. The application is developed to sort, transmit, transform, browse and query data for the manufacturing requirement of fermented food industry. The data processing analysis method can be used to plan the shortest path of data transmission to realize the timely transmission of microbial data and information, as a result, microbial identification of fermented food can be smoothly conducted [12]. In addition, the data structure and data conversion can be realized by using data processing analysis method. Data structure is the associated information after other data were added in processing microbial data.

3 Conclusion Through the in-depth study and analysis of the identification of fermented food hygiene and data processing analysis method in identification, it can be found that the identification of microorganisms in fermented food is a very complex work, in which the information is huge and complex. The application of data processing analysis method makes the processing and analysis of microbial data more scientific and effective, and provides effective data support for the development of fermented food industry. Fund Project The project was initiated by Sichuan Cuisine Development Research Center, Key Research Base of Humanities and Social Sciences of Sichuan Education Department in 2020 (No.: CC20Z16).

References 1. Yang, W., Wang, Y., Sun, C.: Application of data processing and analysis method in identification of microorganisms by MALDI-TOF MS. Chin. J. Microecol. (3) (2018) 2. Jin, J., Xie, S., Ji, H., et al.: Progress in the analysis and application of microbial volatile organic compounds in agricultural products. Food Sci. 39(574)(09), 333–339 (2018) 3. Shi, X., Chen, J., Ling, K., et al.: Screening and identification of GABA lactic acid bacteria in Kazakh traditional fermented food. Food Sci. Technol. (11), 2–7 (2017)

Application of Data Processing Analysis in Microbial …

247

4. Du, M., Zhao, R., Li, J.: Application of matrix assisted laser desorption ionization time-of-flight mass spectrometry in microbial detection and identification. Food Saf. Qual. Detect. Technol. 8(2), 457–461 (2017) 5. Zhao, J., Zou, Q., Zhang, Y., et al.: Teaching reform of microbiology test technology of food. Sichuan Food Ferment. 54(3), 90–93 (2018) 6. He, G., Liu, T., Sadiq, F.A.: Application of high-throughput sequencing in exploring the diversity and dynamic changes of traditional fermented food flora in China. J. Zhejiang Univ. Sci. B (Biomed. Biotechnol.) 18(4), 289–302 (2017) 7. Lei, Z., Chen, C., Chen, G.: Progress in the study of microorganisms in fermented food based on metagenome and macrotranscriptome. Food Sci. 39(3), 330–337 (2018) 8. Ge, Y., Zhang, Q., Feng, H., et al.: Study on target bacteria in heat-resistant coliform group test method in technical specification for cosmetic safety (2015 edition). Deterg. Cosmet. 40(4), 1–6 (2017) 9. Li, C., Hu, Y., Wu, D., et al.: Application of simulation technology in the course of technology in fermenting food. Agric. Prod. Process. (21), 82 (2017) 10. Dou, X., Han, P., Liu, L., et al.: Isolation and identification of cultured bacteria in fermented grains during luzhou-type wine brewing and study on the rule of population succession. Sci. Technol. Food Ind. 38(1), 169–174 (2017) 11. Li, S., Zhang, X., Wang, Y., et al.: Selection of edible fungi and analysis of saponins biotransformation products in fermentable Chinese medicinal materials such as Panax notoginseng. Food Ferment. Ind. 43(12) (2017) 12. Ling, K., Zhai, L., Yao, S., et al.: Isolation and identification of lactic acid bacteria of traditional fermented food in Xinjiang and their growth and metabolism characteristics. Food Ferment. Ind. 43(03), 127–133 (2017)

Data Architecture of Monitoring Platform for Marketing Operation Under Smart Grid Lei Zhao, Junhua Deng, Hai Zhu, and Yan Zhu

Abstract In the context of modern big data, power grid information technology is a particularly important work for power grid staff. In the process of the in-depth construction of smart power grid, the demand for the integration of monitoring data of marketing operation is also increasing, and the data exchange is developing towards the direction of complexity, which requires the continuous improvement of the realtime performance of data and the risks in performance, security and management risks generated by data integration should be reduced. It is particularly important to create a unified management tool for data interaction. Through the professional R&D team in big data technology, the marketing operation monitoring data sharing can be highlighted, to create an integrated marketing data center. At present, the construction of marketing operation monitoring information is the focus of the work, which can effectively promote the development of big data. Therefore, this paper analyzes the data architecture of the marketing operation monitoring platform under the smart grid for the reference of relevant research. Keywords Smart grid · Marketing operation · Operation and monitoring Through the baptism of multiple information revolutions, the Internet of Things plays an important role in people’s life and production, making the equipment ushering into the latest stage of development. Based on the big data environment, the main data source for every object in the society is provided [1]. Taking the types of big data into account, there are problems in the way of integration, and new patterns and technologies are gradually gaining momentum in actual use. Through the analysis of the data obtained by people, data is characterized with explosive growth in people’s lives [2]. After entering the era of big data, data is becoming more and more complex. Under the background of big data in the information age, power grid enterprises should establish marketing operation platform to promote their own development.

L. Zhao (B) · J. Deng · H. Zhu · Y. Zhu Marketing Service Center of State Grid, Jiangsu Electric Power Co., Ltd., Nanjing 210019, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_30

249

250

L. Zhao et al.

1 The Framework Design of Monitoring Platform The video surveillance system consists of master station system, intermediate network and front-end equipment [3]. Figure 1 shows the structure of the video surveillance system. The front segment system includes video coding equipment and camera with main functions of compression, collection, network transmission and storage of audio and video data. Transmission network includes optical transmission network, Ethernet, wireless network and other network transmission channels. The master station system can be used to manage the personnel, equipment and authority of the system uniformly, so as to realize remote video control and monitoring. Master station system takes advantage of the software development kit SDK of manufacturers as the foundation and front-end system network and decoding, audio, video, data collection and display, because different vendors are using SDK control protocol, private communication protocols. Consequently, each video monitoring system fails to be interconnected making it impossible to realize the resource sharing. Work area with substation fails to be connected with other provinces and power grid operation management department by video surveillance technology to improve the work efficiency, nor the function be displayed. At present, the system relies too much on equipment, and each equipment cannot be unified, resulting in information isolated islands [4, 5]. According to the actual business requirements and system architecture, the video monitoring master station system is constructed according to the technical architecture, data architecture, application architecture and business architecture. The components are designed with mutual coordination and cooperation to create the overall enterprise architecture of unified video monitoring platform for power grid. Figure 2 shows the overall structure of the system. The business functions of the platform are sorted out based on the business requirements of the video monitoring platform to form the business architecture and model of the platform. The application architecture and functions of the platform are designed based on the business functions, which mainly consist of service, management and interface [6].

Fig. 1 Structure of video surveillance system

Data Architecture of Monitoring Platform for Marketing …

251

Fig. 2 The overall structure of the system

2 Design of Monitoring System 2.1 Monitoring and Analysis Module This module can be used to comprehensively monitor the operation of the power grid, which provides the basis for the normal operation of other modules. The analysis function is used to improve the safety in power grid operation, realizing multidimensional monitoring of power grid operation, and three-dimensional dispatching of power grid can be made possible. In this way, the fault of the dispatching monitoring platform is comprehensively monitored and alarm signal can be sent. Finally, the power grid operation situation can be timely optimized, controlled and adjusted for reasonable allocation of resources. This module can be used to realize monitoring and alarm, auxiliary decision-making, network analysis and auxiliary monitoring [7]. Figure 3 shows the working structure of the network analysis system. Monitoring and alerting is the process of gathering information and then the information is classified and transmitted. Firstly, the system gets the grid model, measurement quality and telemetry through the dispatching and monitoring platform.

252

L. Zhao et al.

Fig. 3 Working structure of network analysis system

Then the dispatching monitoring platform is used to send information types to corresponding modules. For example, remote command is sent to the system terminal, and real-time steady-state measurement data is sent in the scheduling planning module. Network analysis can be adopted to collect the data of power grid operation and analyze the intelligent dispatching monitoring platform [8]. Through the setting function of bus model, real-time analysis of the operation of the power grid is carried out to study the next operation of the power grid, and the fault analysis of the system components is performed to predict the impact caused by the fault. Auxiliary monitoring can monitor the meteorological information needed by the power system, including solar energy information, lightning, water situation, etc. [9].

2.2 Scheduling and Plan Module This module can be used to uniformly utilize the grid system resources, integrate the reasonable allocation of resources, and improve the operation efficiency and benefits, mainly including the detection planning system and prediction system. The prediction system can quantitatively analyze the operating elements and information of the system, and provide the change trend according to the predicted objects [10]. Meteorological information and power network model are collected through dispatching management and basic information system. Monitoring and hydrological history information is obtained through Tonggu monitoring and alarm system. Short-term load prediction information is provided to the maintenance planning system through analysis and processing. Maintenance planning system can achieve the adjustment different from the maintenance plan through the power supply and grid safety balance by use of unified management maintenance plan [11]. Based on the monitoring and alarm system’s power flow information and topology information, the maintenance plan at each time period can be adjusted in real time to ensure the continuous update of status [12].

Data Architecture of Monitoring Platform for Marketing …

253

2.3 Data Collection Module Data collection realizes the data collection and communication of the operation and maintenance service support platform and other regional systems. Besides, load balancing and multi-stage redundancy technology is adopted to meet the requirements of high throughput and high reliability. The data collection function is characterized with unified data monitoring, operation, diagnosis and maintenance. The data collection subnet includes multiple subnets, requiring two subnets and the mobilization of the data network plane, and other subnets are connected with local interface devices for data collection. Operation and maintenance services support platform is used to collect the operation information of each scheduling system, including memory utilization, CPU utilization, node running status to realize the storage, alarm and display of collected information [13].

2.4 Fault Diagnosis Module To realize the fault diagnosis of each system, create the database for pr-arranging of problem, and organize solutions according to the description, type, problem. Then, the operation status of the system is collected, and representative and specific data are selected. Finally, the collected system anomalies should be combined with the preplan database to obtain the analysis results, and the solutions should be formulated according to the positioning and fuzzy matching of different abnormal situations [14].

3 System Verification At present, the smart grid marketing operation monitoring platform has been created for trial operation. The designed platform is used to establish contact with the regional smart power grid dispatch and control system, and the dispatching data network is used to realize real-time data communication, and the status information of the regional system is collected to browse the real-time images of the regional system remotely. As a result, the system operation can be monitored. Operators in operations center can monitor the operation conditions of the system of each region by operational service support platform in operation and maintenance hall system status monitoring. Besides, the regional system can be logged in on a regular basis to ensure safe regional operation and stable operation of the control system. Thus the operational level of the system can be improved, the operational work carries out by operations center is praised by the users. The operation monitoring center has a redundant and reliable communication environment, and at the same time, contact conditions with multiple dispatching centers

254

L. Zhao et al.

can be achieved. In order to ensure communication between the operation and maintenance center and provincial dispatching agencies, 20 telephones are configured in the monitoring room to ensure communication with the monitoring center. Periodic inspection of the system can be conducted according to the inspection process to achieve a comprehensive inspection of the smart grid dispatch and control system, so as to solve the hidden risks of operation and ensure the safety of the system in the process of operation. The main contents of the inspection include server CPU, hard disk, memory, application running state and database utilization. After each inspection, the inspection report should be submitted to the users, and suggestions and optimization measures should be put forward for the existing problems, so as to meet the requirements of the users. In addition, reliability operation monitoring should be achieved to monitor the operation state of the smart grid dispatching control system at all levels, and achieve feedback and processing according to the fault processing process of the corresponding dispatching mechanism, so as to guarantee the safe and stable operation of the system [15].

4 Conclusion The establishment of a large smart grid marketing monitoring platform is the main trend of national economic development, which guarantees China’s energy security. In the process of the development of modern society, it provides technical support for the establishment of intelligent power grid system. The dispatching monitoring platform can improve the power grid dispatching, optimize the resource allocation, and improve the interactive, informationized and automatic level of power grid dispatching. The government, scientific research institutions, enterprises and other units should increase funding to strengthen research and innovation, so as to improve its core competitiveness.

References 1. El-Hasnony, I.M., Barakat, S., Elhoseny, M., Mostafa, R.R.: Improved feature selection model for big data analytics. IEEE Access 8(1), 66989–67004 (2020) 2. Xiong, M., Yang, L.: Construction of power marketing support system in smart grid environment. China South. Agric. Mach. 050(011), 252–253 (2019) 3. Elhoseny, M.: Multi-object detection and tracking (MODT) machine learning model for realtime video surveillance systems. Circuits Syst. Signal Process. 20(39), 611–630 (2019) 4. Wang, J., Niu, R.: Design and implementation of smart grid visualization platform based on big data architecture. Appl. Integr. Circ. 36(04), 115–116 (2019) 5. Tharwat, A., Mahdi, H., Elhoseny, M., Hassanien, A.E.: Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm. Expert Syst. Appl. 107, 32–44 (2018) 6. Cui, J., Wang, S., Xin, Y.: Research on smart grid data management technology framework from the perspective of block alliance chain. Proc. CSEE 40(3) (2020)

Data Architecture of Monitoring Platform for Marketing …

255

7. Cheng, S.: Research on power marketing service system under the framework of smart grid. Decoration Refurbishment Centre (004), 375 (2020) 8. Hosseinabadi, A.A.R., Vahidi, J., Saemi, B., Sangaiah, A.K., Elhoseny, M.: Extended genetic algorithm for solving open-shop scheduling problem. Soft Comput. 23(13), 5099–5116 9. Leng, X., Chen, G., Bai, J., et al.: Overall design of big data analysis system for smart grid monitoring and operation. Autom. Power Syst. 042(012), 160–166 (2018) 10. Wang, X.: Power marketing information management platform in smart grid environment. Electron. Technol. Softw. Eng. (006), 171 (2018) 11. Puri, V., Jha, S., Kumar, R., Priyadarshini, I., Son, L.H., Abdel-Basset, M., Elhoseny, M., Long, H.V.: A hybrid artificial intelligence and internet of things model for generation of renewable resource of energy. IEEE Access 7(1) 12. Xu, L.: Data architecture development of power grid marketing and operation monitoring platform. Encycl. Forum (13) (2018) 13. Wang, W., Li, D., Pang, Q., et al.: Research and application of online monitoring and evaluation of smart grid dispatch and control system. Northeast Electr. Power Technol. 39(2), 20–24 (2018) 14. Xu, L., Wang, T.: Application of smart home APP in smart grid visualization platform based on big data architecture. China New Commun. 020(017), 97 (2018) 15. Liu, Y., Zhang, W., Shi, S., et al.: Application and analysis of online monitoring scenarios of smart distribution network business based on external data. In: 2018 Seminar on Smart Grid Informatization Construction

Volatility Modeling of S&P500 Returns: A Comparative Study of GARCH Family Models and VIX Xinran Liu

Abstract Modeling, analyzing and predicting volatility has been an important research subject amongst practitioners and academics for a long period of time. However, volatility is a time-varying measure and is hard to calculate, so many studies have been devoted to develop different methods of calculating and analyzing this significant term. In this study we chose S&P 500 as the source data, and VIX as the implied volatility. We would first fit data to the GARCH family models and evaluate the effectiveness of the models. Then we would choose the better performed ones to compare the predictability with VIX. Keywords Volatility · GARCH models · VIX · Comparative

1 Introduction Among different types of models, Generalized Autoregressive Conditional Heteroskedasticity (GARCH) model [1] is one of the most popular approaches. Such model uses historical data to forecast volatility, and because of the way it being constructed, there are many variations of the original model. Our motivation of doing this project is to have a closer look at the different volatility modeling of the GARCH family, and how different assumptions may affect the models. However, it is useless to only compare within statistical models as there is no reference from the real application. So, we introduced implied volatility as a reference and also to compare the effectiveness of statistical models and implied volatility [2].

X. Liu (B) Columbia University, New York 10025, USA e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_31

257

258

X. Liu

2 Research Method 2.1 Models GARCH model is a statistical model for time series data that describes the variance of the current error term or innovation as a function of the actual sizes of the previous time periods’ error terms. While EGARCH, the Exponential GARCH is similar to GARCH, except that no nonnegative constraints are put on the parameters compared to GARCH. We also used GJR-GARCH. It is built with the assumption that unexpected changes in the market returns have different effects on the conditional variance of returns.

2.2 Order Determination We selected the orders of the ARMA, ARCH and GARCH models [3], and other model parameters, such as the degrees of freedom of the residual’s t-distribution, by maximizing likelihood function. In terms of order determination, we used information criteria such as AICC to determine the ARMA order. But for GARCH order we just used conventions.

2.3 Testing We fitted our model to historical data and performed Jarque–Bera test on the standardized residuals to examine normality; we also used Box-Ljung test to determine whether there is remaining ARCH effect on the standardized residuals. We further used graphical diagnosis to testify our conclusion. For the predictability of models, we analyzed the out-of-sample forecast performance, and compared the results of error evaluating terms: mean error (ME), root mean squared error (RMSE), mean absolute error (MAE), mean percentage error (MPE), mean absolute percentage error (MAPE), mean absolute scaled error (MASE).

2.4 Data The empirical data we used is the daily returns for the S&P 500 index over a 20-year period, with the in-sample period containing 5038 daily observations ranging from 1999 to 2018, and the out of sample period containing 200 daily observations from

Volatility Modeling of S&P500 Returns: A Comparative …

259

Fig. 1 VIX performs in capturing the volatility of S&P500 in capturing the volatility of S&P500

2019. We also collected corresponding VIX over the same period. VIX is calculated as the following: σ2 =

 2 2  K i RT 1 F e Q(K − 1 − ) i T i K i2 T K0

3 Results 3.1 S&P500 and VIX We first examine the relationship between S&P500 daily returns [4] and VIX. The first figure demonstrates the graph of daily returns and VIX, which shows the negative and asymmetric relationship between the two series. The second figure exhibits the close relationship between the absolute daily return and VIX as the two series generally move in unison in the sample period. Therefore, it is reasonable to say that VIX performs well in capturing the volatility of S&P500 (Fig. 1).

3.2 Model Selection For the model fitting we first need to eliminate the ARMA effect. Hence we used AICC to determine the order of ARMA model. As we can see in the table, the smallest value of AICC gives the order (3, 4). So we first eliminate the ARMA effect of the log return before continuing to GARCH family models. For GARCH model order, it is possible to also use information criteria such as AIC and BIC to determine the best order, but in practice the mostly commonly used is just

260

X. Liu

Fig. 2 This project uses model

GARCH(1, 1) and not higher orders. Therefore, in this project we used GARCH(1, 1) with normal distribution, GARCH(1, 1) with student t distribution, EGARCH(1, 1) and GJR(1, 1) to compare the fitness and predictability among the models [5] (Fig. 2).

3.3 Numerical Accuracy To test the numerical accuracy of the selected models, we used the method introduced by Zivot [1] that to compare the estimated volatilities of GARCH models with the estimates using ARCH models. If the estimates present similar dynamic, then the coefficient estimates of the selected models are appropriate (Fig. 3). All of the models we selected present the similar dynamics according to the graphs above. In particular, all of the models exhibit significant fluctuation in the period of 2007–2009, which is expected. Moreover, the GARCH models are much smoother and display more persistent. Hence the models we selected are appropriate.

3.4 Diagnostic Testing We conducted a few numerical tests to determine whether our assumptions of the model are appropriate and whether the models lack fitness. Firstly we did Jarque Bera test for GARCH-normal model to see if the assumption of the white noise is normal is valid. The test result gives the p-value smaller than 2.2e−16, which is less than 0.05, so we should reject the null hypothesis that the white noise is normal. We also did the graphical diagnostic in the standardized residuals. As we can see from the graphs, the variation of the residuals of GARCH-normal model from the normal distribution is relatively significant, which again testifies that we should reject the assumption of normal distribution. On the other hand, the qqplots for student t distribution in three models do not seem to present such large variation, which could be the evidence that the models are appropriate assuming the white noise follows student t distribution (Fig. 4).

Volatility Modeling of S&P500 Returns: A Comparative …

261

Fig. 3 Compare the estimated volatilities of GARCH models with the estimates using ARCH models

Then we conducted Box-Ljung test to the square of the standardized residuals after all model fitting to examine whether there is still ARCH effect left. Results are as in the following Table 1. Testing results of Box-Ljung suggest that for GARCH-student t, EGARCH and GJR the squares of standardized residuals are not internally correlated, hence there are no further ARCH effect. But for GARCH-normal, there is still intercorrelation among the fitted results, which suggest some deficiency in GARCH-normal model.

3.5 Comparison Between GARCH and VIX Plotting the fitted volatility of GARCH family models and VIX [6] we are able to see that all of the models perform well in capturing the dynamics of the volatilities, and in general act in the same trend except for slight variations when performing on

262

X. Liu

Fig. 4 The graphical diagnostic in the standardized residuals

Table 1 Box-Ljung test results Q (df = 10 for t) p-value

GARCH-normal

GARCH-t

EGARCH

GJR

15.696*

14.984

14.83

12.253

7.437e−05

0.1326

0.1384

0.2685

extreme values. This suggests that GARCH family models have the capability to act similarly as the implied volatility. So it is reasonable to compare the predictability of the statistical models and VIX (Fig. 5). We used out of sample testing method to test the predictability of models. When choosing the candidates of the statistical models, since the GARCH model is not able to capture the asymmetricity of the data [4], we chose EGARCH and GJR models to do the out of sample testing with VIX. Based on the five error testing indicators, we have the VIX still perform best in predicting the future values, and when comparing within the GARCH family, we note that both models perform similarly, but GJR does slightly better (Table 2).

Volatility Modeling of S&P500 Returns: A Comparative …

263

Fig. 5 Comparison between GARCH and VIX

Table 2 Results of the predictability of models ME

RMSE

MAE

MPE

MAPE

VIX

2.228359

2.267703

2.228359

98.721

98.721

GJR

2.255968

2.294715

2.255968

100.0018

100.0018

EGARCH

2.256005

2.295297

2.256005

100.0057

100.0057

4 Conclusion and Limitations In this project we examined several models from the GARCH family that are commonly used in practice to estimate, and forecast volatility. It turns out that it is more suitable to assume student-t distribution rather than normal when doing GARCH model fitting. However, under the assumption of student-t distribution, the models seem to perform similarly. In terms of comparing predictability of models with VIX, it seems that implied volatility has more explanatory for future volatility compared with model-based forecasts. But within the GARCH family, GJR(1, 1) with t-distribution out-performs the other time series models considered in this study for modeling future volatility of S&P 500 index daily returns. But we still have some limitations for this case. First, when we compare the fitted results of GARCH models and VIX, we mainly used the graphical diagnosis. More numerical testing could be conducted to further study the differences between statistical models and VIX, and also subtle variations among different statistical models. Second, we only considered GARCH family models in this case, but research also shows there are some other models that could potentially perform as well. Third, since this project is only based on S&P 500 index, the conclusion we gained may be not suitable for other situations. Further research can be targeted on the comparison of implied volatility and model-based estimation in other stocks. Finally, we have

264

X. Liu

incorporated the ARMA effect in this study, but we don’t see many literature doing so in actual research, so the effect of ARMA model could be discussed in more details.

References 1. Zivot, E.: Practical issue in the analysis of univariate GARCH models. In Handbook of Financial Time Series (2008) 2. M. Hao, Du, Z.P.: Pricing SSE 50ETF option under GARCH model with generalized hyperbolic innovations. In: Mathematics in Practice & Theory (2017) 3. Kempthorne: Volatility Modeling: Case Study 4. MIT Open Courses (2013). Retrieved 11/15/2019. https://ocw.mit.edu/courses/mathematics/18-s096-topics-in-mathematics-with-app lications-in-finance-fall-2013/case-studies/MIT18_S096F13_CaseStudy4.pdf 4. Huang, K.: Modeling Volatility of S&P 500 Index Daily Returns: A Comparison Between Model Based Forecasts and Implied Volatility. Hanken School of Finance (2011). Retrieved 11/20/2019. https://pdfs.semanticscholar.org/1b6c/908d8d949468b88bc32940e785074430dc20.pdf 5. Heracleous, M.S.: Volatility Modeling Using the Student’s t Distribution. Virginia Polytechnic Institute and State University (2003). Retrieved 11/20/2019. https://pdfs.semanticscholar.org/ 9f46/47215e12290f1d68ce2f14b9d884212fd608.pdf 6. CBOE: VIX white paper. Retrieved 11/30/2019. https://www.cboe.com/micro/VIX/vixwhite. pdf

Review on the Lightweight Materials for Robots in Coal Mine Xiao Huang, Guanya Xie, Chunhao Li, and Guohua Li

Abstract The lightweight of robots used in coal mine can effectively reduce the energy consumption of the robot and improve the working efficiency of the robots. The research and development of lightweight materials of robots in the coal mine are one of the key basic researches to improve the efficiency and reliability of mechanized mining. Due to the complex underground working environment, the robot materials need to enjoy the characteristics of high strength, explosion-proof, corrosion resistance, wear-resistance, and so on. At present, the lightweight materials for robots in the coal mine are still in the development and testing stage. In this paper, the research status and development trend of lightweight materials for coal mine robots at home and abroad are summarized from the aspects of lightweight flameproof enclosure materials, lightweight metal structure materials, and lightweight transmission materials. Keywords Robotized coal mining · Lightweight materials · Polymer flameproof material · Light alloy structural parts · Carbon fiber based driving material

1 Introduction In recent years, the safe production of coal in China has been gradually improved, but the accident rate per unit coal production is still high, and robotized coal mining is urgently needed to effectively reduce casualties caused by mining accidents [1]. The substitution of manual labor by robots in the coal mine is bound to greatly reduce the accident rate and casualty rate on the basis of improving mining efficiency, which will fundamentally improve the status quo of coal mine production safety [2]. Miniaturized and lightweight robots can complete instructions flexibly and freely, with better sensitivity, flexibility, accuracy, and safety. At the same time, lightweight robots can reduce energy consumption, improve the range of endurance and work. At X. Huang · G. Xie · C. Li · G. Li (B) School of Mechanical, Electrical and Information Engineering, China University of Mining and Technology, Beijing 100083, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_32

265

266

X. Huang et al.

present, there are three main ways to realize robot lightweight: (1) optimization of the structure. (2) Optimization of manufacturing technology. (3) Material optimization. The robot will lose weight by using high strength steel, aluminum alloy, magnesium alloy, titanium alloy, composite material, polymer material instead of ordinary steel. The working environment of the coal mine robot is more complex, which needs to take into account the characteristics of explosion-proof, corrosion resistance, and wear resistance, etc. In this paper, the research status and existing problems of lightweight materials for coal mine robots are summarized attempting to provide a reference for the research direction of lightweight materials.

2 Lightweight Flameproof Shell Material for Coal Mine Robot When electrical equipment is used in mines, it is necessary to use a thick flameproof shell to ensure the explosion-proof performance of electrical equipment, which inevitably results in heavyweight of equipment. It severely reduces the operating radius and flexibility of the robot. Therefore, flameproof shell materials are required for lightweight design. The use of nonmetallic materials provides a broad development space for the lightening of explosion-proof shell materials. In the national standard, strict performance requirements are put forward for the non-metallic explosionproof shells, such as repeated ignition explosion test, thermal stability, insulation resistance, and so on. As shown in Fig. 1, polymer shells are used for the mining sub-station in Zhenjiang Zhongmei electron, which is one of the smallest and lightest small sub-stations in China. The glass fiber can reinforce plastic explosion-proof shell and it is used in the coal mine, which requires that the polymer flameproof shell has both flame retardant and mechanical properties. However, glass fibers have the defect of flammability in enforcing the strength of plastics and fire retardant is required. Traditional fore retardants are mainly made with halogen compounds that will release a large amount of highly toxic and corrosive smoke when heated, which will bring secondary safety

Fig. 1 Polymer shell for mining substation

Review on the Lightweight Materials for Robots in Coal Mine

267

hazards and environmental pollution in mines [3]. Instead, inorganic flame retardants can be used, but inorganic flame retardants are less effective than halogens, so they are added in higher quantities. The addition of a large number of inorganic flame retardants will change the interface bonding state between glass fiber and plastic, which will affect the strength and toughness of glass fiber to reinforce plastic composites [4]. In order to obtain a good flame retardant effect while maintaining the mechanical properties of fiber-reinforced plastics, the common optimization methods include adding synergistic components, nano flame retardant agents, and surface modification. The addition of synergistic components has been well studied and the nanosizing and surface modification of flame retardants have been given much attention in recent years. Ding [5] pointed out that the flame retardant property and mechanical property of plastic materials can be improved by adding nano-level flame retardants modified by surface lipophile. Secondly, a nonmetallic explosion-proof shell shall enjoy corrosion resistance. Although non-metal materials have better anti-corrosion performance than carbon steel materials, glass fiber reinforced composite materials are characterized by hygroscopic properties, and the corrosive medium will accelerate the destruction process of the material [6]. At present, there is a lack of systematic research on the service life of polymer materials in mines, and the related research on the corrosion mechanism and protection approach is rarely reported. The relevant work has a dual significance in basic theory and practical application for promoting the application of polymer composites in mine robots.

3 Lightweight Metal Structural Materials of Robots in the Coal Mine The robot’s structural and covering parts are usually made of steel, which can be greatly reduced in weight by replacing them with new metals of higher strength. How to solve the problems of technology, cost, and reliability in the application of new metals is the key factor to realize the lightweight of robot structure and covering parts. The specific research status is as follows 1.

High strength steel: High strength steel is much stronger than ordinary steel, and its density is similar to that of ordinary steel, so it has a higher specific strength to achieve weight reduction.

At present, the application of high strength steel in coal mine robot is not popularized. The important challenge of the application of high strength steel in the coal mine is the welding problem. High strength steel has thermal instability and is prone to crack and open welding in welding. At the same time, the air humidity in the mine can reach 80%, and at the same time, there is some etchant gas such as carbon monoxide, hydrogen sulfide, methane, etc., which dissolve in the humid air and underground. Later on, a corrosive electrolyte solution can be produced and attached to the surface of the robot. If the welding and corrosion problems mentioned above

268

X. Huang et al.

can be effectively solved, high-strength steel will become the preferred material for robot structure and covering parts in the coal mine. 2.

Light alloy, the density of steel materials is about 7.85 g/cm3 , and light alloy materials refer to the metals or alloy with a density less than 4.5 g/cm3 , and the most common are aluminum alloy, magnesium alloy. However, aluminum, magnesium, and other metal elements are more likely to produce heat with reflection with aluminum and magnesium, an instantaneous high temperature of 3000 °C is generated, so the use of the light-alloy in the coal mine is strictly limited. In order to improve the defect of light metal in friction ignition, Germany and other countries put forward the measures that nickel, copper, and other components can be added in light alloy to inhibit the ignition effect. In order to reduce the possibility of metal impingement friction ignition as much as possible, the common improvement methods for light metals can be divided into composition optimization and surface protection. The addition of frictionproof igniter elements in light alloys will result in the decrease of alloy strength and the contradiction between the reduction of igniter rate and the improvement of mechanical strength cannot be satisfied simultaneously [1]. The surface protection treatment technology does not change the original metal composition and performance and becomes the main development direction of light metal ignition prevention technology.

The risk of gas explosion caused by collision friction is extremely high, and it is the second ignition source after an electrical accident [7]. The light metal surface coating should be applied to reduce the flash temperature caused by friction or collision as much as possible. Meanwhile, it should cover the material surface completely and have high toughness, hardness, and interfacial adhesion. At present, the surface engineering techniques for the prevention of friction spark in light metals in mine mainly include electroplating, electroless plating, anodic oxidation, and so on. However, the preparation process of electroplating and electroless plating has the defect of high energy consumption and pollution, and surface galvanization may cause accelerated corrosion of aluminum and magnesium materials. In recent years, the anodic oxidation technology of aluminum alloy, titanium alloy, and magnesium alloy has developed rapidly [8], and the coating prepared by the anodic oxidation process is a porous metal oxide with good wear resistance [9]. However, the common disadvantage of anodic oxidation coating is poor toughness. If the anti-wear and impact resistance of anodic oxidation film can be further improved, this technology can provide a guarantee for the safety and long-term service of light alloy parts of robots in the environment of high corrosion and high gas. The hardness and wear resistance of polymer coating is less than that of metal or ceramic coating, but it has excellent toughness and insulation, so it has potential application value in light alloy surface of coal mine to prevent collision and friction ignition. Poly Ether Ether Ketone (PEEK), a new type of engineering plastic, combines high hardness and toughness with mechanical properties similar to those of alloy materials and is able to resist polymer creep caused by compressive stress [10]. PEEK also has a low friction coefficient, excellent wear resistance, corrosion

Review on the Lightweight Materials for Robots in Coal Mine

269

resistance, high-temperature resistance, and flame retardant performance [11]. The above characteristics enable PEEK to have important application value in the field of light alloy surface protection for coal mine robots.

4 Lightweight Transmission Materials of Robots in the Coal Mine The driving system of the robot includes the shaft, bearing, gear, and other parts. It is the development trend of the robot industry to replace steel-driving parts with lightweight materials. Carbon fiber has a very high specific strength, with a density of only 25% of steel, but 16 times the strength of common steel. The working load of the transmission shaft is mainly torque, so carbon fiber composite materials are required to have excellent torsional strength and torsional fatigue strength [12]. The arrangement and weaving of carbon fiber are the primary factors affecting the strength of carbon fiber composite. Another important factor affecting the performance of the transmission shaft of CFRP composites is the interfacial strength of CFRP and resin [13]. By adjusting the physical and chemical characteristics of the carbon fiber surface, the interface strength between fiber and resin can be effectively enhanced [14]. In the continuous development of lightweight materials, carbon fiber transmission materials are bound to replace steel and iron materials and play its huge performance advantage in coal mine robots. In addition to carbon fiber-based driving shaft, polymer-based composite gear is another common non-metallic driving material, which is characterized by corrosion resistance, lightweight, and good lubrication [15]. Compared with metal materials, polymer composites are characterized by viscoelastic and self-lubricating properties, and are not prone to fatigue, pitting corrosion, gluing, and other failure forms in service. However, tooth surface wear and tooth-root fracture are easily caused. How to improve the heat resistance and wear resistance of polymer gear material is one of the key technologies to improve the gear performance.

5 Conclusion In this paper, the development status, the insufficiency, and the potential research direction of lightweight materials for coal mine robots are reviewed. At present, the explosion-proof shell of the robots in the coal mine, metal structure, transmission mechanism, and so on can be made with lightweight materials. Besides, glass fiber, high strength steel, light alloy, carbon fiber composite materials, etc. serve as the substitution materials, but these materials have the disadvantages in strength, corrosion resistance, and abrasion resistance, explosion-proof performance and conductive

270

X. Huang et al.

performance, and so on. The lightweight materials for robots in coal mine can not only provide a strong guarantee for robotized coal mining but also can be widely used in other types of robots, automobiles, aerospace, and other fields, providing support for the upgrading of China’s manufacturing industry. Funds Project National Natural Science Foundation of China (51705533); Open Foundation Project of State Key Laboratory of Tribology, Tsinghua University (SKLTKF18B15).

References 1. Abdel-Basset, M., Mohamed, R., Elhoseny, M., Chang, V.: Evaluation framework for smart disaster response systems in uncertainty environment. Mech. Syst. Signal Process. 145 (2020) 2. Elhoseny, M., Shehab A., Yuan, X.: Optimizing robot path in dynamic environments using genetic algorithm and Bezier curve. J. Intell. Fuzzy Syst. 33(4), 2305–2316 (2017) 3. Zhao, Y., Gao, X., Wang, Z., et al.: Synergistic mechanism of flame retardants for coal mine conveyors. Coal Sci. Technol. 46(S2), 187–189 (2012) 4. Wu, Z.: Study on mechanical properties of aluminum hydroxide granule filled unsaturated polyester resin composites. J. Funct. Mater. 46(S2), 189–191 (2015) 5. Ding, S.: Study on the Preparation and Flame Retardant Application of Silicon Rubber/Montmorillonite Nanocomposite Powder, pp. 29–55. Beijing Institute of Technology, Beijing (2014) 6. Bian, J., Liu, J., Bao, Z.: Advances in research on hygroscopic properties of polymer-based composites. Mater. Rev. 30(S2), 340–344 (2016) 7. Qin, G., Lu, R., Wang, C., et al.: Research on gas mechanism of shear-slip instability and ignition in goaf of hard sandstone. Coal Sci. Technol. 046(007), 93–98, 114 (2016) 8. An, J., Fan, B., Song, D., et al.: Application of titanium and titanium alloy surface anodizing technology in medical device products. China Med. Dev. Inf. 23(07), 40–44 (2017) 9. Kong, D., Wang, J., Liu, H.: Friction and wear properties of 7475 aluminum alloy anodic oxidation film. Rare Metal Mater. Eng. 45(05), 1122–1127 (2016) 10. Liu, Y., Li, X., Sun, M., et al.: Progress in preparation and application of polyether-ether-ketone coatings. Mater. Prot. 049(010), 8–82 (2016) 11. Guo, Z., Li, S., He, K.: Study on friction and wear properties and differences of polytetrafluoroethylene, polyether ether ketone and thermosetting resin materials. Eng. J. Wuhan Univ. (Eng. Sci.) 52(06), 557–564 (2019) 12. Hong, J.: Research on the Design of Carbon Fiber Composite Based Transmission Shaft, pp. 24–38. Wuhan University of Technology, Wuhan (2012) 13. Peng, G., Yang, J., Cao, Z., et al.: Interfaces of carbon fiber reinforced resin matrix composites. Mater. Rev. 25(7), 1–4 (2011) 14. Gao, M., Huang, H., Huang, Y., et al.: Research on hydrophilic modification of carbon fiber surface by atmospheric argon plasma. Integr. Technol. 007(004), 16–23 (2016) 15. Xu, C., Cheng, Z., Lu, J.: Research on optimization design method of injection molding process parameters of Polyamide 66 gear. J. Mech. Transm. 42(01), 69–72 (2012)

Optimization of Management and Control Strategy of Security Vulnerabilities in Power Monitoring System Rui Bai, Hao Tian, and Qian Zhang

Abstract At present, there are security vulnerabilities in the power monitoring system, and it faces a severe network security situation. We should pay attention to these vulnerabilities, do a good job in optimizing management and control strategies of security vulnerabilities from multiple angles to eliminate security loopholes in the power monitoring system. In addition, we need to reduce the repair time of vulnerabilities, improve the repair rate of vulnerabilities, and reduce the risk of security vulnerabilities being invaded. This paper studies the optimization methods of management and control strategy of security loopholes in power monitoring system. Keywords Power monitoring system · Security vulnerabilities · Management and control strategies · Optimization methods · Application analysis The power monitoring system is of great significance to the continuous and stable operation of the power grid and the reliable supply of power. It can be said to be the nerve center of the power system. Today, as the construction of smart grids continues to deepen, a large number of computer and information technologies are used in the power monitoring system, and the degree of intelligence of the system is constantly improving [1]. However, the management and control of security vulnerabilities has gradually emerged. How to manage and control security vulnerabilities has become a key issue in the operation of power monitoring systems. In recent years, there have been frequent cyber attacks on the energy industry, and the power system has become an important target of cyber attacks. So it is particularly important for the safety management of the power system in such an environment, and it is imperative to build a management system for security vulnerability. In the early stage of the power monitoring system being put into use [2], there are often many security vulnerabilities because it is not reinforced in time. Generally, problems are found through scanning and the manufacturer is contacted to solve the vulnerabilities. After the vulnerabilities are solved, the effect of eliminating the defects must R. Bai (B) · H. Tian · Q. Zhang Kunming Power Supply Bureau of Yunnan Power Grid Co., Ltd., Kunming 650000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_33

271

272

R. Bai et al.

be confirmed. It is also a conventional control measure for security vulnerabilities in power system. The main problem is that it takes a long time to formulate countermeasures to eliminate security vulnerabilities. The timeliness and pertinence of handling security vulnerabilities is not strong, and new security vulnerabilities occur before the security vulnerabilities are eliminated which brings security loopholes to the normal operation of the power monitoring system [3, 4]. Therefore, it is necessary to optimize the management and control strategy of security vulnerability in the power monitoring system to improve the timeliness and pertinence of the processing of security vulnerability and ensure the effective operation of the power security system.

1 Power Monitoring System Power monitoring system can be divided into production control area and management information area. These two areas are directly related to the functions of power monitoring system. The production control area can be divided into controlled area (safety zone 1) and non-controlled zone (safety zone 2) [5]. The controlled area is mainly responsible for the real-time monitoring and control of the primary power system, which controls all kinds of problems in power system. And it is also an important part of security protection of power system. Higher-level power monitoring systems include real-time monitoring and early warning applications, dispatching planning applications, security verification applications and dispatching management applications. They jointly constitute the power monitoring system to ensure the stable and effective operation of the power system [6].

2 Management and Control Strategy of Security Vulnerability Management and control of security vulnerability in power monitoring system is an important content, and also an important basis for the effective operation of power monitoring system. Security vulnerability mainly refers to the various defects existing in the design and implementation of computer information system, which will appear in various levels and links of computer information system in different forms. If the security vulnerability is maliciously exploited by other subjects, the security of computer information system will be threatened, and it will directly lead to system paralysis in serious cases. Under normal circumstances, the management of security vulnerability in power monitoring system is carried out in a cyclical manner to discover, eliminate and confirm security vulnerabilities continuously, and to minimize the harm of security vulnerabilities to the power monitoring system [7].

Optimization of Management and Control Strategy of Security …

273

At present, the main steps of management and control of security vulnerability are vulnerability scanning, verification and confirmation, security rating, vulnerability elimination, defect elimination and retest, and registration and warehousing. These six links are carried out periodically to fully control security vulnerabilities in power monitoring system [8].

2.1 Vulnerability Scanning Vulnerability scanning is carried out periodically in the management and control of security vulnerability in power monitoring system to discover the undetected loopholes in the system. The detection of vulnerabilities through vulnerability scanning is also conducive to the timely elimination of security vulnerabilities and minimize the possible harm caused by security vulnerabilities [9, 10]. Vulnerability scanning can be determined according to the number of devices in the business system, the situation of potential vulnerabilities and the time when the business system equipment is put into use. In general, the interval time between two vulnerability scanning needs to be greater than the time to repair the vulnerability. When the conditions are met, it is necessary to choose to reduce the interval time between the two vulnerability scanning as far as possible [11, 12]. The time of vulnerability scanning is usually selected when the load of business system is small, so that the vulnerability scanning behavior will have a negative impact on the normal operation of power monitoring system. In addition, the power monitoring system often contains a large number of host devices. These host devices provide WEB application services to the outside world, which are an important source of security vulnerabilities. Therefore, it is necessary to conduct targeted vulnerability scanning to detect security vulnerabilities as soon as possible and take measures to eliminate the vulnerabilities [13].

2.2 Verification and Confirmation Verification and confirmation is a confirmation of the results of vulnerability scanning, which can avoid the influence of the false report of the vulnerability scanning tool on the entire management and control of security vulnerability. Verification and confirmation is generally carried out by system vendors and management experts in security vulnerabilities. The time for verification and confirmation is generally controlled within 5 days. After verification and confirmation, a vulnerability repair schedule is given based on the results, and the vulnerability is repaired according to the determined plan [14]. The verification method is generally to send a malicious data table to the target host. If the target host returns the expected value, it proves the existence of a security vulnerability.

274

R. Bai et al.

2.3 Security Rating Security rating is to evaluate the severity of security vulnerabilities after verification, and determine the hazard level of the vulnerabilities, and then give the priority processing order of security vulnerabilities [15]. Under normal circumstances, the security rating standard of security vulnerabilities consists of access path, utilization complexity and impact degree. Security vulnerabilities are also divided into highrisk vulnerabilities, medium-risk vulnerabilities, and low-risk vulnerabilities. When grading the security vulnerabilities in the power security system, the factor of the security zone where the security vulnerabilities are located should be considered, and the severity of the security vulnerabilities in the controlled area is higher than that in the non-controlled area. The security rating includes not only the assessment of the serious situation of the security vulnerabilities, but also the determination of the time to fix the security vulnerabilities. Serious security vulnerabilities must be corrected in a short period of time to minimize the harm they may cause. According to relevant regulations, when the security rating result is a high-risk vulnerability, the repair time needs to be controlled within 15 working days; when the security rating result is an intermediate vulnerability, the repair time needs to be controlled within 30 working days; when the security rating result is a low-risk vulnerability, the repair time needs to be controlled within 60 working days [16]. In addition to the above, security vulnerabilities of the same analogy should be repaired according to the security zone where they are located, and the repair time of security vulnerabilities in the controlled area should be less than that in the non-controlled area.

2.4 Vulnerability Elimination and Defect Elimination Retest In the process of conventional management and control of security loopholes, loopholes disappear for a long time, which directly leads to the emergence of new security loopholes before security loopholes have not been eliminated. The main reason for this kind of situation is that there are connection problems between vulnerability elimination and defect elimination retest. In conventional management and control of security vulnerability, the system manufacturer must eliminate the security vulnerabilities after completing the above-mentioned three links of vulnerability scanning, verification and confirmation, and security rating. However, the elimination of security vulnerabilities is a complicated process. After the measures are taken, we must do a re-test to eliminate the vulnerabilities and evaluate the effect of the vulnerabilities. If vulnerability elimination and defect elimination retest is connected well, it will directly lead to a long time for the elimination of security vulnerabilities, and new security vulnerabilities are discovered before the security vulnerabilities are eliminated.

Optimization of Management and Control Strategy of Security …

275

In the past, the vulnerability elimination was done by the manufacturer, and the elimination retest was performed by the staff for power monitoring system in accordance with their own standards. Their connection was the main reason for the long time for the elimination of vulnerabilities. The vulnerability elimination and defect elimination retest can be done by the same person to avoid the problem of insufficient communication effectively, greatly improve the convenience of eliminating gaps and retesting, and reduce the time for eliminating gaps.

2.5 Registration and Warehousing After the completion of all the above control links of security vulnerability in power monitoring system, the management and control information of security vulnerability should be sorted out in time, including the description of security vulnerability, defect elimination scheme, and precautions. All information should be collected to establish a repair knowledge base of security vulnerability, and the information in the knowledge base should be updated and accumulated to provide help for the subsequent elimination of security vulnerabilities. If similar problems of security vulnerability are found, the previous vulnerability elimination scheme of security can be directly called to reduce the elimination time of security vulnerability and improve the elimination efficiency of security vulnerability. Finally, the long-term evaluation system of repair measures of security vulnerability should be established, and the long-term verification and evaluation of these measures should be carried out, so as to update the repair measures with insufficient effectiveness and ensure the use value of repair knowledge base of security vulnerability.

3 Conclusion Today, with the rapid development of information technology, computer technology and information technology make the development of power monitoring system tend to be intelligent. However, there are more and more security vulnerabilities. If the security vulnerability is used by external host, it will directly lead to the loss of important information, paralysis of power monitoring system, and can not provide guarantee for the operation of power system. Thus it is particularly important for the management and control of security vulnerabilities. And we need to pay attention to periodic cycle, vulnerability scanning and security rating, and effectively handle the relationship between security vulnerability elimination and defect elimination retest to minimize the time of security vulnerability elimination and improve the efficiency of security vulnerability elimination comprehensively. In addition, it is necessary to establish the management system and evaluation mechanism of security vulnerability repair and fully play the value of the current repair measures of security vulnerability to lay the foundation for solving the subsequent security vulnerability problems.

276

R. Bai et al.

To sum up, it is particularly important for the management and control of security vulnerability in power monitoring system. To do a good job of optimization from all aspects can improve the control effect of security vulnerability and ensure the network security of power monitoring system.

References 1. Li, H., Li, W., Li, X., et al.: Optimization method for control strategy of security vulnerability in power monitoring system. Northeast Electr. Power Technol. (7), 22–24 (2019) 2. Yue, H.: Research on safety protection management and technology of power monitoring system. Sci. Technol. Innov. Appl. 3. Yang, Q.: Discussion on network security of power monitoring system. Encycl. Forum Electron. J. (007), 409–410 (2018) 4. Zhang, Z.: Network security technology and management based on power grid dispatching automation monitoring system. China Sci. Technol. Vertical Horizontal (008), 173–174 (2019) 5. Ding, W.: Prevention and control system of network security threat in power monitoring system in wind farm. In: Ecological Interconnected Digital Power—Proceedings of 2019 Annual Conference on Informatization of Power Industry (2019) 6. Yang, Z.: Research on secondary security protection strategy of power monitoring system. Electr. Technol. (013), 118–119 (2018) 7. Gao, F., Wang, Z., Jin, M.: Application of security online control of terminal behavior in power monitoring system. Comput. Technol. Autom. 8. Min, F.: Study on secondary security protection strategy of power system. City Wkly. (002), 59 (2019) 9. Song, Y., Liu, P.: Research on vulnerability detection technology based on machine learning optimization strategy. Inf. Technol. (002), 37–42 (2018) 10. Zhang, M., Liu, Y., Li, X.: Analysis of protection security management strategy in power automation relay. Power Syst. Equipment 11. Bai, R.: Exploring methods to improve the network information security management of power monitoring system. Digital Users 24(052), 150 (2018) 12. Rao, J.: Discussion on secondary security protection of power monitoring system. Commun. Power Technol. 036(006), 285–286 13. Qing, T.: Analysis of optimization strategy of quality and safety management process in substation. Guide Happy Life (016), 104 (2018) 14. Shen, W., Huang, H., Chen, Z.: Analysis of security vulnerability management of network information in electric power enterprises. Inf. Commun. 194(02), 187–188 (2019) 15. Wu, C.: Analysis of maintenance of computer information system and handling strategy of network security vulnerability. Netw. Secur. Technol. Appl. (9) (2019) 16. Tian, C., Zhang, L., Du, X.: Process of electric power material management and its optimization strategy selection. Win Future (011), 488 (2018)

Application of Operations Research Models and Algorithms in Intelligent Logistics System Parks Long Zhang and Jieshun Li

Abstract The intelligent logistics system park aims to improve the socialization, specialization, standardization, and intelligence of the urban commerce and logistics industry, and to promote the innovative development of modern logistics industry based on modern information technology. Operational research models and algorithms are the basis for the realization of intelligent logistics system parks. This paper conducts research on the practical applications of operational research models and algorithms in intelligent logistics system parks to provide references for relevant practitioners. Keywords Operational research model and algorithm · Intelligent logistics system park · Application analysis Guided by the spirit of the 19th National Congress of the Communist Party of China, the construction of intelligent logistics system park can realize the reallocation and integration of resources, and comprehensively promote the adjustment, transformation and upgrading of the industrial structure of commerce and trade logistics in the city. Operational research model simplifies complex things through numbers, symbols, graphics, etc., and can expose problems in management. When used in logistics management, it can effectively integrate and allocate resources, which is of great significance to the construction of intelligent logistics system parks.

L. Zhang (B) School of Traffic and Transportation, Kunming Vocational and Technical College of Industry, Kunming 650302, China J. Li School of Economics and Management, Kunming Vocational and Technical College of Industry, Kunming 650302, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_34

277

278

L. Zhang and J. Li

1 Intelligent Logistics System Park The term logistics comes from the abbreviation of “physical distribution” in English. In the earliest concept, logistics refers to the physical storage and transportation of goods, while in the modern concept, logistics refers to a series of information activities such as transportation, storage, packaging, loading and unloading, logistics processing, etc. [1]. Intelligent logistics system is a collection of big data, Internet of Things, cloud computing and other information technologies in the logistics industry. It collects logistics information throughout the entire process, comprehensively analyzes logistics information and makes decisions. And it is mainly used to solve common problems in logistics and improve the efficiency and quality of logistics to realize intelligent, networked, automated, and systematic logistics. The main features of intelligent logistics system park are the nodeization of platform structure, intelligent park management, full-process business services, and longterm industry benefits. Through various modern tools such as sensors and GPS monitoring, the control points in the park are linked to government departments and supply chain related enterprises (upstream and downstream enterprises, logistics enterprises, etc.) and exchange logistics information, so as to make a comprehensive evaluation of the logistics system. The collection of a large amount of logistics information can predict the future situation [2]. Through operational research model and algorithm, the reasonable optimization scheme of logistics is given, and the intelligent logistics is truly realized.

2 Relationship Between Logistics and Operations Research 2.1 Contents of Operations Research As a marginal discipline, operations research has a strong application. Because it mainly studies the problems existing in management, operations research also belongs to a part of management science. At present, operations research has formed a relatively perfect scientific management system with many branches and application fields, which has a far-reaching and extensive impact on the current social and economic development [3].

2.2 Characteristics of Operational Research The important application of operational research is to quantify the complex problems of the actual system to improve the scientificity and rationality of decision-making. In the process of development, operations research absorbs the achievements of many disciplines and internalizes them into its own unique content. It also forms

Application of Operations Research Models and Algorithms …

279

a perfect peripheral discipline system. While maintaining close relationship with other disciplines, it also accelerates the expansion of its own. In addition, operational research can promote the development of many disciplines and is conducive to the application of these disciplines in various fields of society.

2.3 Mathematical Model of Operations Research After abstracting and simplifying the content of the system, operations research selects the content with specific performance and shows it through the relationship among quantities. The main goal of operational research is to accurately reflect the various relationships between systems. At present, the more common mathematical models of operational research include linear programming model, stochastic programming model and network analysis model.

2.4 Procedures Operational Research The application of operational research model and algorithm is mainly to determine the long-term goal of the system, provide data reference for making important decisions of the system, and serve the management of all levels in the system. Operational research model and algorithm combine computer technology and related mathematical model to ensure the accuracy and reliability of data and promote the stability and sustainable development of the system. Decision making based on operational research model and algorithm is different from human decision-making. When facing problems, decision-makers often think of multiple decision-making schemes and collect information for comparison. However, human decision-making will be integrated into their own thoughts and become subjective and have certain tendency. However, the decision-making of operational research model and algorithm is more objective. The specific decision-making process is as follows [4, 5]: (1) To determine the target. When facing the problems to be solved, we should observe the reality objectively and distinguish the priorities. (2) To formulate feasible plans. We should determine relevant information after making the decision objectives, formulate feasible solutions, and consider the feasibility of the projects from the technical and economic perspectives. (3) To optimize the plan. The optimal scheme includes the sequence of feasibility and economy, and the optimal scheme is determined according to the decision-making principle. (4) To implement the plan. After a large amount of data accumulation, the final solution is determined and implemented. The specific method of decision making is shown in Fig. 1.

280

L. Zhang and J. Li

Goal determinaon

Improve original plan Supplement new plan

Plan revision

Goal revision

Data collecon

Plan formulat ion

Goal revision

Plan opmizaon

Deter minat ion

Improve original plan Supplement new plan

Fig. 1 Decision-making process

3 The Application of Operations Research Models and Algorithms in Intelligent Logistics System Parks For a system, the process of goal determination and goal realization is not the only one. How to choose the most suitable solution among the many solutions has always been a key issue for decision makers. With the continuous progress of system science, the research on the goal determination and goal realization has been continuously deepened, and the optimization technology has been comprehensively applied. Here are a few typical application examples in the intelligent logistics system park.

3.1 Vehicle Routing and Its Model In the process of vehicle route selection, it is necessary to consider the correlation between routes and the optimal route. It is the operation research model that the smart logistics park needs to use when dealing with vehicle routing problems. The relationship between subsystems and sub-systems can be shown quantitatively [6]. After completion, the contradiction between systems can be coordinated through scientific and reasonable calculation, and the most suitable vehicle route is given to the decision-making department for reference. The support of a large amount of data provides evidence for the decision-making.

3.2 Loading and Dynamic Planning The operation research model systematically analyzes the basic development of the domestic logistics industry, optimizes the choice of transportation tools, and improves

Application of Operations Research Models and Algorithms …

281

the distribution links and processes. For the logistics joints that use the same transportation tool, the application of the operation research model promotes vehicles scheduling, which is conducive to the rapid operation of the logistics industry and the rational transportation of goods to suitable locations. Different transportation vehicles have unique application advantages, such as large-capacity transportation vehicles with large loading and unloading capacity and few loading and unloading times. From the perspective of operational research models, there is a data relationship between loading and unloading capacity, loading and unloading times, and the capacity of transport vehicles. After the capacity of transportation vehicles is determined, there must be an optimal scheme between the handling capacity and the loading and unloading times [7, 8].

3.3 Work Sequencing Model of Circulation Processing Within a fixed period of time, each processing unit will be assigned a fixed production task. After assigning a production task, the processing unit will determine the appropriate start time and end time of the operation according to its own situation, and the operations within the task should also be arranged reasonably. This process is called work sequencing of circulation processing [9, 10]. If the same production task is sorted according to different production operations, there are obvious differences between the time spent in completing the task and the direct economic benefits. Therefore, the operation research model is used to analyze the relationship between various processing tasks and determine the best work sequence of circulation processing, which can achieve the shortest production cycle, the highest production efficiency and the highest direct economic benefits.

3.4 Inventory Optimization Model There are many methods to control inventory. In the field of operations research, there is still a large space for improvement in inventory control. The so-called inventory control refers to the effective storage management of all goods in stock under the condition of determining the quantity of goods in stock. Generally, inventory control is carried out from the perspectives of purchase quantity, purchase time and control management effect [11, 12]. However, in the actual process of carrying out inventory management, the supply situation, social demand and sales season of goods will all affect the inventory control. Operational research model is used to analyze the exclusive characteristics of goods and improve the effect of inventory control. It can provide services for production and sales, is also an important link in the construction of intelligent logistics system park.

282

L. Zhang and J. Li

4 Application Effect of Operational Research Model and Algorithm in Intelligent Logistics System Park The application of operational research model in the current logistics industry has become mature, which adapts to the current operation mode and management mode of logistics. This paper takes the logistics management of North Xinjiang Cement Co., Ltd. as an example. Its logistics mainly includes the incoming and outgoing stones and cement. Each time the factory enters or leaves the factory, it has to weigh on the weighbridge beside the gate. Based on current management resources, the weighing process of the weighing platform is optimized to achieve rapid weighing and reduce the waiting time of vehicles, and has a positive impact on the flow of other logistics businesses [13]. In the specific application process, it combines with the operation research model, redesigns the actual logistics information system in the North Xinjiang cement plant area, efficiently and reasonably matches the stone procurement, cement sales and cargo management process in the plant area, and the optimized process fully met the needs of enterprise operation and development. It can be seen that the operation research model and algorithm in the construction of intelligent logistics park can meet the needs of enterprise operation and development. And the application of operations research models and algorithms in the construction of smart logistics parks can establish a more systematic management plan, clarify the relationship between different systems and effectively combine them, so as to meet the needs of enterprise production growth and business growth, and improve economic benefits [14, 15]. Wal Mart supermarket chain also uses the operational research model to construct the chain industry chain information management system, which mainly determines the transportation, distribution and reservation of goods. The internal management system of the enterprise is also more detailed and standard. The application of operational research model has changed Wal Mart’s ultrasonic distribution measures, and the market has realized the transformation from the original single distribution to joint distribution and mixed distribution, so that the efficiency of distribution has been greatly improved and the distribution cost has been effectively reduced. And the distribution work has also achieved profitability, which confirms the positive impact of operational research model and algorithm on logistics management.

5 Conclusion Operations research is widely used in the logistics industry. Its main purpose is to solve problems in logistics management based on operations research models and algorithms, fully realize the intelligentization of logistics management, and promote the construction of smart logistics parks. From the perspective of the application of operations research models and algorithms, it has extremely important application value and is an important foundation for the construction of smart logistics park.

Application of Operations Research Models and Algorithms …

283

Therefore, relevant personnel need to pay attention to the study of quantitative models of operations research and their application methods, so as to apply the theory of operations research to solve actual problems in logistics management, build a solid foundation for building smart logistics parks that conform to the development trend of the times. Acknowledgements The work presented in this paper is supported by the Foundation Item: Scientific Research Foundation Project of Yunnan Education Department, project number: 2019J0300.

References 1. Zhang, L.: Application Research of Distribution Route Optimization Algorithm in Intelligent Upgrade of Logistics Park. China Logistics and Purchasing (2019) 2. Wang, D., Ni, D.: Research on the application of smart logistics technology in industrial parks. China Storage Transp. (008), 151–152 (2019) 3. Li, Z., Xiong, X.: Model and Application of Smart Logistics Park Based on Expressway Network (23). China Logistics and Purchasing (2019) 4. Zhang, L.: Research on the Application of Swarm Intelligence Algorithm in Modeling and Control of Pulverizing System (2019) 5. Wang, M.: Research and Application in the Growth Model of Life Cycle of Crop Based on Logistic and Gompertz Algorithm (2019) 6. Li, X., Jia, R.: Research and application of intelligent logistics path optimization algorithm based on digital supply chain. Inf. Syst. Eng. 303(03), 98 (2019) 7. Jiang, X.: Research on the application of intelligent logistics storage park. Encycl. Forum Electron. J. (008), 465 (2019) 8. Zhang, L.: Inventory control model in the official website of smart cloud logistics relying on multi-target recognition algorithm. Sci. Technol. Econ. Market (11), 24–27 (2018) 9. Tu, X.: The application research of ant colony algorithm in vehicle routing intelligent optimization. J. Daqing Normal Univ. 38(06), 78–81 (2018) 10. Zhou, Y.: Research and Application of Dynamic Logistics Backpack Based on Swarm Intelligence Algorithm (2019) 11. Ma, Y.: Urban Collaborative Delivery Model and Application Research Based on Electric Logistics Vehicles 12. Jiao, K., Yu, Z.: Research on distributed computing model and innovative service of smart logistics. Comput. Technol. Dev. 29(01), 212–216 (2019) 13. Zhang, L.: Application Research of Distribution Route Optimization Algorithm in Intelligent Upgrade of Logistics Park (9). China Logistics and Purchasing (2019) 14. Liu, S., Dong, L.: Research on the construction and application of the talent capacity model for smart logistics system development under the background of smart city construction. J. Nanchang Hangkong Univ. (Social Science Edition) (2) 15. Ye, M.: Application and research of swarm intelligence algorithm in network security. Mod. Sci. Instr. (6), 83–85 (2018)

Software Proof Security Mechanism Based on Internet of Things Network Security Jing Chen

Abstract At present, the Internet of Things (IoT) security problem is becoming more and more prominent, and gradually become the bottleneck of its development. Generally speaking, the security architecture of the Internet of Things is divided into three levels, namely the security of the perception layer, the security of the transport layer and the security of the application layer. Therefore, in the design of security mechanism, the consideration and pursuit is no longer a very high level of security, but how to provide appropriate security under resource-constrained conditions. In order to better study the software security mechanism, based on the lightweight block cipher, lightweight Hash function and the identity authentication of Internet security and software security mechanism study, designed a lightweight Hash function of CHF, and its light welter weight version U-CHF, when the design, iterative structure adopts Sponge structure, compression function using the improved algorithm CLEFIA-128. The efficiency test and analysis show that the detection efficiency of software security is increased by 12.6%, and the algorithm takes into account the efficiency of software and hardware implementation. Keywords IoT network security · Software proof · Security mechanism · Hash function

1 Introduction It can be seen from the security architecture of the IoT that the key difference from the traditional network security lies in the security of the terminal system [1]. As the forefront of data perception and processing in the whole IoT, its biggest characteristic is limited resources, such as limited energy supply, limited computing power and limited storage capacity, etc., which makes it difficult for traditional security technologies to be directly applied to it [2]. Therefore, to ensure the security of the IoT, J. Chen (B) School of Business and Information Technology, Yunnan Land and Resources Vocational College, Kunming 652501, Yunnan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_35

285

286

J. Chen

it is necessary to design a security mechanism that can adapt to the characteristics of the IoT software [3, 4]. The IoT (IoT) will give new capabilities to things connected to the Internet. In the survey, Shancang Li systematically reviewed the definition, architecture, underlying technologies and applications of the IoT. Firstly, various definitions of the IoT are introduced. Secondly, the emerging technologies of IoT are discussed. Thirdly, some problems in the application of IoT are discussed. Finally, the main challenges that need to be addressed [5]. M. Mazhar Rathore proposed a combination system of intelligent city development and urban planning based on massive data analysis [6]. Internet-based home health services are expected to address the challenges of an ageing population. But existing research is fragmented and lacks interoperability [7]. Based on the IoT network security, this paper studies the security mechanism of software proof. Firstly, design theory, iterative structure and evaluation method are studied, and the lightweight Hash function is mainly studied. Besides, Sponge structure is adopted [8, 9]. Taking cleFIa-128* algorithm as compression function, a lightweight Hash function CHF was designed and its efficiency analysis and test, dependency test and security analysis were performed [10].

2 Software Security Mechanisms in the IoT 2.1 IoT Network Security The main reasons are: the label computing ability is weak; the vulnerability of wireless networks exposes information to the public. The privacy security of business applications makes the security and privacy of transmitted information become an important factor restricting the further development of the IoT.

2.2 Security Mechanism Algorithm The SQUASH is a lightweight Hash function proposed by A. Hamir in FSE2008. It is designed for extremely resource-constrained environments such as RFID tags. Rabin structure is adopted for iteration structure and NFSR for compression function. This transformation is a compression mapping, that is, the space of the hash value is usually much smaller than the space of the input, different inputs may hash to the same output, H is some kind of hash algorithm, and target is a fixed number. In other words, the hash value of the whole block should be less than a given number, target, which is adjusted by the following formula: targetnew =

t2016 ∗ target 2weeks

(1)

Software Proof Security Mechanism Based on Internet of Things …

287

Where t represents the time taken to generate the first 2016 blocks. The shorter the time, the smaller the final target value. The difficulty value of the generated block can also be obtained by the following formula: di f f icult y =

target1 curr enttarget

(2)

3 Design of the Experiment 3.1 Experimental Background It is not enough for the privacy protection and security of the IoT to be limited only by laws and regulations and security in the traditional sense. It is urgent to study new security technologies for privacy protection to change the current research status. Besides the IoT involves sensor networks and RFID network, mobile network and Internet, etc., for the application of scene ramifications, traffic or the great amount of information transmission, and computing resources, storage capacity of the equipment can be and is quite limited, how to target architecture based on privacy protection research framework of the safety technology become the important content of this subject lies the goal. In view of the above, it is necessary to carry out a more comprehensive study on the proof security mechanism of IoT software based on security technology.

3.2 Experimental Design With the IoT data of an enterprise as the sample, 100,000 test samples were randomly taken to test the dependence of cleFIa-128 algorithm and CLEFIa-128* algorithm in 4, 5 and 6 rounds. The improved algorithm in this paper only USES a wheel function, and to realize a wheel function, it needs to store at least 4 8 × 8 S boxes and carry out 96 xor operations, a total of about 1056 GE. The improved algorithm increases 64 xor operations and requires 170.88 GE, but in general, the number of gate circuits implemented by the improved algorithm is at least 885.12 GE less than the original algorithm, so the hardware implementation is more efficient. The experimental results are shown in Table 1.

288 Table 1 Experimental results

J. Chen Algorithm

CLEFIA-128

CLEFIA-128*

Avalanche effect degree DC

1.000000

1.000000

Algorithm

CLEFIA-128

CLEFIA-128*

Strict avalanche effect degree Da

0.896243

0.922896

Complete degree dsa

0.878293

0.923116

Output change number

33–77

42–78

4 The IoT and Software Prove Security Mechanisms As shown in Fig. 1, it can be seen that cleFIa-128 algorithm basically realizes avalanche effect from the fifth round, and the sixth round completely realizes avalanche effect. The improved algorithm basically realizes avalanche effect from the fourth round, and completely realizes avalanche effect on the fifth round, one round ahead of the original algorithm. When designing the compression function of the iterative Hash function, a new compression function is redesigned instead of using the existing block cipher as the compression function. The designers of SHA-1 and SHACAL adopted this method, and with the popularity of these two algorithms, this method attracted much attention in academic circles. This method was also applied in the design of lightweight Hash function, such as SQUASH and GLUON. The

Fig. 1 Comparison of traditional and improved algorithms

Software Proof Security Mechanism Based on Internet of Things …

289

Fig. 2 Comparison of the defense capabilities of IoT data under different cryptographic systems

problem with this method is that it requires a lot of security analysis for the newly designed compression function, and the setting of each parameter at design time also needs analysis and demonstration. When designing the iterative Hash function, the compression function is not redesigned, but a classical block cipher is used as the compression function. Using existing block cipher as compression function to design Hash function can be traced back to DES. This method can make the best use of the research results of known block cipher, save cost in security analysis and parameter design, and provide higher security guarantee. As shown in Fig. 2, compared with other cryptosystem, elliptic curve cryptosystem has a shorter key, which greatly reduces the memory capacity requirements of this scheme. In the scheme, each node is randomly assigned a seed key, which is just a basic point on the elliptic curve. Before WSNs is deployed, a private key ring based on the seed key needs to be generated through the double point operation of the elliptic curve. After WSNs deployment, adjacent nodes can establish a secure connection if they share at least one private key. The traditional scheme and the proposed scheme are simulated for connectivity and defense. The Rabin structure is similar to the MD structure. In order to improve security, forward feedback is added into DM structure based on Rabin structure to resist mezzanine attack. The MMO structure is the same as the DM structure except that it USES grouping information as the key for the encryption system (compression function). The MP structure adds forward feedback to the MMO structure, and in each iteration, the plaintext, key, and ciphertext are xor together to create a new summary. The HAIFA structure is an iterative Hash function structure that adds salt

290

J. Chen

(SALT) and the number of bits compressed so far (#bits) to the compression function to make it resistant to long message attacks.

5 Conclusions Based on the IoT network security technology, this paper studies the security mechanism of software proof. Firstly, the design method and iteration structure of lightweight Hash function under the IoT are introduced. Besides, Sponge structure and CleFIa-128* algorithm are set as compression function to meet different application requirements. In order to meet the application requirements of RFID and other resource constrained environments, the CHF algorithm is improved. Finally, the efficiency test, dependency test and security analysis are carried out for the algorithms in this series, so as to provide technical Suggestions for IoT network security.

References 1. Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer 48(1), 28–35 (2015) 2. Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016) 3. Ehret, M.: The zero marginal cost society: the internet of things, the collaborative commons, and the eclipse of capitalism. J. Sustain. Mobility 2(2), 67–70 (2015) 4. Zhu, N., Diethe, T., Camplani, M., et al.: Bridging e-Health and the internet of things: the SPHERE project. IEEE Intell. Syst. 30(4), 39–46 (2015) 5. Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Frontiers 17(2), 243–259 (2015) 6. Rathore, M.M., Ahmad, A., Paul, A., et al.: Urban planning and building smart cities based on the internet of things using big data analytics. Comput. Netw. Int. J. Comput. Telecommun. Netw. 101(C), 63–80 (2016) 7. Pang, Z., Zheng, L., Tian, J., et al.: Design of a terminal solution for integration of in-home health care devices and services towards the internet-of-things. Enterp. Inf. Syst. 9(1–2), 86–116 (2015) 8. Laplante, P.A., Laplante, N.: The internet of things in healthcare: potential applications and challenges. It Professional 18(3), 2–4 (2016) 9. Manyika, J., Chui, M., Bisson, P.: Unlocking the potential of the Internet of Things. Mol. Cell. Biol. 110(5), 13–16 (2015) 10. Amadeo, M., Campolo, C., Quevedo, J., et al.: Information-centric networking for the internet of things: challenges and opportunities. IEEE Network 30(2), 92–100 (2016)

Research on the Competitiveness of Thailand Golf Tourism Industry Based on Big Data Ke Sun, Chih-cheng Fang, and Hui Du

Abstract With the development of the times and the progress of society, people’s life and entertainment are more diversified. Overseas tourism has become a popular entertainment project for Chinese people. Through the analysis of the development of golf tourism industry in Thailand in recent years, we can see that the development direction of Thailand golf tourism is more inclined to the management mechanism of tourism and the development of tourism environmental resources Compared with China’s golf tourism, Thailand’s golf tourism started earlier, and its development mode and skills are more perfect. Under the background of this era of big data, the rapid development of the times has brought great impact to all walks of life, and Thailand golf tourism is no exception. Therefore, in order to better develop Thailand’s tourism industry in the new era, this paper puts forward the research method of applying big data technology to the competitiveness analysis of Thailand’s golf tourism industry. Combined with the new requirements for the development of golf tourism in Thailand in the new era, a set of more suitable development methods of golf tourism in Thailand is formulated. Through long-term research and analysis, the method proposed in this paper successfully provides new ideas for the research and development of Thailand golf tourism competitiveness analysis based on big data. Keywords Life and entertainment · Travel abroad · Big data technology · Golf tourism in Thailand

K. Sun · C. Fang International College, National Institute of Development Administration, Bangkok 10240, Thailand H. Du (B) School of Physical Education, Yunnan Normal University, Kunming 650500, Yunnan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_36

291

292

K. Sun et al.

1 Introduction With the rapid development of big data technology [1–3], human beings have entered the era of big data. In order to better realize the positive value of big data technology, relying on big data for production and life, it is urgent to study how to realize positive value of big data technology in front of mankind. How to create the flower of data and the fruit of data is also the desire of exploration in everyone’s heart. This paper believes that the research on the positive value of big data technology should be comprehensively considered from the aspects of how to realize, improve, solve contradictions, and build principles, so as to achieve a comprehensive analysis of the realization of positive value of big data technology, which is conducive to highlighting the status of big data technology in China’s economy, politics, culture, society and ecology. Golf plays a great role in promoting Thailand’s tourism [4–6], and the government strongly supports the development of golf. Thailand launched a cross-border “tourism · Thailand Golf” activity. Thai Airways was the most active in the event. The sign of the event was painted on the aircraft hull. The branches of various countries in Thailand actively solicit people who come to Thailand. They can be seen in newspapers, magazines and television. Thailand’s tourism minister personally attended the event held in Bangkok. In addition, in addition to the convenience of Thai entry visa, the government also subsidizes airlines and hotels through tax-free subsidies, and attracts tourists to Thailand through preferential prices. Thailand’s golf has a high reputation, perfect tourism and vacation facilities, barrier free language environment, and so on, which has also attracted a large number of overseas tourists. Thailand’s tourism and holiday Golf [7, 8] status has been established, which has become a very important source of income. This paper studies the research method based on big data to analyze the competitiveness of Thailand’s golf tourism industry. With the rapid development of China’s economy, people’s life and entertainment [9, 10] are more diversified, and more and more people choose to travel abroad. However, the development of the times has brought great impact to all walks of life. In order to help Thailand golf tourism to cope with this impact, this paper puts forward the research method of applying big data technology to the competitiveness analysis of Thai golf tourism industry. Combined with the new requirements for the development of golf tourism in Thailand in the new era, a set of more suitable development methods of golf tourism in Thailand is formulated. Through long-term research and analysis, the method proposed in this paper successfully provides new ideas for the research and development of Thailand golf tourism competitiveness analysis based on big data [11].

Research on the Competitiveness of Thailand Golf Tourism …

293

2 Research Method of Thailand Golf Tourism Competitiveness Analysis Based on Big Data 2.1 Big Data Technology With the rapid development of computer information technology, after several decades of information explosion, every new technology cannot keep up with the speed of information gushing, which leads to the revolutionary subversion of technology. Big data technology is a new technology with rapid development in recent years. It makes up for the control of human data on information. Through the application of big data technology, people can find many potential laws through technology, including natural laws, social laws, economic laws and cultural laws. In the context of big data, people’s life experience is more harmonious. However, behind the harmonious life, it is surrounded by a variety of high-speed big data information. They always provide people with the real-time data they need. Technology itself also constitutes the basic content and form of the jump and realization activities.

2.2 Analysis on the Competitiveness of Golf Tourism in Thailand Golf consumers in different countries have different needs. Thailand has undoubtedly achieved great success in opening up the international market and attracting customers from Asian countries such as Europe, America and Australia. Through publicity, marketing and first-class service, golf enthusiasts from different countries are familiar with Thailand’s golf resorts. Thailand golf vacation tourism has good natural resources, hotels, service centers and other supporting service facilities, and is connected with the surrounding corresponding scenic spots and rich urban tourism projects, so as to realize the fixed-point multi-day tourism and form a good tourism composite effect. Thailand’s ability to expand international and cross regional publicity and services cannot be underestimated. Its good golf tourism marketing system has attracted tourists from all over the world, and has established the tourism image of Thailand’s golf country.

3 Experimental Correlation Analysis 3.1 Experimental Background As the core of Thailand golf tourism development model, golf course is one of the most important elements. Tourism development as a complementary industry,

294

K. Sun et al.

according to different market demand and product support point, combined with golf course, promote each other, benign interaction, and achieve “win-win”.

3.2 Experimental Design Golf tourism can be further subdivided into golf tourism and golf tourism. Among them, golf theme tourism refers to the golf course as the main body, providing a small number of necessary accommodation and other service facilities to attract golf destination tourists (including cross city or even cross country), most of which are designed by famous experts; while Golf complex tourism generally refers to the parallel development of golf course and tourism, and provides a large number of business holidays and conference facilities. There are different emphases in the form of golf theme tourism and golf compound tourism.

4 Discussion 4.1 Research Status of Thailand Golf Tourism Competitiveness Analysis Based on Big Data The history of Thailand’s tourism can be traced back to 1924. The Royal Siam railway authority has set up a public relations department to promote tourism in Thailand and provide necessary assistance to foreign tourists. In 1959, Thailand established the Thailand tourism organization and established Thai International Airlines through joint venture. Since 1960s, due to the political stability and economic development of Thailand, as well as Bangkok as an international air transport hub, Thailand’s tourism has developed rapidly. Due to the demand of tourism, Thailand’s hotel industry and retail industry are also expanding. During the Vietnam War, American soldiers poured into Thailand to recuperate. With the development of Thai economy and the increase of per capita income, Thailand has become a hot spot of international tourism. In recent years, Thailand’s tourism industry has developed steadily, the number of tourists has increased steadily, and the tourism income has been expanding. This paper investigates the tourism income of Thailand in recent years, and the results are shown in Fig. 1. As shown in Fig. 1, the tourism income of Thailand has been growing from 2009 to 2019, especially from 2013 to 2017. It can be seen that the growth rate of tourism income in Thailand is relatively fast. According to the statistics of the World Tourism Council, in 2019, Thailand’s tourism revenue is 100 billion US dollars, the direct contribution to Thailand’s GDP (tourism accounts for the proportion of GDP) is 29.8%, and the number of tourism employment accounts for 18.4% of the total employment, which shows that tourism is the key driving force of Thailand’s

Research on the Competitiveness of Thailand Golf Tourism …

295

120

Billion dollars

100 80 60 40 20 0 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019

Year Fig. 1 Tourism revenue in Thailand in recent years

economy. Foreign tourists account for 85% of direct tourism and tourism GDP, while domestic tourists account for the remaining 15%. At the same time, tourism income mainly comes from the leisure tourism expenditure of inbound and domestic tourists, accounting for 84% of direct tourism and tourism GDP. However, the average cost of tourists to Thailand has been rising due to the increase of tourists from short distance countries and the shortening of stay time. From the economic income of Thailand’s tourism industry in recent years, Thailand’s tourism industry has broad prospects and great development potential, which has laid a solid foundation for the development of Thailand’s golf tourism. Thailand, located in the south of Indochina Peninsula, is a multi-ethnic country with splendid history and culture and rich tourism resources. In history, Thailand has experienced Sukhothai Kingdom, ayudaya Dynasty, tongwuli Dynasty and other periods. Its historical sites, architectural gardens are all over the country. Thailand is a country with strong Buddhist color. Its historical and cultural tourism resources are mainly characterized by Buddhist temples, pagodas and Buddhist related stone carvings, Buddhism and paintings. Various festivals, celebrations and dances full of local customs are also very attractive to tourists. Thailand’s natural scenery and some unique parks and zoos are also unforgettable. International tourists to Thailand consider Thailand one of the most popular tourist destinations in Asia. Thailand’s landscape, Thai food, water market and other natural tourist attractions have left a deep impression on Thailand’s international tourists. The main tourist destinations of foreign tourists in Thailand in 2019 are investigated. The results are shown in Fig. 2. As shown in Fig. 2, the main tourist destinations of Thai foreign tourists in 2019 are Bangkok, Phuket, chunburi, sorat Thani, Chiang Mai, songka, khami, Ayutthaya and others, accounting for 22%, 18%, 14%, 12%, 10%, 8%, 7%, 5% and 4%

296

K. Sun et al.

Bangkok

Phuket

Chon Buri

Suratthani

Songka

Krati

Ayutthaya

Other

Chiang Mai

Fig. 2 Thailand’s main destinations for foreign tourists in 2019

respectively. This data corresponds to the tourism resources of Thailand. Tourists are still concentrated in Bangkok, chunburi, Phuket Island, Kami, Chiang Mai and other major tourist cities. The development of tourism involves many departments and industries. Transportation, communication, hotel and hotel construction are the infrastructure of tourism development, and the development of tourism resources and the construction of tourist attractions are important conditions. In these major cities of Thailand, the infrastructure is relatively perfect, so there will be more tourists. This data also provides suggestions for the development of golf tourism in Thailand in the future. More golf tourism construction can be carried out in the places mentioned in the above figure.

4.2 Suggestions on Research and Development of Thailand Golf Tourism Competitiveness Analysis Based on Big Data Thailand’s rich and diverse tourism resources are an important reason for the rapid development of Thailand’s golf tourism. The research on the development and protection of golf tourism resources reflects the resource concept of golf tourism development in Thailand. Scholars’ research in this field has been involved in the development and protection of natural and cultural tourism resources, but unfortunately, the overall research content is relatively small, and the mode or concept formed in Thailand has not been really refined.

Research on the Competitiveness of Thailand Golf Tourism …

297

With the continuous development of artificial intelligence, “tourism +” and informatization, as well as the further deepening of China Thailand golf tourism cooperation, the research direction of Thailand golf tourism will be rapidly broadened in the future. How to realize the integrated golf tourism industry in Thailand, how to use big data resources to realize intelligent service and management, and what are the opportunities and ways of Sino Thai golf tourism cooperation under the background of artificial intelligence, which will become the research hotspot of Thailand golf tourism research in the future. In the world, Thailand is in the center of Southeast Asia. Thailand is a mysterious country with a long history, culture and rich tourism resources. The history of Thailand has experienced different periods, such as the ancient Sukhothai period, Sukhothai Dynasty, Dacheng Dynasty, tongwuli Dynasty and so on. Therefore, in Thailand, there are many different styles of buildings, places of interest throughout the country. The development of golf tourism in Thailand in the past decade is also very obvious. It has played an important role in promoting economic growth, promoting employment, standardizing income distribution and investment, increasing national wealth and improving people’s livelihood. However, judging from the current situation, the competition in the world tourism industry is very fierce, especially in the aspect of tourism service quality. To some extent, Thailand’s economy is driven by tourism. In order to promote the sustainable development of golf tourism in Thailand, it is necessary to improve the quality of tourism products and international tourism service level. The development of golf tourism in Thailand has entered a new stage. It is necessary to formulate and adjust sustainable tourism development strategies and policies, revise the existing tourism related laws and regulations, strengthen the policy guidance of government functional departments, coordinate the relationship with the local government, establish the monitoring and management system of tourism resources, establish standard tourism products and services, improve the quality of tourism services, effectively protect the original tourist attractions, and develop new tourism projects, We should implement eco-tourism management measures to promote the sustainable development of tourism environment, and encourage the public and media to participate in tourism environmental protection activities.

5 Conclusions This paper introduces the research method of Thailand golf tourism competitiveness analysis based on big data. With the development of the times and the progress of society, all walks of life need to grasp the trend of the development of the times and adapt to the needs of the times. In order to help the development of Thai golf tourism keep up with the pace of the times and enhance its core competitiveness, this paper puts forward the research method of applying big data technology to the competitiveness analysis of Thai golf tourism industry. Combined with the new requirements

298

K. Sun et al.

for the development of golf tourism in Thailand in the new era, a set of more suitable development methods of golf tourism in Thailand is formulated. Through long-term research and analysis, the method proposed in this paper successfully provides new ideas for the research and development of Thailand golf tourism competitiveness analysis based on big data.

References 1. Lee, W.S., Han, E.J., Sohn, S.Y.: Predicting the pattern of technology convergence using bigdata technology on large-scale triadic patents. Technol. Forecast. Soc. Change 100, 317–329 (2015) 2. Ma, J., Cheng, J.C.P.: Estimation of the building energy use intensity in the urban scale by integrating GIS and big data technology. Appl. Energy 183, 182–192 (2016) 3. Liu, Z., Wang, Y., Cai, L., et al.: Design and manufacturing model of customized hydrostatic bearing system based on cloud and big data technology. Int. J. Adv. Manuf. Technol. 84(1–4), 261–273 (2016) 4. Kontogeorgopoulos, N., Churyen, A., Duangsaeng, V.: Homestay tourism and the commercialization of the rural home in Thailand. Asia Pac. J. Tour. Res. 20(1), 29–50 (2015) 5. Enteen, J.B.: Transitioning online: cosmetic surgery tourism in Thailand. Telev. New Media 15(3), 238–249 (2016) 6. Vajirakachorn, T., Chongwatpol, J.: Application of business intelligence in the tourism industry: a case study of a local food festival in Thailand. Tour. Manag. Perspect. 23, 75–86 (2017) 7. Bearman, P.W., Harvey, J.K.: Golf ball aerodynamics. Aeronaut. Q. 27(02), 112–122 (2016) 8. Young, J., Udeigwe, T.K., Weindorf, D.C., et al.: Evaluating management-induced soil salinization in golf courses in semi-arid landscapes. Solid Earth 6(1), 91–114 (2015) 9. Poo, M.C.: Daily Life in Ancient China. Leisure and Entertainment, Games, and Festivals, pp. 170–185 (2018) (eight). https://doi.org/10.1017/9781139108621 10. Gershon, N., Kapralos, B., Mann, S.: Games, entertainment, and media for life, health, and community: IEEE GEM 2014. IEEE Consum. Electron. Mag. 4(3), 67–72 (2015) 11. Li, Yan: A comparative study of tourism business models in the internet era. Int. J. Front. Sociol. 1(1), 99–108 (2019)

Simulation and Research of Multi-machine Automatic Stamping Production Unit Based on Robot Songqing Liu and Ying Chen

Abstract In recent years, with the development of the structure and function of computers, control equipment and machinery, the application of flexible manufacturing systems in the stamping processing industry has been increased, and the automation of multi-variety medium and small batch production has been realized, which greatly improves the flexibility of production. As an industry, stamping processing plays an important role in the processing industry of the national economy, but research on this aspect is still lacking. The purpose of this paper is to explore the development of robotic and multi-machine automatic stamping production combination, to improve production efficiency and enhance enterprise competitiveness for the use of robots. This paper mainly uses an industrial robot with three presses to discuss the situation of the beat improvement. Finally, the equipment model and the virtual model of the collaborative production unit are established by the virtual prototype technology to analyze the trajectory planning, workspace and free vibration of the virtual prototype of the industrial robot. Finally, the virtual production unit is simulated and analyzed. Keywords Robot · Multi-machine automatic stamping · ADAMS · Collaborative production unit simulation

1 Introduction As a highly automated and highly integrated product, industrial robots are widely used in stamping and loading and unloading. The industrial robot stamping production method improves the production conditions, reduces the labor intensity at the production site, ensures the precision of production, saves energy, reduces auxiliary processing time, and improves product competitiveness.

S. Liu (B) · Y. Chen College of Mechanical Engineering, Jilin Engineering Normal University, Changchun 130052, Jilin, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_37

299

300

S. Liu and Y. Chen

In recent years, many researchers have studied multi-machine automatic stamping technology. In 2016, Yannian and Heng [1] conducted research on the overall structure and work flow of the three-dimensional feeding robot control system jointly controlled by PLC technology and motion controller in order to improve the automation of the press production line. It is easy to operate and fast. In 2017, Zhexiang et al. [2] used three-dimensional software to design a virtual prototype to optimize the stress and strain by using three-dimensional software to automatically capture the process of small auto parts. The experimental results found that compared with the traditional robot, the manufacturing cost was compared. Lower, suitable for largescale processing of fish. In 2017, Jun et al. [3] used the mathematical model to carry out theoretical analysis for the motion optimization design of the stamping robot, and used the DH method to establish the coordinate system. The ANSYS Workbench was used to optimize the topology of the base. The results showed that under the same conditions, the optimized The base is less effective and the optimization effect is better. In 2018, Zhong et al. [4] designed a multi-directional illumination based on the difference in the surface gradation variation characteristics of the surface stamping recessed area and the flat area in different illumination directions in order to improve the accuracy of stamping character segmentation. The image fusion algorithm shows that the algorithm can effectively eliminate background interference. This paper mainly analyzes the production situation of the collaborative production unit of industrial robot and three presses, including the action of each equipment in the collaborative production unit. The trajectory of the industrial robot under the collaborative production unit is planned, and the simulation and simulation are verified by the virtual prototype technology. Intuitively draw the movement of the collaborative production unit, compare the production requirements and the requirements of the use of industrial robots, and conclude that the virtual prototype meets the actual production.

2 Methods 2.1 Realization of Simulation Path Between Unit and Multiple Punch Production Units Virtual Prototype (VP) is a multi-product, multi-domain digital model that contains all the key features of a real product [5–7]. Virtual prototyping technology mainly includes modeling technology for virtual prototype, simulation technology based on virtual prototype, management technology for virtual prototype [8], integration technology of various tools, and virtual reality/human-computer interaction technology. The technical system is shown in Fig. 1 [9]. The ADAMS software, Automatic Dynamic Analysis Of Mechanical Systems, is a virtual prototyping software developed by Mechanical Dynamic Inc [10]. Therefore, it is a prerequisite for the simulation to make full use of the characteristics of

Simulation and Research of Multi-machine Automatic Stamping …

301

Virtual reality / human-computer interaction technology

Virtual Prototype

Management technology

Simulation Technology

Overall integration technology Fig. 1 Virtual prototype technology system

two different types of software to establish a correct model that conforms to the actual production situation [11]. Therefore, this paper combines the strengths of each software to simulate the collaborative production unit [12]. The basic process is shown in Fig. 2. Establishing a three-dimensional model of collaborative production unit equipment in a proe environment

Adding moon pairs, moon constraints, and applying loads in the Adams environment

Simulaon Analysis: Seng Measurement and Simulaon Outputs

Refined mechanical system model: increase fricon, improve load funcon; define flexible objects and connecons; define control

Analysis of simulaon results: playback of simulaon results; plong simulaon results

Verify simulaon analysis results: input experimental data; add experimental data curve

no Consistent with experimental results

yes

Save model

Fig. 2 Collaborative production unit simulation process

302

S. Liu and Y. Chen

2.2 Kinematics Analysis and Modal Analysis of Collaborative Production Unit Robot Industrial robots often move as a unit in the manufacturing system. In order to clearly describe the relationship between the end effector and the industrial robot body, and the position and posture between the joints of the industrial robot body, it is necessary to use the position vector, plane and Knowledge such as coordinate system. Once a coordinate system is established at the joint of the robot, the industrial robot can use a 3 × 1 position vector to determine the position of any point in the space. For Cartesian coordinate system {A}, the position of any point p in space can be represented by a 3 × 1 column vector A p : ⎡ Ap

px



⎢ ⎥ = ⎣ py ⎦ pz

(1.1)

Among them, px , p y , and pz are three coordinate components of the P point in the coordinate system {A}, and the superscript A of A p represents the reference coordinate system {A}. We call A p a position vector. In addition to knowing the position of the object, it is also necessary to know the orientation of the object. The orientation of the object can be described by a coordinate system fixed to the object. A rigid coordinate system A p is fixed on the rigid body B and the rigid body is fixed. The three unit main vectors x B , y B , z B of A p are represented with respect to a 3 × 3 matrix of the cosine composition of the reference coordinate system {A}. A BR

=

A

xB

A

xB

A

xB





⎤ r11 r12 r13 = ⎣ r21 r22 r23 ⎦ r31 r32 r33

(1.2)

where BA R is the rotation matrix, where the superscript A represents the reference coordinate system {A} and the subscript B represents the coordinate system {B} being described. To fully describe the pose of the rigid body B in space, the object B is usually fixed to a coordinate system, and the origin of {B} is generally selected on the feature points of the object B, such as the centroid. Relative to the reference frame coordinate system {A}, the origin position of the coordinate system {B} and the orientation of the coordinate axes are described by the position vector ∧ PBO and the rotation matrix BA R, respectively. Thus, the pose of the rigid body B can be represented by the coordinate system {B}, that is: {B} =

A

BR

A

PBO



(1.3)

Simulation and Research of Multi-machine Automatic Stamping …

303

Table 1 Process parameters of collaborative production unit punching Press parameters

Punching press

Punch position

Blanking process Drawing process

Deep drawing punch

Punch nominal force (kN)

250

800

Bottom dead point (mm)

250

320

Slider stroke (mm)

80

90

Number of trips (single) times/min

≥50–100

≥45–75

Workbench size (front and rear × left and right) (mm) 400 × 700

450 × 560

Workbench height from the ground (mm)

780

910

Maximum mold opening height (mm)

40–100

30–100

Throat depth (mm)

210

290

Assuming that the coordinate systems {B} and {A} have the same orientation, but the origins of the two are not coincident, the coordinate translation equation is as follows: A

P = B P + A PBO

(1.4)

{B} in Eq. (1.4) represents a translation vector with respect to {A}.

3 Experiments The press models used in this paper are jh21-25 and jh21-80, where j is the mechanical press code, 21 is the open fixed press code, 25 is the press nominal pressure 250 kN code, 80 is the press nominal Pressure 800 kN code, according to the characteristics of the collaborative production unit, refer to Table 1 for the blanking and drawing process to determine the punching process parameters, in addition to the workbench movement mode, column spacing, table pad thickness Wait for specific punch information.

4 Results and Discussion In the above process, it takes a certain time for the vacuum chuck to reach the pressure of the workpiece. The industrial robot transports the workpiece and enters the inside of the press to release the workpiece. It also takes a certain time. According to the analysis experiment, the time taken by the industrial robot to transport the workpiece to the punch once is 1.5 s. The cycle of the punch 1 is 2 s, and the cycle of the press 2 is 4 s. The motion parameters of the punch 1 are shown in Table 2.

304

S. Liu and Y. Chen

Table 2 Motion parameters of punch 1 Moving parts

Pan

Rotation (horizontal)

A cycle (s)

Sheet

0–1150 mm

0–90°

1

Punch 1 workbench

0–350 mm (Z direction)



2.5

Punch 1 upper die

0–350 mm (Z direction)



2.5

Punching machine 1 press ring

0–50 mm



0.5

scrap

0–200 mm



2

First, the motion parameters of the punch are added to the established virtual prototype of the punch, and then the slider motion curve of the punch is output (Figs. 3 and 4). According to the slider movement curve of the punching machine, the movement parameter setting of the end picker robot and the processing sequence and starting time of the three punching machines are performed. Comparing Figs. 3 and 4, it can be concluded that punch 1 is a dangerous area for loading and unloading of industrial robots from 0.6 s to 1.4 s, and 0–0.6 s and 1.4–2 s are safe areas. It can be found that the safe loading and unloading time is 1.2 s. Punch 2.1 is a safe area for industrial robots loading and unloading in 1.3–2.7 s, 0–1.3 s, 2.7–4 s for safe areas. The vacuum suction cup at the industrial robot pick-up 500 400 300 200 100 0 0

0.5

1

1.5

2

2.5

Fig. 3 The motion curve of the punch 1 slider

500 400 300 200 100 0 0

1

2

Fig. 4 The motion curve of the punch 2.1 slider

3

4

5

Simulation and Research of Multi-machine Automatic Stamping …

305

device reaches the pressure of the suction workpiece for a certain period of time. The industrial robot transports the workpiece and enters the inside of the press to release the workpiece. It also takes a certain time. According to the analysis experiment, the industrial robot transports the workpiece to the press for one time. The time is 1 s. According to the analysis, the safe area of the blank reached by the slider back of the punching machine 1 should coincide with the safe area of the slider returning of the punching machine 2.

5 Conclusion In this paper, the current situation of the traditional production line and the virtual prototype simulation software ADAMS are analyzed and studied in detail. The virtual prototype platform such as ADAMS software is used to design a collaborative production unit of industrial robots with three presses, and the actual situation is added. Based on the operating conditions and mechanical properties, a complete virtual simulation coordination unit was established. According to the vibration principle, the vibration mode of the industrial robot of the conveying mechanism was analyzed, and the weak joints and the resonant frequency to be avoided in use were pointed out. And master the virtual prototype design steps and optimization steps, through the virtual prototype means to solve the actual prototype problem.

References 1. Yannian, W., Heng, D.: Design of automatic feeding manipulator control system for multistation stamping production line. Forg. Technol. 41(6), 55–60 (2016) 2. Zhexiang, Z., Qian, W., Kaiyuan, W.: Economic automatic feeding robot for automotive stamping parts. Lift. Transp. Mach. 2, 27–31 (2017) 3. Jun, L., Wenying, Y.: Kinematics analysis and optimization design of stamping and loading robots. Forg. Technol. 5, 74–80 (2017) 4. Zhong, X., Jianfeng, Z., Wei, Q., Zhenyu, W., Xudong, H.: Multi-directional illumination of metal stamping character image fusion algorithm. J. Comput.-Aided Des. Comput. Graph. 9, 1637–1642 (2018) 5. Shaokun, L., Keru, W., Ruizhi, X., Peng, H., Bo, M., Xiaoxia, Y., et al.: Implementing highyield mechanized production of dense planting to achieve high yield and high efficiency of corn. Crop J. 4, 1–6 (2016) 6. Jiadong, L., Huaili, C.: Study on collaborative production and distribution of fresh foods with shelf life constraints. J. Chongqing Normal Univ.: Nat. Sci. Ed. 6, 136–140 (2017) 7. Jing, W., Kailing, P., Wei, L., Xinxin, W.: Collaborative production planning model and solution for decomposing orders of cloud manufacturing platform. J. Shanghai Jiaotong Univ. 52(12), 117–124 (2018) 8. Xuliang, W., Xudong, C., Cheng, Z., Xiaofang, Z.: Across-enterprise collaborative production scheduling algorithm in cloud manufacturing environment. Comput. Integr. Manuf. Syst. 25(2nd), 412–420 (2019)

306

S. Liu and Y. Chen

9. Chen, Y., Hong, T., Piette, M.N.: Automatic generation and simulation of urban building energy models based on city datasets for city-scale building retrofit analysis. Appl. Energy 205, 323–335 (2017) 10. Chen, L., Weng, M., Zhou, P., Zhang, L., Huang, Z., Zhang, W.: Multi-responsive actuators based on a graphene oxide composite: intelligent robot and bioinspired applications. Nanoscale 9(28), 9825–9833 (2017) 11. Chien, S.Y., Lin, Y.L., Lee, P.J., Han, S., Lewis, M., Sycara, K.: Attention allocation for human multi-robot control: cognitive analysis based on behavior data and hidden states. Int. J. Hum.-Comput. Stud. (2018). S107158191830096X 12. Du, G., Chen, M., Liu, C., Bo, Z., Ping, Z.: Online robot teaching with natural human–robot interaction. IEEE Trans. Ind. Electron. PP(99), 1-1 (2018)

Application of Internet of Things Technology in Artificial Intelligence Image Detection System Aixia Hou

Abstract In order to solve the disadvantages of traditional methods, this paper studies the application of Internet of Things (IOT) technology in artificial intelligence (AI) image detection system. System usually adopts intelligent artificial pixel characteristic collection technology, point by point on the image feature extraction, using Internet of rich data resources and processing capacity, the analysis of characteristics of image pixels on feedback, feedback signals by AI image synthesis module, the signal to do image conversion processing complete results of the analysis and the output image detection, AI image detection system design; The simulation test proves that the recognition accuracy rate is up to 94.71%, which has provided a new design idea for the research and development of image detection system. Keywords IOT technology · Artificial intelligence · Image detection · Feature acquisition

1 Introduction Computer and Internet will be content with the man, machine, mesh closely relates in together, formed the mobile IOT, and things united network successfully established proves that information technology has gradually achieve fully able to support the new technology [1, 2]. As a special information data source and expression form, how to accurately interpret the information content contained in image information detection technology has been a hot topic in the research field of image information detection technology [3, 4]. Ma Chenhao designed a single optical wedge microscanning system and added it to the Hartmann sensor. Microscanning overcomes the problem of low pixel number in detector which leads to insufficient detection accuracy, and makes HartmannShack sensor carry out high-precision detection with low pixel number. Combining A. Hou (B) School of Artificial Intelligence, Chongqing Creation Vocational College, Chongqing 402160, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_38

307

308

A. Hou

the wavefront reconstruction algorithm and the micro-scanning reconstruction highresolution algorithm, Lighttools and Zemax software are used to obtain the results [5]. The IOT (IoT) will give new capabilities to things connected to the Internet. In the survey, Shancang Li systematically reviewed the definition, architecture, underlying technologies and applications of the IOT [6, 7]. On the basis of explaining the basic theories of traditional image processing, this paper combines the IOT technology to conduct experimental analysis and demonstration on the AI image detection system [8]. Based on traditional image detection framework is composed of characteristics of the classifier, this paper proposes a IoT of using intelligent artificial pixel feature collection technology in image detection algorithm, greatly processing early classical algorithms in image problems left over, finally experiments show that the proposed method can improve the accuracy and speed [9, 10].

2 IOT and Image Detection 2.1 IOT Technology The powerful information processor and computing and analysis capability of the IOT can be used for data analysis and comprehensive processing of information recognition in images. The cloud network image data processing system module has two main functions: (1)

(2)

Information transfer management function. The primary core function of cloud system construction is to ensure that the three-dimensional images and characteristic data collected by system designers for system application terminals can be effectively processed, visible and preserved. IOT resource integration management function. Cloud data, as an important bridge and connection medium to connect with the internal spatial information from the IOT, has the powerful feature of retrieving the big data and resources from all the necessary data information within the IOT in real time. Quantitative comparison and comprehensive analysis are made by combining the video data retrieved from the network with the characteristic data of the video images uploaded from the network.

2.2 AI Image Detection Systems In practice, the object model of image detection is an ideal imaging model, which can be obtained by solving linear equations under the linear model. However, due to the influence of many factors, the camera linear model cannot accurately reflect the actual geometric relationship of camera imaging. Therefore, it is necessary to

Application of Internet of Things Technology in Artificial …

309

correct the nonlinear distortion: x = x + σx (x, y)

(1)

y = y + σ y (x, y)

(2)

In the research process, there is a quantitative geometric relationship between the points on the image and the corresponding points on the real surface, and the imaging model of the camera shows the corresponding position relationship: ⎤⎡ ⎤ ⎡ ⎤ ⎡ 1 0 u0 X u dX ⎣ v ⎦ = ⎣ 0 1 v0 ⎦⎣ Y ⎦ dY 1 1 0 0 1

(3)

3 Design of the Experiment 3.1 Experimental Background AI image detection system technology is widely used in the background of IOT. System design includes information image acquisition, terminal platform construction graphics, image analysis, processing and other work. The data content of image source feature group can be collected and analyzed. In the process of image feature acquisition, with the help of the analysis module, the relevant image information can be accurately found out and the data structure can be optimized. The application of image feature acquisition module can effectively solve the verbatim problem of data source in the process of image data uploading.

3.2 Experimental Design In the process of depth image acquisition and processing, the background reference image of each depth sensor is obtained and effective detection is realized by removing the background image. The main steps are as follows: data acquisition to obtain depth image; Background removal to obtain image without background depth; Filtering and marking; Test operator; 3D visualization of operators to obtain 3D point cloud of operators; Merge with 3D model of robot; Avoid conflict. The depth images of the two camera detection operators were converted into the point cloud of the robot collaboration system, and the images were incorporated into the single 3D point cloud after registration. Open CV, an open source computer vision library, was used

310 Table 1 Experimental results

A. Hou Parameter

The output value

Unit

Kinect1

Kinect2

M1

1.8221

1.2613

rad

M2

0.6213

0.2187

1/rad

M3

0.9124

0.9874

m

M4

1.1002

1.2377

m

for optical correction of IR cameras. Select several checkerboard original infrared images to obtain internal parameters and distortion coefficients. The experimental results are shown in Table 1.

4 IOT in Image Detection 4.1 Analysis of the Application of IOT Technology in AI Image Detection System As shown in Fig. 1, the image detection system implemented in the two programming platforms used in this paper. Thus, the whole network USES stochastic gradient descent and back propagation for end-to-end training and weight updating. A residual network structure is called a block and convolutional neural network for feature

Fig. 1 Comparison of recognition rates between traditional and optimized image detection systems

Application of Internet of Things Technology in Artificial …

311

extraction of the network is composed of the stack of blocks such that when the large stack, the model of feature extraction model can produce a large number of parameters, the model of operation speed is greatly reduced, the module is improved, the middle two layer into 3 convolution structure, use 1 × 1, 3 × 3, 1 × 1 to replace convolution layer, called the bottleneck structure. So you get a residual structure of fifty layers and a residual structure of one hundred and one layers. After 1 × 1 × 64 the convolution of output layer, and then to carry on the Batch—Normalization and Relu activation function after 3 × 3 × 356, 56 × 256 × 64 layers of convolution output characteristic figure, once again, to carry on the Batch—after Normalization and Relu activation function 1 × 1 × 56, 56 × 256 × 256 layers of convolution output characteristic figure, and with another branch corresponding to the addition of a channel, the final output is 56 × 56 × 256 features, to the next bottleneck network. In general, the depth of the image detection speed and network negative correlation relationship and network, the more time need operation, but the feature extraction of semantic information more accurately, so using 50 layer or feature extraction of 101 layer network should be starting from the actual task and hardware resources, select the most appropriate. In this paper, a residual network of 50 and 101 layers is proposed to replace the VGG16 feature extraction network in the firm-RCNN algorithm, and the performance of the improved algorithm based on the residual network is analyzed.

Fig. 2 Recognition rate analysis of sampling group images

312

A. Hou

Recognition rate analysis of sampling group images is shown in Fig. 2. In the system design, the acquisition of image feature information can improve the efficiency and accuracy of data processing, and avoid the problem of low image resolution, thus avoiding the error of image information and causing a series of subsequent problems.

4.2 Suggestions on the Application of IOT Technology in AI Image Detection System Because of the stacked CNN structure, the deeper the network model becomes, the better the network performance can be theoretically improved. If you rely only on a simple number of stacked layers to deepen the network, there will be some problems; First, gradient explosion or gradient disappearance is likely to occur, which hinders the convergence of the network. The effective solution to these problems is to use fine-tuning and BatchNormalization to ensure convergence of deep networks. The other problem is that network degradation, which is the structure of stacked CNN, will have greater training error. In this paper, the residual structure of convolutional neural network is used to solve the degradation problem well. With the increase in depth, the network precision is higher and the network model is easier to be optimized. Image feature analysis and collection are carried out for the data of image region feature composition. The focus is to analyze the image source region feature and composition region data collected this time. Through the use of image processing feature information acquisition technology to optimize the data structure, adjust and solve the image data sources caused by various image feature information acquisition and upload methods of image data sources lengthy, low utilization and the traditional image source information resolution low caused by the image data sources and information transmission error, invalid related problems. Pixelation factors are arranged in a certain time sequence of pixels and constitute a pixel. Pixel factors are a set of pixelation factors about data type information. Like pixels in each set and is composed of feature point information data in the data of each pixel point pixels will be directly presented with other changes pixel collection arrangement of different visual effect, in the image of the visual environment, such as building houses, mountains, rivers and so on the contour in the image, color, contrast, and so on the visual effect, can be based on data collection feature point is a visual result of pixels change collection arrangement.

5 Conclusions Based on traditional image detection framework is composed of characteristics of the classifier, this paper proposes a IOT of using intelligent artificial pixel feature

Application of Internet of Things Technology in Artificial …

313

collection technology in image detection algorithm, greatly processing early classical algorithms in image problems left over, finally experiments show that the proposed method can improve the accuracy and speed.

References 1. Laplante, P.A., Laplante, N.: The internet of things in healthcare: potential applications and challenges. IT Prof. 18(3), 2–4 (2016) 2. Manyika, J., Chui, M., Bisson, P.: Unlocking the potential of the Internet of Things. Mol. Cell. Biol. 110(5), 13–16 (2015) 3. Afreen, A., Takumi, S., Xia, X., et al.: DC–17-GHz CMOS single-pole-eight-throw switching matrix for radar-based image detection. Jpn. J. Appl. Phys. 55(12), 127301 (2016) 4. Gilbreath, G.C., Reintjes, J.F.: Photorefractive Fourier image amplification for low-light-level image detection. Microwave Opt. Technol. Lett. 12(3), 119–123 (2015) 5. Ma, C., Fu, Y., He, W., et al.: Hartmann–Shack sensor based micro-scanning image detection. Optik 126(6), 609–613 (2015) 6. Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243–259 (2015) 7. Rathore, M.M., Ahmad, A., Paul, A., et al.: Urban planning and building smart cities based on the Internet of Things using Big Data analytics. Comput. Netw. 101(C), 63–80 (2016) 8. Chen, C., Fang, J.-S., Yin, S.: Optimized synthetic aperture radar image detection with nonzeroorder joint transform correlators. Microwave Opt. Technol. Lett. 26(5), 312–316 (2015) 9. Qiu, X., Yang, S., Wu, D., et al.: Rapid enumeration of CD4 + T lymphocytes using an integrated microfluidic system based on chemiluminescence image detection at point-of-care testing. Biomed. Microdevices 20(1), 15 (2018) 10. Shunzhi, Z., Lizhao, L., Si, C.: Image feature detection algorithm based on the spread of Hessian source. Multimed. Syst. 23(1), 105–117 (2017)

A Review of Computer Technology in TCM Transmission and the Teaching of TCM Translation Xinyu Duan and Yongmei Peng

Abstract In recent years, traditional Chinese medicine (TCM), which includes rich traditional Chinese culture and Chinese medical wisdom, is important for the transmission of Chinese culture. Since the twenty-first century, the application of computer technology is beneficial for the research on TCM translation, especially for the transmission of TCM culture and the cultivation of TCM translation talents. By entering the keywords in the search engine—CNKI, this essay summarized the current situation of computer technology used in TCM translation, analyzed the existing problems in TCM transmission and TCM translation teaching, so as to offer suggestions for the future integration of computer technology and TCM translation. Keywords Computer technology · The transmission of TCM · The teaching of TCM translation

1 Introduction Since the twenty-first century, the inheritance of traditional Chinese medicine (TCM) and the promotion of TCM transmission become driving forces for national competitiveness. With the continuous development of computer technology, scholars apply it to TCM translation studies. In 2012, the 12th Five-Year Plan for the development of TCM was advocated, which clarified the principles and promoted the implementation of major TCM subjects. Since 2013, President Xi has repeatedly expressed the need to promote the development of TCM and the transmission of TCM culture. Therefore, TCM has attracted more attention. With the development of computer technology, the application of science and technology becomes a new concentration for TCM translation scholars. By entering the keywords like “TCM corpus”, “computer-aided TCM translation” “TCM transmission with Internet” “TCM translation teaching with computer” and others in the search engine on CNKI, the results of the papers are shown in Fig. 1. It is found X. Duan · Y. Peng (B) Jiangxi University of Traditional Chinese Medicine, Nanchang 330000, Jiangxi, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_39

315

316

X. Duan and Y. Peng 60 50 40 30 20 10 0

Fig. 1 The number of papers

that the research on the TCM translation with computer technology has been developing since the early twenty-first century, and the number of published articles has been increasing year by year. Since 2011, the growth of the number of papers is in multiples. The cultivation of TCM translation talents and the method of TCM transmission are the keys of the transmission of TCM culture. Therefore, the essay reorganizes literature, makes a summary of the application of computer technology in TCM transmission and TCM translation teaching, and offers suggestions for the application of computer technology in the research of TCM translation.

2 Discussion of Research on TCM Transmission and the Cultivation of TCM Translation Talents Based on Computer Technology The computer technology used in the research on TCM translation includes corpus, Internet and platform, computer-aided translation. Then, the essay would summarize and discuss these aspects.

2.1 The Application of Corpus Corpus is an important research method of language. It plays an indispensable role in the application of computer technology in TCM translation research.

A Review of Computer Technology in TCM Transmission …

2.1.1

317

Corpus-Based Research on the Transmission of TCM Culture

In terms of the transmission of TCM culture, scholars analyzed overseas reports of TCM according to linguistic data. By means of self-built monographic corpus, Ye and Wu [1] analyzed American news reports about TCM. They explored the current situation and attitude of foreign mainstream Medias, and revealed their cognition and views about TCM. Luo [2] used AntConc, a software of corpus analysis, to discuss a discourse strategy about the English version of “Chinese Medicine”, and analyzed what roles the government plays in the construction of TCM image. With the help of corpus, Lin et al. [3] investigated the state of TCM transmission by research on the translation of TCM science classics, and proposed the design of the transmission route. Corpus is now mainly used to analyze the current situation of the TCM transmission. According to the analysis of the corpus, scholars should create more corresponding advocating methods for the dissemination of TCM culture to promote its development.

2.1.2

Corpus-Based Research on the Cultivation of TCM Translation Talents

The construction of corpus and integrated linguistic data is convenient for TCM English teaching. It is beneficial for the quality of education. Corpus retrieval and comparison between different languages are helpful for students to remember TCM English words and master syntactic properties and grammar. Therefore, corpus-based TCM translation teaching is also being studied by many scholars. Some scholars analyzed the teaching of vocabulary, interpretation and clinic with self-built corpus, such as Chen and Shi [4], Zhang [5], Cao and Liu [6], Du [7], Han et al. [8], Yang and Yuan [9], and discussed the exploitation and construction of Chinese-English bilingual parallel corpus for teaching. Moreover, Wu and Liu [10] proposed the data-driven method based on corpus should be used in English for specific purpose (ESP) teaching of TCM English. Based on the pattern of ESP teaching, Zhang [11] proposed a pattern based on small private online course (SPOC). With the help of corpus, scholars made many attempts in TCM translation teaching, divided students into experimental group and control group for teaching practice, and achieved good teaching effects in experimental group. It proves that the construction of a corpus for TCM translation teaching plays a key role in the reform of the teaching pattern, and the rational application of a new teaching pattern contributes to students’ professional competence. However, the corpus-based method is not widely used in TCM translation teaching. It’s still a problem whether there are full advantages of corpus in TCM teaching.

318

X. Duan and Y. Peng

2.2 The Application of Internet and Network Platform With the progress of science and technology, Internet is closely related to people’s life. The rational utilization of network media plays a significant role in the transmission of TCM culture and the teaching of TCM translation.

2.2.1

The Transmission of TCM Culture with Internet and Network Platform

Nowadays, many scholars are enthusiastic about studying ways of the transmission of TCM culture with Internet. Zhao [12] analyzed the strategies of TCM translation in the new media environment, and summarized the current situation. Liao and Jia [13] proposed the construction of a network electronic dictionary of TCM English. Shi and He [14] revealed obstacles of the transmission of TCM culture, and proposed to establish an international classroom and use the “Internet accelerated speed” and TCM APP to spread TCM knowledge. Yin et al. [15] proposed to transmit TCM at a lower cost by texts, pictures and videos with the help of various social platforms and “the belt and road initiative” strategy. The development of the Internet reduces the cost of obtaining information. It is necessary to make full use of Internet and network platforms to promote the transmission and development of TCM culture. The problems in the transmission of TCM culture with Internet are mainly concerned with too narrow channels and the monotonous methods. Most of the publicization has few impacts, without combining with the advantages of the Internet effectively.

2.2.2

The Cultivation of TCM Translation Talents with Internet and Network Platform

Cultivating TCM translation talents by Internet has been studying by scholars since 2004. Zhang and Liu [16] applied multimedia into teaching progress, and found that multimedia has a good effect on students’ interests and professional abilities. Chen et al. [17] advocated that TCM universities should take full advantage of network teaching platform, open network courses with specialities and improve teaching hardware facilities. Zhang [18] proposed that teachers could interact with students in Blackboard, a network platform, and adopt problem-based learning (PBL), a teaching pattern, to consolidate knowledge. Yan and Du [19] discussed the problem of combining “MOOC” platform with TCM translation teaching. Besides, many scholars such as Li [20], Mu [21], Zhou and Ren [22], Zhao [23] came up with ideas about the application of TCM English network course, the exploitation of autonomous platform, and the reformation of TCM translation teaching pattern.

A Review of Computer Technology in TCM Transmission …

319

Taking advantages of Internet, TCM translation teaching is more convenient for teachers and students. The establishment of diversified and systematic teaching system is beneficial for students’ abilities of information retrieval and Internet usage. The problems in it are the same with corpus-based teaching, that is, it is not widely used in TCM translation teaching and the current teaching results have few impacts.

2.3 The Cultivation of TCM Translation Talents with Computer-Aided Translation Deng [24], Jiang [25], Meng and Xiong [26] proposed that universities should set computer-aided translation courses. With regard to translation teaching, students would overly rely on tools. It is unhelpful for their professional ability, because the wrong grammar in machine translation would affect translation. It is very necessary to teach students to use translation tools correctly. But now, there are few practices with computer-aided translation in TCM translation teaching, and this teaching method has not been widely used. Therefore, the reformation of TCM translation teaching has not been achieved.

3 Conclusion The application of computer technology in TCM translation research started in the early twenty-first century. It started later than other research of TCM translation, but the progress is obvious. At present, the lack of diversified methods of publicity is disadvantageous for the transmission of TCM culture. It is necessary to make full use of Internet and network platform, creating more effective and various methods to promote TCM transmission. For the sake of the cultivation of TCM translation talents, scholars set various directions for teaching pattern with the method of combining computer technology with TCM translation. Besides, TCM translation is an inter-disciplinary profession, it is necessary to pay attention to the cultivation of teachers skilled both in TCM and foreign languages. With the progress of science and technology, computer technology is closely related to the development of all walks of life. TCM scholars should insist on the research and application of computer technology, to develop more diversified forms of multimedia, to promote the transmission of TCM culture and make contributions to create international cultural industry of our country. Acknowledgements The author disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: The research was funded by The Doctor’s Start-up Fund, Jiangxi University of Traditional Chinese Medicine (2018WBRW001), China.

320

X. Duan and Y. Peng

References 1. Ye, Q., Wu, Q.: Corpus-based analysis of U.S. media reports on traditional Chinese medicine. World Chin. Med. 10(04), 619–623 (2015) (in Chinese) 2. Luo, Q.: Research on the discourse strategy of the image construction of Chinese medicine from the perspective of evaluation system——taking the English translation of the white paper of “Chinese medicine” as an example. J. Tradit. Chin. Med. Lit. 37(06), 32–36 (2019) (in Chinese) 3. Lin, G., Wang, Y., Shao, X.: Research on the overseas dissemination of translations of Chinese science and technology classics and construction of dissemination paths. Hubei Soc. Sci. (02), 150–161 (2020) (in Chinese) 4. Chen, Y., Shi, Y.: Translation model of clinical teaching for foreign students of Chinese medicine. J. Jiangxi Univ. Tradit. Chin. Med. 01, 54–55 (2006) (in Chinese) 5. Zhang, Y.: Discussion on vocabulary teaching in English teaching of Chinese medicine. Chengdu Univ. TCM (Ed. Educ. Sci.) 12(02), 36–37 (2010). (in Chinese) 6. Cao, Z., Liu, D.: Chinese medical English vocabulary teaching based on self-built corpus. China Metall. Educ. (04), 36–37 + 40 (2017) (in Chinese) 7. Xueqin, D., Dou, C., Yan, L., Gong, Y.: Study on the construction of a small-scale oral English corpus of Chinese medicine. Chin. J. Basic Med. Tradit. Chin. Med. 24(09), 1315–1318 (2018). (in Chinese) 8. Han, L., Yu, J., Wu, H., Yu, Y.: Research on the application of Chinese-English bilingual parallel corpus in higher vocational English teaching——taking TCM bilingual translation talent training as an example. Vocat. Tech. Educ. Forum 08, 75–79 (2017) (in Chinese) 9. Yang, J., Yuan, F.: Research on translation of “Traditional Chinese Medicine English” based on bilingual parallel corpus. Abil. Wisdom (22), 170 (2017) (in Chinese) 10. Wu, B., Liu, M.: Application of data driven method in ESP teaching of Chinese medicine English. Sci. Technol. Inf. 13(02), 143–144 (2015) (in Chinese) 11. Zhang, L.: Research on ESP teaching mode in traditional Chinese medicine hospital——based on special purpose corpus and SPOC platform. J. Sichuan Coll. Educ. 35(01), 24–28 (2019) (in Chinese) 12. Zhao, X.: Analysis of English translation of traditional Chinese medicine and external communication strategies in the new media environment. Int. J. Tradit. Chin. Med. 38(12), 1060–1064 (2016) (in Chinese) 13. Liao, J., Jia, D.: Conception of establishing standards for English translation of Chinese medicine terminology by using network electronic dictionary as a bridge. Chin. J. Integr. Tradit. West. Med. 37(03), 274–276 (2017). (in Chinese) 14. Shi, L., He, Z.: Strategic research on the communication of TCM culture in English-speaking countries under the background of “One Belt One Road”. J. Changchun Univ. Chin. Med. 34(05), 821–825 (2018) (in Chinese) 15. Yin, J., Zhu, H., Ye, Y.: Exploration of the communication of traditional Chinese medicine culture under the “One Belt One Road” strategy. J. Kaifeng Inst. Educ. 39(04), 284–285 (2019) (in Chinese) 16. Zhang, G., Liu, X., Guo, Y., Zhou, Z., Xie, G.: The investigation and application experience of multimedia technology in English teaching of Chinese medicine. Educ. Chin. Med. 04, 40–42 (2004). (in Chinese) 17. Chen, N., Chen, S., Li, X., Zhang, X.: Training of Chinese-English translation talents based on English network teaching. Chin. J. Integr. Tradit. West. Med. Digest. 20(03), 139–141 (2012) (in Chinese) 18. Zhang, J.: Research on the teaching mode of Chinese medical English translation based on the blackboard network platform. West. J. Tradit. Chin. Med. 25(03), 39–40 (2012) (in Chinese) 19. Li, Y., Du, X.: Talking about the teaching of Chinese medical English translation under the platform of “MO Class”. New West (Theor. Ed.) 24, 162–164 (2016) (in Chinese)

A Review of Computer Technology in TCM Transmission …

321

20. Li, L.: A preliminary exploration of the teaching reform model of Chinese medical English with the assistance of multimedia. Chin. Med. Mod. Distance Educ. China 12(10), 66–67 (2014) (in Chinese) 21. Mu, H.: Exploration of the role adjustment of teachers and students in the Chinese medicine hospital under the English reform and network technology environment. Chin. Med. Mod. Distance Educ. China 12(11), 83–85 (2014) (in Chinese) 22. Zhou, J., Ren, R.: Research on the construction of medical English network autonomous learning platform. Chin. J. Med. Educ. 37(04), 547–551 (2017) (in Chinese) 23. Zhao, D.: Research on the introduction of Chinese medicine culture into English teaching in Chinese medicine colleges and universities in the internet age. J. Changchun Univ. Chin. Med. 34(05), 964–966 (2018) (in Chinese) 24. Deng, H.: On the teaching of English courses for Chinese medicine. Sci. Technol. West China 09(30), 71–72 (2010) (in Chinese) 25. Jiang, Y.: Research on the problems and countermeasures of the training model of TCM translators in the translation industry. Educ. Chin. Afterschool (Theory) 201(27), 46–47 (in Chinese) 26. Meng, J., Xiong, L.: Research on the application strategies of machine translation in college English translation teaching in the School of Traditional Chinese Medicine. Comp. Study Cult. Innov. 4(02), 99–100 (2020) (in Chinese)

Intrusion Detection Technology of Internet of Vehicles Based on Deep Learning Rongxia Wang

Abstract This paper aims at the low detection accuracy and slow detection speed of traditional machine learning methods in processing large-scale intrusion data. Based on the in-depth analysis and research of deep learning models and intrusion detection methods, this paper proposes hybrid intrusion detection based on deep learning Model DBN-PBT-TSVM. This article focuses on the application of IDS in VANET. First, introduce the characteristics and development of IDS in VANET; analyze the advantages and disadvantages of the existing IDS algorithms in the industry; propose new IDS and apply it to VANET. This paper proposes a Hidden Markov Model (HMM) filter model suitable for IDS under VANET to reduce the load and detection time without compromising the accuracy of detection. The filter model predicts the future behavior (normal or abnormal) of neighboring vehicles (NVs) to quickly filter messages from these vehicles. Experimental research shows that the intersection point T = 95 is taken as the best point. The filter model proposed in this paper can greatly improve the detection time and load without affecting the detection accuracy. Keywords Deep learning · Internet of vehicles · Intrusion detection technology · Hidden Markov model

1 Introduction In today’s society, the Internet of Vehicles plays an important role in various kinds of areas. A connected car system requires patching known loopholes, preventing malicious car network intrusion is urgently needed. In order to solve the problem of illegal access in the network, people began to introduce intrusion detection systems into network security protection. For example, Zhao X proposed the concept of intrusion detection for the first time and elaborated on it in detail. The potential and unauthorized access to information and the behavior R. Wang (B) Guangzhou Nanyang Polytechnic College, Guangzhou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_40

323

324

R. Wang

of causing the network system to be in an illegal state are all called intrusions, which signifies the research of intrusion detection has risen from this [1]. Aiming at the shortcomings of traditional feature learning algorithms in the face of massive intrusion data, based on the research of RBM training algorithm and BP neural network training. This paper proposes a DBN-based feature learning algorithm, and compares it with traditional feature learning method; a lot of training has been done on its model parameters. Conducted a comparative analysis.

2 Research on Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning 2.1 Commonly Used Deep Learning Models (1)

Recurrent neural network

(2)

Although traditional network models have excellent performance in many fields, most models cannot express this relationship when there is a complex time correlation between the input information [2, 3]. Convolutional neural network 1.

Convolution calculation

2.

In modern biological theories, human perception of the outside world is usually from local to global. In image space, similar theories also exist [4, 5]. The pixels with close connections are closer, and the pixels with weak connections are farther away. That is, the local pixels have strong correlation and the global pixels have weak correlation [6, 7]. Fully connected operation Its essence is to reduce the number of features through matrix multiplication. After the original image undergoes multiple convolution and pooling operations, a high-dimensional feature vector is obtained.

2.2 DBN Algorithm Basis DBN is a deep neural network model composed of many layers of RBM and one layer of BP neural network. Its algorithm basis is the BP algorithm and the RBM model algorithm. BP algorithm mainly obtains its network model structure through the learning process [8]. The learning process is mainly composed of two sub-processes: (1) The FP algorithm process, the original signal is input from the input layer, processed by each hidden layer in turn and finally passed to the output layer. If the result produced by the output layer is the same as the expected result (that is, if

Intrusion Detection Technology of Internet of Vehicles …

325

there is an error between the sample mark), it will go to the error back propagation sub-process; (2) In the sub-process of signal FP, each neuron node in the network has a nonlinear sigmoid activation function: sigm(x) =

1 1 + e−x

(1)

In the error back propagation sub-process, mainly through the gradient descent algorithm, the weights and thresholds of each neuron in the network are repeatedly corrected to achieve the goal of the smallest value    [9, 10].  Suppose   error function there is a data set of m training samples x (1) , y (1) , x (2) , y (2) , . . . , x (n) , y (n) . For a single sample (x, y), we can define its cost function as follows: J (w, b : x, y) =

 1  | h w,b (x) − y |2 2

(2)

For all sample data, the overall cost function is:  J (w, b) =

sl+1 m k−1 sl  1  λ  (i) (i) J (w, b : x , y ) + (w (l) )2 m i=1 2 l=1 i=1 j=1 i j

(3)

2.3 The General Architecture of Network Intrusion Detection the Main Component of the NIDS General Model The main components of the NIDS general model include: detection engine, reference data, configuration data, alarms, analysts, post-processing, traffic capture, and security manager, as shown in Fig. 1.

3 Experimental Research on Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning 3.1 Experimental Environment In order to verify the effectiveness of IDS with filter model, this paper uses NS2 and urban traffic simulation tool (SUMO) for simulation experiments. NS2 is a modular C++ library and framework for network simulation.

326

R. Wang

Detection engine Reference data Configuration Data Siren

Network intrusion detection general architecture

Analyst Post-processing Capture traffic Security Manager

Fig. 1 The main components of the NIDS general model

3.2 Experimental Data Collection This paper evaluates IDS by calculating detection accuracy, detection time (DT) and overhead. The metrics used are described in detail as follows: Accuracy: This is the detection rate of vehicles, that is, the percentage of attacking vehicles classified as attacking vehicles during the simulation time, and the percentage of legitimate vehicles classified as legitimate vehicles. This is also called detection accuracy, and the calculation formula (4) is shown below. Accuracy =

No. of vehicles classified correctly No. of total vehicles

(4)

DT: The detection time is the average processing time of IDS, as shown in formula (5).

processing time of each vehicles DT = (5) No. of total vehicles

Intrusion Detection Technology of Internet of Vehicles …

327

Table 1 Comparison of the efficiency of IDS with and without filters Percentage of attacking vehicles IDS with filter (%) Accuracy DT

IDS without filter Overhead Accuracy DT

Overhead

12

99.53

2.48 0.83

99.39

13.65 3.64

22

99.16

3.68 0.94

99.10

13.46 4.02

32

98.68

4.52 1.24

98.74

13.25 3.52

42

97.38

4.32 1.42

98.53

13.98 3.02

4 Experimental Research and Analysis of Intrusion Detection Technology for Internet of Vehicles Based on Deep Learning 4.1 Validity Verification In this article, the validity of the filter model is verified. First, when the attacking vehicle increases from 12 to 43%, the IDS with the filter model and the IDS without the filter model are compared to verify the effectiveness of the filter proposed. Second, compare the IDS with the filter model with two related articles to verify the superiority of the IDS with the filter model over other related IDS. The experimental results are shown in Table 1. Table 1 shows the comparison between IDS with and without filter model. In the IDS with the filter model, its Overhead and DT can be significantly optimized. Even if attacking vehicles account for 41% of all vehicles, Overhead and DT are significantly better than IDS without the filter model by nearly three times.

4.2 Experimental Analysis of Important Parameters Accuracy, DT and Overhead are affected by the prediction chain length (T). Therefore, it is very important to find its optimal value. Here, taking the case of 30% attack vehicles as an example, the process of obtaining the optimal length of T is described. The results obtained when T) = 419,480 and 100 are shown in Fig. 2. As shown in Fig. 2, there are two intersections between detection accuracy and load. After the second intersection, it can be observed that accuracy increases more and more slowly, while Overhead and DT increase faster. Therefore, the intersection point T) = 95 is regarded as the optimal point. The filter model proposed in this paper can greatly improve the detection time and load without affecting detection accuracy.

328

R. Wang

Fig. 2 Selection of optimal observation chain length

5 Conclusions We proposes a new filter model based on hidden Markov model to reduce the cost and detection time without reducing the detection accuracy. The filter model predicts the future behavior of NVs to quickly identify messages from NVs. In the filter model, considering the trade-off between detection accuracy, detection time and cost, the behavior mode of each NV is modeled as a hidden Markov model. It consists of three modules, namely planning, filtering and updating modules. Acknowledgements Fund Project 1: This is the phased research result of the “Research on Security Mechanism and Key Technology Application of Internet of Vehicles” (Project No: NY-2020KYYB08) from Guangzhou Nan yang Polytechnic College. Fund Project 2: This paper is the mid-stage research result of the project of “Big Data and Intelligent Computing Innovation Research Team (NY-2019CQTD-02)” from Guangzhou Nan yang Polytechnic College.

References 1. Zhao, X., Zhang, Y., Wang, N.: Bolt loosening angle detection technology using deep learning. Struct. Control Health Monit. 26(1), e2292.1–e2292.14 (2019) 2. Al-Yaseen, W.L., et al.: Hybrid modified K-means with C4.5 for intrusion detection systems in multiagent systems. Sci. World J. 2015(2), 294761 (2015) 3. Chuan-Long, Y., Yue-Fei, Z., Jin-Long, F., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5(99), 21954–21961 (2017)

Intrusion Detection Technology of Internet of Vehicles …

329

4. Tabash, M., Allah, M.A.: Intrusion detection model using naive Bayes and deep learning technique. Int. Arab J. Inf. Technol. 17(2), 215–224 (2020) 5. Jallad, K.A., et al.: Big data analysis and distributed deep learning for next-generation intrusion detection system optimization. J. Big Data 6(1), 1–18 (2019) 6. Wang, W., Du, X., Shan, D., et al.: Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans. Cloud Comput. PP(99), 1-1 (2020) 7. Jayaswal, A., Nahar, R.: Detecting network intrusion through a deep learning approach. Int. J. Comput. Appl. 180(14), 15–19 (2018) 8. Tian, Z., Luo, C., et al.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Ind. Inf. 16(3), 1963–1971 (2020) 9. Al-Abassi, A., Karimipour, H., Dehghantanha, A., et al.: An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access PP(99), 1-1 (2020) 10. Goodall, J.R., Lutters, W.G., Komlodi, A.: Developing expertise for network intrusion detection. Inf. Technol. People 22(2), 92–108 (2015)

The Development of Financial Intelligence Driven by Financial Technology in the Background of Artificial Intelligence Wangsong Xie

Abstract Financial intelligence development is an important link in the development of financial enterprises. In the process of intelligent development of traditional finance, financial technology has played an important driving role. It not only optimizes the performance of products, but also makes financial services available, cheap and instant. However, it lacks universality and cannot be applied to all financial enterprise projects. Now is the era of intelligent technology, financial enterprises also comply with the development of the times, actively promote intelligent technology, and introduce it into the normal work of financial enterprises. In view of the current situation of financial intelligence development in China, this paper studies the application and development of intelligent technology in financial enterprises. This paper compares the application of financial intelligence in different age groups of financial enterprises, discusses and analyzes the results, and puts forward the development strategy of financial intelligence driven by financial technology, which provides technical support for the development of financial enterprises. The research in this paper has important practical significance for further promoting the integration of the two, finding problems and reducing risks. Keywords Financial technology · Financial intelligence · Intelligent technology · Artificial intelligence

1 Introduction With the rapid development of Internet technology, artificial intelligence services extended by the Internet have attracted people’s attention, and have been applied in many places, and have been widely evaluated [1–3]. Artificial intelligence has reached a new height in the global discussion, and its influence is also growing [4–6]. Not only in our country, but also in the world. At present, more research is focused on the application of artificial intelligence robots in medical equipment, W. Xie (B) Business School of Wuxi Taihu University, Wuxi, Jiangsu 214064, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_41

331

332

W. Xie

security, voice assistant, intelligent automobile, and other fields. More than 30% of the patent application area of artificial intelligence in China and the United States is concentrated in robots. It is not mature to be specialized in the application of artificial intelligence in the financial field; the vast majority of literature also belongs to the introduction of the specific application of artificial intelligence, and lack of in-depth analysis of the integration of artificial intelligence and finance. This study has a certain theoretical value [7, 8]. As an information industry, the financial industry has the characteristics of big data. In data processing, artificial intelligence has incomparable advantages. Through data mining, machine learning, accurate portrait and other means, artificial intelligence can greatly improve the efficiency of financial business, reduce transaction costs, and broaden the scope of business [9, 10]. Combination of financial industry and artificial intelligence has become an inevitable trend. This paper analyzes the actual situation of the intelligent development of China’s financial industry, and points out that compared with developed countries, our financial industry still lacks in the application of artificial intelligence. This paper establishes the research on the development of financial intelligence driven by financial technology. In the research, according to the characteristics of the financial industry, the introduction of intelligent technology, the effective combination of the two can improve work efficiency and reduce transaction costs, indirectly enhance the competitiveness of the industry. Through the survey and analysis of the satisfaction data of different age groups, this paper believes that the use of intelligent technology under the background of Internet technology can create more profits for the financial industry and provide more quality and convenient services.

2 Intelligent Finance and the Application of Artificial Intelligence in China’s Financial Field 2.1 Intelligent Finance John McCarthy, the father of artificial intelligence, said: artificial intelligence is the machine that makes intelligence, especially the program that makes artificial intelligence. Artificial intelligence imitates the way of thinking of human beings, so that computers can think intelligently. Artificial intelligence studies the way the human brain thinks, learns and works, and then uses its results as the basis for developing intelligent software and systems. Intelligent finance is a financial industry that uses the core technology of artificial intelligence (machine learning, information processing, knowledge mapping, computer vision, etc.) as the main driving force for all participants and business contacts, highlighting the important role of artificial intelligence technology in product innovation, process reengineering and service upgrading. Its participants include not only companies providing artificial intelligence technology services

The Development of Financial Intelligence …

333

for financial institutions, but also traditional financial institutions, emerging financial forms and indispensable regulatory agencies in the financial industry. These participants together constitute an intelligent financial ecosystem.

2.2 Application of Artificial Intelligence in China’s Financial Field In the long-term development of the financial industry, every technology upgrading and business model transformation cannot do without the strong support of technology empowerment and concept. “Llit + finance” 1.0 stage, in the late 1990s, computer and information technology are gradually applied to the daily work processing of financial institutions and financial business, realizing the computerization of accounting for deposit, remittance and loan business, and the improvement of infrastructure such as magnetic stripe card technology, ATM, POS machine, etc., greatly improving the efficiency of data processing and the ability of financial services. In the 2 stage of “Internet plus finance”, Internet technology has expanded the channels of financial services. Big data and cloud computing have improved the efficiency of business processing, and the continuous progress of online banking, mobile phone banking, network credit, personal finance and Internet, and promoting the integration of Finance and technology. At present, we are experiencing the “artificial intelligence + finance” 3.0 era. Since 2014, machine learning, computer vision, information processing and other technologies have been widely used in the financial industry. The emergence of intelligent customer service, intelligent marketing, intelligent risk control and intelligent investment management marks the beginning of the development of China’s intelligent finance.

3 Investigation and Analysis on the Development of Financial Intelligence Driven by Financial Technology Research shows that 95% of the global financial industry takes financial intelligence as the core factor of industry competitiveness. Financial intelligence has gradually penetrated into various fields of the financial industry through the Internet, including intelligent fixed investment, long tail marketing, identity recognition and many other applications. Financial intelligent data mining, accurate portrait and other functions are widely used in the financial industry big customer analysis, characteristic business customization and other fields. Intelligent technology can replace the tedious manual operation, improve the business efficiency, improve the traditional labor inefficient working mode, and effectively ensure the work efficiency and quality of financial workers, so as to improve the competitiveness of enterprises.

334

W. Xie

Table 1 Survey and analysis of financial customers’ willingness to apply intelligent technology Investigation items

30–40 years old (%)

40–50 years old (%)

Do you want to promote intelligent technology

95

81

Actively understand and try to use

91

77

No intention to use

3

14

There are concerns about potential safety hazards

14

36

In the research and analysis, this paper adopts two methods, namely questionnaire survey and sampling survey. 410 customers from 17 financial enterprises in China were selected as the sample. In the process of investigation, this paper found that no matter what age group of customers, in the financial industry is involved in the application of intelligence. In this survey, we divided all customers into two groups by age. One group is 30–40 years old; the other group is 40–50 years old. This paper analyzes the comprehensive situation of the existing intelligent technology of financial industry. The results are shown in Table 1. Based on the survey results of two groups, the application of intelligent technology in the financial industry can enhance the core competitiveness of enterprises.

4 Discussion 4.1 Research and Analysis on Financial Technology First, the nature of financial technology. Foreign scholars’ understanding of financial technology focuses on the technical level, and thinks that financial technology is financial innovation based on Internet technology. Thomas f. DAPP summarized fintech as digitization of the financial sector. In his understanding, financial technology widely covers the most advanced technology in the financial field based on Internet technology, and has been effectively applied in e-commerce, mobile payment and other fields. The FSB defines fintech as technology driven financial innovation. Second, the function and application of financial technology. Many studies from a macro point of view believe that financial technology can enhance the financial function and improve the efficiency of financial operation. Financial technology can reduce the cost of financial services and improve the efficiency of financial services. Financial technology can break through the existing industry boundary, accelerate financial disintermediation, change the creation mode of financial products and services in the existing financial system, and provide personalized financial services. From the perspective of financial support for the development of the real economy, it is proposed that the traditional finance cannot effectively perform the financial function, and the application of financial technology can improve the efficiency by reducing information asymmetry. Third, risks and regulation of fintech.

The Development of Financial Intelligence …

335

Although scholars generally agree that financial technology plays a positive role in reshaping the existing financial structure, many people also pay attention to the risks. It is believed that fintech still has the problems of adverse selection and moral hazard in traditional finance, which is reflected in strengthening the traditional high leverage finance, deepening the contradiction between liquidity and income, which is easy to cause compliance risk and operational risk, and improve the external risk of traditional finance. That is, the vulnerability of financial technology institutions, risk contagion path, information asymmetry and excessive scale of financial technology enterprises. If these four risk factors are met at the same time, it will lead to systemic risk. As can be seen from the analysis results in Fig. 1, 80% of the financial customers in that age group are satisfied with the application of intelligent technology. Intelligent technology plays a role in the financial industry, not only can improve work efficiency, but also can improve the quality of work. Some leaders in the financial industry have more traditional ideas, and it is difficult to give up the traditional ideas. In the study of intelligent technology research and system operation, the conference covering the full application has not been paid enough attention, and the work efficiency of financial intelligent technology has not been given better play. In order to further analyze the scope and depth of financial intelligence in financial technology, the results are shown in Fig. 2. As can be seen from Fig. 2, the depth of the traditional financial work mode to the modern financial work is far less than the full application of intelligent technology. The traditional working mode of financial 30 years old

40 years old

50 years old

100 90

Statistical value(%)

80 70 60 50 40 30 20 10 0 satisfied

commonly

dissatisfied

Statistical items Fig. 1 Customer satisfaction survey on financial intelligence in different age groups

336

W. Xie

Traditional model

Intelligent mode

100 90

Statistical value(%)

80 70 60 50 40 30 20 10 0 Safety comparison

Convenient comparison Statistical items

Cost comparison

Fig. 2 In depth comparative investigation of traditional financial model and intelligent technology

industry has less information technology content, less involved scope, more labor cost, and the working effect is not ideal. After the introduction of intelligent technology, the financial industry has improved its work efficiency, and the work quality has also been significantly improved. They feel the high quality and high efficiency brought by science and technology. They think that the advantages and disadvantages of the application of human financial intelligence in the financial industry are greater than the disadvantages, and that it is necessary to popularize intelligent technology in order to achieve good results in the innovation and reform of the financial industry.

4.2 Advantages of Internet Finance In the traditional financial model, intermediary agencies are the bridge between the supply and demand of funds, but they use the information asymmetry between the supply and demand of funds to obtain fees. In Internet finance, through the transparent media of Internet, the phenomenon of information asymmetry can be completely avoided, and the cost of silence can be reduced. Compared with the traditional financial industry, business approval and processing procedures are complex and time-consuming. Through the emerging mode of Internet finance, the basic business processing can be carried out by computer. The operation process is relatively

The Development of Financial Intelligence …

337

standardized and modular. Fast processing speed; improve the user experience, save time and energy. Specifically, compared with traditional finance, Internet finance has the following four advantages. (1)

(2)

(3)

(4)

Efficiency of resource allocation is high. Compared with the traditional financial methods such as banks, Internet finance can achieve financing in a relatively simple way through banks, exchanges and other intermediate departments, without the negotiation between the supply and demand sides of funds, greatly improving the success rate of capital matching, thus realizing the efficiency of resource allocation. Information exchange in the process of transaction. This method relies on a variety of social networking sites to evaluate and record personal credit or small and medium-sized enterprises. Therefore, repayment situation and credit index can capture relatively wealthy individuals and enterprises to avoid cost information collection and information asymmetry exchange. In addition, Internet finance can judge the default probability of each party in the transaction process in the form of credit rating, reduce the default loss, and realize the smoothness and symmetry of information exchange in this field. Easy access to resources. The traditional financial institutions set many thresholds for the social vulnerable groups, and graded the services and funds, which seriously excluded the financial needs of most people. At the same time, the traditional financial sector has limited contact with the public, which has set up obstacles in time, region and space, which have affected people’s interest in experience. On the contrary, Internet finance has greatly strengthened the transmission mode and scope of financial resources, greatly reduced financial exclusion, and opened more efficient financial services for more users. Degree of virtuality and informatization is strong. As the elements of the Internet era, virtuality and information have become an indispensable part of the life of the majority of users. The traditional financial institutions do not have the characteristics of virtual enterprises, and the process is more convenient. The preservation and convenient use of electronic data are far from the traditional financial methods.

5 Conclusions In the process of studying the development of financial intelligence, this paper takes the introduction of financial intelligence into the financial industry as the main line of research. After research, this paper believes that financial intelligence is an indispensable important technical basis for financial enterprises. Through the investigation and analysis of different age groups of financial enterprises, their satisfaction with intelligent technology is obtained. In recent years, China’s intelligent technology has developed rapidly, and has broken through many core technical points, which is in the leading level at home and abroad. Financial intelligence technology gives full play to its advantages of data mining and machine learning, and is widely used in

338

W. Xie

various fields of financial industry. Through the investigation and analysis, intelligent technology in the development of financial work can improve business efficiency, reduce transaction costs, broaden the scope of business and other advantages, and can increase the competitiveness of enterprises. With the help of intelligent technology, enterprise practitioners have been able to extricate themselves from all kinds of complicated work and even assist people to do accurate data analysis. Therefore, the value of intelligent technology has been recognized by enterprises. Through the research results of this paper, it can be seen that for financial enterprises, if they want to make full use of intelligent technology, they must integrate the intelligent technology with the actual business process of enterprises effectively. In the effective analysis of the development process of intelligent technology in the work of financial enterprises, we should focus on the actual situation of enterprises, pay attention to the scientific introduction, combine with the actual work content, effectively formulate development strategies, ensure the effective development of financial enterprise work, and steadily improve the work efficiency. This research has achieved ideal results and made a contribution to the development of financial intelligence in the work of financial enterprises.

References 1. Sheridan, I.: MiFID II in the context of financial technology and regulatory technology. Cap. Mark. Law J. 12(4), 417–427 (2017) 2. Dovydaitis, J., Jasinevicius, R., Petrauskas, V., Vrubliauskas, A.: Training, retraining, and selftraining procedures for the fuzzy logic-based intellectualization of IoT&S environments. Int. J. Fuzzy Syst. 17(2), 133–143 (2015) 3. Wang, G., Liu, F., Pang, Y., Ren, H., Ma, Y.: Coal mine intellectualization: the core technology of high quality development. Mtan Xuebao/J. China Coal Soc. 44(2), 349–357 (2019) 4. Philippon, T., Reshef, A.: Wages and human capital in the U.S. finance industry: 1909–2006. Q. J. Econ. 127(4), 1551–1609 (2017) 5. Gould, D.M., Melecky, M., Panterov, G.: Finance, growth and shared prosperity: beyond credit deepening. J. Policy Model. 38(4), 737–758 (2016) 6. Lee, N., Sameen, H., Cowling, M.: Access to finance for innovative SMES since the financial crisis. Res. Policy 44(2), 370–380 (2015) 7. Jenter, D., Kanaan, F.: CEO turnover and relative performance evaluation. J. Finance 70(5), 2155–2183 (2015) 8. Feenstra, R.C., Li, Z., Yu, M.: Exports and credit constraints under incomplete information: theory and evidence from China. J. Finance Econ. 96(4), 729–744 (2017) 9. Fanning, K.M., Cogger, K.O.: Neural network detection of management fraud using published financial data. Intell. Syst. Acc. Finance Manag. 7(1), 21–41 (2015) 10. Campbell, J.Y., Cocco, J.F.: A model of mortgage default. J. Finance 70(4), 1495–1554 (2015)

Analysis of Human Factors in Hazardous Chemical Storage Accidents Based on HFACS and Bow-Tie Model Wei Jiang, Wei Han, Mingqing Su, Jiankai Zhou, Zhishun Huang, Xueqing Zhou, and Haotang Zhang

Abstract This paper used human factors analysis and classification system (HFACS) and Bow-tie model to analyze a sulfuric acid tank leakage accident occurred in Hongshen Trading Co., Ltd. to identify the human factors hidden behind the accident. Firstly, the HFACS model is used to analyze the accident, and four levels of accident factors under the model were obtained. Then, taking the unsafe act of “illegal welding operations on storage tanks” as an example, the bow-tie model was used to analyze its consequences in this accident. According to the causes and consequences of unsafe act, the bow-tie model is used to establish preventive measures and control measures respectively to control the human factors of accident. Finally, a complete Bow-tie diagram of “illegal welding operations on storage tanks” was obtained. The accident analysis method using HFACS and Bow-tie model can fully identify the human factors in this leakage accident and provide reference for accident investigation. Keywords Hazardous chemicals · Accident analysis · HFACS · Bow-tie · Human factors

1 Introduction Related research shows that human factors play an important role in the occurrence of hazardous chemicals accidents in China. For example, Zhang and Zheng [1] analyzed the 1632 accidents involving hazardous chemicals in China from 2006 to 2010, and pointed out that most of the hazardous chemicals accidents were caused by human factors as direct causes of accidents. Therefore, it is necessary to analyze and control the human factors in the storage accident of hazardous chemicals. W. Jiang (B) · M. Su · J. Zhou · Z. Huang · X. Zhou · H. Zhang School of Emergency Management and Safety Engineering, China University of Mining & Technology (Beijing), Beijing 100083, China e-mail: [email protected] W. Han Chongqing Banan Port and Shipping Management Center, Chongqing 400054, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_42

339

340

W. Jiang et al.

The study of human factors originated in the aviation field, such as the Software, Hardware, Environment, and Liveware (SHEL) model [2], the Human Factors Analysis and Classification System (HFACS) model [3]. As research progresses and develops, these models are gradually being introduced into other fields [4–8]. The human factor in the cause of the accident can be obtained by using the model, and it can be traced from the surface behavior to the deep organizational reason. The bow-tie analysis method has been widely used in security management and risk analysis in various industries. It can analyze and control security risks more directly and concretely [9–12]. The Bow-tie model can establish preventive measures for the cause of the accident, and can analyze the consequences of the accident, and propose control measures to mitigate the impact of the consequences. This paper will take the HFACS model as the basis and integrates the Bowtie analysis method to study the leakage accident of sulfuric acid storage tank of Hongshen Trading Co., Ltd., in order to better realize the analysis and identification of human factors in the storage of hazardous chemicals.

2 Human Factor Analysis Model of Hazardous Chemical Storage Accident It was mentioned in the introduction that HFACS is an analysis and classification tool for accident causes, it can analyze the unsafe acts and the system causes. However, it can only explain the cause of the accident to a certain extent, and lacks corresponding execution measures in control and prediction. Besides, Bow-tie model is an accident modeling method that integrates accident tree and event tree and comprehensively analyzes the causes and consequences of an event. It can establish corresponding safety barrier for the causes of the event, and propose corresponding control measures to mitigate the impact of the consequences, just to make up for the shortcomings of the HFACS model. Based on the above reasons, this paper combines HFACS and Bow-tie model to analyze the human factors in hazardous chemicals storage accidents. Firstly, the HFACS model is used to analyze the four levels of content that lead to accident. Then, the Bow-tie model is used to analyze the consequences of unsafe act in this accident. Finally, the Bow-tie model is used to establish preventive measures and control measures, and to control the human factors of accidents. The combination of HFACS and Bow-tie model is shown in Fig. 1.

Analysis of Human Factors in Hazardous Chemical Storage …

341

Fig. 1 Combination of HFACS and Bow-tie models

3 Case Study 3.1 Accident Description At 15:20 on March 1, 2013, the no. 2 sulfuric acid storage tank of Hongshen trading co., ltd. in Jianping county, Chaoyang city, Liaoning province burst and broke the flange of the lower connecting pipe of no. 1 storage tank, resulting in the overflow of about 26,000 t of sulfuric acid in two tanks, causing 7 deaths and 2 injuries. The overflowing sulfuric acid flows into the nearby farmland, riverbed and highway culvert, causing more serious secondary environmental disasters, resulting in direct economic losses of 12.1 million Yuan.

3.2 HFACS Analysis This paper taking the unsafe act “illegal welding operations on storage tanks” as an example, and the HFACS model is used to analyze it in detail. Welding workers who violated regulations for welding on tanks filled with sulfuric acid were one of the important causes of the accident. The welding operation is carried out directly on the tank filled with sulfuric acid without taking precautions such as effective isolation and ventilation. The flame generated during the welding process encounters a hydrogen-oxygen mixed gas that reaches the explosion limit in the storage tank, causing a gas explosion, which then causes the No. 2 tank to burst instantaneously and the concentrated sulfuric acid overflows. According to the accident investigation report, the management personnel responsible for the maintenance did not care in the occurrence of such unsafe acts before, causing the employees to get used to nature. Therefore, this is classified as a “Routine violation”.

342

(1)

W. Jiang et al.

Preconditions for unsafe acts

The unsafe act of the welding worker is caused by insufficient training. According to the accident investigation report, the welding workers only have high school education and have not received professional and effective training, causing the lack of knowledge of welding, such as hot work safety regulations, hot fire analysis and qualification standards. It can be seen that the welder does not have the ability to properly implement the safety operating procedures, which means that the welder is not prepared for their job. (2)

Unsafe supervision

In terms of unsafe supervision, there are two types of human error. First, the investigation report pointed out that when five welders were welding on sulfuric acid storage tanks, there were no supervisors on site. In addition, Hongshen Trading Co., Ltd. is not equipped with a corresponding monitoring and alarm system in the sulfuric acid storage tank area. Therefore, it can be inferred that the welder was not adequately supervised during the welding operation and did not receive guidance on how to safely perform the welding operation. Second, the lack of “personal readiness” of welders indicates that managers do not provide appropriate training for employees in their daily work. Therefore, these are classified as “inadequate supervision.” In addition, the sub-category “planned inappropriate operations” refers to the improper combination of work groups, which is also obvious because five poorly trained welders were arranged to weld together and there were no fire monitors on site. (3)

Organizational influences

The above analysis reveals the shortcomings of Hongshen Trading Co., Ltd. in terms of organizational influence. The company did not pay attention to the review and employment of special operation personnel. And the company had insufficient staffing; resulting in five welders in the welding operation, there is no supervisor on site. It can be seen that Hongshen Trading Co., Ltd. has loopholes in human resource management. In terms of organizational process, the organization has deficiencies in program documentation and work instructions. The company did not establish and implement the safety technical operation procedures for welding operations, which caused the welding workers to be unclear about the matters needing attention and the risks in the operation process. Due to the limited space, the analysis process of other unsafe acts will not be described in detail. The analysis results can be seen in Fig. 2.

Analysis of Human Factors in Hazardous Chemical Storage …

343

Fig. 2 Bow-tie diagram of “welding outside storage tank in violation of regulations”

3.3 Bow-Tie Analysis This paper used Bow-tie analysis to conduct an in-depth study of the unsafe act that led to the accident. Taking the unsafe act as the top event in the Bow-tie model, the reasons for the unsafe act were drawn on the left side of the Bow-tie diagram, and the corresponding safety barriers were established according to different reasons, and preventive measures were proposed. Then the Bow-tie model was used to analyze the consequences of unsafe acts, and the safety barriers that reduce the impact of the consequences were analyzed according to different consequences, and control measures were proposed. At the same time, factors that may cause the safety barrier to fail (interference factors) should be considered. Therefore, some low-effective safety barriers should be analyzed and controlled. The Bow-tie analysis was done primarily using Bow-tie XP (Version 9.6.2) software. (1)

Identify top event

According to the previous HFACS analysis, due to the unsafe act of the welder, “illegal welding operations on storage tank” directly led to a series of subsequent events, resulting in serious casualties, property damage and environmental damage. Therefore, it was selected as an example of the top event in the Bow-tie model, and the corresponding source of hazard was a tank filled with concentrated sulfuric acid. (2)

Identify threat events

The threat events in the Bow-tie analysis were mainly determined based on the results of the HFACS analysis. It mainly includes the following four points: (1) the welder lacked relevant welding process knowledge and skills; (2) there were no fire control personnel at the work site; (3) the team was not properly matched; (4) the enterprise

344

W. Jiang et al.

human resource management was flawed. These four aspects of the content directly or indirectly caused the occurrence of welder’s unsafe act. (3)

Identify consequence events

Due to the welder’s illegal welding work on the tank, the No. 2 tank burst and the concentrated sulfuric acid overflowed. Moreover, due to the debris from the bursting of the No. 2 tank flew out, and the flange of the No. 1 tank connection pipe was broken, resulting in a large amount of sulfuric acid leakage in the No. 1 tank. In the end, about 26,000 tons of sulfuric acid leaked from the two storage tanks and flowed into nearby fields, riverbeds and highways, and all of the seven people on the site died. Therefore, the consequences of the unsafe act of the welder are determined as follows: (1) tank rupture, concentrated sulfuric acid overflow; (2) casualties; (3) environmental damage. (4)

Safety barrier analysis

For the analyzed threats and consequences, use the Reason’s “barrier” principle to set up multi-layer of barriers for each “threat” and “consequences” for prevention and control, thereby reducing the likelihood of top events and reducing the severity of the consequences. In terms of preventive measures, safety barriers for welders lacking knowledge and skills of welding process include: (1) work after obtaining relevant qualifications; (2) strengthen training and safe operation skills of welders; (3) regularly assess the knowledge and skills of welders. The safety barriers for that did not supervise and manage the work site include: (1) arranging personnel to supervise the site; (2) installing a monitoring and alarm system next to the tank. The safety barriers for team was not properly matched include: (1) optimize team members and select high-quality personnel as team leader; (2) provide sufficient rest time for front-line employees; (3) regularly assess team cooperation and working attitude. The safety barriers for enterprise human resource management defects include: (1) adequate management personnel in the safety and production departments; (2) strengthening the qualification review of employees and strict employment standards; (3) establishing employee training files and preserving training records. In terms of control measures, the safety barriers of concentrated sulfuric acid overflow caused by tank rupture include: (1) selecting qualified sulfuric acid storage tank materials; (2) reinforce the sulfuric acid tank. The safety barriers for casualties include: (1) regular emergency rescue drills; (2) timely medical rescue after the explosion. The safety barriers for environmental damage include: (1) establishing a reservoir; (2) establishing safety protection facilities such as protective dikes. (5)

Identify interference factors and corresponding safety barriers

According to the above analysis, the bow-tie diagram with the top event as “illegal welding operations on storage tank” can be obtained, as shown in Fig. 2. In Fig. 2, the causes, consequences, preventive measures, control measures, interference factors and their interrelations of the welder’s unsafe act “illegal welding

Analysis of Human Factors in Hazardous Chemical Storage …

345

operations on storage tank” are clearly presented. From the left half of the Bow-tie diagram, it can be seen that (1) the welder lacks relevant welding process knowledge and skills; (2) did not supervise and manage the job site; (3) the team is not properly matched; (4) the enterprise human resource management defect, this four reasons lead to the occurrence of unsafe act, and this is also the weak link of enterprise safety management. But at the same time, if the company realizes these problems early, it can stop the unsafe act of the welder from the source. From the right half of the Bow-tie diagram, it can be known that if select the sulfuric acid storage tank material that meets the national standard at the beginning, then it is possible that the storage tank will not burst and the staff has enough time to carry out handling; this may result in no casualties. In addition, regular emergency drills and good medical support will reduce casualties. In terms of environmental damage, because the characteristics of hazardous chemicals determine the occurrence of an accident, it is easy to expand the consequences of the accident and affect the surrounding residents and the ecological environment. Therefore, before constructing a sulfuric acid storage tank, a risk assessment should be carried out to calculate the maximum impact area of possible accidents and control measures should be taken, such as the establishment of liquid storage pool, the establishment of protective dike and other safety measures mentioned in the bow-tie diagram. The analysis of the interference factors in the Bow-tie diagram is a more important issue for the hazardous chemicals storage enterprises, because it involves more establishments of the organization procedures and effective implementation. It is related to the normative operation of the various stages of the enterprise. It solves the root cause, the collective problem, not the superficial, personal problem. In summary, the defects in human resources management in this accident are the key causes of unsafe act of welders, and strict control of tank materials is the most effective control measure to reduce the impact of unsafe act. In addition, the analysis and control of interference factors in enterprises have the greatest benefit in curbing the occurrence of accidents and the consequences of accidents.

4 Conclusion In summary, the following conclusions are obtained: (1) (2)

(3)

The HFACS model was used to analyze the sulfuric acid leakage accident of Hongshen trading co., LTD., the unsafe acts and accident factors were obtained. The bow-tie model was used to conduct an in-depth analysis of the unsafe act and the complete bow-tie diagram was obtained. Then, the root cause and the accident consequences were obtained, and the corresponding preventive measures and control measures were established. In this accident, the defects in human resource management is the key cause of unsafe behavior. Besides, strictly controlling storage tank materials is the most effective measure to reduce the impact of unsafe behavior.

346

W. Jiang et al.

(4)

The combination of HFACS and bow-tie model can realize the comprehensive identification of human factors in the accident.

Acknowledgements This work was supported by the College Students’ Innovation Training Program (project number: C201912540) and the Postgraduate Research and Innovation Ability Improvement Project (project number: 2020YJSAQ19).

References 1. Zhao, L., Qian, Y., Hu, Q.M., et al.: An analysis of hazardous chemical accidents in China between 2006 and 2017. Sustainability 10(8), 2935–2953 (2018) 2. Zhang, H.D., Zheng, X.P.: Characteristics of hazardous chemical accidents in China: a statistical investigation. J. Loss Prev. Process Ind. 25(4), 686–693 (2012) 3. Edwards, E.: Man and machine: systems for safety. Outlook Saf. 21–36 (1973) 4. Patterson, J.M., Shappell, S.A.: Operator error and system deficiencies: analysis of 508 mining incidents and accidents from Queensland, Australia using HFACS. Accid. Anal. Prev. 42(4), 1379–1385 (2010) 5. Chauvin, C., Lardjane, S., Morel, G., et al.: Human and organisational factors in maritime accidents: analysis of collisions at sea using the HFACS. Accid. Anal. Prev. 59(5), 26–37 (2013) 6. Cohen, T.N., Francis, S.E., Wiegmann, D.A., et al.: Using HFACS-healthcare to identify systemic vulnerabilities during surgery. Am. J. Med. Qual. 33(6), 614–622 (2018) 7. Baysari, M.T., Caponecchia, C., Mcintosh, A.S., et al.: Classification of errors contributing to rail incidents and accidents: a comparison of two human error identification techniques. Saf. Sci. 47(7), 948–957 (2009) 8. Hale, A., Walker, D., Walters, N., et al.: Developing the understanding of underlying causes of construction fatal accidents. Saf. Sci. 50(10), 2020–2027 (2012) 9. Parkinson, H.J., Bamford, G., Kandola, B.: The development of an enhanced bowtie railway safety assessment tool using a big data analytics approach. In: International Conference on Railway Engineering, vol. 1(9), pp. 1–9 (2016) 10. Bilal, Z., Mohammed, K., Brahim, H.: Bayesian network and bow tie to analyze the risk of fire and explosion of pipelines. Process Saf. Prog. 36(2), 202–212 (2017) 11. Mokhtari, K., Ren, J., Roberts, C., et al.: Application of a generic bow-tie based risk analysis framework on risk management of sea ports and offshore terminals. J. Hazard. Mater. 192(2), 465–475 (2011) 12. Clothier, R., Kourousis, K., Massey, K.: The PBP Bow-Tie framework for the systematic representation and comparison of military aviation regulatory frameworks. Aeronaut. J. 118(1210), 1433–1452 (2016)

Research on the Control System of Intelligent Discrimination of Electricity Stealing and Omission Chang Su, Chao Yang, and Cong Tian

Abstract With economic development and social progress, China’s power market has expanded and the level of electricity consumption has increased. The continuous increase of power equipment and the scale of power consumption have led to the theft of electricity in every power consumption field. In order to prevent the occurrence of electricity theft accidents, a CMOS-based multi-functional control system of intelligent detection of electricity theft and leakage is studied in this paper. A multifunctional protection chip is designed to discriminate electricity stealing and omission, which is not only suitable for low-voltage power distribution systems, but also for high-voltage and other different power distribution systems. The chip is designed with three main functions: protection for stealing electricity, alarm for stealing electricity and protection for over load. It adopts the digital delay circuit design and improves the traditional power theft and omission control system. The RC delay circuit is adopted in the relevant time control circuit, and the function of judging the validity of the input signal and the optional application function of multiple protection levels are added. At the same time, the switch control circuit and alarm circuit are designed to fully control the state and action of the distribution system. The design of the band gap reference, operational amplifier, logic operation and other circuits required within each functional module in the system is completed. The functions and performance indexes of the control chip of the intelligent discriminator are set up and the overall circuit of the digital part is simulated. The experimental results show that the function and performance indexes set by the chip are satisfactory and conform to the various fields of electricity consumption involved at present. Keywords Electricity theft screening · Electricity omission control system · Intelligent control chip · Digital circuit system

C. Su (B) · C. Yang · C. Tian Heilongjiang University of Technology, Heilongjiang 158100, Jixi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_43

347

348

C. Su et al.

1 Introduction Nowadays, electricity theft is characterized by diversification and specialization. Although there are many devices to prevent electricity theft and other functions in our life, the means of stealing electricity are endless and more and more concealed. Due to the lack of continuous control of power metering equipment, evidence cannot be obtained through detection, and there is no method to prevent the occurrence of power theft [1, 2]. In recent years, electricity theft has often occurred and remained existing despite repeated prohibition, which has deep reasons behind it. With the rapid development of China’s power grid industry, the rapid development of quantity inevitably leads to unsatisfactory quality [3]. Therefore, maintenance and monitoring efforts have been reduced while the power network has been developed. The people’s legal awareness and power awareness are not high, and they don’t realize that stealing electricity is an illegal and criminal act [4]. Although the overall quality of the people is improving, the understanding of the commodity attributes of power resources is still not strong enough. There are errors and loopholes in the work of power workers and units. Some preventive work has not been done well, and even collusion has led to lawless elements [5]. In the current process of people using electricity, this kind of electricity stealing is more common. Some people reduce the voltage in the meter by some means, specifically, by removing the wires in the meter, which shows little or no voltage flow, thus reducing the number of meters. Using this method can reduce nearly half of the electricity consumption measured by the meter [6]. In addition, the purpose of stealing electricity can also be achieved by contacting the wires with voltage. Under the premise of ensuring the normal flow of the current in the line, the voltage value is controlled and the power theft occurs, which causes the meter to be unable to perform normal metering work [7]. In a three-phase four-wire electric meter, illegal personnel disconnected the connecting components, resulting in no voltage in the circuit. Through this operation, the electric meter malfunctions and cannot accurately record the electricity consumption. In addition to the above-mentioned change in the voltage in the meter loop to achieve the power theft effect, the current can also be processed to cause the meter to fail, so that no current flows in the line and the amount of current decreases. This method can also reduce the total amount of meters measured [8]. Electricity theft is always a difficult problem for the power sector, which will affect power supply efficiency, line loss inspection, and electricity bill settlement. At the same time, the act of stealing electricity also affects the power supply order and economic benefits of power companies, as well as social stability and China’s economic development [9]. Although the national power supply companies have increased their supervision and used some advanced equipment to prevent electricity theft, the thief still uses various tools and methods to cope with the inspections of the power companies. Therefore, it is extremely important for electricity companies to use effective technologies and methods to prevent electricity theft. Nowadays, the more common ways of stealing electricity mainly include the following: One is to

Research on the Control System of Intelligent Discrimination …

349

change the current and voltage parameters in the electric energy meter [10]. The electric energy meter is mainly used as an important device for electric energy query and electricity bill calculation. This way of stealing electricity is mainly carried out by the reverse polarity of the current and the modification of the metering circuit and the reverse phase sequence of the voltage.

2 Algorithm Establishment 2.1 Current Source of Stealing Power Based on Addition In order to obtain a simplified expression as a function of the temperature of the control voltage, the size of the device is adjusted to meet the compensation curve at all process angles, but the oscillation frequency of the oscillator will not exceed a few MHz. This program is to find the key factors that determine the oscillation frequency, so that it remains constant under different processes and temperatures. The oscillation period of the N-level current starved ring oscillator is: Tosc =

NCeff VDD ibias

(1)

The relative discrete variance of the oscillation period is: σT2

 σc2 − WID 2ai r N i=1 σci 2 2 ∼ − = σI + σc − D2z + N N

(2)

This technology uses the grid frequency as the reference frequency to time the frequency deviation of the oscillation circuit, and eliminates the frequency dispersion of the clock generation circuit by adjusting the control current or voltage of the oscillation circuit. The frequency dispersion of power grids in most countries is very small, within ±1%. This accuracy is enough for most applications in the power electronics field. The on-chip relaxation oscillator verifies the effectiveness of the self-calibration technique.

2.2 Algorithm of Electricity Omission Control System Reliability evaluation index of stability control system: The repair rate refers to the probability that a component in a failed state at time t will be repaired within a unit time, usually expressed by μ: 1 P[t < T ≤ t + t|T t] t→0 t

μ(t) = lim

(3)

350

C. Su et al.

However, since the stability control state or system is always in running or repair, the availability can be calculated by the following formula: A=

MTTF MTTF + MTTR

(4)

Probability of failure on demand (PFD) represents the probability of a dangerous failure during system operation. Drawing lessons from the relevant experience of safety instrumented system reliability assessment; PFD is used as a standard to measure the reliability of special protection systems (SPS). On the basis of PFD, it is recommended to adopt the safety integrity level (SIL) as the reliability evaluation index of the system integrity protection scheme (SIPS). The determination of reliability evaluation index depends on the establishment of reliability model. The reliability modeling of stability control system generally can adopt two kinds of methods, analytical method and simulation method. The analytical method combines the control architecture of the stability control system, and takes into account the logical relationship between the stability control devices and the device and the system, to perform reliability evaluation calculations, including the reliability block diagram method, the fault tree analysis method and the Markov model method Wait.

2.3 Digital Circuit System In order to be able to guarantee the linear performance of the control system for intelligent detection of electric theft and omission, the error of the control system is calculated and the specific process is as follows: L=

0.4 · π · N2 · Sc × 10−8 Lg + Lc /μ

(5)

The parameter design of the intelligent detection of electric theft and omission control system: 

I0 = P0 /U0 P0 = Pmax η = Umax Imax η

(6)

The results of simulation and comparison experiments show that compared with the existing anti-interference circuit of the control communication system for the detection of the electricity omission, the designed anti-interference circuit of the control system for the detection of electric theft and omission greatly improves the anti-interference performance, which fully illustrates the anti-interference circuit designed of the control communication system for the detection of electric omission has better performance.

Research on the Control System of Intelligent Discrimination …

351

2.4 Determination of the Number of BP Neural Network for Electric Theft Detection Algorithm The BP algorithm is a supervised learning algorithm. Its learning process consists of two processes: the forward propagation of the signal and the back propagation of the error. The signal is input through the input layer, the characteristics of the input signal are sorted out and calculated by the hidden layer, and then the signal is output through the output layer. If the actual output does not match the expected output, the output error is transmitted back to the input layer by layer through the hidden layer in some form. And the error is distributed to each unit of each layer, so as to obtain the error signal of each unit of each layer. The weight coefficient of the network is adjusted by the back propagation of the error. It is repeated until the output reaches the expected effect and the network training is completed. The BP algorithm has simple principles and strong practicability, and many problems can be solved by it. Therefore, the BP model has become one of the important models of neural networks.

3 Modeling Method 3.1 Construction of Improved BP Neural Network Model The BP model is divided into input, hidden and output layers, and data analysis is completed through forward and reverse signal propagation. In the process of back propagation, the weight and threshold adjustment of each neuron in the hidden layer directly affect whether the feedback error meets the requirements, so dynamic adjustment is required, that is, multiple iterations. Em is the error between the estimated value and the actual value, reflecting the overall error of the result; the error percentage of a single sample of EC is shown in the following formula:  n−1 Em Ec =

i=1 (di

− oi )2



N−1

(7)

Oi − di × 100% di

(8)

di − dmin + β dmax − dmin + β

(9)

Normalization processing: di = ∝

352

C. Su et al.

 −1 u(k + 1) = ω(k) − JT J + μI JT e

(10)

 −1 b(k + 1) = b(k) − JT J + μI JT e

(11)

The improved BP neural network model first determines the value through coefficients, arranges the performance indicators in ascending order, and then divides them into different clusters. The center sample of each category is the initial center point of the category. The LM method is used to calculate the minimum value of the error function in the back propagation process, and the weights and thresholds of the standard BP neural network model are iteratively adjusted to improve the calculation accuracy. The LM method normalizes the input variables of the BP neural network model and maps them to (0, 1) to improve the calculation speed.

3.2 Actual Model Based on Comparative Equivalent Circuit Similarly, the effectiveness of the model can be verified by comparing the equivalent circuit with the simulated waveform of the actual system. For a synchronous boost converter with LEM, the inductor current at the sampling point is the peak value of its inductor current. By comparing the equivalent models in the two cases, it can be seen that the elements in the second row of M are equal in size and have opposite signs. If the derivative of the local characteristics is investigated, although in the sense of small signal, when d[k] > 0.5, the conclusion of 2d[k] − 1 > 1 − 2d[k]) can be drawn; but in the global scope, there are always reasons for inconsistencies between the predicted results and the simulated results. It can be found from the equivalent circuit that for TEM, since D ∈ [0,1] is always greater than 0, so the other two coupled controlled sources directly provide the power path from the input port to the output port and support load voltage. Therefore, when load interference occurs, the voltage on the output port is more stable.

4 Evaluation Results and Research 4.1 The Relationship Between the Amount of Electricity Theft and Current Figure 1 shows the data of the relationship between the amount of electricity theft and the current based on the intelligent identification of the electricity omission control system. As shown in Fig. 1, the phenomenon of the amount of theft and electricity is inversely proportional, regardless of the size of the electric current, only the amount stolen is always smaller than the power stolen current. The following conclusions

Research on the Control System of Intelligent Discrimination …

353

120 100

Kv

80 60

0

10

20

30

40

35

31

28

26

25

23

20 21

22

22

22

40 22

37

35

30

50

Steal current

60

42

43

39

41

70

80

47

45

90

100

TheŌ

Fig. 1 The relationship between the amount of electricity theft and the current based on the intelligent discrimination leakage control system

can be drawn from the data of the 10–100 kV mid-term intelligent discrimination of the power stolen and omission control system. The design of the installation interface of the control system for intelligently discriminating the electric omission. The seals in this control system will have a direct impact on the leakage of the system. Therefore, in the design of the control system for intelligent detection of electric leakage meter, on the one hand, attention should be paid to the choice of sealing material and size; on the other hand, attention should also be paid to the design of interface features. Especially for the solenoid valve, the sealing performance directly affects the performance of the intelligent electricity omission control system. For example, where the plug is installed, attention should be paid to the control of aperture, roughness and roundness, and the control of aperture tolerance and chamfer size should be paid attention to for the intelligent detection of electricity omission control system. Material selection and matching of valve body and hydraulic components. Leakage meters usually use cast iron alloy and cast aluminum alloy. Under high temperature conditions, the thermal expansion coefficient of cast iron alloy is much greater than that of cast aluminum alloy. Therefore, the hydraulic valve body leakage caused by cast iron alloy is relatively large. Simultaneously, the spool and hydraulic valve body should try to choose materials with similar thermal expansion coefficients so as to reduce the difference in thermal expansion under high temperature conditions, thereby reducing leakage. As shown in the figure above, the combination of aluminum valve/aluminum valve body is better than the combination of intelligent detection of electricity omission control system (Table 1). As shown in Fig. 1, according to the control system of intelligent detection electricity stealing and omission, when 50 Hz AC is stolen and the shock current is 60 mA or below, the stolen electric quantity is greater than the stolen electric current. In this intelligent detection control system where the chip is applied at different levels, the peripheral circuit can be adjusted to make the same operating voltage correspond to the different external leakage currents. Different protection levels can intelligently discriminate the relationship between the operating voltage and operating time in the system.

354

C. Su et al.

Table 1 The relationship between the stolen current, voltage and segment time based on the control system of intelligent discrimination of electricity stealing and omission Application level

Stolen current (mA)

Voltage (kV)

Segment time (s)

Stolen current (mA)

Voltage (kV)

Segment time (s)

Last-level user

40

10

0.01

50

20

0.03

Intermediate

80

10

0.02

70

20

0.06

General A

250

10

0.3

300

20

0.5

General B

600

10

0.7

650

20

0.62

4.2 Electricity Theft Protection Measures Based on the Control System of Intelligent Discrimination of Electricity Stealing and Omission At present, people can use methods such as the control system of intelligent discrimination of electricity stealing and omission to implement effective protection of distribution lines and improve the rationality and orderliness of line layout. By separating the metering device and the voltage device in the power supply system, it helps to ensure the accuracy of normal power supply and metering data during the installation and connection of the meter, which can reduce the pressure of the daily management work of relevant enterprises, improve the convenience of the management work, control the fund expenditure of the system operation, and greatly improve the prevention effect of the theft of electricity, so as to provide basic guarantee for the long-term operation of relevant enterprises. Before the power connection of the control system of intelligent discrimination of electricity stealing and omission, the relevant workers should reasonably determine the capacity of application based on the user’s electricity consumption. On the basis of this, it is helpful to eliminate the hidden trouble of the front connection of this intelligent discrimination control system by comprehensively grasping the law of electricity consumption. In addition, during the installation operation, the staff can install the voltage losing and current cutoff equipment in the metering system, which can play the role of real-time monitoring. Once the abnormal situation occurs, the system background can timely activate effective information to determine the location of electric theft.

5 Conclusion After analyzing and researching the above content, it is concluded that in operation and management, power companies must pay more attention to anti-theft problems, analyze existing methods of power theft, and adopt targeted anti-theft measures. Reasonably apply wireless communication technology to anti-theft operations, and

Research on the Control System of Intelligent Discrimination …

355

establish a unified electricity consumption information collection system to monitor the electricity before operation. Under the power grid situation, promptly detect and deal with the theft of electricity to avoid causing serious economic losses to the enterprise. In general, wireless communication technology mainly adopts three technologies: wireless self-healing, wireless co-frequency interference and low power consumption. The task of these technologies in the process of preventing power theft is to collect data regularly, compare the total power of the primary side current and the total power of the secondary side current, and check the specific state of the client and terminal, so as to effectively prevent the occurrence of power theft. Acknowledgements This paper is supported by Natural Science Foundation Project of Heilongjiang province (Grant No.LH2019F050). The name of the project is “Research on the control system of intelligent discrimination of electricity stealing and omission”.

References 1. Jamil, F., Ahmad, E.: Policy considerations for limiting electricity theft in the developing countries. Energy Policy 129, 452–458 (2019) 2. Ahmad, T., Chen, H., Wang, J., et al.: Review of various modeling techniques for the detection of electricity theft in smart grid environment. Renew. Sustain. Energy Rev. 82(PT.3), 2916–2933 (2018) 3. Tao, J., Michailidis, G.: A statistical framework for detecting electricity theft activities in smart grid distribution networks. IEEE J. Sel. Areas Commun. 38(1), 205–216 (2020) 4. Shin, C.H., Yoon, Y., Park, J.H., et al.: Design of the safety standard at hydrofluoric acid handling facilities for risk reduction. Korean J. Chem. Eng. 35(5), 1–6 (2018) 5. Wang, C., Ding, Q.: Theoretical design of controlled digitized chaotic systems with periodic orbit of upper limit length in digital circuit. Nonlinear Dyn. 98(1), 257–268 (2019) 6. Bickford, J.R., Cho, P.S., Farrell, M.E.: Wide subwavelength grating waveguide photonic integrated circuit sensor system. Opt. Eng. 57(12), 127102.1–127102.15 (2018) 7. Trost, A., Zemva, A.: A web-based tool for learning digital circuit high-level modeling. Int. J. Eng. Educ. 35(4), 1224–1237 (2019) 8. Kumar, S.S., Ranjan, B., Anupam, J.: Entropy-based electricity theft detection in AMI network. IET Cyber-Phys. Syst.: Theory Appl. 3(2), 99–105 (2018) 9. Razavi, R., Gharipour, A., Fleury, M., et al.: A practical feature-engineering framework for electricity theft detection in smart grids. Appl. Energy Bark. Then Oxford 238, 481–494 (2019) 10. Zheng, K., Chen, Q., Wang, Y., et al.: A novel combined data-driven approach for electricity theft detection. IEEE Trans. Ind. Inf. 15(3), 1809–1819 (2019)

Ancient Literature and Art Based on Big Data Luchen Zhai

Abstract Ancient Chinese literature has a long history, and a large number of poems, songs and other literary works have been accumulated. The arrival of the era of big data brings a new way out for the study of ancient literature. This paper studies the ancient literature and art on the basis of big data. This paper uses big data clustering algorithm to analyze the relevance of ancient literature, and uses literature analysis and other research methods to carry out research. In the study, we summarize the 10 most influential ancient literary works from 2012 to 2019, and analyze the artistic characteristics of ancient literature and the ranking of ancient literary works. In order to better study the relevance of ancient literature, we also summarize and analyze the number of artists of painting, calligraphy and literature in different periods of ancient Chinese literature. From the pre Qin period to the Ming and Qing Dynasties, there were 808 writers, 108 calligraphers and 222 painters. From this, we can see that Chinese ancient literature originated in the pre Qin period, developed in the Wei, Jin, southern and Northern Dynasties, peaked in the Sui and Tang Dynasties, and finally flattened in the Ming and Qing Dynasties. Keywords Big data · Clustering algorithm · Ancient literature and art · Literary works

1 Introduction Now is the information age, big data has become a hot topic [1, 2]. With the development of big data, the application of big data in the study of ancient Chinese literature is becoming more and more mature, and the rich and diverse databases provide a huge amount of data and great convenience for people to study ancient literature [3, 4]. For example, the emergence of CNKI, VIP and Wanfang websites provided convenient conditions for the study of ancient literature [5, 6]. L. Zhai (B) International Media, Literature, Tangxin Wealth Investment Management Co., Ltd, Cangzhou, Hebei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_44

357

358

L. Zhai

The literary and artistic value of ancient literature is like a huge treasure, waiting for people to exploit. Big data is a mining tool, providing new methods and perspectives for ancient literature research [7, 8]. Big data can quantify everything. For example, ancient literary works and ancient literature can be digitized and become a part of a huge database, providing a new perspective and direction for the study of ancient literature [9, 10]. On the basis of big data, this paper studies the ancient literature and art, which is of great significance. This paper first introduces the concept and characteristics of big data, summarizes the big data clustering algorithm, and introduces the related definitions of clustering features and associated cluster features. In addition, we analyze the relationship between big data and ancient literature, from which we can know that big data provides us with the latest and most objective information of ancient literature, and we no longer need to spend time and energy collecting and classifying various complicated information. Finally, this paper uses a combination of various research methods to carry out the research, through consulting the relevant information website, summed up the most influential 10 ancient literary works from 2012 to 2020. The results show that in addition to the four famous works, there are also “the book of songs”, “songs of Chu”, “Liaozhaizhiyi”, as well as Su Shi, Du Fu, Li Bai and other works. In addition, according to the number of ancient artists recorded in the Encyclopedia of China, this paper classifies the number of artists from pre Qin to Qing Dynasty, analyzes the development form of ancient Chinese literature from the analysis of the number of artists in different periods, and finally concludes that ancient Chinese literature originated in pre Qin period, developed in Wei, Jin, southern and Northern Dynasties, and peaked in Sui and Tang Dynasties In the Ming and Qing Dynasties.

2 Big Data and Ancient Literature 2.1 Big Data Through the collection, storage and analysis of relevant data information, big data presents the informatization effect obviously, and finally provides relevant basis for the accurate analysis of the data. (1)

Big data features

Big data has three characteristics: volume, diversity and velocity, namely 3 V feature. Among them, scale is the mass of information, and its data level can reach Pb level. Diversity refers to the data information generated by various industries. High speed not only refers to the high efficiency of data dissemination, but also includes the requirements for high speed of big data analysis and mining technology, which requires strong timeliness in the data processing process.

Ancient Literature and Art Based on Big Data

(2)

359

Clustering algorithm

This paper selects the clustering algorithm, mainly from two aspects of the definition of association rules: one is to cluster one or a pair of quantitative attributes to form a cluster or interval that meets the conditions. On the other hand, quantitative clustering is based on frequent search. Related definitions include: clustering feature (CF) and association cluster feature (ACF). 1.

Clustering feature (CF)

Clustering features are used to describe the information aggregation of object sub clustering and include the cluster information projected onto other attribute sets. The formula is as follows:   N N   2 ti [X ], ti [X ] (1) C F(C X ) = N , i=1

i=1

where n represents the number of all tuples in the sub cluster. 2.

Association cluster feature (ACF)

Suppose Cx = t1 , t2 , …, tn , then ACF formula is:  AC F(C X ) =

N,

N  i=1

ti [Y ],

N 

 ti [Y ]

2

(2)

i=1

2.2 The Internal Relationship Between Big Data and Ancient Literature Research China is an ancient country with a long history of thousands of years. In this process, culture gradually accumulates and forms a huge literary treasure. The development of ancient literature has a long history and rich materials, including not only literary works, but also artistic aesthetics, historical background, social reality and many other aspects. In the study of ancient literature, it is necessary to understand the social, economic and cultural background, authors, works, literary creation background and other information. This information can be called variables in a particular research process. Big data collects all these variables, and these data will be updated in real time with the development of ancient literature, providing us with the latest objective data.

360

L. Zhai

3 Research Methods of Ancient Literature On the basis of big data, this paper studies the ancient literature and art, and uses big data clustering algorithm to analyze the relevance of ancient literature. In addition, this study involves a variety of research methods, as follows: (1)

Interdisciplinary research methods

This paper emphasizes the integration of multi-disciplinary knowledge, such as art, culture, communication, history, economics, political science and sociology. This paper uses interdisciplinary research methods, through the integration of relevant professional knowledge, to pave the way for this study. (2)

Quantitative research method

This study involves the use of big data to measure the popularity of ancient Chinese artists, and the use of big data to analyze the influence of related ancient literary works; therefore, this paper adopts the method of quantitative research. (3)

Literature research method

Literature is the most basic data source, and any research should be based on the literature. This paper uses the method of literature research to sort out and screen ancient Chinese artists and literary works by searching historical documents.

4 Ancient Literature and Art 4.1 Analysis of the Artistic Characteristics of Ancient Chinese Literature (1)

It has profound national art culture

Although the contents of art and ordinary life are not the same, art comes from people’s thoughts. When people can’t touch the artistic elements in real life, they can’t perfect the artistic ideas. Therefore, observing the thoughts conveyed in ancient Chinese literary works, we can see that almost all the thoughts can match the characteristics of the times in which the literary works are located. (2)

It has rich humanistic and artistic spirit

In Chinese culture, people always attach great importance to people. In ancient times, people believed that all the resources in life came from heaven, which a gift was given by heaven. In ancient literature, many mysterious images of gods were created, such as Nu Wa, who brought life to people, and Dayu, who managed floods for people.

Ancient Literature and Art Based on Big Data

361

These are gods who are good to people, more like heroes born from the people. From the content of various literary works, Chinese traditional culture always takes human as the core of the universe, and human is the main body of all social behaviors, which is the humanistic art in ancient Chinese literary works. (3)

The art of collision between social education and personal emotion

In ancient Chinese history, people often believed in and respected the abnormal ethics. Many ancient working people regard abiding by dogma for life as the first principle to prove their life value. However, on the one hand, whether people really agree with the so-called social dogma in their hearts is also a matter worth pondering. Liang Shanbo and Zhu Yingtai is a critique of social education. In the face of real emotions, in fact, everyone’s heart will shake. They will be more inclined to pursue personal feelings and think that social dogma is too rigid to have the characteristics of human feelings. And this kind of collision art is the literature and art with unique charm in ancient Chinese literary works.

4.2 Ranking Analysis of Ancient Literature Research Ancient Chinese litterateurs are like stars, and there are a vast number of literary classics. This paper holds that the number of research papers on ancient literary works can directly reflect the influence of ancient literature on modern people. Therefore, this paper makes statistics on the most studied ancient Chinese literary works from 2012 to 2019, and the statistical results are shown in Fig. 1. As can be seen from Fig. 1, this paper counts the top 10 ancient Chinese literary works studied from 2012 to 2019, among them, there are 3217 papers on a dream 1983 1965 2153 1589 6500

2631 2789

1653 1746

1512

3217

The Dream of Red Mansion

The book of songs

Su Shi's works

Du Fu's works

Poetry of the South

Strange Tales from Liaozhai

Works of Li Bai

Journey to the West

Water Margin

Romance of the Three Kingdoms

Fig. 1 Ranking of ancient literary works studied from 2012 to 2019

362

L. Zhai

of Red Mansions, 2789 papers on the book of songs, 2631 on Su Shi’s works, 2153 on Du Fu’s works, 1983 on Chuci, 1965 on Liaozhai Zhiyi, 1746 on Li Bai’s works and on the West there are 1653 papers in travels, 1589 papers on Water Margin and 1512 papers on romance of the Three Kingdoms. Among them, there are five novels on the list, in addition to the four famous works “Romance of the Three Kingdoms”, “outlaws of the marsh”, “journey to the west” and “dream of Red Mansions”, there are also “Strange Tales of Liaozhai”. As the source of Chinese poetry, “the book of songs” and “songs of Chu” is all on the list. There are three poets on the list, namely Li Bai, Du Fu and Su Shi. The number of research papers is basically consistent with the writer’s position in the history of literature, but it is not completely unaffected by other factors. For example, there are special research journals in dream of Red Mansions, strange tales of Liaozhai, and Du Fu research journals, which have a certain impact on the number of research papers.

4.3 Comparative Analysis of Painting, Calligraphy and Literature in Ancient Literature Different art types have different development history and law, different historical characteristics and different dynasty distribution of artists. Therefore, according to the number of ancient artists recorded in the Encyclopedia of China, this paper classifies the number of artists of three categories from pre Qin to Qing Dynasty. The statistical results are shown in Table 1 and Fig. 2. It can be seen from Table 1 and Fig. 2 that the number of ancient artists from the pre Qin period to the Qing Dynasty is counted, including 808 sinologists, 108 calligraphers and 222 painters. Chinese literature originated in the pre Qin period, Table 1 The comparison of painting, calligraphy and literature in ancient literature Dynasty Pre Qin Period Qin Han Dynasty Wei, Jin, southern and Northern Dynasties Sui Dynasty Tang Dynasty Five dynasties and ten states Song Dynasty

Writer 2

Painter 0

Calligrapher 0

1

0

0

41

5

3

125

12

17

7

3

5

155

19

18

15

10

9 11

162

40

Jin Dynasty

21

3

2

Yuan Dynasty

80

25

7

Ming Dynasty

117

50

21

Qing Dynasty

82

55

25

Ancient Literature and Art Based on Big Data

363

Calligrapher

Painter

Writer

Qing Dynasty Ming dynasty

Dynasty

Yuan dynasty Jin Dynasty Song Dynasty Five Dynasties and ten states Tang Dynasty Sui Dynasty Wei, Jin, southern and Northern Dynasties Han Dynasty Qin Pre Qin Period

0

20 40 60 80 100 120 140 160 180

Number of people

Fig. 2 Comparison of painting, calligraphy and literature in ancient literature

developed in the Wei, Jin, southern and Northern Dynasties, peaked in the Sui and Tang Dynasties, and finally flattened in the Ming and Qing Dynasties. Although the literary achievements of the Ming and Qing Dynasties were obviously less than those of the Tang and Song dynasties in terms of the quality of literary works and the number of writers, the development and gradual prosperity of the art market in the Ming and Qing Dynasties promoted the popularization of the art of calligraphy and painting, and the demand for the art of calligraphy and painting increased greatly. The history of painting development can be seen that the Tang and Song Dynasties was the peak of painting development. The Tang Dynasty is an unprecedented prosperous period in the history of Chinese painting, and also a new era of style. Its figure painting, flower and bird painting and landscape painting have made extraordinary achievements. The Song Dynasty inherited the Tang Dynasty and the Yuan Dynasty. The emperors of Song Dynasty loved calligraphy and painting. The perfection of the painting academy system promoted the great development of painting academy. On the other hand, the rise of literati painting represented by Su Shi had a far-reaching influence on the painting of later generations and even influenced the Chinese painting circle for a long time. Judging from the history of calligraphy development, the period from Wei, Jin, southern and Northern Dynasties to Tang Dynasty is the peak period of Chinese calligraphy art. The changes of calligraphy style are from seal script, Li, Cao and Zhang to form the true, Xing and cursive styles. Calligraphy became a separate art form and formed a common fashion among the literati and officialdom. According to the literature, the number of calligraphers in the Wei and Jin Dynasties far exceeded that of painters. Tang Dynasty is peak of Chinese calligraphy after Wei and Jin

364

L. Zhai

Dynasties. Among the four calligraphers, Yan, ou, Liu and Zhao, who have been regarded as models of calligraphy, three of them emerged in the Tang Dynasty. They were regarded as masters of the hundred dynasties, and had a profound impact on the process of Chinese calligraphy. There were 17 calligraphers in Wei Jin period and 18 calligraphers in Tang Dynasty. The number of calligraphers in these two periods accounted for one third of the total number of calligraphers. The history of literature and the development of painting are not completely synchronized. In the Wei and Jin Dynasties, the personality of the literati became independent with the economic and political power of the gentry. Poetry, prose, Ci Fu, parallel prose and many other literary styles have changed from practical literature to aesthetic literature, which has created a large number of critics. Under this cultural background, the quantity, quality and influence of literary works in Tang and Song dynasties are unprecedented. Among them, poetry creation is the most prosperous, which can be called the golden age in the history of Chinese literature. The imperial examination system carried out by Emperor Taizong of Tang Dynasty was the institutional basis for the cultural prosperity of Tang Dynasty. Taking Fu as the main subject of imperial examination greatly stimulated the creative potential of scholars. During the Ming and Qing Dynasties, there were many writers, but their literary achievements were not as good as those of the ancients. In the total sample, there are 125 writers in the Wei, Jin, southern and Northern Dynasties, 155 in the Tang Dynasty and 162 in the Song Dynasty. The number of writers in these three periods is more than half of the total number of literary families.

5 Conclusions Ancient literature, with its unique and profound literary and artistic value, has become a bright treasure in the literary world. We must pay attention to its research, tap the potential value of ancient literature, and open up a broad prospect. This paper studies the ancient literature and art based on big data, analyzes the important period of the development of ancient literature in China, and understands the status of relevant ancient literature in China’s literary arena. The study of ancient literature is of great significance, and the forms and methods of ancient literature research must keep pace with the times. We should not only update our literature research ideas, but also actively introduce and develop new technologies to promote the research process of ancient literature. The research on ancient literature through big data will provide new methods and perspectives for the study of ancient literature.

Ancient Literature and Art Based on Big Data

365

References 1. Chase-Levenson, A.: British women writers and the reception of ancient Egypt, 1840–1910. Ninet. Century Contexts 39(4), 331–333 (2017) 2. Lgi, G.N.: Hittite geographers: geographical perceptions and practices in Hittite Anatolia. J. Anc. Near East. Hist. 4(1–2), 39–60 (2018) 3. Mysoor, P., Does, U.K.: Really have a ‘closed’ list of works protected by copyright? Eur. Intellect. Prop. Rev. 41(8), 474–479 (2019) 4. Zatarain, J.M.N.: The role of automated technology in the creation of copyright works: the challenges of artificial intelligence. Int. Rev. Law Comput. Technol. 31(1), 91–104 (2017) 5. Ceaus, u, F.: The healing power of art-therapy. Nephron Clin. Pract. 16(1), 203–211 (2018) 6. Moradei, G.: ALAI 2016 International Congress, Rome 15/16 September 2016. World Patent Inf. 48, 43–46 (2017) 7. Savini, M.: Transgenic art: creativity in the era of genetic engineering. Technoetic Arts 15(2), 163–169 (2017) 8. Port, G.N.J., Pullman, A.: Quantum-mechanical studies of environmental effects on biomolecules. III. Ab initio model studies of the hydration of peptides and proteins. Int. J. Quantum Chem. 8(Suppl. S1), 21–32 (2017) 9. Mendis, D.: In pursuit of clarity: the conundrum of CAD and copyright-seeking direction through case law. Eur. Intellect. Prop. Rev. 40(11), 694–705 (2018) 10. Lee, Y.H.: United Kingdom copyright decisions and legislative developments 2016. IIC: Int. Rev. Intellect. Prop. Compet. Law 48(2), 184–194 (2017)

Analyze Ming and Qing Literature Under Big Data Technology Qinglv Huang and Liang Yan

Abstract Big data has brought too much convenience to our work and life. Through the development of big data, people are full of curiosity about all new things, especially more and more people are obsessed with Ming and Qing literature. The main purpose of this article is to study the application of big data technology in Ming and Qing literature. In this paper, under the social background of the era of big data, further study how Ming and Qing literature developed and the relationship between the two, and then continue to promote social development and progress. The experimental results of this article show that the user scale of Ming and Qing literature under big data technology has increased by 19%, and the application of big data technology in Ming and Qing literature has become more and more extensive, and its positioning in the cultural market has also been significantly improved. This is also conducive to creating more valuable literary works. Keywords Big data technology · Ming and Qing literature · Problem research

1 Introduction With the rapid advancement of computer technology, people’s lives and work have become more and more inseparable from computers [1]. People can collect and store data through computers, but in recent years, these data have shown geometrical development [2]. That is to say, since these few years, big data has appeared in front of people with an explosive growth [3]. In 2008, “Nature” magazine published a special issue of “Big Data”, which conducted in-depth discussions on the value and challenges contained in big data, which aroused the attention of all parties to big

Q. Huang Qingming Literature Direction, College of Literature, Tibet University, Huai’an, Jiangsu, China L. Yan (B) College of Arts, Tibet University, Lhasa, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_45

367

368

Q. Huang and L. Yan

data. After that, big data was officially announced. Since then, the uncle’s house has become a hot issue in scientific research [4]. The development of data is very rapid, and big data is mainly used to represent very large data sets [5]. Compared with previous data sets, big data usually contains structured and unstructured data, both of which require real-time analysis. Moreover, big data also brings opportunities to discover new value [6]. Janssen M uses a case study to determine the factors that influence BD-based decisions. BD is collected from different sources with various data qualities and processed by various organizational entities, thus creating a big data chain [7]. The accuracy (manipulability, noise), diversity (data heterogeneity) and speed (changing data sources) amplified by the size of big data require the establishment of relationship and contract governance mechanisms to ensure the quality of BD and the ability to up and down data culture. However, the impact of BD on the quality of decision-making has received little attention in the literature [8]. The innovation of this paper is to use big data technology to analyze relevant sensor data, and then create pleasing literary works, while avoiding excessive reliance on big data [9]. Because of the close connection between big data and Ming and Qing literature, the process of literary creation is also inseparable from the analysis and support of big data. Therefore, discover the status of works in the cultural market and create more precious literary works [10].

2 Big Data Technology Ming and Qing Literary Research Methods 2.1 Big Data Technology Big data is a collection of large amounts of data (a term used in the computer industry). In detail, big data is a collection of data and information elements. You cannot use conventional software tools to capture, manage and process within a specific time frame. At the same time, the new processing mode also requires more powerful decision-making functions and optimization processes. When data explodes, big data phenomenon can be seen everywhere in daily life. The constantly updated amount of data generated by Weibo and fan submissions, as well as transactions created by banks or credit cards, and data generated by e-commerce transactions. Big data technology can form the basis for decision-making plans and help us make timely adjustments. In a company, sales data can provide timely advice on changes in customer needs, by discovering business rules and reversing failures. In terms of education, student performance data can reflect students’ shortcomings and strengths so that teachers can carry out relevant curriculum reforms in time. Similarly, when conducting literary analysis and research, big data analysis can also be used to investigate the intentions and feelings behind the author.

Analyze Ming and Qing Literature Under Big Data Technology

369

2.2 Ming and Qing Literature The literature of the Ming and Qing Dynasties was a great development period in the history of Chinese literature. Especially in the Qing Dynasty, traditional styles such as poetry and prose began to revive, new styles such as novels began to rise, and opera and folk songs reached their heyday. Obviously, the birth, development and prosperity of Ming and Qing literature cannot be separated from communication activities. Therefore, it is particularly necessary to use the relevant theories of communication to study the development of Ming and Qing literature. In fact, since the appearance of pre-Qin literary works, literary works have continued to expand. The various classics we see today are actually delivered through a certain way of communication. Due to the different media ages, various eras have presented colorful exchanges. As a complete period of the development of ancient Chinese literature, the popularization of literature in this particular period can be understood more clearly by studying the popularization of literature in the Ming and Qing Dynasties. This is very important for understanding the entire literary history.

2.3 Little Reading Thinking As a tool to understand people in the objective world, big data analysis technology has brought us unimaginable progress. Using computer data to analyze text requires little reading and understanding of the problem, and serves as an important guide for analysis. When the machine processes data, the individual being studied needs to “tell” them how to operate the instructions. On the one hand, machines can discover and analyze problems that people can’t see and can’t find; on the other hand, research subjects use computers as a useful tool to measure the indicators needed by researchers. It is important and necessary to conduct a “small reading” for the research subject. As Moretti said, even if you study 200 novels, less than 1% of the total number of novels published in the nineteenth century. This survey is of course limited. In fact, using computers to analyze big data can reveal the general characteristics of specific types of documents. However, every research object, even every reader, has a different understanding and perception of literary works.

3 Big Data Technology Algorithm Improvement Experiment When dealing with massive data sets, the Apriori algorithm greatly reduces system performance in the process of finding frequent data sets. The optimized Apriori algorithm designed in this paper introduces the Map function of MR into the Apriori algorithm. Since MR can process a large amount of data at the same time, it can greatly

370

Q. Huang and L. Yan

improve the efficiency of finding frequent objects. Through parallel computing, the Apriori algorithm can process a large amount of data without being limited by the computing power of the computer. The main ideas of the improved algorithm are as follows: (1)

(2)

(3)

First, in the Charter stage of using the connection function, a set of objects k is often created, k − 1 objects are created by automatically connecting k − 1 objects, and then the data set is used as the key and support as the value. The task of the reduction phase is to merge the values of the same key and perform the branch function at the same time. I and e filter objects larger than minSup. Create association rules based on frequently received object sets. The most important step here is to find all non-empty parts based on frequent data sets and meet minConf. The overall flow of the algorithm is shown in Fig. 1.

Fig. 1 Overall flow chart of big data algorithm

Start

minSup

Calculate frequent itemsets

Calculate all items

Calculation times

minConf

Calculation Confidence

End

Analyze Ming and Qing Literature Under Big Data Technology

371

4 Big Data Technology Research Ming and Qing Literary Analysis 4.1 Analysis of the Impact of Big Data Technology on the Development of Ming and Qing Literature The development of large-scale data technology has brought people’s lives into a new stage of development. It mainly collects data through various channels, further analyzes, organizes and researches, and finally circulates on the network platform through the emerging multimedia. The data flow is rigorous and scientific and can be used conveniently by all classes of society. For example, the use of big data technology can obtain some important information about Ming and Qing literature users in Ming and Qing literature, and conduct further analysis and research on it, so as to understand the development direction of the cultural market and user needs in time, and then create popular Ming and Qing literary masterpieces. According to relevant big data statistics, we can see the trend of Chinese Ming and Qing literary users from 2015 to 2019, as shown in Fig. 2. According to the data in the figure, over time, the number of users in Ming and Qing Dynasties increased from 230 million to 500 million in 2015 and 500 million in 2019. With the support of large-scale data technology, the Ming and Qing dynasties will have broader development prospects. Researchers must make full use of the connection between online literature and big data, better understand the nature of the development of online literature, and gradually get rid of the traditional shackles in the process of literary development. Only then can they develop in the direction

Fig. 2 Trends in the scale of Ming and Qing literary users from 2015 to 2019

372

Q. Huang and L. Yan

of more diversification and liberalization. Traditional literature pays more attention to the surface form of literature, ignoring the content of literature and the emotional thinking that it expresses, resulting in the wrong view that form is greater than content. In addition to lyricism, more attention should be paid to literary creation itself, which will make the literature more authentic and better deal with complex data.

4.2 Analysis of the Advantages of Ming and Qing Literature Under Big Data Technology (1)

Promote diversification

Everything has two sides. Although the development of large-scale data technology has greatly promoted the development of electronic documents and promoted the rapid development of electronic documents, it also brought some small problems to the development of Ming and Qing literature. For example, some writers blindly responded to market demands and achieved a lot of success on the Internet. The content of the literary works created is relatively vulgar, the story is very different from reality, and the characters are relatively out of date. The way to solve this kind of problem is: first, strengthen the author’s literary knowledge and literary accomplishment; second, strengthen the author’s literary accomplishment, the network operating platform must have a certain threshold for published articles, and refuse to publish some inappropriate articles Published on the Internet. (2)

Improve cultural prestige

Chinese culture is both rich and far-reaching, with rich cultural concepts. Ming and Qing literature can use this advantage to continue to develop. With the diversification of people’s demand for literary works, some minor problems gradually appeared in the creation of literary works. Such as logic problems, common sense problems and typographical errors. In order to minimize the occurrence of these problems, on the one hand, it is necessary to improve the literary level of writers, and on the other hand, it is necessary to strengthen inspection and supervision of network operators. With the emergence of these problems, the accuracy requirements for big data are getting higher and higher. Therefore, while we enjoy the convenience that big data provides to us, some problems caused by the excessive use of big data also need to be considered. If you create a literary work, the author can use reality as a copy, which can also enrich the storyline of the work.

Analyze Ming and Qing Literature Under Big Data Technology

373

Table 1 Big data technology evaluation results Evaluation

Very satisfied

Satisfied

Uncertain

Dissatisfied

Very dissatisfied

Number of people

100

50

30

10

10

50

25

15

5

5

Proportion (%)

Fig. 3 Evaluation of the effectiveness of big data technology

4.3 Evaluation and Analysis of Big Data Technology This article summarizes 200 students’ evaluations of big data technology in Ming and Qing literary research. The results are shown in Table 1. Through analysis, it can be seen that among 100 students, 100 students are very satisfied with big data technology, accounting for 50% of the total, while 50 students are generally satisfied with big data technology, accounting for 25% of the total. %. Among them, 15% are unsure about big data technology, while only 5% are dissatisfied with big data technology. Finally, only 5% are very dissatisfied with big data technology. The specific results are shown in Fig. 3.

5 Conclusions This article explores the fusion between the big data of Ming and Qing literature and the small reading of research topics. This requires the use of computers to analyze text data, organically integrate individual literary interpretation and historical thinking, and provide the possibility to create a new literary history and a new

374

Q. Huang and L. Yan

theory of literary value. In addition, the application of education big data will have a huge impact on the development and innovation of education. Using high-tech data analysis can transform existing education data into decision-making, thereby improving the quality of education and teaching. However, to achieve this step, more researchers are needed, and continuous research and improvement are needed in practice. Based on the continuous in-depth research of big data technology, I believe that in the future, through the continuous efforts of researchers, big data technology will gradually mature, and the application of big data in literature will gradually increase.

References 1. Janssen, M., Haiko, V.D.V., Wahyudi, A.: Factors influencing big data decision-making quality. J. Bus. Res. 70, 338–345 (2017) 2. Zhang, Y., Qiu, M., Tsai, C.W., et al.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017) 3. Wang, Y., Kung, L.A., Byrd, T.A.: Big data analytics: understanding its capabilities and potential benefits for healthcare organizations. Technol. Forecast. Soc. Change 126, 3–13 (2018) 4. Mei, J., Moura, J.M.F.: Signal processing on graphs: causal modeling of big data. IEEE Trans. Signal Process. 65(8), 2077–2092 (2017) 5. Zhou, L., Pan, S., Wang, J., et al.: Machine learning on big data: opportunities and challenges. Neurocomputing 237, 350–361 (2017) 6. Stergiou, C., Psannis, K.E.: Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey. Int. J. Netw. Manag. 27(3), 1–12 (2017) 7. Zhang, Y., Ren, S., Liu, Y., et al.: A big data analytics architecture for cleaner manufacturing and maintenance processes of complex products. J. Clean. Prod. 142(PT.2), 626–641 (2017) 8. Barone, L., Williams, J., Micklos, D.: Unmet needs for analyzing biological big data: a survey of 704 NSF principal investigators. PLoS Comput. Biol. 13(10), (2017) 9. Guenther, W.A., Mehrizi, M.H.R., Huysman, M., et al.: Debating big data: a literature review on realizing value from big data. J. Strateg. Inf. Syst. 26(3), 191–209 (2017) 10. He, Y., Yu, F.R., Zhao, N., et al.: Software-defined networks with mobile edge computing and caching for smart cities: a big data deep reinforcement learning approach. IEEE Commun. Mag. 55(12), 31–37 (2017)

Training Strategy of China’s New Industrial Workers Based on Big Data Xiaoxu Liu and Qinglan Luo

Abstract This paper puts forward that it is urgent for China to formulate reasonable and effective professional talent training and development strategy according to the current situation of enterprise demand for talents. This paper uses the methods of literature research and case investigation to track and interview the training plans of new industry workers in different regions. In a large number of research data, it studies the literacy of new industry workers in terms of ability, experience, professional level, and other aspects that need to be improved. This paper also uses the case study method to study the emerging workers in different industries. Through a large number of practical investigations, we understand the attitude and data of workers on their own ability improvement. This paper studies a large number of cases and data, discusses and investigates the needs of workers in different industries and the conditions of workers themselves. It is concluded that in the form of big data, China’s new industry workers training needs to use professional and experience dual training strategy. It is necessary to optimize the training strategy of Chinese new industry workers under the big data. Keywords Based on big data · China’s new industry · Work force · Training strategy

1 Introduction The practice of developed countries and regions also shows that to promote innovation, talents are the main body, talents are the key to the development of innovative economy, especially innovative talents, who are the core elements of innovation activities [1]. In this context, the city’s influence, economic strength, environmental X. Liu Business School, The Tourism College of Changchun University, Changchun 130607, Jilin, China Q. Luo (B) College of Business Administration, Jilin Engineering Normal University, Changchun 130052, Jilin, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_46

375

376

X. Liu and Q. Luo

facilities, comprehensive supporting facilities and other aspects are all matched for the cultivation of China’s new industrial workers under the big data. At present [2], officially promoted to “national level project” to boost the leap forward economic development, the key is to attract and cultivate a large number of innovative talents. China’s new industry professionals are not only an important part of China’s professional talent team, but also an important force to maintain the order of market economy and promote the development of construction industry and engineering enterprises. On the one hand, strengthening the construction of professional [3] talent team can improve the core competitiveness of the industry and ensure the healthy and orderly development of management; on the other hand, it will affect the overall situation of implementing professional talent strategy and building an innovative country to a certain extent. Therefore, in this trend of talent development, it is particularly important to study the training and development strategy of professional talents [4]. In this paper, a large number of experimental research methods and case studies are used to compare and study the work status of workers in new industries in many regions, as well as the willingness of workers to improve their own quality [5]. It is found that improving the professional quality of workers is the key step to realize industrial upgrading.

2 Training Strategy Design of China’s New Industry Workers Team Based on Big Data 2.1 China’s New Industrial Design Under Big Data (1)

The coordination of academic education and ability standard

Academic education is the main way to transport professional basic talents for the industry. The courses and training programs of colleges and universities mainly respond to the ability requirements of basic talents and backbone talents. Therefore, when setting up the curriculum system, colleges and universities in China should accept the ability standard system as the guidance, and mainly cultivate the students’ basic ability of calculation, pricing [6], contract management, and the cooperation of various stakeholders So that the professional graduates can basically meet the ability requirements of basic talents and backbone talents, and smoothly enter the consulting industry [7]. QS =

 2

(2)

¨ 5+

← − 4− 3

(1)

3

Promoting the improvement of professional ability standards of talents in China

Training Strategy of China’s New Industrial Workers …

377

On the other hand one hand, one belt, one road strategy is being implemented in depth, and our consultancy market is gradually open. We have not only a large number of overseas international projects, but also a large number of international investment projects. Therefore [8], it is urgent for China to provide information and decision-making to increase the project value for the client. The ability standards of basic talents and backbone talents must be in line with the international standards, so as to increase the opportunities for China’s consulting enterprises to participate in international projects, to provide cost consulting services in line with international advanced experience for China’s construction and other related industries, so as to ensure and promote the development process of China’s internationalization. Therefore, China should improve the “threshold” of professional education, improve the professional curriculum system, optimize the knowledge structure of personnel, and promote the improvement of professional quality and ability standards [9]. SV =



3 + 4 + 3

(2)

6

2.2 Training Strategy Design of New Industrial Workers in China The government, universities, consulting enterprises and scientific research institutions cooperate to realize the practical teaching of graduates. At present, consulting enterprises are the main carrier to realize the value of professional talents. According to the needs of enterprises, in-depth investigation and timely adjustment of professional training programs can promote the practical teaching of professional talents [10], which will help graduates to put into work faster and better. Therefore, this paper emphasizes the enterprise oriented practical teaching system for graduates. “Government enterprise research” Under the guarantee of government policies, cooperative education should make full use of the different teaching environment and resources of schools, enterprises and scientific research institutions, and play an irreplaceable role in personnel training, so that students can meet the needs of cost consulting enterprises, understand the scientific research methods in the engineering field, master the latest industrial trends, and improve the comprehensive scientific research ability [11].

378

X. Liu and Q. Luo

2.3 Research and Design of Training Strategy for Workers in New Industries The main body system of policy is the basis of effective implementation of public policy, which is composed of the relevant links of policy formulation and implementation. In view of the problems existing in the policy-making of innovative talents, such as the relatively large number of subjects, the lack of authority of policy-making, and the large homogeneity of policy content, etc., which affect its role as a public policy to a certain extent, the plan aims to improve the policy-making from three aspects: establishing research institutions, standardizing the formulation process and balancing the policy system. The policy of innovative talents involves a wide range of fields, and the government departments are more complex. Therefore, it is suggested to learn from the experience of the National Science Council (NSB) established in the United States to explore the establishment of local specialized innovative talent policy research institutions [12].

3 Experimental Research on the Training Strategy of China’s New Industrial Workers Under Big Data 3.1 Experimental Study on the Cultivation of New Industrial Workers Among the enterprises interviewed in this paper, 56% of the craftsmen did not pay enough attention to it, and even some craftsmen were not mature enough. Compared with the employees, the leaders pay more attention to craftsmanship spirit. Therefore, in order to cultivate the spirit of craftsman, we should first establish the awareness of the cultivation of craftsman spirit among all the staff. On the one hand, workers should pay more attention to the cultivation of craftsman spirit and establish the consciousness of cultivating craftsman spirit ideologically. Early factory and other production workshops are used to train and teach workers in new industries. The students who use the new teaching methods and those who do not use the new teaching mode are compared and studied to obtain the data.

3.2 Experimental Study on the Matching of Workers in New Industries The introduction mechanism should be improved from welfare policy to developmental policy, from homogeneous policy to differentiated policy, from foreign policy to local policy, from traditional rigid talent introduction policy to flexible and flexible

Training Strategy of China’s New Industrial Workers …

379

talent introduction policy, from passive waiting for talents to open policy, and from single recruitment The employment and examination policies should be improved to the diversified government employee system and the introduction of school local cooperation.

3.3 Experimental Research on the Training Strategy of New Industry Workers Under Big Data Industry associations should, according to the requirements of professional ability standards at all levels, carry out the reform of specialty setting and practice scope to cultivate professional talents, especially backbone talents. At present, there are a variety of professionals similar to the scope of engineer practice in China, and there is a certain intersection between different examination contents and practice scope. Therefore, according to the requirements of China’s market for professional talents’ practicing ability standards, the specialties with similar professional practice scope can be integrated. Mutual recognition or partial mutual recognition can be considered for the theoretical subjects of practice examination of similar majors, and emerging industries will be used the workers who teach in the new industry participate in the experiment, so as to get the data needed for analysis.

4 Experimental Analysis on the Training Strategy of China’s New Industrial Workers Based on Big Data 4.1 Experimental Analysis on Training Strategy of New Industry Workers The cultivation of craftsmanship spirit needs the linkage of government, society and school. Especially in the top-level design of vocational education, the government must build a road suitable for the development of Vocational Education in China. Therefore, it is the only way to build a good education environment for the cultivation of craftsman spirit. In this design, the following experiments are conducted to verify whether the strategy of training professional workers is perfect. The specific data are shown in Fig. 1. The cultivation of craftsmanship spirit is a long-term process, which cannot be achieved overnight. To instill the spirit of craftsmanship into the heart of every young student, we need to start from the source and establish a quality of striving for perfection since childhood. The education of workers in new industries cannot be ignored. At present, our country is trying to create a new development mode of vocational education, and constantly create opportunities for the development of vocational education. Craftsman spirit should also become one of the important aspects, taking

380

X. Liu and Q. Luo

Improvement Chart of Workers Professional Ability Group 1

Group 2

Group 3

6 5

Value

4 3 2 1 0 achievement

experience

ability

character

Index

Fig. 1 Experimental analysis on training strategy of new industry workers

this as an opportunity to integrate craftsman spirit into secondary vocational education. The author thinks that in order to cultivate the craftsman spirit, we should first start from the source of students, and choose the appropriate professionals to receive the education of craftsman spirit cultivation in advance, so as to ensure the development of vocational education. From the interest and potential of learning, it can be seen from the experiment that the ability of workers using new industries has been improved after teaching.

4.2 Experimental Analysis on the Training of New Industrial Workers in China On the one hand, colleges and universities determine the training objectives and specifications of professional talents, and set up the curriculum system of students’ higher education through the ability standards of professional talents, so that it can substantially respond to the ability requirements of professional ability standard system, and ensure that graduates can obtain Get the theoretical knowledge and basic skills of consulting industry, and the specific quality is shown in Table 1.

Training Strategy of China’s New Industrial Workers …

381

Table 1 Professional ability Role

Job function

Major

Ability

Remarks

Group 1

3.2

5

4.3

2.1

4

Group 2

4.1

3

4

1.9

3

Group 3

5

4.1

3.6

3.2

4

Enterprises should provide students with venues, equipment and management experience to improve practical teaching, ensure that professional graduates can connect with the future practice ability, and enterprises should also provide the industry association with talent demand information to assist the association to improve the standard system of professional talent ability. We can see that the overall quality of group 1 and group 2 is quite good, and most of the data are between 3 and 4. However, due to professional training, most of the data of the three groups are between 4 and 5, so the data is better. We should strengthen the professional certification of colleges and universities and the evaluation of graduates’ professional ability by industry associations, and provide information services for the government, universities and enterprises as the communication link between the government and universities and enterprises. The government is the macro-control and supervisor of the cultivation and development of professional talents. According to the needs of the market, laws and regulations are formulated to guide the academic education of professional talents through policies. The role orientation and function division of each collaborative subject in academic education stage are shown in Table 1. It can be seen from table 1 that different subjects play different roles in the process of academic education of professional talents in China, and clarifying the work functions of each subject is helpful to the construction of collaborative training system of academic education for professional talents.

5 Conclusions This paper divides the current situation of China’s professional talents into three levels, namely, the current professional level and the level of professional talents At last, the competency standards of professionals at all levels are determined to meet the needs of the current industry development. Through a large number of investigation and research and analysis, it is concluded that the training strategy of China’s new industry workers based on big data needs to work together from workers, trainers and system to achieve good results. Acknowledgements This work was supported by Project Fund from Jilin Planning Office of Philosophy and Social Science (Project Title: Research on construction of industrial workers under the strategy of one master and six pairs in Jilin Provincial. Contract No. 2020B088).

382

X. Liu and Q. Luo

References 1. Barnes, T.: Making Cars in the New India (Industry, Precarity and Informality). Auto Workers in India’s National Capital Region, pp. 136–169 (2018). https://doi.org/10.1017/978110838 0836(5) 2. Graber, J.M., Worthington, K., Almberg, K.S., et al.: High cigarette and poly-tobacco use among workers in a dusty industry: New Jersey quarry workers. J. Occup. Environ. Med. 58(4), e133–e139 (2016) 3. Tahir, N., Aljunid, S.M., Hashim, J.H., et al.: Burden of noise induced hearing loss among manufacturing industrial workers in Malaysia. Iran. J. Public Health 43(3), 148–153 (2015) 4. Ashton, D.: Making media workers: contesting film and television industry career pathways. Telev. New Media 16(3), 275–294 (2015) 5. Mintz, S.: NRC workers fear fallout from industry struggles. Greenwire 1–3 (2017) 6. Carroll-Tidman, S.: Customer service development program—a training program for client facing workers in the water industry. J. New Engl. Water Works Assoc. 132(4), 263–265 (2018) 7. Craig, T.: Six tips for attracting millennial workers to the construction industry. Concrete Open. 27(1), 42–43 (2018) 8. Bowen, J., Hinze, A., Griffiths, C.: Investigating real-time monitoring of fatigue indicators of New Zealand forestry workers. Accid. Anal. Prev. 126, 122–141 (2019) 9. Schwatka, N.V., Rosecrance, J.C.: Safety climate and safety behaviors in the construction industry: the importance of co-workers commitment to safety. Work 54(2), 401–413 (2016) 10. Kramer, D., Mcmillan, K., Gross, E., et al.: From awareness to action: the community of Sarnia mobilizes to protect its workers from occupational disease. New Solutions J. Environ. Occup. Health Policy 25(3), 377–410 (2015) 11. Urban, P., Skubacz, K.: [New dosimetry system based on the thermoluminescence method for evaluation of ionizing radiation doses to workers of the health centers]. Wiad Lek 68(1), 71–78 (2015) 12. Teece, D., Carroll, G.R., Tunzelmann, N.V., et al.: Structural change and relative demand for skilled workers: new evidence from the U.S. manufacturing. Ind. Corp. Change 28(6), 1673–1696 (2019)

Development Trend of Enterprise Human Resource Management Driven by Big Data He Yu, Yanli Li, and Qinglan Luo

Abstract With the rapid development of Internet, mobile Internet and cloud platform, the total amount of data generated by all aspects of society, especially enterprises, shows a trend of rapid growth, which makes big data have a direct impact on human resource management of enterprises, and brings new changes. How to effectively and successfully apply the concept of “big data” development to enterprise human resource management, and promote the innovation and leap of human resource management, has become the most concerned problem in the field of human resource of many enterprises, and has become the direction of our exploration, analysis and application research. This paper studies the impact of this technology on enterprises in the era of big data driven by literature research and case analysis. Through the research and investigation on the human resource management of several enterprises, the data and information of human resource management of several enterprises are obtained. For today’s companies, they want to keep up with the times in human resource management, recruit high-quality talents, and continuously improve the comprehensive quality of talents in the follow-up talent management. Give full play to the enthusiasm and work potential of each employee in the company. After the experimental research and analysis of the human resource management model in the era of big data, it is concluded that in the current era, it is very necessary to use big data to drive human resource management. Keywords Big data · Driving enterprises · Human resource management · Development trend research

H. Yu Business School, the Tourism College of Changchun University, Changchun 130607, Jilin, China Y. Li (B) · Q. Luo College of Business Administration, Jilin Engineering Normal University, Changchun 130052, Jilin, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_47

383

384

H. Yu et al.

1 Introduction Big data has become a word that people can see everywhere. We often hear “big data shows that our citizens.” Something like this. Usually, people use the word big data to describe and define the huge amount of data which is developing explosively with the development of science and technology, and to name the technological development and innovation related to big data. The development of a variety of network applications and information construction in social life make the data appear explosive growth and rapid expansion. These inflated data play a decisive role in determining the future development of enterprises. Such data growth mode brings various hidden dangers to the development of enterprises. As time goes by, people are more and more aware of the development of data in the enterprise, which plays an important role in the development of the enterprise [1]. This study combines qualitative research and quantitative research methods. The first mock exam is to build a theoretical model of competency of scientific and technological personnel. Then, through empirical research, the stability of the model is tested. Finally, this model is used to provide theoretical guidance for scientific management of scientific and technological personnel in universities, enterprises and government, and to create and upgrade the “dual engine” [2] for enterprises. In this paper, qualitative and quantitative research methods are used. First of all, using the grounded research method, in-depth interviews to collect data, supplemented by Atlas.ti 7.0 qualitative analysis software, without presupposition, explores the competency structure model of scientific and technological personnel under the background of “big data”, constructs the initial theoretical model; then, it uses questionnaire survey method to collect data, and uses SPSS 21.0 and Amos 21.0 to collect data The software carries out factor analysis, correlation analysis and confirmatory factor analysis on the data, and tries to test the stability of the theoretical model constructed by empirical test [3]. During this period, we also used the literature research, statistical analysis and other research methods. In the research, we obtained a lot of data, and studied various management methods of human resource management driven by big data [4].

2 Development Design of Enterprise Human Resource Management Driven by Big Data 2.1 Enterprise Human Resource Management Development Design The new human resource performance management information system based on big data technology optimizes the performance plan in several aspects according to

Development Trend of Enterprise Human Resource Management …

385

the problems of the original human resource performance management mode. The first is the optimization of the performance index system [5]. (1)

Design of performance index system

The performance evaluation index system in the new human resource performance management information system has been optimized in two aspects on the basis of the original one. On the one hand, the ability index is added; on the other hand, the performance index and attitude index are optimized [6]. (2)

The design of attitude index

Due to the lack of objectivity, the original attitude indicators of the company were evaluated by the superior of the employees, which led to the nonexistence of the indicators. Moreover, the design of the indicators was the conventional “sense of discipline” and “willingness to cooperate”, which made it impossible to scientifically evaluate the working attitude of employees [7]. By using big data technology, through the collection of complex level employee data, accurate behavior analysis of employees can be carried out, and the most real state of employees can be objectively reflected [8]. (3)

Design of performance index

The matrix management is adopted by the company, and the leaders in different fields act independently, and the staff participation in the performance design link is low, which causes the confusion of the original performance index system of the company. Using the new human resource performance management information system to create a common communication platform for leaders and employees in different fields can effectively solve the above problems [9, 10].

2.2 Enterprise Human Resource Management Design Driven by Big Data (1)

Design of improving training quality and benefit

The lack of training resources is not an example, but a common phenomenon in small and medium-sized enterprises. The company needs to concentrate its own advantageous resources and pay more attention to the improvement of training quality and efficiency. The training work should adhere to the principle of “less and better, not more and worse”, clarify its own resource advantages, optimize, integrate and reorganize training resources. Hebei Keyuan Co., Ltd. can take the following ways to improve the quality and efficiency of training by concentrating superior resources: first, clarifying the purpose of training [11].

386

H. Yu et al.

The purpose of training is different in different stages of development. As a firefighting equipment enterprise with a history of 14 years, the company is in the growth stage and needs more technical personnel. The training at this stage should focus on increasing post skill training to promote the improvement of employees’ working ability and professional skills. Fully consider the training needs of employees. (2)

Design of comprehensive application of various training methods

The selection of training methods affects the training effect, so we should try to avoid the consistent preaching mode. The training method should still be the teaching method with low cost and wide application scope, but the teaching method cannot be used alone. In fact, there are many low-cost, effective training methods can be used. For example, a variety of training methods, such as scenario simulation, group mutual assistance, role-playing and speaking from one’s own experience, can be used to give full play to the main role of students in the training process and mobilize their enthusiasm to participate in the classroom. It is not allowed to reverse the subject and the guest.

3 Experimental Research on the Development of Enterprise Human Resource Management Driven by Big Data 3.1 Experimental Research on Human Resource Management Development Improve the performance awareness of all members of the company. The improvement of performance awareness is the initial link of performance management. Only when the company’s employees’ performance awareness is improved can the smooth implementation and development of performance management be ensured. To improve the performance awareness of the whole staff, it is necessary to make all members of the company realize that performance management is not only a matter of a single member or a single department, but also closely related to the vital interests of all members of the company, and each member must bear the due responsibility. Senior leaders should also participate in the whole process of performance management, not simply listen to reports or give instructions, but should provide strong support for the implementation of performance management system. Ordinary employees timely put forward suggestions on the improvement and optimization of the company’s performance management system, timely communicate and feedback performance problems actively participate in and closely cooperate with each other, so as to truly implement the company’s performance management work.

Development Trend of Enterprise Human Resource Management …

387

3.2 Experimental Research on Human Resource Management Driven by Big Data Before the human resource performance management information system is put into use, the corresponding system use guide should be issued. The content of the system use guide should include the system function, application, use process, precautions, etc. Secondly, the corresponding training plan should be issued based on the system use guide. The training content should be divided into two parts. On the one hand, it is necessary to teach the operation and use of human resource performance management information system, so that the staff can master the corresponding IT technology and operation methods. On the one hand, it introduces the human resource performance management system based on human resource performance management information system. Let employees know how their performance is evaluated and how the performance results are applied. In addition, the relevant training content should also be included in the induction training system for future new employees to learn the relevant system knowledge.

3.3 Experimental Research on the Development Mode of Human Resource Management In the experimental study of this paper, the answer to the question reflects a certain logical reasoning relationship, and the interview results also have certain mutual relations (such as causal relationship, situational relationship, functional relationship, process relationship, time sequence relationship, etc.). To this end, the application of Atlas.ti the category coding function of 7.0 takes the tested language into consideration in the context of the time and their social and cultural background. According to the potential context and organic connection between different categories, the secondary category is eliminated, and the category that has not yet been fully conceptualized is supplemented and “reduced” to 12 The main elements of the major categories are: innovative thinking, cross domain connection, data mining, language communication, team cooperation, rapid response, strategic thinking, logical analysis, rigor, enthusiasm, perseverance, and respect for knowledge. After that, we conducted frequency statistics again, and the interpretation power of the 12 spindle codes reached 85.20%.

388

H. Yu et al.

Table 1 Experimental analysis of enterprise human resource management driven by big data Ability

Assessment

Achievement

Index

Group 1

4.2

3.8

2.2

3.2

Group 2

2.8

4.3

3.5

3

Group 3

5

3.6

2.4

3

Group 4

4.8

4.9

5.2

4

4 Experimental Analysis on the Development Trend of Enterprise Human Resource Management Driven by Big Data 4.1 Experimental Analysis of Enterprise Human Resource Management Driven by Big Data The number of awards is divided into 0–5 times, 6–10 times, and more than 10 times. The scores are 1, 2 and 3 respectively. The specific data are shown in Table 1. The number of patented technologies is divided into 0–5 times, 5–10 times, and more than 10 times, with 1, 2 and 3 points respectively. The number of subordinates is divided into 0–10, 10–30, and more than 30, with scores of 1, 2 and 3 respectively. It is true that big data will bring unprecedented benefits to the company, but if the company integrates big data into its own human resource management system, it must consider the feasibility of this matter. We should consider the company’s own scale and assets, and also weigh the benefits and costs of using big data. The goal of the company is to maximize the benefits, so the use of big data can not violate the company’s goals. In the wave of big data, some small and medium-sized companies blindly follow the trend and can’t wait to introduce big data into their own human resource management system. They think that with big data, they can go smoothly, but the fact is just the opposite. Some companies do not know the true meaning of big data, blindly follow suit and blindly collect useless information and data, but the result is that the cost is far greater than the benefits brought by big data.

4.2 Experimental Analysis on the Development of Enterprise Human Resource Management Principal component analysis (PCA) was used to extract common factors by orthogonal variance maximization rotation method. Taking factor load 0.50 as the cut-off point, the factors whose characteristic root is greater than 1 are extracted, and the multiple load items which are more than 0.35 on multiple factors and the items whose difference is less than 0.20 are gradually deleted. The specific data are shown in Fig. 1.

Development Trend of Enterprise Human Resource Management …

389

Big Data Management Data Chart Group 1

Group 2

Group 3

6 5

Value

4 3 2 1 0 channel

data

element

adapt

Index Fig. 1 Experimental analysis on the development of human resource management in enterprises

The variation of T38, T10, T43, T19 (t19r) and T36 did not reach 0.50. Therefore, it is considered to delete the entry T10 in the third factor (strong curiosity and willing to explore in the field now engaged in), delete the entry T19 in the fifth factor (only collect information simply, not enough to draw inferences from one instance), and delete the entry in the ninth factor T36 (familiar with certain business knowledge, can always find the implied business value of the data), delete the entry T38 in the tenth factor (willing to continuously invest a lot of time and energy in dealing with the work at hand), and delete the entry T43 in the eleventh factor (never fake data, seek truth from facts, adhere to the principle of authenticity), and the result contains 43 items, 12 item The second revision of the Competency Scale of scientific and technical personnel was conducted. As this is an exploratory factor analysis, the factor structure after deleting items will also change, so delete 5 items before proceeding. A factor analysis was conducted to verify the construct validity of the scale. After deleting 5 items, a new rotation component matrix is obtained.

5 Conclusions With the help of big data management method and more humanized management means, a set of human resource management information system and a professional human resource management team are established, and with the help of big data in human resource management, enterprise and employee services are well done.

390

H. Yu et al.

We must effectively speed up the transformation of human resource work from experience management mode to strategic management mode, from simple wage incentive to comprehensive salary incentive, from simple performance appraisal to comprehensive performance management, so as to truly play the application effect of big data in human resource management, continuously improve the efficiency and quality of human resource management, and make it the core of the company The necessary conditions and preconditions of competitiveness. Make full use of the development advantages of enterprise human resource management driven by big data. Acknowledgements This work was supported by Project Fund from Jilin Planning Office of Philosophy and Social Science (Project Title: Research on construction of industrial workers under the strategy of one master and six pairs in Jilin Provincial. Contract No. 2020B088).

References 1. Gibbs, C., Macdonald, F., Mackay, K.: Social media usage in hotel human resources: recruitment, hiring and communication. Int. J. Contemp. Hosp. Manag. 27(2), 170–184 (2015) 2. Leddin, D.: Canadian Association of Gastroenterology launches human resources planning initiatives. Can. J. Gastroenterol. 18(9), 583–587 (2016) 3. Navimipour, N.J., Rahmani, A.M., Navin, A.H., et al.: Expert Cloud: a Cloud-based framework to share the knowledge and skills of human resources. Comput. Hum. Behav. 46, 57–74 (2015) 4. Godbout, A.J.: Managing core competencies: the impact of knowledge management on human resources practices in leading-edge organizations. Knowl. Process Manag. 7(2), 76–86 (2015) 5. Bluth, E.I., Bansal, S.: The 2016 ACR commission on human resources workforce survey. J. Am. Coll. Radiol. JACR 13(10), 1227–1232 (2016) 6. Munteanu, A.-I.: Exists a relationship between strategic human resources management, innovation and competitive advantage? Ecoforum 4(1), 1349–1352 (2015) 7. Marshall, L., Treuren, G.: Dimensions and determinants of declining employment opportunities for mature aged male practitioners within the human resources profession: occupational change, age and gender. Res. Nurs. Health 18(2), 85–95 (2016) 8. Bowen, D.E., Greiner, L.E.: Moving from production to service in human resources management. Organ. Dyn. 15(1), 35, 49–40, 53 (2016) 9. Harolds, J.A., Parikh, J.R., Bluth, E.I., et al.: Burnout of radiologists: frequency, risk factors, and remedies: a report of the ACR commission on human resources. J. Am. Coll. Radiol. 13(4), 411–416 (2016) 10. Arcand, M., Bayad, M., Fabi, B.: The effects of human resources management practices on the organizational performances of Canadian financial co-operatives. Ann. Public Coop. Econ. 73(2), 215–240 (2015) 11. Gabriel, A.S., Cheshin, A., Moran, C.M., et al.: Enhancing emotional performance and customer service through human resources practices: a systems perspective. Hum. Resour. Manag. Rev. 26(1), 14–24 (2016)

Teaching Idea Reform and Regulation Innovation of Economic Law Course Based on Big Data Technology Xinran Zheng and Caiping Qin

Abstract Economic law, as an applied subject, its basic goal is to train applied legal talents. Therefore, it is necessary to improve the scientific teaching methods and teaching practice of economic law courses, and explore the formation of teaching concepts to promote the reflection of legal education. The purpose of this article is to study the reform of teaching ideas and regulatory innovation of economic law courses under big data technology. This experiment selects all students majoring in economics from a key local university as the research object, and uses a large sample of survey methods to conduct research. The teaching method under big data technology is used in the experiment, and the traditional teaching method is used before the experiment to compare the teaching effect. Experimental data shows that the economic law courses under big data technology can mobilize students’ enthusiasm for studying economic law to a large extent. The experimental results show that before the experiment, 23.89% of the students thought that the teacher’s teaching difficulty in the economic law class was moderate, while after the experiment 46.89% of the students thought that the teacher’s teaching difficulty in the economic law class was moderate. Through the students’ test scores; it is known that after the experiment, the average scores of the experimental class and the comparison class are 74.88 and 66.76 respectively. Therefore, economic law courses under big data technology are of great help to improve students’ academic performance. The transformation of teaching concepts and regulatory innovation is the only way to achieve the goals of the new economic law curriculum reform. Keywords Big data technology · Economic law course · Teaching idea reform · Regulation innovation

X. Zheng Business School, the Tourism College of Changchun University, Changchun 130607, Jilin, China C. Qin (B) College of Business Administration, Jilin Engineering Normal University, Changchun 130052, Jilin, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_48

391

392

X. Zheng and C. Qin

1 Introduction The transformation of classroom teaching methods plays an important role in the gradual deepening and orderly advancement of curriculum reform under the conditions of the big data era [1, 2]. Changing educational concepts and adopting effective teaching methods not only have a positive effect on optimizing the teaching process, but also can effectively stimulate students’ interest in learning economic law, comprehensively cultivate students’ innovative consciousness and innovative thinking, and improve students’ analysis and problem-solving skills Ability to comprehensively improve the quality of classroom teaching [3, 4]. Peterhagene et al. proposed to change the relationship and status between teachers and students in traditional teaching, thereby affecting the teaching content and teaching environment, so that the entire teaching system can operate more efficiently [5]. To improve the quality of teaching as soon as possible, simply speaking is to recognize the students as independent teaching subjects, change the dominant position of teachers in traditional teaching, and propose that the transformation of students’ learning styles is the foundation of curriculum reform. Renard et al. emphasized that teachers’ teaching methods should obey and serve students’ learning methods, and create a classroom atmosphere of equal exchanges between teachers and students, so that teachers and students can have teaching resonance in mutual influence and mutual activities [6]. Secondly, from the perspective of the relationship between theory and practice, it proposes a shift from theory to practice. The basic goal of legal education is to cultivate application-oriented talents, which is to train individuals in society to become qualified legal professionals through a series of education and teaching links under the big data technology. The implementation of a scientific and effective economic rule of law is not only an inherent requirement for the continuous deepening of my country’s economic system reform, but also a realistic demand for proactively adapting to the new economic normal [7, 8]. The comprehensive promotion of the rule of law provides a rare historical opportunity for the comprehensive legislation of economic law [9, 10].

2 Teaching Idea Reform and Regulation Innovation of Economic Law Course Based on Big Data Technology 2.1 The Composition and Main Characteristics of the Concept of Economic Law Economic law has a strong binding force and manageability in the process of social progress, and promotes people’s acceptance of economic law theories through critical viewpoints, thereby raising the value of economic law theories to a deeper level. Economic law has been effectively implemented in accordance with socio-economic

Teaching Idea Reform and Regulation Innovation …

393

and social laws and has had a significant impact on social and economic development. Under the influence of objective conditions, it is necessary to conscientiously lay the economic foundation, improve market operations through reasonable choices, and enhance the organization of their operations. The comprehensive analysis of market prices and transaction behavior can greatly reduce the deviation of government intervention and coordination, and in this way show that the coordination and decisionmaking power of government departments is not a panacea. Economic law embodies the integration of society and politics. In the process of mutual integration between civil society and government, it promotes the healthy development of the market. Due to strict technical requirements, they are in a state of interdependence, which can maintain and maintain a better integration between society and political countries. Economic law promoted social and political changes, and people made scientific adjustments to the market structure in the legal field. Nowadays, it has realized the evolution of humanism and reflects the transformation of the individual-to-society standard attitude that is vital to economic law, highlighting the most fundamental meaning of economic law, and has played an effective role in promoting regional economic growth and human development. Effect.

2.2 The Reform of Economic Law Concepts in the Era of Big Data (1)

Market empowerment concept

With the rapid development of big data and artificial intelligence technology, the transformation of smart computers has brought new tools to the government, and the original socialist market and government management will gradually be unified. (2)

Shared governance and sharing concept

“The advent of the Internet age has changed our way of life.” At this stage, the national economy has completed the transition to a sharing economy. With the changes in the information revolution, government governance presents brand-new concepts and models, and the original issues of information crime, moral crisis, and social differentiation are facing tremendous pressure.

2.3 Reform of Teaching Ideas and Innovation of Regulations in the Course of Economic Law (1)

Explain the theory of economic law with economic methods

394

X. Zheng and C. Qin

Among all legal disciplines, economic law is the hottest, the most complicated, and the most annoying: teachers who teach economic law find it difficult to teach students and find it difficult to learn economic law. Therefore, the principles of economics can be used in the teaching of economic law to clarify the theoretical and practical issues of economic law. As an independent legal subject, teachers should first tell students what economic law is. In order to make students understand economic law accurately, they should use economic principles and guide them through indirect means. (2)

Explain the content of economic law with case analysis method

Case teaching itself is only a teaching method, not a teaching purpose. Its basic function is to verify and explain the theory, point out various problems that may arise in the law enforcement process in the form of examples, and explain how to solve these problems. To this end, teachers must make the selected cases serve the teaching, to prevent the phenomenon of giving examples for the sake of examples. When selecting cases, we should focus on some representative cases with great social impact. (3)

Online teaching

Independent learning and creative learning are the great advantages of online education. In online education, the teacher is the student’s tutor, initiates teaching with the student as the center, and is responsible for organization, teaching, management and research to ensure the quality of students’ independent learning. Through the online teaching platform, students can overcome time and space constraints and complete personal tasks such as online learning, homework submission, online testing, and study discussions. Students transform from traditional passive knowledge receivers to active learners, and can choose learning content according to their own situation. By learning under the guidance of teachers, personalized education will become possible. At the same time, data collection, analysis and evaluation of various online learning behaviors of students, in-depth study of their learning characteristics and existing problems, provide feedback and guidance for their learning activities, so that they can adjust learning strategies. At the same time, learning activities can provide a basis for the development and construction of network resources, paving the way for students to provide personalized education services.

2.4 Research on Decision Tree Algorithm When the decision tree was first established, many of its branches were constructed based on the abnormal data in the training sample set, which usually requires pruning. For the data set, the expected information is:

Teaching Idea Reform and Regulation Innovation …

I (n 1 , n 2 , ...n m ) =

m       P c j log2 P c j

395

(1)

j=1

P(cj ) = nj /total, j = 1, 2, …, m, represents the prior probability of each category, and I represents the amount of information gain.    n 1s + · · · + n ms I (n 1s , . . . , n ms ) E Af = total s=1 q

(2)

ns represents the number of samples in the data set, nms represents the number of samples of the category cj in the data set, Af represents a hypothetical attribute, and q represents different values.

3 Experiments on the Reform of Teaching Ideas and Regulation Innovation of Economic Law Courses Based on Big Data Technology 3.1 Experimental Object Selection and Research Methods In order to test the feasibility of transforming and innovative teaching methods under big data technology into actual teaching process after theoretical construction, this experiment selects all students majoring in economics from local key universities as the teaching experiment and research objects, and the experiment adopts a comparative research method. Research. The teaching method under big data technology is used in the experiment, and the traditional teaching method is still used before the experiment, and the teaching effect is compared to further analyze the feasibility and teaching effect of the new teaching method. The content of the experiment is divided into two aspects. The first is to investigate the effect of classroom teaching, and take the form of a large sample survey to understand the interest of students in learning economic law courses, the difficulty of teaching economic law courses, etc., to understand students’ learning Changes in attitudes and learning styles, followed by comparison of students’ final test scores, are aimed at comparing the improvement of experimental class and comparison class.

396

X. Zheng and C. Qin

Table 1 The attributes of common online learning behaviors Online learning behavior

Behavioral attributes

Browse lesson plans and knowledge points

Subject information, login frequency, time (enter, leave)

Ask a question

Subject, number of readings, number of replies

Answer question

Subject, frequency, number of correct times, number of errors

Real-time communication

Use tools, communication time, communication objects, communication content

3.2 The Purpose of Using the Online Teaching Platform Under Big Data Teachers can obtain the characteristics of students’ learning behavior through the network teaching platform and teaching management system, and can select some important characteristics as the statistical attributes of the network learning behavior. For example, the number of times students log in to the course, the length of study time, and the topics posted in the forum area, and the information that participated in the response. Reasonable quantification of students’ online learning behaviors, such as data statistics and data mining, is conducive to the establishment of learner models and helps teachers to grasp the learning characteristics of students. The attributes of common online learning behaviors are shown in Table 1.

4 Discussion on Reform of Teaching Ideas and Regulation Innovation of Economic Law Course Based on Big Data Technology (1) The teaching method of using big data technology in the new course of economic law can mobilize students’ enthusiasm for studying economic law to a large extent. Before the experiment, only 34.45% of the students were interested in the economic law course. 82.34% of students are interested in economic law courses. Interest is the best teacher to learn, and the stimulation of interest can drive the teaching effect of the entire economic law class. Before the experiment, 23.89% of the students thought that the teaching difficulty of the teachers in the economic law class was moderate, and 68.05% of the students in the economic law class. The teaching content is very difficult, and after the experiment 46.89% of the students think that the teaching difficulty of the teachers in the economic law class is moderate. The comparison of students’ interest in economic law courses under the education method using big data technology is shown in Fig. 1.

Teaching Idea Reform and Regulation Innovation …

397

Fig. 1 Comparison of students’ interest in economic law courses before and after the experiment

(2) Divide the surveyed students into two large groups, the experimental class and the comparative class, according to the number, and test them with a large sample to ensure the accuracy of the data. In this experiment, the results of the experimental class and the comparison class are used as the pre-test scores, and the final scores are used as the post-test scores. The results are shown in Table 2 and Fig. 2 for the average scores of the experimental class and the comparison class, respectively 62.32 points And 62.13 points. After the experiment, the average scores of the experimental class Table 2 Comparative analysis of students’ academic performance in economic law Average grade of Standard deviation Comparison class Standard deviation experimental class average Before testing 62.32

12.02

62.13

12.10

After test

13.33

66.76

12.67

74.88

Fig. 2 Comparative analysis of students’ academic performance in economic law

398

X. Zheng and C. Qin

and the comparison class were 74.88 and 66.76 respectively. From the analysis of the experimental results, after a year of applying the teaching methods under the big data technology to the experimental class students, there is a significant difference in the economic law scores of the experimental class and the comparative class. The economic law performance has a significant impact. Teaching practice has proved that in the teaching of economic law, the use of teaching strategies based on big data technology can enable learners to effectively, scientifically and systematically learn classroom knowledge, improve students’ cognitive ability of the subjectivity of economic law, and achieve Effective combination of economic law knowledge and ability.

5 Conclusion Online teaching is a new type of teaching method with its own advantages and development potential. It has been gradually promoted in different subject areas and different levels of teaching objects. The main purpose of economic law teaching under big data is to tell students what the law is, to learn about the legal system, legal regulations, and legal procedures, to understand these systems, regulations, the legislative purpose and legal spirit behind the procedures, and to quickly and effectively deal with the existing The comprehensive integration of knowledge achievements and theoretical research achievements can then be innovative, developed, and advanced. Innovative thinking, innovative methods and innovative abilities need to be unified and integrated to realize the reform of educational concepts and methods, transform the educational process of innovative concepts, and enable students to develop their own creative thinking and explore their own learning potential. In order to test the feasibility of transforming and innovative teaching methods under big data technology into actual teaching process after theoretical construction, the experiment in this article adopts a large sample survey method. Before the experiment, 23.89% of the students believed that the teaching difficulty of teachers in economic law courses Moderate. After the experiment, 46.89% of the students thought that the difficulty of teaching in economic law courses was moderate.

References 1. Enderle, G.: How can business ethics strengthen the social cohesion of a society? J. Bus. Ethics 150(3), 1–11 (2018) 2. SłokWódkowska, M.: International economic law. Asian J. Int. Law 7(1), 221–222 (2018) 3. Yuchtman, N.: Teaching to the tests: an economic analysis of traditional and modern education in late imperial and republican China. Explor. Econ. Hist. 63(16), 453–460 (2017) 4. Mccann, R.J., Shi, X., Siow, A., et al.: Becker meets Ricardo: multisector matching with communication and cognitive skills. J. Law Econ. Organ. 31(4), 690–720 (2016)

Teaching Idea Reform and Regulation Innovation …

399

5. Bottoms, B.L., Peterhagene, L.C., Epstein, M.A., et al.: Abuse characteristics and individual differences related to disclosing childhood sexual, physical, and emotional abuse and witnessed domestic violence. J. Interpers. Viol. 31(7), 1308 (2016) 6. Renard, R.D.: Creating the other requires defining Thainess against which the other can exist: early-twentieth century definitions (Redefining “otherness” from Northern Thailand). t¯onan ajia kenky¯u 44(3), 295–320 (2017) 7. Ireland, V., Gorod, A.: Contribution of complex systems to entrepreneurship. Enterp. Res. J. 6(1), 1–41 (2016) 8. Nogueira, R.M., Barone, B., Barros, T.T.D., et al.: Sixty years of the National Food Program in Brazil. Revista De Nutricao—Braz. J. Nutr. 29(2), 253–267 (2016) 9. Pettignano, R., Bliss, L., Mclaren, S., et al.: Interprofessional medical-legal education of medical students: assessing the benefits for addressing social determinants of health. Acad. Med. 92(9), 1254 (2017) 10. Sato, N.: The state of legal education in Japan: problems and “re"-renovations in JD law schools. Asian J. Law Soc. 3(02), 213–225 (2016)

Cake Customization System Based on Unity3d Shuaibin Wang and Mingsi Sun

Abstract In order to solve the problem that the appearance of birthday cake cannot be customized independently, unity and 3DS MAX were adopted in this paper to design a cake customization system, connecting Internet+ with traditional pastry customization. Users can download the cake model and cake parts on the mobile phone, and edit and assemble the cake by gesture like splicing blocks, and design the cake style by themselves. After the user completes the cake, the baker can view the model made by the user, and make according to the user model, so that the user can get a unique cake on his/her birthday. Keywords Cake customization · 3D model operation · Model operation

1 Introduction In recent years, the rapid development of Internet+ has created new models for many industries, and many industries have shown new vitality after joining the Internet. If the two elements of cake and model are added together with the Internet, the sales of cake will also be promoted to a certain extent [1]. The current situation is to put the cake picture on the Internet, and then the user can choose to buy according to the picture. However, if users have customization requirements, there is still no good solution in the direction of cake customization [2]. The current cake customization has the following pain points: (1)

(2)

Single user selection: When customizing the cake, users only choose according to the existing appearance, and they cannot further customize the appearance [3]. Not intuitive presentation: if users have customization requirements, they only rely on language to express, and it is difficult to express the desired appearance.

S. Wang · M. Sun (B) Electronic and Information Engineering College, Jilin Agricultural Science and Technology College, Network Engineering, Jilin 132101, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_49

401

402

S. Wang and M. Sun

Fig. 1 Composition of cake

(3)

Lack of personality display: The existing mode is only a single choice of existing styles, lacking the user’s sense of participation.

2 System Design This system first studies the appearance of the birthday cake on the market and analyzes the composition of the birthday cake [4]. Most cakes on the market can be divided into a structure of cream decoration layer + cream coating + cake billet (see Fig. 1). Based on user requirements, three customization items can be divided. Model components can be selected for the cake decoration layer. Cream coating can choose the cream material, color; The cake blank can choose the size, shape and so on. Unity is a professional 3D engine developed by Unity Technologies. Unity can easily realize 3d model visualization and gesture interaction between models. The software developed by Unity can run on Windows, Android, ios and other platforms. Unity is used as the development tool in this system.

3 Development Process of Stand-Alone System (1) (2)

3DSMax was used to create 3d models of cake billets and small cake accessories. Use Photoshop to map all the models and finish the mapping work on the cake model and part model.

Cake Customization System Based on Unity3d

Fig. 2 Flow chart

Fig. 3 The sample code

403

404

S. Wang and M. Sun

(3)

Save the model in. fBX format and import it into Unity. At the same time, render and bake to generate the final texture map. use C# in visual studio to write gesture operations, such as zooming in, zooming out, moving, rotating and so on, and add gesture operation scripts on the model.

(4)

4 System Key Technologies 4.1 Gesture Operation Gestures can be divided into the amplification, narrow, translation and other operation, first choose to operate on an object, the object is put on after the collision detector, click on the screen a ray returned to operate on objects, and then judge signal is amplified, narrow or translation, followed by the corresponding operation, the translation with the help of coordinate transformation, the 2 d coordinates of the screen into a scene of 3 d coordinates [5]. Translation of cake components. After adding gesture operation script on the cake and accessories, the user can get the object by clicking the screen with one finger. After pressing the screen with one finger for 0.5 s, the object can be moved to change its position. Enlargement and reduction of cake components [6]. When the user clicks to select an object with one finger, he can zoom in and out with both fingers. Rotation of cake parts. The definition rotates by the axis Y of the object. The camera rotates to zoom in and out. When the user touches the screen and does not get the object, the panning of the screen or zooming in and out will change the parameters of the camera. It rotates around this object, the cake.

4.2 Dynamic Loading The cake simulation production system puts the template and widget resources of the cake on the server side for users to download. It USES only a few local resources and downloads them from the server side when the user selects the template or widget to download. Implementing this functionality requires Unity’s dynamic loading technique.

4.2.1

Packaging Scenario

Dynamic loading technology is a good solution to download and load on demand.

Cake Customization System Based on Unity3d

405

Method using BuildPipeline. BuildAssetBundles packaged scenario for the AssetBundle, AssetBundle is a package of resources, including model, texture, prefabricated body, voice, and even the whole scene, can be loaded when the program is run [2]. Select Build Asset Bundles to create AssetBundle resources, which will be stored in the set path. The manifest file holds information about resources, such as versions, etc. [14].

4.2.2

Download and Instantiate the AssetBundle Resource

Once the AssetBundle resources are ready on the server side, you need to create a script to read the AssetBundle and add it to the scenario to run. When the user selects the required cake assembly, download and instantiate it according to the user’s choice [2].

4.2.3

Batch Create AssetBundle

As the number of projects increases, setting up AssetBundle manually becomes less efficient. You can find the required resources directly through the resource path and package them to the specified location.

5 Conclusion The cake customization system based on unity3D introduced in this paper modularizes the cake customization, makes it customizable and interesting, so that users can increase the sense of participation in cake customization [9]. The model and accessories are completed by the developer, and users only need to choose the model and accessories to match, thus avoiding the difficulties of model making [7, 8]. This system combines Internet+ and traditional pastry customization, which is an exploration of the operationalization of pastry customization and has certain application and commercial value [10]. Acknowledgements Supported item: National Undergraduate Entrepreneurship Project No. 201911439030. https://docs.unity3d.com/ScriptReference/AssetBundle.html.

406

S. Wang and M. Sun

References 1. Unity 3D\2D Mobile Game Development: From Learning to Product/Jinxi Once wrote. -4th edition. -Beijing: Tsinghua University Press, 2019 2. Peiyu, L.: Unity Online Game Combat, 2nd edn. Machinery Industry Press, Beijing (2018) 3. Lee, J.-h.: Interpretation by Unity5 Authority/(Han) (trans: Kong, X.). People’s Posts and Telecommunications Press, Beijing (2016) 4. UnityTechnologies. Unity Script Reference [EB/OL] 2019.2-003E 5. Liu, R., Sun, Y., Huang, Q., et al.: Simulation of location and size effects on performance adjustment in hybrid N-type MOSFETs. Mater. Sci. Semicond. Process. 111 (2020) 6. Every, J.P., Li, L., Dorrell, D.G.: Köppen-Geiger climate classification adjustment of the BRL diffuse irradiation model for Australian locations. Renew. Energy 147(Pt 1) (2020) 7. LeRoy, S., Gabert, T., Garcini, L., et al.: Attachment orientations and loss adjustment among bereaved spouses. Psychoneuroendocrinology 112 (2020) 8. Trempler, I., Bürkner, P.-C., El-Sourani, N., et al.: Impaired context-sensitive adjustment of behaviour in Parkinson’s disease patients tested on and off medication: an fMRI study. NeuroImage 212 (2020) 9. Wan, C., Huang, Y., Zheng, Y., et al.: Nuclear-data adjustment based on the continue-energy cross-section library for the fast reactor. Ann. Nucl. Energy 143 (2020) 10. Kaushik, A., Dwarakanath, T.A., Bhutani, G., et al.: Validation of high precision robot-assisted methods for intracranial applications: Prelim. Study World Neurosurg. 137 (2020)

Design and Inheritance of Iron Painting Intangible Cultural Heritage Based on Modern Information Technology Li Ma and Bin Wang

Abstract Wuhu iron painting is an important part of my country’s intangible cultural heritage. It is the highly condensed creation of creative artists over the past 300 years, revealing the continuous cultural heritage of our country. Under the multiple influence of modern information technology, iron painting design and inheritance presents a new development trend: iron painting information collection methods represented by three-dimensional laser scanning technology and panoramic technology can reconstruct iron painting works and store outstanding intangible cultural heritage for a long time; The iron painting information database with user data association function pushes non-heritage information that meets the interests and preferences of various types of users; designers use virtual reality technology as a platform to conceive iron painting shapes to reduce the creation errors of iron painting works. The combination of information technology and iron painting design has facilitated the large-scale dissemination of iron paintings and intangible cultural heritage, and has deeply consolidated the mass foundation of iron paintings. Keywords Information technology · Iron painting · Intangible heritage · Virtual reality · Inheritance

1 Introduction Our country’s long-standing history and culture has created thousands of intangible cultural heritage. Wuhu iron painting is a representative of the combination of traditional handicrafts and fine arts. It has experienced more than 300 years of vicissitudes and changes in my country and has become an important part of my country’s intangible cultural heritage in contemporary times. Components [1]. On the eve of the development of information technology, most of the protection and inheritance of intangible cultural heritage realized information dissemination through L. Ma (B) · B. Wang College of Internet and Communication, Anhui Technical College of Mechanical and Electrical Engineering, Anhui 241002, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_50

407

408

L. Ma and B. Wang

text, recording and other media. The arrival of the information age has enriched the ways and channels of intangible cultural heritage, and permanent visual storage has become possible [2]. Information technology is used in the design and inheritance of iron painting intangible cultural heritage in a flexible way. The sensitive elements of art design are deeply excavated and presented in an informatized and digital way. It is useful for extending the vitality of iron painting, increasing the accessory value of iron painting design, and enhancing the public’s culture of iron painting. A sense of identity is indispensable [3]. However, due to the multiple impacts of the information age, the innovation of the inheritance method of iron paintings has also suffered unprecedented development difficulties. How to use information technology to realize the innovative design and inheritance of iron paintings has become an urgent problem to be solved.

2 Feature of Iron Painting Intangible Cultural Heritage Design Style Wuhu iron paintings are included in the first batch of national intangible cultural heritage lists. Iron paintings use iron welding as the main technical structure, and then integrate paper-cutting, carving and other craft creation techniques, which have both the charm of traditional Chinese painting and the beauty of three-dimensional relief [4]. Iron painting is a kind of intangible cultural heritage of craftsmanship. The style of the work has obvious style characteristics: first, the color tone is mainly black and white, black expresses the content of the picture, and white as the background; second, it conveys a strong paper-cut artistic style. (1)

(2)

Black and white tone style. Most of the excellent ancient paintings in our country use black and white as the main color, and use a unique blank technique to convey a strong sense of space and beautiful mood. Iron painting draws on the uniqueness of traditional Chinese culture. In iron painting, white is used as the background and black is the main model, which weakens the sense of space depression and secularity brought by complex colors. The black and white collocation is simple and elegant, and the black iron material highlights the strength of the iron painting. In addition, with the application of new material technology and the in-depth implementation of environmental and low-carbon policies, the iron raw materials used in black iron paintings have been improved to low-carbon iron, which is in line with the development trend of an environmentally friendly society. Paper-cut art style. Paper-cutting itself is a unique art on paper. Yin and Yang use paper as the material and knife-cutting tools; the yin represents the hollow and the yang represents the paper-cut shape [5]. The overall style of iron painting is similar to the art of paper-cutting, and the creative technique and concept of the yin and yang of paper-cutting is used to create a sense of layering between the background and the picture. The art of paper-cutting continuously transmits

Design and Inheritance of Iron Painting Intangible Cultural …

409

Fig. 1 Iron painting works depicting “mountains”

multi-dimensional expressions and creative ideas to the iron painting creation process, which is vividly demonstrated in the iron painting forging process (Fig. 1). Based on its unique design style, Wuhu iron paintings are included in my country’s well-known intangible cultural heritage list, but due to the differences of the times, the non-genetic inheritance of iron paintings in today’s society is hindered. One is the lack of talents for informatization inheritance, the older generation of iron painting inheritors and artisans have weaker ability to accept information technology, and the way of oral cultural inheritance is relatively conservative, which greatly restricts the path of talent training [6]; Few inheritors of the generation are willing to engage in iron painting crafts, mainly due to the harsh working environment, the extremely cumbersome and complicated process of iron painting forging, drilling, welding and chiseling, and the difficulty of iron painting inheritance. Second, the creation of iron paintings lacks the sense of innovation that keeps pace with the times, and iron painting works created under rigid and fixed thinking are the same, and it is difficult to grasp the high taste of aesthetic appeal. Therefore, the development of iron paintings and intangible cultural heritage in the information age is confined to a small market space, and the level of integration into the global economic development wave is low. The sluggish development of iron painting intangible cultural heritage is the inevitable result of the changes of the times. It is precisely this severe challenge

410

L. Ma and B. Wang

that needs to be experienced in order to survive from the predicament and open a new starting point for iron painting intangible cultural heritage development. For this reason, it is necessary for craftsmen engaged in iron painting design to actively use information technology to seek a new way for iron painting design and inheritance.

3 Iron Painting Design and Inheritance Method Based on Modern Information Technology 3.1 Digital Collection of Intangible Cultural Heritage Information The information age has not only enriched the ways of collecting intangible cultural heritage information from iron paintings, but also improved the visualization level of information display. (1) Digital photography is a more frequently used digital acquisition method, which is different from the static and abstract descriptions of iron painting inheritors in general text and images. The camera technology can dynamically record the inheritor’s brief description of iron painting history and the artist’s process of creating iron paintings. Restore the details of production and convey the original Wuhu iron painting culture to the public. (2) Three-dimensional data collection technology can help designers collect complete and detailed iron painting information, creating a practical information acquisition method for Wuhu iron painting information protection. Three-dimensional data collection can be realized by using a laser scanner. This technology is also known as the real-world copying technology. The effect of reconstructing the iron painting model is self-evident. The data collected by the 3D laser scanner is point cloud data, which requires point cloud denoising, data splicing, and point cloud modeling to obtain an accurate iron painting 3D model. Three-dimensional data collection facilitates the reconstruction of iron paintings on computer software to reproduce masterpieces, which effectively solves the problem of loss of outstanding works, and at the same time realizes the long-term storage of outstanding works information. (3) The intangible cultural heritage virtual exhibition hall is a popular digital exhibition method in recent years. It collects all-round image information of the iron painting exhibition hall through panoramic technology and reproduces it in the network environment. The panorama technology is essentially based on the 360° horizontal image information and 180° vertical image information of the scene collected by professional equipment to obtain the wide-angle scene image; then use the stitching algorithm to re-splice the adjacent images to obtain a complete panorama of the exhibition hall scene [7]. Table 1 lists the general panoramic image acquisition equipment parameters, which can meet the requirements of iron painting panoramic image acquisition. Consistent with virtual reality technology, panoramic technology also needs to set a series of parameters such as roaming mode and roaming speed to increase the user’s experience of watching iron paintings in an interactive way.

Design and Inheritance of Iron Painting Intangible Cultural … Table 1 Basic parameters of panoramic image acquisition equipment

411

Parameter

value

Maximum effective pixel

2592 (H) * 1944 (V)

Pixel size

1.4 µm × 1.4 µm

S/N ratio

34 dB

Object distance

[5 cm, 100 cm]

Interface type

USB2.0 HighSpeed

Collection temperature range

[0 °C, 60 °C]

3.2 Storage and Display of Iron Painting Information Based on Database The iron painting intangible cultural heritage information collected by the above composition is stored in a database. The iron painting intangible cultural heritage database covers functions such as standardized bibliography, structured storage, multiple retrieval, and online query. Using the database as a tool [8], intangible cultural heritage workers and ordinary people can By consulting the iron painting text and image information freely, iron painting designers can easily obtain design materials and work samples, which not only realizes the safe storage and management of intangible cultural heritage resources, but also contributes to the extensive inheritance of iron painting craftsmanship and the sharing of designer knowledge. As a national intangible cultural heritage project, iron painting has a strong public cultural nature. Therefore, the construction of iron painting database is firstly led by the government and the overall layout of the database construction plan; secondly, it adheres to the principle of “grading” construction, assigns construction tasks from top to bottom, and achieves all levels The collaboration of the departments is to build a comprehensive iron painting intangible cultural heritage database suitable for cultural communication and design concepts; finally, to gather and help the whole society to aggregate database resources, and actively adopt non-genetic inheritors, Effective suggestions from applicants, database experts, intangible cultural heritage enthusiasts and other personnel will enhance the rationality and comprehensiveness of the construction of the iron painting intangible cultural heritage database. A comprehensive review of the construction of domestic non-heritage data shows that most databases have the problem of redundant and unorganized listing of massive resource information. It is difficult for users to obtain valuable target resources in a short period of time; the database organization structure is single and lacking, only satisfying Basic intangible cultural information query requirements, lack of malleable query functions. Such an intangible cultural heritage database has not achieved its purpose of guiding the masses and disseminating culture, and has lost the appeal of intangible cultural heritage. In response to this situation, the construction of the iron painting intangible cultural heritage database advocates the refinement of the classification and labeling of resources, and the addition of data mining correlation

412

L. Ma and B. Wang

Fig. 2 Classification details of iron painting intangible cultural heritage database labels

functions, so that each user’s query record can be traced. The label classification details of the iron painting intangible cultural heritage database are shown in Fig. 2. (1)

Tag information merging and filtering function

Database label classification may have redundant, complex, and cumbersome features. For this, it is necessary to finely filter the signature information of the standard iron painting database, delete infrequently used, low-relevance, and lowuse tags, and merge tags with the same meaning or inclusiveness Operation, will be able to be used as a higher query level of tags into separate categories, presenting a more systematic iron painting intangible cultural heritage database. It can be seen from the figure that high-frequency tags run through the intangible cultural heritage classification. On the one hand, they can be used as the key direction of user inquiries and provide a reference basis for non-targeted inquiries; When the high-frequency label meets the expert classification criteria, it can be used as a formal category. (2)

User data clustering function

The iron picture information classification label in the database has the function of user preference data clustering. According to the historical records of various types of users’ query labels, they can mine their preferences and carry out effective user group classification [9]. Based on this, various types of users can push iron painting intangible cultural heritage information that meets their interests and preferences. For example, iron painting designer users will receive current popular iron painting design works, iron painting composition thinking, expression style and other information.

Design and Inheritance of Iron Painting Intangible Cultural …

413

3.3 Visual Design of Iron Painting Based on Virtual Reality Technology The database creates a data foundation for iron painting design in virtual reality mode. Designers log in to the database account to obtain massive iron painting design data. At the same time, virtual reality technology can simulate and reproduce excellent iron painting works, and users can watch the iron painting exhibition without having to go out of the house, which expands the scope of the non-inherited iron painting. Relying on virtual reality technology to design iron paintings is mainly divided into three steps: 3D modeling, model rendering, scene interaction and roaming design: (1) Constructing a 3D model of iron paintings. Using 3DS MAX as the iron painting design practice platform [10], after determining the basic size, detail size, and modeling information of the iron painting, start to construct the 3D model. First use the scene database model to design the 3D modeling features of the iron painting, and then design the virtual iron painting visual scene, such as crafts Exhibition hall scenes, home furnishing scenes, indoor environment design scenes, etc. (2) Render the three-dimensional shape of the iron painting [11]. Rendering can make the iron painting frame have the texture of iron metal, so implement texture rendering on the 3D iron painting modeling model to give it material texture, and select the geometric surface type of Face Tools to build the 3D mesh model. Get closer to the effect of iron painting in reality, and improve the designer’s understanding of iron painting works. (3) Interactive roaming function design. Next, realize the roaming function of the iron painting exhibition VR scene. Based on the “role controller” to determine the user’s roaming direction and speed in the scene, the Wuhu iron painting works are displayed in the exhibition scene one by one, and the user can use VR equipment to watch vivid and three-dimensional, Realistic iron painting shape, truly breaking the restriction of cultural dissemination for intangible heritage lovers, realizing the sharing of unique iron painting intangible heritage resources in Wuhu area, allowing domestic and foreign audiences to feel the charm of iron painting craftsmanship.

4 Conclusion Wuhu Iron Painting has gone through multiple times of experience to obtain today’s artistic achievements and cultural heritage value, which concentratedly presents the heritage style of Huizhou culture. As a non-hereditary inheritor and designer of iron paintings, it is necessary to adapt to the development trend and atmosphere of the times, incorporate digital means, database technology, and virtual reality technology in a timely manner, present intangible cultural connotations in a way that advances with the times, and demonstrate the integrity of the Chinese nation. In addition, we must continue to innovate iron painting design methods, innovate creative thinking, and optimize the inheritor’s education mode, so that iron paintings will endure and have a long history in the various forms of folk art.

414

L. Ma and B. Wang

Acknowledgements This work was supported by 2017 Anhui Province University Humanities and Social Sciences Research Key Project “Wuhu Iron Painting Digital Protection and Inheritance Research” (SK2017A0809); 2018 Anhui Province University Natural Science Research Project “Intelligent Environment-based Service System Application Research” (KJ2018A0861).

References 1. Peng, Q.L.: Wuhu Iron Picture a traditional Chinese handicraft art in Anhui. Cult. Geogr. (003):94–103 (2015) 2. Yun, Q.: Research on the brand construction of iron painting in Wuhu under the new normal. Art Des. (2019) 3. Jia, D.-j., Lu, F.: Application of iron painting in image design of Wuhu City. J. Yibin Univ. (2013) 4. Rong-Cai, W., Yun, Q.: Exploration on WuHu Iron-painting “Literati Craftsman” cultivation under the perspective of cultural self-confidence. J. Tonghua Normal Univ. (2017) 5. Zhiyong, C.: Strategies of inheritance and development of Wuhu Iron Painting Art. J. Changchun Univ. (2015) 6. Yang, Y.: Investigation and analysis on Cognition Wuhu Iron Picture as a state-level intangible cultural heritage. J. Wuhu Inst. Technol. (2016) 7. Jialu, F.: On the modes of Wuhu Iron Picture forging crafts’ productive protection and utilization. J. Huangshan Univ. (2015) 8. Fang, F., Yulong, L.: Research on the diversified development of Wuhu Iron Picture Tourism from the perspective of creative tourism. Educ. Sci. Cult. Mag. (2015) 9. Wei-Ling, Z.: Intangible cultural heritage database construction in the Western minority areas based on the concept of “participatory digital protection"—taking Ningxia area as an example. Libr. Theory Pract. (2016) 10. Song, Y., Huang, K.: Innovation in designing the appearance of traditional handicraft product as shown in Wuhu iron picture. J. Huainan Normal Univ. (2013) 11. Ju, H.: Research on the efficiency measurement of Chinese cultural manufacturing industry based on DEA method. Int. J. Front. Sociol. 1(1), 32–42 (2019)

Mobile Violation Detection Robot for Expressway Based on Machine Vision Juan Shao

Abstract With the development of science and technology, China’s highway construction and development is faster and faster, and the highway safety accidents are also increasing. The traditional highway mobile violation detection system has the shortcomings of high cost, difficult maintenance, and low precision, high rate of missing detection. Therefore, this paper proposes the research of highway mobile violation detection robot based on machine vision research. On the basis of machine vision, this paper constructs a mobile illegal detection robot system for expressway. In addition, we use the combination of background subtraction and frame subtraction to detect moving objects. In the research, we select the accident prone section of an expressway, and take retrograde, parking, lane changing and speeding as the indicators to test the robot system in this paper. The results show that the correct detection rate is 90.9%, the missing detection rate is 4.55%, and the false detection rate is 4.55%. It can be seen that the robot based on machine vision has the advantages of high correct detection rate, low missing detection rate and false detection rate. In addition, this paper based on machine vision of highway mobile illegal detection robot is relatively small, simple structure, low cost, has great advantages in practical applications. Keywords Machine vision · Mobile violation detection · Moving target detection · Background subtraction method · Frame difference method

1 Introduction In recent years, although China’s highway construction is developing rapidly, it also brings a series of problems. We know that with the continuous increase of highspeed traffic flow, road safety accidents also increase year by year [1, 2]. Violation of regulations is a common phenomenon on expressways. Once violations occur, a series of traffic accidents will usually be caused, such as rear end collision or J. Shao (B) Liaoning Jianzhu Vocational College, No. 24, Qingnian Street, Liaoyang 111000, Liaoning, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_51

415

416

J. Shao

rear end serial collision, which will cause heavy casualties and property losses [3, 4]. At present, the development of highway violation monitoring in China is still unsatisfactory, and most high-speed traffic violations may cause extremely serious traffic accidents. If the information can not be transmitted quickly, the traffic can not be effectively dredged. In this way, the traffic flow and traffic efficiency will be reduced and other consequences will be caused, resulting in incalculable economic losses, Therefore, it is very important for high-speed safety accident treatment to detect the illegal movement of expressway [5]. Machine vision is closely related to image processing, pattern recognition and other disciplines [6]. It is defined as making the machine have the similar visual function with human through the visual device, and then obtaining information from the image and processing it, finally used to solve the actual needs. With the rapid development of computer technology, machine vision is widely used in military, environmental, industrial and medical fields. Machine vision is mainly used to solve the problems of target detection, image classification, target tracking and scene annotation [7, 8]. It is of great significance to apply machine vision to the detection of mobile violations on expressways, and to design a robot capable of detecting mobile violations on expressways, which is of great significance for reducing the losses caused by traffic violations on expressways [9, 10]. There are many shortcomings in the traditional highway mobile violation detection system. Therefore, this paper studies the mobile violation detection robot based on machine vision. On the basis of machine vision, this paper constructs a mobile illegal detection robot system for expressway. In the research, we choose the method of combining background subtraction and frame subtraction to detect moving objects. In addition, we use retrograde, parking, lane changing and speeding as indicators to test the proposed method. Compared with the traditional detection method, this method has the advantages of low error rate.

2 Machine Vision and Moving Object Detection Method 2.1 Machine Vision Machine vision technology takes images by industrial camera, analyzes image features by computer programming, extracts useful information from images, and simulates human vision to analyze and judge industrial products. Compared with human visual judgment, machine vision measures the product status through a series of quantitative indicators, which is objective and stable, and avoids the interference of human subjective consciousness. With the development of industrial automation, the demand of machine vision technology is increasing, and the application is more and more common. The theory and practice have made rapid progress.

Mobile Violation Detection Robot for Expressway Based …

417

2.2 Moving Target Detection Method

(1)

Frame difference method

In the frame difference method, we need to make a difference between the pixels between the frames, so as to compare the pixel difference with the preset threshold to determine whether there is a moving object in the image sequence. The formula is as follows:  1| f t (x, y) − f t−1 (x, y)| ≥ th (1) D(x, y) = 0| f t (x, y) − f t−1 (x, y)| < th This method is relatively simple, easy to implement, low complexity, and not sensitive to the changes of light, weather and other external environment, but it requires the speed of vehicles, so it can not extract the target foreground area completely. (2)

Optical flow method

The basic equation of optical flow method is as follows: ∂ F dy ∂F ∂ F dx + + = Fx u + Fy u + Ft = 0 ∂ x dt ∂ y dt ∂t

(2)

The constraint equation is as follows: F • U + Ft = 0

(3)

In practical application, this method has a large amount of calculation, and has high conditions for computer hardware. In practical application, it is difficult to carry out real-time detection. (3)

Background subtraction method

Background subtraction method is commonly used. In this algorithm, first of all, we need to use the relevant background modeling algorithm to establish a stable and pure background model: D(x, y) = | f t (x, y) − Bt−1 (x, y)|

(4)

Secondly, it is necessary to compare the difference between the current image and the background image with the preset threshold. In this link, if it is greater than the threshold, then the pixel is considered as the target foreground, otherwise it is the background:  F(x, y) =

1, D(x, y) ≥ th 0, D(x, y) < th

(5)

418

J. Shao

This method is simple and fast, and can get a complete and accurate description of the moving target area. In this paper, the background subtraction method and the frame difference method are combined to achieve the purpose of moving target detection.

3 Experimental Design

(1)

Research object

In order to verify the superiority of this robot based on machine vision, this paper selects the section of a highway where traffic accidents often occur as the research object, and selects the time period of frequent accidents of the expressway to detect its mobile violation. (2)

Study time selection

In the study, we selected a 12 h time span from 8:00 a.m. to 8:00 p.m. in order to ensure the reliability of the research results in this paper, we selected three days of detection data for processing, and analyzed the average value as the final research results of this paper. (3)

Selection of violation index

In the study, we use retrograde, parking, lane changing and speeding as indicators to detect violations, and compare the detection results with the traditional detection methods. In addition, we use the correct detection rate, missing detection rate and false detection rate to illustrate the advantages of this method.

4 Mobile Violation Detection Robot for Freeway Based on Machine Vision On the basis of machine vision, this paper constructs a highway mobile illegal detection robot system, and uses the combination of background subtraction method and frame difference method to detect moving targets. In moving object detection, we know that the premise of background subtraction method is to ensure that the background is fixed. When the background changes too much, it needs to compensate the background first. In practical application, we know that the traffic environment on both sides of the road is more complex, the background image is more sensitive to external factors such as light, weather changes and other external factors such as trees swinging with the wind may affect the stability of the background, these problems are all we need to consider in practical application.

Mobile Violation Detection Robot for Expressway Based …

419

Considering the complexity of the actual environment, the change of illumination or weather conditions can easily lead to false detection. Therefore, it is very important to establish a real-time and effective background model for the detection algorithm to run accurately for a long time. In this paper, the background difference method and the inter frame difference method are combined to solve the problem that the illumination and other environmental changes affect the accuracy of the detection results.

4.1 General Design of Expressway Mobile Violation Detection Robot System Based on Machine Vision Simple structure, easy installation and maintenance, and low cost are the important conditions for the practical application of the detection system to the market. In this paper, the highway mobile violation detection robot system based on machine vision consists of two parts: the upper computer control node and the lower computer detection node. The lower computer detection node includes two parts: camera equipment and embedded system. The software of the embedded system includes video image acquisition module, lightweight illegal parking detection module and communication module of upper and lower computer. The upper computer control node is implemented by PC. Firstly, the system sends the video image reference background collected by camera equipment to the upper computer (PC) through socket, and customizes the violation detection area in the violation area customization interface of the upper computer by manual customization, and creates the sampling points with equal space distribution in the area. Then the image coordinates of the sampling points and the corresponding gray information are sent to the lower computer (embedded) through socket as the pixel value of the background sampling points in the violation detection algorithm, and then the video image is processed by the lightweight violation detection algorithm to obtain the illegal stop vehicle information in the customized area. Finally, the upper computer will send the result to the socket. The system realizes the distributed detection of violation system through embedded equipment, which makes the whole detection system miniaturized, easy to install and maintain, and lays a foundation for the later application and promotion.

4.2 Test Results Analysis of Mobile Violation Detection Robot Based on Machine Vision The main performance indexes of the robot based on machine vision are shown in Table 1. It can be seen from Table 1 that the mobile violation detection robot based on machine vision in this paper is relatively small, simple in structure and low in cost.

420

J. Shao

Table 1 Performance index of robot Performance

Index

Performance

Index

Long

49 cm

Video camera

10 megapixel, 30 FPS 24 V,70wmaxon motor

Wide

49 cm

Electric machinery

High

40 cm

Drive

Differential drive

Weight

33 kg

Reduction ratio

33:1

Load

40 kg

Position closed loop accuracy

0.6%

In practical application, it is very advantageous. The robot in this paper is tested and the test results are analyzed in detail. (1)

Analysis of violation detection

In this paper, retrograde, parking, lane changing and speeding are taken as examples to detect violations, and the detection results are compared with the traditional detection methods, and the results are shown in Fig. 1. It can be seen from Fig. 1 that in this expressway section, the actual number of retrogrades is 3, the number of retrograde detected in this paper is 3, and the number of retrograde detected by traditional methods is 2. In the parking violation, the actual number of parking is 8, the number of parking detected in this paper is 7, the number of parking detected by traditional methods is 5. In the illegal lane change, the actual number of lane change is 4, the number of lane change detected in this paper is 4, and the number of lane change detected by traditional method is 3. In the speeding violation, the actual number of speeding is 7, the number of speeding detected in this paper is 6, and the number of speeding detected by traditional methods is 5. Analysis of correct detection rate, missed detection rate and false detection rate

Number

(2)

9 8 7 6 5 4 3 2 1 0

3

Actual value This method is used to detect the numerical value Traditional methods to detect values 8 7 7 6 5 5 4 4 3

3 2

Retrograde

Fig. 1 Analysis of violation detection

Parking Lane change Violation index

Speeding

Mobile Violation Detection Robot for Expressway Based …

421

25 20

20

This method is used to detect the numerical value Traditional methods to detect values

Number

15

15 10 5

5 0 Number of successful detection

1

2 1

Number of missed inspection

Number of false checks

Index Fig. 2 Analysis of the number of correct detection, missed detection and false detection

The number of correct detection, missed detection and false detection of this method and traditional methods are analyzed. The results are shown in Fig. 2. It can be seen from Fig. 2 that the number of violations successfully detected by this method is 20, thus the correct detection rate of this method is 90.9%. In addition, the number of violations successfully detected by the traditional method is 15, and the correct detection rate is 68.2%. It can be seen that the correct detection rate of this method is much higher than that of the traditional method. In addition, in violation detection, the number of missed detection is 1, the number of false detection is 1, the rate of missed detection is 4.55%, the rate of false detection is 4.55%, while the number of missed detection of traditional method is 5, the number of false detection is 1, the rate of missed detection is 22.7%, the rate of false detection is 9.1%. To sum up, this paper has a very high correct detection rate in the four violation indicators of retrograde, parking, lane changing and speeding, and the rate of missed detection and false detection is relatively low, compared with the traditional detection method, it has higher advantages. In addition, this paper has the characteristics of low cost and small size, which has great advantages in practical application.

5 Conclusions At present, the highway has gradually become the main artery of road traffic in our country. It not only undertakes more traffic flow, but also has more factors to induce traffic accidents. Therefore, it is very important to detect the mobile violation of the highway. The traditional mobile violation detection methods have many defects. In this paper, a mobile violation detection robot based on machine vision is proposed. In the moving object detection algorithm, we choose the combination of background

422

J. Shao

subtraction and frame subtraction to achieve the purpose of moving target detection. The results show that, compared with the traditional detection methods, this method has the advantages of high correct detection rate, low missing detection rate and false detection rate. In addition, although the robot based on machine vision has many advantages, it needs to be improved in practical application, so as to achieve higher accuracy and better detection of highway mobile violations.

References 1. Karakaya, S., Kucukyildiz, G., Ocak, H.: A new mobile robot toolbox for Matlab. J. Intell. Rob. Syst. 87(1), 125–140 (2017) 2. Gao, Y., Lei, W., Xie, X., et al.: Rapid human finding with motion segmentation for mobile robot. Int. J. Pattern Recogn. Artif. Intell. 32(4), 1855004.1–1855004.16 (2018) 3. Pattanayak, D., Mondal, K., Ramesh, H., et al.: Gathering of mobile robots with weak multiplicity detection in presence of crash-faults. J. Parall. Distrib. Comput. 123, 145–155 (2019) 4. Yusof, M.B., Saudi, M.B.M., Ridzuan, F.: A systematic review and analysis of mobile botnet detection for GPS exploitation. Adv. Sci. Lett. 23(5), 4696–4700 (2017) 5. Pavlovsky, V. E . A heuristic algorithm for isolated obstacle detection by a mobile robot based on ranging data. Sci. Tech. Inf. Process. 44(6), 430–439 (2017) 6. Singh, R., Nagla, K.S.: Error analysis of laser scanner for robust autonomous navigation of mobile robot in diverse illumination environment. Mil. Oper. Res. 15(5), 626–632 (2018) 7. Xiao, L., Li, Y., Huang, X., et al.: Cloud-based malware detection game for mobile devices with offloading. IEEE Trans. Mob. Comput. 10, 1 (2017) 8. Naoshi, K., Takeshi, Y., Kazuhiko, S.: Fast obstacle detection for monocular autonomous mobile robots. SICE J. Control Meas. Syst. Integr. 10(5), 370–377 (2017) 9. Muzny, M., Henriksen, A., Giordanengo, A., et al.: Wearable sensors with possibilities for data exchange: analyzing status and needs of different actors in mobile health monitoring systems. Int. J. Med. Inf. 133, 104017.1–104017.8 (2020) 10. Larue, G.S., Watling, C.N., Black, A.A., et al.: Pedestrians distracted by their smartphone: are in-ground flashing lights catching their attention? a laboratory study. Accid. Anal. Prev. 134, 105346.1–105346.10 (2020)

Network Data Processing Based on Cloud Computing Platform Dapeng Zhou and Yong Zhu

Abstract Traditional data mining technology is based on data repository and related data to calculate data, and find data relationship and data model. Therefore, when processing cloud computing platform network data, it will consume a lot of storage resources and computer resources, which not only has low mining efficiency, but also has high material and software costs, which to a certain extent limits the development of cloud computing platform, traditional data processing technology has been unable to adapt to the current era of large amount of information. Based on this, this paper studies the network data processing based on cloud computing platform. This paper designs k-means clustering algorithm to process network data, and selects 32G, 16G, 8G, 4G, 2G, 1G and other data groups to test the performance of clustering algorithm for network data processing. The experimental results show that with the increase of the size of the data set, the acceleration efficiency of the algorithm will also be improved. Keywords Cloud computing platform · Network data processing · Data mining · Clustering algorithm

1 Introduction With the gradual deepening of economic globalization, the scale of national construction has been further expanded [1, 2]. The development of the times urges people to step into the information age with high efficiency from the electrical age. The wide application of Internet technology has brought great convenience to people’s daily life and promoted the development of international economy [3, 4]. However, information processing technology is not mature at this stage, and information mining is relatively weak. In order to improve this phenomenon, data mining platform based on cloud computing emerges as the times require. It helps people solve the problem of data processing, and also promotes the development of the information age [5, 6]. D. Zhou · Y. Zhu (B) Gongqing College of Nanchang University, Gongqingcheng 332020, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_52

423

424

D. Zhou and Y. Zhu

The most important problem in data mining is the design of clustering algorithm. The main content of clustering algorithm is to collect abstract objects or natural objects and convert them into similar object groups [7, 8]. In the clustering algorithm, the complex formed by clustering mainly concentrates a group of data objects, and the objects are highly similar, but the objects in different systems have certain differences. Due to the huge amount of data, the existing clustering algorithms can no longer meet the requirements of data processing in terms of space and time complexity, so comprehensive and in-depth research is needed to find solutions [9, 10]. In order to solve these problems, we apply k-means clustering algorithm to parallel processing. In this way, parallel clustering algorithm can be innovated, and the efficiency and function of data processing algorithm can be significantly improved. For network data processing, it is of great significance. This paper studies the network data processing based on cloud computing platform. In the research, we design k-means clustering algorithm based on cloud computing platform to process network data. In the research, we run and test the k-means clustering algorithm through the cloud computing platform Hadoop. The test results show that with the increasing number of nodes on the platform, the kmeans clustering algorithm is more and more efficient in dealing with large data sets. On the platform of one node, the execution time of k-means clustering algorithm processing each data set is between 4.9 and 5.4. Under the platform of eight nodes, the execution time of k-means clustering algorithm for 32G data processing is three times that of 1G data processing. The experimental results show that k-means clustering algorithm has good speedup, scalability and data scalability in processing network data.

2 Cloud Computing and Data Mining 2.1 Cloud Computing 1.

2.

Cloud computing concept Cloud computing is a kind of more vivid statement. As a new network application model, its definition is not the same at present. On the basis of comprehensive research results, this paper defines cloud computing as: cloud computing is a kind of parallel computing, network computing and other computing methods. According to the needs of users, it can efficiently perform the calculation and storage of a large number of complex data, and the computing mode or computing platform commonly used by the calculation result course. Characteristics of cloud computing (1)

Universality: Cloud computing is supported by the cloud, and the built applications are constantly changing. Different applications can run under the same cloud at the same time.

Network Data Processing Based on Cloud Computing Platform

(2)

(3)

(4)

(5)

425

Virtualization: The services that users need can be obtained at any place through different terminals. The resources needed by cloud computing come from the cloud, and there is no need for tangible and stable entities. High reliability: The interchangeable multi computer isotope nodes, combined with multiple replica error tolerance methods, make cloud computing highly reliable. Good economy: The fault tolerance mechanism of cloud is very specific, so the nodes that compose the cloud are relatively cheap. Moreover, cloud management has the characteristics of centralization and automation. Therefore, the management cost is relatively low for the data center, and the enterprise does not need to increase the burden for this work. Large scale and high scalability: The scale of the cloud is dynamically expanded. From the perspective of users, this expansion is completely transparent and will not have any impact on the application and business of users.

2.2 Data Mining Based on Cloud Computing Data mining is to extract knowledge and information with practical value from random, noisy, incomplete, unclear and large amount of actual data. Given a set of observable variables X (x1 , x2 , . . . , xn ) and the experimental data D(di1 , di2 , . . . , din ), i = 1, 2, 3, . . . , m of these variables, the machine discovery system finds out the mathematical relationship that the set of variables satisfies: f (x1 , x2 , . . . , xn ) = c

(1)

where C is a constant, that is, (di1 , di2 , . . . , din ) satisfies the relation for any group of test data: f (di1 , di2 , . . . , din ) = c

(2)

Then, the relation f pair is any form of mathematical formula, including piecewise function. The complexity of the relation f (x1 , x2 , . . . , xn ) = c can be divided into the following categories: Elementary operation of variables: f (x, y) = xθ y

(3)

where θ is +, −, ×, /. Any combination of elementary functions: f (x, y) = a1 f (x)θa2 f (y)

(4)

426

D. Zhou and Y. Zhu

where θ is +, −, ×, /.

3 Experimental Environment and Evaluation Index 1.

2.

Experimental environment The experiments in this paper are run and tested on Hadoop cloud computing platform. Among the components of Hadoop cloud computing platform selected in this paper, there are 32 cores and 10 devices. Among them, there are 4 devices with 2.8G dual core and 4G core memory, and 6 devices with 2.33G quad core and 8G memory. In addition, the version of Hadoop cloud computing platform selected in this paper is 0.16.0 and Java version is 1.4.0–13. In the connection of different devices, we use the interactive machine to connect, and the transmission equipment uses Ethernet card. The transmission rate of Ethernet card is 1000 MPa. Experimental data and experimental evaluation index In this paper, we use 48 dimensions to search artificial data. In terms of algorithm performance test, the data sets involved in this study mainly include 32G, 16G, 8G, 4G, 2G, 1G, etc. In this paper, the data acceleration ratio, expansion rate and data expansion rate are used as evaluation indexes.

4 Experimental Analysis of Network Data Processing Based on Cloud Computing Platform 4.1 Design of Clustering Algorithm for Network Data Processing Based on Cloud Computing Platform This paper designs k-means clustering algorithm in parallel based on Hadoop cloud computing platform. The basic idea of k-means clustering algorithm is that the number of clusters must be known in advance when clustering data sets, which means to know the size of K value. The basic idea is: The initial cluster center points are randomly selected from the data set n, and the nearest neighbor principle is used to calculate the distance to each data sampling point in the cluster center, and then, according to the distance, each data sample is corresponding to the nearest set. Then, through iterative method, the function principle of grouping criterion is selected to calculate the distance from the sampling point of cluster center repeatedly until the cluster center does not change or the criterion function converges to a specific value, the algorithm ends the iteration. 1.

The process of k-means clustering algorithm is as follows

Network Data Processing Based on Cloud Computing Platform

(1) (2)

(3) (4)

2.

427

Randomly select k from the given data set samples as the initial clustering center. First, the distance between each data sample point and the cluster center is calculated, and then each data sample is allocated to the nearest cluster according to the distance. Through calculation, the average value of all the data is calculated, and the average value of the data is used to determine each new center. Judge whether the clustering function converges. If it converges, the algorithm will be finished and the corresponding clustering results can be obtained. Otherwise, jump to step 2.

Analysis of advantages and disadvantages of k-means algorithm The advantages of k-means algorithm include fast computing speed, strong scalability, concise thinking and high efficiency. However, k means algorithm also has some disadvantages, mainly including the following aspects: (1)

(2)

(3)

(4)

(5)

The algorithm does not stop to do a cycle, and then the operation allocates data, updates the center of the cluster, and divides the data into corresponding clusters. This makes the data set larger, the amount of data is also greatly increased, so the time cost is increased, and the effect of the algorithm is not good. Outliers and noise are easy to interfere with the algorithm, which may lead to the deviation of the next clustering center, which will lead to the low clustering effect. Local optimal solution is a difficult problem for the algorithm, which often puzzles researchers. The algorithm is only useful for numerical data clustering and data sets with convex clusters. The K value of the algorithm can not be determined, that is, the number of clusters can not be determined, only the researchers can make a rough prediction. Therefore, the clustering effect is often not ideal, can not get the best K value, thus reducing the quality of clustering results. The selection of the initial clustering center is very sensitive to the clustering results. Selecting different center points may result in different clustering results. If the initial clustering center is selected well, then it can get good results. Otherwise, it may get very bad results, or even lead to the failure of the results.

4.2 Analysis of Experimental Results

1.

Analysis of acceleration ratio test results

In the experiment, we test the speedup ratio of the k-means clustering algorithm designed in this paper when dealing with different data sets. The experimental results are shown in Fig. 1. Because there will be random initialization of the center point in

428

D. Zhou and Y. Zhu

Speedup

32G

16G

8G

4G

2G

1G

8 6 4 2 0

1

2

3

4

5

6

7

8

Number of nodes Fig. 1 Speedup ratio test results

the algorithm, each test group should be repeated 10 times, and the average execution time is taken as the final result of each test group. It can be seen from Fig. 1 that the acceleration ratio of the experimental test is nearly linear. When the data set is 1G, the acceleration ratios at different nodes are 0, 1.9, 2.1, 2.7, 3.1, 4.1, 4.9, 5.5. When the data set is 32G, the speedup ratios at different nodes are 0, 1.9, 2.7, 3.5, 4.2, 5.5, 6.3, 7.1, respectively. With the increase of data set size, the speedup ratio performance of the algorithm will be better and better. The main reason for this phenomenon is that the map in K-means clustering algorithm and the (key, value) pair designed in reduce are more reasonable, so that the algorithm can be implemented and executed efficiently and quickly. 2.

Analysis of test results of expansion rate

In order to test the expansion rate of K-means clustering algorithm in network data processing, four nodes from small to large are selected to test the expansion rate of different data sets. The test results are shown in Fig. 2. As can be seen from Fig. 2, the expansion rates of all six data sets are 1 at node 1. With the increase of the number of nodes, the expansion rates of six groups of data sets are 0.95, 0.93, 0.92, 0.91, 0.89, 0.88. When the number of nodes is 8, the expansion rates of six groups of data sets are 0.83, 0.79, 0.74, 0.70, 0.65, 0.59, respectively. For the same data set, when the platform node is in the same data set,

Expansion rate

1.2 1 0.8 0.6 0.4 0.2 0

1

2

4

8

Number of nodes 1G

Fig. 2 Test results of expansion rate

2G

4G

8G

16G

32G

Network Data Processing Based on Cloud Computing Platform

429

Table 1 Data scaling performance test results Data set

Node 1

1G

4.9

Node 2 5.2

2G

5.1

4G

5.1

8G

5.2

16G

5.2

32G

5.4

Node 4

Node 8

7.8

10.1

6.4

9.3

12.5

7.1

10.3

15.3

8.7

15.4

20.7

9.6

20.1

25.6

10.4

25.7

30.2

the expansion rate of the six data sets is 0.83, 0.79, 0.74, 0.70, 0.65, 0.59. When the number of nodes and the size of test data set increase in the same proportion, the expansion rate of k-means clustering algorithm gradually decreases, because when the number of platform nodes increases, the number of nodes and the communication cost between them will gradually increase. When the amount of data increases in the same proportion as the number of nodes, the execution time of k-means clustering algorithm will increase. However, it can be seen from the results that the expansion rate efficiency of k-means clustering algorithm is getting higher and higher with the increase of the size of the data set. This is because when the data scale increases, the total computing power of each node can be more utilized. 3.

Analysis of data scaling performance test

In order to analyze the performance of k-means clustering algorithm in network data processing, this paper tests the data scaling performance of k-means clustering algorithm under the platform of different number of nodes in the experiment. The test results are shown in Table 1. As can be seen from Table 1, with the increasing number of nodes in the platform, the efficiency of k-means clustering algorithm in processing large data sets is getting higher and higher. On the platform of one node, the execution time of k-means clustering algorithm processing each data set is between 4.9 and 5.4. Under the platform of eight nodes, the execution time of k-means clustering algorithm for 32G data processing is three times that of 1G data processing. Experiments show that k-means clustering algorithm is suitable for large-scale cloud computing platform, and can be effectively applied to the analysis and mining of massive data in practice.

5 Conclusions With the rise of the concept of cloud computing, the research of data mining and clustering algorithm based on cloud computing platform has gradually become a research hotspot at home and abroad. At present, cloud computing is widely used in various industries, and the production and operation of enterprises are realized by using its

430

D. Zhou and Y. Zhu

advantages in data mining algorithm. Based on this, this paper studies the network data processing based on cloud computing platform. This paper first describes the cloud computing platform and data mining related content, and then designs the clustering algorithm based on cloud computing platform for network data processing, and realizes the running and testing of k-means clustering algorithm through Hadoop cloud computing platform. The test results show that k-means clustering algorithm has good speedup, scalability and data scalability in processing network data. Acknowledgements This work was supported by JXJG-19-31-1: Research on structure the systematic of computer network technology specialty curriculum system of work process.

References 1. Xu, B., Xu, L., Cai, H., et al.: The design of an m-health monitoring system based on a cloud computing platform. Enterpr. Inf. Syst. 11(1), 17–36 (2017) 2. Zhang, Y., Zhou, Y.: Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing. J. Netw. Comput. Appl. 119, 110–120 (2018) 3. Yang, C., Chen, J.: A scalable data chunk similarity based compression approach for efficient big sensing data processing on cloud. IEEE Trans. Knowl. Data Eng. 6, 1 (2017) 4. Pan, L.: Node localization method for massive sensor networks based on clustering particle swarm optimization in cloud computing environment. Int. J. Wavelets Multiresolut. Inf. Process. 18(01), 66–77 (2020) 5. Gravina, R., Ma, C., Pace, P., et al.: Cloud-based activity-aaService cyber-physical framework for human activity monitoring in mobility. Future Gen. Comput. Syst. 75, 158–171 (2017) 6. Huang, W., Meng, L., Zhang, D., et al.: In-memory parallel processing of massive remotely sensed data using an apache spark on Hadoop YARN model. IEEE J. Sel. Top. Appl. Earth Observ. Rem. Sens. 10(1), 3–19 (2017) 7. Xu, C., Yang, J., Yin, K., et al.: Optimal construction of virtual networks for cloud-based MapReduce workflows. Comput. Netw. 112, 194–207 (2017) 8. Yang, C.T., Chen, S.T., Den, W., et al.: Implementation of an intelligent indoor environmental monitoring and management system in cloud. Future Gen. Comput. Syst. 96, 731–749 (2018) 9. Wang, X., Zhu, Y., Ha, Y., et al.: An energy-efficient system on a programmable chip platform for cloud applications. J. Syst. Architect. EUROMICRO J. 76(C),117–132 (2017) 10. Montella, R., Di Luccio, D., Marcellino, L., et al.: Workflow-based automatic processing for Internet of floating things crowdsourced data. Future Gen. Comput. Syst. 94, 103–119 (2019)

Construction of Green Logistics Evaluation System for Agricultural Products Cold Chain Based on Data Analysis Lu Zheng

Abstract With the emergence of various logistics models, the development of the entire agricultural product logistics system has been affected, resulting in a slowdown in agricultural economic growth. Based on this, this article selects 8 basic indicators of agricultural cold chain green logistics with reference to previous research documents, and classifies the indicators with factor analysis to establish an indicator model of agricultural cold chain green logistics and uses fuzzy evaluation method to compare them Factors for comprehensive evaluation. Keywords Cold chain green logistics · Logistics system · Factor analysis

1 Introduction In 2016, the State Council deliberated and approved the “Agricultural Product Cold Chain Logistics Development Plan”. Its main content is to standardize the standards for agricultural cold chain logistics and transportation, and proposed building a green cold chain logistics system [1]; in 2017, the central government issued the “About the Development of Cold Chain “Promotional Opinions on Logistics Guarantee Food Safety”, from the perspective of the whole opinion, the primary goal of cold chain logistics is to ensure the freshness and food safety of agricultural products, standardize the supply chain of agricultural products [2], and achieve save energy and decrease emission in the agricultural product logistics system. All in all, develop green logistics of agricultural products cold chain is imperative. One. Necessity of the development of my country’s agricultural cold chain green logistics. The inevitable choice for sustainable developing agricultural products enterprises. The concept of green logistics is fully embodied in all links of agricultural product logistics management. When most agricultural product companies develop enterprise logistics in the early stage [3], they only consider agricultural product transportation L. Zheng (B) School of Finance and Economics, Nanchang Institute of Technology, Nanchang 330044, Jiangxi, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_53

431

432

L. Zheng

Fig. 1 The development stage of the green logistics system

and logistics management without paying high attention to environmental protection, Making environmental pollution and resource waste more prominent, seriously affecting the business benefits of enterprises, and causing certain damage to social benefits. The specific situation is shown in Fig. 1.

2 Green Logistics is the Link Between Green Production and Green Consumption The green production technology and production processing adopted by agricultural products are to minimize the adverse effects of agricultural products on resources and the environment [4]. Green consumption mainly means that when agricultural products are used, the concept of green consumption is the main purpose, and the concept of environmental protection is used to reduce energy consumption to the greatest extent [5], so that the degree of greenness of agricultural products enterprises can be effectively perfect, and the products are green. The direction of development. See Fig. 2 for details. Three. Determining the evaluation model indicators of agricultural green cold chain logistics.

Fig. 2 Green economic cycle diagram

Construction of Green Logistics Evaluation System …

433

2.1 Evaluation Index Selection This article selects 8 representative indicators, the calculation formula and meaning of the indicators are as follows: (1)

From the perspective of the market environment, the market requirement of general green agricultural products will determine the planting scale of green agricultural products and the carrying capacity of agricultural green cold chain logistics [6]. The need of green agricultural products in the market is calculated as follows: Demand for green agricultural products =

(2)

The total consumption of green agricultural products in a certain area at the same time × 100% The total production of agricultural products in a certain area at the same time

The proportion of agricultural cold chain green logistics policies. From the perspective of developing agricultural product logistics [7], the logistics and transportation operations of agricultural products and a fair market economy environment are inevitable related to government policies. The cold chain green logistics industry is no exception. The calculation formula is as follows: Cold chain green logistics policy for agricultural products =

(3)

The total number of agricultural cold chain green logistics policies issued in the same region × 100% Total number of local cold chain logistics supporting facilities during the same period

Cold chain logistics equipment. High-quality cold chain logistics and transportation infrastructure will necessary to accelerating develop agricultural cold chain green logistics. The calculation formula is as follows: Cold chain logistics infrastructure =

Total number of cold chain green logistics infrastructure for agricultural products in the same region Total number of local cold chain logistics supporting facilities during the same period

× 100%

(4)

During cold chain green logistics transportation, the processing efficiency of agricultural products will affect the damage rate of agricultural products in cold chain logistics transportation. Agricultural product processing efficiency =

(5)

Processing quantity of regional agricultural products in the same time × 100% The original total number of agricultural products in the same period

The exhaust gas emitted by automobiles during the cold chain transportation of agricultural products can embody the development level of the cold chain green logistics of agricultural products. The vehicle exhaust emission formula is as follows:

434

L. Zheng

Emissions of transportation vehicles  = Quantity of exhaust of various types of transport vehicles (6)

Recovery rate of agricultural product packaging boxes and contaminated products. The waste generated in the cold chain logistics of agricultural products will pollute the environment [8]. This will be used as a reference indicator for cold chain green logistics. The calculation formula for transportation waste is as follows: Recycling rate of packaging materials and waste

(7) (8)

=

The number of regional logistics packaging materials recycled at the same time × 100% Total number of waste packaging materials in the region at the same time

The total value of cold chain logistics of agricultural products = the total value of agricultural products in the same region at the same time-the part that agricultural producers directly sell to residents for consumption through market trade.

2.2 Model Establishment The above is mainly to select 9 basic indicators, and then classify them through factor analysis, and organize the questionnaire data of predecessors, and then perform factor analysis calculations through SPSS15.0. The results can be seen Table 1. Table 1 Factor loading matrix after rotation Index

Classification 1

2

3

4

5

6

Requirement of green agricultural products

0.24

0.45

0.71

0.43

0.14

0.02

The proportion of agricultural products cold chain green logistics policy

0.71

0.22

0.01

0.21

0.14

0.06

Cold chain logistics facility

0.32

0.62

0.13

0.12

0.09

0.1

Agricultural product processing efficiency

0.09

0.09

0.12

0.18

0.87

0.01

Vehicle emissions

0.15

0.12

0.15

0.23

0.31

0.61

Recovery rate of agricultural product packaging boxes and contaminated products

0.15

0.08

0.42

0.08

0.07

0.68

Cold chain transportation cost of agricultural 0.14 products

0.34

0.12

0.64

0.15

0.14

Total value of agricultural products cold chain logistics

0.21

0.12

0.84

0.42

0.13

0.14

Construction of Green Logistics Evaluation System …

435

3 Establishment of Evaluation Index Model for Agricultural Cold Chain Green Logistics Name the 6 factors proposed in the factor analysis process, and divide and classify the 9 indicators into 6 new factors according to the results of the factor load matrix after rotation. The naming of the 6 types of indicators and the included sub-indices are as follows: (1)

(2)

(3)

The external environment of cold chain logistics of agricultural products is mainly related to the logistics policies issued by local governments, which include standardized logistics standards, standardized cold chain transportation operations, and storage standards for green agricultural products [9]. Professional operation process. In this article, the processing rate of agricultural products and green cold chain logistics professionals are the basic indicators of professionalization. Environmental protection of green cold chain logistics. In this indicator selection, vehicle energy consumption and the use of green packaging materials are used as environmental protection indicators in the logistics and transportation process.

This article is mainly based on the factor analysis method to organize and classify the assess system of agricultural cold chain logistics. The assess system will be composed of three layers, the distribution of which is the target layer, the criterion layer and the index layer. The target layer mainly the target in the cold chain green logistics system of agricultural products; the criterion layer is mainly the basic principle for evaluating agricultural products in the logistics and transportation process. The indicator layer will be the eight basic indicators for the evaluation of green cold chain logistics of agricultural products. The indicators are finally summarized into the standard layer according to different impact content [10]. Four. Evaluation model of agricultural green cold chain logistics. In this article, the fuzzy comprehensive assess method is mainly applied to thoroughly access the various indicators of agricultural green cold chain logistics. The biggest advantage of fuzzy evaluation method is that it has strong universality, validity and scientificity. The process of the evaluation model for agricultural green cold chain logistics indicators is as follows: (1)

(2)

(3)

Determination of evaluation target index set. In the evaluation process of agricultural green cold chain logistics indicators, when N evaluation indicators are formulated, the set of factors is u = {u1 , u2 , …, un }. Confirmation of comment collection. When the agricultural green cold chain logistics determines N indicators, its comment set will contain N subsets, which is expressed as V = {v1 , v2 , v3 , …, vn }. Build fuzzy relationship matrix.

436

L. Zheng

When establishing the fuzzy relationship matrix, the first step is to quantify the collected agricultural green cold chain logistics and transportation index data, and each index is quantified u(i = 1, 2, …, N) by quantifying each index The degree of membership will also be directly determined, and the fuzzy relationship matrix will be transformed through the degree of membership: ⎤ r11 r12 . . . r1m ⎢ r21 r22 . . . r2m ⎥ ⎥ R=⎢ ⎣ ......... ⎦ rp1 rp2 . . . rNm ⎡

(4)

(5)

(1)

In the evidence of the established fuzzy relationship, each element in it represents a relationship, which represents the subordination relationship between the indicator and the green cold chain logistics of agricultural products. The situation reflected by a certain index of the evaluation object can also be reflected by the fuzzy vector (R | ui ) = (ri1 , ri2 , …, rim ). Evaluation index weight vector. If the evaluation index weight vector is A = (a1 , a2 , …, aN ), in this model, the tomographic method is mainly applied to decide the weight vector of each major index. Through the determination of the weights, the importance and order of each index can be analyzed, and the main pweight coefficients will also be confirmed. Which is synthesized to get, i=1 ai = 1, ai ≥ 0, i = 1, 2, . . . , n. Determination of result vector of synthetic fuzzy comprehensive evaluation. The weight vector A and the fuzzy relationship matrix vector are synthesized. The vector generated after its synthesis will be the result vector B, which represents the degree of membership of the indicators in the green cold chain logistics system of agricultural products in the overall environment. ⎡

⎤ r11 r12 . . . r1m ⎢ r21 r22 . . . r2m ⎥ ⎥ A = (a1 , a2 , . . . , aN )⎢ ⎣ . . . . . . . . . ⎦ = (b1, b2, . . . , bm) = B rp1 rp2 . . . rNm (6)

(2)

Result vector analysis. When analyzing the result vector of the green cold chain logistics of agricultural products, it is mainly carried out by the maximum degree of membership method, in which only the maximum evaluation index is used for level matching. In order to further determine the impact of multiple indicators on the green cold chain logistics of agricultural products, the result vector B is weighted average to get the comprehensive membership degree [11]. The weighted average algorithm is as follows:

Construction of Green Logistics Evaluation System …

S=

n 

BN AN

437

(3)

N=1

4 Conclusion This paper applys the fuzzy model analysis method to assess its evaluation index model as a whole, and then obtains the entirety development level of agricultural green cold chain logistics. Meanwhile the established agricultural green logistics evaluation system can be applied to assess the development of cold chain green logistics in a certain area. Then, based on the evaluation results, problems were found and targeted improvements were made.

References 1. Ni, Z.: Exploring the development path of green supply chain. Environ. Protect. 44(3–4), 70–72 (2016) 2. Chen, Z., Li, H.: A review of domestic agricultural product logistics research. Logist. Technol. 10, 26–27 (2016) 3. Xu, X.: Research on the obstacle mechanism and promotion strategy of the green development of enterprise logistics, pp. 30–35. Beijing Jiaotong University, Beijing (2016) 4. Yang, G., Lin, C., Xie, X.: Research on cold chain logistics mode and countermeasures of fresh agricultural products. Guangdong Agric. Sci. Technol. 200–201 (2017) 5. Fang, K., Zhong, Z., Wang, H., He, L.: The efficiency analysis of my country’s cold chain logistics enterprises based on green supply chain. Agric. Technol. Econ. 06 (2014) 6. Li, M., Wu, C., Hu, J.: Performance evaluation of agricultural products cold chain logistics enterprises based on fuzzy matter-element model. Jiangsu Agric. Sci. 05 (2014) 7. Li, Z., Qie, H.: Research progress on cold chain logistics of agricultural products. J. Anhui Agric. Sci. 13 (2014) 8. Wang, Z., Zhao, F.: Research on the development of hunan agricultural products cold chain green logistics. Logist. Eng. Manag. 03 (2014) 9. Liu, L.: Analysis of strategic countermeasures for large-scale enterprises to implement green logistics. Sci. Technol. Manag. Res. 24 (2013) 10. Wan, Y.: Research on the path of logistics cost reduction based on green logistics. Shaanxi Educ. (High. Educ. Edn.) 12 (2013) 11. Zhang, X., Li, D.: Research on E-commerce logistic satisfaction based on TOPSIS method. Int. J. Front. Soc. 1(1), 12–22 (2019)

A Study on Virtual Reality Technology for College Oral English Online Self-help Learning System Wenjuan Dong and Guoliang Wang

Abstract In order to improve the online self-help learning ability of college oral English, a virtual reality-based online self-help learning system for college oral English is proposed. The Internet of Things networking technology is used to design the network of online self-help learning system for college oral English. VR technology is used to simulate the virtual reality and reconstruct the virtual scene of online self-help learning for college oral English. The image processing of online self-help learning for college oral English is carried out in the data processing module. Combined with ISA/EISA framework, the network design of online self-help learning system for college oral English is carried out. The 32-bit embedded design method is used for the integrated information collection and fuzzy scheduling of college oral English online self-help learning system, and the core controller is used for college oral English online self-help learning and information sampling. VR technology is used to simulate the virtual reality and reconstruct the virtual scene of online selfhelp learning of college oral English, and the online self-help learning of college oral English is carried out in A/D and D/A. The simulation results show that the designed online self-help learning system for college oral English is stable and reliable. Keywords Virtual reality technology · College english · Oral english · Online self-help learning · System design

W. Dong (B) Tianjin University of Technology, Xiqing District, Tianjin, China e-mail: [email protected] G. Wang Xu Rising Offshore Engineering Co., Ltd., Dongli Distirct, Tianjin, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_54

439

440

W. Dong and G. Wang

1 Introduction The development of Internet of Things and multimedia technology has spawned the emergence and development of virtual reality technology in college English teaching [1]. In order to quantitatively study and analyze the influence of multimedia and network mixed teaching on online self-help learning ability of college oral English, it is necessary to design a quantitative model, study the networking model of virtual reality technology in college English teaching, combine the optimal scheduling model of college oral English teaching resources, carry out network development and scheduling of English teaching resources, and develop online self-help learning system of college oral English to improve online learning ability [2]. With the development of college oral English online self-learning technology, this paper constructs college oral English online self-learning software, improves college oral English online self-learning and visual simulation capabilities, simulates the virtual scene of college oral English online self-learning, establishes college oral English online self-learning analysis, improves college oral English online selflearning analysis, and combines computer vision image analysis technology [3]. By the visual feature detection and analysis of college oral English online self-study, the edge contour feature detection model of college oral English online self-study is established, and the analysis of college oral English online self-study is carried out by corner marking and key feature point reconstruction, which improves the visual analysis ability of college oral English online self-study [4]. This paper puts forward the design method of online self-help learning system of college oral English based on virtual reality technology. Firstly, the overall structure model of online self-help learning software for college oral English is constructed, and then the functional modular design of online self-help learning system for college oral English is carried out. Finally, the simulation test analysis is carried out, and the validity conclusion is drawn [5, 6].

2 Overall System Design Framework In order to realize the design of college oral English online self-help learning system and build the overall structure model of college oral English online self-help learning software, the embedded BS architecture system is used to analyze the system structure, APLC21160 logic processor chip is used as the digital processing control chip for the college oral English online self-help learning software [7], combined with embedded control method and embedded cross-compiling method. The upper computer communication protocol of college oral English online self-help learning system is designed, and the upper computer communication module of college oral English online self-help learning system is constructed. The ISA/EISA/Micro Channel expansion bus is used to load the instructions for making college oral English online self-help learning software, the embedded BS architecture system is used to

A Study on Virtual Reality Technology for College Oral …

441

analyze the system structure, and the Internet of Things networking technology is used to design the network of college oral English online self-help learning system. The characteristics of online self-help learning of college oral English are analyzed by using multivariate linear fusion method, the output logic programming module of online self-help learning system of college oral English is established by combining PLC control method, and the intelligent information of online self-help learning software of college oral English is collected by using AD module. The APLC21160 logic processor chip is used as the digital processing chip for the online self-help learning software of college oral English, and the networking design of the online self-help learning system of college oral English is carried out in combination with ISA/EISA framework mode [8].

3 Function Module Analysis of the System VR technology is used to simulate virtual reality and reconstruct virtual scene of online self-help learning of college oral English. 32-bit embedded design method is used to integrate information collection and fuzzy scheduling of online self-help learning system of college oral English. Online self-help learning and information sampling of college oral English are carried out in core controller. Information conversion and man–machine interaction control of online self-help learning system of college oral English are realized in D/A converter. The functional modules of the system are shown in Fig. 1. Data acquisition and processing

Control actuator

Set signal output parameters

Transceiver conversion

Oral information collection

D/A converter

Controller core board

Interface design between PCI and DSP

Fig. 1 Composition of functional modules of the system

System clock conversion

Virtual information output

442

W. Dong and G. Wang

4 Algorithm Design of Online Self-Help Learning Software for College Oral English Based on the analysis of the overall design framework and functional modules of the system, the algorithm design of the online self-help learning system for college oral English is carried out, including image enhancement algorithm and visual reconstruction algorithm [9, 10]. Using RGB image enhancement method, the virtual reality scene of college oral English online self-help learning is enhanced, and the three-dimensional color component of college oral English online self-help learning is established [11, 12]. N be the three-dimensional image component composed of SD scalars. Let A = {ai }i=1 Combined with the method of color space transformation, the color decomposition problem of virtual reality scene of college oral English online self-help learning is established, and the frame number of pixel distribution of the image meets the following constraints: s ≤ t ⇒ κ s (A) ≤ κ t (A)

(1)

lim κ P (A) = max ai

(2)

lim κ P (A) = min ai

(3)

P→+∞

P→−∞

i

i

Considering the gray level of the image in the online self-help learning process of college oral English, combining with the fuzzy recognition method, the gray level pixel-level reconstruction of the image is carried out, and the quantitative features of the image in the pixel layer are obtained, and the difference stitching coefficient is obtained. In the gray color space, the normalized color feature decomposition method is used to obtain the color space numerical distribution expression. Visual simulation is carried out on the virtual image in the online self-help learning process of college oral English, and the global tone mapping function is obtained by using the disparity analysis method: gi∗

 =

Rs j gi

z≤i ≤x−y other wise

(4)

In this formula, R is a normative constant, and an animation image information fusion method based on gray histogram three-dimensional reconstruction is adopted to construct the dynamic information fusion feature quantity of the virtual scene of online self-help learning of college oral English, set the conversion feature quantity of color space, calculate the two-dimensional gray feature value of the virtual scene of online self-help learning of college oral English, and construct the distribution feature value of online self-help learning of college oral English. The maximum gray value of online self-help learning of college oral English is as follows:

A Study on Virtual Reality Technology for College Oral …

n pq =

443

μ pq (μ00 )γ

(5)

Euclidean distance is used to describe the color difference of animated images, and the gray feature values of images with different exposure times are obtained. The associated feature quantities are obtained by ambiguity detection. After normalization, the Lagrange equation of virtual scene simulation for online self-help learning of spoken English in colleges and universities in gray pixel space is obtained as follows: Fd −

d d Fd − Fd = 0 d x x dy y

(6)

Combining with the visual features simulated by the virtual scene of online self-help learning of spoken English in colleges and universities, the information is enhanced. According to different light sources displaying the same color, the gray  δ 2 −δ 2

distribution feature quantity, β = max l δ2 η , 0 , in the color space is obtained. l Using the least square support algorithm, the sparse reconstruction model of mixed structure is constructed, and the hierarchical feature distribution function f (gi ) is obtained as follows: f (gi ) = c1 λ˜ i

Nnp  j=0

ρ j υi j  σ1 υi j  + ε

 Nnp j=0

ρj  σ1 υi j  + ε

(7)

Combined with active contour detection method, the output feature value of gray histogram of virtual scene information fusion in online self-help learning  c of college oral English meets min min I A(y) → 1. At this time, due to c∈{ r,g,b}

y∈ (x)

t˜(x) → 0, based on Harris wavelet feature analysis and dictionary learning method, the maximum likelihood estimation of the image is as follows: d f t+1 (i, j, k) = ρd f t (i, j, k) + (1 − ρ)d f t−1 (i, j, k)

(8)

In the formula, ρ represents the matching coefficient of online self-help learning of college oral English. According to the above analysis, the virtual scene enhancement model of online self-help learning of college oral English is established, and the software is made according to the image enhancement results.

5 Analysis of Simulation Experiment Virtual reality simulation and virtual scene reconstruction of college oral English online self-help learning process are carried out by using VR technology. College

444

W. Dong and G. Wang

Matching success rate

Fig. 2 Simulation process of online autonomous learning of college oral English

Number of vehicles

oral English online self-help learning and visual reconstruction are carried out in A/D and D/A. Dynamic optimization and parameter simulation of college oral English online self-help learning process are carried out through Vega Prime’s interactive function. The carrier frequency of college oral English online self-help learning software is set at 500 Hz, and the gray edge pixel characteristic value is 1200. The simulation of college oral English online self-help learning virtual scene software is achieved. in Fig. 2. The output peak signal-to-noise ratio (PSNR) of the virtual scene software for online self-help learning of college oral English by different methods is tested, and the comparison result is shown in Fig. 3. By analyzing Fig. 3, it is known that the output peak signal-to-noise ratio of the virtual scene software for online selfhelp learning of college oral English by this method is higher, indicating that the production effect is better. 0.35

Fig. 3 Comparison of output peak signal-to-noise ratio

0.3

MSE

0.25

Traditional method Proposed method

0.2 0.15 0.1 0.05 0 10

20

30

40

50

60

70

Iterative step number

80

90

100

A Study on Virtual Reality Technology for College Oral … Fig. 4 Comparison of packet loss rate

445 Proposed

Existing

Loss rate(%)

8 6 4 2 0

10

15

20

25

30

v

Fig. 5 Time delay comparison

Proposed

Existing

Delay(ms)

250 200 150 100 50 0

10

15

20

v

25

30

Test different methods to analyze the impact of college oral English online selfhelp learning ability and the packet loss rate of resource scheduling. The comparison results are shown in Fig. 4, and the time delay comparison results are shown in Fig. 5. From the analysis of the above results, it can be seen that the packet loss rate of online self-help learning of college oral English under strong interference is higher and the time delay is smaller.

6 Conclusions In this paper, a virtual reality-based online self-help learning system for college oral English is proposed. The Internet of Things networking technology is used to design the network of online self-help learning system for college oral English. VR technology is used to simulate the virtual reality and reconstruct the virtual scene of online self-help learning for college oral English. The image processing of online self-help learning for college oral English is carried out in the data processing module. Combined with ISA/EISA framework, the network design of online selfhelp learning system for college oral English is carried out. The 32-bit embedded design method is used for the integrated information collection and fuzzy scheduling of college oral English online self-help learning system, and the core controller is used for college oral English online self-help learning and information sampling.

446

W. Dong and G. Wang

References 1. Al-Hussein, A., Haldar, A.: Unscented Kalman filter with unknown input and weighted global iteration for health assessment of large structural systems. Struct. Control Health Monit. 23(1), 156–175 (2015) 2. Liu, Y., Liu, J., Liu, J.: Research on composite inversion of dynamic loads and structural parameters based on sub-structure analysis. J. Mech. Strength 35(5), 553–558 (2013) 3. Noël, J.P., Kerschen, G.: Nonlinear system identification in structural dynamics,10 more years of progress. Mech. Syst. Sig. Process. 83, 2–35 (2017) 4. Li, L., Cheng, S., Wen, Z., Xiao, M., Xu, G., Zhang, S.: A debris flow prediction model based on the improved KPCA and mixed kernel function LSSVR. Inf. Control 48(5), 536–544 (2019) 5. Xu, Z., Xiao, C., Liao, Y., et al.: Analysis of the seismic-isolated connected structures for MOMA. China Civil Eng. J. 41(3), 53–57 (2008) 6. Yuan, Y., Wang, F.Y.: Blockchain, the state of the art and future trends. Acta Autom. Sin. 42(4), 481–494 (2016) 7. He, P., Yu, G., Zhang, Y.F., et al.: Survey on blockchain technology and its application prospects. Comput. Sci. 44(4), 1–7, 15 (2016) 8. Yang, Y.: Elements of information theory. J. Am. Stat. Assoc. 103(3), 429–429 (2008) 9. Iam-On, N., Boongoen, T., Garrett, S., et al.: A link-based approach to the cluster ensemble problem. IEEE Trans. Pattern Anal. Mach. Intell. 33(12), 2396–2409 (2011) 10. Zhou, P., Du, L., Wang, H., et al.: Learning a robust consensus matrix for clustering ensemble via Kullback-Leibler divergence minimization. In: Proceedings of the 24th International Conference on Artificial Intelligence, pp. 4112–4118. AAAI Press, Palo Alto (2015) 11. Xu, J., Miao, D., Zhang, Y., et al.: A three-way decisions model with probabilistic rough sets for stream computing. Int. J. Approx. Reason. 88, 1–22 (2017) 12. Miao, D.Q., Xu, F.F., Yao, Y.Y., et al.: Set-theoretic formulation of granular computing. Chin. J. Comput. 35(2), 351–363 (2012)

Construction of Motivation Analysis Model for College Students’ Online Information Query Qiusheng Hu and Zhenyu Lai

Abstract This paper proposes a modeling method of college students’ online information query motivation based on statistical feature information fusion. The statistical sequence model of university students’ online information query motivation distribution big data is constructed, and the big data prediction of university students’ online information query motivation is carried out by using the method of restructuring the regional structure of big data space. The association rule distribution feature set of university students’ online information query motivation distribution big data is established, and the fuzzy correlation constraint control method is combined to predict university students’ online information query motivation. The decision tree model is used for big data test and template matching of college students’ online information query motivation in complex network environment, and the statistical sequence model of college students’ online information query motivation distribution big data is constructed. Predicate logic reasoning is used to realize the optimization prediction of the development direction of college students’ online information query motivation, and the subsection test method is used to control the optimization of data clustering center to realize the analysis model of college students’ online information query motivation. The simulation results show that this method has higher accuracy and better reliability in analyzing the motivation of college students’ online information query. Keywords College students · Go online · Information inquiry · Motivation analysis · Big data

1 Introduction Combining with regional characteristics, this paper analyzes the development direction of college students’ online information query motivation, constructs the development model of college students’ online information query motivation, effectively Q. Hu (B) · Z. Lai Nanchang University College of Science and Technology, Gongqingcheng 332020, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_55

447

448

Q. Hu and Z. Lai

identifies the big data of college students’ online information query motivation distribution, extracts the association rule set of college students’ online information query motivation distribution big data, realizes the supervision of college students’ online information query motivation, and studies the analysis and modeling methods of college students’ online information query motivation, which is of great significance in promoting the supervision and management of college students’ online information query motivation [1, 2]. Combined with the optimization mining and fusion clustering processing of college students’ online information query motivation data, the association rule distribution feature set of distributed big data of college students’ online information query motivation is established, and the fuzzy correlation constraint control method is combined to predict college students’ online information query motivation [3]. The correlation evaluation set of the development direction of college students’ online information query motivation is established, and the fuzzy parameter quantitative evaluation method is combined to predict the development direction of college students’ online information query motivation [4–6]. However, the above methods are ambiguous and have poor feature discrimination ability. Therefore, this paper proposes a modeling method of college students’ online information query motivation based on statistical feature information fusion. The statistical sequence model of university students’ online information query motivation distribution in big data is constructed.

2 Big Data Modeling and Characteristic Analysis of College Students’ Online Information Query Motivation 2.1 Big Data Modeling of College Students’ Online Information Query Motivation The spatial structure reorganization method of big data is used to predict university students’ online information query motivation distribution big data [7]. The probability distribution function of university students’ online information query motivation distribution big data is P(n i ) = { pk | prk j = 1, k = 1, 2, · · · , m}, and the fuzzy membership function of university students’ online information query motivation distribution big data modeling is as follows: PF =

N N    j=k

PD =



j=k

(1)

(Pdi )u i (1 − Pdi )1−u i

(2)

u i = j i=1

N N    

(P f i )u i (1 − P f i )1−u i

u i = j i=1

Construction of Motivation Analysis Model …

449

where, P f i is the semantic feature distribution set of university students’ online information query motivation distribution big data, Pdi is the fuzzy association rule set of university students’ online information query motivation distribution big data, and the frequency feature distribution function of university students’ online information query motivation distribution big data is obtained as follows: N 1  |xi | x= N i=1

(3)

The test statistics of college students’ online information query motivation distribution big data are constructed as follows: σ2 =

N 1  |xi − x|2 N i=1

(4)

In the ontology integration system, the fuzzy association rule set of big data for the distribution of college students’ online information query motivation is as follows: Jm (U, V ) =

n  c 

m μik (dik )2

(5)

k=1 i=1

In the formula, m is the structural dimension of similarity propagation graph model, (dik )2 is the similarity feature set. Combined with semantic ontology mapping method, the sample features of college students’ online information query motivation distribution big data are reconstructed in a distributed way [8, 9].

2.2 Feature Mining of Data This paper uses the least mean square error estimation method to carry out piecewise regression analysis and statistical test of college students’ online information query motivation distribution big data, constructs a statistical sequence model of college students’ online information query motivation distribution big data, predicts college students’ online information query motivation by using the regional structure reorganization method of big data space, and extracts descriptive statistical feature quantity of college students’ online information query motivation [10, 11]. There is the following relationship between feature estimation value and association rule set: f x (X, t) = fˆx (X, t) +  f x (X, t)

(6)

f θ (X, t) = fˆθ (X, t) +  f θ (X, t)

(7)

450

Q. Hu and Z. Lai

According to the principle of similar transitivity, the limited universe feature matching is carried out on the big data of college students’ online information query motivation distribution, and the scheduling set of association rules is constructed to meet the following requirements: | f x (X, t)| ≤ Fx (X, t)| f θ (X, t)| ≤ Fθ (X, t)

(8)

3 Prediction and Optimization of the Development Direction of College Students’ Online Information Query Motivation 3.1 Descriptive Statistical Feature Analysis This paper proposes a modeling method of university students’ online information query motivation based on statistical feature information fusion [12], which uses predicate logic reasoning method to make p = R(r )(θ )Z (z)e jwt extract the association rule feature quantity of university students’ online information query motivation distribution big data under confidence α as follows:  ∼ ∼ ∗ R∼∼ (τ, α) = E c (τ, t) c(τ, t + α) cc

(9)

Combined with quantitative regression analysis method, the extracted association feature set of big data of college students’ online information query motivation distribution is classified and fused, and the semantic mapping relationship of college students’ online information query motivation distribution is determined as follows: u = [u 1 , u 2 , . . . , u N ] ∈ R m N

(10)

Constructing a semantic mapping model among the distribution ontologies of college students’ online information query motivation; AV G X =

n m 1  |G X (x, y)| m × n x=1 y=1

(11)

wherein, G X (x, y) is a directional function of the distribution and development of college students’ online information query motivation, and M and N are the correlation dimension and delay of the development of college students’ online information query motivation.

Construction of Motivation Analysis Model …

451

3.2 Segmentation Test and Prediction of the Development of College Students’ Online Information Query Motivation This paper predicts the development of college students’ online information query motivation. By using fuzzy matching and adaptive scheduling model, the fuzzy index set of college students’ online information query motivation is obtained as follows: 

 



 0 = β ∈ :  f, dγ0  ≥ a. sup f, dγ  γ ∈

(12)

According to the background knowledge of college students’ online information query motivation, the adaptive optimization is carried out in the process of big data detection of college students’ online information query motivation distribution. The adaptive optimization output is as follows: X = Fα · x

(13)

Through two groups of ontology fragments with similar structure, the subsequence of big data distributed in the development direction of college students’ online information query motivation is obtained: X = [X α (0), X α (1), . . . , X α (N − 1)]T

(14)

Through the above analysis, the development direction of college students’ online information query motivation is optimized and predicted, and the subsection test method is used to control the optimization of data clustering center, thus realizing the prediction and modeling of college students’ online information query motivation. The implementation process is shown in Fig. 1.

4 Simulation Experiment and Result Analysis In order to test the application performance of this method in the big data detection of college students’ online information query motivation distribution, a simulation experiment is carried out with MATLAB. The large database of college students’ online information query motivation distribution adopts the network supervision data provided by local statistical departments, and the Deep Web 200G database is constructed. The sample set of Shandong college students’ online information query motivation index is 2000 and the test set is 100. The statistical sequence length of big data collection for the distribution of college students’ online information query motivation is 1024, and the discrete sampling frequency of big data for predicting

452

Q. Hu and Z. Lai

Fig. 1 Realization flow of motivation prediction and modeling of college students’ online information query

Database O1

Database O2

Semantic Analysis and Extraction Module

Semantic Mapping Module

Set of semantic mapping relationships between O1 and O2

Online motivation query prediction output

the development direction of college students’ online information query motivation is 0. Taking the data of college students’ online information query motivation in some prefecture-level cities as the research object, the statistical distribution results of college students’ online information query motivation data are shown in Table 1. According to the above big data sampling results of college students’ online information query motivation, the development direction distribution big data modeling of college students’ online information query motivation is carried out, and the big data distribution model is obtained as shown in Fig. 2. The big data model of the development direction distribution of college students’ online information query motivation in Fig. 2 is taken as the research object, and the information fusion model of college students’ online information query motivation based on fuzzy C-means clustering is constructed to predict the college students’ online information query motivation, and the predicted output is shown in Fig. 3. Table 1 Descriptive statistics of the development direction of college students’ online information query motivation Grade

2019

2020

Test set

Training sets

Test set

Training sets

Freshman

5686

1456

1443

4575

Sophomore year

4675

1567

1345

1541

Junior

4343

1245

5676

4563

Senior

3467

4564

5454

54,567

Construction of Motivation Analysis Model …

453

0.8

Fig. 2 Big data model of the development direction distribution of college students’ online information query motivation

0.6

Amplitude/V

0.4 0.2 0 -0.2 -0.4 -0.6 -0.8

0

50

100

150

200

250

300

350

400

300

350

400

Time/s

Fig. 3 Prediction output of the development direction of online information query motivation of online college students

0.8 0.7

Amplitude

0.6 0.5 0.4 0.3 0.2 0.1 0

0

50

100

150

200

250

Time/s

Analysis of Fig. 3 shows that this method can effectively realize the prediction of college students’ online information query motivation, and has a good ability to distinguish the directional characteristics of the development of college students’ online information query motivation. Testing the accuracy of different methods to predict the development direction of online college students’ online information query motivation, the comparison results are shown in Table 2, which shows that this method has a high accuracy probability.

454 Table 2 Accuracy comparison

Q. Hu and Z. Lai Number of iteration steps

This method

Reference[4]

Reference[5]

100

0.956

0.756

0.814

200

0.966

0.843

0.865

300

0.976

0.865

0.876

400

0.987

0.878

0.876

500

0.998

0.899

0.999

5 Conclusions In this paper, the university students’ online information query motivation on big data network is analyzed, and the development direction of university students’ online information query motivation is analyzed in combination with regional characteristics. The development model of university students’ online information query motivation is constructed to realize the supervision of university students’ online information query motivation, and a modeling method of university students’ online information query motivation based on statistical feature information fusion is proposed. The statistical sequence model of university students’ online information query motivation distribution big data is constructed. The spatial structure reorganization method of big data is used to predict university students’ online information query motivation. Combined with quantitative regression analysis method, the extracted association feature sets of university students’ online information query motivation distribution big data are classified and fused. The data clustering center optimization control method is adopted to realize the prediction and modeling of university students’ online information query motivation. The research shows that the method in this paper has high accuracy in predicting college students’ online information query motivation. Acknowledgements Science and Technology Research Project of Jiangxi Provincial Education Department: Analysis on University Students’ Internet Behaviors—As an example of Nanchang University college of science and technology, Project No.: 191567

References 1. Amirat, Y., Arnaud, M.Ü.: NCH. On the controllability of an advection-diffusion equation with respect to the diffusion parameter: asymptotic analysis and numerical simulations. Acta Math. Appl. Sin, Engl. Ser. 35(1), 54–110 (2019) 2. Wang, W., Wang, Y.: The well-posedness of solution to semilinear pseudo-parabolic equation. Acta Math. Appl. Sin. Engl. Ser. 35(2), 386–400 (2019) 3. Yang, J., Wei, C.: Testing serial correlation in partially linear additive models. Acta Math. Appl. Sin. Engl. Ser. 35(2), 401–411 (2019)

Construction of Motivation Analysis Model …

455

4. Zhang, X., Yun-hui, H.E.: Modified interpolatory projection method for weakly singular integral equation eigenvalue problems. Acta Math. Appl. Sin. Engl. Ser. 35(2), 327–339 (2019) 5. Zhang Chaohua, Z., Li, L., Yun, G.: Study on moving dislocations in decagonal quasicrystals. Chin. J. Solid Mech. 38(2), 165–169 (2017) 6. Zhang, W., Wang, Z.: Research on join operation of temporal big data in distributed environment. Comput. Eng. 45(3), 20–25, 31 (2019) 7. Goldberg, Y.: A primer on neural network models for natural language processing. J. Artif. Intell. Res. 57(1):345–420 (2016) 8. Zhang, H., Li, C., Yong, K.E., Zhang, S.: A distributed user browse click model algorithm. Comput. Eng. 45(3), 1–6 (2019) 9. Yuan, Q., Guo, J.: New ensemble classification algorithm for data stream with noise. J. Comput. Appl. 38(6), 1591–1595 (2018) 10. Xue, D., Wu, L.F., Li, H.B., et al.: TraDR: a destination prediction method based on trajectory decomposition and reconstruction in geo-social networks. Comput. Sci. 43(3), 93–98 (2016) 11. Li, J., Tong, R., Zhang, Y., Tang, Z.: Similarity algorithm of spatio-temporal data based on trend surface and SSIM. Comput. Eng. 44(9):52–58 (2018) 12. Gao, N., He, Y.Y., Gao, L.: Deep learning method for intrusion detection in massive data. Appl. Res. Comput. 35(4), 1197–1200 (2018)

Design of Parallel Power Supply System Controlled by DSP and MCU Ruihan Li

Abstract A DC–DC switching power supply parallel power supply system is designed, which can stabilize the output voltage and distribute the module current. And more power is obtained by switching power supply and suitable for more load circuits. Two circuit modules of BUCK chopper are used to form two parallel main circuits of DC–DC. And the master–slave setting method is adopted in the two DC– DC modules. The output circuit is controlled by the combined control mode of DSP and MCU. In order to realize the voltage stability of the load end and the current distribution of each module, double closed-loop control is adopted by the parallel power supply system. And the outer loop is the voltage control loop, the inner loop is the current control loop, and the PID control algorithm is realized by software. The circuit is debugged which is designed in this paper and the efficiency is analyzed. The results show that the functional indexes meet the design requirements. And the structure of the system is simple. The PID controller can be realized by software, and the whole system runs efficiently and stably. Keywords Switching power supply · High efficiency · In parallel · Both flow module

1 Introduction At present, with the vigorous development of science and technology, power electronic technology has been applied to various fields. Switching power supply is a kind of power supply that uses modern power electronics technology to control the time ratio of switching on and off and maintains stable output voltage. And the core of the switching power supply is the DC/DC converter [1, 2]. Switching power supply is generally composed of pulse width modulation (PWM) control IC and MOSFET. R. Li (B) School of Physics and Communication Electronics, Jiangxi Normal University, Nanchang 330022, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_56

457

458

R. Li

High power supply of high power switching power is obtained usually by the method of obtaining large current in multiple parallel.

2 Design of Overall Scheme of the System The parallel power supply system of switching power supply module is designed in this paper. Two circuit modules of BUCK chopper are used to form two parallel main circuits of DC–DC [3]. And the master–slave setting method is adopted in the two DC–DC modules, in order to control the uniform distribution of current on the parallel DC module. The output circuit is controlled by the combined control mode of DSP and MCU [4, 5].

2.1 Design of Overall Structure of the System The overall structure of parallel power supply system of switching power supply module is shown in Fig. 1. The main controller is the minimum system of DSP, and at the same time SCM can complete the keyboard and display control. The PWM waves of fixed frequency are generated with the PWM function of DSP. The MOS tube works in the switching state through the driving circuit. Rectifier output DC voltage is chopped into the pulse wave with the same frequency as the PWM wave. The pulse wave is then passed through the rectifier filter circuit and the DC voltage is obtain [6]. The output current can be changed with the change of load resistance. Voltage current value is collected in the sampling circuit, and the PWM duty ratio is adjusted constantly according to the control principle of the double closed-loop, and the voltage and current are stable which are within the range value required [7, 8]. According to the size of the load current, the current of the two DC/DC power supply modules is evenly distributed and the current is proportionally distributed. At DC/DC

Rectifi

DC/DC

Rectifi

Input

Load

DSP

Sampli

Dual port LCD

SCM

Fig. 1 General block diagram of the system

Keyboard

Design of Parallel Power Supply System Controlled by DSP and MCU

459

the same time, the corresponding current value and load terminal voltage value are displayed through the liquid crystal.

2.2 Control Principle Double closed-loop control is adopted in the master–slave setting method, which is suitable for the parallel switching power supply system with current type control and can realize current sharing well and can achieve better current sharing. Power supply system are carried out by using SCM and DSP. And the power supply system can realize the miniaturization, intelligentization and modularization design of the switching power supply, and meet the requirements of high power, standardization and improve the reliability of the system [9, 10]. The control of voltage regulation and current distribution of DC/DC converter are shown in Fig. 2. As can be seen from Fig. 2, the double closed-loop control is adopted in the system, and the outer loop is the voltage loop and the inner loop is the current loop. The voltage is controlled stably in the voltage loop and the current distribution is realized the current loop. The system realizes current-sharing control when k1 is equal to k2 . Otherwise, the current distribution should be given by the system according to the ratio which is set by the external keyboard [11, 12].

Triangular wave

i1f k1 U

+

PID regulator

-

+

PID regulator

PWM generato

PID regulator

PWM generato

Switch tube1

PWM2

Switch tube2

Load

k2

+ i2f

Uf

PWM1

Triangular wave

Fig. 2 Schematic diagram of voltage stabilization and current distribution control in master–slave setting method

460

R. Li

3 Circuit Design The circuit of the parallel power supply system of the switching power supply module is designed in this paper which is mainly composed of three parts: the main circuit of DC–DC step-down chopper, the control circuit and the drive circuit.

3.1 DC–DC Step-Down Chopper Main Circuit (1)

Buck Buck chop circuit principle The Buck chop circuit is adopted in the DC–DC power supply modules. As shown in Fig. 3. The output voltage U0 is controlled by controlling the on-duty ratio of the switch tube VT. While the power switch is turned on, the power supply supplies the load and the load voltage U0 = E, and the load current rises exponentially. On the other hand, the power switch is turned off, the load current flows through the diode D continuation and the load voltage U0 = 0, and the load current decreases exponentially. The value of the string inductance L is large usually, and the value of load current is continuous and the value of pulsation is small. The average value of load voltage is shown in Eq. (1). U0 =

(2)

ton ton E = αE E= to f f + ton T

(1)

Parallel connection of DC–DC power supply modules The parallel connection circuit is adopted in the DC–DC power supply module, as shown in Fig. 4. The circuit consists of three parts: The first part is the filter circuit, which consists of capacitor C91, R91 (C92, R92) and filters out the input voltage ripple. The second part is the high-frequency switch circuit, which is form of high frequency MOSFET switching device Q11 (Q21) and its parasitic diode DX1 (DX2). The effective value of the output voltage can be adjusted by PWM modulation. Then the output voltage of the whole circuit can be adjusted successfully. The third part is the rectifier filter circuit. LC filter circuit is adopted, which filters out high-order harmonics and noise, reduces the circuit output total harmonic distortion and reduces the output current voltage ripple. And the rectifier is realized by D11 (D12).

Fig. 3 Schematic diagram of Buck chopper circuit

L

VT E

D

+

C

R0

U0

Design of Parallel Power Supply System Controlled by DSP and MCU

461

Fig. 4 Parallel connection diagram of DC–DC power module

3.2 Control Circuit The control circuit of system is composed of the minimum system of DSP, single processor minimum system, dual-port RAM, sampling circuit, keyboard, loquid crystal display and other peripheral circuits. The block diagram is shown in Fig. 5. The minimum system based on DSP2812 is the main controller of the system which can realize the detection of current and voltage, PID control of voltage and

PWM

Control of DSP

Sampling Circuit

RAM of Dual Port Display of Liquid Crystal

SCM AT89S52

Fig. 5 Block diagram of main control circuit

Keyboard Input

462

R. Li

Fig. 6 Wiring schematic diagram of IR2110

current double closed-loop, generation and output of PWM wave. The control of the keyboard and display are completed by the micro controller of AT89S52 minimum system. The detection of current is the most critical in the switching power supply system. The current distribution of two DC/DC modules can be realized when the correct current value is detected. In this paper, hall current sensor ACS712 is selected to detect the current, which is display after A/D sampling and sending to the DSP controller. The voltage is carried out A/D conversion after reading the voltage at both ends of the sampling resistance and sent to the controller for display.

3.3 Driving Circuit The IR2110 to drive MOSFET is used in the system, and the working principle diagram is shown in Fig. 6. In the figure, the supply voltage is 12 V, capacitance C1 is the bootstrap capacitor, D1 is the charging diode, pin HO is connected to the MOS tube. When the HIN is high, the output HO is high, Conversely, HO is low.

4 System Test and Result Analysis According to the working principle of the transform circuit, the parameters of the components are determined first, then the hardware circuit and the system program are designed, and finally the system is tested. When the load current is 1.0, 1.5, 4.0, 3.0 A, and the current of the two modules is distributed evenly or 1:2, the voltage and current of the two modules are measured by multimeter, and the relative errors are calculated in Tables 1, 2, 3 and 4. It can be seen from Table 1: when the load current is 1 A and the two modules’ current is evenly distributed, the actual test results are basically consistent with the set one, and a current relative error of is only 0.097% and a voltage relative error of is only 0.375%.

Design of Parallel Power Supply System Controlled by DSP and MCU Table 1 Current data of two modules (load current 1 A)

463

U0 (V)

I1 (A)

I2 (A)

Measured value

7.97

0.515

0.514

Theoretical value

8.0

0.5145

0.5145

Relative error (%)

0.375

0.097

0.097

U0 (V)

I1 (A)

I2 (A)

Measured value

7.97

0.497

1.058

Theoretical value

8.0

0.5183

1.0366

Relative error (%)

0.375

4.11

2.06

Table 2 Current data of two modules (load current 1.5 A)

Table 3 Current data of two modules (load current 4.0 A)

U0 (V)

I1 (A)

I2 (A)

Measured value

7.97

1.953

2.012

Theoretical value

8.0

1.985

1.988

Relative error (%)

0.375

1.61

1.36

The result of Table 2 shows that when the load current is 1.5 A and the current distribution of two modules is 1:2, the actual measured result is very close to the set. In the same Table 3, when the load current is 4 A and the current is distributed evenly between the two modules, the actual test results are similar to the setup, the relative error of the current is only 1.61 and 1.36%, and the relative error of the voltage is only 0.375%. According to Table 4, when the load current is 3 A and the current ratio of two modules is 1:2, the actual test results are close to the setting, the relative error of current is only 1.94 and 0.97%, and the relative error of voltage is only 0.375%. The results show that the voltage is stable. And the output voltage conforms to the requirements of U0 = 8.0 ± 0.4 V at any operating state. The distribution of current of the two modules meets the requirements under any given conditions. The system can achieve the function of short circuit protection and automatic recovery. Table 4 Current data of two modules (load current 3.0 A)

U0 (V)

I1 (A)

I2 (A)

Measured value

7.97

0.977

2.012

Theoretical value

8.0

0.9963

1.9926

Relative error (%)

0.375

1.94

0.97

464

R. Li

5 Conclusion A DC–DC system of switching power supply with stable output voltage and module current is designed in this paper. Under the working condition of rated power of the system, the system is debugged and the power supply efficiency is analyzed. The results show that the functional indexes meet the design requirements. The modularization design and current distribution operation control of power supply system are carried out by using SCM and DSP. And the power supply system can realize the miniaturization, intelligence and modularization design of the switching power supply, and meet the requirements of high power, standardization and improve the reliability of the system. And the efficiency and stability of the whole system are guaranteed.

References 1. Mo, H., Farid, G.: Nonlinear and adaptive intelligent control techniques for quadrotor UAV—a survey. Robot. Auton. Syst. 5(6), 56–63(2019) 2. Fu, J., Zhou, Z., Yin, H., et al.: Attitude estimation of quadrotor based on quaternion second order complementary filter algorithm. Mach. Build. Autom. 48(2), 169–172 (2019) 3. Shen, X., Yao, M., Jia, W., et al.: Adaptive complementary filter using fuzzy logic and simultaneous perturbation stochastic approximation algorithm. Measurement 45(5), 1257–1265 (2012) 4. Widodo, R.B., Edayoshi, H., Wada, C.: Complementary filter for orientation estimation: adaptive gain based on dynamic acceleration and its change. In: International Symposium on Soft Computing and Intelligent Systems, pp. 906–909. IEEE (2015) 5. Euston, M., Coote, P., Mahony, R., et al.: A complementary filter for attitude estimation of a fixed-wing UAV. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 340–345. IEEE (2008) 6. Tang, Y.: Velocity estimation based on a complementary filter for smart car speed control. In: Advanced Science and Industry Research Center. Proceedings of 2014 International Conference on Artificial Intelligence and Industrial Application (AIIA 2014). Advanced Science and Industry Research Center: Science and Engineering Research Center (2014) 7. Waslander, S.L., Hoffmann, G.M., Jang, J.S., et al.: Multi-agent quadrotor testbed control design: integral sliding mode vs. reinforcement learning. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 3712–3717 (2005) 8. Ammour, N., Alhichri, H., Bazi, Y., et al.: Deep Learning approach for car detection in UAV imagery. Rem. Sens. 9(4), 1–15 (2017) 9. Kanellakis, C., Nikolakopoulos, G.: Survey on computer vision for UAVs: current developments and trends. J. Intell. Rob. Syst. 87(1), 141–168 (2017) 10. Zhao, Q.: An improved attitude estimation algorithm based on MPU9250 for quadrotor. Mech. Eng. 51(5), 36–39 (2019) 11. Xu, J., Cai, C., Li, Y., et al.: Dual-loop path tracking and control for quad-rotor miniature unmanned aerial vehicles. Control Theory Appl. 32(10), 1335–1342 (2015) 12. Li, J., Li, F., Ji, Y., et al.: Trajectory stable tracking control of quadrotor UAV. Control Decis. 35(2), 349–356 (2020)

Badminton Trajectory Tracking Based on D-H Kinematics Model Xiaocheng Wang

Abstract In order to realize accurate tracking and recognition of badminton movement track, a badminton movement track tracking model based on D-H kinematics model is proposed. Badminton trajectory detection is carried out by adopting video sensors and image vision imagers, an array distribution model of badminton trajectory tracking is established by combining D-H kinematics parameter fusion method, key feature quantities of badminton trajectory are extracted by badminton motion feature distributed detection method, and a badminton trajectory kinematics D-H kinematics data feature decomposition model is established according to high-dimensional matrix feature decomposition method. The badminton motion trajectory sensing information is fused in the neighboring points, and the badminton motion trajectory estimation model is established by combining feature reconstruction matching and fuzzy information weighted analysis methods. The badminton motion trajectory recognition is carried out on the sampled D-H kinematics big data, and the badminton motion trajectory sampling points are inserted. By identifying the key feature points of the badminton motion trajectory, the badminton motion trajectory tracking model is constructed. The simulation results show that the feature recognition ability of badminton trajectory tracking model constructed by this method is better, and the badminton trajectory tracking recognition ability is stronger, which improves the badminton trajectory estimation. Keywords D-H kinematic model · Badminton · Motion trajectory · Tracking · Recognition

X. Wang (B) Faculty of Physical Education, Baotou Teachers College, Inner Mongolia University of Science and Technology, Baotou 014030, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_57

465

466

X. Wang

1 Introduction To realize badminton trajectory simulation and information tracking and recognition, the related D-H kinematics parameter detection and kinematics model design are of great significance in badminton trajectory motion feature detection, and the research on badminton trajectory D-H kinematics technology and badminton trajectory tracking model has attracted great attention [1]. Through fuzzy information tracking and recognition, badminton trajectory tracking model construction and sensing information detection are carried out. In traditional methods, badminton trajectory tracking model construction mainly includes near-field source analysis method, statistical analysis method and optical flow information detection method [2]. The badminton trajectory tracking model is constructed, but the traditional method is not adaptive and the parameter estimation accuracy is not high. Therefore, this paper proposes a badminton trajectory tracking model based on D-H kinematics model. Badminton trajectory detection is carried out by using video sensor and image vision imager. Badminton trajectory identification is carried out on the sampled D-H kinematics big data, and badminton trajectory sampling points are inserted.

2 Badminton Trajectory Detection and D-H Kinematic Array Structure Analysis 2.1 Badminton Movement Track Detection In order to realize the design of badminton trajectory tracking model based on DH kinematic model, the array distribution model of badminton trajectory tracking is established by combining D-H kinematic parameter fusion method, and the key feature quantities of badminton trajectory are extracted by badminton motion feature distributed detection method [3], and the distribution model of video sensor and image visual imager is constructed as shown in Fig. 1. According to the node distribution of video sensor and image visual imager collected by badminton movement track as shown in Fig. 1, the optimal deployment design of video sensor and image visual imager nodes is carried out by adopting the multi-distribution parameter information fusion method, and the singular matrix analytical model of badminton movement track is obtained as follows:

Badminton Trajectory Tracking Based on D-H Kinematics Model

467

Fig. 1 Node distribution model of video sensor and image visual imager for badminton track acquisition



d 



g1 (θi )si [t − τ1 (θi )] ⎥ ⎢ ⎢ i=1 ⎥ ⎡ n (t) ⎤ ⎢  ⎥ 1 d ⎥ ⎢ ⎢ ⎥ ⎢ g (θ )s [t − τ (θ )] (t) ⎥ n ⎢ ⎥ 2 i i 2 i 2 ⎢ ⎥ ⎢ ⎥ ⎥+⎢ ⎢ ⎢ ⎥ = ⎢ i=1 ⎥ ⎣ .. ⎥ ⎣ ⎦ ⎢ .. ⎥ . ⎦ ⎢ ⎥ . ⎢ d ⎥ x M (t) n M (t) ⎣ ⎦ g M (θi )si [t − τ M (θi )] ⎡

x1 (t) x2 (t) .. .



(1)

i=1

Using high-resolution geometric kinematics analysis method, the kinematic data of badminton trajectory is mapped into two-dimensional space, and the estimation results of multi-model parameters are described as follows: x(t) = Gs(t) + n(t)

(2)

Combining with the badminton trajectory kinematics D-H kinematics association data fusion tracking identification method, the badminton trajectory kinematics DH kinematics parameters are identified in the earth coordinate system [4], and the motion space parameters are identified through the fuzzy prediction model. In the multi-background area, the data matrix distribution of badminton trajectory legs is obtained as follows: x(t) = [x1 (t)x2 (t) · · · x M (t)]T

(3)

Combined with fuzzy decision method, the kinematic parameters of badminton track are identified, and the statistical feature recognition of badminton track kinematic parameters prediction is established [5]. Combined with D-H kinematic parameter fusion method, the array distribution model of badminton trajectory tracking is established, combined with behavior feature vector [6].

468

X. Wang

2.2 Kinematics D-H Kinematics Parameter Fusion of Badminton Trajectory The adaptive behavior recognition method is used to obtain badminton trajectory distribution features under different sampling frequencies and windows. cum{a + x1 , x2 , . . . , xn } = cum{x1 , x2 , . . . xn }

(4)

Under the establishment of world coordinate system, the D-H kinematics parameters of badminton trajectory kinematics are fused [7], and the limb chain characteristics of badminton trajectory movement are reconstructed through multi-dimensional space simulation. For each array element, the acceleration sensor and RFID reader are used for parameter fusion, as follows: z(t) =

p

si (t)bi (θi ) + n(t)

(5)

i=1

Through multivariate statistical analysis model, the feature quantity reflecting badminton trajectory kinematics parameters is extracted, and the associated feature distribution set of behavior feature vector in a(θi , ri ) column is obtained as follows:

T s(t) = s1 (t), s2 (t), ..., sq (t)

(6)

According to the feature vector (observation sequence), the badminton trajectory kinematic data is analyzed, and the D-H kinematics second-order rectangular formula is obtained:



E st skH = Ps δ(t, k), E n t n kH = σn2 I M δ(t, k)

(7)

In the above formula, δ(t, k) is the state probability distribution function and σn2 is the noise variance [8].

3 Trajectory Feature Extraction and Kinematics Model Construction of Badminton 3.1 Badminton Trajectory Motion Feature Extraction By the above mathematical model construction, an adaptive optimization control method is adopted to establish a badminton motion trajectory motion feature analysis model under a high-dimensional space matrix model [9], and a badminton motion

Badminton Trajectory Tracking Based on D-H Kinematics Model

469

trajectory kinematics D-H kinematics data feature decomposition model is established according to a high-dimensional matrix feature decomposition method, and badminton motion trajectory kinematics sensing information is fused in adjacent points, and the motion state S j = {S 1j1 , S 2j2 , . . . , S njn } observation vector in the state meets the following requirements: bi (θi ) = (θi )h i

(8)

The spatial clustering function of badminton trajectory kinematics parameter prediction is established, c = 1/n j is taken, and the distributed fusion model of badminton trajectory kinematics parameter characteristics is obtained by using video sensor and image visual imager tracking and recognition method [10]. The MUSIC algorithm is used to identify badminton trajectory motion model, and the data correlation distribution is as follows: f 1 (θ ) = − log 10(λmin [Q 1 (θ )])

(9)

In the above formula, the direction vector Q 1 of m observation sequence states are expressed, and the number of Gaussian distributions of states S mj is calculated, and the spatial spectrum characteristics of badminton movement trajectory movement are obtained as follows: f (φ) =

1 b H (ϕ)Uˆ

ˆH n Un b(ϕ)

(10)

3.2 Analysis of Badminton Trajectory Tracking Model Combining with the error feedback adaptive correction method, the badminton trajectory kinematics control is carried out, the distributed closed-loop control model of badminton trajectory is established, the state feature decomposition of badminton trajectory is carried out by parameter identification method, and the stiffness matrix is obtained by model parameter identification method as follows: ⎤ ⎡ ⎤ ⎤ ⎡ f Xw 0 U0 0

U dx ⎥ ⎥ R T ⎢ ⎢ ⎢ Yw ⎥ Z c ⎣ V ⎦ = ⎣ 0 dfy V0 0 ⎦ T ⎣ Zw ⎦ O 1 0 0 0 1 0 1 ⎡

(11)

The adaptive law is used to analyze the characteristics of badminton trajectory, the video sensor and image visual imager are used to analyze the motion parameters, and the data fusion model of badminton trajectory is established by combining the

470

X. Wang

big data clustering analysis method, and the fusion matrix is as follows: ⎡

d 



g1 (θi )si (t) ⎥ ⎡ ⎢ ⎤ ⎥ ⎢ i=1 n 1 (t) ⎥ ⎢ d    ⎥ ⎢ ⎢ ⎥ ⎢ g2 (θi )si t − c sin θi ⎥ ⎢ n 2 (t) ⎥ ⎢ ⎥ ⎢ ⎥+⎢ . ⎥ ⎢ i=1 ⎢ ⎥=⎢ ⎥ ⎣ . ⎥ ⎣ ⎦ ⎢ .. ⎥ . ⎦ ⎥ ⎢ . ⎥ ⎢ d x M (t) n M (t)  ⎦ ⎣ g M (θi )si t − (M − 1) c sin θi ⎡

x1 (t) x2 (t) .. .



(12)

i=1

Adopt attitude closed-loop correction method, carry out error feedback adaptive correction, carry out feature decomposition on the sensing information distribution covariance matrix of badminton movement track, and express it as Rx , and the remaining features form vector Rx V = V , carry out low-dimensional manifold mapping on N-dimensional random distribution parameters, and the highdimensional vector is (x1 , x2 , . . . , xn ). The joint feature function of badminton movement track distribution is as follows: (ω1 , ω2 , . . . , ωn ) = E{exp[ j(ω1 x1 + ω2 x2 + · · · + ωn xn )]}

(13)

4 Simulation Experiment Analysis The application performance of this method in realizing badminton trajectory model construction and data acquisition is tested by simulation experiment, and the badminton trajectory acquisition is carried out by using video sensor and image visual imager, as shown in Fig. 2. Two-dimensional video sensor and image vision imager are used to sample badminton movement track. The number of collecting nodes is 12, the speed of badminton movement track collection is 1 frame/s, the sampling delay is 0.56 ms, and the offset is 0.76. According to the above parameter settings, the badminton movement track collection result is shown in Fig. 3. By analyzing Fig. 3, we know that the method in this paper can effectively collect badminton trajectory, and construct badminton trajectory kinematics model according to the results of sports parameter collection, and the results are shown in Fig. 4. By analyzing Fig. 4, it can be seen that the method in this paper has higher accuracy and better parameter identification ability in reconstructing badminton trajectory kinematics model. Badminton trajectory prediction is carried out, and 12 groups of badminton trajectory data samples are taken for badminton trajectory prediction, and the sample mean square error (RMSE) is compared to define:

Badminton Trajectory Tracking Based on D-H Kinematics Model

471

Fig. 2 Badminton movement track collection

38.4 38.2

UCL

38 37.8 X(m m)

37.6 37.4

CL

37.2 37 36.8 LCL

36.6 36.4

0

10

20

30

40

50

60

70

80

Fig. 3 Collection results of badminton movement track

  N MC  1  R M S E(x k ) = (x i − x k )2 N MC i=1 k

(14)

Using this method and traditional method, the convergence curve of phase angle tracking of badminton trajectory prediction is analyzed, as shown in Fig. 5. By analyzing the results in Fig. 5, it is known that the convergence of phase angle of badminton trajectory tracking using this method is better, and it has better ability of badminton trajectory correction and stress analysis, and improves trajectory prediction accuracy.

472

X. Wang

(a)frame=2

(b)frame=4

(c)frame=6 Fig. 4 Reconstruction of badminton trajectory kinematics model Fig. 5 Comparison of convergence curves of motion trajectory tracking

0.3

Trajectory phase angle/rad

0.2 0.1

0 -0.1 This method -0.2 Traditional method -0.3

0

10

20

30 40 50 Iterations number

60

70

80

Badminton Trajectory Tracking Based on D-H Kinematics Model Table 1 Kinematics recognition accuracy of badminton trajectory

473

Number of iteration steps

Proposed method

Optical flow method

Mechanical sensing

100

0.956

0.854

0.824

200

0.976

0.876

0.843

300

0.994

0.934

0.865

400

0.997

0.954

0.898

The accuracy of badminton trajectory recognition is tested, and the comparison results are shown in Table 1. The analysis shows that the accuracy of badminton trajectory kinematic parameter recognition by this method is higher.

5 Conclusion In this paper, badminton trajectory kinematics model is established to realize badminton trajectory simulation and information tracking and recognition. This paper proposes badminton trajectory tracking model based on D-H kinematics model. Multi-distributed parameter information fusion method is used to optimize the deployment design of video sensor and image visual imager nodes. Adaptive behavior recognition method is used to analyze badminton trajectory kinematics data. Combining local reconstruction and weight analysis method, badminton trajectory estimation model is established.

References 1. Li, J., Liu, F., Feng, L., et al.: A novel finite volume method for the Riesz space distributed-order diffusion equation. Comput. Math. Appl. 74(4), 772–783 (2017) 2. Liu, G., Jiang, S., Zhao, W., et al.: Modular reluctance network simulation of a linear permanentmagnet vernier machine using new mesh generation methods. IEEE Trans. Industr. Electron. 64(7), 5323–5332 (2017) 3. Tim, N., Zorita, E., Hünicke, B.: Decadal variability and trends of the Benguela upwelling system as simulated in a high-resolution ocean simulation. Ocean Science 11(3), 483–502 (2015) 4. Huang, G., Sun, Y., Liu, Z„ et al.: Deep networks with stochastic depth. In: Proceedings of the 2016 European conference on computer vision. LNCS, vol. 9908, pp. 646–661. Springer, Cham (2016) 5. Lin, T.Y., Maire, M., Belongie S, et al.: Microsoft COCO: common objects in context. In: Proceedings of the 2014 European conference on computer vision. LNCS, vol. 8693, pp. 740– 755. Springer, Cham (2014) 6. Liu, X., Ma, J., Xu, S., et al.: On the generation of coastline-following grids for ocean modelstrade-off between orthogonality and alignment to coastlines. Ocean Dyn. 67(8), 1095–1104 (2017) 7. Wang, T., Yang, J., Ji, Z., et al.: Probabilistic diffusion for interactive image segmentation. IEEE Trans. Image Process. 28(1), 330–342 (2019)

474

X. Wang

8. Bampis, C.G., Maragos, P., Bovik, A.C.: Graph-driven diffusion and random walk schemes for image segmentation. IEEE Trans. Image Process. 26(1), 35–50 (2017) 9. Yu, D., Mao, Z.Z., Yuan, P., et al.: Recursive Parameter Estimation for Hammerstein-Wiener systems using modified EKF algorithm. ISA Trans. 70, 104–115 (2017) 10. Ramezani, A., Safarinejadian, B.: A modified fractional-order unscented Kalman filter for nonlinear fractional-order systems. Circ. Syst. Sig. Process. 37(9), 3756–3784 (2018)

Fuzzy Evaluation Model for Oral English Test Based on Automatic Scoring System Haibin Liu

Abstract With the rapid development of the mobile Internet, the design of a fuzzy evaluation model for spoken English based on an automatic scoring system has become a research hotspot in the field of spoken English testing at home and abroad. This article focuses on the current spoken English evaluation problems in English learning and analyzes the characteristics of English pronunciation. On the basis of the characteristics of speech prosody, a speech evaluation model based on fuzzy comprehensive evaluation is proposed. At the same time, the method is transplanted and an automatic spoken evaluation system based on the Android platform is implemented. One of the key points of the automatic labeling system is the selection and extraction of prosodic features and acoustic parameters. This paper improves the automatic labeling of accents by improving the corresponding rules of prosody and acoustic parameters. The introduction of the Co-training algorithm greatly reduces the amount of manual labeling, and realizes automatic labeling of prosody with minimal labeling. In this paper, a detailed performance analysis and experimental comparison of the improved voice evaluation model are carried out through Matlab simulation experiments. The improved model is highly efficient and practical. Finally, the improved voice evaluation model was transplanted to the Android platform, and a voice evaluation system based on the cloud platform was designed and implemented. In this paper, the evaluation effect of the system was tested by experimenters. The experimental test showed that the agreement of the test expert evaluation reached 95%. Therefore, the model established by selecting characteristic parameters based on prosodic features has a better evaluation effect. Keywords English oral test · Fuzzy evaluation model · Automatic scoring system · Acoustic parameters

H. Liu (B) Chengde Petroleum College, Chengde 067000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_58

475

476

H. Liu

1 Introduction With the improvement of my country’s international economic and political status, in order to better adapt to the trend of economic globalization, my country strives to increase its opening to the outside world. At the same time, it has more and more frequent political, economic, and cultural exchanges with the international community. As the most common language in many countries and regions, English has received more and more attention from people of different ages. At the same time, the talent recruitment market has higher and higher requirements for college students’ English ability. English has gradually become our life and work. One of the necessary language skills. Therefore, improving the English level of our nationals is of far-reaching significance for promoting the development of modern education in our country and accelerating the pace of integration with the world. With the development of early voice signal processing technology, in order to make the voice evaluation technology more applicable in real life to serve a wider user group, the research direction of computer-assisted language learning has emerged [1]. Many institutions and scholars use computers Auxiliary language learning technology solves a series of problems in life and learning. For example, Chen K. S. uses K-means and GMM methods to detect pitch stress. Acoustic features include energy, fundamental frequency, duration, pauses, and text features include lexical stress, part of speech, symptom, etc. [2]. Zhao L. developed a Mandarin proficiency evaluation system for the Mandarin speaking proficiency test. The system will evaluate the subject’s pronunciation and give a diagnostic report [3]. Jian Liying has developed an automated test system for the field of basic education evaluation, which mainly tests the listening and speaking of primary and middle school students. The system will give corresponding scores and feedback information and form a diagnostic report [4]. In this paper, by combining the characteristics of English pronunciation and prosodic features and analyzing, extract the prosodic features of the speech and compare the similarities respectively, and calculate the weight value of the impact on the entire evaluation according to the degree of influence of each feature according to the analytic hierarchy model (AHP). At the same time, considering the correlation between features, a voice evaluation model based on fuzzy comprehensive evaluation is established and the evaluation results are given. The performance of the speech evaluation algorithm is analyzed by Matlab simulation and comparison experiment.

Fuzzy Evaluation Model for Oral English Test Based …

477

2 Design of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System 2.1 Voice Evaluation System Analysis and Main Function Design 1.

Voice evaluation system This article designs an Android-based intelligent voice evaluation system, mainly to achieve training in spoken English, and to provide effective feedback to learners’ pronunciation, guide and correct learners’ spoken pronunciation, and improve their oral pronunciation. According to demand analysis, the function of the system mainly includes the following four parts: (1)

(2)

(3)

(4)

2.

Voice pronunciation demonstration. The main purpose is to hope that users can fully understand the main points of pronunciation and the characteristics of pronunciation. The system provides phonetic symbols and standard sounds for learning to help users learn standardized pronunciation [5]. Voice pronunciation and follow-up learning. The system will provide the user with standard sounds for learning. The user can play the correct pronunciation sound through the voice playback function, and then prompt the user to learn pronunciation and read, and at the same time, it will make the user’s pronunciation into the phone memory for subsequent processing. Voice pronunciation score. The voice evaluation module is the core function of the system. It mainly uses the voice evaluation technology to perform a quantitative analysis of the user’s pronunciation, and accurately gives the pronunciation score, so that the user has an accurate understanding of their own pronunciation score, and then continuously improves their own pronunciation level. Voice pronunciation feedback. Pronunciation feedback is an important function of the voice evaluation system. It is very helpful for learners to correct wrong pronunciation and improve learning motivation. The system will provide corresponding feedback based on the pronunciation score. If the score is high, it will be good and very good, and if the score is low, it will be displayed. Continue to cheer and improve the enthusiasm of users [6, 7].

I/O module design of voice evaluation system The voice recording module and voice playback module are the basic modules of the voice evaluation system and are an indispensable part of human–computer interaction. They mainly use the Android system’s built-in voice recording and playback device to record audio signals from the microphone to the Mobile phone files or SD card memory. In the development system, the AudioRecord class method in the Android SDK is used to save MP4, RAW, 3GP and

478

3.

H. Liu

other formats, packaged and stored to record media files. This article uses the recording of voice files in wav format. Developers can flexibly set the sampling rate and the basic parameters of the voice signal such as the number of sampling bits [8]. Feedback module design of voice evaluation system The feedback module of the voice evaluation system is the core module of the system. It mainly uses the Android open source chart generation library AkartEngine on the basis of the voice evaluation module. This library supports the display of various charts such as line charts, bar charts, and pie charts. This type of library enables the evaluation system to display a trend graph of user historical evaluation results. At the same time, it will give corresponding opinions based on the current evaluation results to improve the enthusiasm of users. At the same time, it can identify learners’ pronunciation errors and give corresponding guidance based on specific pronunciation problems, which can help English learners to conduct targeted Training has a great guiding role in improving the oral level of English learners.

2.2 Based on MFCC Feature Parameter Extraction 1.

Regularization of feature parameters and calculation of similarity In the evaluation process using standard voice, because the voice feature extraction process will produce variability due to the length of the individual voice cavity, such as the difference of the microphone and the length of the individual tone, for different situations, you can choose the interpolation method and linear translation. Methods such as method for parameter normalization. The interpolation method is mainly aimed at the problem that the phoneme length of the test voice and the standard voice is different after the voice signal is segmented, and the feature parameters are extended or shortened to make the time length consistent with the standard voice [7]. The linear translation method mainly solves the fundamental frequency difference by shifting the pitch difference of each person. It can be assumed that the fundamental frequency of the standard voice is and the fundamental frequency of the test voice is, where x = 0,1,…N − 1, N is the length of the fundamental frequency, adjust the reference of to, the adjustment process can be expressed by formula (1) and formula (2).  di f f

N −1 N −1 1  1  f 2 (k) − f 1 (k) N k=0 N K =0 

f z (x) = f 2 (x) − di f f

 (1) (2)

After normalizing the characteristic parameters Mel frequency cepstrum coefficient, fundamental frequency trajectory characteristics, and short-term energy characteristics, it is necessary to calculate the similarity between the test voice

Fuzzy Evaluation Model for Oral English Test Based …

2.

479

and the standard voice. The dynamic time warping algorithm extends and shortens the two time series. The shortest distance between two time series is the final distance measure [9]. Mel frequency cepstrum coefficient This article introduces the extraction steps of Mel frequency cepstral coefficient parameters in detail. The extraction steps of MFCC are as follows: (1) (2)

Preprocess the speech signal. Perform Fast Fourier Transform (FFT) on each frame of speech signal x (n) to transform the speech signal from time domain to frequency domain for analysis. FFT is a fast algorithm for Discrete Fourier Transform (DFT), DFT as shown in formula (3). X (k) =

N −1 

x(n)e−

j2mk N

, 0≤n ≤ N −1

(3)

n=0

2.3 Automatic Prosodic Annotation Based on Co-training 1.

Semi-supervised learning In the case that there are fewer annotation files, the semi-supervised learning algorithm has good classification performance. Traditional supervised learning technology requires a large number of marked documents as the basis, on the one hand, it takes time and effort to manually mark. If all data sets obey the distribution formed by the mixture of L Gaussian distributions. f (x|θ ) =

L 

a1 f (x|θt )

(4)

l=1

2.

where a is the mixing coefficient and θ is the mixing parameter. Basic setting of Co-training algorithm In the training process, first need to divide the feature set into two sub-feature sets, and then train the two sub-feature sets to obtain a strong classification model. The premise of obtaining a strong classification model is to obtain an accurate feature set; standard Co-training algorithm It is required that the feature set can be divided into two disjoint subsets. It is difficult to meet this requirement in actual experiments. In order to better improve the classification performance, it is necessary to make the obtained two strong classifiers as far as possible to have a large difference [10].

480

H. Liu

3 Experimental Design of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System 3.1 Basic Settings of the Co-training Algorithm Co-training algorithm can automatically learn from unlabeled text resources, so only a very small amount of labeled corpus is needed to automatically label a large number of unlabeled corpora. The minimization of the amount of annotation in this training method greatly reduces the amount of manual annotation, but at the same time it puts forward higher requirements on the accuracy and precision of the features in the training set. The algorithm has three basic assumptions. First, it is assumed that there are two sets (that is, two views) in the sample set. Secondly, each set can be trained as a classifier [10]. The attributes in the third two sets are conditionally independent of each other.

3.2 Establishment of Voice Evaluation Model and Data Collection In the training phase, the standard tone is used for training, and the Mel frequency cepstral coefficients, fundamental frequency feature parameters, and short-term energy feature parameters of the speech signal are extracted and stored as a template in the template library. The Mel frequency cepstral coefficients in the voice feature Represents the content of the speech, the fundamental frequency characteristic parameter represents the pitch and length of the speech, and the short-term energy characteristic parameter represents the sound intensity of the speech. The degree of influence of each characteristic parameter on the speech evaluation can be determined through the analytic hierarchy model. When the evaluation speech is collected, use the method of pattern comparison to extract the same feature parameters of the voice and use a dynamic time warping algorithm to match the templates in the template library and calculate the similarity [11], and finally use the evaluation model to convert the distance into the number of components to obtain the final evaluation result.

3.3 Establish Fuzzy Relationship Matrix After constructing the hierarchical fuzzy subset, each factor quantifies each factor in U according to the hierarchical index in the evaluation set to determine the degree of membership of the evaluated thing to the hierarchical fuzzy subset, and then obtain

Fuzzy Evaluation Model for Oral English Test Based …

481

the fuzzy relationship matrix as shown in formula (6), the element in the i-th row and j-th column of the matrix R represents the membership degree of a certain graded fuzzy subset from the factor. The performance of a subject in a certain factor is expressed by fuzzy vector formula (5). (R|u i ) = (ri1 , ri2 , . . . , rim ) ⎡

R| ⎢ R| R=⎢ ⎣ ... R|

⎤ ⎡ r11 u1 ⎢ ⎥ u 2 ⎥ ⎢ r21 = ... ⎦ ⎣ ... up r p1

r12 r22 ... r p2

(5)

⎤ . . . r1m . . . r2m ⎥ ⎥ ... ... ⎦ . . . r pm p.m

(6)

4 Experimental Design Analysis of Fuzzy Evaluation Model for Spoken English Test Based on Automatic Scoring System 4.1 Performance Analysis and Experimental Comparison of Voice Evaluation Algorithms Classification according to the selected parameters. This article mainly evaluates the pronunciation of spoken English. Therefore, the MFCC feature parameter is the preferred feature parameter. According to the feature selection, it can be divided into five types of feature parameter selection conditions. The feature parameters are processed separately and the feature parameters are analyzed. Select the influence on the final score, and compare it with the expert score, select the optimal feature parameter selection combination, and the five feature parameter classification and comparison table are shown in Table 1. Table 1 Classification and comparison of five characteristic parameters Characteristic parameters

Time complexity

Space complexity

Goodness of fit (%)

MFCC

Low

MFCC fundamental frequency short-term energy

High

Medium

92.4

MFCC fundamental frequency characteristic parameters

Low

High

82.1

MFCC short-term energy

Medium

MFCC fundamental frequency volume intensity curve

High

88.4

83.2 Medium

93.1

482

H. Liu

Fig. 1 The agreement between each scoring model and expert evaluation

It can be found that although the time complexity and space complexity of extracting MFCC feature parameters, fundamental frequency and short-term energy feature combination parameter selection are higher than other feature selection, the agreement with expert evaluation reaches 95%, so according to the rhythm the evaluation effect of the model established by feature selection feature parameters is better [12]. The extracted various feature parameters can establish different evaluation models, and the final evaluation scores of various evaluation models are different, and the final evaluation scores are also different from the experts. The agreement between the various scoring models and the expert evaluations as shown in Fig. 1. It can be seen from Fig. 1 that there is not much difference between the incorrect and correct pronunciation, but in the case of partial errors and rising and falling tone, there is a big deviation, and the combination of characteristic MFCC, fundamental frequency and short-term energy characteristic is selected. The agreement between the evaluation model and the expert evaluation is closer [13].

4.2 Functional Module Design Based on Co-training The parameter setting and training iteration module is mainly through continuous trials and research on the buffer pool size, the number of iterations, and the ratio of positive and negative examples. Finally, a classifier with good stability is obtained.

Fuzzy Evaluation Model for Oral English Test Based …

483

Fig. 2 Error rate values of multiple experiments with different parameter settings

Other members of our laboratory this work has been researched, and the best parameter settings are obtained by continuously changing different buffer pool sizes and iteration times, as shown in Fig. 2. As can be seen in Fig. 2, it is finally concluded that when the ratio of positive and negative examples in the parameter setting is set to 1:1, it is relatively better than other cases, and when the buffer pool is 143 and the number of iterations is 30, the model performs best.

5 Conclusions This article summarizes the current voice evaluation algorithm in detail, and introduces the process of the voice evaluation model. On the basis of the DTW algorithm, pattern recognition is used for voice evaluation. The standard tone and test voice are preprocessed respectively, and the base frequency, MFCC, the short-term energy parameters are regularized and the weight of the voice evaluation model is determined through the analytic hierarchy process, and finally the calculated distance is converted into a score through the scoring model. The voice features are classified in detail and combined into different evaluation models. The comparison of Matlab simulation experiments shows that the evaluation model with the combined features of fundamental frequency, MFCC and short-term energy is in agreement with the expert’s score by 95%, this result is very close to the manual evaluation score.

484

H. Liu

References 1. Wang, T., Zheng, Z., Elhoseny, M.: Equivalent mechanism: releasing location data with errors through differential privacy. Future Gener. Comput. Syst. 98, 600–608 (2019) 2. Chen, K.S., Yu, C.M.: Fuzzy test model for performance evaluation matrix of service operating systems. Comput. Ind. Eng. 140, 106240.1–106240.9 (2020) 3. Zhao, L., Liu, Y., Chen, L.: English oral evaluation algorithm based on fuzzy measure and speech recognition. J. Intell. Fuzzy Syst. 37(12), 1–8 (2019) 4. Jian, L.: Oral english test—an effective way to improve college english learners’ speaking ability. Overseas Engl. (Part 1) 000(006), 4–5 (2015) 5. Choi, I.: Empirical profiles of academic oral English proficiency from an international teaching assistant screening test. Lang. Test. 34(1), 247–266 (2017) 6. Yan, X.: An examination of rater performance on a local oral English proficiency test: a mixedmethods approach. Lang. Test. 31(4), 501–527 (2016) 7. Zhang, W., Liu, M.: Evaluating the impact of oral test anxiety and speaking strategy use on oral english performance. J. Asia TEFL 10(2), 115–148 (2017) 8. Jin, M.: An investigation of L2 learners’ anxiety and performance under planning time in oral test. Curric. Educ. Res. 000(017), 93–94 (2015) 9. Liu, L.: A study on the backwash effect of the PETS3 oral test on higher vocational students’ english learning. Vocat. Educ. Res. 000(008), 51–54 (2015) 10. Shankar, K., Elhoseny, M., Lakshmanaprabu, S.K., Ilayaraja, M., Vidhyavathi, R.M., Elsoud, M.A., Alkhambashi, M.: Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurr. Comput. Pract. Exp. 32(1), 24887 (2020) 11. Yuan, X., Li, D., Mohapatra, D., Elhoseny, M.: Automatic removal of complex shadows from indoor videos using transfer learning and dynamic thresholding. Comput. Electr. Eng. 70, 813–825 (2018) 12. El-Hasnony, I.M., Barakat, S., Elhoseny, M., Mostafa, R.R.: Improved feature selection model for big data analytics. IEEE Access 8(1):66989–67004 (2020) 13. Liang, H.: An empirical study on the effects of computer-corpus-based formulaic sequences on college students’ oral english learning. Int. J. Emerg. Technol. Learn. (iJET) 12(8), 67–76 (2017)

Changes in the Operation Mode of Real Estate Investment Trusts in the Era of Big Data Lu Xiao

Abstract With the continuous maturity of big data technology, the application field of big data has also been greatly expanded. In recent years, the technical advantages of big data technology in the real estate investment trust industry have been gradually demonstrated, which not only optimizes the traditional operation mode, but also strengthens the operation ability of enterprises. However, the mode is still in the primary stage of development, and there are still many deficiencies. Therefore, this paper puts forward the research on the change of real estate investment trust operation mode in the era of big data. This paper makes an in-depth investigation on the operation mode of real estate investment trust under the background of big data, analyzes the main problems existing in the current mode and the advantages and disadvantages of different types of REITs operation mode. In view of these problems and deficiencies, this paper further puts forward the optimization and improvement measures, and combined with the needs of enterprises, makes the path selection analysis of the development of REITs operation mode in China. In order to further investigate the actual effect of real estate investment trust operation mode based on big data technology in the actual operation of enterprises; this paper takes enterprise A as an example for investigation and research. Through the analysis of the survey results, we can see that the operation mode based on big data technology effectively broadens the financing channels of enterprises and avoids the problems such as performance decline. Keywords Big data technology · Trust investment · Operation mode · Real estate investment

L. Xiao (B) Renmin University of China, Beijing 100872, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_59

485

486

L. Xiao

1 Introduction After years of heated discussion at the conceptual level, the specific application of big data in domestic financial industry has entered a stage of rapid development [1]. This is the performance of the increasingly mature data ecology and algorithm technology, and also the demand of the transformation and development of the financial industry in the digital era. The financial industry has experienced the process of electronization and networking, and the degree of standardization and automation of the process has changed [2–4]. Taking the real estate investment trust fund industry as an example, in the stage of understanding customers, big data can provide more accurate customer portraits, and realize a more comprehensive and detailed identification of customers’ investment needs and risk preferences, rather than relying on the standardized questionnaire survey of customers’ subjective input. In the asset allocation stage, the use of big data to support due diligence of products and underlying assets has become the basis for the formation of Intelligent Portfolio. In operation and service, optimize operation resource allocation based on big data, identify cross sales opportunities through big data analysis, and form the best recommendation of “next product” [5, 6]. The concept of real estate trust and investment fund is basically a new concept in China, and its development is relatively late. In the development process, neither theory nor practical application is very mature [7–9]. According to the current research status of REITs and asset light operation mode, combined with big data technology, to seek new methods and new ideas to further develop the operation mode of REITs, so as to optimize the asset allocation of the company, expand the external financing channels of enterprises, and relieve the pressure of cash flow, And promote the strategic transformation of the operation mode of REITs [10, 11]. This paper makes an in-depth investigation and Research on the operation mode of real estate investment trust. Through the analysis of the survey results, it is concluded that although China’s trust enterprises have generally carried out the operation mode reform based on big data technology, they are still in the primary stage, and there are many technical difficulties, which lead to the problems such as the unsatisfactory operation results and the failure to meet the expectations. Therefore, this paper establishes the research on the change of real estate investment trust operation mode in the era of big data. In the study, in view of the shortcomings of the existing model, combined with the core characteristics of big data technology and real estate investment trust, the operation mode is upgraded, and the path selection of the operation mode is analyzed. The optimization measures in this paper effectively improve the operation ability of enterprises and reduce the risk of performance decline. Through case investigation, the investigation results are analyzed and it is concluded that big data technology plays an important role in promoting the reform of real estate investment trust operation mode.

Changes in the Operation Mode of Real Estate Investment …

487

2 Big Data Technology and Real Estate Investment Trust 2.1 Changes and Characteristics of Big Data The essence of big data is big. Big data is not sampling, but the whole sample. With the popularity of the Internet and the increasing frequency of Internet activities, this largescale accumulation has formed the concept of big data in the Internet [12]. Now there is a large amount of data, the unit is no longer g or T to measure, P, E, Z energy level units have been very common. Big data is a technology hotspot in current research. The industry usually uses it to summarize the characteristics of big data, which mainly includes four aspects: (1) large amount of data, (2) diversity of data categories, (3) low value density, and (4) fast speed. Although big data cannot produce new material products and create new market demand, it can greatly improve productivity. In today’s fast-paced, information-based, science and technology era, timely access to enough information means to master the initiative, but the information collected is not all important, we need to analyze and analyze the valuable information from the massive data.

2.2 Real Estate Investment Trusts Real estate investment trusts (REITs) is a kind of financial instrument specialized in raising public funds for real estate projects. It raises funds by issuing income certificates and distributes comprehensive income to investors in proportion. REITs are usually set up by investment banks, investment companies, investment trust companies and real estate companies. They effectively integrate a variety of market instruments such as real estate, investment and asset securitization, which can effectively disperse the potential risk of portfolio. Through the implementation of the trust plan, real estate developers will concentrate the scattered funds for real estate investment and leasing. Through the authoritative trust management company, give full play to the advantages of professional financial management, rely on rich fund operation experience, use the funds for real estate development projects through trust loans, and obtain stable scale income for customers.

3 Challenge Analysis of Big Data Technology Application in REITs Operation Mode In the application of big data, it is difficult to avoid the five themes of data collection, algorithm implementation, scenario application, infrastructure construction and process governance policy, among which data collection and process governance policy are the main bottlenecks. Data is a factor of production, and this understanding

488 Table 1 Investigation and analysis of main problems of big data technology in REITs operation mode

L. Xiao Main problems

Proportion (%)

data acquisition

63

Algorithm implementation

81

Insufficient application scenarios

51

Backward infrastructure

72

Lack of guiding policies for process governance

64

is very popular in financial institutions. The data owned by financial institutions has certain advantages in quality and quantity, especially the authenticity of structured data accumulated by customer management and real-time data stored in transaction process are valuable. However, there are still many deficiencies in the diversity, continuity and consistency of the data of financial institutions, which will undoubtedly limit the release of data capacity. This paper takes the typical financial enterprises involved in REITs business in China as the research object. The purpose of this survey is to analyze the challenges of big data technology in the application of REITs operation mode. The survey items are data, algorithm, application scenario, and infrastructure and process governance. A total of 100 questionnaires were distributed to 100 professionals in 20 enterprises, and 100 questionnaires were recovered. The effective recovery rate was 100%. The survey results are shown in Table 1. Based on the analysis of the survey results in Table 1, the application of big data technology in REITs operation mode in China still has typical deficiencies in data algorithm and infrastructure development. Therefore, it is suggested that the government should introduce corresponding incentive policies and strengthen the research on basic technology.

4 Discussion 4.1 Comparison Between the Operation Mode of Big Data and the Traditional Operation Mode Determined by the traditional operation mode, the financing channel using supplier’s commercial credit occupies the main position in the financing structure, accounting for more than half of the total financing scale. The traditional financing mode relies on the supplier’s delayed payment method, which leads to the increase of enterprise’s accounts receivable balance. Due to the rapid growth of REITs and the expansion of channel resources, the financing mode of REITs relying only on supplier credit appears to be very single. In China, the issuance of bonds needs a set of extremely complex approval process, which puts forward higher requirements for the company’s own conditions, and the

Changes in the Operation Mode of Real Estate Investment …

489

financing process is slow. With the in-depth implementation of corporate strategic transformation and the continuous maturity of the financial system, equity financing and other financing channels have been restricted in recent years. The funds raised are used to build the company’s online and offline businesses, and also provide support for the transformation of the company’s business model. However, the scale of bond financing is limited and there are financial risks. Therefore, traditional REITs need to explore other financing methods to meet the needs of development. As can be seen from the survey results in Fig. 1, taking enterprise a as an example, under the traditional operation mode, the enterprise shows obvious deficiencies in equity financing capacity; after optimizing the operation mode through big data technology, its capacity in equity financing has been greatly enhanced, and the financing scale has been doubled. The analysis shows that in the traditional operation mode, the large-scale financing is mostly concentrated in the equity financing mode, but after the issuance of the company law, the weighted average return on net assets under the mode is limited, which makes it impossible for the enterprise to increase the financing in the traditional operation mode. Therefore, after the adoption of big data technology, it effectively broadens the financing channels of enterprises and makes up for the shortage of funds. In addition, in order to further study the practical application effect of big data technology on REITs operation mode, this paper still takes enterprise a as an example to analyze the actual performance of a single project under different operation modes. According to the survey results in Fig. 2, the REITs operation mode based on big data

Fig. 1 Comparative analysis of financing effect between big data operation mode and traditional operation mode of enterprise A

490

L. Xiao

Fig. 2 Statistical analysis of performance of enterprise A under different operation modes of the same project in the same period

technology is more active and durable than the traditional REITs operation mode. This paper analyzes that, formally because of the information integration and data mining ability of big data technology, it greatly strengthens the enterprise’s ability to grasp the project, and effectively avoids the project performance decline and other problems.

4.2 Analysis of the Operation Mode of REITs REITs have two operation modes: closed and open. The operation mode of REITs has great influence on the governance structure of REITs. Open end real estate investment trust fund has two functions: incentive and restraint. Open end funds have strong selectivity in developing REITs market. If the performance of the fund is good, the flow of funds for investors to buy the fund will increase, which will lead to the expansion of the fund scale; if the fund performance is not good, the investors will withdraw the funds, so the fund size will be reduced, because the large-scale fund managers can get more benefits, and the direct power and binding force formed by this win–win mechanism are fund managers, Let them make a more accurate judgment on the real estate market. On the contrary, if REITs develops in the form of closed-end funds, it will not have strong binding force on fund managers and the market choice will be small because it cannot withdraw randomly within the period after subscription. Therefore, the operation mechanism of open REITs has a

Changes in the Operation Mode of Real Estate Investment …

491

dual effect of incentive and constraint on fund managers, which is conducive to the formation of a virtuous cycle of REITs market.

4.3 Path Choice of Developing REITs Operation Mode in China (1)

(2)

(3)

Policy legalization environment In order to stabilize the real estate market and the operation mode of REITs, it is necessary to legislate REITs, which is also the practice of many developed countries. For example, the United States promulgated the real estate investment trust law as early as 1961, allowing real estate enterprises to set up REITs, which made the United States embark on the rapid development path of REITs mode. However, there are still many difficulties in the law of real estate investment trust in China. Step by step to establish the foundation for development Generally speaking, the development of REITs should not be in a hurry, but should be developed step by step. Nowadays, the differentiation degree of domestic real estate development enterprises is getting higher and higher, and the real estate development activities and investment and sales activities are gradually separated. Therefore, it is feasible to adopt the concept of crossborder financing and cooperative construction in view of this step-by-step and segmented structure, because it can also alleviate the practical defect of talent shortage of domestic enterprises and attract more excellent overseas fund talents to enter the market. Formulate preferential policies At present, there is no incentive policy for the development of REITs in China, which is not conducive to the development of REITs in China. In some developed countries, most of REITs’ income belongs to investors, while the relative corporate income tax and capital gains tax do not need to be paid again. This low tax rate makes more investors willing to participate in REITs financing. Therefore, China should also learn from the operation mode of real estate REITs in developed countries, which can not only promote the further development of China’s real estate enterprises, but also enable other industries to obtain real benefits and form a benign situation of mutually beneficial and win–win development.

5 Conclusions In the study of the changes of the operation mode of real estate investment trust in the era of big data, this paper makes an in-depth study on the current operation

492

L. Xiao

mode of real estate investment trust, and understands the challenges and problems faced by enterprises in business operation through case investigation. In view of these problems, this paper analyzes the advantages and disadvantages of various types of real estate investment trust operation mode, and puts forward innovative path selection planning strategy for the development of REITs operation mode in China. The planning strategy mainly relies on the information integration and data mining capabilities of big data technology, and improves the operation ability of REITs operation mode from the technical level. It covers the widening of financing channels, risk aversion and other technical issues. In order to verify the actual effect of REITs operation mode based on big data technology, this paper takes enterprise A as an example to compare and analyze its actual performance under the traditional mode and the operation mode based on big data technology. The analysis of the survey results shows that the use of the latest REITs operation mode greatly strengthens the operation ability of the enterprise, and at the same time, the business performance has also been doubled.

References 1. El-Hasnony, I.M., Barakat, S., Elhoseny, M., Mostafa, R.R.: Improved feature selection model for big data analytics. IEEE Access 8(1):66989–67004 (2020) 2. Lv, Y., Duan, Y., Kang, W., Li, Z., Wang, F.Y.: Traffic flow prediction with big data: a deep learning approach. IEEE Trans. Intell. Transp. Syst. 16(2), 865–873 (2015) 3. Calderaro, A.: Book review: big data: a revolution that will transform how we live, work, and think. Media Cult. Soc. 37(7), 1113–1115 (2015) 4. Specht, D.: The data revolution. Big data, open data, data infrastructures and their consequences. Media Cult. Soc. 37(7), 1110–1111 (2016) 5. Kweon, D., Kim, Y., Park, T., Kwak, N., Hur, Y.: DGA gases related to the aging of power transformers for asset management. J. Electr. Eng. Technol. 13(1), 372–378 (2018) 6. Marcuzzo, M.C.: The origin of asset management from 1700 to 1960: towering investors by Nigel Edward morecroft. Hist. Polit. Econ. 51(4), 793–795 (2019) 7. Yin, X., Zhu, Y.: Deficiencies and improvement of real estate trust and investment fund legislation. J. Huaihai Inst. Technol. Soc. Sci. Ed. 017(009), 22–25 (2019) 8. Guttery, R.S., Poe, S.L.: Using a cannabis real estate investment trust to capitalize a marijuana business. J. Real Estate Portfolio Manag. 24(2), 201–206 (2018) 9. In, M.M., Afizah, N., Arifin, M., Firdaus, M., Mat, S.S.: Determinants of islamic real estate investment trust performance. Adv. Sci. Lett. 22(12), 4321–4325 (2016) 10. Zhang, H., Wang, J.: Research on the operation mode of commercial food enterprises participating in the carbon fund. Adv. J. Food Sci. Technol. 12(2), 59–62 (2016) 11. Long, F.: Discussion and analysis on public-private-partnership industry fund mode under new urbanization background. Open J. Soc. Sci. 04(2), 79–87 (2016) 12. Dutta, A.K., Elhoseny, M., Dahiya, V., Shankar, K.: An efficient hierarchical clustering protocol for multihop Internet of vehicles communication. Trans. Emerg. Telecommun. Technol. (2019)

Construction of Music Teaching Effect Evaluation Model Based on 5G Technology Miao Zhang and Hongjuan Zhang

Abstract In this era of rapid development, informatization is the new trend of social development. With the advent of information society, the traditional music teaching concept and teaching practice are facing great challenges and new opportunities. In order to meet this challenge and meet the needs of the development of information society and the training of music normal students, 5G mobile communication system has become a hot topic in the communication industry and academia. With the advent of 5G era, 5G mobile communication will play a far-reaching role in our future education, and 5G technology will also become one of the core technologies of education. Based on the analysis of 5G technology, this paper predicts that under the support of new technology, music education will present more novel teaching scenes. The new art teaching mode of “integration of multi-source practice teaching”, “cloud space intelligent teaching” and “network collaborative City Teaching” is more conducive to the growth of music teaching and plays a promoting role in music teaching. Music classroom performance will be more diverse, students will learn more comprehensive things, is no longer limited to the knowledge of books, the invention of 5G technology, can let students in music learning reflect more fun Keywords 5G technology · Music teaching · Model construction · Teaching effect

1 Introduction The Internet age, the development of cloud computing [1], the era of big data, artificial intelligence and other technologies in people’s work, study, life and other fields, promote the rapid development of the times. The deep integration of 5G technology and education promotes the deepening of education reform. Its basic idea is “pay M. Zhang Ethnic College, Hebei Normal University, Shijiazhuang 050000, Hebei, China H. Zhang (B) Huihua College, Hebei Normal University, Shijiazhuang 050091, Hebei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_60

493

494

M. Zhang and H. Zhang

attention to music aesthetics as the core, interest as the driving force, face all students, pay attention to personality development, pay attention to music operation, encourage music writing, improve discipline quality, carry forward national characteristics, understand different cultures, and improve evaluation mechanism [2]. The closeness and singleness of traditional classroom music teaching limits the development of students’ music core literacy. There are problems in teaching concept, classroom form, teaching method, production system and so on. 5G technology has realized the innovation of teaching mode under the concept of the new curriculum standard. It has been paid more and more attention to music education in China in terms of cultivating students’ interest, developing each person’s characteristics and improving students’ ability. With the development of science and technology, music education is no longer limited to face-to-face teaching between teachers and students in the classroom. The emergence of 5G will bring a qualitative leap to music education. Many teams have carried out research, such as the arrival of 5G, such as Wang Li, in music teaching. The characteristics of “large bandwidth, low delay and connecting everything” have also been applied and explored in the field of music education, which makes the teaching mode, teaching method and interactive experience develop in a better direction. At the same time, some VR, AR, AI, big data and other technologies have been optimized on the basis of 5G, “5G + VR, AR, AI, big data…” “We need to have a deep understanding of educational technology, 5G technology and social development,” Chen said [3]. Teachers at all levels are required to keep pace with the development of science and technology, strive to master 5G technology, apply modern education technology, improve their own quality and adapt to the requirements of modern education. Professor David pen believes that 5G technology will promote the development of 5G curriculum. Micro resources are one minute videos that can be learned at any time. With the continuous research of scholars, it is pointed out that the micro course is not only a few minutes of micro video, but also needs to be combined with learning units, learning tasks, learning activities, learning detection, etc., to form a complete micro course. The combination of music teaching will promote the effect of music teaching to a new height [4]. Although their research results are relatively abundant, there are still some deficiencies in the construction of 5G technical music teaching effect evaluation model. In order to study the construction of music teaching effect evaluation model based on 5G technology, we carried out experiments and adopted the method of questionnaire survey. The experimental method draws a conclusion: 5G technology has a great role in promoting the construction of music teaching.

Construction of Music Teaching Effect Evaluation Model …

495

2 Method 2.1 5G Technology Mobile Internet and Internet of things are two main forces to promote the development of 5G mobile communication network technology. Accordingly, the research and design of 5G mobile communication network is also closely around Mobile Internet applications and Internet of things applications [5]. At present, the rapid development of mobile Internet services and applications, such as 4 K/8 K mobile HD video, augmented reality (AR), virtual reality (VR), VR, mobile cloud services, etc., has brought new challenges to mobile communication networks and also put forward higher requirements [6]. 5G mobile communication network needs to provide low latency and high bandwidth network services. Music education field is following the pace of the times. Under the background of actively exploring how to better combine Internet technology to improve teaching efficiency, we have developed various online learning software by 5G technology. And these rapid development can provide more development possibilities in music education, students will learn more in the face of the situation. Internet of things technology extends the service scope of traditional mobile communication, from the communication between traditional people to people, connecting things and things, between people and things, and gradually realizing “all interconnection” [7]. Therefore, mobile communication network can deeply integrate more industries and fields, thus promoting the prosperity and development of mobile communication network and emerging industries. At the same time, a large number of device connections and various Internet of things services and applications will also bring many new challenges to mobile communication network. Therefore, in order to meet the challenges brought by the development of mobile Internet and Internet of things, it is of great significance to further define the application scenarios of 5G mobile communication network for the determination of key indicators and the research of key technologies.

2.2 Music Teaching Music education refers to all kinds of education that influences people’s thoughts and feelings, thinking quality and improves knowledge and skills through music. In order to cultivate students who are gifted in music, music education should be organized, planned and purposeful according to certain social requirements. This kind of students have more say in music literacy. It is to cultivate professional music talents, whose educational goal is to take the music aesthetic experience as the core, improve students’ aesthetic ability, cultivate students’ creative thinking, form a good sense of cooperation and humanistic quality, and lay a good foundation for students’ lifelong love, learning, creation and enjoyment of music [8]. Be a professional musician with ideas. Music education not only has the value of developing traditional culture and

496

M. Zhang and H. Zhang

inheriting history, but also has certain aesthetic experience value. Music teachers can use easy to understand and vivid language to tell the musicians “inner drama” and lead students to “play”. To a certain extent, it can also improve music expression.

2.3 System Model and Problem Modeling In this system model, it is assumed that the network slice is a collection of virtual nodes and virtual links, which is created by the network infrastructure provider and operated by the service provider to provide customized services. This model only considers one network infrastructure provider and multiple service providers, and each service provider rents only one network slice. Therefore, how to allocate virtual resources among multiple network slices is an important problem. In particular, the model only considers cache resource allocation. Because the allocation of cache resources has the most direct impact on the content distribution performance of each network slice or even 5G network system [9]. In addition, the cache resource allocation optimization problem is transformed into the revenue maximization problem of network infrastructure providers. Based on the above assumptions, the problem of cache resource allocation can be established as follows. On the other hand, providing caching service will bring some cost to network infrastructure providers. In many literatures, the cost of cache energy consumption is considered as an important cost, and has been widely concerned by the academic community [10]. For example, in many literatures, an energy consumption model is proposed from the perspective of hardware platform for ICN content router, in which the energy consumption model mainly includes CPU devices, memory devices and network interface devices. This model mainly considers the energy consumption of cache, including content cache energy consumption and content response energy consumption.

3 Experience 3.1 Subjects In order to study the construction of the evaluation model of music teaching effect based on 5G technology, a questionnaire survey was conducted on students in a university in Zhejiang Province. In this paper, 200 questionnaires were distributed to students, and 120 were recovered, with a recovery rate of 60%; 100 questionnaires were distributed to teachers, and 70 questionnaires were collected. The recovery was 70%. In addition, 30 students and 30 teachers were interviewed [11]. In order to ensure the objectivity of the experimental results, everyone filled in the questionnaire survey. The distribution and withdrawal of the questionnaire are as follows: a total

Construction of Music Teaching Effect Evaluation Model …

497

Table 1 Teachers’ mastery and application of 5G teaching concept and media teaching method Educational communication theory

Constructivism theory

Information teaching design

All don’t know

Number

20

30

12

8

Percent

40

45

10

5

of 200 questionnaires were distributed to students, A total of 60 questionnaires were distributed to teachers and 100 questionnaires were collected. Return The yield was 70%. In addition, 30 students and 30 teachers were interviewed separately.

3.2 Experimental Design Questionnaire survey is the main way of this experiment. The teachers and students of the schools surveyed were interviewed to investigate whether they understood the role of 5G technology in music teaching and whether they understood the teaching effect of 5G, and analyzed the experimental results. But this time the data analysis uses the sampling method, carries on the calculation to the result.

4 Discussion 4.1 Teachers’ Understanding of 5G Teaching Table 1 shows teachers’ awareness of 5G teaching philosophy and teaching methods. Some teachers know the theory of educational communication, some teachers know the theory of constructivism, some teachers know the information-based teaching design, some teachers know nothing about these theories. Most music teachers are not optimistic about 5G teaching concept and media teaching method [12]. Constructivism theory and information teaching design are the basic theories of information teaching.

4.2 Analysis of Teachers’ Effect on 5G Teaching It can be seen from the figure that most teachers have been more or less exposed to 5G information technology, and also know that 5G technology is very helpful to teaching. The survey shows that most teachers believe that 5G technology can make the classroom content more lively, indirectly reduce the workload of teachers,

498

M. Zhang and H. Zhang 30

P E C E T A G E O F P E O P L E

25 20 15 10 5

SƟmulate interest in learning Increase teaching capacity Increase students' understanding The teacher gave a vivid lecture

0

Fig. 1 Teachers’ reflection on the effect of 5G technology in teaching

and teachers can not only focus more on the content in the classroom. But things are from two aspects, however, some teachers think the effect is not good, which shows that the transformation of teachers and students from the traditional teaching and learning mode, 5G technology teaching mode in the classroom needs process to achieve skilled use, therefore, the teaching effect is different, even if it is different from our imagination. Therefore, how to better use 5G technology in music teaching is a problem we are exploring. As far as music teaching is concerned, it is a subject characterized by aesthetic education and artistic edification. Music students should not only master the systematic professional knowledge and teaching ability, but also use appropriate methods to achieve the purpose of infection, enlightenment and edification. The application of 5G makes this teaching goal possible. Therefore, in the process of training music model students under 5G technology environment, providing 5G technology scene and platform to promote their mastery of music knowledge and improvement of teaching ability is an important means to promote their professional development improvement (Fig. 1).

4.3 Analysis on Whether Students have been Exposed to 5G Technology Music Education Nearly half of the students have not learned music skills through 5G technology, which indicates that there is still a large user group that has not been explored, which proves that “5G music skills teaching mode” still has great room for improvement; at the same time, the traditional offline music skills teaching mode still has a place, and has not been completely replaced by the emergence of “online music skills teaching mode” (Fig. 2).

Construction of Music Teaching Effect Evaluation Model …

499

Fig. 2 Music education analysis chart of 5G technology 35% be exposed to no contact 65%

Table 2 Students’ views on using 5G technology in music class Very helpful

A little help

No help

indifferent

Number of student

45

25

16

14

Percent (%)

45

25

16

14

4.4 Students’ Views on Using 5G Technology in Music Class From Table 2, most students think that the use of information technology in music class is very helpful for music learning Sub vivid, easy to stimulate interest, but some students think that some help, no help or indifferent, explain nothing It needs a process to optimize the practice of music teaching by information technology Further research and learning are needed for the application.

5 Conclusion Teaching environment is a part of the classroom created by teachers and students. When students enter the appropriate music environment, they can better feel music, music, and even create music. Classroom atmosphere will not be silent, will not be a teacher’s one-man play. Students will bring up more interest and more ideas about music in class. The lack of 5G technology, interactive technology and display technology promotes the upgrading of teaching environment, which makes the traditional environment represented by “chalk + blackboard” gradually replaced by the new teaching environment represented by W multimedia classroom and virtual classroom. From a few years ago to now, education informatization has developed from the search of teaching digital resources in LAN to the construction of national university campus network, teaching website and teaching resource database. Under the promotion of 5G technology, music teaching resources will be more comprehensive

500

M. Zhang and H. Zhang

and more conducive to students’ learning and reference. With the support of policies of the Ministry of education, we have promoted smart campus and teaching wisdom, built a teaching resource platform, and cooperated with companies set up in China. In the future, music teaching will not be limited to the classroom. With the support of 5G technology, the music teaching mode will change dramatically. With the support of high and new technology, China’s education has achieved steady development in every key point of education reform. In the future 5G era, multi scene, multi task collaborative teaching and AI intelligent teaching will become the mainstream of College Teaching in the future, and will also ensure the operation of music education network. It is believed that in the near future, the comprehensive development of 5G technology will bring a better effect to music teaching.

References 1. Devaraj, A.F.S., Elhoseny, M., Dhanasekaran, S., Laxmi Lydia, E., Shankar, K.: Hybridization of firefly and improved multi-objective particle swarm optimization algorithm for energy efficient load balancing in cloud computing environments. J. Parall. Distrib. Comput. (2020) (in press) 2. Yi, C.: Application of 5G communication technology under the situation of Internet of things. Sci. Technol. Innov. Guide 000(028), 150–151 (2019) 3. Bei, Z.: 5G Technology with Energy Internet. Shanghai Energy Conser. 000(005):342–344 (2019) 4. Chunjin, C., Xiaoqing, G.: The Impact of Information Technology on Students’ Literacy: A Perspective on Education Informatization. Open Edu. Res. 023(003), 37–49 (2017) 5. Krishnaraj, N., Elhoseny, M., Thenmozhi, M., Selim, M.M., Shankar, K.: Deep learning model for real-time image compression in internet of underwater things (IoUT). J. Real-Time Image Process. (in press) 6. Yawei, L., Shiming, Z.: Research on innovation and entrepreneurship education in higher vocational colleges in era of educational informatization 2.0% 040(008), 60–63 (2019) 7. Wei, W.: The function of visual training in instrumental music teaching. Heilongjiang Sci. 009(023), 118–119 (2018) 8. Poulter, V., Cook, T.: Teaching music in the early years in schools in challenging circumstances: developing student teacher competence and confidence through cycles of enactment. Educ. Action Res. 2, 1–17 (2020) 9. Bailey, E.T.: The teaching philosophy of the engineer regiment. Engineer 47, 54–56 (2017) 10. Jones, S.L.: A different perspective of the teaching philosophy of RL Moore. Int. J. Math. Educ. Sci. Technol. 48(1–2), 300–306 (2017) 11. Rong, D., Qiong, W.: Practice and exploration of the course “3D Design Software” based on OBE teaching philosophy——take the virtual architecture roaming production practice as an example. J. Gansu Normal Univ. 023(004), 74–78 (2018) 12. Fair, F.: Teaching philosophy: a guide, by Steven M. Cahn. Teach. Philos. 41(3), 323–326 (2018)

On the Demand for Financial Science and Technology Talents Under the Background of Big Data Zesen Xiong

Abstract The wide application of financial big data has become a hot trend in the financial industry. In the era of big data, people can quickly obtain more and more valuable information from massive financial data and promote the reform of the financial field. Based on this, this paper sorts out the characteristics of the big Data era and its technical applications, in order to analyze the current demand for financial technology talents in the financial field in a bid to provide some reference for the financial sector or financial decision-making departments. Keywords Big data · Financial science and technology · Demand for talents

1 Introduction Along with the development of information technology, the arrival of the big data era has been speeded up, technological innovation drives financial innovation, and the integration of finance and technology has become a new financial format. The application of financial big Data technology enables people to obtain more valuable information from massive financial data. In addition, it provides unlimited data sources and valuable information resources for the needs of financial technology talents in the financial field, thereby reducing the cost of talent mining in the financial field.

2 Contents and Characteristics of Big Data For the concept of big data, there is currently no unified definition. The author believes that big data refers to the reasonable integration of multiple or a series of data to form a database of multiple project data. The characteristics of big data are mainly reflected in the following aspects [1]. Z. Xiong (B) Shenzhen Polytechnic Chnic, Shenzhen 518055, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_61

501

502

Z. Xiong

2.1 The Data Capacity is Huge. Big Data Has an Amount of Data that is Currently Difficult to Directly Store, Manage and Use by Any Unit Device Big data has penetrated into various fields and has become an important production factor and resource, and the storage capacity of big data has been able to keep growing.

2.2 High Speed. There is a One-Second Law for Fast Data Flow and Dynamic Data Changes, and the Acquired Data Will Change with Time and Environment Big data processes data information quickly and effectively, and has the ability to fully and deeply dig out valuable information.

2.3 Diverse Data Types. The Diversity of Data Types Can Describe the Characteristics or Laws of Specific Things The data covers a wide range; including video images and other forms, and a variety of data types provide unlimited information for humans.

2.4 Data is of Great Value. Potential Data Contains Huge Value The rational use of big Data creates high value at low cost, which creates conditions for enterprises to reduce production and operation costs and increase economic utilization.

2.5 Intelligent Data Mining No matter how much the data is, or in any form, if you want to discover the truth of things from the data, you must apply a brand-new method to analyze the data to obtain valuable information.

On the Demand for Financial Science and Technology Talents …

503

3 Technical Embodiment of Big Data Finance Financial big data generally refers to a large amount of structured, semi-structured and unstructured data. Financial big data analyzes and processes massive amounts of data, so as to provide comprehensive data support for financial companies to develop new products, innovate services, and open up user channels [2].

3.1 Data Analysis It includes data mining and artificial intelligence, which are mainly used in product relevance analysis, product marketing channel analysis, and user analysis, such as user basic information, user credit status, etc. Financial system security, stability and real-time requirements are relatively high, and requirements for big data computing and processing capabilities are also very high [3].

3.2 Data Management In the face of complex and diverse data, it is necessary to manage big data from data synthesis technology, data extraction technology, data cleaning and conversion technology, etc., according to different big data application characteristics.

3.3 Data Processing Distributed computing, memory computing, and process processing technologies are processed through new data processing technologies, thereby enhancing data processing capabilities.

3.4 Data Presentation It mainly refers to the display of historical information and spatial information through visualization technology to monitor the health and development trend of financial products, user value and satisfaction.

504

Z. Xiong

4 Demand for Financial Science and Technology Talents in the Context of Big Data With the development of economic globalization, the field of network information technology is a competitive high ground for global technological innovation. The technological development of big data will be more closely linked with new technologies such as the Internet of Things, cloud computing, and artificial intelligence. Taking SZ City as an example, big data shows that the demand for financial technology talents in my country presents three characteristics [4, 5].

4.1 The Total Demand for Middle and Junior Financial Technology Talents is Huge In recent years, the total demand for financial talents has also increased. Compared with other industries, the financial industry has higher requirements for the quality of employees, and the standards for selecting talents in the financial industry are also higher than those in general industries. At present, the financial industry in SZ City accounts for about 15% of GDP, far exceeding the national average, but financial talents are far from reaching the government’s strategic goals. Big Data shows that in 2017, the total assets of the banking industry in SZ City increased by 10.76% year-on-year, deposit balance increased by 12.29% year-on-year, and loan balance increased by 18.71% year-on-year. In 2018, the total assets of the banking industry in City S reached 8.28 trillion yuan, the balance of various deposits was 5.74 trillion yuan. The well-developed banking industry shows that the demand for financial talents is on the rise. Big Data shows that the total demand for middle and junior financial talents in SZ City is large, and the self-cultivation of middle and junior talents is relatively poor. The annual talent self-sufficiency rate is about 35%, and many majors rely solely on introduction. In 2015, there were 160,000 financial professionals in SZ City, which was only 1/3 of London, 1/4 of New York, and 1/2 of Shanghai and Beijing. In 2018, there were approximately 200,000 financial professionals in City S, which is an absolute number. It has surpassed Hangzhou and Guangzhou, closely following Shanghai and Beijing, ranking third in the city. The financial industry in SZ City has entered a period of rapid development, but the shortage of financial talents is not compatible with the rapid development of the financial industry. The number of financial talents in City S is not compatible with its developed cities and has huge potential. According to big data, Michael Page revealed in the “2017 China Salary and Employment Report” that there is a gap of 1.5 million financial science and technology talents across the country. How to solve the current shortage of financial talents and realize the transformation from traditional financial talents to financial technology talents is a research topic, an opportunity and a challenge. For middle and

On the Demand for Financial Science and Technology Talents …

505

junior financial talents, it is more important to have professional quality, professional skills, professional education, and qualification certificates. Therefore, cultivating middle and junior financial talents is a “people-cultivation project” jointly created by the local government and the financial sector [6].

4.2 Compound Talents are Favored and Become the Main Trend of Talent Development in the Financial Industry Financial science and technology has given birth to a new type of finance, and the demand for compound talents in the new type of finance is the need for financial technology innovation, financial opening and financial competition. Compound talents not only have a professional skill, but also have expertise, experience, and skills in other fields, and can show their talents in many fields. Compound talents involve a wider range of professional knowledge, involving professional knowledge of network economy, computer technology, securities investment, mathematical economics, financial innovation and other professional disciplines. Research shows that in the era of financial technology, talents with a multi-skilled, interdisciplinary, and cross-industry compound knowledge structure are favored and demand expanded [7]. According to data, a bank in Shenzhen recruits employees. Among the many shortlisted job seekers, in addition to the “old financial” with experience in the industry, some non-banking professions, such as securities, insurance, accountants, real estate appraisers, and lawyers, are favored. Is on the list of practitioners. Foreign language majors with higher-level certificates are also on the list. As the financial innovation capabilities of commercial banks continue to improve, new financial products continue to appear, providing a new stage for relevant financial marginal talents. The development of financial technology has brought challenges to the financial industry, and compound talents with compound knowledge, compound professions, and compound industry backgrounds will become the main trend of talent development in the financial industry. As a compound talent, one must have cross-industry, cross-disciplinary, and cross-regional capabilities; second, there must be thinking innovation, that is, strategic thinking innovation, customer thinking innovation, and data thinking innovation. In the wave of financial technology competition, how to build a compound talent training model, increase the knowledge reserve of compound talents, improve the skill level of compound talents, cultivate the pioneering and innovative spirit of compound talents, and integrate knowledge, ability, and thinking. This is a problem facing the financial industry [8, 9].

506

Z. Xiong

4.3 High-End Financial Talents are in Short Supply and Become the Mainstream of Talent Flow The rapid development of science and technology has brought about a series of technological changes. The development of financial technology has had a profound impact on the financial industry, and the financial industry has an increasing demand for high-end talents. According to big data, in 2018, the number of CFA holders in China was only 5000, and there were 400 in SZ City, accounting for 8% of the country’s total. As one of the core cities of the country’s four major financial clusters and the third largest number of financial talents in the country, SZ City is a city where financial talents are very scarce, especially high-end financial talents. From a national perspective, the financial industry needs high-end financial talents, and financial talents with practical experience, high education, and multiple job experience will become the mainstream of mobility [10]. High-end financial talents should have six standards; first, they must have comprehensive qualities; second, they must have a complete knowledge reserve; third, they must have a strong mathematical foundation; fourth, they must have excellent foreign language and computer skills; fifth, they must have innovative thinking; sixth, they must have insight and problem-solving ability. In other words, high-end financial talents combine “professional, technological, and cross-border capabilities”. Therefore, for the economic development of a place, the living environment, working environment, and development environment are necessary conditions for the growth and development of financial talents, especially high-end financial talents, and it is the best policy to better retain high-end talents [11].

5 Conclusion With the advent of the big data era, financial big data has ushered in an unprecedented development. Financial entities are actively seeking innovation to meet the needs of industry development and achieve modern development. With the further integration of finance and technology, the intelligentization of financial big data is bound to usher in new developments.

References 1. Ning, H.: Analysis of the application status and future development trend of big data. Commun. Des. Appl. 11, 60–61 (2017) (in Chinese) 2. Gao, B.: Application of big data management system in enterprise management. Gezhouba Group Technol. 129(01), 60–63 (2019) (in Chinese) 3. He, M.: Analysis of the application of big data technology in the financial industry. Era Financ. Technol. 28(08), 42–44 (2020) (in Chinese)

On the Demand for Financial Science and Technology Talents …

507

4. Wang, J.: Research on the application of big data technology in enterprise management. Enterpr. Technol. Dev. 442(8):288–289 (2018) (in Chinese) 5. Yu, L.: Financial big data intelligence development status and future development trends. Financ. Econom. 04, 47 (2020) (in Chinese) 6. Hou, S., Lu, Q.: The application status and development trend of the core technology of big data in education. Teach. Educ. Inf. 05, 253–254 (2019) (in Chinese) 7. Chen, Y.: An analysis of internet financial innovation and development in the Era of large numbers. Smart China 07, 74–76 (2020) (in Chinese) 8. Yang, T., Zhou, R.: Innovation of internet finance under big data. Mod. Bus. Ind. 41(21), 52 (2020) (in Chinese) 9. Pan, X., Qu, J.: The integration of commercial banks and financial technology: status quo, trends and countermeasures. Hainan Financ 05, 31–38 (2018) (in Chinese) 10. Wang, S.: Analysis of financial technology and commercial bank innovation development trend. Sci. Technol. Econ. Trib. 26(32), 194–195 (2018) (in Chinese) 11. Peng, T.: Research on the innovation of higher vocational financial talent training model based on internet finance. Times Financ. 35, 236–237 (2018) (in Chinese)

Application of Big Data in Corporate Internal Control Jinwei Zhang and Zesen Xiong

Abstract In the era of big data, big data has become popular around the world due to its advantages such as massive data, wide data sources, and fast data processing. The application of big data technology is a data analysis method that can mine effective information from big data and provide customers with auxiliary decision-making to realize the value process of big data. Starting from the status quo of the application of big data in enterprise management, this paper discusses the technical application of big data in enterprise internal control for the enterprise’s reference. Keywords Big data · Corporate internal control · Technology application

1 Introduction The arrival of the big data era has brought a profound impact on the internal control and management of enterprises. The traditional internal control management mode of enterprises can no longer meet the requirements of enterprise development in the new era. The development of scientific and technological information and the application of big data technology make enterprises must innovate their management modes to improve their competitiveness [1].

2 Overview of Big Data Big data technology is an emerging technology. For the concept of big data, McKinsey’s definition is: the amount of data is so large that it cannot be acquired, J. Zhang ZHI’ERZHI (Shenzhen) Education Technology Service Co., Ltd., Shenzhen 518055, Guangdong, China Z. Xiong (B) Shenzhen Polytechnic Chnic, Shenzhen 518055, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_62

509

510

J. Zhang and Z. Xiong

stored, managed, and analyzed by conventional software tools. In other words, big data refers to “data has been integrated into various industries today as a key support for production. The development and use of massive amounts of data by humans means the arrival of a new round of industrial revival and consumption growth [2]”.

2.1 Big Data Refers to the Company Obtaining Valuable Data Information from Various Types of Data After Reasonable Analysis and Aggregation. Big Data Technology is the Core Technology of Big Data Data collection tools, data platforms and data analysis systems in big data are important components of big data technology. The application of big data technology to related fields is to provide valuable services for humans through the processing of huge amounts of data, thereby helping enterprises or users to obtain valuable information. Therefore, the challenge brought by the big data era is not only reflected in how to quickly obtain information from massive data, but also in the development and research of big data technology [3, 4].

2.2 Massive Data, Diverse Data, High-Speed Data, and Low Value Density are the Four Major Advantages of Big Data The data volume of big data is calculated in GB, TB and PB. When the data volume reaches PB level or more, it can be regarded as big data. Driven by cloud computing, the Internet, the Internet of Things, and artificial intelligence, the era of big data has arrived. A large amount of data is recorded, and the data capacity is also increasing. The diversification of data sources reflects the power of big data. The fastness of big data reflects the fast data generation speed and the fast data processing speed. The sources of big data are very wide and varied, and data will be generated at every time period. Big data technology can extract the most meaningful and valuable data from various data [5, 6].

3 Status Quo and Existing Problems of Corporate Internal Control Judging from the current status of enterprises, enterprise managers have insufficient knowledge of enterprise internal control management. Many enterprise managers believe that the purpose of doing business is to make money. As long as they can

Application of Big Data in Corporate Internal Control

511

make money, enterprise internal control is optional. Therefore, the enterprise has been operating with a “virus” from the day it was opened.

3.1 Corporate Internal Control Replaces Internal Control System Many companies have a relationship between agency equity and actual control of equity in the distribution of equity. The unclear equity has caused an embarrassing situation at the management level of the company: whether to manage it? Due to the unclear property rights of an enterprise, it is impossible to establish an internal control system in the specific operation process, and the board of directors cannot make better decisions. If insider control replaces the board of directors, senior management cannot effectively manage the company, and the internal control cannot achieve checks and balances [7].

3.2 Ignore System Management and Replace the Nepotism System System construction is the weak link of enterprises. Due to the lack of a series of institutional norms, the internal control of enterprises is weak, and the phenomenon of human factors replacing institutional norms is serious. For example, no one will stop the general manager’s cronies from acting in accordance with regulations. For a long time, due to the imperfect internal control system of enterprises, there have been many irregular business behaviors and business management in their business activities, resulting in a lot of false accounting information.

3.3 The Interests of Minority Shareholders are Violated Within the enterprise, the interests of small and medium shareholders are infringed on two levels: on the one hand, the violation of the enterprise management. Since major shareholders have the highest decision-making power of the company, major shareholders may deliberately violate the company’s articles of association and refuse to pay dividends; use the company’s property to provide preferential loans to the controlling shareholders as guarantees; and conceal information about the company from small shareholders. On the other hand, violations from major shareholders. Since major shareholders have the final decision-making power, they usually abuse their voting rights; major shareholders set unreasonable conditions for minority shareholders to attend the general meeting; the meeting of major shareholders arbitrarily

512

J. Zhang and Z. Xiong

removes or obstructs small shareholders from taking up senior management positions; the meeting of major shareholders arbitrarily makes decisions and implements major company matters [8].

4 Innovation of Big Data Technology in Internal Control The operating mechanism of an enterprise is divided into corporate governance and corporate management. Corporate governance is the mechanism of corporate operation, and internal control is an important link in modern corporate management and a guarantee for corporate victory. In the big data era, more and more information technology methods are applied to the field of enterprise internal control, which has greatly improved the application mode and effect of enterprise internal control. Thus, business managers must have the spirit of innovation, emancipate their minds, open up new ideas, and study how companies can apply big data technology.

4.1 Mining Data Information for Internal Control In the information age, big data can dig more accurately and deeply into the internal control data information of the enterprise, and help internal personnel to grasp more comprehensive data information. Under normal production and operation conditions, massive information will be generated. In the face of huge information flow, internal control personnel can use big data technology to dig out the internal connections, and conduct deeper and clearer mining of these related data to ensure that the internal control data is clearer and more complete. This can save information collection time and information collection costs for enterprises to implement internal control [9].

4.2 Strengthen Planning and Execution in Internal Control From a management perspective, the application of big data can avoid or reduce the out-of-control situation of corporate accounting information. With the transfer or change of business objectives and business strategies, the data and information needed for the enterprise will become more and more complex and changeable. To collect these massive data, big data technology will analyze these data, classify them according to the characteristics of accounting data, and submit them to relevant management departments, thereby greatly improving the effectiveness of data planning. Moreover, this is also conducive to the timely formulation of the best operating model. From this point of view, big data can greatly improve the planning and execution of internal control of enterprises, which will help to promote the further improvement of enterprise economic benefits at that time 021 [10].

Application of Big Data in Corporate Internal Control

513

4.3 Predictive Analysis of Internal Control Data Internal control is an important part of corporate management and requires the attention of corporate leadership. Corporate executives, especially members of the board of directors, must have a high sense of responsibility and do their work in detail. Internal control is the basis of risk management and is at the forefront of the entire control system. Big data technology has a predictive function. Big data can help internal control personnel predict and analyze the development trend of corporate accounting data. Because internal control is a complete set of internal control procedures established by enterprises in accordance with the requirements of standardization, standardization and proceduralization, covering economic business process links, suitable for the enterprise’s own characteristics, and operable. The use of big data for predictive analysis by enterprises is a requirement of modern enterprise management and the only way for the healthy development of enterprises. The good use of big data by enterprises is conducive to reducing business risks and improving the safety and efficiency of business operations [11].

5 Conclusion An enterprise is a combination of multiple contract relationships. In the big data era, the application of big data technology to the management of some enterprises to reduce production costs, reduce operating risks, strengthen internal control and management, improve management efficiency, and enhance corporate strength has epoch-making significance. Therefore, we should make effective use of advanced technology in the era of large numbers to create conditions for unqualified companies to enjoy the dividends of the big data era.

References 1. Li, Y.: The status quo and trend of the development of data analysis technology tools. Inf. Commun. Technol. Policy 04, 23–30 (2020) (in Chinese) 2. Fu, Y., Yang, G., Xu, H., Meng, X., Yang, S.: The Tatus Quo and trend of cloud computing and big data technology. Basic Sci. China. 3, 35–37 (2018) (in Chinese) 3. Fan, N., Zou, R., Zhang, E.: Analysis of the application of big data in enterprise management. Mod. Bus. 1, 169–170 (2017) (in Chinese) 4. Guo, H.: Research on the application of big data in business management. Mark. Modern. 864(3), 88–89 (2018) (in Chinese) 5. Tan, L.: The influence of corporate governance characteristics on the quality of internal control. Financ. Account. Newsl. 5, 52–55 (2019) (in Chinese) 6. Shi, T.: On the use of internal control in corporate governance. Account. Study 5, 232–234 (2019) (in Chinese) 7. Wang, Y.: Application analysis of enterprise management accounting in the big data era. Financ. News 13, 55 (2018) (in Chinese)

514

J. Zhang and Z. Xiong

8. Gao, B.: Application of big data management system in enterprise management. Gezhouba Group Technol. 129(01), 60–63 (2019) (in Chinese) 9. Chu, S.: Application of big data in modern manufacturing enterprise management. Mod. Manufact. Technol. Equip. 279(2), 208–208 (2020) (in Chinese) 10. Wang, J.: Research on the application of big data technology in enterprise management. Enterp. Technol. Dev. 442(8):288–289 (2018) (in Chinese) 11. Luo, L., Gong, X.: Research summary of internal control, corporate governance and earnings quality. Chin. Market. 1, 15 (2019) (in Chinese)

The ATR Algorithm for Reactive Power/Voltage in Power Grid Based on AVC Control Frame Changle Yu, Shengjun Qiu, and Shuo Zhang

Abstract In view of the lack of coordination control between the automatic voltage and the automatic power generation control in the current power grid, it is not conducive to the safety and economic development of the power grid. There is a problem that the reactive power/voltage cannot be controlled in time, thus, it needs to research of the ATR Algorithm for reactive power/voltage in power grid based on AVC control frame. However, in current method, the duration over-time and over voltage of reactive power are used to analyze, and a method to diagnose the voltage operation by using the equipment of voltage determination is proposed. This method can effectively prevent the frequent switching action of the transformer and capacitor, but it is not conducive to real-time and effectively control the reactive power/voltage by AVC control frame. In this paper, an ATR algorithm for controlling the reactive power/voltage of power grid based on AVC control frame is proposed. Firstly, the AVC control frame is analyzed, and then the AVC control frame model with the best economic and safety is established. Finally, the ATR algorithm is used to study the reactive power/voltage of the AVC control frame. The experimental results show that the ATR algorithm can effectively control the reactive power/voltage of the AVC control frame in real time. Keywords AVC control frame · Reactive power/voltage in power grid · ATR algorithm

C. Yu (B) Technical Training Center of State Grid Liaoning Electric Power Co., Ltd., Jinzhou 121001, China e-mail: [email protected] S. Qiu · S. Zhang State Grid Huludao Electric Power Supply Company, Huludao 125000, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_63

515

516

C. Yu et al.

1 Introduction In China, with the expansion of the scale of the power grid and the improvement of the level of automation, power network platform has become an indispensable auxiliary tool in various industries [1]. As the power network is a multi-functional platform, with the characteristics of sharing and open, it so, to simply rely on manual control is difficult to meet the requirements of the grid, and in the grid control center, automatic control system can be established to achieve the control of the grid voltage [2]. In this case, how to improve the safety of the reactive power/voltage of the power grid has become an urgent problem to be solved [3, 4]. Taking the AVC control frame for automatic voltage control of the power grid as an example, the power grid within the AVC is the control object, considering the constraints on the operation of the control grid [5, 6], and the control device of the reactive power/voltage in the center of the control frame is used as the control means, the optimal strategy for the control of the operation status of the power grid is analyzed. The input of the AVC control frame plays an important role in ensuring the safe operation of the reactive power/voltage of the power grid [7]. Reference [8] developed a method based on the acceleration factor to study reactive power/voltage of the power grid, firstly, the duration over-time and over voltage of reactive power are used to analyze, and a method to diagnose the voltage operation by using the equipment of voltage determination is proposed, which can effectively prevent the frequent switch action of transformer and a capacitor, but this method is not conducive to real-time and effectively control the reactive power/voltage by AVC control frame. In Ref. [9], a control framework model combining centralized control with decentralized control is proposed. Firstly, the decentralized AVC control framework system of regional power grid is constructed, to complete the optimal control in different conditions, and effectively improve the reliability of AVC control system framework, but this method has the problem of voltage control mismatch. Reference [10] presented a research method for the control framework based on the regulation of reactive power/voltage in power grid. The AVC is used to drive the capacitor to solve the existing problems of capacitor, and the coordinated control of the upper and lower power grids is completed, but the method has the problem of large economic cost. Aiming at the above problems, an ATR algorithm for reactive power/voltage in power grid based on AVC control frame is proposed. The ATR algorithm is used to study the reactive power/voltage in power grid based on the AVC control frame. The simulation results show that the ATR algorithm can effectively control the reactive power/voltage in power grid based on AVC control frame in real time.

The ATR Algorithm for Reactive Power/Voltage in Power Grid …

517

2 Research on the ATR Algorithm for Reactive Power/Voltage in Power Grid Based on AVC Control Frame Firstly, the AVC control frame is analyzed, and then the AVC control frame model with the best target of economic and safety is established. Finally, the ATR algorithm is used to study the reactive power/voltage of the AVC control frame.

2.1 AVC Control Framework The greater the reactive power output of the generator is, the more uniform the output will be when the voltage is controlled, which can effectively improve the safety and stability of the power system. The reactive power uniformity of the generator can be measured the stable voltage level of the AVC control frame to a certain extent. Define the percentage of reactive power generation for generator i as: ki =

Q i0 + Q i − Q i min Q i max − Q i min

(1)

In the formula (1), Q i is the adjustment amount of the reactive power output of the controllable generator i, Q i0 is the current value of the reactive power output of the controllable generator i, Q i min is the maximum value of reactive power output of the controllable generator i, Q i max is the minimum value of the reactive power output of the controllable generator i. The variance of the reactive uniformity of the regional generator using the AVC control frame is D K G , and the expression of the voltage stability of the AVC control frame is: D K G (Q G ) = E(K G − E K G )2

(2)

In formula (2), K G = [w1 k1 , w2 k2 , · · · wn kn ], wi is the weight coefficient of the controllable generator i of AVC control frame, and E(Q G ) is the expected value of the corresponding voltage variable in the power grid. The economy and security of the voltage adjustment for the reactive power/voltage in the power grid are considered comprehensively. Firstly, the effect of power adjustment on the reactive power/voltage is to determine, if it exceeds the adjustment region, the reactive power adjustment and reactive power uniformity are as the control objectives. The goal optimization of the AVC control framework is performed, to build a control model of security and economy as the optimal target: T RQ G + β D K G αQ G

V P + C Q Q G ≺ ε1

(3)

518

C. Yu et al.

In the formula (3), α is the reactive power adjustment amount, β is the weight coefficient of the reactive uniformity, Q G is the reactive power adjustment amount of the controllable generator, R is the weight matrix, V P is the change value of the node voltage at which the voltage fluctuation occurs, C Q is as a matrix between the grid node voltage and the generator’s reactive power output, and ε1 is the threshold of the node voltage. Formula (3) is the simple quadratic programming problem of grid voltage, the weight coefficient of the objective function will be determined by the operating state of the power system. The performance of AVC control frame is measured using the deviation V P of the setting value of the bus voltage and the grid. (1)

According to the requirements of the grid reactive power/voltage division, it does not allow the voltage to inversely transport the reactive power to the upper power grid, which should meet the constraints of voltage and power, that is: Q slack min ≤

Nc 

Q Ck ≤ Q slack

(4)

k=1

(2)

In formula (4), Q slack min is the compensation amount of reactive power provided by the voltage and power, Q Ck is the capacity of the devoted grid capacitor k, and Q slack is the power of reactive power of the grid gate. Based on the AVC control frame equipment, voltage is estimated. If the reactive power of the input lines of grid substation is Q 3 , the compensation capacity of the grid capacitor is Q, the approximation of V3 remains unchanged, the excitation circuit of the transformer is neglected and the compensation voltage V5 is: V5 = V3 −

RT 3 + X T 3 V3

(5)

In formula (5), RT 3 is the resistance of the transformer branch, and X T 3 is the reactance of the transformer branch. The voltage is made the low voltage adjustment and estimation, which is qualified to meet: Vi min − ε ≺ Vi ≺ Vi max + ε

(6)

In formula (6), ε is the margin to relax the voltage limit for considering the grid voltage estimate.

2.2 ATR Algorithm for Reactive Power/Voltage in Power Grid Based on the AVC control frame of Sect. 2.1, the ATR algorithm is used to study the reactive power /voltage of the AVC control frame. Because the ATR algorithm cannot

The ATR Algorithm for Reactive Power/Voltage in Power Grid …

519

be exactly the same in the performance test, if the ATR algorithm is performed, it must meet certain conditions, it is necessary to calculate when the voltage is stable. pd is the voltage when the voltage meets pd ≥ 0.9. The reactive voltage hypothesis and the alternative voltage hypothesis are: H : pd ≥ 0.9 H1 : pd ≺ 0.9

(7)

Using the pd indicator model of grid reactive power/voltage tests the statistical voltage: Z=

pd − p pd(1− pd) n

(8)

If pd = 0.85, α = 5%, n = 80, the input voltage Z is calculated: Z = −1.25 ≺ −Z 1−α

(9)

Z is Entered into the grid, and the assumed voltage H is rejected, accept the alternative hypothesis voltage H1 , i.e., the ATR algorithm satisfies the performance requirements of the grid reactive voltage. The sample size n of the total voltage is divided into s groups, the use of each group of reactive power is used to calculate the grid performance estimates p1 and p2 , to establish the voltage statistics as W : 1 1 W = ( p1 − p2 ) s i=1 s i=1 s

W =

s

(10)

In the case of that grid reactive power/voltage is stable, the original hypothesis H and the corresponding alternative hypothesis H1 are constructed: H : p1 = p2 (there is no difference between ATR algorithms) H1 : p1 = p2 (there are differences between ATR algorithms) W =

W √ ∼ t(s − 1) YW s

(11)

If W W1−α , accept the reactive voltage hypothesis, that can be considered no difference between the ATR algorithms. According to the reactive power/voltage model pi (1 ≤ i ≤ m) in the ATR algorithm, the modeling is made, and the modeling process is as follows: After testing, the density function of ATR algorithm p can be expressed as: π ( px, n) =

π ( p) f (x, np) π ( p) f (x, np)dp

(12)

520

C. Yu et al.

In formula (12), π ( p) is the distribution of the priori part of p, and f (x, np) is the probability that the number of ATR algorithms is x when the number of samples is n. Assuming B(n, p), it is available: f (x, np) =

  n x

p x (1 − p)n−x

(13)

The result x of the ATR algorithm is the grid variable, so the ATR algorithm is used to control the reactive power/voltage of the grid. Assuming that π( p) is the density function of the grid voltage: x( p) = ( p, a, b) = pa−1 (1 − p)b−1

(14)

In formula (14), the (a, b) parameter represents a function of the grid voltage. The formula (13) and the formula (14) are substituted into the formula (12) for the integral operation, it can be obtained the probability density function of grid voltage: x( px, n) =

1 (x + a, n − x + b)

(15)

The significance of the grid voltage probability after the analysis of the ATR algorithm is to pre-do the voltage test of a + b. The ATR algorithm is used to study the reactive power/voltage of the grid based on the AVC control frame.

3 Experimental Results and Analysis Taking a power grid in an area of Beijing as the example, the power grid includes two 220KV substations, 20 adjustable voltage transformers and 20 sets of switchable capacitors. As can be seen from Table 1, after AVC control frame system is devoted, the average number is per day 150 times per day, showing the optimal control effect is obvious. Figure 1 illustrates the relationship between the reactive power and voltage by using the method in this paper, in Refs. [8, 9]. It can be seen from analysis of Fig. 1 that the reactive power fluctuation is obvious and not the uniform fluctuation when using the method proposed in Ref. [8] at different voltage. In a time of low voltage, the reactive power fluctuation of using the method proposed in Ref. [9] is relatively uniform, but with the increasing of voltage, reactive power fluctuation begins uneven, to lead to the lower feasibility of this method. But the reactive power fluctuation of the method in this paper has been relatively uniform, only in case of that the voltage is low, the reactive power is slightly higher than that of higher voltage.

The ATR Algorithm for Reactive Power/Voltage in Power Grid …

521

Table 1 The operation results analysis after using AVC control frame system Days

All day’s voltage qualification rate (%)

Full day’s power qualification rate (%)

All day’s running time (times)

Monday

100

100

152

Tuesday

100

99.8

155

Wednesday

99.8

99.7

154 153

Thursday

99.7

100

Friday

100

100

150

Saturday

99.7

99.9

155

Sunday

99.8

99.7

159

The proposed method Method in reference [8] Method in reference [9]

Reactive power/KW

50 40 30 20 10 0

0

40

80

120

160

200

Voltage/KV Fig. 1 The relationship between the reactive power and voltage by using different methods

Simulation results show that the ATR algorithm can control the reactive power/voltage of the AVC control frame in real time.

4 Conclusion The current method is used to analyze the duration over-time and over voltage of reactive power of the power grid. A method to diagnose the voltage operation by using the equipment of voltage determination is proposed. This method can effectively prevent the frequent switching actions of the transformer and capacitor, but it is not conducive to real-time and effectively control the reactive power/voltage by AVC control frame. To this end, an ATR algorithm for controlling the reactive power/voltage of power grid based on AVC control frame is proposed. The ATR algorithm is used to study the reactive power/voltage of the AVC control frame.

522

C. Yu et al.

The simulation experiments show that the ATR algorithm can effectively control the reactive power/voltage of the AVC control frame in real time.

References 1. Salih, S.N., Chen, P.: On coordinated control of OLTC and reactive power compensation for voltage regulation in distribution systems with wind power. IEEE Trans. Power Syst. 31(5), 4026–4035 (2016) 2. Mohanty, A., Viswavandya, M., Mohanty, S., et al.: Modelling, simulation and optimisation of robust PV based micro grid for mitigation of reactive power and voltage instability. Int. J. Electr. Power Energy Syst. 81, 444–458 (2016) 3. Schiffer, J., Seel, T., Raisch, J., et al.: Voltage stability and reactive power sharing in inverterbased microgrids with consensus-based distributed voltage control. IEEE Trans. Control Syst. Technol. 24(1), 96–109 (2016) 4. Mohanty, A., Viswavandya, M., Mohanty, S.: An optimised FOPID controller for dynamic voltage stability and reactive power management in a stand-alone micro grid. Int. J. Electr. Power Energy Syst. 78, 524–536 (2016) 5. Wang, Y., Wang, C., Lei, X.: Research and control voltage type PWM rectifier circuit implementation. Electron. Des. Eng. 24(15), 154–156 (2016) 6. Xu, Q., Ma, F., Luo, A., et al.: Analysis and control of M3C-based UPQC for power quality improvement in medium/high-voltage power grid. IEEE Trans. Power Electron. 31(12), 8182– 8194 (2016) 7. Peng, J., Yang, M., Ma, B.: Reactive power optimization in distribution networks with distributed generation based on improved Bacteria foraging optimization algorithm. Comput. Simul. 32(5), 127–131 (2015) 8. Zhou, Y., Sun, G., Meng, X., et al.: Comprehensive treatment of low voltage three-phase four wire reactive harmonic. Bull. Sci. Technol. 32(3), 168–173 (2017) 9. Hong C, Kuang C, Zhang Y, et al.: Analysis of parameter error hypersensitivity of reactive power flow in the complex large-scale power grid. Sci. Technol. Eng. 15(15), 163–167 (2015) 10. Momeneh, A., Castilla, M., Miret, J., et al.: Comparative study of reactive power control methods for photovoltaic inverters in low-voltage grids. IET Renew. Power Gener. 10(3), 310– 318 (2016)

Design of Distribution Automation System and Terminal Conforming to IEC61850 Standard Shengjun Qiu, Changle Yu, and Shuo Zhang

Abstract Distribution automation system conforms to the requirement of national distribution network automation development, which is an important means of the monitoring and fault treatment for distribution network. But most of distribution automation systems analyze problems in the process of power distribution, without preventing problems in the process of power distribution. Therefor, this paper proposed design of distribution automation system and terminal conforming to IEC61850 standard, and designed the hardware, software and terminal of the distribution automation system conforming to IEC61850 standard software according to problems existing in the distribution process. Experimental results show that the method proposed in this paper can effectively improve the quality of monitoring and fault treatment for distribution network. Keywords IEC61850 standard · Distribution automation system · Terminal design

1 Introduction With the development of power grid industry in our country, the distribution automation system comes into being [1, 2]. With the development of distribution network automation in our country, we propose the higher requirements for monitoring and fault treatment of distribution network [3]. As the basic control unit of feeder automation [4], the distribution automation terminal plays an important role of improving the power supply quality and reliability of the distribution network [5, 6]. According to the distribution automation system and terminal with real-time and accuracy [7], this paper proposes power distribution automation system and terminal S. Qiu · S. Zhang State Grid Huludao Electric Power Supply Company, Huludao 125000, China C. Yu (B) Technical Training Center of State Grid, Liaoning Electric Power Co., Ltd., Jinzhou 121001, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_64

523

524

S. Qiu et al.

design method facing to the reliability. According to the requirements of different power supply reliability, power supply area will be divided into six classes [8]. From the distribution automation master station, terminal, communication and relay protection aspects this paper summarizes and classifies the implementation technique of distribution automation, and proposes the differential design principle of distribution automation system which selects main station category of distribution automation according to the urban size, and configures the distribution terminal, communication and relay protection according to the area classification. Combined with the statistical data of urban power supply reliability in China, the feasibility and the rationality of differential planning principle in different region are analyzed and demonstrated, so as to complete the design of the distribution automation system and terminal facing to power supply reliability [9]. This method has high use value [10], which causes the strong response from experts and scholars. This topic has become the focus of industry. With the development of research, there will be a lot of research productions [11, 12]. For above problems, this paper proposed design method of distribution automation system and terminal conforming to IEC61850 standard.

2 Design of Distribution Automation System and Terminal Corresponding to IEC61850 Standard IEC61850 standard is the only international standard of substation automation system based on the universal network communication platform.

2.1 Hardware Design of Distribution Automation System Conforming to IEC61850 Standard In order to meet the functional requirements of the distribution automation system and the requirements of outdoor operational environment and electromagnetic compatibility, under the premise of improving reliability, we reduce costs as much as possible. Therefore, the single CPU structure and a AT91r40008ARM are chosen as the main processor of the system. As the energy of distribution automation system operation conforming to the IEC61850 standard, the power circuit plays an irreplaceable role in the operation of system, ensuring the stable operation of the system. This paper selects LCA220 (110) D48W120D charging type switching mode power supply which has the advantages of small size, high conversion efficiency, original secondary side isolation, high strength of isolation as the power distribution automation system conforming to IEC61850 standard.

Design of Distribution Automation System and Terminal …

525

Because all micro-controllers provide serial interfaces in the distribution automation system, the communication interface needs to be designed. This paper uses the RS-232 interface mode. In the distribution automation system conforming to IEC61850 standard, the basic principle of high frequency circuit design must be followed so as to ensure the normal operation of distribution automation system when designing the printed circuit board. The design of printed circuit board can provide high quality power supply to each unit circuit, improving the reliability of distribution automation system. We need to consider the power filter and power supply distribution when designing the printed circuit board. From above discussion, we can realize the design of main processor, power circuit, main crystal oscillating circuit, reset circuit, memory circuit, clock circuit, temperature measurement circuit, AC sampling circuit, remote measuring circuit, remote control circuit, JTAG interface and communication interface of the distribution automation system conforming to IEC61850 standard, so as to realize the hardware design of distribution automation system conforming to IEC61850 standard.

2.2 Software Design of Distribution Automation System Conforming to IEC61850 Standard The software design of distribution automation system conforming to IEC61850 standard is mainly realized through the design of communication mode in distribution automation system. At present, optical fiber communication mode is mostly adopted. Topology structure of pipeline communication mainly includes two forms: star network and ring network. We design the communication between the main station and sub station in distribution automation system conforming to IEC61850 standard, and set the main station in north power distribution. The sub station including six switch stations: the north with A, B, C, D, the communication scheme between main station and sub station in distribution automation system conforming to IEC61850 standard. From above discussion, we complete the design of communication mode in distribution automation system, so as to complete the software design of distribution automation system. Combining the hardware design in Sect. 2.1, we complete the distribution automation system corresponding to IEC61850 standard.

526

S. Qiu et al.

2.3 Complete Terminal Design of Distribution Automation System from Point of View of Power Supposing that the distribution of users in each region is uniform, k distribution terminal module is installed on the feeder line to divide the feeder line into k + 1 zones, each zone includes n/(k + 1) users. When the unit length of feeder line is the same, the fault processing time T can be expressed as: T = t1 + t2 + t3

(1)

In above formula, t1 represents the seek time of distribution automatic fault area. t2 represents the isolation time of artificial fault area.t3 represents the repair time of fault.

2.3.1

Terminal Design of Distribution Automation System Overall Installing of “Three Remote” Terminal Module

Three remote function show telemetry, remote signalling and telecontrol functions. Installing the terminal modules overall not only needs distribution automation system to have three remote functions but also needs to install the switch electric operating mechanism, and builds fiber-optic communication channel. The case that installs “three remote” terminal modules overall can be regarded as t1 = 0, t2 = 0 approximately, that is: T = t3

(2)

Through the definition of availability of power supply, the availability a3 of the feeder power supply of k “three remote” terminal module at the sectional switch is derived, we can get a3 , which can be expressed: a3 =

8760n −

k+1

nt3 f i i=1 k+1

8760n

k+1

=1−

i=1 t3 f i 8760(k + 1)

(3)

In above formula, f i represents the failure rate of i-th region. Supposing that the failure rate of each region is approximated as f , that is: fi ≈ f =

F 0 0 (3) Y = 0 Y∗ ≤ 0

550

B. Zhu

Among them, Y* is the truncated dependent variable vector; Y is the efficiency value vector; X is the independent variable vector; β is the correlation coefficient vector; μ is the error term, and μ ~ (0, ð2). This paper constructs a Tobit model to analyze the factors that affect port logistics efficiency, takes the port logistics efficiency value as the dependent variable, and uses internal and external factors that may affect the port logistics efficiency as independent variables to establish a Tobit regression model. Yi = α0 + α1 X1 + α2 X2 + α3 X3

(4)

Among them, Yi is the port logistics efficiency, α0 is a constant, α1 –α6 are regression coefficients, X1 , X2 , X3 , respectively represent GDP, total import and export, and port number, μ is the error term.

3 Empirical Analysis 3.1 Index Selection and Data Source This paper selects 7 ports in my country from 2011 to 2018 as the research objects to measure and analyze their operational efficiency. From the perspective of the port’s own input and output, based on existing research results, and in view of the availability and objectivity of the data, this paper selects port cargo throughput and container throughput as output indicators, and berth length and number of berths as input indicators, Select the hinterland city GDP, total import and export volume and the year-end population of the region as environmental factors.

3.2 DEA Model Efficiency Analysis This paper uses the classic BCC-DEA model to evaluate the operational efficiency of seven ports in my country from 2011 to 2018, uses DEAP2.1 software to analyze the input and output data of each port, and calculates the technical efficiency (crste) of each port. Pure technical efficiency (vrste) and scale efficiency (scale). The results are summarized in Tables 1, 2, and 3, respectively. As can be seen from Table 1, the average technical efficiency of the seven ports in the Bohai Rim region from 2011 to 2018 was 0.750, and the overall technical efficiency was relatively low. In 8 years, the technical efficiency value of Qingdao Port and Rizhao Port are both 1, which means DEA is effective. The average technical efficiency of Yingkou Port is 0.863, which is higher than the average technical efficiency of 7 ports in the past eight years. However, the average technical efficiency

Analysis of Port Efficiency and Influencing Factors …

551

Table 1 Technical efficiency value of each port from 2011 to 2018 2011

2012

2013

2014

2015

2016

2017

2018

Mean

QD port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

YT port

0.517

0.536

0.498

0.513

0.556

0.573

0.446

0.562

0.525

RZ port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

DL port

0.459

0.466

0.45

0.449

0.448

0.476

0.557

0.515

0.478

YK port

0.858

0.883

0.833

0.786

0.808

0.841

0.995

0.901

0.863

TJ port

0.735

0.726

0.655

0.688

0.682

0.701

0.761

0.697

0.706

QHD port

0.872

0.798

0.714

0.64

0.612

0.48

0.743

0.591

0.681

Mean

0.777

0.773

0.736

0.725

0.73

0.724

0.786

0.752

0.750

Table 2 The pure technical efficiency value of each port from 2011 to 2018 2011

2012

2013

2014

2015

2016

2017

2018

Mean

QD port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

YT port

0.555

0.577

0.548

0.573

0.627

0.634

0.565

0.817

0.612

RZ port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

DL port

0.743

0.785

0.814

0.784

0.767

0.793

0.892

0.862

0.805

YK port

0.873

0.903

0.857

0.822

0.846

0.866

1.000

1.000

0.896

TJ port

1.000

1.000

1.000

1.000

1.000

1.000

0.981

0.936

0.990

QHD Port

0.936

0.843

0.763

0.704

0.671

0.501

1.000

1.000

0.802

Mean

0.872

0.873

0.855

0.840

0.845

0.828

0.920

0.945

0.872

Table 3 Scale efficiency value of each port from 2011 to 2018 2011

2012

2013

2014

2015

2016

2017

2018

Mean

QD port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

YT port

0.555

0.577

0.548

0.573

0.627

0.634

0.565

0.817

0.612

RZ port

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

1.000

DL port

0.743

0.785

0.814

0.784

0.767

0.793

0.892

0.862

0.805

YK port

0.873

0.903

0.857

0.822

0.846

0.866

1.000

1.000

0.896

TJ port

1.000

1.000

1.000

1.000

1.000

1.000

0.981

0.936

0.990

QHD port

0.936

0.843

0.763

0.704

0.671

0.501

1.000

1.000

0.802

Mean

0.872

0.873

0.855

0.840

0.845

0.828

0.920

0.945

0.872

of Yantai Port, Dalian Port, Tianjin Port and Qinhuangdao Port are all lower than the average, and are at a relatively low level of efficiency. It can be seen from Table 2 that the average pure technical efficiency of the seven ports in the Bohai Rim region from 2011 to 2018 was 0.872, and the pure technical efficiency was relatively high. Among them, Qingdao Port and Rizhao Port always

552

B. Zhu

maintain a pure technical efficiency value of 1. The average pure technical efficiency of Tianjin Port and Yingkou Port is higher than the average pure technical efficiency of 7 ports in the past eight years. The average pure technical efficiency of Yantai Port, Dalian Port and Qinhuangdao Port are relatively low. It can be seen from Table 3 that the average scale efficiency of the seven ports in the Bohai Rim region from 2011 to 2018 is 0.858, which is slightly lower than the average pure technical efficiency. The scale efficiency values of Qingdao Port and Rizhao Port are both 1. The average scale efficiencies of Yantai Port, Yingkou Port and Qinhuangdao Port are greater than the average scale efficiencies of the seven ports in the past eight years. The scale and efficiency of Tianjin Port and Dalian Port are at a relatively low level. Based on the above three tables, and further analysis of the overall efficiency of each port, it can be seen that Qingdao Port has demonstrated effective DEA from 2011 to 2018, and its geographical position is superior. It is an important international trade port and transit hub in the Bohai Rim. The degree of automation is also high, and the economic level of hinterland cities is high, which can bring a large amount of trade to the port. Compared with Tianjin Port, Dalian Port, and Yantai Port, which have relatively developed hinterland economies, Rizhao Port, which has relatively low economic levels in the hinterland, has reached the DEA effective value. It can be seen that the port technology efficiency is not only related to the level of urban development and city scale, but also The degree of opening to the outside world is related to the port’s own operation and management. The scale efficiency of Yantai Port is higher than the pure technical efficiency, and the scale efficiency is better. Its low technical efficiency is mainly caused by the poor pure technical efficiency. The reason may be the relatively backward technical investment and management mode. The pure technical efficiency of Dalian Port is higher than the scale efficiency. The main reason for this situation is the excessive investment in the early stage of port construction, which leads to redundant investment and cannot effectively exert its scale efficiency. Both the pure technical efficiency and scale efficiency of Yingkou Port are at a relatively high level, and the pure technical efficiency continues to improve, which shows that the port pays attention to the innovation of technology and management system during its development. The pure technical efficiency of Tianjin Port is higher than the scale efficiency, indicating that the port’s production scale is wasted, and the port scale efficiency can be better in the future development. The scale and efficiency of Qinhuangdao Port has been on a downward trend in recent years. While focusing on technological innovation, the port should also consider improving policies for its input–output structure to improve port efficiency in all aspects. There are many ports in the Bohai Rim region, which will inevitably lead to problems such as the overlap of the port hinterland and the waste of input resources. Therefore, we pay attention to the integration of inter-regional port resources, improve resource utilization, and increase scale efficiency; at the same time, strengthen trade exchanges, develop port industries, and scientifically increase port production.

Analysis of Port Efficiency and Influencing Factors …

553

Table 4 Tobit regression results of factors affecting port efficiency Variable C GDP JCKZE RKS R2

Coefficient

Std. error

z-statistic

Prob

0.820239

0.053468

15.34085

0

−4.49E−05

1.51E−05

−2.981282

0.0029

1.93E−08

2.889334

5.5656 −6.37E−05

0.000205

−0.310754

0.0039 0.756

0.964563

3.3 Tobit Regression Analysis Use Eviews7.2 software to perform regression analysis on the established Tobit model. The results are shown in Table 4. It can be seen from the results in Table 4 that the coefficient of determination is 0.964563, which shows that the fit is very good. The constant term P < 0.05, the model passed the test. At the same time, it can be seen that: (1) The urban GDP of the port area is negatively correlated with port efficiency. The significance of urban GDP in the port area is 0.00029, and the coefficient is only −0.000045, indicating statistical significance, but the impact coefficient is small and negative, that is, the local economic level and port efficiency have little effect; (2) Port cities enter The total export volume is positively correlated with port efficiency. The statistical result of the total import and export volume of port cities is significant, with a coefficient of 5.556560, indicating that the total volume of import and export has a positive impact on the port’s operational efficiency and has a relatively large impact. Therefore, by increasing trade volume, it can be significant Improve port efficiency. By increasing the number of waterways and the number of 10,000-ton piers, the port’s freight volume of 10,000-ton ships will increase, thereby improving port efficiency. (3) Port city population is negatively correlated with port efficiency. Port population statistics are not significant, with a coefficient value of 0.000637, indicating that port city population basically has no effect on port efficiency.

4 Conclusion This paper uses the DEA-Tobit two-stage model to evaluate and analyze the port efficiency of my country’s 7 major ports in the past 8 years. The research value of the article lies in the effectiveness of port efficiency by analyzing the input and output of various elements of the port. The actual level situation provides a basis for decision-making for the future construction and development of the port, and avoids redundant construction and blind investment of resources. Regarding factors such as port efficiency, it can be seen from the empirical results that the GDP of hinterland cities and the total urban population at the end of the year have a small impact on port technical efficiency. Therefore, in the short term, economic development factors

554

B. Zhu

have less impact on port efficiency. The total volume of imports and exports has a greater impact on port technical efficiency. Therefore, port companies should actively respond to the “One Belt and One Road” initiative, deepen the degree of opening to the outside world, and attract more freight resources. At the same time, they should actively participate in the production and operation management of overseas port projects. Give full play to its advantages in operations, management, and services to improve the efficiency of container ports.

References 1. Roll, Y., Hayuth, Y.: Port performance comparison applying data envelopment analysis (DEA). Maritime Policy Manage. 20(3), 153–161 (1993) 2. Cullinane, K., Wang, T.F.: The efficiency analysis of container port production using DEA panel data approaches. OR Spectrum 32(3), 717–738 (2010) 3. Kuang, H., Chen, S.: Study and empirical research on China’s port production efficiency. Sci. Res. 05, 170–177 (2007) 4. Wang, A., Wu, W.: A study on the port efficiency of the Pearl River Delta based on the three-stage DEA model. Ind. Eng. 20(03), 82–88. 5. Tongzon, J.L.: Determinants of port performance and efficiency. Transp. Res. Part A 29(3), 245–252 (1995) 6. Bichou, K., Gray, R.: A logistics and supply chain management approach to port performance measurement. Maritime Policy Manage. 31(1), 47–67 (2004) 7. Hwang, C.C., Chiang, C.H.: Cooperation and competitiveness of intraregional container ports. J. East. Asia Soc. Transp. Stud. 8(2), 2283–2298 (2010) 8. Odeck, J, Brathen, S.: A meta-analysis of DEA and SFA studies of the technical efficiency of seaports: a comparison of fixed and random-effects regression models. Transp. Res. A Policy Pract. 46(10), 1574–1585. 9. Luo, J., Cui, E., Ji, J.: Study on the efficiency of container ports and their influencing factors based on DEA-TOBIT two-stage method. Sci. Technol. Manage. Res. 33(05), 236–239 (2013) 10. Ni, Z., Gao, X.: Study on the evaluation and influencing factors of port logistics efficiency in Guangdong Province—an empirical analysis based on DEA-Tobit Model. J. Guangdong Ocean Univ. 37(05), 11–16 (2017) 11. Liu, M., Wang, X.: Research on operation efficiency of container ports in the Upper and Middle Yangtze River based on DEA-Tobit. Math. Pract. Knowl. 49(14), 36–46 (2019)

Spectrum Allocation Technology of Elastic Optical Networks Based on Power Business Perception Xian Yang

Abstract The spectrum allocation technology in Elastic optical networks can effectively utilize the network spectrum resources and meet the service requirements of business, so it becomes one of the research hotspots in Elastic optical networks. However, the spectrum fragmentation and power consumption problems of Elastic optical networks lead to high bandwidth blocking rate. Therefore, based on power business perception, this paper studies the spectrum allocation technology of Elastic optical networks and conducts simulation analysis on a spectrum fragmentation optimal allocation scheme. Keywords Power service perception · Elastic optical networks · Spectrum allocation technique

1 Introduction With the continuous growth of some bandwidth-intensive applications and the explosive growth of Internet traffic and industry, the traditional WDM optical network adopts the fixed wavelength bandwidth spectrum allocation method, which is no longer suitable for the current development needs. Compared with WDM networks with fixed bandwidth granularity, Elastic optical networks can greatly improve the utilization of bandwidth resources and is regarded as one of the main directions for development of next generation optical networks [1]. However, Elastic optical networks need to satisfy the constraints of spectrum continuity and consistency during spectrum allocation. As optical paths are dynamically established and removed, the fragmentation of network spectrum continues to increase, resulting in improved bandwidth blocking rate. Based on this, in order to meet the demand of a large number of emerging services in the Internet environment, this paper studies the spectrum allocation technology of Elastic optical networks based on power service perception. Furthermore, an optimal allocation X. Yang (B) Jiangsu Zeyu Intelligent Power Co., Ltd., Nantong 226300, Jiangsu, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_68

555

556

X. Yang

scheme of spectrum fragments is proposed to flexibly allocate network bandwidth and improve network resource utilization by using business-aware methods to further optimize resource allocation of Elastic optical networks. According to the duration of operation, a spectrum allocation method is adopted to avoid spectrum fragmentation and select the maximum spectrum consistency value to improve the spectrum utilization and optimize the performance of blocking rate [2].

2 Power Business Awareness System Structure For the big data flow of new business of power system, DPI or DFI technology is adopted to realize in-depth business perception, and the structure of power business perception system is built based on the combination of DPI and DPI [3]. The design idea of system is shown in Fig. 1. The management of power communication network is based on network traffic detection and service perception. Based on DPI and DFI combined with the design of testing system, it set up a business recognition feature library used in electric power communication network, and the data features of general grid service are stored in the library to prepare and detect the service packet features for matching. The feature library also has the real-time update function, which can add the data packets newly connected to the service to the library.

Complete DFI recognition

Data pack Electric power equipment

System start-up compile

Update and compile regularly

Communication network Power user information

Business identification feature base

DFI multi-m ode algorith m matches accurate ly

Complete DFI recognition

DPI single mode algorit hm match es accurat ely

Statistical characteristics of data stream collection

DPI identificati on

N Identify the data flow information of power terminal access service

Fig. 1 DPI and DFI power business awareness system structure

Traini ng sample base

Y Identi ficati on sampl e base

Spectrum Allocation Technology of Elastic Optical …

557

3 Spectrum Fragmentation Optimization Model and Optimal Allocation Scheme 3.1 A Spectrum Fragmentation Optimization Model Based on Service Time Difference In order to improve the spectrum utilization rate of network, the allocation scheme of spectrum debris will be further optimized and an optimization model will be established [4]. It is supposed that four services, namely R1, R2, R3 and R4 are being transmitted in the network. R1 and R3 have a shorter duration, while R2 and R4 have a longer duration. At this point, if the spectrum is allocated according to the service arrival time, the frequency and time domain allocation is shown in Fig. 2a, which is not conducive to the access of new services and reduces the utilization rate of spectrum [5]. To improve this situation, time continuity Dn1 is defined so that time slots allocated for businesses with similar duration are continuous, as shown in Fig. 2b. Dn1 is defined as shown in Eq. (1): Dn1 = |td − 0.5(t1 + t2 )|

(1)

Assume that the arrival time of new business is ta , the duration of business is th , and the completion time of business is the arrival time plus the duration of business, namely td = ta + th . The business duration adjacent to the new business is t1 and R4

1

R2

0.9

0.8 0.7

0.7 0.5 0.4

R3

0.9

0.8 0.6

R4

1

0.6

R1 R3

0.5

R1 R3

0.4

0.3

0.3

0.2

0.2

0.1

0.1 0

0 1 2 3 4 5 6 7 8 9 A Original frequency gap distribution diagram

Fig. 2 Spectrum allocation diagram

1

2

3

4

5

6

7

8

9

b Optimized frequency gap distribution diagram

558

X. Yang

R2

1

R4

1 0.9

0.9 0.8

0.5

0.8

R5

0.7 0.6

R4

R1

0.7

R3

0.6

R1 R3

0.4

R2

0.5

R5

0.4

0.3

0.3

0.2

0.2

0.1

0.1 0

0 1

2

3

4

5

6

7

A Step distribution

8

9

1

2

3

4

5

6

7

8

9

b Ascending distribution

Fig. 3 Two distributions

t2 , and the difference value Dn1 between the nth alternative spectrum block of the new business and the average completion time of adjacent businesses at both ends is obtained [6]. At this time, the problem is that when td = 0.5(t1 + t2 ) occurs, there are two cases, as shown in Fig. 3. It can be found that the calculated value Dn1 in both cases is 0, the time continuity between services is better under the frequency gap allocation mode in Fig. 3b. In a more extreme case, the newly inserted business only has adjacent business on one side, namely td = 0.5 ∗ t. In this case, it is difficult to determine how to allocate the frequency gap of new business according to Formula (1) [7]. In view of this, the modified term λ |t1 − t2 | is introduced into the formula, which is called the deviation coefficient of λ , value [0, + ∞), and Formula (2) is obtained: Dn1 = |td − 0.5(t1 + t2 )| +λ |t1 − t2 |

(2)

Dn1 of each alternative spectrum block is calculated according to the modified Formula (2), and then sorted from small to large to find the smallest spectrum block of Dn1 . If there are multiple blocks with Dn1 minimum value, the concept of spectrum continuity is introduced and the optimal spectrum allocation scheme is selected from these alternative blocks.

Spectrum Allocation Technology of Elastic Optical …

559

3.2 Optimization of Spectrum Fragmentation Allocation for Bidirectional Continuum of Spectrum Spectrum continuity vn is the continuity of remaining frequency slots in the network after the nth spectrum block is pre-allocated to the new service. Spectrum continuity mainly reflects the impact of newly inserted services on the continuity of other remaining spectrum blocks in the network, which is defined as follows: vn = vn1 + vn2  F top  Fs m l = × Cln + total span F m l m∈ql l∈ p 1

(l ∈ L , m ∈ M)

(3)

When considering the spectrum continuity, it is assumed that the network topology and spectrum usage are shown in Fig. 4 [8]. The horizontal axis in Fig. 4b represents links in the network and the frequency gaps in each link. The blue area in the red dotted line represents spectrum blocks that have been occupied by other services, and the white area is free spectrum block [9]. Assuming that the new service needs to occupy a frequency gap in the link L3. When the frequency gap is 5, the spectrum usage of network is shown in Fig. 5. The spectral continuity at this time can be calculated as follows: 2 ∗2=1 4 3 1 V32 = ∗ = 0.375 4 2 V31 =

1

2 L5

L1 L4 L3

L6

L2

3

4 A Network topology structure

b Spectrum usage Situation

Fig. 4 Schematic diagram of network topology and spectrum Usage

560

X. Yang

Fig. 5 Schematic diagram of network spectrum usage after new service insertion

V3 = V31 + V32 = 1.375

(4)

In this way, Formula (3) is used to calculate the residual spectrum continuity of the network when the frequency gaps 2, 3 and 7 of new service are allocated in link L3, and the optimal allocation scheme of spectrum debris is the case where the value of maximum value corresponds to [10].

4 Analysis of Simulation Results The simulation analysis uses the network topology and spectrum in 3.2 above. The frequency gaps and links required by existing services and new access services are shown in Table 1. In the table, R1, R2, R3 and R4 are existing services in the network. At this point, the spectrum continuity Vn3 of new services R5, R6 and R7 after insertion is calculated by matlab simulation platform respectively to obtain the frequency gap allocation results of each new service, as shown in Fig. 6. Table 1 Business routing information

Business

The required frequency gap

Links

R1

2

L2, L4, L6

R2

2

L1, L2, L3

R3

2

L4 ,L5

R4

1

L1, L2, L3, L4

Business

The required frequency gap

Links

R5

1

L1, L3, L5

R6

2

L1, L2, L3

R7

1

L4, L5, L6

Spectrum Allocation Technology of Elastic Optical …

561

Fig. 6 Diagram of spectrum allocation for new business

As can be seen from the figure, service 5 uses the 6th frequency gap of link 1, 3 and 5 respectively; Service 6 uses the second and third frequency gaps of link 1, 2, 3 respectively; Service 7 uses the fifth slot of link 4, 5 and 6 respectively. From the simulation results, it can be seen that the spectrum fragmentation allocation algorithm with bidirectional spectrum continuity can effectively improve the utilization rate of the network to the spectrum resources, and also improve the network’s access ability to new services.

5 Conclusions Based on power business perception, this paper studies the spectrum allocation technology of Elastic optical networks and proposes an optimal allocation scheme of spectrum fragmentation. The simulation results show that it is effective, which is of great significance to improve the energy efficiency of future optical network and optimize the network spectrum resource allocation.

References 1. Engineering; Studies from Department of Electrical Engineering Further Understanding of Engineering (Heuristic Chaotic Hurricane-aided Efficient Power Assignment for Elastic Optical Network). Network Weekly News (2020) 2. Sensor Research; Study Data from Southwest Minzu University Update Knowledge of Sensor Research (Invalid-Resource-Aware Spectrum Assignment for Advanced-Reservation Traffic in Elastic Optical Network). Network Weekly News (2020) 3. Networks—Computer Networks; Reports from South Asian University Advance Knowledge in Computer Networks (Defragmentation Based On Route Partitioning In 1+1 Protected Elastic Optical Networks). Network Weekly News (2020)

562

X. Yang

4. Engineering; Findings from Aristotle University of Thessaloniki Has Provided New Data on Engineering (A Learning-automata-based Congestion-aware Scheme for Energy-efficient Elastic Optical Networks). Computers Networks & Communications (2020) 5. Networks—Photonic Networks; Researchers from San Jose State University Report on Findings in Photonic Networks (Virtual Network Mapping in Elastic Optical Networks With Sliceable Transponders). Network Weekly News (2020) 6. Chatterjee, B.C., Oki, E.: Defragmentation based on route partitioning in 1 + 1 protected elastic optical networks. Comput. Netw. 177 (2020) 7. Choudhury, P.D., Rakesh Reddy, P.V., Chatterjee, B.C., Oki, E., De, T.: Performance of routing and spectrum allocation approaches for multicast traffic in elastic optical networks. Opt. Fiber Technol. 58 (2020) 8. Chatterjee, B., Oki, E.: Elastic Optical Networks: Fundamentals, Design, Control, and Management. CRC Press (2020) 9. He, S., Qiu, Y., Xu, J.: Invalid-resource-aware spectrum assignment for advanced-reservation traffic in elastic optical network. Sensors 20(15) (2020) 10. Photonics; Findings from TeCIP Institute Broaden Understanding of Photonics (Integrated Silicon-on-insulator Optical Comb Demultiplexer for Elastic Optical Networks). Journal of Engineering (2020)

Construction of Information Teaching Mode in the Universities Under the Background of Big Data Binbin Yu

Abstract With the continuous development of big data, Internet of things, cloud computing and other new generation of information technology, the construction of information-based teaching mode in the universities will become the direction of future education continuous reform and stable development. Big data is put to use college teaching, which can better solve some problems in current teaching application and practice, and can also reduce the pressure of teachers in organizing teaching activities. In the face of the main problems existing in the existing teaching mode, teachers can put forward more accurate teaching strategies on the basis of the analysis of students’ behavior data, academic performance and personalized needs. It is very necessary and feasible to solve teaching problems and adapt to students’ individualized development. It is expected that this paper can have the positive and ongoing impact on the teaching reform in Colleges and universities, and improve the level of information-based teaching in the universities while changing and updating teaching concepts. Keywords Big data · Informatization · Teaching mode

1 Introduction With the emergence and rapid development of big data, the value of data has been pushed to an updated height and a wider range of applications. Big data, as its name implies, is a kind of huge data. Using the means of information technology to analyze, process and mine the massive data from storage management or collection, and then study the law and trend of things development. The value contained in the final data is obtained, which provides reliable data support for teachers’ teaching strategies and school’s educational decision-making.

B. Yu (B) College of Computer Science and Technology, Beihua University, Jilin, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_69

563

564

B. Yu

2 The Necessity of Constructing Information Teaching Mode in Colleges and Universities As a product of the era of information explosion, big data is very hot for various fields, and it is still the same for university education. Multiple information input system, the construction of various online course resource databases and students’ daily campus life behavior will retain massive data information in the system database. This massive data information is produced every day [1, 2]. On the surface, there is no connection between these data. However, if we can integrate and mine these data through data analysis, we can get more timely, relevant and timely feedback. The use of modern information technology to dispose of the information teaching in the university can realize the effective communication and good interaction between teachers and students and build a harmonious and good relationship between teachers and students [3]. The necessity of constructing the information teaching mode in Colleges and universities has the following three aspects: first, it can integrate high-quality teaching resources and enable students to receive the cutting-edge knowledge and information. Second, it can enrich the teaching situation in daily teaching activities [4]. For example, with the full and reasonable use of educational technology and multimedia platform, students can get more direct contact with knowledge itself, such as some abstract and difficult knowledge links, which can be solved in the course of information teaching mode. Third, it can reduce the pressure of teachers. In the information teaching mode in the university in the era of big data application like a raging fire, teachers can set their own teaching objectives more easily, and carry out more reasonable teaching plans through data analysis [5, 6]. In this way, teachers can be targeted and have evidence to follow. Highlight the important knowledge points in teaching and optimize the daily teaching effect and improve the teaching efficiency.

3 Challenges Faced by the Construction of Informatization Teaching Mode in the University Under the Background of Big Data 3.1 The Investment Guarantee of Informatization Construction Funds The construction of digital campus has become the basic work of digital construction in the university. In the wake of the swift and violent development and maturity of big data technology, some universities have their own big data platform. Some of them have their own private cloud, and the Virtualization Server is built in the cloud, which makes the university realize the information and digital management mode [7]. In addition to the investment in software, hardware, information system and database,

Construction of Information Teaching Mode …

565

it is also important to ensure the construction of information departments and the cultivation of professional talents. It is a big challenge to invest in the information construction of the university.

3.2 Data Mining Problem Comprehensively and Effectively Colleges and universities collect all kinds of data from PC terminal and mobile terminal through various application systems. However, these massive data cannot bring us effective information intuitively. We need to transform these unstructured data into structured data by professional means. This requires us to accurately grasp the accuracy in course of data mining and reduce the opportunity to weaken the value of data. This is a big challenge for the school information department. This requires that the information departments of colleges and universities work together with relevant departments to effective analysis and accurate extraction of information from the data source, and jointly and effectively strengthen the ability of data analysis and processing and data mining [8, 9].

3.3 The Guarantee Problem of Information Security Recently, the state attaches great importance to network information security, and has taken a series of efficient and appropriate measures to prevent the occurrence of information security incidents. This includes information system security level protection evaluation, education mobile application filing and so on, which can well prevent the occurrence of such incidents. The emergence of information system security level protection 2.0 framework makes enterprises and institutions pay enough attention to information system security. Information security also needs to be focused on protection in the context of big data in the university [10]. Because these data contain important school assets such as secret data and sensitive data, as well as private information is bound up with the interests of teachers and students. Once these important and sensitive data are leaked, it will bring uncertain and great security risks or losses to schools, teachers and students.

566

B. Yu

4 Construction of University Information Teaching Mode Under the Background of Big Data 4.1 In the Preparation Stage Before Class Through the effective analysis of big data, we can find extensive and useful information here. This can not only mine the general information of students’ overall performance, but find the personalized characteristics that can improve students’ performance. By summarizing and summarizing the data, we can find the law of teaching activities. On the basis of the accurate and effective data analysis, the behavior of students and the changes on this basis are internally linked together, which can better discover their characteristics, and can better promote students to improve and improve their academic performance and learning ability. Guided by these rules, the teaching process can be improved and optimized.

4.2 In Class Stage After data mining and learning analysis, teachers timely adjust learning strategies and change education management methods after obtaining students’ information. In the past, a lot of teaching experience is from their own classroom. These experiences can vary depending on the source of students, the grade of the professor, and the subjects taught. One teacher’s teaching experience is not applicable to other teachers, and big data is conducive to better solving this problem. Through the integration and judgment of a large majority of data, teachers timely modify the unsuitable teaching strategies and precisely make better the education management mode. Therefore, the development of teaching activities is more traceable and based on evidence.

4.3 After Class Stage Against the background of the vigorous development of big data, teachers can adjust the next teaching plan on the basis of the completion time of any question, the quantity of wrong questions and the proportion of wrong questions in the whole class or grade. In this way, the initiative to promote the teaching process is handed over to teachers, and the teaching quality and students’ learning ability are fundamentally improved. By taking advantage of big data, our traditional teaching concept has been changed. The new content of education has been constantly enriched, and education has been constantly developed.

Construction of Information Teaching Mode …

567

5 Conclusions This paper uses big data to drive information-based teaching in Colleges and universities to support teachers’ accurate teaching and students’ personalized learning. Through the deep integration of information technology and education teaching, the teaching mode can be improved to improve teaching efficiency and teaching effect. In the process of teaching, teachers use big data to analyze various behavior data of students’ learning process and students’ personalized needs, which enriches teaching means and activates teaching resources to a certain extent. In the research, we need to pay attention to the necessity and feasibility of data analysis in the process of students’ learning, so as to provide the basis for the research of information-based teaching mode in Colleges and universities. This provides more possibilities for teachers and students to teach and learn. Students’ interest and personality are more respected. It provides reliable analysis results and teaching improvement suggestions for teachers. Acknowledgements This research was supported by the Education and Science Planning Project of Jilin Province (Grant ZD18019).

References 1. Huang, Y., Jin, X.: Innovative college English teaching modes based on big data. Educ. Sci.Theory Pract. 18(6), 3428–3434 (2018) 2. Li, Y., Huang, C., Zhou, L.: Impacts on statistics education in big data era. Educ. Sci.-Theory Pract. 18(5), 1236–1245 (2018) 3. Li, Y.: Study of educational technology innovation based on the perspective of big data. Agro Food Ind. Hi-tech 28(3), 813–816 (2017) 4. Zhang, Y.: Model innovation and teaching effect evaluation of accounting teaching in higher vocational colleges in the era of big data. Educ. Sci.-Theory Pract. 18(6), 3620–3627 (2018) 5. Hao, L.: A study on MOOC and foreign language teaching in the big data age-challenges and opportunities. Agro Food Ind. Hi-tech 28(3), 1729–1733 (2017) 6. Liu, H.: The research of theoretical construction and effect of preschool wisdom education system in the background of big data. Cluster Comput. J. Netw. Softw. Tools Appl. 22, 13813– 13819 (2019) 7. Chang, C.: Optimization of ideological and political education teaching by using big data. Agro Food Ind. Hi-tech 28(3), 1664–1668 (2017) 8. Daniel, B.: Big data and analytics in higher education: opportunities and challenges. Br. J. Educ. Technol. 46(5), 904–920 (2015) 9. Ferguson, R.: Learning analytics: drivers, developments and challenges. Int. J. Technol. Enhanced Learn. 4, 304–317 (2012) 10. Griffin, P.A., Wright, A.M.: Introduction: commentaries on big data’s importance for accounting and auditing. Account. Horizons 29(2), 377–379 (2015)

Analysis of the Impact of Cloud Computing-Based Financial Development on Employment Growth in the Era of Big Data Penghui Fu

Abstract The quality of labor in the labor market and the demand for labor from the development of the product market are key factors that determine the level of employment in a country, but they are not the only factors. Since the reform and opening up, my country’s financial industry has developed rapidly. As of 2019, the supply of M2 currency in my country’s financial market has reached 198.6 trillion yuan, and the financial industry’s increase in GDP has exceeded that of other industries. Social and economic activities in my country Plays an important role in This article attempts to systematically study the impact of the development of the financial industry on employment through cloud computing. In order to reveal the relevance of the development of the financial industry to employment growth in the era of big data, the impact of the development of the financial industry on employment is analyzed from different perspectives. Taking the development of my country’s financial industry and the level of employment as the research basis, suggestions are made on how to promote employment in my country from the perspective of the development of the financial industry. Keywords Financial development · Employment · Big data

1 Introduction Employment is an important driving force for a country’s economic development. As a country with a large labor force, employment problems have always existed in China. In recent years, the development of the financial industry has been increasing day by day. Whether the use of big data and cloud computing has an impact on employment is of great significance to China’s improvement of the employment mechanism [1–3]. Regarding the impact of the development of the financial industry on employment, Bremus and Lambert (2014) analyzed the impact of European bank liquidity on the P. Fu (B) School of Economics, ShangHai University, Shanghai, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_70

569

570

P. Fu

development of the financial industry, and pointed out that the financial industry plays an important role in promoting employment in the service industry. Hamid (2014) analyzed the impact of the development of the credit market on employment through an econometric model based on the US data from 1970–1990. This article studies the impact of financial development on employment. The data from 1996 to 2018 are used to verify the long-term equilibrium relationship between financial development and employment based on the VAR model. The development of financial level has a positive and positive correlation with the increase in employment. Using data from 2000 to 2018, based on an autoregressive lag model, we verified the impact of financial constraints on the employment of enterprises of different ownership from different enterprise levels [4–6]. In addition to the introduction, this article is divided into four sections. The second section discusses the mechanism of financial development’s impact on employment, the third section empirically studies the effect of financial development on employment, and the fourth section empirically studies the effect of financial constraints on employment of different ownership enterprises. Section 5 puts forward conclusions and suggestions.

2 The Transmission Mechanism of the Development of the Financial Industry Affecting Employment 2.1 The Direct Effects of the Development of the Financial Industry The direct effect reflects that the development of the financial industry provides more employment. The financial industry is closely related to people’s lives. People’s demand for the financial industry is increasing, and the demand for financial products is becoming more and more abundant. This places higher requirements on financial institutions that provide financial products and services [7].

2.2 Indirect Effects of the Development of the Financial Industry Financial institutions use these funds to promote economic development by issuing loans. Economic development drives the development of various industries, leading to continuous improvement in the ability of the entire society to absorb labor. Financial institutions provide a platform for residents’ deposits to become investments. The investment of enterprises will not only expand the scale to attract a large number of jobs, but also expand various production lines to promote the improvement of production capacity and employment level [8].

Analysis of the Impact of Cloud Computing-Based Financial …

571

2.3 The Impact of Financial Constraints on Employment The creation of corporate vacancies depends more on the labor management cost of the company, but under normal circumstances, companies are subject to financing constraints when creating jobs. Financing constraints will not allow entrepreneurs to increase the number of vacancies. Every company has a certain number of alternate positions in order to prevent employees from leaving the company, financing constraints will make entrepreneurs reduce their staff reserves. Therefore, with the improvement of the level of financial development, the financing constraints faced by enterprises are reduced, which in turn can promote the growth of employment [9]. Based on the above discussion, we make assumptions about the development of the financial industry: The development of the financial industry has a positive role in promoting employment; Judging that the financial industry has a positive role in promoting employment based on the macro level, and at the same time using the micro enterprise level to demonstrate the development of the financial industry, that is, the impact of financial constraints on employment. The smaller the financial constraints, the more significant the role of enterprises in increasing employment [10].

3 An Empirical Analysis of the Impact of My Country’s Financial Industry Development on Employment The development of the financial industry is one of the main factors affecting employment. Looking back at the historical development, every major crisis will lead to the outbreak of a financial crisis and make a large number of workers unemployed. The impact of financial development on employment has become a hot research topic in recent years. According to the available data, use EViews software to draw a scatter chart (as shown in Fig. 1). In the long run, they have a positive correlation. Therefore, it is necessary to verify the positive correlation between financial development and employment in the long run. This article focuses on the impact of the development of the financial industry on employment, so without considering the impact of capital investment, we set the model as: LnEMP = α + βLnFD + ε

(1)

From the above cointegration test, we can use their original variables to estimate by ordinary least squares method, and the obtained multiple regression equation is as follows: Ln E M P = 0.191Ln F D + 4.79

(2)

572

P. Fu 78,000

Fig. 1 Scatter plot of financial development level and employment level

76,000

EMP

74,000

72,000

70,000

68,000

1.6

2.0

2.4

2.8

3.2

3.6

FD

At the test significance level of 0.01, the level of financial development has a significant influence on the number of employees, the corresponding modified coefficient of determination is 0.88, and the F statistic is 155.51. It shows that for every 1% increase in the development of the financial industry, the number of employees increases by 0.191%. As the level of development of the financial industry increases, there is a positive effect on the total number of employees.

4 Analysis of the Differences in the Impact of Financing Constraints on the Employment of Different Enterprises The analysis in the previous chapter concluded that the development of the financial industry has a positive effect on employment. This chapter mainly measures the impact of financial development on employment from the enterprise level. Benmelech (2017) believes that the contraction of credit intermediaries caused by the economic crisis is considered to be particularly harmful to households and small companies. In contrast, large companies are generally considered relatively unchecked. To sum up, on the basis of existing research, analyze the impact of financing constraints of state-owned and private enterprises in my country on employment. Measure whether with the development of finance and the easing of financial constraints of enterprises, the ability of the jobs created by enterprises will become stronger [11]. Since 2000, the number of employees in state-owned enterprises has been declining, and the number of employees in private enterprises has been increasing. The reasons may be: State-owned enterprises continue to withdraw from the field of operation, private enterprises continue to increase, and private enterprises have

Analysis of the Impact of Cloud Computing-Based Financial …

573

Fig. 2 Trend of employment in state-owned enterprises and private enterprises

developed rapidly. With the emergence of private enterprises, a large number of labor-intensive enterprises have appeared, and a large number of private enterprises have been employed (Fig. 2). In this chapter, in order to analyze the impact of financial constraints of different ownership enterprises on employment levels, the autoregressive distributed lag model (ARDL) is selected. The model form is as follows: L i,t = μ +

p  j=1

λi,t L i,t− j +

q 

βi,t F Si,t− j +



X + εi,t

(3)

j=0

In order to measure the impact of financing constraints on corporate employment at the enterprise level, using data from 2000 to 2018, the level of financing constraints and employment data for state-owned enterprises and private enterprises are used to construct a multiple regression model based on the VAR model to analyze the long-term change trend. Revise the model to analyze short-term changes. In the long run, there is a long-term positive correlation between the level of financing constraints of state-owned enterprises and private enterprises on employment, and there is a certain difference in the impact of the level of financing constraints of the two on employment. In the short term, changes in financial constraints of stateowned enterprises and private enterprises have a positive correlation with changes in employment, and the error term has a significant correction effect on short-term fluctuations. In view of the above conclusions, policy recommendations are made in the next chapter.

574

P. Fu

5 Summary and Policy Discussion This article conducts an empirical study on the impact of financial development on employment. The data from 1996 to 2018 verified the long-term equilibrium relationship between financial development and employment, and the development of financial level has a positive and positive correlation with the increase in employment. Using the data from 2000 to 2018, the impact of financial constraints on the employment of enterprises of different ownership is verified from different enterprise levels. Based on the empirical research on the impact of my country’s financial industry on employment, under the current economic conditions in my country, in order to implement a more active and stable employment policy, it is necessary to strengthen the development of finance, to develop the financial industry as a priority industry driven by employment, and to optimize resource allocation Promote the transformation of economic structure. It is necessary to further relax the financial constraints on private enterprises, promote financial innovation and development, and promote the development of the financial industry. Establish diversified financial institutions. In the development of the financial industry, the banking, securities, and insurance industries, as three sub-sectors, play an important role. In constructing diversified financial institutions, it is necessary to provide diversified services. The government should introduce appropriate policies to support the development of the financial industry. Develop a multi-level capital market system and transform from a bank-led financing system to a financial market-led financing system. To give full play to the influence of the “invisible hand” of the government, the quality and quantity of the development of the financial industry must be promoted to promote the sound and rapid development of the entire financial system. Compared with the government-led promotion of employment, the other is to promote employment by supporting enterprises. As an important part of my country’s economy, private enterprises have become the main force in job creation. Therefore, supporting private enterprises is very helpful to employment. Financing constraints are now one of the main obstacles hindering the development of private enterprises. Considering that financial institutions are reluctant to lend to private enterprises in order to avoid risks, explore the role of development finance. Pay attention to the evaluation of projects, improve the efficiency of loans, and better evaluate national policies.

References 1. Lee, I.H.I, Hong, E., Makino, S.: The effect of non-conventional outbound foreign direct investment (FDI) on the domestic employment of multinational enterprises (MNEs). Int. Bus. Rev. 29(3) (2020) 2. Ullah, B.: Financial constraints, corruption, and SME growth in transition economies. Q. Rev. Econ. Fin. 75, 120–132 (2020)

Analysis of the Impact of Cloud Computing-Based Financial …

575

3. Siemer, M.: Employment effect of financial constraints during the great recession. Rev. Econ. Stat. 2 (2018) 4. Kelada, L., Wakefield, C.E., Vetsch, J., et al.: Financial toxicity of childhood cancer and changes to parents’ employment after treatment completion. Pediatric Blood & Cancer 67(7) (2020) 5. Holtyn, A.F., Toegel, F., Subramaniam, S., et al.: Financial incentives promote engagement in employment services for unemployed adults in treatment for opioid use disorder. Drug and Alcohol Dependence 212 (2020) 6. Zhang, D.: Does a designed financial system impact polluting firms’ employment? Evidence of an experimental economic policy (2020); Abras, A., de Paula Rocha, B.: Bank credit shocks and employment growth: an empirical framework for the case of Brazil. J. Dev. Areas 54(1) (2020) 7. Social Work; Study Results from Bowling Green State University Provide New Insights into Social Work (Examining the Influence of Financial Assistance and Employment Services on the Criminal Justice Outcomes of Women on Probation) (2020) 8. Jones, M.K., McVicar, D.: Estimating the impact of disability onset on employment. Social Science & Medicine (2020) (prepublish) 9. Hu, L.: Racial/ethnic differences in job accessibility effects: explaining employment and commutes in the Los Angeles region. Transp. Res. D 76 (2019) 10. Melesse, W.E.: Change in employment level and financial constraint: evidence from Ethiopian manufacturing SMEs. J. Soc. Econ. Dev. 21(2), 329–352 (2019) 11. Benmelech, E., Frydman, C., Papanikolaou, D.: Financial frictions and employment during the Great Depression. J. Fin. Econ. 133(3), 541–563 (2019)

Influence of Human Capital on Consumer Expenditure Under Big Data Xiuli Shi

Abstract Using CFPS data, the education level and whether to receive education and training are selected as the measurement indicators of human capital. The results show that age and intergenerational have certain influence on consumption expenditure, but age basically presents a negative correlation, and the relationship between age and consumption is U-shaped. The intergenerational influence is influenced by income and accumulated wealth. However, in general, human capital can improve consumption to a certain extent, and it has a decreasing trend, which has a greater impact on families with low consumption. In the process of China’s aging, big data is also developing gradually. How to resolve the aging crisis and promote consumption and economic growth? The combination of big data and big data in education of human capital and health can solve the imbalance, stimulate economic vitality and give full play to the advantages of big data, and puts forward some countermeasures and suggestions. Keywords Aging · Human capital · Consumption · Big data

1 Introduction Under the influence of China’s epidemic, China’s consumption is relatively low. With the aging of China’s population, the improvement of human capital can increase residents’ consumption by increasing income [1]; As well as increasing residents’ consumption by changing consumption concepts through education, from the demand side, consumption, investment and external demand are the three carriages driving the economy, and the investment in human capital is also a long-term investment in education [2]; Transnational flow of human capital can optimize resource allocation and increase external demand, and domestic flow of human capital also contributes to the formation of externalities of human capital. For economic growth, human capital can increase the marginal replacement rate of workers [3]; At the X. Shi (B) School of Economics, Shanghai University, Shanghai, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_71

577

578

X. Shi

same time, human capital promotes innovation and technological progress, which can improve the economic growth rate. Therefore, according to the enrollment expansion of the Ministry of Education under the epidemic this year and the 19 measures to promote consumption expansion and improve quality, this paper explores the influence between human capital and residents’ consumption, and analyzes China’s economic growth [4]. According to China’s population censuses in 1982, 1990, 2000 and 2010, the distribution of China’s human capital is mainly the proportion of each degree per 100,000 people. It can be seen from the figure that the illiteracy rate is declining, with high school and technical secondary school rising to nearly 15% and junior college nearly 10%. However, compared with developed countries such as the United States and Japan, China’s human capital level needs to be improved. In 2010, the proportion of Americans over 25 years old who received primary education was the proportion of high school education has reached as high as 87%. In recent years, the expansion of college enrollment in China has also increased the accumulation of human capital and laid the foundation for the long-term high-quality development of China’s economy [5]. From 2011 to 2019, the proportion of the population aged 15–64 and 65 in China is declining, from 75% in 2011 to 71% in 2019, while the proportion of the population aged 65 has increased from 9 to 12%. The elderly population in China is increasing, and their spending power is insufficient [6]. From 2010 to 2018, in China’s consumption ratio and household consumption index, the consumption of Chinese residents is on the rise, but from the level of 2016, the consumption ratio of Chinese residents is in a stable state, and there is a downward trend. The consumption ratio of residents is stagnant. When the population is aging, China’s consumption will be suppressed to a certain extent. How to develop the consumption of the elderly population, it is important to accumulate human capital under the background of big data [7].

2 Data and Theoretical Basis The data in this paper comes from CFPS database, tracking the data of CFS in 2014, 2016 and 2018, including 31 provinces and cities, and the identified and applicable observed value is 14410. Generally speaking, the number of illiterate people and junior high school education is the highest, and with the increase of education level, the total expenditure is also increasing, and regardless of education level, the proportion of subsistence consumption is about 55%, that is, food, housing and clothing expenditure for each family, but with the increase of education level, the proportion of subsistence consumption expenditure is also decreasing, but the main consumption difference lies in the differences of culture, education, entertainment and durable goods, etc. [8].

Influence of Human Capital on Consumer Expenditure Under Big Data

579

2.1 The Theory of Household Savings Demand Samueison and others put forward that the wealth of the family will be transferred and passed down from generation to generation. Parents will leave the accumulated wealth to the next generation, and their children are an investment of parents, just like savings, so the number of children in the family is small. When the income increases, the consumption level is also higher, but when it is not as old as old age, it will save and prevent old age; On the other hand, for families with a large number of children, raising children produces more consumption, so they save less, but for the elderly, they consume more because of support, and the family consumption behavior will change according to the age structure of the family population [9–11].

2.2 The Consumption Structure Theory Engel’s law holds that when the family’s income is small, the expenditure on food is relatively large, and with the increase of income, the proportion of survival consumption will decrease; Maslow’s demand theory believes that people’s needs have levels, and only when they meet the needs of lower levels can they seek higher levels of needs. The first and second levels are physiological and safety needs, that is, survival consumption, that is, consumption in terms of food, housing and clothing; Education, medical care and transportation are developmental consumption; Culture and durable goods are enjoyable consumption. At different stages of life, teenagers, middle-aged people and old people have different needs and incomes, so they will also change due to different population structures.

2.3 The Consumption Theory Life cycle consumption theory: Modigliani’s life cycle theory function holds that people arrange the proportion of income for consumption and savings according to life expectancy. The formula of consumption function is C = aWR + bYL, where WR is property income, A is the consumption tendency of property income, and B is the marginal consumption tendency. YL is the labor income, and c is the consumption of different life cycle stages and different age groups, that is, the consumption of residents depends on the total income obtained in one’s life. Absolute income consumption theory: according to this theory, in the short term, consumption depends on the absolute income at present, and there is a stable functional relationship between consumption and income: C = a + bYd, C and Yd are the current consumption and disposable income, and B is the marginal consumption tendency, which has a decreasing trend. From the above growth theory and consumption theory of human capital, it can be seen that from the direct effect of

580

X. Shi

human capital, disposable income can be increased, thereby increasing consumption expenditure and promoting economic growth, and consumption expenditure will also be affected by age structure; Indirectly, human capital can promote economic growth, and the relationship between economic growth and consumption is mutual promotion. Therefore, human capital has certain influence on consumption.

3 Empirical Research Lnpce = f(edu, skill, health, work, X, Y)

(1)

Pce stands for consumption expenditure, pce stands for enjoyment and development consumption; Skill indicates whether to receive skills training, which is also a measure of human capital. edu indicates education level, health represents health level, work represents a series of variables of work (whether there is establishment or not, job satisfaction), X represents gender, age, party member and current marital status, Y represents family size, urban and rural characteristics, net income and net assets of families, etc. According to the results of cloud computing, for every 1% increase in the logarithm of income, the logarithm of consumption increases by 0.4%; for every 1% increase in the net assets of households, the total consumption expenditure increases by 0.1%, and the consumption expenditure of skilled workers increases by 0.1%. The more unhealthy people spend, on the one hand, the increase in medical expenses, on the other hand, it affects their income. The more unhealthy people’s total expenditure increases by 0.03%. The more satisfied you are with your job, the more you consume. For every degree of satisfaction, the consumption decreases by 0.01%. The consumption expenditure of the urban population is 0.004% higher than that of the rural population. The larger the family size, the more you spend. For each additional person, the expenditure increases by 0.5%, and the non-party members spend 0.1% more than the party members, The relationship between age and consumption is negative. The total expenditure increases by 0.03% when the education level increases by one grade, and the variable is basically significant at the level of 1%, while whether married or not and the square of age are not significant.

4 Conclusion China is gradually entering the process of aging, and there is a negative correlation between consumption and generations, which is very consistent with the traditional Chinese concept. Education and training are an aspect of human capital and can improve the consumption level, and training technology plays a great role in consumption. Learning by doing is also an effective way to accumulate human capital. China’s aging population is increasing, and China’s consumption is weakening. If

Influence of Human Capital on Consumer Expenditure Under Big Data

581

we explore the human capital dividend of the aging population, it will not only solve the employment problem of the aging population and improve the productivity level, but also help promote consumption and economic growth. Human capital will also increase the actual effective labor force and promote economic growth. On the one hand, the central government’s policy of encouraging college enrollment has eased employment, on the other hand, it is accumulating human capital. However, as far as the present situation is concerned, there are still great differences in education between regions, but human capital is universally applicable to promote consumption, and there are also differences in education level between urban and rural areas. It is necessary to realize the equalization of education and optimize the allocation of educational resources, which inclines to the east and limits the cultivation of human capital in other regions to a certain extent. It is a good way to develop online teaching with big data, and the development of Internet has effectively reduced the inequality in education. China’s aging population’s suppression of consumption should not be underestimated. In addition to encouraging the aging population to accumulate human capital, re-learning and training their own skills to adapt to the development and changes of society, it is also necessary to change the deep-rooted consumption concept. The health level of the elderly should also be concerned. Big data pays attention to the development of medical devices and medical cloud services, which can effectively improve the medical level and people’s health level, thereby accumulating human capital and promoting consumption and economic growth.

References 1. Tian, Y., Yu, J., Zhao, A.: Predictive Model of Energy Consumption for Office Building by Using Improved GWO-BP. Energy Rep. 6 (2020) 2. Thike, T.Z., Saw, Y.M., Lin, H., Chit, K., Tun, A.B., Htet, H., Cho, S.M., Khine, A.T., Saw, T.N., Kariya, T., Yamamoto, E., Hamajima, N.: Association between body mass index and ready-toeat food consumption among sedentary staff in Nay Pyi Taw union territory, Myanmar. BioMed Central 20(1) (2020) 3. Ali, S., Zhang, J., Azeem, A., Mahmood, A.: Impact of electricity consumption on economic growth: an application of vector error correction model and artificial neural networks. J. Dev. Areas 54(4) (2020) 4. Painter, D.S.: Burning up: a global history of fossil fuel consumption by Simon Pirani (review). J. Interdiscip. Hist. 50(3) (2020) 5. Ali, S., Zhang, J., Azeem, A., Mahmood, A.: Impact of electricity consumption on economic growth: an application of vector error correction model and artificial neural networks. J. Dev. Areas 54 (2020) 6. Liu, C., Yang, M.: An empirical analysis of dynamic changes in ecological sustainability and its relationship with urbanization in a coastal city: the case of Xiamen in China. J. Clean. Prod. 256 (2020) 7. Li, C., Sanchez, G.M., Wu, Z., Cheng, J., Zhang, S., Wang, Q., Li, F., Sun, S., Meentemeyer, R.K.: Spatiotemporal patterns and drivers of soil contamination with heavy metals during an intensive urbanization period (1989–2018) in southern China. Environ. Pollut. 260 (2020)

582

X. Shi

8. Dukhi, N., Sartorius, B., Taylor, M.: A behavioural change intervention study for the prevention of childhood obesity in South Africa: protocol for a randomized controlled trial. BMC Public Health 20(1) (2020) 9. Wu, Y., Jiang, W., Luo, J., Zhang, X., Skitmore, M.: How can Chinese farmers’ property income be improved? A population–land coupling urbanization mechanism. China & World Economy 27(2) (2019) 10. Syeda, A.B., Khalil, A.H., Noureen, Q.S.: Impact of demographic variables on women’s economic empowerment: an ordered probit model. J. Women Aging 30(1) (2018) 11. Luis, P., Agustín, V., Manuel, B.: Property income from-whom-to-whom matrices: a dataset based on financial assets-liabilities stocks of financial instrument for Spain. Data in Brief 19 (2018)

The Impact of Changes in RMB Real Effective Exchange Rate Based on Cloud Computing Technology on Employment in the Context of Big Data Lingyan Zhang

Abstract With the rapid development of science and technology, the era of information data is coming, which provides us with more firm support for studying various economic problems. Employment is essential to people’s lives, and employment growth can promote the progress of economic and keep the social peace. With the development of economic globalization, the world economy is increasingly connected, and the influence of exchange rate on employment is also increasing. Thus, analyzing the effect of exchange rate changes on employment in the era of big data is very meaningful. This paper conducts cloud computing to discuss how the real effective exchange rate of RMB changes effect the employment. The research tells that the real effective exchange rate of RMB is negatively correlated with employment, while foreign direct investment, import and export balance and total wages are positively correlated with employment. Finally, this paper puts forward relevant suggestions based on the results. Keywords Big data · Reer · Employment

1 Introduction The reform and opening up promotes the economy of China grow quickly, promotes the rapid development of the three major industries and promotes the continuous expansion of employment. By the end of 2019, the number of employed people in China reached 774.71 million, but the employment situation is still grim. Employment is closely related to our life, which not only affects economic development, but also is closely related to social stability. The increase of employment can create more production factors for the society and promote economic development, and employment can bring people income, stimulate consumption and enhance people’s happiness in life, thus stabilizing social order. Achieving full employment has always been the national macro-economic policy goal. Increasing employment and solving L. Zhang (B) Institute of Economics, Shanghai University, Shanghai, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_72

583

584

L. Zhang

unemployment problems are problems that every country will face and must solve [1]. There are many factors that affect employment, such as the ability and quality of workers themselves, relevant national economic policies, economic development, exchange rate level and so on. This article mainly discusses the influence of real effective exchange rate of RMB change on employment. With the continuous development of economic globalization, the world is becoming more and more interconnected. The economic change of one country will have different impacts on the world economy, and then affect all levels of other countries’ economy and society. Exchange rate is one of the economic indicators that will be affected. Exchange rate will have an influence on one country’s import and export value and foreign investment, change the domestic market demand, industrial development, and have a certain impact on employment. Thus, analyzing the effect of RMB exchange rate changes on employment in China is very useful [2]. Zeng Ying finds that the value-added of RMB in most industries is not conducive to the expansion of their employment, while the depreciation will promote the growth of their employment. Xu finds that the employment of Guangdong province and the RMB exchange rate and GDP have long-term stable equilibrium relationship, in the short term, exchange rate appreciation has a negative influence on their employment [3]. With the continuous development of modern science and technology, computer network technology is increasingly advanced, and the use of big data provides new methods and support for us to study various problems. In this paper, the data of employment number, real effective exchange rate of RMB, GDP, foreign direct investment, import and export balance and the wages of urban non-private employees are selected for calculation and analysis, and the influence of exchange rate on employment is discussed through cloud computing. Finally, relevant suggestions are put forward according to the results [4].

2 The Discuss of the Impact of RMB Exchange Rate Changes on Employment 2.1 Data Selection and Description The number of employed people in China is indicated as the quantity of employed people (10,000 people). The real effective exchange rate of RMB. The real effective exchange rate of RMB excludes the influence of inflation, and fully takes into account the actual economic development of China and its trading partners, which is more comprehensive and accurate. In this paper, the real effective exchange rate of RMB is chosen as the explanatory variable, taking 2010 as the base period, in other words, the index of the

The Impact of Changes in RMB Real Effective Exchange Rate …

585

real effective exchange rate of RMB in that year is 100, with the rising index representing the appreciation of RMB and the falling index representing the depreciation of RMB [5]. Gross domestic product (100 million yuan).The growth of one country’s economy can promote the increase of the number of employed people. Therefore, we choose GDP to study the impact of economic growth on employment. Foreign direct investment (100 million yuan).The increase of foreign direct investment can promote the development of domestic related industries, thus providing more jobs and increasing the number of jobs. Since the unit of foreign direct investment data is US dollars, which is a unified unit to facilitate empirical calculation, this paper converts all US dollars into RMB according to the annual average exchange rate of that year when processing the data [6]. Difference between import and export (100 million yuan).The difference between import and export is the total export minus the total import. The increase of the difference between import and export can promote the development of domestic industries, promote the expansion of industries, increase the demand for labor and realize employment growth [7]. Total wages of employees of urban non-private units (100 million yuan).Wages can promote employment to a certain extent. When wages rise, more people will be attracted to choose employment [8].

2.2 Data Analysis Results Through computer cloud computing, this paper concludes that the influence of real effective exchange rate of RMB is negative, which means that if the RMB exchange rate increases then the employment will decrease. With the continuous development of globalization, the links between China and other countries in the world are getting closer and closer, and the acceleration of the opening-up process makes China’s economy increasingly dependent on the global economic market. On the one hand, the value of RMB exchange rate increase can cause the export cost of domestic commodities grow, which will reduce the international competitiveness of domestic companies, thus reducing production, which is not conducive to the expansion of the employed population. On the other hand, the value of RMB exchange rate increase will cause the increase of the cost of foreign investment, the relative depreciation of its wealth in China and the decrease of foreign direct investment, which is not conducive to the growth of domestic employment. In addition, the appreciation of RMB increases the purchasing power of local currency, which is beneficial for enterprises to introduce advanced technology and equipment from abroad, so that enterprises can continuously increase their investment in capital, and capital will replace labor, thus reducing the number of employed people [9]. The influence coefficient of GDP is negative. Generally speaking, the increase of GDP, that is, the development of economy, is conducive to promoting the development of various types of enterprises, and then increasing the demand for labor. On

586

L. Zhang

the other hand, economic development will drive the increase of people’s income, stimulate their consumption demand, thus promoting the expansion of market and production expansion of enterprises, which is conducive to the increase of domestic employment. However, in this analysis, the impact of GDP on employment is negative, and it has not passed the significance test. This may be related to the limited analysis methods and data, which leads to the inaccuracy of the final results, which is also the problem that this paper still needs to improve [10]. The influence coefficient of foreign direct investment is positive, which shows that FDI has a significant positive impact on employment level. Foreign businessmen will make use of their advanced technology, management advantages and domestic cheap labor to invest in production and expand the domestic market, thereby increasing jobs and attracting more labor. Therefore, the increase of foreign direct investment is conducive to promoting the growth of employed persons [11]. The influence coefficient of import and export balance is positive, which shows that import and export balance has a significant positive impact on employment level. The increase of the difference between import and export means that the total exports are greater than the total imports, and the export is growing and the demand in foreign markets is increasing. The increase in exports is conducive to the continuous expansion of domestic enterprises, thereby increasing the demand for labor and promoting employment [12]. The influence coefficient of the total wages of urban non-private employees is positive, which shows that wages have a significant positive impact on employment. Generally speaking, the increase in wages will attract more people to work, so the increase in wages will increase the number of employed people, and there is a positive correlation between them. In addition, among all the variables, the real effective exchange rate of RMB has the greatest impact on employment.

3 Conclusions and Suggestions 3.1 The Research Conclusion This article analyzes the impact of real effective exchange rate of RMB on employment through cloud computing. The results show that the effect of real effective exchange rate of RMB employment is adverse, that is, the rise of exchange rate has a restraining influence on employment, and the exchange rate has the greatest influence on employment. In addition, foreign direct investment, the difference between import and export and the increase of total wages will promote the improvement of employment level in China.

The Impact of Changes in RMB Real Effective Exchange Rate …

587

3.2 Suggestions Employment is the foundation of people’s livelihood, and achieving full employment is the goal of China’s macroeconomic policy, which is conducive to maintaining social stability and promoting long-term healthy economic development. Through research, this paper finds that the fluctuant of real effective exchange rate of RMB can make a certain effect on employment, so the government should fully consider its impact on domestic employment when formulating RMB exchange rate policy. The following are relevant suggestions. Improve the RMB exchange rate mechanism and stabilize the RMB exchange rate. With the promotion of globalization and the opening-up policy, China’s economic development has become closer to that of other countries in the world. It stabilizes the RMB exchange rate, avoids drastic changes in the short term, and continuously enhances the competitiveness of the RMB, which greatly promotes the domestic economic development and realizes full employment. Therefore, the government should strengthen macro-control, observe the law of economic development, adjust the RMB exchange rate in line with market situations, strengthen the ability to cope with international financial risks, improve the construction of RMB derivatives market and forex market, and weaken the effect of exchange rate fluctuations on domestic economy and employment. Improve the domestic investment environment and rationally introduce foreign direct investment. Foreign direct investment is conducive to stimulating the growth of domestic employment, so the government should constantly improve the domestic investment environment, strengthen infrastructure construction and attract foreign direct investment, but also pay attention to the quality and structure of foreign direct investment. When introducing foreign capital, we should combine the domestic industrial structure and market situation, promote investment in high-tech industries, promote the development of capital-intensive industries and technology-intensive industries, enhance the competitiveness of enterprises, achieve higher-quality economic development, and promote employment expansion.

References 1. Bruneau, G., Moran, K.: Exchange rate fluctuations and labor market adjustments in Canadian manufacturing industries. Can. J. Econ. 50(1), 72–93 (2017) 2. Ren, Y., Gu, W.: The impact on RMB internationalization process: exchange rate expectation and foreign trade. Quant. Financ. Econ. 1(1), 114–124 (2017) 3. Afonso, O., Bandeira, A.M., Magalhães, M.: Labour-market institutions, (un)employment, wages, and growth: theory and data 50(6), 613–633 (2018) 4. Arize, A.C., Kallianiotis, I.N., Malindretos, J., et al.: A comparison of the current account and the monetary theories of exchange rate determination. Int. J. Econ. Financ. 10(2), 102 (2018)

588

L. Zhang

5. Li, Y., Liu, L.: FDI, employment, and economic growth of Beijing City: mechanism and empirical test 9(6), 2070–2084 (2019) 6. Bianchi, P., Deschamps, B.: The effectiveness of exchange-rate-based monetary policy: evidence from survey data. Appl. Econ. Lett. 3, 1–5 (2017) 7. Acharya, R.C.: Impact of trade on Canada’s employment, skill and wage structure. World Econ. 40(5), 849–882 (2017) 8. Bi, Z.: Does China-US trade have an impact on employment of the United States? Technol. Investment 08(03), 158–166 (2017) 9. Lichter, A., Peichl, A., Siegloch, S.: Exporting and labor demand: micro-level evidence from Germany. Can. J. Econ. 50(4), 1163–1189 (2017) 10. Liu, Y.: Job creation and destruction in Japan: evidence from division-level employment data. J. Asian Econ. 58, 59–71 (2018) 11. Bodenstein, M., Zhao, J.: Employment, wages and optimal monetary policy 112, 77–96 (2020) 12. Ajayi, A., Akano, R.O., Adams, S.O.: Impact of foreign direct investment on employment and unemployment rate in Nigeria: application of vector autoregression (VAR) models (1960–2014) 1–15 (2019)

Classification Rule Maintenance Method Based on Incremental Genetic Algorithm Tongfei Shang, Junfeng Geng, Jingwei Yang, and Jiaqing Zhao

Abstract Aiming at the shortcomings of the complexity of traditional classification rule maintenance methods, a classification rule maintenance method based on incremental genetic algorithm is proposed. The method proposed in this paper can adjust the relevant parameters of the classifier model, obtain the best classification rule set, and use incremental genetic operators to greatly improve the accuracy of rule classification maintenance. It has considerable flexibility and understandability. Finally, the performance of the proposed algorithm is tested by using the sample data set. The results of 8 simulations show that, compared with other literature methods, the method proposed in this paper greatly reduces the computational complexity and redundancy under the premise of higher classification accuracy and stability. Keywords Incremental · Genetic algorithm · Maintenance of classification rules

1 Introduction The best classification rule is used to predict the sample category, calculate the arrangement value of the gene in the test sample corresponding rule, determine whether each classification rule in the rule set meets the test sample, and classify the test sample in turn, if it meets the sample classification rule. The incremental genetic algorithm proposed in this paper can accumulate the fitness values of different types of rules. The total fitness value of a certain type is greater than the total fitness value of another type. The final test sample belongs to this category, which improves

T. Shang (B) · J. Geng College of Information and Communication, National University of Defense Technology, Xi’an, China J. Yang Troops, Chengdu 78111, China J. Zhao Troops, Beijing 32072, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_73

589

590

T. Shang et al.

the accuracy and accuracy of classification rule maintenance. Stability has great application value [1, 2].

2 Classification Rule Maintenance Based on Incremental Genetic Algorithm Incremental genetic algorithm generates the sample size relationship rules that meet the characteristic gene arrangement value corresponding to different categories, and the rule that meets the size relationship between different gene arrangement values of a sample category should try not to meet the size relationship of the corresponding gene arrangement value of another sample category, Find out all such rules, and then use these rules to generate a classifier to predict the classification rules of unknown samples [3, 4]. Based on the formation of a matrix of permutation values of a small number of characteristic genes, the number of bits in the binary rule is determined according to the dimension M of the matrix, corresponding to the corresponding rows of the permutation value matrix from top to bottom. In the rule, 1 indicates that the matrix corresponds to the row at the corresponding position of the binary rule and has a comparison with other rows, and 0 indicates that the row in the rule has no comparison [5, 6]. The basic idea is to classify the newly obtained samples with the obtained features. If the classification accuracy rate decreases, then from the population after the last genetic algorithm run, select incrementally excellent individuals according to the individual fitness as the initial the individual re-runs, and the remaining individuals in the initial population are randomly generated, as shown in Fig. 1. The main steps of the incremental genetic algorithm in this paper are: initialize the control parameters, such as the number of populations, thresholds, mutation probability, etc.; randomly generate the initial population G, calculate the fitness f of each individual in the population, and the average fitness of the population; use selection, The crossover and mutation operators generate offspring, and evaluate the new offspring, that is,

Initial population

Incremental competitive survival

Incremental population mutation

Individual 1 Individual 2 Individual 3

Parent 1 Parent 2

Individual n

Parent n

Fig. 1 Evolution process of incremental GA

Select randomly

Child 1

Child n

Classification Rule Maintenance Method Based on Incremental …

591

calculate the incremental fitness. If the newly obtained offspring is better than the parent, replace the parent with the offspring; otherwise, accept the offspring; judge the convergence condition, If the average fitness difference of adjacent generations is less than a certain threshold, the search is terminated, the results are sorted according to the fitness value, and the highest fitness value is selected as the optimal solution; the newly obtained sample is added to the original sample set, Use the obtained features to classify. If the classification accuracy rate does not decrease, the current feature is valid; when the classification accuracy rate decreases, select a certain amount according to the individual fitness from the population after the last genetic algorithm run. In this paper, the proportion of outstanding individuals as the initial individuals running the rule, the rest of the initial population is randomly generated [7, 8]. The maximum evolution algebra is adjusted to n 1 = n 0 ∗ (S1 /S0 ), where n0 is the original maximum evolution algebra, S 1 is the number of existing samples, and S 0 is the original number of samples. The program runs until one of the following conditions is met: the evolution algebra reaches the maximum given evolution algebra, or the maximum fitness is not less than the fitness of the original rule, and the maximum fitness does not change during the specified N generation of evolution [9, 10]. To  pc =  pm =

k1 ( f max − f c )/( f max − f c ), f c ≥ f k2 , f c < f k3 ( f max − f m )/( f max − f m ), f m ≥ f k4 , f m < f

(1)

3 Simulation Analysis Using the normal sample database of the engine on the Internet, because the classification of this database needs to rely on four important attributes, it has become the current verification database for multi-class classification. The database has a total of 3 types, 120 samples, and a total of 4 attributes. Three interference features are added to the samples to test the effectiveness of the algorithm in this paper. 90 and 120 samples are drawn respectively to form two sets of samples. Figure 2 shows the maintenance results of actual evolutionary classification rules. It is the graph of the fitness of the sample and the change of the feature with the optimization. The number of times the fitness and the feature changes with the optimization when expanding from 200 to 300 samples. It can be seen that, while ensuring that the original characteristics of the data set are found, the incremental genetic algorithm can greatly reduce the optimization algebra and obtain a better fitness value. Figure 2 is the actual evolution result of classification rules. It can be seen that the incremental genetic algorithm performs high-efficiency feature selection based on the original feature selection, the evolutionary process has

592

T. Shang et al.

Fig. 2 Actual evolution result

a higher adaptability starting point, the number of iterations is greatly reduced, and the interference of noise data is removed. Using the three features obtained above, the support vector two classifier is used for classification. The sample comes from the data of a certain type of engine from January 1, 2013 to March 1, 2014, and each sortie corresponds to a set of samples. Table 1 shows the classification results, where IGA is an incremental genetic algorithm, GA is a standard genetic algorithm, and SVM is a support vector two-classifier. It can be seen from Table1 that it is affected by interference parameters. The classification accuracy decreases after the sample reaches a certain limit by using only support vector machine. The classification performance of the feature set after genetic algorithm feature selection is improved, which shows that the feature selection greatly reduces the influence of interference factors and can improve the classification accuracy. Using the adaptive genetic algorithm proposed in this paper for feature selection, the number of features is further reduced, and the classification accuracy is greatly improved (Fig. 3). Table 1 Comparison of accuracy of classification with and without feature selection Method

Features

Classification accuracy when 500 sets of samples

Classification accuracy of 1000 sets of samples

Classification accuracy of 2000 sets of samples

Classification accuracy of 3000 sets of samples

SVM

9

85.35

85.16

84.55

84.34

GA + SVM

7

89.82

88.59

89.59

90.37

IGA

7

92.38

90.87

91.23

92.09

Classification Rule Maintenance Method Based on Incremental …

593

Fig. 3 Comparison of genetic algorithm and incremental genetic algorithm results

4 Conclusions Feature selection in different states is an important part of the maintenance of classification rules. In this paper, when the classification data is faulty feature selection, the database keeps increasing, and new samples affect the original selection accuracy. In this paper, an incremental genetic algorithm is adopted. When a new sample is added, it is not necessary to re-execute the feature optimization in the case of all samples. Instead, the feature selection of the new sample is performed by using the sample characteristics obtained in the previous time to ensure that excellent individuals are retained. Greatly reducing the time of feature selection. The experimental results show that this method can extract the optimal feature subset, remove redundant features, and effectively improve the efficiency of feature selection in classification rules.

References 1. Gayme, D.: Fault diagnosis in gas turbine engines using fuzzy logic. In: IEEE: International Conference on Systems, Man and Cybernetics, pp. 3756–3762. IEEE, USA (2015) 2. Naplitano, M.R.: Neural and Fuzzy reconstructors for the virtual flight data recorder. IEEE Trans. Aerosp. Electron. Syst. 35(1), 61–71 (2015) 3. Pistauer. M., Bernhardi-Grisson, R.: Neural network based design for a helicopter flight mechanic model used in a heterogeneous distributed workstation architecture. In: Proceedings of the 14th International Conference on Neural Information Processing, pp. 368–372. Fuzzy Systems, USA (2016) 4. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, pp. 66–172. Wiley, New York (2011) 5. Webb, A.R.: Statistical Pattern Recongnition, pp. 55–79. Wiley, New York (2012) 6. Jain A.K., Duin R.P.W., Mao, J.-C.: Statistical pattern recognition: a review. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 4–37 (2007) 7. McLachlan, G.J., Peel, D.: Finite Mixture Models, pp. 22–64. Wiley, New York (2009) 8. Bishop, C.M.: Neural Networks for Pattern Recognition, pp. 14–26. Oxford University Press, London (2015)

594

T. Shang et al.

9. Scholkopf, B., Smola, A.J.: Learning with Kernels. Support Vector Machines, Regualrization, Optimization and Beyond, pp. 77–98. MIT Press, Cambridge (2012) 10. Han, J., Kamber, M.: Data Mining: Concepts and Techniques, pp. 121–154. Academic Press, San Francisco (2011)

Support Vector Regression Prediction Method of Text Data Based on Correlation Analysis Jianfeng Ma, Tongfei Shang, Jingwei Yang, and Jiaqing Zhao

Abstract Correlation analysis is an important research content of text data prediction. Experiments have found that there are continuous distribution, delay mutation and mutation amplitude distribution characteristics in sequence delay correlation analysis. It is proved that when the amount of text data is large, support vector regression is used. The prediction method can achieve smaller errors and even solve the problem of delay mutation. According to experimental phenomena, the proposed method can overcome the shortcomings of existing algorithms and effectively handle most of the delay mutations in the process of text data prediction. A large number of experiments have proved that this paper can achieve better performance than existing methods. Keywords Correlation analysis · Text data · Support vector machine

1 Introduction As an important machine learning method, text data prediction has been widely studied and applied. It trains a classification model based on labeled data samples, and then uses the classification model to predict the type of new data samples. In order to ensure the accuracy and high reliability of the training classification model, the training samples used for learning and the new test samples meet the condition of independent and identical distribution, and there must be enough available training samples to learn a good classification model. The correlation analysis method of text

J. Ma · T. Shang (B) College of Information and Communication, National University of Defense Technology, Xi’an, China J. Yang Troops, Chengdu 78111, China J. Zhao Troops, Beijing 32072, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_74

595

596

J. Ma et al.

data proposed in this paper can predict the delayed sudden change of data well and has great practical value [1, 2].

2 Text Data Prediction Text data prediction is to use support vector regression to predict data and use correlation analysis methods to predict the future text data classification status. After obtaining the predicted value of the text data classification, this paper mainly uses the support vector machine regression prediction method based on correlation analysis to predict the text data [3, 4]. The text data prediction uses the correlation analysis method to predict the future status of the text data based on the future predicted value of the data. The prediction parameter setting refers to the setting of the prediction time and the prediction confidence. Setting the forecast time means entering the future time point you want to forecast. The default forecast time is one hour in the future. Generally, the forecast time should not be too far away from the current time, otherwise the forecast accuracy will be low. The prediction confidence is 90% by default, which is used to solve the upper and lower limits of the 90% confidence interval of the prediction curve. Predictive text data display is to display the predicted value of text data at that time point according to the set forecast time. The prediction result display is based on the text data classification obtained by the prediction, and the text data type predicted at the specified future time point is predicted [5, 6].

3 Support Vector Regression Prediction Given a feature vector x of a data sample, it is required to predict the data sample category y. The feature vector x and its category x, y), ( −→ y constitute  −→ a sample  vector − → (1) (1) (2) (2) (i) (i) and these data samples are represented as x , y , x ,y ,…, x , y ,…, −−→  x(686) , y (686) [7, 8], where i represents the serial number of the data sample vector (X, y). All data sample vectors are arranged in rows to form a data set matrix (Fig. 1). → − → w T− x +b=0

(1)

T →  T  → x = x1 x2 . among them, − w = w1 w2 , − → → → x +b, Enter the feature vector − x of the point, substitute it into the expression − w T−  − − → → and judge sign w T x + b > 0 ⇒ y = +1. →T −  sign − w → x + b < 0 ⇒ y = −1

(2)

Support Vector Regression Prediction Method of Text Data Based …

(a) Two-class support vector machine sample

597

(b) Two-class support vector machine interface

Fig. 1 Two-class support vector machine sample and interface

  →T − If sign − w → x + b = 0, it means that the point just falls on the dividing line, and the category of the point cannot be judged [9, 10]. Regardless of the point just falling on the decomposition surface, no matter which category the point belongs to, as long as it is correctly classified, it should satisfy:   →T − x +b >0 y· − w →

(3)

T  → For a certain point − x = x1 x2 , suppose the distance between the point and the → → x + b = 0 is (need − to solve), and the normal vector of the interface is interface − w T− → − → → w w , so the unit normal vector is − , so the vector − qx corresponding to the vertical → w − → → w line is γ − (pointing to the data point − x from the vertical foot q). → w According to the triangle rule of the vector: − → − → → Oq = Ox − − qx

(4)

− → Therefore, the expression of the vector Oq is: − → w − → →  Oq = − x − γ − → w

(5)

→ → The binding point q falls on the interface − w T− x + b = 0, and get:

− → w − →  +b=0 w x − γ − → w T

→ The distance γ between the solution point − x and the interface is:

(6)

598

J. Ma et al.

− → → w T− x + b  γ = − → w

(7)

If it is hoped that all points are classified correctly and the distance between the point and the interface is as large as possible, the following optimization goals are introduced: ⎧ ⎞⎫ ⎛ −→ − → ⎬ ⎨ T (n) x + b w ⎠  arg max min⎝ y (n) − (8) → w,b ⎩ n ⎭ w After introducing the KKT condition, a new optimization goal is obtained: max W (α) = α

l 

 → − 1  yi y j K − xi , → x j αi α j 2 i=1 i=1 l

αi −

i=1

l

(9)

And constraints: s.t.0 ≤ αi , ∀i = 1, 2, ..., l l 

yi αi = 0

(10)

(11)

i=1

In the formula, {α1 ,α2 ,…,αl } are Lagrange multipliers. If the data set is not 100% linearly separable, then slack variables need to be introduced to allow a small number of samples to be misclassified. At this time, the constraints become: s.t.0 ≤ αi ≤ C, ∀i = 1, 2, ..., l l 

yi αi = 0

(12)

(13)

i=1

where C is the trade-off parameter.

4 Simulation Analysis Use Matlab database to evaluate the standard data set of text data classification, including about 5000 documents, divide these documents into 10 sub-categories, and each sub-category contains almost the same number of documents. Since some

Support Vector Regression Prediction Method of Text Data Based …

599

6000 5000 4000 FNN Prediction SVM Prediction

3000 2000 1000 0

0

1000

2000

3000

4000

5000

6000

7000

8000

9000 10000

Fig. 2 Comparison of text data prediction between SVM and FNN

topics are relatively similar and can be composed of some major categories, this article selects 4 major categories of this data set as the experimental data of this article, so the data set contains a two-layer structure, and each major category has a corresponding 4 small class. Two types of data are randomly selected from the three categories to predict the text data classification problem. This paper constructs two types of problems as follows. Taking data sets A and B as examples, select one sub-category from each category 1 and category 2. Form the source domain data, and also select one of the two major categories to form the target domain data. Note that the document sets of the source domain data and the target domain data do not intersect. Figure 2 shows the comparison of text data prediction between SVM and Fuzzy Neural Network (FNN). The distribution of text data and target field data is different because they come from different subcategories, that is, different topics. The source field data and target field data are related because they come from the same category. Through this construction method, each data set can construct 64 two-category classification problems, 4 data sets a total of 288 classification problems. Figure 3 shows the prediction result.

5 Conclusions The paper proposes the application of support vector regression prediction to solve the problem of text data classification. Aiming at the limitation of the support vector machine itself only supporting two classifications, the multi-classification strategy is used to solve the multi-classification problem, the advantages and disadvantages

600

J. Ma et al.

Prediction curve

40 30 20 10 0

0

20

40

60

80

100

120

140

160

180

0

20

40

60

80

100

120

140

160

180

Error curve

15 10 5 0 -5 -10

Fig. 3 Result of prediction and error curve

of the typical multi-classification strategy are analyzed, and the improved text is proposed. Data prediction method. Finally, the fuzzy neural network is compared with the method in this paper. The simulation results show that the correct rate of support vector regression is higher than that of the fuzzy neural network method, which proves the effectiveness of the method proposed in this chapter.

References 1. Bagnall, A. et al.: The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances. Data Min. Knowl. Discov. 31(3), 606–660 (2017) 2. Esling, P., Agon, C.: Time-series data mining. ACM Comput. Surv. (CSUR) 45(1), 12 (2012) 3. Wilson, S.J.: Data representation for time series data mining: time domain approaches. Wiley Interdisc. Rev. Comput. Stat. 9(1), e1392 (2017) 4. Chan, K.P., Fu, A.W.C., Yu, C.: Haar wavelets for efficient similarity search of time-series: With and without time warping. IEEE Trans. Knowl. Data Eng. 15(3), 686–705 (2003) 5. Popivanov, I., Miller, R.J.: Similarity search over time-series data using wavelets. Proc. 18th Int. Conf. Data Eng. IEEE 212–221 (2002) 6. Ryan, D.: High performance discovery in time series: techniques and case studies. Springer Science & Business Media (2013) 7. Keogh, E., Chakrabarti, K., Pazzani, M., et al.: Locally adaptive dimensionality reduction for indexing large time series databases. ACM Sigmod Record 30(2), 151–162 (2001) 8. Chen, Q., Chen, L., Lian, X., et al.: Indexable PLA for efficient similarity search. In: Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB Endowment, pp. 435– 446 (2007)

Support Vector Regression Prediction Method of Text Data Based …

601

9. Li, H., Guo, C.: Piecewise cloud approximation for time series mining. Knowl. Based Syst. 24(4), 492–500 (2011) 10. Horst, B., Abraham, K.: Data mining in time series databases. World Sci. (2004)

Is Virtual Currency a Standard Financial Bubble? Blockchain Industry Research Qian Wang

Abstract Blockchain is an innovative application model. Blockchain technology is considered to be a disruptive innovation in computing mode after the mainframe, personal computer and the Internet. Catalyzed by multiple forces and factors, blockchain may have begun a period of rapid development. Hence, the rapid development of blockchain isn’t about everything. It’s about opportunities and risks, impetus and obstacles. In particular, it lacks mature applications outside the financial field, which is a reality of blockchain. More importantly, a series of recent security incidents have shown that blockchain technology is still facing security risks. It’s not technology, It’s blindness and conformity. There is no actual use value, the actual total amount is unlimited and uncontrolled. All the determinants of the price do not come from supply and demand, nor from government regulations, but only from the next investor’s virtual currency. In the long run, it may become the next classic financial bubble. Keywords Blockchain industry · Virtual currency · Financial bubble

1 Introduction Blockchain is an innovative application model of distributed data storage, point-topoint transmission, consensus mechanism, encryption algorithm and other computer technologies in the Internet era. Blockchain technology is considered to be a disruptive innovation in computing mode after the mainframe, personal computer and the Internet. It is likely to trigger new technological innovations and industrial changes around the world. So far, the application of blockchain has been extended to the Internet of Things, intelligent manufacturing, supply chain management, digital asset trading and other fields.

Q. Wang (B) School of Economics, Shanghai University, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_75

603

604

Q. Wang

Blockchain technology and its application in China has attracted extensive attention from many industries recently. In the meantime, a continuous upsurge of discussion has been stirred up by the media. Generally speaking, under the catalysis of many forces and factors, blockchain may have begun a period of rapid development. More importantly, we must clearly see the blockchain technology as a technology derived from the application of Bitcoin. Whether it is mature and usable requires investment in research, development and application practices of new technologies [1]. Hence, the rapid development of blockchain isn’t about everything. It’s about opportunities and risks, impetus and obstacles. In particular, it lacks mature applications outside the financial field, which is a reality of blockchain. More importantly, a series of recent security incidents have shown that blockchain technology is still facing security risks and challenges.

2 Blockchain 2.1 Origin and Development of Blockchain The rapid development of the Internet in the second half of the last century has made people more mature on the road of information interconnection exploration. An email can travel around the world in a flash, and a beautiful landscape photo can soon be shared with the world. It can be seen that since the development of the Internet, the birth of every new technology has profoundly changed people’s lifestyles. Nowadays, a rising new technology, blockchain, has come to the forefront of history. It allows any Bitcoin asset transaction in the world to be successfully confirmed in a short period of time [2]. Not only the interconnection of information, but also the interconnection of value is realized by blockchain technology, which makes more and more people pay attention to blockchain technology, understand its principles and apply it in practice. Internationally, more than 24 countries have invested in blockchain technology. 80% of the banks have started blockchain projects. More than 90 central banks have joined the blockchain discussion. Hundreds of companies have joined the blockchain alliance. In the past three years, the risk investment of blockchain has exceeded 1.4 billion U.S. dollars, and 2500+ blockchain-related patents have been generated. In China, at the end of 2016, “blockchain” was first written into the “13th FiveYear” National Informatization Plan. There are 105 blockchain-related companies in China; In June 2017, the 13th Five-Year Plan for the Development of Information Technology in China’s Financial Industry pointed out that the central bank will promote the development of new technologies, such as blockchain and AI.

Is Virtual Currency a Standard Financial Bubble? Blockchain …

605

2.2 Introduction to Blockchain Blockchain is a recombination of past technologies and the climax of information technology innovation at this stage [3]. From the perspective of information technology innovation, the Internet was first born in the 1970s and 1980s, which is the first layer of our current network architecture. Since 1990, Tim Berners Lee and others have promoted the development of the World Wide Web. Development has made the transmission and sharing of information possible; in 1999, the formation of Salesforce.com marked that the information technology innovation has entered the third stage, the era of cloud computing; at the beginning of the twenty-first century, with the popularization of smart devices and the reduction of bandwidth costs, We began to experience the convenience of the Internet of Things. Based on technologies such as cryptographic distributed storage, it is about to create the fifth climax of information technology innovation. Speaking of blockchain, firstly, let’s explain the types of databases. Currently, databases are mainly presented in three forms: central, decentralized, and distributed. In a central system, all data is stored on one computer and managed Convenient but easy to be destroyed and low information transparency, similar to the traditional IDC computer room. As a kind of distributed ledger, blockchain has the characteristics of both decentralization and interlocking. In the decentralized system, there is no central storage, and there are multiple small central servers to provide services to users, with strong scalability, similar to the CDN in the cloud computing era; in the distributed system, each node stores the same data, and real-time update is characterized by all nodes, having equal rights, the higher security of the entire distributed system with the more nodes. Blockchain sorts and verifies transactions in the form of blocks, and protects them from tampering. The computer network saves and verifies the consensus records of transactions through encrypted audit trails [4]. Some or all nodes are validated against an agreed algorithm. The proposed transaction will be executed under appropriate circumstances. These transactions are then encrypted and stored in related blocks of nodes to form an audit trail. Since the technology runs on the participant’s node and can provide the required security, there is no need to set up an intermediary between the parties to the transaction, and there is no need for trust verification between points. In the case of effective execution, the blockchain has the advantages of fast, confidential, reliable and low-cost. The core of blockchain is the consensus of the participants. Consensus is key because in the absence of central authority. Participants must agree on the rules and how to apply them; and agree to use these rules to accept and record proposed transactions. Once a transaction is created and published, it is signed with the transaction initiator’s signature, which means that it is authorized to pay money, enter into a contract, or transmit data related to the transaction. After the transaction is signed, it takes effect and contains all the information needed for execution.

606

Q. Wang

The transaction is sent to a node in the blockchain network, which validates the transaction against a preset standard. Invalid transactions are discarded and valid transactions are transferred to three or four associated nodes that further validate the transaction and transfer the transaction to its peers until it reaches all nodes in the network. Sprawling method ensures that valid transactions reach all nodes in the network within seconds [5]. As long as the sender uses more than one node to ensure transaction propagation, it does not need to trust the node used to propagate the transaction. The receiver does not need to trust the sender because the transaction is signed and does not contain any confidential information or certificates. Once the transaction is validated and included in the block, the transaction is propagated throughout the network. When the whole network has reached an agreement and other nodes in the network accept the new block, the block will be incorporated into the blockchain. Once recorded by the blockchain and recognized by enough nodes, the transaction becomes a permanent part of the public ledger, and all nodes in the blockchain network are deemed valid. In a narrow sense, the blockchain industry is an industrial chain that includes mining machine manufacturers, mining institutions, blockchain institutions, virtual currency trading places and parties [6]. Broadly speaking, the blockchain industry is a complete industrial chain that includes industry applications on the basis of chivalry.

3 Virtual Currency 3.1 Definition and Types of Virtual Currency Virtual currency refers to non-real currency. Famous virtual currencies such as Baidu Coin of Baidu Inc., Q coin of Tencent Co., LTD., Q points, Points coupon of Shanda Co., LTD., and Sina Weicoins (for micro games, Sina reading, etc.), Chivalrous Ingot (used in Chivalrous Dao games), silver pattern (used in Bi Xue Qingtian game). There are hundreds of digital currencies in circulation around the world. Legends of “bit gold, lite silver, infinite copper, and penny aluminum” are popular in the circle. In 2014, the European Banking Authority (European Banking Authority) gave the latest definition of virtual currency, that is, “Virtual currency is a digital expression of value. It is not issued by a central bank or a public authority, nor is it necessarily Linked to a certain legal currency, but accepted by natural or legal persons as a means of payment, it can be electronically transferred, stored or traded”. According to this definition, digital currency and various other “coins” in the online world can be included in the category of virtual currency, and can be divided into two categories. One is decentralized virtual currency (encrypted digital currency) such as Bitcoin. Its main characteristics: First, in terms of issuance, there is no centralized institution (such as a central bank or private institution) to control and manage the issuance of virtual currency, nor is it the liability of any institution; the

Is Virtual Currency a Standard Financial Bubble? Blockchain …

607

second is that it can be exchanged with legal currency in both directions and can be used for Purchase certain goods and services; the third is to use the blockchain technology with encryption algorithm as the core, so that people who do not know each other can establish a trust mechanism on the network, and make direct peerto-peer transactions possible. The other is the centralized virtual currency such as Q currency [7]. Its main characteristics are: one is that it is issued and managed by a private institution; the other is that it can be obtained through fiat currency purchases or spending time to earn, but it cannot be virtual Currency is converted into legal tender; third, virtual currency is restricted to be used on specific platforms. It can generally only be used to exchange virtual goods and services provided by the publisher, and its value depends entirely on the publisher’s wishes.

3.2 Virtual Currency-Bitcoin Bitcoin is a peer-to-peer digital currency. Unlike ordinary currencies, bitcoin does not depend on the issuance of a specific currency institution. It is generated by a large number of computations based on a particular algorithm. All transactions are confirmed and recorded through the blockchain in the network. People call “the process of using computer hardware resources to calculate the location of bitcoins (that is, the SHA256 hash value) and obtain bitcoins” as “bitcoin mining”. The Bitcoin system is equivalent to a large decentralized ledger. Initially, every bookkeeping rewards 50 Bitcoins, and every 210,000 pages of accounts. The bookkeeping bonus will be cut in half. Until around 2140, Bitcoin will be After the issuance, the total amount is 21 million. Each block is a page in this ledger. New Bitcoin issuance process: Every 10 min, all miners calculate a question together, and the miner who calculates the answer first gets the right to keep a page of accounts. After the accounts are completed, he will get a certain amount of Bitcoins, and add Bitcoins carry out [8]. The underlying blockchain technology of the Bitcoin system has great value in extensive applications. The Bitcoin system includes three layers: the underlying technology-blockchain, which refers to a decentralized and distributed record of open and transparent transaction records, and transaction data is shared by nodes across the network. Miners are responsible for recording and the entire network is supervised; the middle-level link—protocol, that is, the blockchain-based fund transfer system; the upper-level—currency, which refers to Bitcoin. At present, many financial institutions are paying more attention to the blockchain technology behind Bitcoin.

608

Q. Wang

3.3 A Standard Financial Bubble From the tulip bubble in the Netherlands in the seventeenth century, the South China Sea stock bubble in the United Kingdom in the eighteenth century and the Mississippi bubble in France, the rubber bubble in the Qing Dynasty in the 1910s, the beautiful 50 bubble in the U.S. stock market in the 1970s, the big bubble in Taiwan stocks at the end of 1980, the big bubble in the Japanese stock market during the same period, 1989 Japan’s real estate bubble in 2000, the US technology stock bubble in 2000, the A-share bubble in 2007, the US/global derivatives bubble in 2008, and the A-share GEM bubble in 2015. Humans’ perception of financial markets has always been flawed and biased, And the financial bubble has never been far away [9]. After these financial bubbles fade, what is often left is a mess. Now, the virtual currency bubble led by Bitcoin, dressed in the unique high-tech cloak of this era, has once again entered our lives. Although with various terms such as algorithms, computer technology, and blockchain, virtual currency seems to be a very tall thing, but when we analyze the essence carefully, we will find that the hot virtual currency, In fact, it is a complete financial bubble.

3.4 It’s not Technology, It’s Blindness and Conformity According to a report from Shanghai Securities, 60–90% of the trading volume of Bitcoin, the most important virtual currency, comes from China, while the number of virtual currencies held by Chinese investors is only about 10% of the global level [10]. This means that when Chinese investors think that the popular virtual currency may represent the world’s latest technological trend and the most revolutionary payment method, what it really represents may only be the blind investment and herd mentality of Chinese investors. The price of virtual currency can only be reflected in one way, that is, the price that the next taker is willing to offer. The financial phenomenon where the price is completely determined by the bid of the next taker can be clearly described in two words: bubble. Those things whose price basis is determined by the price that the next taker is willing to offer. Once the drumming is over and no investors take over, they will return to their roots and even become worthless (if it is actually If it’s not worth a dollar). In other words, after the tulip bubble bursts, investors will only have a pot of flowers; after the stock market bubble bursts, investors will be left with only a fraction of the original price of the company’s equity (if there is no liquidation due to leveraged trading) After the real estate bubble bursts, investors will be left with a pile of concrete houses; and once the virtual currency bubble bursts, investors will only be left with a large piece of code. The difference is that the flowers can still smell, the company

Is Virtual Currency a Standard Financial Bubble? Blockchain …

609

can continue to operate (if it is not bankrupt), the house can still live in, and a large piece of code can do nothing except occupy storage space [11]. There is no actual use value, the actual total amount is unlimited and uncontrolled. All the determinants of the price do not come from supply and demand, nor from government regulations, but only from the next investor’s virtual currency. In the long run, it may become the next classic financial bubble.

References 1. Chen, C., Yi, Z., Xiaojing, N., Yi, Y.: Themes and prospects of foreign blockchain research. Electron. Govern. Aff. 6(2), 31–33 (2018). (in Chinese) 2. Nawari, N.O., Ravindran, S.: Blockchain and the built environment: potentials and limitations. J. Build. Eng. 25(5), 58–60 (2019) 3. Li, Xu.: The commercial application and accounting impact of blockchain distributed accounting technology. Wuhan Financ. 10(1), 65–66 (2017). (in Chinese) 4. Liu Sen, Hu., Yanan, Y.D., et al.: Research on application of blockchain-based supply chain finance. Market Modernization 5(2), 40–41 (2019). (in Chinese) 5. Zhouguo, H., Huan, L.: Development status and characteristic application research of blockchain technology. Sci. Technol. Innov. Appl. 30(2), 18–20 (2019). (in Chinese) 6. Sheping, Z., Hongyu, D., et al.: Blockchain technology: applications and problems. J. Xi’an Univ. Posts Telecommun. 01(1), 1–13 (2018). (in Chinese) 7. Junqi, W., Shiyuan, X.: Research on the risk and supervision of blockchain finance application. New Financ. 05(3), 45–48 (2018). (in Chinese) 8. Yuan, Z.: Research on the impact of blockchain technology on the development of China’s financial industry. Int. Financ. 5(5), 41–45 (2016). (in Chinese) 9. Honghan, Li., Cunhua, W.: Blockchain empowers supply chain finance. China Financ. 23(6), 121–124 (2019). (in Chinese) 10. Sijie, C., Haoran, W., Zheng, Y., et al.: Blockchain value speculation: application direction and boundary. Proc. Chin. Soc. Electr. Eng. 40(7), 2123–2132 (2020). (in Chinese) 11. Yunchun, C., Haonan, L., Tong, Li.: Risk changes and prevention measures under the innovation and development of supply chain finance. South. Financ. 4(2), 1–9 (2020). (in Chinese)

Application of Air Traffic Control Communication, Navigation and Surveillance Equipment in the Aviation Field Based on Data Analysis Tao Shu Abstract Communication, navigation and surveillance equipment is the core of airspace management and command aircraft. Whether its management is efficient and reasonable has a direct impact on aviation safety and passenger safety. Any error in any link may have disastrous consequences. In recent years, China’s civil aviation industry has developed rapidly, and the pressure of air traffic management has continued to increase with the increase in the number of flights. Problems such as incomplete implementation can no longer meet the needs of the current development of air traffic control equipment management. Based on this, combined with the current status of civil aviation control equipment operation, this paper proposes the application research of air traffic control communication navigation surveillance equipment based on data analysis. This paper analyzes the air traffic control system, uses object-oriented thinking to design the system, and finally realizes the data-based air traffic control communication and navigation construction system. Finally, the performance and function test results of the system show that the air traffic control communication navigation surveillance system based on data analysis has achieved rapid processing capabilities such as the collection and integration of air traffic control equipment data, analysis of data, and risk prediction. Keywords Data analysis · Communication navigation · Air traffic control equipment · Surveillance system

1 Introduction In recent years, information technology has promoted the rapid development of aviation industry, air traffic control flow [1] is increasing rapidly, but the equipment operation means is still at the original level, and the unified management of equipment information and fault statistics are not realized, which makes the information lag a lot and the data processing is not timely and accurate. Due to the progress T. Shu (B) Civil Aviation Flight, University of China, Guanghan 618307, Sichuan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_76

611

612

T. Shu

of the Internet and the expansion of aviation business, the demand for equipment operation and maintenance informatization in aviation field is becoming more and more urgent. Information management is gradually becoming an important auxiliary means of modern enterprise management. The data analysis of the communication and navigation system will play an irreplaceable role in supporting the operation mechanism of various information modules, and integrate many factors together to establish an air traffic control equipment maintenance and management information system to accelerate the information flow, supervise the on duty process, coordinate spare parts management and implement rules and regulations [2]. In order to achieve comprehensive, timely and accurate management of the system, this paper provides an application platform for the scientific and standardized operation of air traffic control system. After recent years of development, information and communication technology has achieved rapid development and air traffic control systems are constantly being updated. However, relative to the advanced nature of the air traffic control system, the information management of the air traffic control system is relatively backward. At present, there are many types of equipment, similar equipment configurations in various places, and many equipment support personnel. Most of them have not realized the information management of electronic duty [3], equipment management [4] and other businesses. Therefore, it is necessary to establish a scientific and reasonable model through technologies such as database and database, and develop a management system based on the model as a carrier. It is as small as whether an inspection is timely, to whether the maintenance of important equipment has a clear process and complete records. To supervise, in this way can the management be refined and efficient to the greatest extent, and the system can be truly implemented in the work. This will effectively improve the efficiency of air traffic control, reduce the probability of accidents, and help aviation safety. The air traffic control bureau’s communication navigation and surveillance system [5–7] will be positioned in the management, business, and operation support system of a certain area of the air traffic control system. It will increase the integration of resources through the effective connection of various operating mechanisms [8], Information sharing efforts to build a vertical business support system for the equipment guarantee system that is integrated and unimpeded among various communication and navigation data analysis systems in the aviation field. Based on this, this article will research the application of air traffic control communication, navigation and surveillance equipment based on data analysis. In the research, a comprehensive analysis and design of the air traffic control, communication, navigation and surveillance system is carried out. In the performance test and analysis of the system, the air traffic control communication navigation surveillance system based on data analysis has achieved rapid processing capabilities such as the collection and integration of air traffic control equipment data, analysis of mining evidence [9], and risk prediction [10]. Effectively solve the defects of improper data processing and have sufficient data processing and storage capabilities.

Application of Air Traffic Control Communication, Navigation …

613

2 Analysis of the Application of Data in Air Traffic Control Equipment Data At present, most of the statistics of air traffic control equipment use sampling analysis based on small data. The database is also limited to the traditional relational database. It was built mainly to process permanent and stable data, but with the derivation of data, it is far from being able to meet the demand. Various statistical methods have caused the inconsistency of data sources, and relevant personnel have to spend a lot of time to check, resulting in poor data classification, poor visibility, and insufficient usability. The construction of air traffic control network is complex system engineering. The planning and development of air traffic control network must be consistent with the structure and layout of air traffic control, and must be coordinated with the development of air traffic control technology. Therefore, the overall consistency of the air traffic control network is a necessary prerequisite for the continuous development of the network. The so-called overall consistency is to build a unified air traffic control communication network system that is in line with international standards and is compatible with the future navigation system of the International Civil Aviation Organization. The original polynomial of the system’s protocol and service is: P(x) = (x 8 + x 7 + x 2 + x + 1)

(1)

In the formula, x is the data stream, P(x) is the polynomial expression, n is the size of the data in the data stream, and α is the custom coefficient. The generator polynomial and capacity can be expressed as: p(x) =

n 

(x − α i )

(2)

i=1

C=

Sending length(bit/s) 1992(bit/s)

(3)

Of course, the overall consistency cannot be simply understood as the consistency of network equipment types. More importantly, it is necessary to construct a unified software environment, formulate a unified interface standard, adopt a unified network procedure, and specify a unified data transmission format to enable air traffic control across the country. Information runs in a jointly shared network environment to maintain the consistency of data and the smooth flow of information to ensure the continuity and efficiency of air traffic control.

614

T. Shu

3 Experimental Thinking and Design 3.1 Experimental Ideas Database design is an indispensable part of system design. The quality of data table design directly affects the stability and scalability of the system, and it occupies a very important position in system development. Database design is mainly divided into three aspects: conceptual design, logical design and physical design. Conceptual design is mainly to abstract the data, and then divide the attributes of these abstract objects. This article mainly designs the data processing module of the communication navigation system in detail.

3.2 Experimental Design The air traffic control bureau’s communication navigation and surveillance system will be positioned in the management, business, and operation support system of the equipment support system in a certain area of the air traffic control system. Through the effective connection of various operating mechanisms, it will increase the integration of resources and information sharing to build communications in the aviation field. A vertical business support system for a seamless, unimpeded equipment guarantee system between navigation surveillance equipment. The purpose of this study is to explore the application of ATC communication navigation surveillance equipment in aviation field based on data analysis. Taking the ATC communication and navigation equipment based on data analysis as the experimental group and the traditional relational database as the control group, a simple scale was used to evaluate the data processing ability of the two groups. The indicators included equipment management, fault management, notification management, plan management and statistical reports. In the score, 10 points is the upper limit. The higher the score, the better the index processing. As the database design is an integral part of the system design, the quality of the data table design directly affects the stability and scalability of the system. This paper mainly designs the functional modules of the experimental group system in detail, and the index information of each module is shown in Table 1. Table1 The indicators of each module of the air traffic control communication navigation surveillance system Module number

System number

Type of data

BMBH

001

varChar (20)

SSBM

002

int (8)

XTBH

003

char (3)

Application of Air Traffic Control Communication, Navigation …

615

4 Discussion 4.1 Application Research of Air Traffic Control Communication Navigation Surveillance Equipment Based on Data Analysis The data analysis of the communication navigation system will greatly promote the various operating mechanisms of the air traffic control system, integrate many factors together, and establish an air traffic control equipment maintenance management information system that accelerates the flow of information, supervises the duty process, integrates the management of the preparations, and implements the rules and regulations. Of course, the overall consistency cannot be simply understood as the consistency of network equipment types. More importantly, it is necessary to construct a unified software environment, formulate a unified interface standard, adopt a unified network procedure, and specify a unified data transmission format to enable air traffic control across the country. Information is transported in a common network environment to maintain the consistency of data and the smooth flow of information to ensure the continuity and efficiency of air traffic control. The self-learning ability is divided into: equipment management, fault management, notification management, plan management and statistical reports. It can be seen from Fig. 1 that compared with the control group, the equipment management ability, plan management ability and fault management ability scores of the experimental group are higher than those of the control group; while the control group’s various ability scores are significantly lower than the experimental group. The data analysis of the experimental group’s information system integrates many Comparison of data management capabilities Statistical report Plan management Notification management Fault management Equipment management 0

2

4

6

8

10

Score Control group

Test group

Fig. 1 Comparison of data management ability between experimental group and control group

616

T. Shu

Comparison of fault type distribution 45 40

Rate(%)

35 30 25 20 15 10 5 0 radar

navigation

communications

Test group

Auxiliary

transmission

Control group

Fig. 2 The distribution of failure types in the experimental group and the control group

factors together to establish an air traffic control equipment maintenance management information system with rapid data circulation and unified component management. According to the comparative analysis of the distribution of the two groups of fault types, it can be seen from Fig. 2 that the two groups have the same fault types, but the proportions of each part are very different. For the failure of the equipment management module, due to periodic maintenance, the maintenance plan needs to be issued in advance, which reduces the arbitrariness of implementing important maintenance and also reduces the risk caused by this arbitrariness. In addition, if the equipment failure is not resolved, the failure information will always be displayed in the system, which is not conducive to the transmission and processing of information, and the air traffic control communication navigation surveillance equipment based on data analysis can effectively reduce or transfer the occurrence of failures.

4.2 Design Principles of Air Traffic Control Communication Navigation and Surveillance System On the premise of comprehensively considering the characteristics, specific needs, planning goals, and application environment of the air traffic control equipment maintenance management information system, this system will strictly follow the following principles: (1)

The principle of practicality. In the development process, as long as the principle of demand-based is followed, the realization of the system functions should be sufficient and necessary.

Application of Air Traffic Control Communication, Navigation …

(2) (3)

(4)

(5)

(6)

617

The principle of safety. According to performance requirements, system safety design is considered from both internal and external aspects. Standard principle. All designs in the system follow the existing national standards and industry standards. If there are inconsistencies between the national standards and the industry standards, the higher standards shall prevail, and the standardization and uniformity of code writing will create conditions. The principle of economy. The system should reduce the pressure of data calculation and transmission on the premise of meeting the demand, and consider reducing the follow-up operation and maintenance as much as possible. The principle of reliability. The system should have strong reliability. When the network environment is unstable or interrupted, the system needs to have corresponding timely processing measures. The principle of ease of use. Air traffic control equipment maintenance management information system faces a wide range of users, including some older and less experienced computer users, as well as some temporary workers stationed in foreign stations with low education level. Therefore, the usability of the system is very important. Must enable the user as long as has the basic computer and the network use experience to be able to start easily. The division of functional areas should be reasonable and easy to use. All kinds of options and buttons should be clearly defined, easy to understand and intuitively reflect their functions.

Should support data manual backup and regular automatic backup functions, should choose to only backup and restore part of the required data, and support data backup encryption. Data recovery should be thorough and reliable. It is necessary to minimize the impact and loss caused by data loss or damage.

4.3 Recommendations for Air Traffic Control Communication Navigation and Surveillance Equipment Based on Data Analysis 1.

Correctly handle the relationship between safety and efficiency

Safety is the eternal theme of aviation work, but the common goal pursued by the air traffic control industry in the world today is “safety ten benefits”. Air traffic control communication network, as an important facility of air traffic control, without security means that there is no soul to ignore benefits, and security is also difficult to be sustained. The two are dialectically unified. To correctly handle the relationship between safety and efficiency in the management and operation of the air traffic control communication network, we should get out of the two misunderstandings that only pay attention to efficiency and communication equipment.

618

2.

T. Shu

The overall consistency and local advancement of network planning

At present, the unbalanced development of my country’s air transport industry determines that my country will adopt different air traffic control methods in different regions and different development stages. The construction of air traffic control network is a complex system project. The planning and development of air traffic control network must be consistent with the structure and layout of air traffic control, and must be coordinated with the development of air traffic control technology. Therefore, the overall consistency of the air traffic control network is a necessary prerequisite for the continuous development of the network. The so-called overall consistency is to build a unified air traffic control communication network system that is in line with international standards and is compatible with the future ICAO navigation system. Of course, the overall consistency cannot be simply understood as the consistency of network equipment types. More importantly, it is necessary to construct a unified software environment, formulate a unified interface standard, adopt a unified network procedure, and specify a unified data transmission format to enable air traffic control across the country. Information runs in the network environment of Huitong to maintain the consistency of data and the smooth flow of information to ensure the continuity and efficiency of air traffic control. There are many business subsystems in the aviation field, the data structure is complex, the basic data collection is difficult, the analysis and collation have many clues, and the risk prediction method is single. The application of air traffic control in the field of communication and navigation is not only the adjustment of the organization, but more importantly the change of the management philosophy of managers at all levels. The development of the air traffic control communication network is also subject to the management philosophy of the managers.

5 Conclusions In the research of air traffic control communication and navigation system, this paper uses the experimental group of air traffic control communication and navigation equipment based on data analysis and takes the traditional relational database as the control group to carry out the application research. The simple scale is used to evaluate the data processing ability of the two groups. In the comparative analysis, the experimental group can effectively improve the ATC operation efficiency, reduce the probability of accidents, and contribute to aviation security. The application of the communication, navigation and surveillance system of the air traffic control bureau will be positioned in the management, business and operation support system of the equipment support system in a certain area of the air traffic control system. It can make the effective connection of various operation mechanisms, increase the efforts of resource integration and information sharing, and build a vertical business support system of the equipment support system with smooth and unimpeded continuity.

Application of Air Traffic Control Communication, Navigation …

619

References 1. Wilson, G.V., Rigby, J.R., Ursic, M., Dabney, S.M.: Soil pipe flow tracer experiments: 1. Connectivity and transport characteristics. Hydrol. Process. 30(8), 1265–1279 (2016) 2. Kontogiannis, T., Malakis, S., Mcdonald, N.: Integrating operational and risk information with system risk models in air traffic control. Cogn. Technol. Work 19(1), 1–17 (2017) 3. Aziz, F., Basti, L., Keefer, J.: Vascular 0+5 residents spend one-fifth of their time on electronic medical records after duty hours. J. Am. Coll. Surg. 225(4), 44–45 (2017) 4. D’Adamo, I., Rosa, P., Terzi, S.: Challenges in waste electrical and electronic equipment management: a profitability assessment in three European countries. Sustainability 8(7), 633– 633 (2016) 5. Hirakawa, G., Kywe, P.P., Ito, K., Shibata, Y.: Road-to-vehicle communication using CoMoSE for road surface freezing information system. Ninth Int. Conf. Complex. IEEE 21(3), 238–241 (2015) 6. Sandier, M., Hesselbarth, A., Ziebold, R., Alberding, J., Uhlemann, M., Hoppe, M., et al.: An efficient filter bank approach for the provision of integrity in integrated navigation systems. Eur. J. Navig. 14(6), 4–10 (2016) 7. Murashko, D.N., Puzyrev, P.I., Murasov, K.V., Zavyalov, S.A.: The concept of developing surveillance system of technological equipment operating in the arctic zone and the far north. Procedia Eng. 113(3), 337–343 (2015) 8. Laud, G., Karpen, I.O., Mulye, R., Rahman, K.: The role of embeddedness for resource integration: complementing s-d logic research through a social capital perspective. Mark. Theor. 23(1), 91–97 (2015) 9. Batista-Foguet, J.M., Ferrer-Rosell, B., Serlavós, R., Coenders, G., Boyatzis, R.E.: An alternative approach to analyze ipsative data. Revisiting experiential learning theory. Front. Psychol. 6(1742), 1–10 (2015) 10. Albright, F., Stephenson, R.A., Agarwal, N., Teerlink, C.C., Lowrance, W.T., Farnham, J.M., et al.: Prostate cancer risk prediction based on complete prostate cancer family history. Prostate 75(4), 390–398 (2015)

VR Technology in Physical Education from the Perspective of 5G Quanan Gui

Abstract This paper studies the application of VR technology (VRT) in physical education (PE) from the perspective of 5G. This paper selects Aerobics in general education of college PE as an example. In the research, we take two classes of freshmen as the research object, and set them as the control class and the experimental class respectively. The control class adopts the traditional PE teaching method, and the experimental class applies VRT to the aerobics teaching on the basis of the traditional PE teaching. At the end of the experiment, we compare and analyze the aerobics skill scores of the two classes and the satisfaction of the two classes. The results show that the total score of the control class is 68 points, the total score of the experimental class is 86 points, the satisfaction of the control class is 80%, and the satisfaction of the experimental class is 96%. It can be seen that VRT applied to aerobics teaching can achieve good teaching effect. The research results of this paper will provide certain reference value for the application of VRT in PE teaching. Keywords 5G perspective · VR technology · Physical education · Aerobics movement technology

1 Introduction The development of wireless communication makes people put forward the concept of the fifth generation (5G) mobile communication, which will provide data transmission rate of multi megabits per second, and has larger capacity and shorter delay time than the current wireless system [1, 2]. 5G high-speed mobile network can improve the smoothness of the picture and drive more high-definition hardware facilities. The development of 5G technology makes VRT more widely used [3, 4]. To some extent, this technology has changed the boring, stiff and fluctuating situation Q. Gui (B) The International School of Equestrian, The School of Physical Education, Wuhan Business University, Wuhan, China Wuhan Horse Industry Research Institute, Wuhan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_77

621

622

Q. Gui

between man and machine [5, 6]. VRT has an important impact on the traditional teaching multimedia, and provides the possibility for multimedia teaching to achieve three-dimensional interaction and build a virtual and realistic teaching situation [7]. As we all know, college students are the main force of the country’s future development, and their physical condition directly affects the future development speed of the country. On the other hand, health is the capital of revolution, health is the main factor of happiness, and exercise is an important guarantee of students’ physical health and health. It is urgent to solve the problem of the decline of College Students’ physical health [8]. In today’s era of rapid development, the form of PE has undergone earth shaking changes, the application of VRT in PE is studied, which has important reference significance for the change of college PE teaching methods [9, 10]. This paper takes Aerobics in general education of college PE as an example, selects two classes of freshmen as the research object, and scores from five indexes of aerobics movement technology, which include action standardization, movement proficiency, action range, action strength and action posture. In addition, we also analyzed the satisfaction of the two classes. The research results show that VRT applied in PE can make teaching effect better.

2 VR Technology 2.1 Definition of VR Technology VRT full name virtual reality technology, also known as the spirit of the technology, can create and experience a kind of computer-generated virtual world, and in this environment experience the reality of things and things. VRT uses proprietary technical equipment to act on people’s vision, hearing and touch at the same time, so that users can get an unprecedented multi sensory highly realistic experience, giving people a sense of “immersive”. Generally speaking, VR has three meanings: (1)

(2)

(3)

VR is a multi view, real-time and dynamic three-dimensional environment based on computer graphics. This environment can be a real representation of the real world, or a fictitious world beyond the reality. Users can interact with the environment directly with their natural skills and ways of thinking through a variety of senses such as people’s audio-visual touch. In the process of operation, human is a real-time data source in the form of immersing in the virtual environment, not just external observers.

VR Technology in Physical Education from the Perspective of 5G

623

2.2 Characteristics of VRT VRT has the following three characteristics: (1)

Immersion

VRT creates an extremely real experience situation by using computer technology according to the physiological characteristics and cognitive rules of human body. In this situation, the user’s vision, hearing and touch are affected at the same time and react to the external virtual experience situation. Strong stimulation gives people a feeling of being in the situation and makes people devote themselves to it. (2)

Interactivity

Interactivity mainly refers to the ability to make users interact with the virtual objects by using computer technology, and can timely make feedback when receiving information, while the system generated virtual image dissemination information will record and analyze the user’s response in time. For example, when a user moves an object in the virtual world, the sensor will send out the information that the object has been moved, and the information will be fed back to the user. At this time, users feel that the object has changed in time and space. It not only includes human–computer interaction, but also realizes human–computer interaction. (3)

Imaginative

Conceivability mainly uses computer technology to generate three-dimensional space images, which can be created and changed at will according to the user’s natural requirements. Users can stimulate rich association and imagination when they obtain visual, auditory, tactile, kinesthetic and other senses. The conceivability of VRT plays an important role in cultivating people’s creative thinking.

3 Research Object and Experimental Design 3.1 Research Object This paper selects two classes of Freshmen in our university as the research object, takes aerobics in general education of college PE as an example, and studies the application of VRT in PE from the perspective of 5G. These two classes are girls, the number is 25, before the teaching experiment, there is no basis for aerobics, there is no big difference in scores.

624

Q. Gui

3.2 Experimental Design We set the two classes as the experimental class and the control class respectively. The control class adopts the traditional aerobics teaching, and the experimental class applies VRT to aerobics teaching on the basis of traditional teaching. The experimental period is one semester. At the end of the experiment, the students in two classes were assessed and scored from the aspects of aerobics movement technology. The indexes of scoring included action standardization, movement proficiency, action range, action strength and action posture. Each index was 20 points, and the total score was 100 points.

4 Application of VRT in PE from the Perspective of 5G There are a lot of abstract knowledge points in the process of classroom teaching, which cannot be displayed by multimedia or computer network. For teachers, PE is a course that is difficult to teach. For students, PE is like a lotus flower, which can be viewed from a distance and cannot be profane. However, the traditional teaching mode cannot use the teaching means to explain the knowledge for demonstration and so on. If VRT is used, these problems can be basically solved. Aerobics was originally designed to strengthen the physical fitness of astronauts. This pulse and lung function will be improved in the shortest possible time. There are three views on the definition of Aerobics in China: first, aerobics is a kind of dynamic beauty contest integrating gymnastics, dance and music. Second, aerobics is a new type of sports activity with physical exercise as its content and artistic creation as its means. It takes the body itself as the object and takes bodybuilding as its goal. Third, aerobics is based on the actual skills of the students, according to the results of different parts of the body, the movement and dance are organized into gymnastics, coupled with suitable rhythm music for accompaniment, so as to achieve the purpose of exercising, correcting body posture, shaping body shape and cultivating sentiment. (1)

Analysis on the results of Aerobics grading in two classes

The aerobics of the two classes were graded from five aspects of movement standardization, movement proficiency, action range, action strength and action posture. The results are shown in Table 1 and Fig. 1. It can be seen from Table 1 and Fig. 1 that the score of the control class in the movement standardization is 14 points, and that of the experimental class is 18 points. In the motor proficiency score, the control class score is 13 points, the experimental class score is 17 points. In the score of action range, the score of the control class was 17 points, and that of the experimental class was 17 points. In the score of action strength, the score of the control class was 13 points, and the score of the experimental class was 16 points. In the movement posture score, the control class

VR Technology in Physical Education from the Perspective of 5G

625

Table 1 Aerobics score results of two classes Class

Action standardization

Movement proficiency

Range of motion

Action strength

Action posture

Control class

14

13 14

13

14

68

Experimental class

18

17

17

16

18

Total score

86

Fig. 1 Analysis of aerobics score results of two classes

score is 14 points, the experimental class score is 18 points. In addition, the total score of the control class was 68 and that of the experimental class was 86. (2)

Comparative analysis of satisfaction between two classes

The degree of satisfaction can be divided into three levels: very satisfied, satisfied and dissatisfied. Compare and analyze the satisfaction of the two classes, and the results are shown in Fig. 2. It can be seen from Fig. 2 that in the control class, 5 students are very satisfied with the teaching method, accounting for 20%. 15 students in the control class were satisfied with the teaching method, accounting for 60%. 5 students in the control class were not satisfied with the teaching methods, accounting for 20%. From this, we can get that the satisfaction of the control class is 80%. In the experimental class, 10 students are very satisfied with the teaching method, accounting for 40%. In the experimental class, 14 students were satisfied with the teaching methods, accounting for 56%. The experimental class was dissatisfied with the teaching methods, accounting for 4%. From this, we can get that the satisfaction of the experimental class is 96%, which shows that the satisfaction of the experimental class is far greater than that of the control class.

626

Q. Gui

Fig. 2 Comparative analysis of satisfaction of two classes

5 Conclusions This paper studies the application of VRT in PE from the perspective of 5G. Taking aerobics as an example, this paper makes a comparative analysis of Aerobics skill score and satisfaction of two classes through a contrast experiment designed between two classes. The results of this paper show that VRT applied to PE teaching can make the teaching effect better. Acknowledgements This work was supported by University Teaching Team of Hubei Province ‘High-end Physical Education Teaching Team’, the Establishment of the First-class Undergraduate Specialty in Hubei Province ‘Economic and Management of Physical Education’, key research institution of Wuhan business university (WBUXZ001), teaching research project of Wuhan city municipal institutions of higher learning (2019103) and teaching research project of Wuhan business university (2018Y013).

References 1. Ravi, V.R., Aathithya, S.: Speed control of solar powered separately excited DC motor. Int. J. Comput. Inf. Technol. 11(1), 13–23 (2019) 2. Bhatt, V.R., Dhakal, P., Yuan, J., et al.: Use of digital technology to optimize functional status in an older patient with Myelodysplastic syndrome. J. Oncol. Pract. 13(2), 141–142 (2017) 3. Bastug, E., Bennis, M., Medard, M., et al.: Toward interconnected virtual reality: opportunities, challenges, and enablers. IEEE Commun. Mag. 55(6), 110–117 (2017) 4. Elbamby, M.S., Perfecto, C., Bennis, M., et al.: Towards low-latency and ultra-reliable virtual reality. IEEE Netw. 32(2), 78–84 (2018) 5. Freeman, D., Reeve, S., Robinson, A., et al.: Virtual reality in the assessment, understanding, and treatment of mental health disorders. Psychol. Med. 47(14), 1–8 (2017)

VR Technology in Physical Education from the Perspective of 5G

627

6. Dascal, J., Reid, M., Ishak, W.W., et al.: Virtual reality and medical inpatients: A systematic review of randomized, controlled trials. Innov. Clin. Neuro. 14(1–2), 14–21 (2017) 7. Munafo, J., Diedrick, M., Stoffregen, T.A.: The virtual reality head-mounted display Oculus Rift induces motion sickness and is sexist in its effects. Exp. Brain Res. 235(3), 889–901 (2017) - A.: Physical education and sport. Am. J. Health Promot. AJHP 68(3), 8. Gošnik, J., Tuda, 890117117698088 (2017) 9. Sun, H., Li, W., Shen, B.: Learning in physical education: A self-determination theory perspective. J. Teach. Phys. Educ. 36(3), 277–291 (2017) 10. Olena, Y, Galan, Y., Nakonechnyi, I., et al.: Screening system of the physical condition of boys aged 15–17 years in the process of physical education. J. Phys. Educ. Sport 17(Supplement issue 3), 1017–1023 (2017)

Big Data and VR Technology in University Sports Stadium Training Rufei Ma

Abstract Sports training is the most important function of university sports stadiums in China, especially the physical fitness of university students is closely related to sports training. In this regard, reasonable data mining technology and further analysis of related information technology can play a positive role in helping the university sports stadium maximize the training effectiveness. This paper uses the ID3 algorithm (ID3A) in the big data decision tree (DT), and the core idea is to use information gain to test each feature attribute in the data set at all levels. The experiment uses a data collection method to investigate a total of 200 students from a local university. The data obtained from the survey is merged and cleaned in a unified structure to form the data set required for analysis. Taking the attribute of the number of students’ participation as an example, its information gain value is 0.234 and the information gain rate is 0.632. This research is a useful attempt to apply DT data mining technology and VR technology in the field of university sports stadium utilization. Keywords Big data · VR technology · Stadium training · Data mining

1 Introduction Big data is a technology widely used in the information age. It is also an engineering technology that embodies interdisciplinary characteristics and is widely used in many industries. As a new type of information technology, big data has attracted much attention and its excellent performance also highly praised by the outside world. So far, the combination of sports and data mining technology in my country covers relevant knowledge in statistics, and the two have many in common. For example, based on sports training, breakthroughs in the difficulties of own sports training on the basis of sports theory learning can be effective. The combination of artificial intelligence and sports training [1, 2]. Today, the combination of data mining technology and sports R. Ma (B) School of Physical Education, Wuhan Business University, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_78

629

630

R. Ma

training has become the top priority of related technologies and the sports industry. At the same time, these two technologies are also important ways to further develop and study China’s computer and related information technologies at this stage. In the future, the combination of the two can make rational use of the resources of the two industries [3, 4]. Govani and others comprehensively introduced the application direction of data mining technology in student physique research, sports industry, competitive sports, and sports decision-making management. Gao Hongge used various technical and tactical parameters in international competitions participated by outstanding athletes, and then used correlation Rules, cluster analysis and data mining algorithms based on Maldivian process to reveal a large amount of information hidden in the data [5]. Ronald et al. improved the field of vision and stride length of the artificial fish swarm algorithm, proposed a data mining model based on table tennis technical algorithms and tactical classification rules, and analyzed the competition examples of top table tennis players. Through their research results, they found that the model in the data has significant advantages in mining quality and effect [6]. Virtual reality technology simulates various images, actions, postures, etc. in real time, and uses this technology to establish an interactive relationship with athletes [7, 8]. In the process of using virtual technology, athletes can see the real world reflected through this technology, and feel the same sounds, actions and even smells in the real world. Virtual reality technology breaks the traditional computer interface technology and enables athletes to realize the real experience of interaction in the virtual environment [9, 10]. The interactivity of virtual technology breaks the passiveness of traditional three-dimensional technology to athletes, and the transformation of the environment enables athletes to realize the experience of the real environment through the virtual environment.

2 Big Data and VR Technology in Sports Stadium Training 2.1 Using “VR” Technology to Achieve Virtual and Virtual Comparison of Action Although the development of sensors has made some achievements today, reality sensing technology still has some problems in the perception of some subtle signals. If you want to conduct a more detailed analysis of sports actions, it is very difficult to compare virtual and real actions. Great difficulty. Therefore, the use of computer “virtual reality” technology can construct standard sports actions and compare them with the images generated in actual sports training. Through the comparison between virtual actions and virtual, the difference can be found with the help of computers.

Big Data and VR Technology in University Sports Stadium Training

631

2.2 The Basic Theory and Related Algorithms of DTs (1)

The basic principle of ID3A

The ID3A is the most typical algorithm in DT algorithms. Its core idea is to use information gain to test each functional attribute in the data set at all levels of the DT. The attribute with the highest information gain is selected as the test of sample partition. Attribute, branch can be established from each value of the attribute and used recursively for a subset of instances in each branch. Use this method to establish the next level of nodes and branches in the DT until the instances belong to the same category. The classification algorithm of ID3 is based on the following principles: Let S be the training set, s represent the number of samples, suppose that the class ci (i = 1, 2, ..., m) has m different values, and let si be the number of samples in the class ci . The expected information required for classification of a given sample is given by: I (s1 , s2 , . . . , sm ) = −( p1 ∗ log2 ( p1 ) + p2 ∗ log2 ( p2 ) + . . . + pm ∗ log2 ( pm )) (1) Among them, pi = si/s is the probability that any sample belongs to ci . Let attribute A have v different values {a1 , a2 ,…, av }. The attribute A can be used to divide S into v subsets {S1 , S2 ,…, Sv }; the samples in Sj have the same value aj on attribute A. If A is selected as the test attribute, these subsets correspond to the branches grown from the nodes containing the set S. Let Sij be the number of samples of class Ci in the subset Sj . The expected information entropy divided into subsets by A is calculated by formula (2). E(A) =

v  si j + . . . + sm j I (si j , . . . , sm j ) S i=1

(2)

Among them, the term sij + · · · + smj /S serves as the weight of the jth subset.

3 Application Experiment of Big Data and VR Technology in Sports Stadium Training The data is collected with 200 students from a local university as the research object. The purpose of physical education evaluation is to reveal the true value of physical education, so the selected evaluation indicators must be objective and scientific. The selection of evaluation indicators should fully reflect the state and effect of physical education classroom teaching. While issuing questionnaires to students, it also organizes the evaluation of the teaching effects of the surveyed students’ physical education teachers. The evaluation is divided into two levels: good and bad. The data

632

R. Ma

Table 1 Physical education teaching evaluation data Serial number

Teaching objectives

Teaching method

Exercise intensity

Organize teaching

1

Clear

It is good

Medium

It is good

2

Clear

General

High

General

3

Unclear

General

Low

General

4

Clear

It is good

Medium

It is good

obtained from the survey are merged and cleaned in a unified structure to form the data set required for analysis, as shown in Table 1.

4 Discussion on the Application of Big Data and VR Technology in Sports Stadium Training (1)

The attribute of the branch node is the maximum selected information gain rate and not lower than the average value of all attribute information gains, as shown in Table 2 and Fig. 1.

(2)

Randomly select 65% of the samples from the data table for analysis, find the information in them, and establish the corresponding data classification model. The remaining 35% is used as test data to evaluate the established data classification model. When the accuracy of the evaluation is above 90%, the model is considered to be effective and the final DT is established. Taking the survey results of 200 students’ physical education class scores as an example, data mining and analysis are carried out. The DT algorithm is particularly suitable for physical education class analysis systems. The system uses DT algorithm to extract data features and relationships in the work of physical education courses, and combines performance analysis to form student personal information for reference. It provides valuable data support and theoretical reference

Table 2 Study the information gain and information gain rate of each attribute Attributes

Information gain

Information gain rate

Number of student entries

0.234

0.632

Teacher technical level

0.215

0.543

Student preference

0.146

0.365

Teacher teaching methods

0.121

0.376

Class

0.068

0.289

Intelligence level

0.057

0.208

Physical fitness

0.033

0.127

Big Data and VR Technology in University Sports Stadium Training

633

Fig. 1 Study the information gain and information gain rate of each attribute

for the education management of physical education courses, and effectively improves the quality and efficiency of physical education management. The training set data of 200 students is shown in Table 3 and Fig. 2. Table 3 Training set data of 200 students Numbering

Sports

Course results

Basketball

Sprint

Long jump

1

77

80

88

B

2

72

81

82

B

3

81

78

91

A

Fig. 2 Training set data of 200 students

634

R. Ma

5 Conclusion This paper studies the big data VR technology, analyzes the main characteristics of big data and VR technology and its application in physical education and sports training. It is believed that big data and VR, as new technologies, will eventually be widely used in physical education and physical training. This article uses the method of data collection to investigate a total of 200 students from a local university and uses the ID3A in the DT to form the analyzed data set. Acknowledgements This work was supported by the Wuhan Science Education Planning Project of the 13th Five Year Plan: ‘Research on the Post-Games Use of the Municipal Universities Stadiums: the Value, Function and Pattern’ (2018A040), Teaching Research Project for Wuhan Municipal Universities (2019101), University Teaching Team of Hubei Province ‘High-end Physical Education Teaching Team’, the Establishment of the First-class Undergraduate Specialty in Hubei Province ‘Economic and Management of Physical Education’, and Wuhan ‘Dual-first-class’ Key Development Specialty ‘Economic and Management of Physical Education’.

References 1. Valmaggia, L.: The use of virtual reality in psychosis research and treatment. World Psychiatry 16(3), 246 (2017) 2. Chung, A., To, W.M., Schulte-Fortkamp, B.: Soundscape design of an open-air concert venue using virtual reality technologies. J. Acoust. Soc. Am. 141(5), 3620–3620 (2017) 3. Toshitaka, K., Daiki, N., Makio, K.: Utilizing virtual reality to understand athletic performance and underlying sensorimotor processing. Proceedings 2(6), 299 (2018) 4. Chen, H., Liu, M.: Development and design of Virtual reality technology in physical training course. Agro Food Industry Hi Tech 28(1), 3134–3137 (2017) 5. Ahir, K., Govani, K., Gajera, R., et al.: Application on virtual reality for enhanced education learning, military training and sports. Augmented Hum. Res. 5(1), 1–9 (2020) 6. Renard, R.D.: Creating the other requires defining Thainess against which the other can exist: early-twentieth century definitions (Redefining “otherness” from Northern Thailand). t¯onan ajia kenky¯u 44(3), 295–320 (2017) 7. Xu, X., Cai, H.: Semantic approach to compliance checking of underground utilities. Autom. Constr. 109(Jan), 103006.1–103006.21 (2020) 8. Gunaseelan, C., Ramesh, V.: A study on application of data mining in ayurinformatics. Int. J. Comput. Appl. 137(4), 975–8887 (2016) 9. Alina, R., Justin, K., Bernd, R., et al.: Estimating the spatial distribution of crime events around a football stadium from georeferenced tweets. Int. J. Geo-Inf. 7(2), 43 (2018) 10. Rizal, M.T., Yusof, Y.: Application of data mining in forecasting graduates employment. J. Eng. Appl. Sci. 12(16), 4202–4207 (2017)

Artificial Intelligence Simulation System in Sports Training Under VR Technology Ziying Sheng and Kai Wen

Abstract Virtual reality technology has very unique advantages in sports training. For example, it can effectively monitor, predict and evaluate sports technical movements, allowing virtual athletes to try new movements in advance, reducing the risk of sports training, and improving sports training efficiency. This article aims to study the artificial intelligence simulation system in sports training under VR technology. This article uses virtual scene position mapping technology to realize the movement of the upper limbs of the human body. The movement of the different joints of the upper limbs drives the rotation of the corresponding degrees of freedom of the mechanical arm in the mechanical system, which causes the rotation of the sensor, and then realizes the change of the sensor voltage. This article compares the virtual reality results of diving athletes with the training results through comparative analysis methods, and finds out the gap. Experimental data shows that VR technology is mainly used in diving training to help athletes obtain three-dimensional sports information and perform three-dimensional realistic simulation of athletes, because the technical analysis of athletes is all based on obtaining three-dimensional sports information. The results of the experiment show that 85% of athletes believe that the learning of artificial intelligence simulation systems and technologies is of great help to real-life operations and applications, 10% of athletes think it is helpful, and 5% of athletes think it is not helpful. Through the three-dimensional virtual reality simulation of diving athletes’ movements, different levels of movement are truly displayed. This helps to reduce the risk of athletes’ personal experience in the process of action and technological innovation. Keywords VR technology · Sports training · Artificial intelligence · Simulation system

Z. Sheng · K. Wen (B) Physical Education School, Wuhan Business University, Wuhan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_79

635

636

Z. Sheng and K. Wen

1 Introduction Artificial Intelligence (Artificial Intelligence) has only a short history of nearly 40 years, and most people do not know it very well [1, 2]. The research tasks of artificial intelligence include two aspects: one is to study the laws of human intelligence using computers as a tool, that is, intelligent simulation; the other is to build artificial intelligent systems using computers as a means. Although these two tasks have a certain connection, such as the construction of artificial intelligent systems often need to learn from the mechanism of human intelligence, there are differences between the two. The former focuses on the discussion of the laws of intelligence, and the latter pursues the construction of practical intelligent machines [3]. Takaya et al. study virtual technology to realize the interaction with athletes through computer technology, and this interaction will bring the athletes the maximum real situational experience [4]. Virtual reality technology breaks the traditional computer interface technology and enables athletes to realize the real experience of interaction in the virtual environment. Li et al. found that the interactivity of virtual technology breaks the passiveness of traditional three-dimensional technology to athletes, and the transformation of the environment allows athletes to realize the experience of the real environment through the virtual environment [5]. Virtual reality technology simulates various images, actions, postures, etc. in real time, and uses this technology to establish an interactive relationship with athletes [6, 7]. In the process of using virtual technology, athletes can see the real world reflected through this technology, and feel the same sounds, actions and even smells in the real world [8]. Virtual reality technology mainly includes three aspects: one is to use computer technology to simulate the feelings of entities, sounds, tastes, etc. in the real world; the other is to realize the natural function communication of athletes through simulated reality technology, that is, to use the athletes’ senses and The virtual environment is interactive; the third is to use three-dimensional technology or sensing technology for virtual construction [9, 10].

2 Research on Artificial Intelligence Simulation System in Sports Training Under VR Technology 2.1 The Role of Virtual Reality Technology in Sports Training Virtual reality technology transforms the sports training method from traditional human eye observation to the use of scientific instruments to capture and analyze the movement, from the emotional experience method to the programmed human motion simulation and simulation method, its role in sports training huge.

Artificial Intelligence Simulation System in Sports Training Under VR Technology

(1)

637

Realize real-time analysis, monitoring and evaluation

Through the quantitative analysis of the athlete’s movement technology by simulation, and display the analysis result with three-dimensional animation, the “standard” result is compared with the athlete’s real training video on the same screen, so as to achieve the analysis, monitoring, prediction and evaluation of the technical movement, and help Athletes analyze movement differences, find out technical deficiencies, and improve movement techniques to improve athletic performance. (2)

Reduce the training risk of difficult movements

In recent years, many new movements have emerged in many sports events, and the technical difficulty of the movements has become more and more difficult. Athletes are often vulnerable to injuries when practicing these new movements or technically difficult movements. The application of virtual reality technology can avoid this very well., The use of virtual reality technology allows virtual athletes to try new actions in advance to avoid sports injuries caused by difficult and complex technical actions, thereby reducing the risk of sports training and improving the efficiency of sports training. (3)

Make up for the deficiency of insufficient training conditions

In real sports training, due to weather, venues and other training environments, or equipment, funding, etc., or athletes’ injuries, normal training cannot be carried out. Virtual training and competition scenes constructed using virtual reality technology can be very effective. It’s good to change this situation, and athletes can train in virtual training and competition scenarios to ensure training conditions and complete training tasks.

2.2 The Key Technology of Virtual Reality Technology in Sports Training The main equipment of virtual reality technology includes computers and their display equipment, image acquisition equipment, location tracking equipment, and interactive equipment. The key technologies used in sports training include the capture of human motion data, the establishment of a human body model based on the physical and physiological characteristics of the human body, virtual and real human animation and interaction. (1)

Capture of human motion data

The capture of human motion data is mainly to use the three-dimensional video system to record the motion of the real human body. Through the video-based human motion tracking technology, the posture parameters and various kinematic parameters

638

Z. Sheng and K. Wen

of the moving human body are obtained, and the motion biomechanical analysis is carried out on this basis. And then the computer drives the motion of the virtual human on the screen according to the obtained kinematics data. Since the data captured is the real human motion data, the motion of the virtual human is basically a copy of the human motion, and the simulation effect is very realistic and based on As a result of the analysis of sports biomechanics, the computer can also generate new motion patterns or complex motions, perform technical motion innovation or predict the development trend of technical motions. (2)

Establishment of sports human body model

Human body modeling is the key to motion simulation. At present, a variety of modeling software is available for the establishment of human body models in sports training simulation systems. Three-dimensional sports human body models generally divide the human body into three levels of bone, muscle and skin for modeling, and drive the simulated human by establishing a model of internal structure. The movement, better control the movement posture of the simulated person. In the process of establishing the human body model, it is necessary to provide the computer with the physical characteristics of the human body such as the shape, structure, quality, exercise ability and adaptability of the human body, as well as the physiological characteristics of the human body such as pulse, blood pressure, vital capacity, and the functions of various organs and systems. Index parameter. (3)

Animation and interaction of virtual and real human body

Based on the motion data collected by the motion capture device, the threedimensional motion data is displayed as a standard technical action—virtual motion by means of three-dimensional human animation and the video recording the athlete’s actual motion process is the actual motion. Both are processed by special technology. The comparative analysis is called the virtual-real contrast technique. The virtual and real contrast technology enables the virtual and real actions to be displayed on the same screen at the same time, so that the motion display in the video is consistent with the observation point of view and perspective of the simulated standard action, so that the observation effect is more accurate and more real and intuitive.

2.3 Virtual Scene Location Mapping Arm exercise training based on virtual realization is to operate the game through the movement of the upper limbs of the human body. The movement of the different joints of the upper limbs drives the rotation of the corresponding degrees of freedom of the manipulator in the rehabilitation mechanical system. The rotation of the degrees of freedom of the manipulator drives the rotation of the sensor. Rotation will cause the sensor voltage to change.

Artificial Intelligence Simulation System in Sports Training Under VR Technology

639

Take the left upper limb “shoulder joint abduction and abduction” as an example to illustrate the mapping relationship between the movement position of the human upper limb and the virtual game scene position. Set the evaluation voltage of the shoulder joint abduction and abduction movement range as vl and vr respectively, and the human body is in exercise training When the voltage reaches vl , it means reaching the leftmost end of the virtual scene, and when the voltage reaches vr , it means reaching the rightmost end of the virtual scene. The intermediate voltage value of the evaluation value is vmid as in formula (1): Vmid =

(Vt + Vl ) 2

(1)

The current voltage value during human training is v, then the position of the upper limbs of the human body corresponds to the abscissa x of the virtual scene as in formula (2): x=

(v − vmid )∗2 vr − vl

(2)

3 Experiment of Artificial Intelligence Simulation System in Sports Training Under VR Technology 3.1 Experimental Analysis Generally speaking, motor skills can be divided into a series of steps or “partial skills” that make up the overall performance. From another perspective, these partial skills will appear at the same time or displayed in chronological order. Combining the previously learned skills has been regarded as a very critical step of the required complete learning by current people. The experiment expresses its organizational function through the computer analogy of “executing subroutines”, and improves skills through continuous practice with informative feedback. Table 1 is a detailed introduction to the conditions of motor skills learning.

3.2 Experimental Method This experiment mainly uses the following three methods: investigation method: actual analysis through the investigation of the diving team; comparative analysis method: compare the results of virtual reality with training to find out the gaps; logical

640

Z. Sheng and K. Wen

Table 1 Conditions for learning motor skills Behavior

The behavioral performance of motor skills embodies the intellectual skills that constitute the movement sequence of muscle activity. When observed as a motor skill, the activity must meet the criteria of speed, accuracy, strength, and fluency in execution

Internal conditions

The executive subroutines that govern the steps of motor skills must be extracted from existing learning or must be learned as initial steps

External conditions In order to learn “executive subroutines”, the instructor should choose one of several different exchanges and provide it to the learners. Any type of verbal communication designed to encode operating procedures can be used

analysis method: obtain through the data is analyzed logically, and the problems of computer virtual reality technology in sports training are put forward.

4 Discussion on Artificial Intelligence Simulation System in Sports Training Under VR Technology (1)

Computer VR technology is mainly used in diving training to help athletes obtain three-dimensional sports information and perform three-dimensional realistic simulation of athletes. The technical analysis of athletes is all based on obtaining three-dimensional sports information. By capturing and analyzing the techniques collected by the athletes in the diving process, the athletes can be better trained and instructed. Nearly 90% of users believe that the learning of artificial intelligence simulation systems provides help for the subsequent operation of related tools and technical learning tasks. 85% of users believe that the learning of artificial intelligence simulation systems and technologies is useful for real-world operations and applications. A lot of help, 10% of users think it is helpful, and 5% of users think it is not helpful. The feedback evaluation results of athletes are shown in Fig. 1.

(2)

At present, most sports projects have not successfully developed virtual reality training systems. The main reason is that there are problems in the methods of cooperation between coaches, athletes and computer software developers. The development of the sports VR training system requires the close cooperation of sports technology, training experience, and computer virtual reality technology. But in practice, it is difficult for athletes to have a lot of time to cooperate with development, coaches do not understand the main research and development function purposes, and computer software developers lack experience and skills in actual sports training, which makes it difficult to cooperate in the system development process. According to the survey on the development of skills in sports training by computer virtual reality technology, as shown in Fig. 2 in Table 2.

Artificial Intelligence Simulation System in Sports Training Under VR Technology

Fig. 1 Feedback evaluation results for athletes

Fig. 2 Development of skills by computer virtual reality technology in sports training Table 2 Development of skills by computer virtual reality technology in sports training Occupation

Possess sports training theory (%)

Have sports training experience (%)

Have relevant computer development technology (%)

Sports simulation software developer

, and |V| as the number of words in the dictionary. The single thermal code is denoted as A, and the dimensional change process of sentence S is shown in Formula 1. A

RL → RL×|V|

(1)

688

R. Zhang et al.

Second, the distributed representation of words adopts static word and dynamic word embedding model. The Word2vec framework was constructed, and the Words were mapped to the low-latitude real vector space with the deep learning method. The similarity degree of the semantic sentiment in the text was represented by the similarity degree in the vector space. Recurrent neural networks: Specifically, for processing sequential inputs. Input sequence x1 ,x2 , . . . , xt , Initialize d0 and calculated from right to left. The implicit layer vector of the last time dimension was set up. After the full connection and activation function, the sentimental distribution value Y. Use a formula to describe the calculation process of the hidden state. Assuming that at time t, the input of the network is xt . The hidden state (that is, the hidden layer neuron activity value) ht is not only related to the input xt at the current moment, but also the hidden state at the previous moment. ht-1 is related to all past input sequences (x1 , x2 , …, xt-1 , xt ). Its operation is shown in Fig. 1. Z t = U h t−1 + W xt + b

(2)

bt = f (zt )

(3)

Dropout technology: In order to solve the overfitting phenomenon of neural network, Dropout technology is proposed. Its implementation principle is that during the training process of neural network, a certain number of hidden layer neurons are randomly stopped to work during each iteration, and parameter weights are suspended instead of participating in this iteration. Dropout technology is now widely used for deep learning.

Fig. 1 Batch size selection experiment

A Novel Sentiment Classification Architecture Based …

689

3 Research on Sentiment Classification Algorithm Based on the Integrated Part of Speech Embedding Mechanism of Self-attention The existing sentiment classification algorithms based on neural network mainly include the sentiment classification algorithm based on recurrent neural network, the sentiment classification algorithm based on convolutional neural network and the sentiment classification algorithm based on attention mechanism. The feature vectors of the neural network sentiment classification algorithm are derived from the coding end of the neural network, and different text representations are generated by different encoders. However, in addition to the neural network itself, the embedding of input information also affects the network’s representation of text. Selecting the appropriate embedded vector to express the input text information will help to improve the accuracy of the sentiment classification algorithm. The embedding of words can reflect the similar relation between words, while the embedding of part of speech can reflect the modifying relation or syntactic relation between different words. This paper proposes a sentiment classification algorithm based on the self-attention mechanism of fused part-of-speech embedding, including two algorithms, the SENTIMENT classification algorithm based on Pos-IdSA and the sentiment classification algorithm based on Pos-ItSA. The sentiment classification algorithm of Pos-IdSA: it can distinguish the part of speech and word, distinguish the embedding space of word from the embedding space of part of speech, and the decoding terminal combines the sentence vectors of two different Spaces and outputs them for classification. The sentiment classification algorithm of Pos-ItSA: The main difference with the sentiment classification algorithm of Pos-IdSA is that in the self-attention layer, the average vector of all words in the sentence replaces the sentence representation, and the encoding method of the fusion of sentence level representation and word level representation is constructed. Experimental data: The data sources of this study are SST-2 and MR. See Table 1 for the data set. Evaluation index: The evaluation index accuracy of this experiment is the function of accuracy rate and cross entropy loss, as shown in Formula 4: Accuracy =

Pr edict corr ect sample The total number of sample

(4)

Table 1 The experimental data The data set

category

Average sentence length

The longest sentence

The training set

Validation set

The test set

MR

2

18

49

6530

935

1137

SST-2

2

22

53

9100

867

2019

690

R. Zhang et al.

4 Experimental Results and Analysis 4.1 Parameter Optimization Experiment Parameter optimization experiment: A sentiment classification algorithm based on Pos-IdSA was developed in the MR data set and mainly consisted of three types: selection experiment, batch size selection experiment and Dropout selection experiment l2 . l2 Selection experiment: The basic setting of the experiment is: iteration number = 6, batch size = 5. Due to different Settings of Dropout, the accuracy rate of l2 equal to one thousandth is higher than that l2 equal to one tenth. With the increase of dropout, the accuracy of l2 = 0.01 would decrease, while the accuracy of l2 = 0.001 would increase, due to the need to find a balance between underfitting and overfitting of the hyperparameters. Based on this, the selection of l2 equals 0.001. Batch size selection experiment: In the experiment, the batch size was set to 6, 12 and 24 respectively, and different iterations were set. The accuracy was shown in Fig. 2. It can be seen from Fig. 1 that the best advantage in the figure is when the batch size is equal to 6 and the number of iterations is set to 12.In order to increase the randomness of the network and prevent over-fitting of data, regularization, dropout and batch size reduction are added here.l2 The results are shown in Fig. 2. Dropout selection experiment: The number of iterations was set to 12, batch size was equal to 6, and accuracy was highest when Dropout was equal to 0.6. The basic Settings of experimental data are shown in Table 2.

Fig. 2 L2 selection experiment

A Novel Sentiment Classification Architecture Based …

691

Table 2 Dropout experimental data Dropout

0.4

0.6

0.8

Accuracy

80.3

80.5

79.4

1 78.1

Table 3 The experimental data were analyzed and compared The data set

Model

Accuracy

Loss

Time (s)

SST-2

Transformer

85.78

1.361

108

SA-CNN

81.34

1.4199

130

Pos-IdSA

82.71

1.4311

182

Pos-ItSA

87.99

1.3107

175

Transformer

77.9

1.2989

137

SA-CNN

77.33

1.4674

169

Pos-IdSA

81.61

1.2213

241

Pos-ItSA

79.43

1.3813

232

MR

4.2 Algorithm Performance Analysis In this experiment, the algorithms involved include: Transformer sentiment classification algorithm and SA-CNN sentiment classification algorithm. In order to apply Transformer to text sentiment classification, the decoder is transformed into Attention. Sa-cnn is a direct comparison of the two algorithms proposed in the experiment, and it does not add the embedding of part of speech. The experimental results are shown in Table 3. It can be seen from Table 3 that the accuracy of SA-CNN on SST-2 data set and MR data set is lower than Transformer by 4.44 and 0.6 respectively. Moreover, Transformer takes less time than SST-2, indicating a weak linguistic representation of the self-attention mechanism. The Transformer decoder is the attention mechanism, and the decoding method to obtain the whole representation from the weighted sum of the global scope is more suitable to be followed by the self-attention mechanism. The experimental results show that the two self-attention mechanisms based on fused sex embedding are superior to SA-CNN in both data sets. In TERMS of SST-2 data set, PPS-ITSA is 2.21 and 6.65 higher than Transformer and SA-CNN respectively, which indicates that part-of-speech embedding supports network learning of grammatical relations that cannot be learned by word embedding. In the MR data set, Pos-IdSA has the highest accuracy rate, 3.71 and 4.28 higher than Transformer and SA-CNN respectively, which indicates that the embedding of part of speech improves the text representation ability of the self-attention mechanism and enables network learning to obtain the local dependency relationship of sentences at the decoding end. However, the two sentiment classification algorithms proposed in this experiment doubled the parameters of the self-attention mechanism and also doubled the running time, which is the shortcoming of this experiment.

692

R. Zhang et al.

5 Conclusion These methods took a long time to train, cost high manpower, and were difficult to learn the word dependence inside the sentence, unable to capture the internal structure of the sentence. After word embedding is proposed, the advantages of the neural network sentiment classification algorithm are presented. In the sentiment classification algorithm based on the neural network, the attention mechanism of the sentiment classification algorithm can quickly pay attention to the global information and is not limited by the sentence length. Based on this, in order to embed sentimental information into the attention mechanism, this paper proposes to embed part of speech into the self-attention mechanism, and conducts algorithm performance analysis experiments with the SENTIMENT classification algorithm based on Pos-IdSA and THE sentiment classification algorithm based on Pos-ItSA. Compared with other algorithms, the sentiment classification algorithm based on the fused part of speech has a higher accuracy rate, which indicates that the part of speech features are conducive to improving the accuracy of the sentiment classification algorithm. Acknowledgements The work that is described in this paper was supported by the Research Funds of Xian International Studies University (Grant No. BSZA2019003).

References 1. Xue, X., Feng, J., Gao, Y., et al.: Convolutional recurrent neural networks with a self-attention mechanism for personnel performance prediction. Entropy 21(12), 1227 (2019) 2. Ainam, J.P., Qin, K., Liu, G., et al.: Enforcing affinity feature learning through self-attention for person re-identification. ACM Trans. Multim. Comput. Commun. Appl. 16(1), 1–22 (2020) 3. Jianming, Z., Fei, C., Taihua, S., et al.: Self-interaction attention mechanism-based text representation for document classification. Appl. Sci. 8(4), 613 (2018) 4. Zhu, H., Luo, Y., Liu, Q., et al.: Multistep flow prediction on car-sharing systems: a multi-graph convolutional neural network with attention mechanism. In: Int. J. Softw. Eng. Knowl. Eng. 29(11–12), 1727–1740 (2019) 5. Vora, P., Khara, M., Kelkar, K.: Classification of tweets based on sentiments using word embedding and random forest classifiers. Int. J. Comput. Appl. 178(3), 1–7 (2017) 6. Wei, R.: Standardization sentiments: aspects of classification and arrangement in tales with a good ending. Asiatische Studien-Etudes Asiatiques 71(3), 811–831 (2017) 7. Ferreira, J., Bras, S., Silva, C.F., et al.: An automatic classifier of sentiments built from noise. Psychophysiology 54(4), 650–627 (2017) 8. Ma, Y., Niu, P., Zhang, X., et al.: Research and application of quantum-inspired double parallel feed-forward neural network.. Knowl. Based Syst. 136, 140–149 (2017) 9. Soldati, G., Ben, F.D., Brisotto, G., et al.: Microfluidic droplets content classification and analysis through convolutional neural networks in a liquid biopsy workflow. Am. J. Trans. Res. 10(12), 4004–4016 (2018) 10. Reich, T., Budka, M.: PP15 Predicting variations of calls to an ambulance service in the UK caused by circulating infections using-deep learning methods. Emerg. Med. J. 36(10), e2–e7 (2019)

A Novel Dynamic Corporate Credit Rating Classification and Analysis Model Based on Self-attentive Mechanism Binbin Chen, Rui Zhang, Long Chen, and Hongbo Tang

Abstract In traditional financial analyses, along with statistic methods, human factor plays an essential role. We propose a novel end-to-end architecture based on self multi-head attention with gated recurrent neural networks, which is capable of evaluating a corporate credit rating by capturing the time series features of financial data and reducing human interference and improving rating efficiency. The extracted features by attention mechanism are leveraged to dynamically analyze operating and financial conditions of particular rating or corporate based on time series data. Keywords Corporate credit rating · Dynamic financial analysis · Self multi-head attention · GRU

1 Introduction A corporate credit rating is the opinion regarding assessment of a company’s ability to meet its debt obligations according to an independent credit rating agency, such Moody’s, Standard and Poor’s (S&P’s), and Fitch Ratings. Analyses based on characteristic, financial ratios and factors [1–3] have been the fundamental methods since birth in risk prediction also in credit evaluation. Dealing with complex data and financial conditions, evaluation models based on statistical methods are widely used in researches and businesses, such as: ZETA model [4], portfolio Manager, the Risk Metrics Group’s Credit Metrics and Credit Manager, Credit Suisse Financial Products Credit Risk+, and Credit Portfolio View [5]. Recently many machine learning methods in this field have also been introduced into the research of credit ratings, such as Support Vector Machines (SVM) [6], Decision Tree (DT) [7] and et al. B. Chen (B) Mokpo National University, Mokpo, Korea R. Zhang · L. Chen Zunyi Normal College, Zunyi 563000, China H. Tang Guiyang Rural Commercial Bank Co. Ltd., Guiyang 550000, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_86

693

694

B. Chen et al.

Despite the dominant role in rating market, the traditional methods in the field of economics have been limited by the influence of human factors. Moreover, all but a few models in traditional ways excel at tackling linear relationships instead of non-linear ones. The main purpose of the study is to construct an end-to-end corporate credit rating architecture based on GRU network, which is capable of dynamically analyze the financial status of corporates of different rating based on classification model. In this study, inspired by transformer [8], a novel approach based on self multi-head attention mechanism is introduced in corporate credit rating. Our main contributions are summarized as follows: (1) The self multi-head attention is demonstrated to perform impressively in tackling financial data features and analyses. (2) We treat corporate credit rating under the insight of dynamic financial analysis. The past financial indicators together with the present ones help grasp the dynamic financial conditions [9]. (3) We construct an end-to-end structure based neural network with high performance in tackling high-dimensional data and nonlinear relationships, capable of avoiding the artificial interference of the weight setting in the rating process.

2 Dynamic Corporate Credit Rating Architecture On the basis of prior studies on attention mechanism, the essential abilities of attention models are to gain the similarity or relevance of two references. Many studies have utilized this feature to capture the representations of characters, words, sentence, images and et al. In our study, we aim to capture the representation of certain financial element among the entire market which is leveraged as market benchmark of this element possessing the identical function with the industrial benchmark ratio in traditional dynamic financial ratio analysis. Given financial ratios are from simple calculation of two or three financial statement values and benchmark ratio is an average value, our market benchmark from self multi-head attention based on interrelations of all involved financial elements and different time steps is more representative and indeed dynamic. Each representation of financial element is thus utilized as weight to eliminate human adjustments or short-term fluctuations on specific every financial element value.

2.1 Dynamic Weighting Module By contrast with most attention-based models that combine attention mechanism within recurrent neural networks or convolutional neural networks and share the same inputs with attention module, we deconstruct the traditional attention-based model excluding the recurrent neural network and differing inputs vectors from the GRU RNN in rating classifier. Dynamic weighting module is primarily constructed

A Novel Dynamic Corporate Credit Rating Classification …

695

to capture the paralleled interaction between certain financial element with all other units, more importantly, excluding all sequential position information. Given RNNs’ natural constraint of sequential computation precludes parallelization processing and they constantly remember sequential positions, inspired by transformer architecture which remarkably allows more parallelization and consideration of relevance between target and all inputs, we establish the dynamic weighting module based on self multi-head attention mechanism. Given input. vector Fn (n = 20 = numbers of financial elements) with a (a = 2619 = total enterprise number of dataset) dimensions, we aim to calculate the representation SMA (self-multi-head attention) of Fn , that is, the weight of a particular financial statement element in the whole market. For computing first market element representation in the first time step, to obtain the align score eqk , we implement a dot product between the first input’s query Q 1 with all keys, including itself. As Vaswani [10] did, aiming to prevent that dot product turns large in magnitude due to large scale of dk , we scale the dot product by √1d k as well. The softmaxed align score eq1k1 is multiplied with the corresponding value V1 , the element-wise sum of results of multiplication of softmaxed eq1kn and vn is the self-attention = head 11 of F 1 . Following Eq. 2, after h times repeating, h pieces of head 11 are obtained which are represented as head 1h . Self multi-head attention (SMA) turns out to be the concertation of head 1h , in this case SMA of Total revenues in the first time step, AtttT1 R . eqk = f (Q, K ) =

T Q √K dk

Attention(Q, K , V ) = head11    = So f t Max eqk V

(1)

(2)

n

  head 1h = Attention QWhQ , K WhK , V WhV

(3)

AtttT1 R = S M Ao f F1   = Concat head 11 , . . . , head 1h w O

(4)

where WhQ ∈ Rdmodel ×dk ,WhK ∈ Rdmodel ×dk , WhV ∈ Rdmodel ×dv and W O ∈ Rhdv ×dmodel . In this work, we employ h = 8 parallel attention layers or heads. For each of these, we use dk = dv = dmodel / h. The different SMAs in different time steps are capable of representing the benchmark of the corresponding financial element of the entire market in different time steps, thereby regulate values of financial statement elements prepared to input to the next module.

696

B. Chen et al.

2.2 Credit Rating Classifier Under our assumption taking assessment of industry as a time-serial issue, aiming to simplify credit rating operations, especially in data collection, a recurrent neural network based architecture is supposed to implement with the inputs consisting a set of values from financial statements which are public for most industries. The recurrent neural networks with GRU cells contain notable memory capacity in handling sequential missions, thus being the optimal basis of the classifier module. In time step t, xt is plugged into the network unit, while multiplied by the weight Wz . The same goes for h t−1 which holds the information for the previous time step t −1 and is multiplied by the weight Uz . Both results are added together, and a sigmoid activation function is applied to squash the result between 0 and 1. The gained above z t is update gate which decides how much of the past information needs to maintain and be passed along to the future. The reset gate rt helps the model to determine how much the past information to forget. A new current memory h˜ t is calculated as follows by utilizing the reset gate to keep the relevant information from the past. The element-wise product between the reset gate rt and U h t−1 determines what to remove from the previous time steps. The final memory h t of t time step is combined from the current memory h˜ t and previous memories h t−1 . The update gate is implemented to choose information from h˜ t and h t−1 . In this case, if the model learn to set the update gate, the vector z t , close to 1, which means keeping a majority of the previous information,(1 − z t ) will be close to 0, which means the model will ignore a large percentage of the current content. 

zt rt

 =



σ W · ht−1 , xt σ

(5)

h˜ t = tan h(W xt + rt  U h t−1 )

(6)

h t = z t  h t−1 + (1 − z t )  h˜ t

(7)

Considering the sequential feature of GRU RNN,  we organizeeach financial statement element values in chronological order: T Rt1 , . . . , T Rtn . The chronological values of certain element dot-multiplied by corresponding weights gained from dynamic weighting module are fed into classifier as inputs as follows:  TR Attt1  T Rt1 , · · · AtttTn R  T Rtn .

A Novel Dynamic Corporate Credit Rating Classification …

697

2.3 Credit Rating Classifier Input values in our model vary greatly, moreover containing negative values and zeros. A feature scaling method thus should be implemented before calculations. We conduct min–max normalization on data before the computation of self multihead attention. We randomly extract values of twenty financial elements of eight entities as a distribution sample. The substantial difference of distributions before and after min–max normalization can be observed in (as shown in the Fig. 1) The formula of min–max normalization is as follows:

3 Dynamic Financial Analysis In traditional Dynamic financial analysis, the industry average ratio is usually used as a financial evaluation benchmark to compare the ratio of a specific company at a specific point in time [11]. Excessive deviation of a company’s financial ratio from the industry average is considered undesirable [9], and it can be found that a large amount of the smoothing of the financial ratio in the market is due to active adjustments to the desired target. The purpose of the financial ratio adjustment method is to identify and eliminate human manipulation referring the benchmark. The usual static comparative analysis will focus on a specific time point, not involving historical financial conditions, so dynamic financial analysis advocates the regression of current ratios and past ratios, which helps contain the dynamic nature of the company’s financial ratios and the adjustment process. In our study, a more specific and representative dynamic indicator of dynamic financial condition is introduced to replace average ratio. In dynamic financial analysis framework, analysis of entity is often processing referring to the industry average. The industrial ratio is set as a benchmark of analysis.

Fig. 1 The left distribution is the original values of twenty financial elements of randomly selected eight entities, the right one is the distribution after min–max normalization

698

B. Chen et al.

The two aims in dynamic financial analysis are to confirm whether certain financial ratio deviates too much from the benchmark and at what level, which denotes operation stability and ability. The static analysis is comparison between two enterprises at certain time point, while dynamic one focus on different time of one enterprise. Our analysis framework can involve both ways. According to our procedure of dynamic weighting module, we can calculate financial element representation at any degrees: entity, rating, industry, or market. In this experiment, we aim to analyze differences between benchmark and ratings as an analyzing instance. In order to observe the operation stability, we obtain the single financial element representation of all corporates in dataset and set it as corresponding element benchmark. Setting financial elements of a certain rating as input, the corresponding element representation of this rating can be computed following self multi-head attention algorithm. We put the benchmark and rating representations of different time steps to construct benchmark vector and rating vector, and then calculate the cosine similarity, that is, the gap of these two (results are as follows). The smaller the value is, the smaller the fluctuation of the element is, this indicator is more stable. Identically, it is easy to analyze condition of a set of elements. Here we conduct the experiment with the sum of all financial element representations and corresponding benchmark. It can be seen from Table 1 that the operating performance of B rating is more stable. In order to further observe the operation abilities of different ratings, we use calculus to calculate the intersection area of rating representation and benchmark of financial element in the plane. The smaller the area is, the smaller the gap is, while the worse the element performance of this rating is. When the area is negative, it proves that the element status is lower than the market benchmark. The larger the negative value is, the worse the performance is. In this experiment, we also take sum of all financial element representations as example: From the Table 2 and Fig. 2, we can conclude that the average operation ability of different ratings is consistent with their rating, the higher the level, the stronger the operational capability. Table 1 Operation stability of different rating

Table 2 Operation ability of different rating

Rating

Cosine similarity

A

0.9852

B

0.9837

C

0.9422

Rating

Intersection area

A

106.4060

B

44.1780

C

−40.2095

A Novel Dynamic Corporate Credit Rating Classification …

699

Fig. 2 Operation ability of different rating

We show the analysis between rating and market, while in other collocation analyses between entity and industry, entity and entity, and et al. can be conducted. More importantly, all analyses are time serial, that is, our approach involve essences of static and dynamic analysis.

4 Data Sets and Credit Ratings 4.1 Credit Rating Classifier The credit rating symbols used by domestic rating agencies are mainly formulated in accordance with the unified requirements of the “Specification for Credit Rating in the Credit Market and Interbank Bond Market, Part 2: Specification for Credit Rating Business” issued by the People’s Bank of China in 2010 [12]. The credit evaluation system of Ji’an Rating (Jian FinTech Corporation) adopted in this study is formulated according to this standard.

4.2 Data Sets According to the credit rating reports in 2020, we construct dataset with values from disclosed corporate financial statements with credit rating labels. Labels of the dataset are from corporate ratings of Chinese rating agency Ji’an rating, which evaluates all

700

B. Chen et al.

Chinese A-share companies. We selected 20 financial statement elements as input variables reflecting corporate operating abilities, which are Total Revenues, Sales revenue, Cash paid for Interest, Net Income, Cash paid for Inventory purchases, Cash paid for Wage expenses, Cash paid for Income taxes, Cash paid for General operating and administrative expenses, Cash receipts from customers and other operations, Cash receipts from the sale of investment securities, Cash receipts from Borrowing, Cash paid for Repayment of loans, Net Cash Flow from Investing Activities, Net increase in cash and cash equivalents, Decrease in inventories, Investment loss, Current Assets, Total Assets, Total Current Liabilities, Total Liabilities.

5 Conclusion In this paper, we propose a self-attentive gated recurrent architecture, SMAGRU, in credit rating classification. The model excludes human factors in the evaluation process to the most significant extent benefit from the dynamic weighting module. Each dataset covers as many entities as possible aim to simulate the entire market so that our involved indicators can be more representative. Via extensive experiments, we demonstrate that. Acknowledgements The work that is described in this paper was supported by the Research Funds of Xian International Studies University (Grant No. BSZA2019003).

References 1. Beaver, W.H.: Financial ratios as predictors of failure. J. Account. Res. 71–111 (1966) 2. Chepkoech, D., et al.: The Effect of Credit Assessment Process on Repayment of Bank Loans in Commercial Banks in Kenya. MBA Project, University of Nairobi (2014) 3. Altman, E.I., Saunders, A.: Credit risk measurement: developments over the last 20 years. J. Bank. Finance 21(11–12), 1721–1742 (1997) 4. Altman, E.I., Haldeman, R.G., Narayanan, P.: ZETATM analysis a new model to identify bankruptcy risk of corporations. J. Bank. Finance 1(1), 29–54 (1977) 5. Schmid, B.: Credit Risk Pricing Models: Theory and Practice. Springer Science and Business Media (2012) 6. Huang, G.-B., Zhu, Q.-Y., Siew, C.-K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No. 04CH37541), vol. 2, pp. 985–990. IEEE (2004) 7. Chi, G., Hao, J., Xu, Z., Zhu, Z.: Cluster analysis for weight of credit risk evaluation index. Syst. Eng. Theory Methodol. Appl. 10(1), 64–67 (2001) 8. Wu, L., Chen, L., Hong, R., Fu, Y., Xie, X., Wang, M.: A hierarchical attention model for social contextual image recommendation. IEEE Trans. Knowl. Data Eng. (2019) 9. Yang, Y., Chuang, H.: A dynamic financial ratio adjustment model. Glob. J. Bus. Res. 4(3), 1–10 (2010) 10. Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998–6008 (2017)

A Novel Dynamic Corporate Credit Rating Classification …

701

11. Wu, C., Ho, S.-J.K.: Financial ratio adjustment: industry-wide effects or strategic management. Rev. Quant. Financ. Acc. 9(1), 71–88 (1997) 12. China, P.s.B.o.: People’s Republic of China Financial Industry Standard: Specification for Credit Rating in the Credit Market and Interbank Bond Market, Part 2: Specification for Credit Rating Business. Chinese Law & Government, vol. 43, no. 3, pp. 67–85 (2010)

Innovation and Influence of Fresh Supply Chain Operation Mode Under COVID-19 Based on Network Data Analysis Caiyu Shi

Abstract The COVID-19 epidemic has brought about “difficulties in supply” of fresh goods, “difficulties in buying vegetables” for consumers, and safety of personnel. How to improve the operation ability of fresh supply chain and reduce the risk of cross infection is an important issue in fresh supply chain management under epidemic situation. Collect and sort out literature and network data of fresh supply chain operation in China under the epidemic situation. On the basis of the theory of supply chain management, research during the outbreak of the fresh concrete operating process and its innovation of supply chain operation mode to the economic and social influence, further analyzes the problems of fresh innovation of supply chain operation model, and from the perspective of government and fresh supply chain members put forward to further improve and deepen the fresh supply chain operating model innovation suggestions. Keywords COVID-19 · Fresh products · Supply chain operation mode · Supply chain management

1 Introduction COVID-19 is a major public health emergency with the fastest spread, the widest range of infection and the most difficult control since the founding of the People’s Republic of China. After the outbreak of COVID-19, to curb the spread of the epidemic, from January 23–29, all provinces in China launched provincial-level emergency response to major public health emergencies. With the implementation of epidemic prevention and control measures in various places, how to ensure the stable supply of fresh products necessary for three meals a day has become the most concerned issue for the community, the government and major fresh e-commerce enterprises. The COVID-19 outbreak has brought a huge impact on China’s traditional fresh supply chain. First, on the supply side, due to the obstruction of the C. Shi (B) College of Economics and Management, Beijing University of Technology, Beijing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_87

703

704

C. Shi

sale of fresh agricultural products resulting in a large number of unsaleable, farmers suffered heavy losses. According to the data collected by The “National Unsalable Agricultural Products Big Data and Supply and demand Docking Platform” jointly released by Brick Agriculture Big Data and Sannong Channel of People’s Daily. By 10:00 on February 18, 2020, the platform has accumulated 6,379 pieces of unmarketable/urgent sale information of agricultural products across the country, with a total weight of about 7.29 million tons. Second, the demand side changes rapidly. With the implementation of epidemic prevention and control measures in various places, consumers have shifted from offline to online. The surge in online orders of major fresh e-commerce companies has further brought about problems such as shortage of manpower and short supply of fresh goods. In the week following the lockdown in many places, the number of weekly active people in the DMALL, to 9.67 million. Third, the logistics and transportation of fresh products are blocked under the epidemic, and the two ends of supply and demand are seriously separated. Therefore, under the special background of COVID-19, this paper applies supply chain management theory to study the innovation and influence of fresh supply chain operation mode, which has important practical significance. In recent years, domestic and foreign scholars have mainly used mathematical models to discuss fresh agricultural products supply chain from the perspectives of fresh agricultural products ordering strategy [1, 2], pricing strategy [3, 4], supply chain coordination [5–7]. Focusing on the fresh supply chain operation mode innovation, Bao et al. [8] studied the supporting role of e-commerce platform on fresh agricultural products supply chain management. Parker et al. [9] conducted an empirical study on fresh agricultural products market and believed that e-commerce based on Internet technology could promote transparency in the downstream market of fresh agricultural products supply chain. Agbo et al. [10] compared and analyzed the operation situation of farmers’ direct selling locally, selling through cooperatives and selling through both ways, and pointed out that cooperatives can weaken market competition. It can be found from the above literature that the current research on the operation mode of fresh product supply chain is limited to the qualitative analysis of the characteristics and development strategies of the supply chain operation mode, and does not involve its practical application in the realistic background [8–10]. In the context of the COVID-19 epidemic, how to innovate the operation mode of fresh products supply chain and reduce the huge impact brought by the epidemic? This is the key problem to be solved urgently in the supply chain development of fresh products. Based on the impact of the epidemic on China’s fresh supply chain, this paper makes an in-depth study of four innovative operation modes of fresh supply chain and their positive impact on the economy and society. Finally, some suggestions on how to improve and deepen the innovation of supply chain operation mode are put forward.

Innovation and Influence of Fresh Supply Chain Operation Mode …

705

2 Innovative Operation Mode of Fresh Supply Chain Under COVID-19 2.1 Live Delivery Mode Live delivery mode is an innovative marketing mode in which fresh products farmers and businesses borrow Internet technology to sell fresh products in the form of live streaming under the continuous influence of the epidemic. Generally, see Fig. 1 there are two kinds: one is that fresh merchants with financial advantages can enter into various e-commerce platforms and invite web celebrity with its own traffic to conduct live sales with a certain commission. Consumers can choose and place orders by purchasing links in the network broadcast room. Fresh food merchants will deliver goods after integrating and obtaining order information through the ecommerce platform. The other is for ordinary fresh farmers with limited resources and difficult to expand their personal flow. During the epidemic, major fresh e-commerce platforms have launched a love for agriculture program to help agriculture-related businesses open live broadcasts free of charge and provide exclusive flow support. Local government officials and fresh farmers went into the broadcast room to speak for local fresh agricultural products. At the same time, with the assistance of local governments, a green logistics channel was opened to let agricultural products go directly to consumers through express delivery.

Fig. 1 The specific flow chart of live delivery mode

706

C. Shi

Fig. 2 The specific flow chart of contactless distribution mode

2.2 Contactless Distribution Mode Contactless distribution mode is an innovative distribution mode that contributes to epidemic prevention and control by avoiding direct contact between users and riders. See Fig. 2, First of all, when users choose fresh products to place orders through the fresh e-commerce App or other programs that provide contactless delivery services, they can note in the order page whether to choose contactless delivery or not. Riders pay attention to the customer’s remarks when receiving orders. At the same time, the rider will call the user in advance to confirm whether to choose the service, and then the rider and the user will further determine the location of the goods on the platform. Before delivery, the delivery personnel will measure the body temperature and disinfect the box and hands with disinfectant, and then put on masks and gloves for delivery. The delivery personnel will leave the products at the designated location according to the previous agreement, and the user will pick up the products at the designated location after receiving the express delivery notice.

2.3 Shared Employee Model The shared employee mode refers to the cooperative employment mode in which some enterprises, which are difficult to resume work, use the shared mode to export short-term manpower under the continuous influence of the epidemic. Generally, See Fig. 3 there are two kinds: one is that the demander enterprise issues a Shared employee announcement to the supplier enterprise, and the supplier enterprise employees voluntarily sign up to participate. After the interview and training, the staff will go through the entry procedures. The second way is to realize supply and demand docking through the third-party employee sharing platform. Supplier enterprises and demand enterprises release labor output information and tight demand information on the third-party platform respectively, and use the third-party employee sharing

Innovation and Influence of Fresh Supply Chain Operation Mode …

707

Fig. 3 The specific flow chart of shared employee mode

platform to realize the supply and demand docking between enterprises through big data in the background.

3 Analysis on the Impact of Fresh Supply Chain Operation Mode Innovation Under COVID-19 3.1 Analysis on the Impact of Live Delivery Mode Under COVID-19 Strengthen the match between supply and demand, and alleviate the contradiction between supply and marketing of fresh agricultural products in cities which are in short supply and a large number of unmarketable agricultural products in rural areas. As of March 4, Taobao had sold 87,000 tons of nearly 4000 unsalable agricultural products online. Alibaba claims that the “Farmer assistance Program” is not limited to short-term sales, but to truly improve the ability to integrate the whole link of these agricultural products from the source of origin to the consumer side, namely, “blood donation for farmers”. Create new jobs and relieve the employment pressure. According to zhaopin.com, within one month after the Spring Festival, the number of online live-streaming recruitment posts increased by 83.95% year on year, and the number of recruitment increased by 132.55%. Among them, the number of live-broadcasting posts recruited by Internet/e-commerce platforms focusing on selling goods accounts for one third of all live-broadcasting posts, with the highest proportion.

708

C. Shi

3.2 Analysis of the Impact of Contactless Distribution Under COVID-19 Ensure the health and safety of riders and consumers at the end distribution link. To combat the outbreak, Meituan takeout launched the first “contactless delivery” in China on January 26. Subsequently, each major fresh e-commerce platform launched “contactless delivery” service to minimize the direct contact between people, so as to realize the safe delivery of fresh products and contribute to the prevention and control of the epidemic. Improved the delivery efficiency of riders and alleviated the pressure of delivery personnel shortage. In the contactless distribution mode, the delivery personnel will negotiate with the customer in advance and deliver the goods to the designated location. Such a distribution method greatly reduces the rider’s waiting time for customers, greatly improves the distribution efficiency and reduces the distribution cost. Meituan, Dada group, Suning logistics, Tmall supermarket, Cainiao bundle and Daily Fresh all issued their own contactless distribution standards, which helped relieve the pressure of distribution personnel shortage and improve distribution efficiency.

3.3 Analysis of the Impact of Sharing Employee Mode Under COVID-19 Realize the free and efficient flow of human resources and alleviate the development dilemma of enterprises. On the one hand, the Shared employee mode can help the catering, entertainment and other enterprises to relieve the financial pressure caused by the large number of idle personnel. On the other hand, help fresh e-commerce enterprises to solve the shortage of manpower and lack of transportation capacity due to the surge of online orders. For example, during the epidemic, the “Shared staff” program among Hema, Yunhaiyao and Youth restaurants helped enterprises such as Yunhaiyao and Youth restaurants relieve the huge pressure of paying employees, and also helped them obtain enough labor force at a lower cost in the situation of staff shortage. Provide employment opportunities for a large number of idle employees to ensure people’s livelihood. In the severe employment situation, the Shared employee mode injects new vitality into the job market with flexible employment methods. At a press conference on the joint prevention and control mechanism of the State Council on March 23, according to data released by the State Administration for Market Regulation, the Shared employee mode implemented by retail enterprises and catering enterprises has solved the employment problem of more than 4 million catering workers.

Innovation and Influence of Fresh Supply Chain Operation Mode …

709

4 Relevant Policies and Suggestions on Deepening Fresh Supply Chain Operation Mode Innovation 4.1 Analysis of Existing Problems and Suggestions for Improvement of Live Delivery Mode Aiming at the imperfect system and standard in the live broadcast industry. It is suggested that relevant government departments should establish and improve relevant policies and laws in the live-streaming e-commerce industry. Responsibilities and obligations of relevant platforms, operators, anchors and other participants in the live broadcast e-commerce industry should be clearly defined and divided, and codes of conduct, applicability of standards, terminology and other aspects in the live broadcast should be clearly defined to guide its healthy and orderly development. Aiming at the low threshold of anchors and the problems of false propaganda, etc. It is suggested that live-streaming platforms strengthen the standardized management of anchor groups. On the one hand, when recruiting anchors, live streaming platforms strictly screen them after understanding their background information, and try their best to select anchors with moral and social responsibility. On the other hand, live streaming platforms should establish a strict access system for the products sold through live streaming, strictly inspect and screen the products, and promote the safety and standardization of live streaming with goods. It is difficult to guarantee the quality of products. Fresh farmers and merchants should adopt advanced planting technology, implement standardized planting and breeding, ensure the quality of fresh products, and improve the trust of consumers. Second, standardize transportation. Farmers and merchants shall select, pick, weigh, pack and deliver fresh products in accordance with the standards, and ensure that every step is carried out in strict accordance with the standards and specifications. Third, fresh enterprises do a good job in after-sales service to ensure customer satisfaction and repeat purchase rate.

4.2 Analysis of Existing Problems and Improvement Suggestions of Contactless Distribution Mode Aiming at the imperfect standards of contactless distribution mode. It is suggested that local government departments and relevant e-commerce enterprises and platform enterprises jointly develop the actual standards and specifications of “contactless distribution mode” according to different situations in different regions. The standards and precautions that distribution personnel need to implement should be clearly defined, whether before, during, or after delivery to a specified location. Aiming at the problem of incomplete supporting facilities of contactless distribution mode. It is suggested that the government and e-commerce enterprises actively

710

C. Shi

promote the construction of “contactless delivery service” infrastructure. Support the establishment of fixed or temporary storage platforms, intelligent self-picking cabinets and other facilities and equipment in each community to provide equipment guarantee for contact-free distribution. In addition, relevant units or departments are encouraged to reasonably plan space in office buildings, hospitals, schools and other places, and promote contactless supporting facilities such as smart buffet. For goods damaged, taken wrong or stolen, etc. It is suggested that fresh ecommerce enterprises conduct standardized management of the whole process of express goods. First of all, ensure that the distribution personnel must have a good professional ethics and sense of responsibility, and the entire distribution process to track the whole process. Platform enterprises should timely deal with consumers’ evaluation information and commodity quality issues to improve user satisfaction.

4.3 Analysis of Existing Problems and Suggestions for Improvement of Shared Employee Mode The laws and regulations related to the shared employee mode are not yet sound. For the legislative sector, it is necessary to accelerate the establishment and improvement of laws, regulations and policies related to the new employment mode of Shared employees. The staff nature, application category, operation standard and different forms of the Shared staff mode should be clearly stipulated from the institutional level. The labor relations and safety responsibilities involved in the Shared employee model are clearly standardized and scientifically defined. In view of sharing employee related support platform and incomplete technology. Local governments should actively promote and support the establishment of third-party employee sharing platforms with professional qualifications, so that the “employee sharing” supply–demand docking platform can fully open the information channels between supplier enterprises, demand-side enterprises and employees. In addition, the establishment of the shared employee platform should make full use of the emerging advanced technologies of the Internet, such as big data, cloud computing and block chain, so as to achieve efficient and free matching between the supply and demand sides and real-time feedback of supply and demand regulation.

5 Conclusions Based on the great challenge of COVID-19 epidemic on China’s traditional fresh supply chain, this paper studied the specific operation process of fresh supply chain innovative operation mode by using supply chain management theory and analyzed its positive impact on China’s economy and society during the epidemic period. Finally, this paper proposes improvement Suggestions for the existing problems in

Innovation and Influence of Fresh Supply Chain Operation Mode …

711

the innovative operation mode of the fresh supply chain in China from the perspective of the government and each member of the fresh supply chain, so as to realize the benign development and become a long-term mechanism after the epidemic.

References 1. Abad, P.L.: Optimal price and order size under partial backordering incorporating shortage, backorder and lost sale costs. Int. J. Prod. Econ. 114(1), 179–186 (2008) 2. Lee, Y.P., Dye, C.Y.: An inventory model for deteriorating items under stock dependent demand and controllable deterioration rate. Comput. Ind. Eng. 63(2), 474–482 (2012) 3. Ye, T.F., Sun, H.: Price-setting newsvendor with strategic consumers. Omega 63(9), 103–110 (2016) 4. Li, R.H., Teng, J.T.: Pricing and lot-sizing decisions for perishable goods when demand depends on selling price, reference price, product freshness, and displayed stocks. Eur. J. Oper. Res. 270(3), 1099–1108 (2018) 5. Cai, X., Chen, J., Xiao, Y., Xu, X.: Optimization and coordination of fresh product supply chains with freshness keeping effort. Prod. Oper. Manag. 19(3), 261–278 ( 2010). (in Chinese) 6. Wong, W.K., Qi, J., Leung, S.Y.S.: Coordinating supply chains with sales rebate contracts and vendor-managed inventory. Int. J. Prod. Econ. 120(1), 151–161 (2012) 7. Blackbumn, J., Scudder, G.: Supply chain strategies for perishable products: the case of fresh produce. Prod. Oper. Manag. 18(2), 129–137 (2009) 8. Bao, L., Huang, Y., Ma, Z., et al.: On the supply chain management supported by E-commerce service platform for agreement based circulation of fruits and vegetables. Phys. Procedia 33, 1957–1963 (2012) 9. Parker, C., Ramdas, K., Savva, N.: Is it enough? Evidenee from a natural experiment in india’s agriculture markets. Manag. Sci. 10, 1–23 (2016) 10. Agbo, M., Rousseliere, D., Salanie, J.: Agricultural marketing cooperatives with direct selling: a cooperative–non-cooperative game. J. Econ. Behav. Organ. 109, 56–71 (2015)

A Louvre Emergency Escape Model Based on Ant Colony Algorithm Wenwen Cao

Abstract Based on ant colony algorithm, our paper establishes an evacuation model of the Louvre. Firstly, we determine the research object of the model. The Louvre exhibition area can be divided into six parts (A–F), and evacuation exit of each part is determined. We can change the multi-exit evacuation problem into multiple single-exit evacuation problems by this means. Then each part is subdivided into several small areas. Visitors in each small area are regarded as a whole and evacuated under the leadership of the regional staff. Thus, evacuation state is transformed from disorder to order. Therefore, we can define that our research objects are groups which consist of visitors and staffs in each small area. Secondly, we establish an evacuation model based on ant colony algorithm. First of all, the starting nodes, intermediate nodes and destination nodes of evacuation are determined according to the region divided at the first step and actual structure of the Louvre. Then, according to the model, the optimized evacuation route and the minimal distance for each small area can be obtained. Taking area 1 on the second floor of part B as an example, the preliminary evacuation route (4, 1, 3, 5, 7, 15, 14, 2, 6, 13, 10, 9, 11, 12, 8) and the corresponding minimal distance (274.44) are obtained. (The node number corresponds to the actual location according to the appendix.) Keywords Ant colony algorithm · Evacuation route optimization · Evacuation model

1 Introduction Located on the North Bank of the Seine River in the center of Paris, the Louvre is the first of the four major museums in the world. With the increasing number of terrorist attacks in France, the Louvre is facing a huge threat. In order to do our best to avoid the tragedy, we must establish an appropriate evacuation plan to deal with emergency circumstances. W. Cao (B) College of Computer and Information Science, Southwest University, Chongqing, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_88

713

714

W. Cao

The essence of evacuation in emergencies can be abstracted as an optimized mathematical model, that is, people evacuating from a specific location, going through some nodes on the way, and finally going out of buildings safely [1]. The core problem of evacuation is to make all evacuating objects can evacuate from the building orderly in the shortest time. According to the idea, this paper establishes an evacuation model based on ant colony algorithm. Finally, through the simulation of MATLAB, we can get the optimal escape routes in different regions.

2 Assumptions To simplify the problem and make it convenient for us to simulate real-life conditions, we make the following basic assumptions, each of which is properly justified [2]. (1) (2) (3) (4) (5)

(6) (7)

We think that every tourist is the same, that is, the same speed of movement, the same time to go upstairs or downstairs. We believe that before entering the museum, all visitors know that they should obey the instructions of the staff when a terrorist attack occurs. We think all aisles are of the same width. All corridors are of the same width. We ignore the interaction of tourists in different zones. We believe that the circulation capacity of the Passage Richelieu entrance, the Carrousel du Louvre entrance, and the Portes Des Lions entrance is comparable and smaller than that of Pyramid Entrance. We think the density of people in the exhibition area is the same. Because there is no exhibition hall on the second floor, we think that no one on the second floor in case of disaster. According to the requirements, people on negative first floor can only evacuate to Ground Floor, but not to the negative second floor.

3 Model Establishment 3.1 Principle of Ant Colony Algorithm Ant colony algorithm is an algorithm inspired by the process of ant foraging. In the search for food, ants leave volatile pheromones along the path. The shorter the path is, the more pheromone accumulates [3]. It will guide the ants to find the shortest path. A typical example is the double bridge experiment, as shown in Fig. 1. 1. 2. 3.

When the lengths of the two bridges are equal, the ants will eventually concentrate on one of the roads; When the lengths of the two bridges are not equal, the ants will eventually concentrate on the shorter bridge. A few ants also choose a longer path.

A Louvre Emergency Escape Model Based on Ant Colony Algorithm

715

Fig. 1 Ant colony algorithm-double bridge experiment

4.

When the ants are concentrated on one path, a shorter path is added. It is difficult for the ants to follow the new path, leading to the local optimal solution easily.

3.2 Mathematical Model of Ant Colony Algorithm Let m be the number of ants, n be the number of nodes, and bi (t) be the number of ants at the node. m=

n 

bi (t)

(1)

i=1

Let V be a set of n nodes, E be a set of edges (arcs) between two nodes, and ri j (t) be the Pheromone concentration on the path i, j at time t,  = {τi j (t)|vi , v j ∈ V } be the set of pheromone concentrations remaining on the path i, j of the two nodes in the set V at time t. The pheromone concentrations are equal on each path at the initial time. The optimal path selection based on ant colony algorithm is realized by finding the node in the directed graph G = (V, E, T ) to obtain the minimum cost. During the movement of ant k(k = 1, 2, . . . , m), the direction of the transfer is determined according to the concentration of pheromone on each path. pkij (t) =

⎧ ⎨  [τij (t)]α ·[nij (t)]β ⎩

α β s∈allowedk [τis (t)] ·[ηis (t)]

0,

, j ∈ allowed j∈ / allowedk

(2)

In the formula: • allowed = {V − tabu k }—the allowing selected node in the next step of ant k • α—Information heuristic factor, reflecting the relative importance of pheromones • β—Expectation heuristic factor, reflecting the importance of heuristic pheromone when ant choosing a certain path. • ηi j (t) is a heuristic function whose expression is as following:

716

W. Cao

ηij (t) =

1 dij

(3)

In the formula: di j —the distance of path i, j between two neighboring nodes i, j. For ant k, the smaller di j is, the larger ηi j (t) is, and the larger pikj (t) is. Apparently, the heuristic function reflects the expectation degree of the ant form node i to node j. After each ant has completed one step or completed traversal of all n nodes, the residual information is updated. We use τi j (t) to represent the pheromone concentration on path i, j at time t, so we can obtain the pheromone concentration on this path at time t + 1 is as following: τij (t + 1) = (1 − ρ)τij +

m 

τkij (t)

(4)

k=1

In the formula: • ρ—Pheromone volatilization coefficient, ρ ∈ [0, 1), thus, 1 − ρ representing the pheromone concentration residual factor, which also representing relative importance of residual pheromones. • τi j (t) represents the increment of pheromone concentration on path i, j between time t and t + 1. At the initial moment, τi j (0) = 0. τi j (t) represents the increment of pheromone concentration on path i, j between time t and t + 1 of ant k. According to various pheromone update strategies, Dorigo proposed three different basic ant colony algorithm models, which are called Ant-Cycle model, Ant-Quantity model and Ant-Density model [4]. The difference is that the ant k is the different solution of the increment of pheromone concentration on path i, j between time t and t + 1 at time t. This paper is based on the Ant-Cycle model. In the Ant—Cycle model:  k τi,j (t, t + n) = f(x) =

Q , Lk

0,

Eage (i, j) on the path of ant k otherwise

In the formula: • Q—Total pheromone concentration released by each ant. • L k —Total Path Cost of the k Ant, equaling to the sum of the costs required • Ci j on each of the paths when ant k passed. In the Ant—Quantity model:

(5)

A Louvre Emergency Escape Model Based on Ant Colony Algorithm

 k τi,j

=

Q , dij

0,

Eage(i, j) on the path of ant k other wise

717

(6)

Parameters of Ant colony algorithm: Pheromone volatilization coefficient ρ, Information heuristic factor α, expectation heuristic factor β, The number of ants m, etc. [5]. The selection method and selection principle of all the parameters will directly affect the global convergence and efficiency of the ant colony algorithm. 0 ≤ α ≤ 5, 0 ≤ β ≤ 5, 0.1 ≤ ρ ≤ 0.99, 10 ≤ Q ≤ 1000

(7)

In this paper, we refer to the effective method of selecting the optimal combination parameters of ant colony algorithm by “three steps” which was proposed by HaiBin Duan and some other scholars, and the optimal parameter configuration in the AnyCycle model is: α = 1, β = 5, ρ = 0.5

(8)

3.3 Multi-ant Colony Algorithm Based on Ant Colony Algorithm In this paper, the Louvre is divided into several small areas. In this paper, we think that visitors of each small area can be regarded as a small ant colony, which corresponds the actual situation [6]. Besides, we think that the ant colony does not interfere with each other during their movement. Each section and stairs is numbered. As a result, the evacuation route taken by each ant colony may vary (Fig. 2).

Fig. 2 Multi-ant colony schematic

718

W. Cao

Fig. 3 Plan for Louvre

3.4 Application of AG in Evacuation Model 3.4.1

Divide the Exhibition Area of the Louvre

The Louvre consists of −2 to 2 layers, for a total of 5 floors. According to the location of the exit and the exhibition hall, the Louvre is divided into six parts A, B, C, D, E and F. Because the ant colony algorithm is applicable to the single-exit problem, we respectively establish the corresponding exits for the six parts, thus translating multiple-exit issues into multiple single-exit issues [7]. Each area of each floor of A, B, C, D, E will be subdivided into 4 small areas, and exhibition region of part F area only located on the ground floor and first floor. Each floor of the F area will be divided into 3 A small area (Fig. 3). This model treats each small area as a whole. (The specific division is shown in the figure).

3.4.2

Implementation Modalities

Opening more hidden exits will increase the speed of evacuation, but these secret exits will also be made public. In this regard, the strategy of this paper is to prohibit visitors to go through such exits. When an emergency occurs, secret exits are used for the entry of security personnel. Visitors evacuate from the four main entrances and

A Louvre Emergency Escape Model Based on Ant Colony Algorithm

719

exits. Each small area is staffed with at least one staff member. Once in the event of an emergency, staff from each small area will lead the visitors in this area to evacuate. In the Internet+ mode, the background can set the best real-time evacuation plan for each small area [8]. The route calculated in the background will be sent to the staff’s tablets and all the visitors need to do is to follow the corresponding staff at this time to evacuate from Louvre.

3.4.3

Determining Node Coordinates

The corresponding center point of the divided small area, the stair position of each floor, and the exit position are taken as evacuation nodes. The center point of each small area is used as the starting node for evacuation of visitors in the area, and the center point of passed area and the stair position of each floor are taken as intermediate nodes. The large areas (A, B, C, D, E, F) correspond to the exit as the determination nodes of evacuation. The evacuation route of visitors from small areas consists of starting nodes, intermediate nodes, and determination nodes. The nodes on different floors are vertically projected to the corresponding positions on the ground floor, and the distance to the end point is the horizontal moving distance. Its vertical moving distance is the total length of the stairs [9]. In the actual situation, the evacuation speed of the tourists in the vertical direction is lower than the evacuation speed in the horizontal direction, and we have assumed that the evacuation speed is constant. Therefore, the length of the path is used to indicate this difference in evacuation speed [10]. We will equal the distance through the stairs to twice the actual situation.

3.5 Algorithm Implementation The pi j and i j are the same as the traditional ant colony model in the multi-ant colony model. According to the above model, the flow chart of the multi-ant colony algorithm is as follows (Fig. 4).

4 Model Solution Before solving the problem, we have divided the Louvre into six areas: A, B, C, D, E and F. In this paper, we have solved the optimal solution of each small area and obtained the optimal route of each small area. In this chapter, we only show the specific solution method and results of part B, floor 2 and area 1. The rest of the results will follow the same method.

720

W. Cao

Fig. 4 Algorithm flow

4.1 Tourist Evacuation Routes Step one: Initialize the program and set the parameters of ant colony algorithm (Table 1). Table 1 Initialization list of program parameters

Symbols

Meanings

m = 50

m: Number of ants

α=1

α: Parameters of pheromones

β=5

β: On the factors of Heuristic Factor

ρ = 0.1

ρ: Pheromone evaporation coefficient

I teration_max = 200

I teration_max: Maximum number of iterations

Q = 100

Q: Pheromone increasing intensity coefficient

A Louvre Emergency Escape Model Based on Ant Colony Algorithm

721

Fig. 5 Preliminary optimization results

Step two: The B21 coordinates are substituted into the program. The optimal route, the average distance after iteration and the shortest distance after optimization can be obtained. (Fig. 5. The left figure is the path, and the other is the distance.) Step three: Result analysis: Through the simulation of MATLAB, we get the best escape route, which is composed of several nodes. We have numbered each node in the road map [7], so we can get the real escape route (Fig. 6. Realistic escape route). Step four: Result analysis: Visitors in B1 area escape according to the black dotted line. In B1 area, they pass through several nodes to the staircase entrance of the second floor, descend to the first floor, and then pass through several nodes after reaching the 0th floor, and finally escape. This also conforms to the conventional escape logic. The shortest path distance is 274.44. Note: This value is only a comparison, not a unit of length. Fig. 6 Realistic escape route

722

W. Cao

Fig. 7 Road map for security personnel

4.2 Security Personnel Entry We assume that there are three secret passages, all of which are on the 0 floor. While the tourists escape, the security personnel enter the control scene from the secret passage (Fig. 7).

5 Policy and Recommendations 1. 2.

According to Fig. 3 exhibition area in the Louver is divided into several small areas, it is necessary to arrange at least one professional staff at each small area. To guarantee the expertise of staffs when emergencies happen, it is essential to train staffs and make sure them (1) (2) (3) (4)

Know the area which they in charge of. become familiar with structure of the Louvre and safe evacuation route in every small area. Have the ability and proficiency to use online application which can reflect real-time evacuation situation. Have awareness of take care of special groups such as the disabled.

References 1. Proulx, G.: Occupant response during a residential high rise fire. Fire Mater. 23, 273–279 (1999) 2. Burstedde, C., Klauck, K., Schaschneider, A., et al.: Stimulation of pedestrian dynamics using a two-dimensional cellular automaton. Phys. A 295(3–4), 507–525 (2001) 3. Lu, J., Fang, Z., Lu, L.: Digital model of evacuation speed of building personnel. J. Wuhan Univ. 35(2), 66–70 (2002). (in Chinese) 4. Thompdon, P.A., Marchant, E.W.: A computer model for the evacuation of large building populations. Fire Saf. J. 24, 131–148 (1995) 5. Song, W., Shuai, B., Zhong, P.: Study on Evacuation Scope of Dangerous Goods Transportation Accidents Caused by Terrorist Attacks. Safety and Environment (2015) 6. Li, X.: Experimental Study on Evacuation Behavior of Personnel. Tsinghua University (2008). (in Chinese)

A Louvre Emergency Escape Model Based on Ant Colony Algorithm

723

7. Li, J.: Simulation and Experimental Study of Evacuation Cellular Automata Considering Environmental Information and Individual Characteristics. University of Science and Technology of China (2008). (in Chinese) 8. Zhou, P.: Study on the Optimum Evacuation Route for Mountain High-speed Railway Tunnel Fire Emergency Based on Ant Colony Algorithms. SouthWest JiaoTong University (2015). (in Chinese) 9. Zheng, X., Zhong, T., Liu, M.: Modeling crowd evacuation of a building based on seven methodological approaches. Build. Environ. (2008). (in Chinese) 10. Noren, A., Winer, J.: Modelling Crowd Evacuation from Road and Train Tunnels—Data and Design for Faster Evacuations (2003)

Ubiquitous Power Internet of Things and IPv6 Technologies in Wireless Access Terminals and Intelligent Meter Reading Applications Liang Dong, Yan Zhuang, Jie Xu, Hao Xu, Yue Guo, Ning Xu, Liang He, and Jie Wang Abstract Under the background of the rapid development and innovation of modern information technologies such as communication technology, artificial intelligence and Internet of Things technology, power grid form is also accelerating towards information generalization and intelligentization. The ubiquitous power Internet of things and IPv6 technology, which can better adapt to the era of intelligence, have become the solid technical foundation of smart grid. Ubiquitous power Internet of Things and IPv6 technology play a crucial role in the whole power system. The combination of the two can effectively solve the problems of slow response time and heavy workload of personnel inspection caused by various production systems in the current substation due to their respective independence. Combining the two into wireless access terminal and intelligent meter reading is an important milestone for power communication network to realize Internet intelligence. This research through analyzing the characteristics of the power of things and IPv6 technology, is proposed based on the combination of low voltage electrical equipment monitoring method, by improving their communication unit hardware circuit, expand the network communication protocol, and discusses the typical application scenarios analysis, case study, according to the results of the test data capacity, freeze the success rate reached 99.93%, crosstalk between each meter is strong, and 100% success rate, verify the advancement and the effectiveness of the argument in our study. This study also gives Suggestions on the future networking application of the ubiquitous power Internet of Things, advocates the promotion of intelligent terminals, and strives to promote the deep integration of power network and information technology, which again shows that this study is forward-looking and advanced. Keywords Ubiquitous in power internet of things · IPv6 technology · Wireless access terminal · Smart meters

L. Dong · Y. Zhuang (B) · J. Xu · H. Xu · Y. Guo · N. Xu · L. He · J. Wang State Grid Information and Communication Branch, Hubei Electric Power Co. Ltd., Wuhan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_89

725

726

L. Dong et al.

1 Introduction The ubiquitous power Internet of Things provides a stable and powerful guarantee between energy use and energy production balance through the high-speed transmission and information transformation generated by various internal equipment and tools, and also promotes the power grid system to maintain a more stable and open system and make an agile response to the demand of the power market [1]. It can be said that the ubiquitous Internet of Things technology strongly promotes the construction speed and effect of all-round energy ecosystem, and has been applied more and more widely in the whole power industry, and provides strong support and technical guarantee for the evaluation of power grid assets [2]. At present, major countries in the world regard the Internet of Things as a major strategy to seize the commanding heights of the new round of economic and technological development. They have clearly stated that they want to promote the formation of demonstration-leading regions for key technologies of the Internet of Things, and take “Internet of Things+ Information technology” as a key area in the national action plan [3]. China has also raised the Internet of Things as a strategic industry to a new height of national development priority. In 2019, The State Grid Power Company made it clear that it wanted to build and test run the “ubiquitous power Internet of Things". In the newly compiled Outline of the 13th Five-Year Plan, it is also clearly proposed to promote the construction of the Internet of Things to include “cloud, network and terminal” to create a “co-generation and co-existence” power distribution mode with smart grid [4, 5]. Aiming at the inconsistency of different access network fusion schemes and corresponding mobility management technical standards, Chinese researchers have done a lot of work and proposed a general mobility management technical scheme that can effectively fuse heterogeneous networks based on the interoperability of specific switching modes between networks [6, 7]. In terms of research ideas, a converged SIP framework based on mobile IPv6 management protocol is proposed to jointly optimize the mobile management at the network layer and the mobile management at the application layer [8]. These research results at home and abroad fully reflect the power grid industry attaches great importance to the construction of ubiquitous power Internet of things, and also reflect that the construction goal of intelligent power network is to achieve effective interconnection and comprehensive perception [9]. On the basis of existing researches, this paper will integrate the strong antijamming, high reliability and security performance of IPv6 technology into the wireless access terminal of power network and intelligent meter reading application, focusing on the solution of short-distance communication in wireless meter reading. In order to make the research design meet the established requirements, the most cutting-edge wireless communication chip is selected among a number of chips to ensure the safety of electrical energy transmission from power users to relays. Considering the fact that there is less I/O in IPv6 technology, this paper selects the serial interface smart meter acquisition module to realize the real remote meter reading.

Ubiquitous Power Internet of Things and IPv6 Technologies …

727

2 Ubiquitous Power Internet of Things and IPv6 Technologies 2.1 Intelligent Ubiquitous Power Internet of Things Technology Since the operation of power Internet of Things system requires the support of operating parameters of relevant equipment, ensuring the accuracy of measurement parameters is the key to ensure the smooth operation of power Internet of Things system. The key of using parameter measurement technology is to master the principle of measuring parameter technology and apply it to the data detection, analysis and adjustment of relevant equipment, so as to lay a good foundation for the real-time operation of power equipment. The operation process of power Internet of Things can no longer rely on manual accurate reading, because the operation of the system is built on the basis of code support. In order to realize efficient operation, the power system must be supported by stable data fusion technology and flexible communication mode. The sensor designed in the power Internet of Things compresses the collected information before the information transmission function runs, so as to filter the data loss caused by too much data, such as too slow data transmission speed. After the completion of the data compression, the sensor will be transmitted to the network convergence center in the first time, and complete the depth fusion processing, at the same time, communication equipment and sensors have more jump function also provides a convenient wireless communications, make the function of the wireless communication effect more rich and stable, the working efficiency of the power system has been effective promotion.

2.2 Key Technologies of IPv6 Perception Layer With the rapid development of the Internet, the limitations of IPv4 are becoming more and more prominent, and the emergence and use of a new generation of IP protocol is urgently needed. Therefore, the application scope of the new generation Internet protocol IPv6 is becoming more and more extensive. Its wide application is mainly due to the good characteristics of IPv6 which provides support for some applications of wireless sensor networks and lays a technical foundation for the development of wireless sensor networks. Security and wide address space are its most prominent characteristic attributes. (1)

High safety Security is particularly important in wireless sensor network applications. In the development of IP protocol, security has always been a very important concern. Authentication and access control for different users are important

728

(2)

L. Dong et al.

policies of security services. In terms of consistency, it mainly includes mandatory measures such as preventing data from being modified in the transmission process, spoofing at the transmission source and resisting replay attacks. There are also services that use confidentiality and non-reproducibility and are protected by denial of attack. Wide address space Wide address space is a basic feature of IPv6, which provides possibilities for the full application and coverage of wireless sensor networks. In smart grid, if the hair, lose all, variable, distribution and utilization to realize network interconnection, at least need billions of an address to the building and connected to the network, with a different IP address to distinguish between different devices and users, so that the network security warnings to become more accurate, thereby improve the emergency ability.

3 Technical Scheme and Algorithm Description The time reference on each physical channel of three-phase AC power is separated by 3.1 ms, and the carrier signals are combined according to their respective time reference. The transmission of three-phase signals in different time gaps can be compared with the time issued by concentrator command according to the zero crossing moment of each phase, and the supply phase of the carrier module can be accurately identified. By comparison, it can be seen that there are two ways to solve the conflict, one is before the conflict and the other is after the conflict. For the three-phase table module hardware only have single phase zero crossing detection circuit design, software to identify ways to realize phase sequence identification, three-phase watt-hour meter as phase combined with A benchmark (A) connect the zero circuit, combined with intelligent three-phase watt-hour meter is, reverse phase sequence information, and can judge the three-phase table of six kinds of connection types. A certain algorithm is used to solve the conflict, and the CSMA with conflict detection is used. In this way, the agreement resolves conflicts by retreating after they arise. The nodes in the perception layer have strong mobility, and due to their low storage capacity and processing capacity, there is a high probability of collision when obtaining addresses. Therefore, it is necessary to operate on the address and change it with some algorithm, so as to deal with conflicts. After the sensing node generates an address, it first conducts conflict detection. After a certain period of time, if there is no conflict response, it means the address does not conflict. If a conflict occurs, the old address is shifted. This algorithm can automatically detect the collision avoidance in the best case. Suppose that the first generation is an eight-bit binary sequence, with a 1/28 chance of collision in the presence of a large number of such nodes. The binary number generated in the second time is between 0 and 64. When shifted, it can move 8–56 bits to the left. After shifted, the address space can be expanded to 64 bits, so the

Ubiquitous Power Internet of Things and IPv6 Technologies …

729

probability of no conflict after shifted is:  23  64  1  1 1 1 220 − 1 1 1− 6 2 + ∗ 2 ∗ 2 ∗ = ≥ 1 − 2 2i i=24 2i 26 216 220 i=16

(1)

In the above equation, 1/26 is the probability of occurrence of frequencies from 0 to 64; 1/2i (i = 16 … 64) is the probability of address conflict generated after the shift. These results show that there is a high probability of no conflict in the generated addresses after one shift, which basically meets the requirements.

4 Analysis of Application Examples Through field test demonstration and laboratory data comparison, this study concluded the wireless interconnection standard, and selected the case of M urban and rural area and N high-rise residential area for field pilot verification. Based on the in-depth application characteristics of intelligent meter reading of ubiquitous power Internet of Things and IPv6 technology, the test and demonstration link in this paper mainly selects the three-phase unbalanced management, household transformer file management, measurement anomaly management, data high-frequency acquisition and real-time fee control as supporting application functions.

4.1 Case of Urban and Rural Fringe There are 312 single-phase electricity meters and 41 three-phase electricity meters in the urban and rural area, and the success rate of network access is 100%. The results of field pilot data are shown in Table 1. According to statistics, the success rate of daily freezing reached 99.93%, and the concentrator could be successfully connected to the main station of the acquisition system through 4G module. The functions of phase identification, power outage report and voltage monitoring have been well applied in this case, and the upgrading test, networking test, meter reading delay and meter reading success rate all meet the acceptance criteria.

4.2 Case Analysis of High-Rise Residential Area A total of 1093 smart electricity meters are installed in the high-rise residential area of the research constituency, and all data acquisition channels are connected to the electricity information acquisition master station through the concentrator 4G module. During the test, there was strong crosspotation among the electricity meters,

730

L. Dong et al.

Table 1 Urban and rural pilot test data Test site

Function point

Subterm

Test results

Urban–rural fringe of M

Phase identification

Phase identification rate of single phase table

99.92%

Three-phase table phase sequence identification rate

99.73%

Error line identification rate

97.75%

Voltage monitoring rate

100.00%

Abnormal reporting accuracy

99.91%

Entire network upgrade

2683 s

Point to point upgrade

32 s

Voltage monitoring

Upgrade Success rate of meter reading

Daily freezing success rate 99.93% Point copy success rate

99.95%

Success rate of fee control 99.89% Average meter reading delay

Some copy

517 ms

Concurrent meter reading

89 ms

Power failure report

Single report accuracy rate 99.97%

Network performance

Stability

Report accuracy of the whole area

98.90%

Cut in networking

1025 s

New module into the network

24 s

Crash

0.30%

and the collection success rate was 100%. The collected field test data are shown in Table 2. The success rate of one-time collection of daily frozen data from the main station called test points reached 99.97%. Compared with the original narrowband carrier communication scheme, the communication scheme can effectively solve the crosstalk problem of multiple stations through multi-network coordination mechanism, and the application effect of non-metering functions such as phase identification, power outage reporting and voltage monitoring is also very excellent.

4.3 Peak Rate In the case simulation environment, TCP is used as the upper or lower computer to send a 128-byte TCP packet. After the transmission is initiated and stabilized, iPERF tool is used to measure data and record the port peak rate. The measured results are shown in Fig. 1. It can be seen from the figure that the uplink peak rate of monads

Ubiquitous Power Internet of Things and IPv6 Technologies …

731

Table 2 Pilot test data of high-rise residential area Test site

Function point

Subterm

Urban–rural fringe of N

Phase identification

Phase identification rate of 99.83% single phase table

Voltage monitoring

Upgrade Success rate of meter reading

Test results

Three-phase table phase sequence identification rate

99.98%

Error line identification rate

98.58%

Voltage monitoring rate

100.00%

Abnormal reporting accuracy

100.00%

Entire network upgrade

342 s

Point to point upgrade

21 s

Daily freezing success rate 99.97% Point copy success rate

99.92%

Success rate of fee control 99.90% Average meter reading delay

Some copy

74 ms

Concurrent meter reading

19 ms

Power failure report

Single report accuracy rate 99.98%

Network performance

Stability

Report accuracy of the whole area

98.96%

Cut in networking

1020 s

New module into the network

20 s

Crash

0.06%

Fig. 1 Upstream and downstream peak rate analysis diagram

732

L. Dong et al.

terminal can reach 43.25 kbit/s, and the downlink peak rate can reach 18.16 kbit/s. The performance index can fully meet the requirements of state grid specification, and the rate bandwidth requirements of bearing, distribution, precision control and consumption services. Therefore, no matter from the access technology, accuracy, bandwidth rate, or from the phase identification, outage reporting and voltage monitoring, the power IOT and IPv6 technology can support the concurrent access of precision control services to meet the business performance requirements.

5 Conclusion Through the analysis of the characteristics of power Internet of things and IPv6 technology, this paper proposes the voltage monitoring method of low-voltage electrical equipment based on the combination of the two, expands the network communication protocol by improving the communication unit hardware circuit, and discusses and analyzes the typical application scenarios. In order to make the research design meet the established requirements, considering the fact that IPv6 technology has less I/O, the intelligent electricity meter acquisition module with serial interface mode is selected to realize the real remote meter reading. The case test results also show that this study is a forward-looking and advanced study. In short, with the help of the rapid development of science and technology, wireless and intelligent power industry has become an inevitable trend. Internet of Things and IPv6 technology are widely used in the power industry, which have made the most significant achievements in improving the operation efficiency of enterprises and have a broad development prospect. Only by truly strengthening the intelligent application with the Internet of Things and IPv6 technology as the core can the power industry provide strong support and guarantee for better service economic development.

References 1. Zhang, W., Wang, C., Zhang, S., et al.: The Application of electric vehicle ordered charging technology in ubiquitous power internet of things. IOP Conf. Ser. Mater. Sci. Eng. 782(1), 032103 (2020) 2. Wang, Y., Yan, J., Sun, Q., et al.: A MobileNets convolutional neural network for GIS partial discharge pattern recognition in the ubiquitous power internet of things context: optimization, comparison, and application. IEEE Access 7(1), 150226–150236 (2019) 3. Kong, X., Xu, Y., Jiao, Z., et al.: Fault location technology for power system based on information about the power internet of things. IEEE Trans. Industr. Inf. 16(10), 6682–6692 (2020) 4. Fei, J., Xiaoping, M.: Fog computing perception mechanism based on throughput rate constraint in intelligent internet of things. Pers. Ubiquit. Comput. 23(3–4), 563–571 (2019) 5. Chang, V., Kantere, V., Ramachandran, M.: Emerging services for internet of things. J. Netw. Comput. Appl. 89(JUL.), 1–2 (2017)

Ubiquitous Power Internet of Things and IPv6 Technologies …

733

6. Hu, W., Li, H., Yao, W., et al.: Energy optimization for WSN in ubiquitous power internet of things. Int. J. Comput. Commun. Control (IJCCC) 14(4), 503–517 (2019) 7. Wang, L., Zhang, L., Xu, C., et al.: Three-dimensional maturity model for evaluating industrial power users under the ubiquitous power internet of things. IEEE Access (99), 1–1 (2020) 8. Song, H., Chen, Y., Dong, Q., et al.: Application research of “edge-cloud collaboration” architecture in security protection of ubiquitous power internet of things. IOP Conf. Ser. Mater. Eng. 790(1), 012005 (2020) 9. Liu, J., Li, Y., Lu, Y., et al.: Research on the influence factors of ubiquitous power Internet of things for promoting consumption of wind power based on fuzzy G1-ISM in China. Int. J. Electr. Power Energy Syst. 121(1), 106124 (2020)

Fast Ultrasonic Testing Technology of Steel Plate Based on Drum Structure Zicheng Qi, Guobin Zhang, Ruolan Wang, and Xiangqun Xu

Abstract Aiming at the situation that it is difficult to automate the detection of steel plates on site, and manual ultrasonic testing has low efficiency and poor reliability, an ultrasonic fast testing technique for the steel plates was proposed. Adopting the multi-Gaussian beam theory and combined with the characteristics of multiple layers of the interface of the drum structure, relying on analysis and simulations of sound field in the steel plates, effective inspecting area of each transducer was determined accordingly, and the ultrasonic detection technology of the steel plate based on the drum structure is studied. Ultrasonic inspection tests were carried out for defects of different depths inside the steel plate. The experimental results show that the structure can effectively detect defects of 5 mm flat bottom hole equivalent in the range of 20–100 mm under the steel plate, which provides a reference for the manufacture of rapid detection equipment for steel plates. Keywords High-strength steel plate · Drum structure · Ultrasonic testing · Sound field simulation

1 Introduction Universally, there are diffuse inclusions that exceed the standard, while spots, segregation and hydrogen induced crack in the interior of high strength steel [1–3], and it is inevitable duo to the quality of raw material and manufacturing process and some other factors. However, with the developing of shipbuilding, automobile industry [4], the demand of high strength steel is increasing, there will be a great pitfall to Chinese industry if internal defects in steel plate cannot be detected effectively. Ultrasonic testing technology has the characteristics of non-destructive, fast, low application cost and harmless to the human body. It has become the main method for steel plate Z. Qi (B) · R. Wang · X. Xu Inner Mongolia Metallic Materials Research Institute, Ningbo, Zhejiang, China G. Zhang Jiaxing Special Equipment Inspection and Testing Institute, Jiaxing, Zhejiang, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_90

735

736

Z. Qi et al.

testing. However, relying only on the online inspection of production companies to confirm the quality of steel plates has risks. At present, on-site inspection mainly uses manual inspection, which has the disadvantages of low detection efficiency, high labor intensity, and serious human interference. In response to the above problems, research institutes at home and abroad have developed rapid steel plate testing equipment. At present, the research ideas are to develop a new scanning device, using a multi-channel ultrasound instrument with a number of ultrasonic probes, combined with a mobile work platform to achieve steel plate inspection, such as Tianjin University [5], Nantong Youlian Digital Technology Development Co., Ltd. and British Sonar Testing companies. In these studies, a set of contact type probe in the front of signal acquisition is used to transmit and receive ultrasonic signals, unfortunately, the contact friction with the plate in the detection process will cause serious abrasion of the probe and result in reducing its service life. With the abrasion of the probe, the sensitivity of detection will be impacted, that is, it reduces the accuracy and reliability of detection. In this paper, a self-developed ultrasonic probe with a roller structure is used to quickly inspect the internal quality of the steel plate, the multi-Gaussian beam model [6] is choosed to build a model about the interior sound field of the plate and roller, finally, the effective detection of internal defects in the plate will achieve base on the study ultrasonic measurement in steel plate defects.

2 Analysis of Ultrasonic Testing Characteristics of Drum Structure In the ultrasonic detection of steel plates, used the difference in acoustic impedance between the defect and the steel plate substrate, the ultrasonic sound beam is transmitted to the steel plate. When a defect is encountered, the probe can receive the echo signal reflected by the defect, and then the defect can be evaluated. In this paper, the roller structure is used as the front end of the ultrasonic signal transmission and reception, and the internal quality of the steel plate is tested. The structure of the roller is shown in Fig. 1. The device consists of two parts: an outer sound-permeable rubber and an inner core. The inner core is used as the fixed shaft of the roller structure, and the four ultrasonic straight probes are arranged side by side at equal intervals, Fig. 1 Schematic diagram of cylinder structure

Fast Ultrasonic Testing Technology of Steel Plate Based …

737

Fig. 2 Schematic diagram of ultrasonic inspection

and the center distance between adjacent probes is 100 mm. The outer layer acoustic rubber [7] has the properties with high acoustic transmission and low attenuation, and the closed space between acoustic rubber and core is filled with water. In the actual ultrasonic testing, as shown in Fig. 2, the outer layer of sound-permeable rubber contact with the steel surface, the water filled between outer rubber and steel worked as a coupling agent to eliminate air so that the energy can transfer effectively. In the detection process, ultrasonic need sequentially passes through the filler layer, sound transmission rubber layer and the coupling water layer, and then arrive the interior of the tested steel plate, and the probe receive the signal after the defective ultrasonic echo passes through several layers as the same. During this process, the sound beam propagation process is extremely complex because different media on acoustic attenuation is different and reflection and refraction exist on the interface. Therefore, it is important to deeply analysis the characteristics of the sound field of multilayer structure for designing the ultrasonic detection device of the roller structure in the process of steel plate detects testing, and it is the premise too improve the detection accuracy of steel plate. Based on the multi-Gaussian beam model, combined with the parameters of the internal water immersion probe, multilayer structure acoustic characteristics, the sound field propagating in the drum structure and the steel plate is simulated to predict the ultrasonic sound attenuation characteristics and sound field coverage of the multilayer structure. In this case, ultrasonic testing tests were performed for different depth defects in the steel plate to verify the effectiveness of this research work.

3 Multi-Gaussian Beam Theory Model Establishments In the drum structure, the sound beam radiated by the water immersion straight probe passes through the three-layer structure of water-rubber-water, and then it passed from the surface of the steel plate into the interior is shown in Fig. 2. However, the

738

Z. Qi et al.

water-rubber-steel three layers structure can be established due to the actual thickness of the water coupling layer thickness very small which can be neglected. Circular piston type water leaching of the probe radiation field can be simulated rapidly by the application of Gaussian beam theory, furthermore, multilayer medium ultrasonic longitudinal wave radiation field can also be computed by the model based on transfer matrix of multi-Gaussian beam. The origin of the coordinate system was set up at the center of the circular straight probe surface protective film. After deduction, the sound pressure at the position of the mass point X (x1 , y1 , z 1 ) in the first layer of medium water is:    15 det[M1 (z 1 )]r p1 (ω, z 1 )  k1 T = Ar  × exp ik1 z 1 + i y [c1 M1 (z 1 )]r y p0 2 det[M1 (0)]r r =1

(1)

where z 1 is the sound path of the sound beam in medium 1; c1 is the sound velocity of longitudinal waves in the first layer of medium; and (x1 , y1 ) is the position coordinate of the radial section of the sound beam. The terms M are 2 × 2 matrices, where:   i Br 0 c1 D R [M1 (0)]r = (2) 0 ci1 BDrR   1 0 c1 (z 1 −i D R /Br ) [M1 (z 1 )]r = (3) 1 0 c1 (z 1 −i D R /Br ) where [M1 (0)]r is the initial term at the surface of the sound source; [M1 (z 1 )]r is the disseminate item inthe medium; D R = k1 a 2 /2 is the Rayleigh distance; a is the radius of probe chip. The sound beam can be regarded as a new source when the beam arrives at the interface of the first layer, and the sound pressure in the 2nd layer medium expressed as:   15 det[M2 (z 2 )]r det[M1 (z 1 )]r p2 (ω, z 2 )   = T12 Ar  p1 det[M2 (0)]r det[M1 (0)]r r =1   k1 × exp ik1 z 1 + ik2 z 2 + i y T [c1 M2 (z 2 )]r y 2

(4)

where T12 is the sound pressure transmission coefficient based on the speed of sound; z 2 is the sound path of the sound beam in the medium 2; c2 is the sound velocity of the longitudinal wave in the medium 2; and (x2 , y2 ) is the positions coordinate of the radial section of the sound beam.   M 0 c1 (z 1 −i D R /Br ) [M2 (0)]r = (5) 1 0 c1 (z 1 −i D R /Br )

Fast Ultrasonic Testing Technology of Steel Plate Based …

 [M2 (z 2 )]r =

[{M2 (0)}11 ]r 1+z 2 c2 [{M2 (0)}11 ]r

0

739

0

 (6)

[{M2 (0)}11 ]r 1+z 2 c2 [{M2 (0)}22 ]r

where [M2 (0)]r is the transmission in the interface, [M2 (z 2 )]r and [M1 (z 1 )]r is the disseminate item between two mediums. Considered it as a new sound source when the sound beam propagates to the second layer of rubber / steel interface, the sound pressure field in the third layer of steel medium is:  det[M3 (z 3 )]r T23 Ar  det[M3 (0)]r r =1   k2 × exp ik3 z 3 + i y T [c2 M3 (z 3 )]r y 2

p3 (ω, z 3 ) = p2

15 

(7)

where M3 (0) is the transmission in the second interface, [M3 (z 3 )]r is the disseminate item between two mediums. In the sound field of the probe under pulse excitation is established by calculation of superimposing 15 single Gaussian sound beams, the propagation law of the sound beam in the three-layer structure is obtained, and related parameters are shown in Table 1. According to the probe parameters in actual testing, the sound field distribution of a probe with a diameter of 12.7 mm and a frequency of 5 MHz in a three-layer structure is simulated, as shown in Fig. 3. There are multiple maximum and minimum value points in the first layer of medium water. When the distance in the steel is 18 mm, the sound pressure first decreases monotonously. The local minima value didn’t arrive the effective detection range due to object is medium -thick steel plate range between 20 and 100 mm, it didn’t impact the defect testing and shown the rationality of structure. Table 1 Related parameters of the three components

Name

Thickness

Density

Speed (longitudinal wave)

mm

kg/m3 × 103

m/s × 103

Coupling medium (oily)

60

0.85

1.53

Rubber

2

1.12

1.49

Steel

180

7.9

5.9

740

Z. Qi et al.

Fig. 3 The sound field inside the three components

4 Ultrasonic Testing of Internal Defects of Steel Plates 4.1 Steel Plate Test Block and Ultrasonic Testing Device To verify the detection sensitivity of the drum structure to the steel plate internal defects with different depth, the steel plate reference block was designed shown in Fig. 4 with metal grade as 45 steel. Also a series of 5 mm flat bottomed holes was made in the steel plate reference block with depth of 20, 40, 60, 80, 100 mm. The experimental system shown in Fig. 5 consists of steel plate (or steel plate test block), drum structure probe, coupling medium, multi-channel ultrasound equipment and industrial notebook. The ultrasonic probe is water immersion straight probe which is made in Shanghai Shanchao quipment Co. Ltd. with 12.7 mm wafer diameter, 5 MHz frequency, and the coupling medium on plate surface is water. During the experiment, the ultrasonic data of 6 probes in the drum was collected and stored by ultrasound instrument and displayed in the form of A-wave real-timely. Fig. 4 The steel plate test block

Fast Ultrasonic Testing Technology of Steel Plate Based …

741

Fig. 5 The experiment system

4.2 Detection Results of Drum Probe for Defect It can be seen from the simulated sound field in Fig. 3 that the effective detection area of the roller structure probe is 20 mm below the surface of the steel plate, which can effectively characterize the defect equivalent. The experimental system of Fig. 5 is used to verify the comparison test of the steel plate. In the experiment, the gain of ultrasound equipment was set to 50 dB, and drum was rolling along the radial of reference block. When passing through the flat bottom hole, the echo signal which displayed in the form of A-wave envelope diagram was detected by multi-group probes, and the results shown in Fig. 6 is a single probes. The A-wave envelope diagram detection results of flat bottomed hole with 50 mm depth, 5 mm in Fig. 6 showed that two layers interfacial waves were visible due to a certain thickness of rubber layer and ultrasonic reflection echo appeared above and below the surface. In addition, part of near field region entered into the steel plate, and the noise jamming was significantly after the second layer capillary wave (rubber/steel),

Fig. 6 A-wave of steel plate test block

742

Z. Qi et al.

Fig. 7 The relationship between depth and wave amplitude

but the flat bottomed hole has entered the far field region with large echo amplitude which can be separated from the interference wave easily. Adjust the gain to 50 dB, the flat bottomed holes with different depth of all steel reference block were detected, forming the relationship graph between depth and peak amplitude in Fig. 7. The results showed that reflection echo of flat bottomed holes appeared monotone decreasing trend with the change of depth, the flat bottomed hole reflection echo decreased significantly in the plate near-surface(>20 mm), and the decreasing range of reflection echo tended to be gentle after the depth of the plate > 50 mm. But at this time, the amplitude was low.If the performance of the ultrasound system is unstable and random electrical noise is too high, it will cause interference and cause misjudgment.

5 Conclusions (1)

(2)

In this paper, by introducing multi-Gaussian sound field model, ultrasonic testing technology of steel plate was conducted to study based on drum multilayer structure, and the ultrasonic propagation in three layer structure was established, thus detection range of the structure was determined effectively. By detecting the steel plate though this structure, because of the barrier of thin rubber layer, most of the ultrasonic energy distributed in the rubber layer and less energy entered into internal plate, the reflected signal of 5 flat bottomed hole is lower 25 dB than surface echo signal, so in the practical application, the gain should be adjusted high and the depth reference block should be used to calibrate.

Fast Ultrasonic Testing Technology of Steel Plate Based …

(3)

743

Based on the characteristics of circular piston immersion probe, ultrasonic testing experiment for plate defects was conducted to study. The results of Awave detection show that the depth between the 20–100 mm, defect equivalent 5 mm can be detected effectively, and the feasibility of this method was verified.

Acknowledgements This work was supported by Research Quality and Technology Supervision Project of Zhejiang (20180368), Fund Project_(JSZL2017208C001).

References 1. Song, X., Dai, L., Zhang, Y.: “Damage” analysis of steel plate by ultrasonic inspection. Merch. Qual. 4, 110 (2010) 2. Wang, C., Lv, D., Li, W.: Study on determination of non-bond zone in stainless steel clad plate by ultrasonic inspection and measurement. Angang Technol. 01, 29–31 (2017) 3. Li, J., Shao, C., Liu, X.: Reason analysis on defects of Q345 ultra-heavy high strength steel plate by ultrasonic inspection. Trans. Mater. Heat Treatm. 36(05), 117–122 (2015) 4. Ying, S., Zhang, Y., Cao, G.: Application of lightweight and high strength steel plate for automobile. Automob. Technol. Mater. 10, 11–24 (2012) 5. Shen, G.: Research on Data Acquisition and Control System of Automated Vehicle for Thick Steel Plate Ultrasonic Testing. Tianjin University, Tianjin (2008) 6. Schmerr, L.W., Song, S.-J.: Ultrasonic Nondestructive Evaluation Systems Models Measurement. Springer, American (2007) 7. Zhang, L., Shen, Y.: Alcohol vulcanized polyether polyurethane underwater acoustic transmission rubber. Rubber Plast. Resour. Utiliz. 3, 3–9 (2006)

A Bearing Fault Diagnosis Method Based on Optimized Hierarchical Extreme Learning Machine Yijin Liu

Abstract As an important part of the rail train, bearing plays a very important role in the safe operation of the rail train. However, the fault analysis of the bearing is always disturbed by the environment, which makes the fault diagnosis difficult to be accurate. In order to solve the problem that it is difficult to extract and analyze the weak bearing fault under the condition of environmental disturbance, the VMD-SVD method is proposed to extract weak features under different working conditions, so as to establish the feature space, and use the latest improved ELM to identify the fault, and optimize the structure and coding method in the use process The advantages of fast speed and high accuracy are verified by experiments. Keywords Fault diagnosis · Variational mode decomposition · Singular value decomposition · Extreme learning machine As an important part of the rail transit system, the safety and stability of the bearing in the running process is the key factor to ensure the smooth operation of the train. However, due to the interference of the bearing environment, the bearing has weak fault and it is difficult to extract analysis and diagnosis. Therefore, how to extract the weak fault feature of bearing is the focus and difficulty of recent research. Liu [1] studied the learning and detection methods of variational pattern decomposition (VMD). Wang [2] used the method based on the combination of variational mode decomposition and singular value decomposition (SVD) to extract weak fault, and proved that the method has good effect. And [3] and [4] further prove that vmdsvd combination method can be used for feature extraction of bearing weak fault, and verify its advantages and feasibility in comparison with traditional methods, and its effectiveness is verified by experiments. In this paper, according to the above method, the method of vmd-svd combination [5–7] is selected to extract bearing fault features. In order to improve the speed of feature extraction, pattern recognition method based on extreme learning machine is used for calculation. The process is shown in Fig. 1. Y. Liu (B) College of Transportation, Beijing Jiaotong University, Beijing 100044, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_91

745

746

Y. Liu

Signal

VMD

Improved H-ELM

SVD

Results

K EMD

Labels

Fig. 1 Calculation process

1 Method 1.1 Variational Mode Decomposition Variational mode decomposition assumes that the signal is superimposed by multiple modal functions with different central frequencies. Its principle can be summarized by the following formula: x(t) =

K  i

im f i =

K 

Ai (t) cos ϕi (t)

(1)

i

where x is the original signal, im f is the mode, A is the amplitude, ϕ is the phase. The single side spectrum is obtained by Hilbert transform, and then the bandwidth is obtained by Gaussian smooth demodulation signal. The im f can be calculated by iterative algorithm. The signal can be transformed into multiple regular variation signals by using the above algorithm, which makes the signal fluctuate regularly, which is conducive to noise processing.

1.2 Improved Hierarchical Extreme Learning Machine In reference [8], the application algorithm mode of extreme learning machine is proposed. The neural network weight and threshold are determined by specifying the input and output data, so as to achieve the purpose of autonomous learning. In this paper, the improved method of extreme learning machine in [9–11] is combined with elm coding method. Its structure is shown in Fig. 2. The whole algorithm is divided into two parts, each part is independent based on the consideration of accuracy. (1) (2)

The random projection method is used to input the fault features to ensure its accuracy and science; The penalty factor can effectively optimize the hidden information and make the information more practical.

A Bearing Fault Diagnosis Method Based on Optimized …

Hierarchical structure Signal

747

The training process

Hidden

Hidden

Generalized inverse

layer 1

layer 2

matrix

Results

Sparse matrix initialization

Fig. 2 The algorithm structure

After transforming the original input data into random feature vectors, and learning its nodes, the effective hidden information will be obtained: Hi = g(Hi−1 · β)

(2)

where Hi represents information output, g represents activation function, and β represents weight value. Then the improved automatic encoder is summarized into the following models: Oβ = argmin {Hβ − X 2 + β1 } β

(3)

X represents raw data, H represents random projection output, and β represents weight. In the training process, the iterative algorithm of hierarchical extreme learning machine is not used, because the algorithm variables are too many, which easily leads to the local solution better than the global optimal solution, so the generalized inverse matrix method is still used.

2 Experimental Verification The test bearing is SFK bearing, the diameter of single point fault is 0.007 mils, and the speed is 1772 rpm. The data of rolling bearing in normal state, inner ring fault, outer raceway fault and rolling unit fault with frequency of 12 kHz are selected for analysis. 24,000 test points are selected for each state, half of which are used as training data and half as test data for verification. Firstly, the mode number k of the signal is determined by EMD decomposition. In this part of the experiment, the K value is determined to be 14. Then, it is replaced with the original signal into the VMD (Fig. 3). Then, instead of using the traditional Hilbert matrix, the data are directly put into the matrix in time series order and input into SVD for decomposition.

748

Y. Liu

Fig. 3 A decomposition example

It can be seen from Table 1 that the size of eigenvalues under different states is significantly different, and there is a trend of change, and the decomposition effect is good. After that, the first 25 eigenvalues of each state arranged according to the weight of SVD algorithm are selected and put into the hierarchical extreme learning machine for recognition. The experimental results show that the optimized h-elm has the best performance when the number of layers is 3, but compared with the level of 2, the improvement is not obvious, but will increase the running time, so the number of layers is taken as 2. Then step-by-step method was used to adjust the number of neural nodes in the two hidden layers. The number of each node is trained circularly to find the optimal solution. According to the test, when the input random matrix dimension is 200 × 112, 200 × 144, and the input activation function is tribas, the Table 1 Decomposition results Bearing condition

IMF1

IMF2

IMF3

IMF4

Normal

2.779

1.252

2.902

1.047

2.584

1.095

1.995

0.927

Inner ring failure

Outer ring failure

Rolling element fault

1.406

0.621

0.952

0.685

0.942

4.052

3.793

4.626

0.875

3.839

3.787

4.572

0.611

1.703

3.314

1.745

0.978

1.041

0.995

0.712

0.869

0.993

0.965

0.635

0.637

0.886

0.730

0.286

1.298

1.719

3.452

1.132

1.286

1.585

2.189

1.055

0.791

1.126

1.050

0.690

A Bearing Fault Diagnosis Method Based on Optimized …

749

Table 2 Comparative results Recognition algorithm

Number of training samples

Number of test samples

Running time (s)

Test accuracy (%)

H-ELM

100

100

0.017953

96

ELM

100

100

0.0625

93

optimal result is obtained; for comparison, ELM obtains the optimal solution with 2311 neural nodes and hardlim activation function with the same data (Table 2 and Figs. 4, 5).

Fig. 4 H-ELM test results

Fig. 5 ELM test results

750

Y. Liu

Through comparison, it can be clearly seen that the extreme learning machine through elm coding has great advantages in the accuracy and speed of bearing data, which proves the advantages of this method.

3 Conclusions This paper introduces a vmd-svd bearing fault diagnosis method based on the latest elm coding method. Through the vmd-svd method, the weak fault features of bearing under multi state are obtained. Then, different feature data of bearing are trained based on elm, and higher classification accuracy is obtained. Therefore, it can be concluded that the improved vmd-svd method has higher precision and faster speed in bearing fault diagnosis, so it is a more optimized method.

References 1. Liu, C., Zhang, L., Niu, J.: Intelligent Prognostics of Machining Tools Based on Adaptive Variational Mode Decomposition and Deep Learning Method with Attention Mechanism, vol. 417, pp. 239–254 (2020) 2. Wang, Z., Jia, L., Qin, Y.: Adaptive Diagnosis for Rotating Machineries Using Information Geometrical Kernel-ELM Based on VMD-SVD, vol. 20, issue 1 (2018) 3. Wang, Y., Huang, S., Dai, J.: A Novel Bearing Fault Diagnosis Methodology Based on SVD and One-Dimensional Convolutional Neural Network (2020) 4. Li, X., He, J., Cheng, Y., Zhao, Y.: The Accumulative Component Kurtosis in the SVD Based Denoising of the Fault Diagnosis for Rolling Element Bearing of Generator. In: Proceedings of 2019 2nd International Conference on Advanced Electronic Materials, Computers and Materials Engineering (AEMCME 2019), pp. 6 (2019) 5. Cheng, H., Zhang, Y., Lu, W.: A Bearing fault diagnosis method based on VMD-SVD and fuzzy clustering 33(12), 25 (2019) 6. Xie, B., Kong, D., Kong, W.: A novel noise reduction method based on VMD and SVD for recovered manchester coding signal 22(1), 11–18 (2019) 7. Fei, S.-W., Glowacz, A.: The Hybrid Method of VMD-PSR-SVD and Improved Binary PSOKNN for Fault Diagnosis of Bearing (2019) 8. Zhu, S., Jiao, B.: Fault diagnosis of wind bearing based on multi-scale wavelet kernel extreme learning machine 887(1) (2017) 9. Ding, S., Zhang, N., Xu, X.: Deep Extreme Learning Machine and Its Application in EEG Classification (2015) 10. Deepa, M., Raja Lakshmi, M.: Survey of deep and extreme learning machines for big data classification 6(8), 2502–2512 (2016) 11. Pang, S., Yang, X., Zhang, X.: Fault diagnosis of rotating machinery with ensemble kernel extreme learning machine based on fused multi-domain features 98, 320–337 (2020)

Construction of Urban Smart Sports Tourism Service Platform Based on Big Data Chang Chen and Kewei Yu

Abstract With the development of society and the improvement of people’s living standards, sports tourism has become a part of people’s daily life. However, due to incomplete information and insufficient supporting facilities, people’s tourism value is affected. Therefore, the development of smart sports tourism in big data cities has become the focus of research. The purpose of this article is to study the construction of the city’s smart sports tourism service platform based on big data, to conduct research on big data, to establish information sharing services, to coordinate various links, to realize the collection and storage of big data, and to analyze. At the same time, it processes a large amount of information and conducts real-time online interaction to provide tourists with more convenient travel information services. The research results show that the big data city smart sports tourism service platform can achieve information symmetry, promote social and economic development and industrial structure changes, increase the accuracy of customer demand judgments by 30%, realize comprehensive sports tourism services, and promote the development of sports tourism in my country. Keywords Big data · Urban smart sports · Tourism service platform · Information sharing service

1 Introduction Our social environment is facing the era of big data, the emergence of big data can be said to have a subtle impact on many aspects of national society and people’s livelihood. The arrival of the era of big data has also brought important and valuable new opportunities for the development of sports tourism, it can bring huge traffic and considerable profits to the sports tourism industry [1]. The big data platform itself has the advantages of high efficiency, low cost, extensive development, and accurate C. Chen (B) · K. Yu Department of Physical Education, Xinhua College of Sun Yat-Sen University, Guangzhou, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_92

751

752

C. Chen and K. Yu

delivery. Large audiences (mainly young people) provide a new starting point for the development of traditional sports [2]. Smart sports tourism is the product of the integration and development of information technology, tourism and service innovation. It can solve the structural contradictions of the tourism industry and promote the further upgrading of the tourism industry [3]. The driving force of smart tourism lies in the upgrading of the original industry triggered by the changes in tourist behavior and demand. At the same time, a new generation of information technology also plays an important role in guidance. The connotation, realization method and service mode of smart tourism have always been hotspots in the academic and commercial circles [4]. The evolution mechanism and service mode of smart sports tourism services based on big data platforms can promote the effective allocation of regional sports tourism service resources in my country [5]. It is of great strategic significance to integrate and comprehensively promote the intelligent sports tourism service model, continuously improve the service level of sports tourism, and promote the transformation and upgrading of the sports tourism industry [6]. Although a lot of work has been done on the intelligent sports tourism service platform based on big data, there are still shortcomings [7]. Visitors can learn about the big data related information of tourist destinations through websites, mobile phones, touch screens, etc. [8]. The tourism department can collect tourism information, scenic spot information, traffic information and other data on the intelligent tourism service platform through various tourism services. The terminal facilitates the tourism authorities to quickly, effectively and comprehensively understand relevant information, achieve symmetry of information, and complete supporting facilities [9]. Based on the construction of a big data city smart sports tourism service platform, analyze the factors that affect smart sports tourism, realize the collection, storage, analysis and utilization of big data, and provide a basis for relevant decision-making. The emergence of big data is an innovation in sports tourism model an important carrier and key technical means of service capability [10].

2 Research Theory Overview and Related Technology Introduction 2.1 Related Theories Smart sports tourism: Smart sports tourism is an emerging tourism and consumption method that integrates the two major industries of sports and tourism. It uses sports as its core resource and tourism as a means of consumption. It has become an important means to satisfy people’s pursuit of health. With the rise of global tourism as a national strategy, the development of sports tourism also has new goals and directions. The concept of smart sports tourism is different from different perspectives. From the perspective of the tourism industry, “smart tourism” refers to the use of “smart

Construction of Urban Smart Sports Tourism Service …

753

technology” to fully satisfy tourists’ service needs for “food, housing, transportation, travel, shopping, and entertainment”. Big data: Big data refers to the process of collecting, classifying and analyzing data in an almost affordable time using ordinary computer tools. This is an innovative approach that can optimize and improve processes and make decisions more convincing. Big data is a new way of thinking. It directly cuts into the business intelligence of the enterprise, prompts the business intelligence to enter the decisionmaking center, and directly serves the enterprise’s strategy. Big data is not limited to new types of data. It also includes traditional data types. Whether data enters the data category of big data cannot be measured by technology. In addition, big data itself is worthless. Only using data mining and analysis techniques can be measured. Obtain the potential value of data from massive amounts of data.

2.2 Related Technology Introduction The layered technology of cloud computing system is mainly composed of three aspects: basic services, platform services and software services. The system can operate independently, and can realize data exchange and sharing, and continuously expand the functions of the intelligent tourism service platform. The platform service layer mainly implements application management and provides a unified, open and shared cloud service platform for application development. The software service layer can realize data collection and processing, and improve the value of data. Security technology mainly guarantees data security and prevents data loss, errors, attacks and other problems. It responds to data security threats in a targeted manner through the storage, application and management of tourism big data. The technical architecture follows the standard system of the smart tourism service platform. The structure consists of basic services, data transmission, data storage, data analysis and processing, and data display. ETL technology is the main technology to realize the data warehouse mechanism. It is a technology for extracting, transforming, cleaning and loading data resources to be integrated. The extraction process is a selection process. By selecting relevant data from the sports tourism big data source, it is necessary to adopt corresponding information extraction methods to finally realize the standardization and standardization of sports tourism information data resources. The data sorting process is a cyclical process, with continuous screening, extraction, and analysis, and try to achieve the greatest optimization to obtain the best application. The formulas involved in the data sorting process are shown in 1 and 2. G=

n  i=1

 y+

y

(1)

754

C. Chen and K. Yu

y=

 √ G 3 n − 4G

(2)

i

Among them, G is the total amount of data, y represents the calculated data transmission rate, and n represents a constant.

3 Construction of City Smart Sports Tourism Service Platform Based on Big Data In the process of data sorting, the basic method of data classification calculation is to infer unknown data through given data characteristics and find out the relationship between them. The formula for classification calculation is shown in 3. M=

  n 1 i n N j=0 y

(3)

Among them, M is the dependent variable of the classification function, and N is the independent variable of the function. The iterative method divides the data objects into different groups, then screens and classifies them according to their respective characteristics, and compares data with similar characteristics. The calculation formula is shown in 4.  √ i (4) G=n y× where G is the total amount of data, and y is the data transmission rate. The specific data of this experiment are shown in Table 1. The data information in Table 1 consists of the total amount of data, independent variables and dependent variables. Table 1 Data about classification algorithms

Database

Data transfer rate

Eigenvalues

Total amount of data

Dependent variable

13,000

654

18,032

Independent variable

200

820

11,560

Construction of Urban Smart Sports Tourism Service …

755

4 Experimental Results and Correlation Analysis Big data technology can help the sports tourism industry make accurate demand forecasts, and flexibly carry out activities based on the number of people in the sports tourism industry and the environmental carrying capacity, and prompt managers to timely adjust relevant plans and make accurate decisions. Compared with traditional data analysis, large-scale data analysis is not random sampling in the past, but sample data is collected based on most complex sample data. Although the results are not very accurate, but in the context of big data, through the development of data storage and data processing technology, data mining analysis, so that enough data and variables can be collected. This article compares big data analysis with traditional data analysis to better understand the differences between the two. The specific information is shown in Table 2. It can be seen from Table 2 that the characteristics of big data analysis are unstructured data types, comprehensive data sources, large capacity and dynamic changes, and many variables. Big data mining will maximize the use of new information processing methods, large-scale data of multiple separate online data, detailed analysis and extensive use, and conduct in-depth analysis. At the same time, it will focus on target visitor information to meet the needs of tourists and the accurate judgment of actions, and build tourism marketing innovation management model accordingly. The impact of the tourism marketing innovation management model based on big data on the accuracy of customer demand judgment is shown in Fig. 1. As can be seen from the data in Fig. 1, based on the use of big data in sports tourism, the accuracy of judging customer needs has increased by 30%. The reliability coefficient in the figure is greater than 0.7, which has good reliability. When it is less than 0.6, reliability is insufficient. The greater the reliability coefficient, the better, indicating that the internal consistency and stability of the scale is higher, and the conclusions are more. persuasive. Big data promotes the cross-industry integration of sports tourism and integrates related services (such as health protection, entertainment, education and training, and event dissemination) into the sports tourism industry. The value range of the correlation coefficient is between − 1 and 1. The larger the absolute value, the tighter the correlation between the variables. The result is shown in Fig. 2. It can be seen from the data in Fig. 2 that the establishment of a tourism platform based on big data can increase corporate revenue by 20%. There is a clear positive correlation between infrastructure, government support, Internet platforms, Table 2 Comparison of tourism statistics Year

Traditional number

Intelligent people

Traditional consumption

Intelligent consumption

2017

2048.61

2186.56

173.91

210.15

2018

2260.78

2471.23

199.25

240.74

2019

2430.58

2801.64

234.73

300.26

756

C. Chen and K. Yu

Reliability factor

Number of surveys

Correlation coefficient

180 160 140 120 100 80 60 40 20 0

1

2

3

4

5

6

7

Month Fig. 1 The relationship between the reliability coefficient and the number of people surveyed

Number of surveys Correlation coefficient

300

Correlation coefficient

Reliability factor

250 200 150 100 50 0 1

2

3

4

5

6

7

Correlation coefficient Fig. 2 The relationship between correlation analysis and reliability

user service experience, online promotion and tourism innovation. Relying on big data technology to form a governance structure jointly established and shared by the government, market, society and other entities. It can also improve the scientific decision-making and judgment level of sports tourism managers, and improve the level of safety and rescue protection.

Construction of Urban Smart Sports Tourism Service …

757

5 Conclusion With the development of big data technology, there are more and more sports tourism information on various network platforms, which accurately and timely reflect the dynamics of various tourist attractions, which can bring convenience to various industries. The application of big data in sports tourism has established a global network management platform, integrated resources, and improved the timeliness of fault detection and troubleshooting. Using big data, tourists can optimize travel routes, improve travel comfort, and maximize travel value. Tourism service providers can provide tourists with supporting tourism facilities through big data to meet tourists’ needs and improve service quality. Managers can use big data to supervise the safety of tourists, solve problems in time, and ensure the safety of tourists. The information transmitted through big data can attract tourists, increase economic benefits, and drive the development of other industries.

References 1. Missaoui, S., Kassem, F., Viviani, M., et al.: LOOKER: a mobile, personalized recommender systemin the tourism domain based on social media user-generated content. Pers. Ubiquit. Comput. 23(2), 181–197 (2019) 2. Kaerle, E., Fensel, A.: Multi-platform mobile service creation: increasing brand touch-points for hotels. J. Mob. Multim. 12(1–2), 91–109 (2016) 3. Hussin, M.H., Rahim, A.A., Mohamad Ibrahim, M.N., et al.: BU prepares to sound on world stage. Measurement 78(2016), 90–103 (2015) 4. Shin, H., Chon, Y., Kim, Y., et al.: A participatory service platform for indoor location-based services. IEEE Pervasive Comput. 14(1), 62–69 (2015) 5. Williams, N.L., Inversini, A., Buhalis, D., et al.: Community crosstalk: an exploratory analysis of destination and festival eWOM on Twitter. J. Market. Manag. 31(9–10), 1–28 (2015) 6. Qian, G., Li, J.-X., Wu, Y.-M.: Evaluation of intelligent tourism information service capabilities: a case study of Hanzhong City. Ecol. Econ. (1), 4–15 (2017) 7. Zhang, K., Hou, Y., Li, G., et al.: Tourists and air pollution: how and why air pollution magnifies tourists’ suspicion of service providers. J. Travel Res. 59(4), 661–673 (2020) 8. Claudio, B., Filippo, B., Antonio, C., et al.: LocalFocus: a big data service platform for local communities and smarter cities. IEEE Commun. Mag. 56(7), 116–123 (2018) 9. Yin, X., Zhang, G., Ji, X., et al.: Design and implementation of a big-data-based university library cloud service platform. CE Ca 42(6), 2463–2468 (2017) 10. Gu, L.: Design and implementation of employment recommendation service platform for college graduates. C E Ca 42(6), 2485–2490 (2017)

Communication Effect of Traditional Minority Sports Based on Artificial Intelligence Yang Li, Ting Yuan, and Kewei Yu

Abstract The original intention of studying the national traditional sports culture is to let more people understand the national traditional sports, so as to achieve the purpose of carrying forward and inheriting, so as to realize the innovation and development. Based on this, this paper studies the communication effect evaluation of traditional minority sports based on artificial intelligence. In the research, on the basis of artificial neural network, this paper selects the evaluation index of the communication effect of traditional minority sports, and constructs the evaluation system of communication effect of traditional minority sports based on artificial intelligence. In addition, this paper selects two colleges and universities as the research object to evaluate the communication effect of their traditional ethnic sports. The results of this study show that the total score of communication effect evaluation of ethnic traditional sports in university 1 is 86, and that of university 2 is 73. It can be seen that the communication effect of traditional minority sports in college 2 is better. In addition, the research results of this paper verify the feasibility of this method. In the evaluation of the communication effect of traditional minority sports, the method can be improved according to the lack of communication effect, so as to achieve the purpose of promoting minority sports. Keywords Artificial intelligence · Artificial neural network · Traditional minority sports · Communication effect evaluation system

1 Introduction Traditional sports of ethnic minorities are created and developed gradually by the majority of ethnic minorities in the long-term process of production and life. It has the characteristics of rich content, diverse forms, long history and distinctive characteristics, and has high skills, fitness and education [1, 2]. In the life of ethnic minorities, it is often expressed in the form of singing and dancing or entertainment. Y. Li · T. Yuan · K. Yu (B) Department of Physical Education, Xinhua College of Sun Yat-Sen University, Guangzhou, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_93

759

760

Y. Li et al.

Therefore, it is not only a kind of cultural and recreational activities, but also a kind of sports activities, which is deeply loved by the masses of ethnic minorities [3, 4]. However, under the double impact of social modernization and western competitive sports, the survival and development of many ethnic traditional sports are difficult, and some traditional sports of ethnic minorities are facing the danger of disappearing, and even some have disappeared [5, 6]. In order to promote the effective dissemination of traditional sports culture of ethnic minorities, it is also necessary to analyze various problems existing in the process of communication from the reality [7, 8]. At present, school education is the main transmission path of ethnic minorities in China. Although the effect of this method is significant, the transmission way is relatively single, and the audience is only students and teachers [9, 10]. China has always attached great importance to the traditional sports culture of ethnic minorities. However, due to the lack of specialized sports institutions, the dissemination and education of national sports are mainly realized through teaching by example, body imitation and game communication. The effect of promotion and dissemination is not high. Therefore, it is necessary to analyze and evaluate these transmission channels and effects, so as to improve them. This paper studies the communication effect evaluation of traditional minority sports based on artificial intelligence. Based on the artificial neural network, this paper establishes the evaluation system of the communication effect of traditional minority sports, including 4 first-class indexes and 16 s-class indexes. According to the system, we evaluate the communication effect of traditional minority sports in two universities, so as to improve the deficiencies in the process of communication, so as to achieve the purpose of better publicity of traditional minority sports.

2 Artificial Neural Network and Traditional Minority Sports 2.1 Artificial Neural Network Artificial neural network is characterized by strong self-learning ability, can approach any function with arbitrary precision, and can simulate nonlinear mapping in real life. The “training” process is the process of learning and analysis. Through the analysis of a batch of input–output data prepared in advance, we can master the potential laws existing in them, and calculate the output results of new input data according to these laws. The artificial neural network takes the neuron as the basic processing unit, and the neurons are combined according to different connection modes to form different neural networks. In the artificial neural network model: (1)

Connection or synapse: the strength of connection between units, often referred to as connection weight, between positive and negative values.

Communication Effect of Traditional Minority Sports Based …

(2) (3)

761

Accumulator: reflect the function of space–time integration of neurons. Excitation function f (·): limits the output of neurons, generally between [0, 1] or [−1, 1].

Among them, x1 , x2 , ...x n is n inputs of neuron i, 1, 2 wi1 , wi2 , ..., win is the weighted coefficient, u i represents the input sum of neuron i, or activation function, f (·) is the excitation function, and yi is the output of neuron i. They are expressed by mathematical formulas as follows: ui =



wi j x j

(1)

j

vi = u i + bi

(2)

yi = f (vi )

(3)

2.2 Traditional Sports of Ethnic Minorities The traditional sports of ethnic minorities in China are rich in content, various in forms and wide in scope. At first, the traditional sports of ethnic minorities were not created because they wanted to exercise and have fun. They just wanted to survive, but after the basic survival was satisfied, they began to rise to the level of exercise and entertainment. The traditional sports of ethnic minorities have three meanings: first, fitness; second, nationality’s regionality; finally, the inheritance of primitive culture. National sports refers to people living in different special areas, through different time to continue different sports activities. In this paper, the traditional sports of ethnic minorities are defined as: long-term sports activities among different ethnic groups have their own cultural characteristics, which can keep healthy and provide entertainment. They include traditional national sports and traditional folk sports.

3 Principle of Index Selection and Experimental Design (1)

The principle of index selection in the evaluation index system of communication effect of traditional minority sports According to the principles of pertinence, purpose, linear independence, operability and relative integrity, this paper constructs the evaluation index system of traditional minority sports communication effect based on the artificial neural network in artificial intelligence. The system includes four first-class indicators and sixteen second-class indicators, with a total score of 100 points. The higher the score, the better the communication effect.

762

Y. Li et al.

(2)

Experimental design In this paper, using the method of literature analysis, consulting the relevant domestic data, we understand the traditional sports of ethnic minorities in China, summarize and analyze the transmission path of traditional ethnic sports in various regions, and provide a theoretical basis for this study. In addition, this paper selects two colleges and universities as the research object, and evaluates the communication effect of traditional ethnic sports based on artificial intelligence.

4 Analysis of Research Results 4.1 Analysis on the Transmission Channels of Traditional Ethnic Sports At present, there are several ways of transmission of traditional sports of ethnic minorities in China, and each mode of transmission needs to rely on different media. Due to the limitations of various factors, the traditional sports of ethnic minorities in some areas can only be transmitted through some special ways. This paper analyzes the transmission channels of traditional ethnic sports, and the results are shown in Fig. 1. It can be seen from Fig. 1 that the transmission of ethnic minority sports in China mainly relies on school education, accounting for 46.3%, and campus communication is also the most fundamental way. According to statistics, the traditional sports of ethnic minorities in some remote areas can only be spread through schools, followed by fitness communication. Many ethnic traditional sports are very popular, and this proportion is up to at about 25.5%, the government’s promotion is also the most powerful communication measure in the local area, which can effectively promote the development of local minority traditional sports. The proportion of this way has reached 15.4%. Holding national games is often a familiar way, such as dragon boat racing, which accounts for 7.6%. In some areas, traditional minority sports meet has passed through talents the proportion of this method is about 5.2%.

Fig. 1 The transmission ways of traditional sports of ethnic minorities

Communication Effect of Traditional Minority Sports Based …

763

4.2 Evaluation Index System of Traditional Minority Sports Communication Effect Based on Artificial Intelligence Based on the artificial neural network, this paper constructs the evaluation system of the communication effect of traditional minority sports, and the evaluation indexes are shown in Table 1. It can be seen from Table 1 that the evaluation index system of traditional minority sports communication effect based on artificial intelligence is composed of four first-class indicators and sixteen second-class indicators, each of which has different scores. The first level indicators include historical perspective, social function, development scale, economic benefits, etc., and each level index is divided into several secondary indicators. The historical perspective is divided into the historical time of formation (5 points), the role in national historical and social production and life (5 points), the value of Chinese traditional culture contained in it (5 points), and the social function includes the integration and promotion of ethnic groups. The role of national unity (5 points), the role in national mass fitness (10 points), the role in enriching national cultural life (5 points), the impact on the physical and mental Table 1 Evaluation index system of communication effect of traditional minority sports based on artificial intelligence Primary indicators

Secondary indicators

Score

Historical perspective

Historical time of formation

5

The role in the production and life of national history and society

5

The value of Chinese traditional culture

5

On the role of national integration and the promotion of national unity

5

The role of national mass fitness

10

On the role of enriching national cultural life

5

The influence on the physical and mental quality of ethnic workers

10

Primary indicators

Secondary indicators

Score

Development scale

The continuity of carrying out the national traditional sports activities

5

The investment of local government and the nation in its development

10

How well do other ethnic groups understand and master it

10

Social function

Economic performance The degree of the combination of national traditional sports activities and other industries Employment situation related to national traditional sports

10 10

The degree of promotion to other industries when carrying out 10 national traditional sports activities

764

Y. Li et al.

quality of ethnic workers (10 points), the development scale includes the continuity of carrying out the national traditional sports activities (5 points), the degree of investment in its development by the local government and the nation (10 points), and the contribution of other nationalities to its development. The degree of understanding and mastering (10 points), the economic benefits include the degree of the combination of national traditional sports activities and other industries (10 points), the employment situation related to the national traditional sports (10 points), and the degree of promoting other industries each time the national traditional sports activities are carried out (10 points).

4.3 Application Analysis of Communication Effect Evaluation System of Traditional Minority Sports Based on Artificial Intelligence This paper analyzes the application of the evaluation index system of traditional minority sports communication based on artificial intelligence. In the application, it selects two universities’ traditional minority sports communication effect evaluation, and the evaluation results are shown in Fig. 2. It can be seen from Fig. 2 that the score of university 1 in the evaluation index from the historical perspective is 12, and that of university 2 is 8. In terms of social function evaluation index, the evaluation score of university 1 is 26, and that of university 2 is 22. In the development scale evaluation index, the evaluation score of university 1 is 21, and that of university 2 is 18. In terms of economic benefit evaluation index, the evaluation score of university 1 is 27, and that of university 2 is 25. Generally speaking, the total score of communication effect evaluation of traditional minority sports in university 1 is 86, and that of university 2 is 73. It can be seen that the communication effect of traditional minority sports in college 2 is better.

University 2 30 20 10 0

Historical perspective

Social function

Development scale

Index

Evaluation score

University 1

economic performance

Fig. 2 Analysis of the evaluation results of traditional minority sports communication effect based on Artificial Intelligence

Communication Effect of Traditional Minority Sports Based …

765

5 Conclusions On the basis of artificial neural network, this paper constructs the communication effect evaluation system of traditional minority sports based on artificial intelligence. In the research, this paper summarizes and analyzes the transmission mode of traditional sports of ethnic minorities in China, and applies the evaluation system proposed in this paper to the evaluation of communication effect of traditional sports of ethnic minorities in colleges and universities. The results show that this method is feasible. In addition. This paper holds that in order to realize the effective dissemination of the traditional sports of ethnic minorities, we should first proceed from the reality, analyze the problems encountered in the process of communication, and then take practical measures to overcome the difficulties, so as to realize the protection and inheritance of traditional ethnic sports. Acknowledgements This work is supported by the higher education Teaching Reform project of Xinhua College of Sun Yat-sen University, "Application Research of "The four-step Teaching of Encouraging and Sharing "teaching method in Martial Arts Practice Course" (2020J056).

References 1. Sobh, R., Soltan, K.: Endorser ethnicity impact on advertising effectiveness: effects of the majority vs. minority status of the target audience. J. Market. Commun. 24(6), 634–647 (2018) 2. Lai, C.: The influence of extramural access to mainstream culture social media on ethnic minority students’ motivation for language learning. Br. J. Edu. Technol. 50(4), 1929–1941 (2019) 3. Melikishvili, L., Janiashvili, L.: Ethnocentrism and the problem of ethnic identity in the multiethnic region (Kvemo Kartli). Bull. Georg. Acad. Ences 13(4), 181–185 (2019) 4. Kang, S.: Mobile communication and pro sports: motivation and fan loyalty. Int. J. Mobile Commun. 15(6), 604–627 (2017) 5. Nölleke, D., Birkner, T.: Bypassing traditional sports media? Why and how professional volleyball players use social networking sites. Stud. Commun. Media 8(3), 287–310 (2018) 6. Smith, P., Evens, T., Iosifidis, P.: The next big match: convergence, competition and sports media rights. Eur. J. Commun. 31(5), 536–550 (2017) 7. Yingna, F.: College physical education curriculum reform based on the integration of structural function and space time concept. Agro Food Ind. Hi Tech. 28(1), 1503–1507 (2017) 8. Pic-Aguillar, M., Navarro-Adelantado, V.: Triad communication and specificity of motor games. Revista Int. De Medicina Y Ciencias De La Actividad Fisica Y Del Deporte 17(67), 523–539 (2017) 9. Liang, B., Liu, J.: Design and development of sports training system based on image processing technology. Cluster Comput. 22(2), 3699–3706 (2019) 10. Zhu, Q., Sun, J.: Competitive product behavior and family sports multimedia education platform based on smart system. Revista De La Facultad De Ingenieria 32(4), 666–672 (2017)

Optimization of Human Resource Management in Small and Medium-Sized Enterprises Based on Artificial Intelligence Fuzhang Tian

Abstract In recent years, due to the continuous development of artificial intelligence related technologies, it has begun to involve various fields of resource management. For human resource management, in the context of the development of artificial intelligence, it is necessary to clarify the impact of human resources in all aspects of the artificial intelligence environment, including the selection of talents. Only by understanding these issues can we better grasp the direction and method of human resource management research. Based on this, this article carried out a research on the optimization of human resource management for small and medium-sized enterprises based on artificial intelligence, aiming to explore the contribution of small and medium-sized enterprises in the artificial intelligence environment to the improvement of corporate human resource efficiency and the improvement of employee innovation capabilities. This article analyzes the application of artificial intelligence in human resource management for the experimental group, and analyzes and compares traditional human resource management methods from the perspective of human resource structure. Research shows that in the current human resource management mode, there are management misunderstandings and intelligent technology in the use of human resources, which effectively promotes the progress of human resource management. Keywords Artificial intelligence · Small and medium enterprises · Human resources · Management optimization

1 Introduction With the development of big data and artificial intelligence, big data [1] and artificial intelligence [2, 3] have brought huge energy and value, which will have a huge impact on industrial transformation and enterprise upgrading. For enterprises, the influence of big data and artificial intelligence will penetrate into the business management. F. Tian (B) Yunnan Technology and Business University, 10 Jingguan Road, Songming, Kunming, Yunnan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_94

767

768

F. Tian

In business operations, human resource management [4] can effectively improve the competitiveness of enterprises, and it will inevitably change with the development of big data and artificial intelligence. With the development of massive data and artificial intelligence, under the conditions of increasingly fierce competition among enterprises, the application of artificial intelligence technology is increasingly valued by enterprise human resources [5]. Currently, artificial intelligence has received widespread attention. It is the inevitable result of technological innovation and social and economic development. In the process of modern society, the introduction of artificial intelligence into corporate management [6] can not only improve the production efficiency of the internal governance structure of the enterprise, but also promote the production and development of the enterprise. Moreover, the effectiveness of human resource management is directly related to the economic benefits of enterprises. At the human resource management level, after the introduction of artificial intelligence into human resource management, artificial intelligence will eventually replace traditional jobs [7]. Although artificial intelligence technology can help managers make effective decisions, they only provide some valuable suggestions for decision-making, and cannot affect the final choices and judgments of decision-makers. Decision makers also need to understand the development trend of the organization from the perspectives of their own culture, corporate governance, development direction, and emotional exchanges of corporate staff. These are not artificial intelligence technologies that can be summarized by data alone. Decision makers need to make their own decisions. On this basis, this paper has carried out research on the optimization of human resource management in small and medium enterprises based on artificial intelligence [8, 9]. The application of artificial intelligence in human resource management was used as the experimental group, and the traditional human resource management method was used as the control group. In the research, the role of artificial intelligence in human resource management is analyzed, and the influence of artificial intelligence on human resource management is studied from the micro perspectives such as mode, personnel, and system structure [10]. Comprehensive comparative analysis shows that artificial intelligence technology can effectively promote the progress of enterprise human resource management.

2 Impact of Artificial Intelligence on Corporate Talent Selection 2.1 Improve the Efficiency of Corporate Human Resources Traditional human resources require a lot of time and experience when recruiting personnel resumes, and their grasp of talents is very limited. Artificial intelligence has important application value for recruiters to be able to carry out re-recruitment of

Optimization of Human Resource Management in Small …

769

human resources. It can enable recruiters to focus more on personalized interviews and achieve efficient talent selection. Under the application framework of artificial intelligence technology, the enterprise human resource management model starts from the perspective of massive data analysis. Artificial intelligence can comprehensively analyze the past experience, personnel knowledge and experience of applicants to achieve precise matching of personnel and posts. Artificial intelligence is effective in human resource recruitment. The impact is manifested in two aspects: (1) (2)

With the application of artificial intelligence, many tasks have become simple and not repeated; In the process of staffing, artificial intelligence can track and analyze employees’ working conditions, work abilities and work experience, and analyze the most suitable jobs for employees.

In summary, in talent selection, intelligence can enable human resource managers to consider only the factors of applicants. Combined with the technical advantages of big data, artificial intelligence can accurately match talents and positions.

2.2 Information and Data Processing in Human Resource Management Internet technology continues to innovate and develop, and a large amount of data information processing will be involved in human resource management. Artificial intelligence information technology can meet the complex data processing requirements of enterprise human resource management. Therefore, in human resource management, the application of computer and network technology is becoming more and more common, which can realize the optimization and integration of human resources. With the rapid development of science and technology informatization, the accuracy of information data is required to be higher and higher, and data information is becoming more and more abundant. The accuracy of data processing has become an important issue in human resource management. Now companies use artificial intelligence technology to apply well to human resource management and can solve complex problems. In complex scenes, the application of artificial intelligence in visual simulation can simulate different scenes, give different processing strategies, have efficient work efficiency, and give more accurate results. More importantly, it can provide important support for decision-making and improve the efficiency of human resource management.

770

F. Tian

3 Experimental Thinking and Design 3.1 Experimental Ideas This paper conducts research on the human resource management of small and medium-sized enterprises with artificial intelligence. It takes the application of artificial intelligence in human resource management as the experimental group and the traditional human resource management methods as the control group, from the aspects of model, personnel, system, and structure. Explore the impact of artificial intelligence on human resource management.

3.2 Experimental Design Big data and artificial intelligence have brought great value to social development and corporate management, and will have a significant impact on data processing and industrial upgrading in corporate management. For an enterprise, the rational use of its employees can increase its external competitiveness. With the development of massive data and artificial intelligence, enterprise competition is becoming increasingly fierce, and the application of artificial intelligence technology will become more and more important to human resource management. This research aims to study the intelligentization of human resource management in small and medium-sized enterprises. According to the division of the experimental group and the control group, the human resources department of a small and medium-sized enterprise is selected as the experimental object, and the human resource management methods of the experimental group and the control group are carried out respectively. The index concepts involved include performance management, welfare management, labor relationship management, human resource planning, and employee recruitment. A simple scale is used to evaluate the human resource management processing capabilities of the two groups. 10 points in the score are the upper limit. The higher the score, the better the indicator processing. The index distribution of enterprise human resource management is shown in Table 1. Table 1 Index scores of enterprise human resource management

Indicator name

Test group

Control group

Performance management

9.2

8.7

Salary and benefits management

8.9

8.8

Labor relation management

8.6

8.4

human resource planning

9.7

8.1

Staff recruitment

9.4

8.5

Optimization of Human Resource Management in Small …

771

4 Discussion 4.1 Intelligent Research on Human Resource Management of Small and Medium-Sized Enterprises With the development of artificial intelligence technology, it has brought huge energy and value to industrial transformation and enterprise upgrading. It is the inevitable result of technological innovation and social and economic development. In the process of modern society, the introduction of artificial intelligence into enterprise management can not only improve the production efficiency of the internal governance structure of the enterprise, but also promote the development of the enterprise. For enterprises, the influence of big data and artificial intelligence will penetrate into the business management, and the effectiveness of human resource management is directly related to the economic benefits of the enterprise. At the level of human resource management, after the introduction of artificial intelligence into human resource management, artificial Intelligence will eventually replace traditional jobs. Human resource management is the top priority to improve the core competitiveness of an enterprise, and it will inevitably change with the development of big data and artificial intelligence. Artificial intelligence can provide different solutions to different types of problems, but artificial intelligence technology can only record and track the affairs at work, and cannot replace some of the decision-making problems that humans think. This also requires human brains. Thinking about the connotation of information. With the development of massive data and artificial intelligence, under the conditions of increasingly fierce competition among enterprises, the application of artificial intelligence technology is increasingly being valued by enterprise human resources. The indicators of corporate human resource management are divided into: performance management, labor relationship management, human resource planning and welfare management, etc. It can be seen from Fig. 1 that, compared with the control group, the scores of various human resource management indicators in the experimental group are higher than those of the control group; while the control group’s various ability scores are significantly lower than the experimental group. The intelligent human resource management of the experimental group integrates many factors, which can greatly improve the efficiency of human resources of the enterprise, so as to achieve a significant improvement in the processing efficiency of human resource management in terms of information. According to the comparative analysis of the performance management scores of the two groups, it can be seen from Fig. 2 that the differences between the two groups are obvious. The scores in the performance plan, performance implementation, performance appraisal and performance feedback stages of the experimental

772

F. Tian

Labor management

Salary management

Staff recruitment

Manpower planning

Performance management 7

7.5

8

8.5

9

9.5

10

Score Control group

Test group

Fig. 1 Enterprise human resource management score

10 9 8

Score

7 6 5 4 3

2 1 0 plan

implementation Test group

appraisal

Feedback

Control group

Fig. 2 Comparison of performance management scores between the experimental group and the control group

group are higher than those of the control group. It can be seen that artificial intelligence technology can also be interspersed with it, and artificial intelligence supervision, coaching, and face-to-face interview technology can be integrated into performance work, which can effectively reduce the workload of management and improve performance.

Optimization of Human Resource Management in Small …

773

4.2 Suggestions for the Reform of Human Resource Management in the Artificial Intelligence Era For how human resource management practitioners and business operators use artificial intelligence, the application and influence of artificial intelligence in human resource management are two-way. In this article, we put forward some relevant suggestions from the aspects of thinking, innovation and awareness: (1)

(2)

(3)

Corresponding to the trend of the times, full research on history has proved that the intelligent trend of big data processing in the Internet era is the general trend, and the application of artificial intelligence has become an inevitable trend. Human resource management must conform to this trend and learn relevant knowledge and advanced experience; Redefine tasks and change the way of thinking. Human resource management must change the way of thinking and redefine tasks. Define yourself as a team, which can help management departments and departments change and adapt to new ideas. Use artificial intelligence technology to build artificial intelligence networks. Improve the efficiency of human resource management and realize intelligence; Artificial intelligence management plays a very powerful and very clear role in the activities of artificial intelligence technology. Therefore, artificial intelligence technology will be widely introduced in future human resource management. However, the power of artificial intelligence and the explosion of big data are still dual effects. Therefore, in the process of using artificial intelligence, it must be properly managed to be able to extract data and information, and it needs to play an active role in reducing negative impacts.

In the process of applying artificial intelligence, it is necessary for enterprise personnel to raise their awareness of innovation. No artificial intelligence product can replace the role of humans, and humans are still essential in human resource management. Artificial intelligence can only provide solutions to problems that have occurred in the past and certain specific problems. It can only record and track affairs at work, and cannot replace some decision-making problems that humans think. This also requires human brains for information. Connotation thinking. Decision makers also need to understand the development trend of the organization from the perspectives of their own culture, corporate governance, development direction, and emotional exchanges of corporate staff. These are not artificial intelligence technologies that can be summarized by data alone. Decision makers need to make their own decisions. Therefore, human resource management should enhance understanding, innovation and give full play to its role.

774

F. Tian

5 Conclusions In the process of studying the optimization of human resource management in small and medium-sized enterprises based on artificial intelligence, this paper uses artificial intelligence in human resource management as the experimental group, and conducts application research in the form of a control group of traditional human resource management methods. The simple scale is used to assess the human resource management capabilities of the two groups. In the comparative analysis, the experimental group can effectively promote the progress of enterprise human resource management and can effectively integrate various data. After the introduction of artificial intelligence into human resource management, artificial intelligence will eventually replace traditional jobs. Human resource management is the top priority for improving the core competitiveness of enterprises, and it will inevitably change with the development of big data and artificial intelligence. Artificial intelligence technology can be deeply applied in the field of human resource management, helping human resource management practitioners to make decisions on complex issues, making decision-making more scientific and efficient.

References 1. Alyass, A., Turcotte, M., Meyre, D.: From big data analysis to personalized medicine for all: challenges and opportunities. BMC Med. Genom. 8(1), 33–34 (2015) 2. Lu, H., Li, Y., Chen, M., Kim, H., Serikawa, S.: Brain intelligence: go beyond artificial intelligence. Mob. Netw. Appl. 23(2), 368–375 (2017) 3. Moravík, M., Schmid, M., Burch, N., Lisy, V., Morrill, D., Bard, N., et al.: Deepstack: expertlevel artificial intelligence in heads-up no-limit poker. Science 356(6337), 508–509 (2017) 4. Mcelwee, G., Warren, L.: The relationship between total quality management and human resource management in small and medium-sized enterprises. Strateg. Change 9(7), 427–435 (2015) 5. Lu, Wang.: The innovation of the tourism enterprise human resources performance management thinking. J. Shandong Inst. Commerce Technol. 017(001), 7–8, 36 (2017) 6. L˛egowikMalolepsza, M., Salek, R., Bubel, D., Baskiewicz, N.: Disruptions of the flow of information in business management. J. Clin. Invest. 113(9), 1271–1276 (2016) 7. Doucette, M.H., Bradford, W.D.: Dual job holding and the gig economy: allocation of effort across primary and gig jobs. South. Econ. J. 85(4), 1217–1242 (2019) 8. Le Grand, N.L., Muir, K.W., François Pétillon, C.J., Pickett, P.S., Talarmin, J.: Electrochemical cleavage of n=n bonds at a mo2(µ-sme)3 site relevant to the biological reduction of dinitrogen at a bimetallic sulfur centre. Chemistry 8(14), 3115–3127 (2015) 9. Kachlami, H., Yazdanfar, D.: Determinants of sme growth: the influence of financing pattern: an empirical study based on Swedish data. Manag. Res. Rev. 39(9), 966–986 (2016) 10. Kashwan, P.: Integrating power in institutional analysis: a micro-foundation perspective. J. Theor. Polit. 28(1), 5–26 (2016)

Legal Dilemma and Outlet of Privacy Protection in the Era of Big Data Xueping Liu

Abstract The development of the Internet has promoted the development of big data, and the quantification of information in the era of big data has caused an upsurge of personal privacy protection. To solve the problem of privacy protection of personal privacy in the era of big data, this article uses the literature analysis method to refer to the research experience of many previous scholars, and synthesize your own understanding, use cryptography to encrypt personal privacy in the era of big data, and implement encryption and decryption operations of the data processing process through the ESF algorithm to ensure the security of personal privacy. And comparatively analyzed the degree of importance my country and the United Kingdom, France and India attach to privacy-related laws, and the privacy leaks in four countries from 2015 to 2019. The final result shows that, before the right to privacy was widespread, China and India had 239 cases and 347 cases of privacy leakage, while Britain and France had 144 cases and 131 cases of privacy leakage because they had already implemented privacy laws. With the improvement of privacy-related laws, there are fewer and fewer privacy leaks, but the country still needs to pay attention to privacy-related laws and restrict and sanction offenders through relevant laws to reduce or avoid personal privacy leakage. Keywords Big data · Personal privacy · Privacy protection · Literature analysis

1 Introduction 1.1 Research Background Although big data and the Internet of Things bring well-known benefits, they also face a wide range of attack surfaces, causing serious attention to the concepts of

X. Liu (B) The Department of Business Administration, Guangzhou College of Technology and Business, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_95

775

776

X. Liu

trust, security, and privacy [1]. In the era of big data, ubiquitous information collection captures almost all personal information, super powerful data analysis exposes more privacy of individuals, reverse identification of personal information makes us become “transparent people”, and the technology used by advanced instruments can obtain our information from space. In this case, meeting the security and privacy requirements plays an important role [2]. Many scholars have studied the protection of the right to privacy. Bednar et al. have studied two important data security issues: secure and reliable distributed data storage and fine-grained distributed data access control for sensitive and private patient medical data. They discussed various practical issues that need to be considered when meeting security and privacy requirements, investigated relevant solutions in sensor networks and WBAN, and analyzed their applicability [3, 4]. Abbas et al. developed a privacy preserving model for event data, which applied the accepted concept of differential privacy. They propose potential privacy leakage and prevention methods, which stage of privacy disclosure should use the event log protection model, and based on this understanding, instantiate the concept of differential privacy for process discovery methods [5, 6]. From the previous research, in the era of big data, the legislation of traditional thinking can not protect personal privacy. Legislation should be connected with the judiciary, and ideas should be changed and content should be reconstructed. In this paper, the right of privacy under big data is initially defined, showing the characteristics and value of privacy under big data. In practical sense, it can make people more clear how to protect privacy.

2 Method 2.1 Big Data In today’s society, the Internet world is changing with each passing day. After continuous development and improvement, the Internet industry has entered the era of “big data". Big data is a kind of technology with high processing frequency. Its data capacity is very high, and its complexity is also very high. It is a kind of data collection that is difficult to grasp, manage and process in a period of time with traditional database software. It’s a huge, high growth rate and diverse information that requires a new way of processing to have stronger decision-making, insight and discovery capabilities. Big data technology refers to the analysis of massive data through certain technical means in order to mine the potential value of data. Big data technology has four important characteristics: (1) the data volume is huge, from GB level and TB level. So far, some data have even reached PB level, and the amount of data is increasing. (2) There are many data types, which contain many types of data, such as integers, large integers, floating-point, Boolean, etc. (3) The price density is low, only a small part of the data has the value of use after introducing a large amount of

Legal Dilemma and Outlet of Privacy Protection in the Era …

777

data. (4) The processing speed is fast. Through the high-speed computer ability of the platform big data set, the purpose of fast extraction and analysis of massive data can be achieved. The rise of big data also brings challenges to privacy, security, data ownership, data management and Governance [7].

2.2 Personal Privacy Privacy comes from human shame. With the rapid development of video recording technology, personal privacy protection becomes more and more difficult. The concept of privacy is constantly changing and enriching with the progress of science and technology and the transformation of economic society. As for the concept of the right of privacy, there is still no unified definition in academic circles. Some people think that the right of privacy is a kind of right free from outside interference and to be alone; some people think that the right of privacy is for the privacy of personal life and the retention and control of personal private information. The purpose of the existence of privacy is to let us hide and retain our private information in front of others, and have our own space to be alone. Personal privacy refers to the personal space and activities that natural persons are not willing to disclose and do not involve public interests. It is not only in the form of information. Once these contents with private nature are confirmed by law, they will become legitimate and legitimate interests. In the definition of legal attributes, they should be regarded as the protection object of personality rights [8]. The laws and regulations on the protection of privacy of personal data abroad are relatively complete, especially in the United States, Britain and France. The United States, which first proposed to protect personal information, adopted personal legislation, namely, the protection field, the types of tort and the method of assistance, which were divided into many laws and regulations, but there is no complete code. In contrast, China’s personal data privacy protection legislation started relatively slowly, and did not form a complete legal system. After the privacy right of citizens is disclosed or infringed, they can protect their rights according to the constitution of “freedom of communication and inviolability of secret communication”, the provisions of administrative law to balance public and private rights, the general principles of civil law and relevant judicial interpretations. However, these legal provisions do not explicitly regard the right of privacy as an independent personality right.

2.3 Privacy Protection The protection of privacy is an important symbol of the development of social civilization. When collecting data from multiple organizations for business decision-making, it is important to ensure the confidentiality and privacy of personal information [9]. At this stage, privacy is mainly protected from the following three aspects: first, legal

778

X. Liu

protection. China advocates the rule of law, citizens can use the law to protect personal privacy. At present, many countries have formulated relevant laws on personal privacy protection. Second, industry self-discipline. Enterprises and institutions that master a large number of customer privacy data, especially Internet platform enterprises, store massive user information, and need to respect the privacy of users and protect their privacy information. Third, the technical level. The protection of sensitive information through privacy protection technology has been valued and recognized by more and more researchers. At present, privacy protection technologies based on anonymous model, data encryption and data distortion are widely used. Now people pay more and more attention to confidentiality and privacy in web related tasks, which forces relevant organizations to provide more secure solutions for everyone and respect the right of personal privacy [10].

2.4 Literature Analysis In order to improve and perfect the protection of privacy in the network environment, based on the full review and collection of relevant documents, the research results of past scholars and the defects of the current privacy protection law are summarized and analyzed, then conduct a general analysis of various important works, journals and other scholars’ papers, academic reports, and even news materials reported by the media, and put forward their own views and opinions on the preparation of sufficient data collection.

3 Experiment 3.1 ESF Encryption Algorithm Lightweight block cipher ESF algorithm is an encryption algorithm based on feisty structure, the round function uses SPN instead of the permutation network, and 31 rounds of the structural iteration method are used internally to realize the data input of the left and right sectors, the encryption process includes arithmetic functions such as exclusive or function, key addition and cyclic replacement. The packet length of the ESF algorithm is 64 bits, and the key length is 80 bits. The steps of the ESF encryption algorithm are as follows: (1) ESF uses 64-bit plain-text as input, and is divided into two parts. The 32-bit R0 n the right half enters the round function F, and the left half is circularly shifted to the left by 7 bits. (2) For r = 1, 2, 3, · · · , 31, perform the following operations: Rr +1 = (L r −1 < 7) ⊕ F(Rr , K r ); L r +1 = Rr

(1)

Legal Dilemma and Outlet of Privacy Protection in the Era …

779

(3) Finally, after 31 rounds of transformation, 64-bit cipher-text C = L 32 ||R32 is output.

3.2 ESF Decryption Algorithm The decryption algorithm of the lightweight block cipher ESF algorithm is the inverse process of the encryption algorithm: (1) For r = 31, 30, · · · , 1, 0, calculate: Rr = L r +1 ; L r = (F(L r +1,Kr ) ⊕ Rr +1 ) >>> 7

(2)

(2) The output M = L 0 ||R0 is 64-bit plain-text. In the decryption algorithm, assuming that the encryption round key of the lightweight block cipher ESF algorithm is (K 1 , K 2 , · · · , K 32 ), then just change the decryption round key to the reverse order of the encryption round key, namely (K 32 , K 31 , · · · , K 1 ), the decryption process of the ESF algorithm can use the same structure and round function as the encryption process. Define two transformations σ (L , R) = (R, L) and τ K (L , R) = (L ⊕ F(R, K ), R), Where F is the round function of the ESF algorithm, verify τ −1 = τ and τ K−1 = τ K , then σ and τ K are involutive transformations. I P is the initial transformation can represent cyclic shift, so the complete 32 rounds of encryption process can be expressed as: Y = E K (X ) = I P −1 τ K 32 σ τ K 31 , · · · , σ τ K 1 I P(X )

(3)

Therefore, the decryption process can be expressed as: X = E K−1 (Y ) = I P −1 τ K 1 σ τ K 2 · · · σ τ K 32 I P(Y )

(4)

4 Result 4.1 Enforcement of the Privacy Protection Law Statistics on privacy leaks in countries that have adopted privacy protection laws (such as the United Kingdom, France) and countries that have not implemented privacy protection (such as China and India), and the situation of privacy leakage after the gradual improvement of the privacy protection law from 2015 to 2019. The final data statistics are shown in Table 1.

780

X. Liu

Table 1 List of privacy breaches Country

2015

2016

2017

2018

2019

China

239

210

197

160

100 200

India

347

300

284

243

Britain

144

124

101

95

80

France

131

111

100

87

73

Privacy breach

350 300

347 300

284

Data

250 200

243

239 210

100 50

200

197

150

160

144

124

131

111

101 100

95 87

100

80 73

0 2015

2016

China

2017 Year India

Britain

2018

2019

France

Fig. 1 Diagram of privacy breach

In order to observe the privacy leakage more clearly, we combine the data in Table 1 and convert it into a graph to observe the data. The privacy leakage situation is finally shown in Fig. 1. According to the data in Table 1 and Fig. 1, we can see that before the privacy law was perfected, privacy leaks were serious, with privacy leaks as high as 120. Since the UK and France have adopted privacy protection laws before, there were fewer privacy leaks in these two countries in 2015. Later, with the improvement of the privacy protection law, the number of privacy leaks decreased year by year.

4.2 Importance of Privacy Protection We reviewed the privacy laws of the United Kingdom, France, China, and India, and learned about privacy breach cases in four countries, and analyzed the importance of the four countries on privacy laws. The final results are shown in Table 2.

Legal Dilemma and Outlet of Privacy Protection in the Era …

781

Table 2 Scale of importance Country

China

India

Britain

France

Importance

255

10%

555

60%

Fig. 2 Degree of importance of privacy related laws

The importance of privacy law

25%

60%

10%

China India Britain France

55%

In order to have a clearer and more intuitive understanding of the importance of China, India, the United Kingdom, and France on privacy-related laws, we converted the data in Table 2 into a pie chart for observation, and the results are shown in Fig. 2. According to the data in Fig. 2, we can see that among the four countries of the United Kingdom, France, China and India, France attaches importance to privacyrelated laws at 60%, which is the highest among the four countries; India’s privacyrelated laws the emphasis is 10%, the lowest in four countries. Privacy breach.

5 Conclusion Through the application of different technologies, privacy is in danger of being leaked at any time, and the form of privacy protection has also changed, the concept of privacy along with the development of the times and changes in society, privacy is facing an even greater crisis. At the same time, as my country’s economic exchanges with other developed countries in the international community continue to deepen, the problem of online privacy has become increasingly serious, and the gaps and deficiencies in my country’s online privacy protection have become increasingly apparent. We must strengthen the protection of online privacy in our country as soon as possible, pay more attention to the formulation of relevant privacy laws, establish

782

X. Liu

a complete and coherent online privacy protection system based on China’s national conditions, reduce or avoid the leakage of online privacy, and ensure the security of personal privacy.

References 1. Li, F., Li, H., Wang, C., et al.: Guest editorial special issue on security and privacy protection for big data and IoT. IEEE Internet of Things J. 6(2), 1446–1449 (2019) 2. Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015) 3. Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2016) 4. Bednar, K., Spiekermann, S., Langheinrich, M.: Engineering privacy. Inf. Soc. 35(5), 122–142 (2018) 5. Mannhardt, F., Koschmider, A., Baracaldo, N., et al.: Privacy-preserving process mining. Wirtschaftsinformatik 61(5), 595–614 (2019) 6. Abbas, H., Maennel, O., Assar, S.: Security and privacy issues in cloud computing. Ann. Telecommun. 72(5–6), 233–235 (2017) 7. Andreu-Perez, J., Poon, C.C.Y., Merrifield, R.D., et al.: Big data for health. IEEE J. Biomed. Health Inf. 19(4), 1193–1208 (2015) 8. Li, Q.Y., Zhang, L.: The public security and personal privacy survey: biometric technology in Hong Kong. IEEE Secur. Priv. 14(4), 12–21 (2016) 9. Mathew, G., Obradovic, Z.: A distributed decision support algorithm that preserves personal privacy. J. Intel. Inf. Syst. 44(1), 107–132 (2015) 10. Ruiz, R.D.S., Rogério, W., Park, K., et al.: Overconfidence: personal behaviors regarding privacy that allows the leakage of information in private browsing mode. Soc. Dig. Inf. Wireless Commun. 4(3), 404–416 (2015)

Legal Nature of Artificial Intelligence Products Xueping Liu

Abstract With the improvement of artificial intelligence personification technology, its self generated content is more and more up to the level of natural person works, in line with its appearance elements, and has considerable copyright market value. Due to the improvement of artificial intelligence personification technology, there are more and more artificial intelligence products, but there is a lack of legal nature of artificial intelligence products, and the ownership of artificial intelligence products cannot be guaranteed. In order to solve the problem of judicial protection of artificial intelligence products, this paper studies the legal nature of artificial intelligence products through the ownership of the rights of artificial intelligence, the creation of artificial intelligence, and the composition of artificial intelligence products. This paper uses the method of questionnaire to collect data on the legal protection of artificial intelligence products, and the results show that for the generation of artificial intelligence, the legal protection of artificial intelligence products can be obtained The number of people who support the mode of work protection is as high as 48.9%, which shows that it is necessary to protect the artificial intelligence by law. Keywords Artificial intelligence products · Legal nature · Power ownership · Judicial protection

1 Introduction With the rapid development of information age, artificial intelligence has become indispensable in our life. The continuous progress of artificial intelligence not only brings about profound changes in a certain discipline field, but also has a profound and inestimable impact on the whole world. Countries in the world constantly adjust their policies and laws to deal with the impact and challenges brought by artificial intelligence. While carrying out effective social regulation and control, they vigorously promote the in-depth development of artificial intelligence, so that artificial X. Liu (B) The Department of Business Administration, Guangzhou College of Technology and Business, Guangzhou, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_96

783

784

X. Liu

intelligence can better serve their own country, and thus promote the sustainable development and continuous progress of the country. With the increasing importance of artificial intelligence in our lives, many teams have studied it. For example, Jian experts found that so far, artificial intelligence has been able to create novels, music, paintings and other generated works, which face some copyright legal issues. First of all, in view of whether the product is a work or not, from the dogmatic analysis of the law, the work generated by artificial intelligence conforms to the constituent elements of the “external performance” of the work, and has the possibility of “originality”. From the perspective of instrumental philosophy, the protection of works as works can better realize the purpose of copyright protection. Based on the above foundation, the ownership of the rights of the artificial intelligence generated works needs to be analyzed according to the categories of the generated works, that is, the ownership of the second type of generated works should be the actual responsible person, and the third type of generated works should belong to the owner of an artificial intelligence [1]. Andrew found that artificial intelligence (AI) is gradually changing medical practice. With the latest development of digital data acquisition, machine learning and computing infrastructure, artificial intelligence applications are expanding to areas previously considered only human experts. In this review article, we summarize the latest breakthroughs in artificial intelligence technology and its biomedical applications, identify the challenges for the further development of medical artificial intelligence systems, and summarize the economic, legal and social significance of artificial intelligence in the field of health care [2]. Yang found that the rapid development and wide application of artificial intelligence technology has brought a series of problems that need to be solved by civil law, such as the legal status, behavior nature, responsibility attribution, hazard prevention and so on. Considering these problems, there are different opinions on whether to solve these problems with some new civil rules or to seek solutions within the scope of the basic concepts and rules of the current civil law [3]. In order to solve the shortage of judicial protection path in the legal nature of artificial intelligence products, this paper analyzes the legal nature of artificial intelligence products from the following aspects: the ownership of the rights of artificial intelligence products, the creation of artificial intelligence and the constituent elements of artificial intelligence products. From these aspects, it is concluded that the protection modes of artificial intelligence products include work protection mode and neighborhood protection mode there are three kinds of protection modes: the right access protection mode and the anti unfair competition law protection mode. Through questionnaire survey, we can more intuitively see that the legal nature of artificial intelligence products is still lacking. The survey results show that the legal protection of artificial intelligence products is necessary [4].

Legal Nature of Artificial Intelligence Products

785

2 Method 2.1 Ownership of AI Creations As artificial intelligence creations cannot become works and be protected by copyright, so in the scope of intellectual property law, after excluding copyright law, I think it is more in line with expectations to regulate artificial intelligence creations through anti unfair competition law. But in this way, there will be some obstacles in the ownership of rights. Because it has been stipulated in the current law that artificial intelligence is an object of rights, if we need to use the “creativity” of the object of artificial intelligence to create knowledge wealth, then the creation of artificial intelligence will become the object of the object, which is not convenient for us to manage and protect the creation of artificial intelligence [5]. Whether we can give the status of the subject of rights of artificial intelligence, so that the creation generated by artificial intelligence directly belongs to the artificial intelligence itself, so as to make it more convenient for us to manage and use it. According to the provisions of the civil law system on the subject of rights, natural persons and legal persons are exhaustive enumeration of the subject of rights. However, there is a clear and strict division between the subject and the object of the right, which can not be converted to each other [6]. The strict division and conversion prohibition between the subject and the object of right is the inevitable result of the domination of absolute right. Private law completely denies the possibility that the subject becomes an object under any circumstances and is regarded as a disposable object. However, this restriction also excludes the possibility that the object dominates the object or the object belongs to the object. Therefore, if the interpretation is strictly based on the current legal framework, artificial intelligence itself as the object of rights, it obviously can not have the same meaning or will as a natural person and become the subject of rights, and its generated content can not become the object of rights. Since only the subject of rights can prohibit unauthorized infringement, the research and analysis of the subject of rights is related to who owns the rights and how to protect them [7]. According to the different answers to the question “whether artificial intelligence can become the subject of rights”, it can be divided into three main viewpoints: artificial intelligence can become the subject of rights within the current legal framework; artificial intelligence cannot become the subject of rights; and the establishment of new rules for the ownership of artificial intelligence rights outside the current legal framework.

2.2 Artificial Intelligence Creation At present, the development level of science and technology has not reached the stage of “general artificial intelligence” and has “creativity” Microsoft Xiaobing is only a narrow sense of deep learning ability based on neural network algorithm (whole brain simulation) in algorithm layer artificial intelligence. Although there

786

X. Liu

are three principles for the creation of artificial intelligence (the creative subject of artificial intelligence has IQ and EQ at the same time; it can become a work with independent intellectual property rights; it corresponds to the creative behavior of human beings, rather than a simple replacement of human labor), we can not think that human intelligence has ideas, let alone that artificial intelligence has meaning Knowledge. Because thought is the category of subjective emotion, it is the result of being processed by consciousness based on objective reality. Usually We say that people or animals have ideas, but people or animals are living things [8]. Artificial intelligence is an object created by human beings and the product of human intellectual civilization. Whether its thoughts are endowed by human beings or acquired by themselves on the basis of human endowments is a very critical issue [9]. There is also a magic formula of artificial intelligence, which is the famous Bayes P(A|B) =

P(B|A)P(A) P(B)

(1)

2.3 Components of Artificial Intelligence Products To clarify whether artificial intelligence creation belongs to works, we need to start from the definition of works. “Works referred to in the copyright law refer to intellectual achievements that are original and can be reproduced in some tangible form in the fields of literature, art and science.” The object of copyright works must be the intellectual achievements of human beings, the external expression that can be objectively perceived, the achievements in the fields of literature, art or science, and originality [10]. According to the four elements of the works, we can find the answer to the question whether the artificial intelligence creations can become the “works” in the legal sense.

3 Experience 3.1 Data Sources Through the search and collation of books, documents, academic materials and other channels, we can fully prepare the materials of the national artificial intelligence exhibition, and consult the relevant literature and artificial intelligence works, and summarize, sort and classify the information. Some of them need to be extracted from the cited materials and indicate the source. Detailed statistical data and classification are needed for the award-winning artificial intelligence works in the national exhibitions in recent years, because these works will be selected as the main research

Legal Nature of Artificial Intelligence Products

787

objects, and the original materials will be searched as much as possible. In order to improve the authenticity and persuasion of the text, the first-hand material or generally credible material should be found for the contradictory parts in the material. Through the analysis of the existing cases, the judge’s thinking and conclusion in the judicial process can accurately grasp the problems and deficiencies of the content generated by artificial intelligence in judicial protection. By collecting papers, journals and Monographs on relevant topics, we can sort out the current situation of theoretical research at home and abroad, so that the research process of this paper is more problem-solving, and the research results are more supported by theoretical basis. Through understanding the development status and historical track of artificial intelligence technology, it is helpful to recognize the essential purpose of artificial intelligence technology and accurately grasp the development trend of artificial intelligence technology. Studying the evolution process of relevant laws can better explore the legislative intention of legislators, so as to put forward the scheme in line with the legislative purpose when studying problems. Through the judgment, analysis and selection of different legal values, the legal qualitative analysis and right attribution judgment of the content generated by artificial intelligence can be realized, and the correct social value orientation of the content discussed in this paper can be achieved. The data is obtained by questionnaire for people who have used artificial intelligence works in their lives. A kind of. In order to ensure the basis of statistical data and the enrichment of relevant laws of artificial intelligence works, this paper mainly investigates the protection mode of artificial intelligence works, the protection mode of neighboring rights and the protection mode of anti unfair competition law.

3.2 Data Analysis The analysis step is to first identify the cases involving the laws related to AI products, which can be one or a group. Then through the analysis of relevant cases, this paper explores which of the three protection modes of artificial intelligence products are involved in this case. Then we will collect relevant papers, journals and monographs, as well as the development status and historical track of artificial intelligence technology, and explore the protection mode of these papers, journals and monographs. Through this series of operations, we know the percentage of the three protection modes in all cases of artificial intelligence. The percentage of people supporting the three protection modes was obtained by questionnaire.

788

X. Liu

Table 1 Literature statistics of relevant cases Work protection mode

Adjacent right protection mode

Protection mode of anti unfair competition law

Cases of artificial intelligence works

10

7

3

Paper

15

9

6

Periodical

5

6

4

Monograph

7

5

6

Law

7

5

5

4 Discussion 4.1 Statistical Analysis of Relevant Case Literature Through the search of 100 case literature, there are 20 cases of related artificial intelligence works, 30 cases of related papers, 15 cases of related journals, 18 cases of relevant monographs and 17 cases of laws related to artificial intelligence. Among the relevant cases of artificial intelligence works, there are 10 cases of work protection mode, 7 cases of adjacent right protection mode, and 3 cases of anti unfair competition law protection mode. There are 15 cases of works protection mode, 9 cases of adjacent right protection mode, and 6 cases of anti unfair competition law protection mode. Among the relevant journals, 5 cases are works protection mode, 6 cases are adjacent right protection mode, and 4 cases are anti unfair competition law protection mode. Among the relevant monographs, 7 cases are works protection mode, 5 cases are adjacent right protection mode, and 6 cases are anti unfair competition law protection mode. Among the relevant artificial intelligence laws, 7 cases are works protection mode, 5 cases are adjacent right protection mode, and 5 cases are anti unfair competition law protection mode (Table 1 and Fig. 1)

4.2 Statistical Analysis of Questionnaire 200 questionnaires were sent out, including 50 junior high school students, 30 high school students, 15 professional women, 5 full-time mothers, 20 professional men, 50 staff of artificial intelligence companies and 30 elderly people. The results of the questionnaire show that 48.9% of 200 people support the work protection mode, 31.1% support the adjacent right protection mode, and the remaining 20% support the anti unfair competition law The results of the questionnaire survey are as follows (Table 2).

Legal Nature of Artificial Intelligence Products

789

law monograph periodical paper cases 0

5

10

15

20

Protecon mode of An Unfair Compeon Law Adjacent right protecon mode Work protecon mode Fig. 1 Bar chart of related case literature

Table 2 Percentage of the number of people supported by the three protection modes

Percentage (%)

Work protection mode

Adjacent right protection mode

Protection mode of anti unfair competition law

48.9

31.1

20

Fig. 2 The percentage of people supported by three protection modes

Percentage

Work protecon mode Adjacent right protecon mode Protecon mode of An Unfair Compeon Law

As the form of the table can not be more intuitive to understand, so with the pie chart, which is a more intuitive chart, the results of the questionnaire survey pie chart is shown in the Fig. 2.

5 Conclusion The legal protection of artificial intelligence is the extension of the legal protection of artificial intelligence. The ancient Greek philosopher protagora once said that “only talents can measure everything”, so the discussion on the nature and ownership of the content generated by artificial intelligence must be made clear under the premise of the existing legal subject. From the existing judicial cases, the problems in the

790

X. Liu

judicial protection of the content generated by artificial intelligence are essentially caused by the asymmetry between the legal norms of copyright and the development status of artificial intelligence. In order to solve the asymmetry between norms and facts, hermeneutics can be used to adjust the scope of application of norms to adapt to the development of social facts. To find out the root cause of the difficulty in judicial protection of the content generated by artificial intelligence, and to suit the remedy to the case, to provide an immediate way to solve the judicial disputes of the content generated by artificial intelligence, and fill the blank period of the legislative research process. How to better protect the generated content of artificial intelligence by law and system, so that it can not only be incorporated into the current legal norms, but also obtain a benign and substantial development, is the direction of the author’s continued efforts and research.

References 1. Jian, L., Law, S.O., University, G.: Research on the nature of generated work of artificial intelligence from the perspective of copyright. J. Fujian Jiangxia Univ. (2018) 2. Yu, K.H., Beam, A.L., Kohane, I.S.: Artificial intelligence in healthcare. Nat. Biomed. Eng. 2(10), 719–731 (2018) 3. Lixin, Y.: An attempt to solve the problems of legal adjustment of artificial intelligence with current civil law rules. Acad. J. Zhongzhou (2018) 4. Ming, C.: Beijing internet court denies copyright to works created solely by artificial intelligence. J. Intel. Prop. Law Pract. 8, 8 (2019) 5. Deliberato, R.O., Celi, L.A., Stone, D.J.: Clinical note creation, binning, and artificial intelligence. Jmir Med. Inf. 5(3), e24 (2017) 6. Hull, G.: The subject and power of bioethics. Retour Au Numéro 3(4) (2017) 7. Galasso, A., Luo, H.: Punishing Robots: Issues in the Economics of Tort Liability and Innovation in Artificial Intelligence. Nber Chapters (2018) 8. Gupta, P.K., Prasanna, D.V., Raghunath, S.S.: How artificial intelligence can undermine security: an overview of the intellectual property rights and legal problems involved. In: Applications in Ubiquitous Computing (2021) 9. Singh, S.K., Rathore, S., Park, J.H.: Block IoT intelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence. Fut. Gener. Comput. Syst. 110, 721–743 (2020) 10. Guadamuz, A.: Do Androids Dream of Electric Copyright? Comparative Analysis of Originality in Artificial Intelligence Generated Works. Social Science Electronic Publishing (2017)

Application Status and Prospect of Artificial Intelligence Big Data in Stadium Management Jianmin Ding, Chang Chen, and Kewei Yu

Abstract In recent years, the rapid development of Sports in China has greatly promoted the construction of domestic sports venues. The holding of the Olympic Games and the successful bidding for the Winter Olympic Games make the construction of stadiums and gymnasiums in full swing, but there are some problems in the management before and after construction. This paper analyzes the application of Artificial Intelligence (AI) big data in stadium construction management, and finds that the purchase cost of reinforcing steel and concrete increases with the increase of the reliability rate of delivery by the supplier, while the higher the reliability rate of cement delivery, the lower the total purchase cost. In addition, the research discusses the big data and the conversion mode of management, university gymnasium discusses the large data of AI application possibility and necessity of management in the gym, aims to provide a variety of stadium management optimization strategy, to alleviate the problem of unbalanced development of sports facilities, actively explore the urban resource sharing model. According to the research, the application of AI big data (BD) in stadium management in the future can effectively promote the reform of stadium management methods and operation, and helpfully meet the needs of holding big events such as sports events in cities. Keywords Artificial intelligence · Big data · Stadium management · Application status

1 Introduction In 2008, IBM proposed “smart Earth” for the first time at the Foreign Relations Conference in New York, that is, to change the way governments, companies and people interact in a more intelligent way by using the new generation of information technology, so as to improve the clarity, efficiency, flexibility and response speed of interaction [1, 2]. J. Ding · C. Chen (B) · K. Yu Department of Physical Education, Xinhua College of Sun Yat-Sen University, Guangzhou, Guangdong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_97

791

792

J. Ding et al.

There is no doubt that the future of intelligent sports has come [3, 4]. China’s intelligent sports have the expected function of “science and technology assistance” [5, 6]. Therefore, it is necessary to explore the complementary advantages and risk regulation of the superposition of AI technology and sports [7]. In the era of the rise of the network society, emerging information technologies such as BD and cloud computing under the Internet are constantly updated, effectively promoting the development of AI industry, which is a favorable condition for the integration of AI technology and sports [8]. In reality, the more and larger the number and scale of China’s stadiums and gymnasiums are built, the more serious the idle situation is, and the management level is low [9, 10]. This paper analyzes the background of the integrated development of AIBD and sports, its development status, internal logic and optimization strategy, and studies how to realize the operation and utilization of intelligent BD after sports venues, and explores the future application of AI big data in sports venues management.

2 Conceptual Explanation and Theoretical Elaboration 2.1 Application of AI and Stadiums AI is human intelligence implemented manually on a machine (computer) or simulated on a computer. At present, there is no clear definition of AI. In a broad sense, it is a subject that studies how to build intelligent computers or intelligent systems. In a narrow sense, AI is a science that makes research on human thinking skills through intelligent computers. In terms of intelligent sports venues, the Internet of things and the application software of convenient ticket purchasing system are mostly used to provide fans with comprehensive services during the on-site watching, so as to ensure that sports fans can enjoy the on-site watching experience. Top data companies such as Accenture, IBM and SAP also offer deeper levels of data processing support and management optimization, combining hardware and software to create an “immersive spectator experience” for the audience inside the venue.

2.2 The Cornerstone of AI Big Data in Stadium Management First, extensive data collection and precise matching are the core foundation. Due to the lack of data consciousness and information technology limited, the traditional sports venues can only in the most basic of sample survey method for limited data, and now with the continuous development of mobile Internet information technology, the generation of data and methods have been produced by the traditional way of passive to active, produced by each of the participants and the spread of the data will

Application Status and Prospect of Artificial Intelligence Big Data …

793

soon form a centered on its geometry information network. Secondly, the effective construction of the platform is the key factor of benign interaction. As far as the concept of “platform” is concerned, different disciplines have different understandings. In the field of computer, it mainly emphasizes the technicality of “platform”, which is mainly composed of operating system, database and product suite, etc., and its function is to guarantee the interaction of massive information.

3 Research Ideas and Key Points In this paper, on the basis of the traditional sports venues materials procurement model, analyzed the stadium supply chain procurement strategy based on BD, at the same time, define the source and classification of the data with supplier, for BD environment should follow the process of purchasing has made a concrete analysis, and with Beijing university gymnasium construction project as an example, introduces the BD thoughts in sports venues, the application of supply chain procurement on the basis of the analysis of data on the prospects of the application. The calculation formula of the algorithm used in this paper is as follows: Entr oy (t) = −

 k

Gini(t) = 1 −

p(ck |t) log p(ck |t) 

[ p(ck |t)]2

(1) (2)

k

Classification error (t) = 1 − max[ p(ck |t)]2 k

(3)

where p (ck | t) is the probability of the decision tree node T class CK. These three impure measures are equivalent and reach the maximum in the equal probability distribution. In order to judge the change of node impurity before and after splitting, the objective function is defined as information gain:  = I ( par ent) −

n  N (ai ) I (ai ) N i=1

(4)

I (.) corresponds to the impure of decision tree nodes. Parent is the parent node before splitting, n is the number of sample records contained by the parent node, ai is a child node after the parent node is split, N (ai) is its count, and N is the number of child nodes after splitting.

794

J. Ding et al.

4 Application Analysis of AI Big Data in Stadium Management 4.1 Application of AI Big Data in Stadium Construction Management The remarkable characteristic of the stadium construction project is the discontinuity of the production process. The strict material demand plan and inventory level are one of the important factors to ensure the project schedule. In addition, in order to avoid the influence of season, weather, personnel and other factors, the implementation of just-in-time production is currently the preferred production strategy of most construction enterprises. The BD of suppliers’ production capacity and delivery timeliness of building materials are two collections based on historical data respectively, as shown in Table 1. The production capacity of large data describing the supplier can provide the possibility of building materials and the reliability of the data, direct response is required for the supplier’s production status and product properties, flexible data and property data, product data and financial data of the supplier can provide the product will have direct impact, therefore be assigned to the production capacity of large data type; BD of delivery timeliness is one of the important factors that construction enterprises need to consider in order to ensure the construction progress. After obtaining and analyzing the BD of suppliers’ delivery timeliness rate and production capacity, the reliability rate of each supplier can be obtained comprehensively, and Table 1 BD of stadium building management Supplier BD

Data description

BD of production capacity Flexible data

Supplier production flexibility and management flexibility

BD of delivery time rate

Asset data

Supplier assets

Product data

The products and relevant technical information provided by the supplier to the enterprise

Financial data

The supplier’s financial position and the cost of establishing the partnership with it

Contact data

The data that enterprises should understand when investigating suppliers

The event data

Supplier has had or may have had a breach of contract., including supplier location decision, supplier delivery delay or error, etc.

Communication data Communication data between suppliers and manufacturers Risk data

Risk profile and reliability that suppliers may bring to the whole supply chain

Procurement costs

Application Status and Prospect of Artificial Intelligence Big Data …

90000 80000 70000 60000 50000 40000 30000 20000 10000 0

795

The purchase cost varies with delivery reliability rate

0.920 0.930 0.940 0.950 0.960 0.970 0.980 0.990 1.000

Reliability rate for shipment

Reinforced

Concrete

Cement

Fig. 1 The purchase cost varies with delivery reliability rate

this data can be applied to the procurement decision of stadium management. The results of the data analysis are shown in Fig. 1. The reliability rate of delivery and its sensitivity analysis for each material purchase suggest that the purchase cost of the material should be considered while meeting the normal level of delivery reliability rate for the order allocation of reinforcement and concrete. The delivery reliability rate should be selected as much as possible for cement allocation of purchase orders.

4.2 Optimization Application of Transformation Mode Under BD of AI Architectural design and traditional sports games after the function conversion design, is often examination according to the architect’s drawings and engineering data to make decisions based on their own, and in some cases received physical education teaching, student number, gender, preferences, and many other aspects, in the face of so many aspects and the influence factors of complex conditions, to master the use of BD technology is very important. In order to make rational use of BD technology and give full play to its effect, the use of BD should be considered comprehensively. First, collect related literature of the both, in order to meet the demand of urban sports diversified development as a benchmark, the implementation method by using the network information data of the preliminary collection, with the wide use of social software, the formation of the stadium site layout, scale, function image, such as appropriate technology cost problems through the generalization and analysis of relevant research data. Secondly, the technical means of measuring and evaluating various indicators of university gyms collected from research and analysis are collected and summarized. Combined with the characteristics of taking into

796

J. Ding et al.

account the diversified development demands of urban sports events, the construction scale, number of seats, cost and cost, per capita area, project preference and other conditions can be analyzed. Finally, according to the above research results, architects make decisions on efficient stadium design. By introducing the thinking mode of BD, sports architecture design has entered the stage of quantitative research, functional refinement and people-oriented design from experience design and engineering convention thinking. The functional characteristics of sports architecture have been given full play and resources have been optimized to avoid the waste of resources blindly used.

4.3 The Prospect of AI Big Data in Stadium Management At present, BD processing is usually petabyte-level, and the data volume of sports construction and sports industry will also be considerable. Different from traditional data processing, BD usually means large-scale and distributed computer cluster processing. BD processing is often realized by cloud computing technology. Cloud computing refers to the computing technology that makes use of dynamically adjustable virtualized computing qualifications composed of a large number of computing nodes to realize BD processing with controllable business quality through parallelization and distributed computing technology. Cloud computing technology is the result of the development and integration of distributed computing, Internet and other key technologies. The end of the twentieth century, with the Go091e, yahoo, amazon, Facebook, such as the rise of large Internet company, to search for data processing, e-commerce social network data processing and data processing as representative’s new BD processing requirements for BD development provides an important opportunity, and greatly promoted the development of the large data processing technology, and the data will be the gym management important reference.

5 Conclusion The emergence of BD technology brings new opportunities for the management of stadiums, especially for the design of university sports buildings combining flat competition with urban competitions. The flat match conversion design of the university gymnasium which takes into account the city games is an important carrier of the organic distribution of sports resources. BD technology provides a large number of data information support for it.

Application Status and Prospect of Artificial Intelligence Big Data …

797

References 1. Galily, Y.: Artificial intelligence and sports journalism: is it a sweeping change? Technol. Soc. 54, 47–51 (2018) 2. Patel, D., Shah, D., Shah, M.: The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports. Annals Data Sci. 7(1), 1–16 (2020) 3. Peter, E., Daniel, S., Michael, A., et al.: Artificial intelligence: bayesian versus heuristic method for diagnostic decision support. Appl. Clin. Inform. 09(02), 432–439 (2018) 4. Sudin, S., Md Shakaff, A.Y., Zakaria, A., et al.: Real-time track cycling performance prediction using ANFIS system. Int. J. Perform. Anal. Sport 8(2), 1–17 (2018) 5. Desmond, M.: Sensors in sports: a dive into applied machine learning. MSDN Mag. 33(11), 4–4 (2018) 6. Chu, C.C., Shih, C., Chou, W.Y., et al.: Artificial intelligence of things in sports science: weight training as an example. Computer 52(11), 52–61 (2019) 7. Fialho, G., Manhes, A., Teixeira, J.P.: Predicting sports results with artificial intelligence–a proposal framework for soccer games. Procedia Comput. Sci. 164(1), 131–136 (2019) 8. Cao, S.: Intelligent lighting control system in large-scale sports competition venues. Light Eng. 26(4), 172–182 (2018) 9. Gu, D., Lima, S., Rocha, Á.: Analysis of tactical information collection in sports competition based on the intelligent prompt automatic completion algorithm. J. Intel. Fuzzy Syst. 35(3), 1–10 (2018) 10. Yuan, H., Silberstein, S.D.: The use of botulinum toxin in the management of headache disorders. Handb. Exp. Pharmacol. 35(21), 6–9 (2020)

Training Model of Applied Talents in Universities in the Era of Big Data Shaobiao Deng

Abstract In the era of big data, the amount of data is larger and the structure is more complex. It penetrates into all areas of human life and shows unprecedented vigor and vitality. In the era of big data, the main purpose of this article is to combine big data with the applied talent training model of local colleges and universities to establish a three-body applied talent training model. This paper mainly uses the survey method to explain the concept, characteristics and functions of big data, so as to promote the cultivation of talents. The experimental results of this paper show that in the era of big data, the employment rate of college students has increased by 24% by applying the talent training mode of colleges and universities, some intractable social problems have been solved, and the problem-solving ability has been improved by 12%. Keywords The era of big data · The use of colleges and universities · Talent training model · Survey method

1 Introduction 1.1 Background and Significance The advancement of science and technology and the continuous development of the economy have produced many knowledge and technology-intensive industries in my country [1]. After joining the WTO, the entire Chinese economy is integrated with the world economy, and the demand for talent continues to increase [2]. The increase in knowledge and technology-intensive industries has fundamentally changed the demand for talents, and the demand for talents has shown diverse characteristics [4]. In addition to the need for a certain number of high-end research and development talents, a large number of highly-qualified and application-oriented talents with S. Deng (B) Yunnan Technology and Business University, 10 Junguan Road, Songming County, Kunming City, Yunnan Province, China

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_98

799

800

S. Deng

innovative consciousness and capabilities, solid basic theories, and strong practical hands-on capabilities that can solve practical problems in enterprises are required [3].

1.2 Related Work Huda M proposed a framework model to help teachers adapt to big data, help their teaching performance, and especially access resources. It includes investment in planning, time management and technical skills. His research is expected to enhance teaching performance in application guides in the era of big data to support multiple channels for evaluating knowledge. However, due to the instability of the big data framework, the resulting data is not very accurate [5].

1.3 Main Content This article mainly studies the application skill talent training model mainly from talent training objectives and specifications [6], talent training education process, management and evaluation system to ensure the implementation of application talent quality, and scientific teaching methods and means consistent with the goals [7, 8]. The innovation of this article is to combine the experience of German, British and American undergraduate applied talent training model [9, 10].

2 Training Method of Big Data Talents 2.1 Big Data Teaching Development Method The essence of making a single-stage English teaching plan is to optimize the decision function d: X → A, making the teaching effect Y optimal. In other words, it is necessary to find the optimal decision function d ∗ (X ), so that: d ∗ (X ) = arg max E(Y |d()X, X )

(1)

Therefore, the single-stage English teaching scheme only needs to find the optimal decision function to maximize the value of E. From the evaluation of precision teaching program, we can get: (2)

Training Model of Applied Talents in Universities in the Era …

801

According to the decision function, given the student’s characteristics and behavior performance x, we can judge which teaching plan to take for the student through the positive and negative of A. For example, if a = 1,indicates early warning intervention for students in teaching, If a = 0,It means that there is no early warning is more than 0, the students intervention for students in teaching, and when is less than 0, the students will will be given early warning intervention, When not be given early warning intervention. According to the decision function, each student can be given a targeted teaching program, so as to complete the formulation of accurate teaching program. It is worth noting that the formulation of precision teaching program is determined by the cross item of teaching program velocity in . Therefore, the the precision teaching program evaluation model, It’s up to estimation of parameters in the evaluation model of precision teaching plan has a key impact on the formulation of precision teaching plan.

2.2 Accurate Method Parameter Estimation In order to get the accurate teaching plan, we need to estimate the data and adopt the idea similar to the least square method. Given the observation data of N college students, the loss function is defined as: (3)

is used to express the parameter estimation of the evaluation model When of the accurate English teaching scheme, it can be concluded that: (4)

3 Practical Training Experiment of Applied Talent Cultivation As a practical training project for the training of application-oriented talents, the school-enterprise cooperation method should be used in combination with students’ professional knowledge and school teaching plan arrangements. Judging from the existing experience, the practical training program should be launched in the fifth

802

S. Deng

Table 1 Basic training arrangements Object

Science and engineering students

Form

School enterprise cooperation

Time

The fifth semester

Content

Java and ARM

Total class hours

190

Assessment form

Paper and object

semester of the university. To lay a good foundation for the sixth semester of employment internship, at the same time, practical training should be combined with professional learning, practical training should be combined with graduation topics, practical training should be combined with national competitions, and professional practical training should be used as an opportunity to comprehensively improve Professional practical skills, use practical training to strengthen the learning of professional basic knowledge, overcome professional problems, improve capabilities, and lay the foundation for employment internships. The specific arrangements are shown in Table 1.

4 Analysis of Training Model of Applied Talents in Colleges and Universities 4.1 Analysis of a Three-Body Talent Training Model The “one Taiwan, three bodies” application-oriented talent training model is a talent training model that uses big data platforms to strengthen information communication between the government, enterprises, and universities, and cooperatively cultivates application-oriented talents. In the “one-body, three-body” application-oriented talent training model, with the help of the big data platform, the government can publish the information and the latest policies that can be shared on the big data platform in time to provide reliable information and policies for universities to carry out education and teaching activities reference. At the same time, through the big data platform, the government can also collect some information related to the cultivation of application-oriented talents from universities and enterprises in time to better understand the training process of application-oriented talents, so as to provide effective training for applicationoriented talents in time Policy support to promote the improvement of the quality of applied talents. In the “one-body, three-body” application-oriented talent training model, with the help of big data platforms, colleges and universities can better understand the requirements of government policies and enterprise development for talents’ knowledge, ability, quality and other aspects to determine talent training goals and specifications. You can more accurately grasp the changing development needs of the market and forecast data, in order to scientifically adjust the major and curriculum

Training Model of Applied Talents in Universities in the Era …

803

Table 2 Statistical results of sample data Title number

Teacher

Student

A (%)

B (%)

C (%)

A (%)

B (%)

C (%)

1

66

63

62

65

66

73

2

64

74

62

82

86

85

3

74

84

88

67

71

63

4

73

78

79

69

61

84

system. At the same time, colleges and universities can also timely feed back relevant information on the cultivation of applied talents to the big data platform, so that the government and enterprises can better understand the latest situation of the cultivation of applied talents, and increase participation in the teaching process and evaluation of applied talents. Degree, avoid ivory tower teaching and a single evaluation subject, ensure the sociality of application-oriented talent cultivation, and promote the smooth employment and comprehensive development of application-oriented talents.

4.2 Analysis of Training of Applied Talents Students and teachers are direct participants in the cultivation of talents in colleges and universities. Therefore, these two groups have the most say in the issue of talent cultivation. Therefore, this study uses them as a sample and obtains their true evaluation and thoughts on the cultivation of applied talents of Yunnan Technology and Business University through their judgment based on their own situation. At the same time, statistical analysis is carried out on the data of the questionnaire survey, in order to discover the problems in the cultivation of applied talents of Yunnan Technology and Business University, and provide an objective realistic basis for the in-depth analysis of the subsequent part. The data obtained are shown in Table 2. By analyzing the statistical results of the above samples, the following results can be obtained: Teachers and students believe that training objectives and curriculum design are the factors that have the greatest impact on the cultivation of applied talents in Yunnan Technology and Business University, followed by teaching methods and organizations. Both teachers and students believe that their proportion in practice teaching is relatively low, which shows that teachers it is quite consistent with students’ overall understanding of the cultivation of applied talents in schools. The survey results of the overall status of applied talent cultivation also show that teachers and students are still very satisfied with the current school situation, teacher satisfaction (78%) is greater than dissatisfaction (69%), student satisfaction (66%) is greater than dissatisfaction (71%), but it is worth noting that teachers and students generally have a larger proportion of choices, indicating that schools generally have gaps with teachers and students’ expectations in the training of applied talents (Fig. 1).

804

S. Deng

Fig. 1 Comparison of the importance of the four factors in the training of applied talents

From the statistical analysis data, it can be seen that teachers are highly satisfied with the school’s training goals and curriculum settings, but students are not. The general selection rate is higher, accounting for 44%, while the teachers and students who are not satisfied are smaller. The proportions were 9% and 17%, respectively, and students’ dissatisfaction was higher than teachers’ dissatisfaction.

Fig. 2 Comparison of what type of applied talents are cultivated

Training Model of Applied Talents in Universities in the Era …

805

From the statistical analysis data in Fig. 2, it can be seen that on the question of “what kind of application talents should colleges and universities should cultivate”, teachers believe that the creation of application (45%) is the most important, followed by technology application talents (35%), and finally the knowledge application talents (20%). For students, their choices are very different from those of teachers. Students believe that technology-applied talents (52%) are the most important, then knowledge-applied talents (34%), and finally creative talents (16%).

5 Conclusions In this paper, through the research of local independent colleges in China, combined with the disconnection of domestic talent training and market demand in recent years, and drawing on the experience of foreign advanced skilled talent training, a new talent training model for independent colleges should be cultivated. The study of talent training model is a dynamic system in constant development. The reform of talent training model in higher vocational colleges is an important task of teaching reform in higher vocational colleges.

References 1. Shang, C., You, F.: Data analytics and machine learning for smart process manufacturing: Recent advances and perspectives in the big data era. Engineering (English) 5(6), 981–1192 (2019) 2. Huda, M., Haron, Z., Ripin, M.N., et al.: Exploring innovative learning environment (ILE): Big data era. Int. J. Appl. Eng. Res. 12(17), 6678–6685 (2017) 3. Zheng, C., Lei, L., Zhenyu, Z., et al.: Learn to cache: Machine learning for network edge caching in the big data era. IEEE Wirel. Commun. 25(3), 28–35 (2018) 4. Huda, M., Maseleno, A., Shahrill, M., et al.: Exploring adaptive teaching competencies in big data era. Int. J. Emerg. Technol. Learn. 12(3), 68–83 (2017) 5. Liu, X.: Personnel training mode of teaching Chinese to speakers of other language based on belt and road strategy. Agro Food Industry Hi Tech 28(1), 79–82 (2017) 6. Du, J.: Strategic study on medical education and personnel training in China. Strateg. Study Chin. Acad. Eng. 21(2), 55–60 (2019) 7. Tao, Lu.: Exploration and reflection on the revision of the training plan for automation professionals in the context of engineering education certification. Educ. Teach. Forum 000(020), 223–224 (2018) 8. Mccoy, K., Oliver, J.J., Borden, D.S., et al.: Nudging waste diversion at Western State Colorado University: Application of behavioral insights. Int. J. Sustain. High. Educ. 19(3), 608–621 (2018) 9. Zhang, X.C., Kuchinke, L., Woud, M.L. et al.: Survey method matters: Online/offline questionnaires and face-to-face or telephone interviews differ. Comput. Hum. Behav. 71(Jun), 172–180 (2017) 10. Huang, G., Xu, P., Li, C., et al.: Application of 2D microtremor section survey method in covered karst area, taking Yongan Dahu Basin, Fujian Province as example. Meitan Xuebao/J. China Coal Soc. 44(2), 536–544 (2019)

A Mobile Data Recovery Device Jinyu Liu and Luhan Wang

Abstract Mechanical and physical methods are adopted to improve the safety and stability of the data recovery device and enhance the mobility. The device consists of an outer and an inner box. Among them, the outer box mainly used as component storage, overall protection and convenient transportation. It comprises a top cover and a base. One end of the top cover and the base are movably connected through a connecting component, the other end is buckled through a lock and a lock catch, and the base is internally provided with a built-in cavity for accommodating an inner box. The inner box mainly carries the core electronic device for data recovery. It comprises a host computer arranged inside, a display screen arranged on the outer surface and respectively connected with the host computer, a keyboard, a source disk placement groove, a target disk placement groove, a socket, etc. The inner box is connected with the built-in cavity through an anti-vibration device. Keywords Mobile · Data recovery device · Security · Stability Although software restoration can solve most data recovery requirements [1–4], not all client devices can have good compatibility with software systems [5]. In many cases, professionals are still required to provide “software + hardware” onsite data recovery services [6–10]. However, the data recovery device would not only be damaged due to shaking or collision and other factors during long-distance movement, but also need to maintain a relatively balanced state to ensure the stability of operation process. Therefore, the purpose of this study is to provide a mobile data recovery device. It is not only convenient for workers to carry all the devices, but also avoids damage to the devices caused by shaking or collision, and can improve the stability of device operation.

J. Liu (B) · L. Wang South China Normal University, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_99

807

808

J. Liu and L. Wang

1 General Structure Description This design mainly develops a mobile data recovery device according to the principle of mechanical physics. The device is mainly composed of two parts. One is the outer box, which comprises a top cover and a base. One end of the top cover and the base is movably connected through a connecting component, the other end is buckled through a lock and a lock catch, and the base is internally provided with a built-in cavity for accommodating an inner box. The second is an inner box, which comprises a main machine arranged inside the box and a display screen, a keyboard, a source disk placement groove, a target disk placement groove, at least two interfaces and at least three plug-in interfaces arranged on the outer surface of the box and respectively connected with the main machine body. The inner box is connected with the built-in cavity through an anti-vibration device. An anti-vibration device is arranged between the inner box and the outer box, which can effectively avoid damage to the device caused by shaking or collision during movement and operation of the device. Folding pull rods and sliding components are arranged on the outer box, which can also facilitate professionals to move the device and reduce weight. Please refer to Fig. 1a–f. Figure 1a is a perspective view of the present data recovery device; Fig. 1b is a schematic view of that data recovery device bee fastened and place; Fig. 1c is a schematic view of the data recovery device opening the top cover; Fig. 1d is a top view of the data recovery device removing the top cover; Fig. 1e is a top view of the data recovery device corresponding to Fig. 1a being fastened and placed, and Fig. 1f is a right view of the data recovery device corresponding to Fig. 1a after opening the right panel.

2 Structural Design of Outer Box The outer box mainly provides functions such as component storage, overall protection and convenient transportation. It comprises a top cover (11) and a bottom base (12), one end of the top cover and the base are movably connected through a connecting assembly, and the other end is buckled through a lock (110) and a lock catch (1220). The connecting assembly may be a hinge, but is not limited to a hinge, but also a rotating shaft, etc. The base is used for supporting the box and includes a built-in cavity (see Fig. 1c and f) for receiving the inner box, and a front panel (120), a left panel (121), a rear panel (122), a right panel (123) and the like connected end to end in sequence. The front panel, the left panel and the rear panel are respectively fixedly connected to the lower bottom plate (126), and the right panel is movably connected to the lower bottom plate through a second connecting member, which may be a hinge, but not limited to a hinge, but also a rotating shaft, etc. When the right panel is turned over along the connector to fit one end of the front panel and the rear panel, the space

A Mobile Data Recovery Device

809

Fig. 1 a Perspective view. b, c Schematic view. d Top view I. e Top view II. f Right view. Mark description: 1 is outer box; 11 is top cover; 12 is bottom base; 21 is base; 22 is an upper panel; 23 is left panel; 24 is front panel; 25 is right panel; 26 is ground panel; 31 is coil spring; 32 is air bladder; 110 is a lock; 111 is an anti-vibration clamp piece; 120 is front panel; 121 is left panel; 122 is rear panel; 123 is right panel; 124 is pulley; 125 is folding pull rod; 126 is lower bottom plate; 211 is fix plate; 212 is movable plate; 241 is keyboard; 242 is heat dissipation; 242 is heat dissipation; 243 is interface; 244 is plug-in interface; 1220 is lock catch; 1231 is handle; 1232 is first groove; 2410 is protrusion; 2110 is target placement groove; 2111 is source disk placement groove; 2112 is target disk indicator; 2113 is source disk indicator; 2114 is power indicator; 2115 is power switch; 2120 is display screen; 2121 is handle

810

J. Liu and L. Wang

they form together with the lower bottom panel is a built-in cavity to accommodate the inner box (see Fig. 1c and e). A lock catch adapt to that lock on the top cover is arrange at one end of the right panel away from the second connecting piece, a first groove is arranged on the outside of the right panel, and a handle (1231) with the same shape as the first groove but slightly smaller appearance size is arranged in the first groove. The handle is movably connected to the right panel by a fourth connector (see Fig. 1b). When the top cover of the outer box and the base are in a buckled state, the operator can rotate the handle out of the first groove and move the data recovery device through the handle. When not in use, the handle can be placed in the first groove to save the facade space. In order to facilitate the overall transportation of the box, the designer has attached a folding pull rod (125) and a sliding assembly to the outer box. The folding pull rod is arranged in the second cavity of the left panel close to one end of the connecting assembly, and the sliding assembly is arranged on the outer surface of the lower bottom plate. The outer surface of the lower bottom plate is provided with a second groove for receiving the sliding assembly. The sliding assembly is a pulley (124), which is connected with the lower bottom plate through a folding rod. When the data recovery device does not need to be pulled, the pulley can be folded and placed in the second groove. This can ensure that the lower floor is flat and placed smoothly. When it is necessary to pull the box, the folding bar can be straightened so that the pulley (124) is exposed to the lower bottom plate. The operator pulls the folding pull rod, and the pulley slides under the pulling force. A plurality of anti-vibration clamping pieces (111) parallel to the connecting assembly are uniformly spaced inside the top cover, see Fig. 1c. The anti-vibration clamping piece can be made of elastic rubber strip, strip-shaped air bladder and other materials. Setting the component can not only effectively avoid damage to the inner box, but also conveniently adjust the use angle of the display screen and fix the movable plate.

3 Structural Design of Inner Box The inner box mainly carries the core electronic device for data recovery. These devices include a host computer built into the cassette body, a display screen (2120), a keyboard (241), a source disk placement groove (2111), a target disk placement groove (2110), a plurality of interfaces (243) and a plurality of plug-in interfaces (244) respectively connected with the host computer. The inner box and the builtin cavity need to be connected through an anti-vibration device, and at least one anti-vibration device is arranged. Viewed from the outside, the inner case includes a base (21). The upper panel (22) of the base is provided with a movable plate (212) and a fixed plate (211). The left panel (23), the rear panel (24), the right panel (25) and the bottom panel (26) of the inner box base are respectively connected with the front panel, the left panel, the rear panel and the bottom panel of the outer box.

A Mobile Data Recovery Device

811

The movable plate of the inner box is movably connected with one end of the fixing plate through a third connecting piece. The third connector here can be a hinge, but not limited to a hinge, but also a rotating shaft, etc. A display screen is arranged above the movable board, which can facilitate the operator to rotate and adjust the angle of the display screen according to the working requirements. In addition, lifting the movable board during operation can also enhance the heat dissipation performance of the data recovery device. On the fixed board, electronic device interfaces such as power switch (2115), power indicator (2114), source disc indicator (2113) and target disc indicator (2112) are designed. Wherein the source disk indicator lamp and the target disk indicator lamp are respectively arranged close to the source disk placement groove (2111) and the target disk placement groove (2110), so as to facilitate the operator to know the current working state of each disk in time. A rectangular groove is arranged on the front panel of the base, and the rectangular groove is used for movable connection of the keyboard. The outer edge of the keyboard is provided with protrusions (2410) for pulling the keyboard, so as to facilitate workers to pull the keyboard from the rectangular groove. The front panel is located under the keyboard and is provided with at least two interfaces and at least three plug-in interfaces. The interface comprises a power supply interface and a communication interface, and the plug-in interface comprises an independently set SD card plug-in interface, a CF card plug-in interface and an MMC card plug-in interface. At least one heat dissipation (242) is disposed on that front panel above the keyboard. The heat dissipation element is a heat dissipation net, but is not limited to the heat dissipation net, but also can be a heat dissipation fan and the like. A handle (2121) is arrange on that movable board. The handle is located at one end of the movable plate far away from the third connecting piece, and the operator can adjust the specific position of the display screen through the handle. See Fig. 1c and d.

4 Conclusion In order to meet the requirements of safety and stability of the device itself in the application of daily data recovery technology, we have developed such a double box device, and set up an anti-vibration device between the outer box and the inner box to avoid damage to the device due to shaking or collision during movement. We have designed two examples of anti-vibration devices. In the first example, the antivibration device mainly refers to an elastic member, i.e., a coil spring (31). When the anti-vibration device is a coil spring, there are a plurality of coil springs, which are evenly spaced between the front wall plate, the left wall plate, the rear wall plate of the outer box and the left panel, the rear panel and the right panel of the inner box, and can be welded, but only welded. In Example 2, the anti-vibration device is an air bladder (32). A plurality of rubber columns with threaded folded sides are uniformly arranged at intervals in the air container. Although we have described examples for reference, I believe other professionals in the field can carry out further optimization design and make better examples based on this design idea.

812

J. Liu and L. Wang

References 1. Paik, J.Y., Jin. R.Z., Chung. T.S.: Data recovery aware garbage collection mechanism in flashbased storage devices 9, 2404–2408 (2018) 2. Li, M., Li, R., Lee, P.P.C.: Relieving both storage and recovery burdens in big data clusters with R-STAIR codes 22, 15–26 (2018) 3. Zhou, T., Cai, Z., Xiao, B., Wang, L., Xu, M., Chen, Y.: Location privacy-preserving data recovery for mobile crowdsensing 2, 151 (2018) 4. Liu, C., Wang, Q., Chu, X., Leung, Y.-W., Liu, H.: ESetStore: An Erasure-Coded Storage System with Fast Data Recovery 31, 2001–2016 (2020) 5. Guan, L., Zheng, J., Li, C., Wang, D.: Research on Data Recovery Technology Based on Flash Memory Device 2, 263–271 (2018) 6. Fu, Y., Guo, J., Ma, L., Duan, J.: Single Failure Recovery Method for Erasure Coded Storage System with Heterogeneous Devices 9, 1865-1869 (2019) 7. Izonin, I., Kryvinska, N., Tkachenko, R., Zub, K.: An approach towards missing data recovery within IoT smart system. Procedia Comput. Sci. 155, 11–18 (2019) 8. Hidayat, H., Sudarmaji, D., Irawan, D., Susanto, L.J., Mustika, H.P.: Comparative analysis of applications OSforensics, GetDataBack, genius and Diskdigger on digital data recovery in the computer device. Int. J. Eng. Technol. 7, 445–448 (2018) 9. Du, J., Chen, H., Zhang, W.: A deep learning method for data recovery in sensor networks using effective spatio-temporal correlation data. Sens. Rev. 39, 208–217 (2019) 10. Edstrom, J., Chen, D., Gong, Y., Wang, J., Gong, N.: Data-pattern enabled self-recovery lowpower storage system for big video data 5, 95–105 (2019)

Construction of Wisdom Logistics System Based on Supply Chain for Intelligent Manufacturing in Post-epidemic Era Jing Wang and Suhua Yang

Abstract The spread of COVID-19 has had a violent impact on the global manufacturing industry. China’s epidemic prevention and control trend continues to improve, and the resumption of production in the manufacturing industry has accelerated. In the post-epidemic era, maintaining the stability of China’s manufacturing supply chain network and promoting the intelligent transformation of the manufacturing logistics system are related to the long-term development of China’s manufacturing industry. Comprehensively build a manufacturing supply chain network, build a wisdom logistics system for the manufacturing industry, set up a time window to control the supply of raw materials, use SPS system to sort ingredients, introduce LES system information to drive logistics, and use RFID technology to identify and locate materials. We will apply information-based, automated and wisdom logistics systems to implement the strategy of transforming China from a manufacturing power to a manufacturing power, and realize the intelligent transformation from Chinese manufacturing to Chinese intelligent manufacturing. Keywords Intelligent manufacturing · Wisdom logistics system · Supply chain

1 Introduction The sudden spread of COVID-19 has greatly impacted the global manufacturing supply chain and regional industrial chain, triggered global economic turbulence, and greatly affected the effective operation of the global manufacturing supply chain. The stability of China’s manufacturing supply chain network has been severely tested. As a support and guarantee for manufacturing enterprises to carry out production activities, logistics management connects various activities in the supply chain of J. Wang (B) Department of Logistics Management, College of Commerce, Qingdao Binhai University, Qingdao, Shandong, China S. Yang Department of Logistics Management, College of Management, Qufu Normal University, Rizhao, Shandong, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_100

813

814

J. Wang and S. Yang

manufacturing enterprises from raw material procurement, production, assembly to distribution and distribution. The wisdom logistics system built by the company adopts information-based, automation, and wisdom logistics systems to promote the high-quality development of the manufacturing industry and realize the intelligent transformation of manufacturing in China. On the basis of studying the connotation and key technologies of intelligent manufacturing, three development models from digital manufacturing to intelligent manufacturing are proposed, as well as specific technical approaches to realize the development from digital manufacturing to intelligent manufacturing [1]. Specific analysis of several typical emerging intelligent manufacturing models, such as manufacturing connection, information physical fusion production system, ubiquitous manufacturing, cloud manufacturing, social enterprise, active manufacturing and intelligent manufacturing [2]. Based on the intelligent production logistics system model of Industry 4.0, an intelligent production logistics system management platform has been constructed. Platform through distribution, caching, warehousing intelligent reduces the bottleneck in production and in products, optimize the production logistics system [3]. A vehicle routing problem with a soft time window is proposed. From the perspective of the distribution center, the impact of the number of vehicles and the cost of use on the total logistics distribution cost is analyzed, and an improved genetic algorithm is designed to solve it [4]. The SPS system is used to improve the batching process of the original parts. According to the matching of all parts under all stations of the loading line with the parts of the vehicle, combined with the loading mode of the loading line, the system calculates the SPS required by the vehicle on each loading line Parts and print the ingredient list [5]. This paper introduces the intelligent assembly workshop planning, implementation framework building, business operation process and specific RFID technology application of the pilot plant. It has reference significance for the specific planning and implementation of the field of automobile intelligent workshop construction [6].

2 Problems with Intelligent Manufacturing and Wisdom Logistics Although the development of intelligent manufacturing in China has made great progress, in the process of smart transformation, the imitation and direct introduction of intelligent manufacturing technology has led to the lack of innovation capabilities of Chinese manufacturing and the weakness of core technologies in key manufacturing areas. Especially the low level of networking and digitization in the manufacturing process directly affects the accuracy and stability of the manufacturing process. At present, Chinese manufacturing is at the middle and low end level in the global industrial chain layout, and there is still a certain gap between moving towards high-end manufacturing [7].

Construction of Wisdom Logistics System Based on Supply Chain …

815

At present, the construction of China’s manufacturing logistics system lags behind the construction of actual production facilities of enterprises, and the production logistics has a low degree of informatization, automation and informatization, which greatly lags behind the requirements of intelligent manufacturing on wisdom logistics. In view of this, the manufacturing industry urgently needs to strengthen the construction of wisdom logistics system, build a reasonable logistics system, improve the information level of production logistics, and provide technical support for intelligent manufacturing [8].

3 Build Wisdom Logistics System for Manufacturing In view of the characteristics of China’s manufacturing industry in the post-epidemic era, an intelligent manufacturing and logistics system was constructed from the perspective of supply chain. Start with the establishment of a time window, control the supply of production materials, and realize the supply of materials on demand and on time. The application of SPS parts-batching sorting system can reduce nonvalue-added links in the workshop and improve production efficiency and quality. LES information system is introduced to drive logistics with information flow and timely feedback the production logistics process. Identify, locate and track materials using RFID radio-frequency technology in manufacturing related supply, production, distribution and after-sales [9].

3.1 Time Window Supply Control The product has different sensitivity to time, and the transportation cost and storage cost of arriving at the destination in different time periods will also be different. Arriving too early incurs additional storage costs, and delayed supply causes loss of stock out. Time constraint problems can be divided into two categories according to whether the arrival delay is allowed, which are soft time window and hard time window. The soft time window is flexible to the delivery time and allows delay. If the delivery cannot be made on time, the customer will claim the loss caused by the delay. The hard time window has strict requirements on the delivery time. The items must be delivered at the specified time and no delay is allowed. If they cannot be delivered on time, the downstream manufacturing link supply logistics faces the risk of shortage. Through the time window penalty mechanism, material supply will be effectively controlled [10]. According to customer and manufacturing requirements, formulate a raw material procurement plan, set a reasonable time window, arrange the arrival time of each supplier, and the supplier will deliver the material at the specified time as required. Collect customer demand information in time, push the information to the supplier’s page port according to the time window, and the supplier can quickly adjust the

816

J. Wang and S. Yang

material supply and inventory plan. According to the supplier does not respond to the demand change in time, through effective communication means to carry out overtime warning. Carry out real-time positioning of the supplier’s delivery vehicle and timely monitor the location of the vehicle.

3.2 SPS Parts Ingredient Sorting SPS parts ingredients sorting system. The staff output information according to the production system, extract part batching information, decompose BOM material structure list, and generate SPS picking list. Pick the materials needed for production, and load the production parts loaded by a vehicle to the corresponding SPS. According to the material production time requirements, the SPS cart sends the materials to the designated production station of the production line, and the SPS cart is synchronized with the corresponding production vehicle. In operation, designated workers will unload all the materials from the truck and place the materials on the skateboard at the designated station. The material truck waits for the assembly of all materials and parts required for production, evacuates the designated station, and returns to the cycle delivery. The SPS feeder has passed the preliminary inspections and tests, and selected the AGV automatic navigation trolley for cyclic feeding. The AGV trolley can choose the shortest route to feed materials at a uniform speed without affecting the transportation of other vehicles on the road. It will be quickly charged through the automatic charging station while waiting for the feeding. The application of SPS batching transport technology can reduce the staff in the workshop to select parts, take materials, material inspection and other non-valueadded links, improve the production efficiency of the workshop. Reduce the workshop space occupation, reduce the production equipment input, reduce the manual operation error of workers, meet the multi-variety, multi-batch production mode, improve the product production quality. SPS part batching sorting system is shown in Fig. 1.

3.3 LES Production Information Pull With the deepening of intelligent manufacturing automation and informatization, the traditional information island management model of manufacturing enterprises has been unable to meet the rhythm of intelligent manufacturing. LES logistics implementation information system was introduced to enable the production materials to go through the whole process of warehouse, workshop and warehouse from purchasing and warehousing, storage management, production and outbound, to the final assembly. Use demand information flow to drive production logistics, and manage production logistics process through LES system information feedback.

Construction of Wisdom Logistics System Based on Supply Chain …

817

Fig. 1 SPS part batching sorting system

LES information system supports a variety of production information pulling methods such as Kanban cards, ingredients, sorting, ANDON, SPS, etc., and the consumption information of the production line is output by scanning Kanban cards. Combined with the use of electronic billboards, using MES offline host to query production planning task information, combined with the BOM material list decomposition system to calculate the number of parts consumed, and output the material consumption information of the production line. The LES system processes the relevant information and issues the Kanban material pull list. The warehouse personnel sort the materials according to the production order, place the required materials on the workstation equipment according to the production order, and distribute them to the corresponding production line in the order. For special materials, set corresponding dark lights. When the demand point is reached, the button will send a call to release information to remind the staff. LES system was used to pull and dispatch production materials, connect ERP enterprise resource planning system and production operation equipment, provide accurate logistics scheduling, minimize the occurrence of production material inventory backlogs and shortages, and improve the accuracy of material distribution in the production workshop. Improve the efficiency of distribution and production. The operation of LES logistics execution information system is shown in Fig. 2.

3.4 WMS Warehouse Material Control Using WMS warehouse management system, through the inventory allocation management of the materials in the warehouse, dispatch status of raw material inventory allocation management, real-time monitoring of material inventory information, realize the material batch management, account correspondence, stock inventory, and

818

J. Wang and S. Yang

Fig. 2 LES logistics execution information system

quality inspection control are realized Such as warehousing comprehensive management, improve warehousing information, effectively track warehousing logistics, and control warehousing costs. When warehousing, track the material items. Identify the materials required for production, and the system determines the project and customer to which it belongs, and confirms the order. Use electronic tags to locate materials, and the system records the types and uses of materials. When materials are put into storage, the system automatically recognizes the storage location area to which they belong, and stores them after fixing the storage location. The system will issue an alarm for special circumstances. For high-value materials and parts, the storage area and location information must be accurately located. Man–machine interaction button (or language system) is set to assist material inspection to realize error prevention. Due to the strong fluidity of production materials, storage locations often undergo location changes and fluctuations in the number of stored materials. Install the empty and full status indicator in the storage location (the blue indicator indicates that the location is free, and the red indicator indicates that the location is full) for visual inspection. Store multi-layer overlapping parts and materials, the system automatically updates, and records the storage location of the storage location layer number. When there is a demand for picking out of the warehouse and taking the bottom material, the system automatically changes the number of upper storage parts to achieve accurate recording and positioning of the system. Use grating positioning technology to install lighting instructions for storage locations, storage areas, and shelves. When picking goods out of the warehouse, lights indicate the location, storage area, and shelves of the materials to be inspected, and guide pickers to pick materials to improve the efficiency of picking out of the warehouse. When the parts location is changed, the forklift driver or tally can use the handheld terminal to scan the code to obtain the material information. According to the system arrangement, the goods are placed in the new location, the storage system marks the location to the new address, and the tracking feedback is implemented management.

Construction of Wisdom Logistics System Based on Supply Chain …

819

The WMS system is equipped with an early warning function to provide early warnings for the maximum and minimum stocks, inventory time, storage error feedback, and anti-theft and anti-loss of materials stored in the warehouse. Compile inventory balance reports, do a good job in the balance of materials receiving and dispatching reports, and assist in regular inventory management, combined with ERP system and relevant logistics financial index statistical report data. Add settlement assistance function, support different customer settlement methods, storage fee system automatic settlement. Using WMS warehouse management system, real-time tracking management of raw materials, semi-finished products and finished products, combined with the use of warehouse intelligent management technology, reasonable arrangement of warehouse materials, warehouse areas and locations, to achieve intelligent and transparent management of warehouses.

3.5 RFID Production Material Tracking Manufacturing enterprises need to conduct detailed monitoring, tracking and management of production-related materials throughout the process from raw material supply, semi-finished product production and assembly, final product sales and distribution, and after-sales service. RFID radio frequency identification technology scans and recognizes radio frequency tags through radio signals, reads information and data, and quickly and accurately identify target items. Radio frequency tag technology is used for material tracking throughout the manufacturing process. Recognize the delivery of materials, install radio frequency tags for production materials for material delivery, transportation and positioning, and realize dynamic control of purchased materials. Electronic tags scan and transmit information, instead of manual operation, and solve the problem of cumbersome procedures and easy errors. Position production materials, install radio frequency tags on production materials, quickly locate material warehouses, identify parts locations, improve inventory management efficiency, and realize automated inventory. Radio frequency tags are used for material anti-theft, increasing the use of radio frequency tags, especially for managing warehouse materials, preventing unauthorized misappropriation and ensuring material safety.

4 Conclusions In the post-epidemic era, maintain the stability of China’s manufacturing supply chain network, promote the intelligent transformation of the manufacturing logistics system, create intelligent manufacturing logistics system, set up a time window to control the supply of raw materials, use SPS system for component sorting, and introduce the LES system to realize the flow of information, use RFID technology

820

J. Wang and S. Yang

to identify and locate materials. Apply informatization, automation, and wisdom logistics systems to realize the transformation from China’s manufacturing to China’s intelligent manufacturing, and implement the strategy of a manufacturing power to a manufacturing power. At present, the system has been applied to some automobile manufacturing and shipbuilding enterprises. However, the lack of specific technical guidance from digital manufacturing to the development of intelligent manufacturing has led to slow progress in the promotion of intelligent manufacturing applications in my country, and there is still a big gap compared with industrialized countries. Acknowledgements This work was supported by Qingdao City Philosophy and Social Science Planning Project 2019.

References 1. Tan, J., Liu, D., Liu, Z., Cheng, J.: Research on key technical approaches for the transition from digital manufacturing to intelligent manufacturing. Chin. Eng. Sci. 19(3), 39–45 (2017). (in Chinese) 2. Zhou, J., Yao, X., Liu, M., Zhang, J., Tao, T.: State-of-art review on new emerging intelligent manufacturing paradigms. Comput. Integr. Manuf. Syst. 23(3), 624–640 (2017). (in Chinese) 3. Chen, J., Shi, Y.: The research of intelligent production logistics system model and platform. Manuf. Autom. 10(37), 47–51 (2015). (in Chinese) 4. Huang, M., Liu, J., Guo, Q.: Research on routing problem of electric distribution vehicles with time window. Logistics Technol. 38(5), 66–72 (2019). (in Chinese) 5. Wei, G.: Implementation of SPS system used in Beisheng Motors (Shenyang) branched by Shanghai General Motors Corporation GENGWbi. J. Liaoning Univ. Technol. (Nat. Sci. Ed.) 6(29), 36–40 (2009). (in Chinese) 6. Yuan, J., Wang, H., Zhao, B., Li, Q.: Application of intelligent manufacturing technology based on RFID in automobile industry. Process Equipment 4, 160–163 (2020) 7. Zhou, Z.D., Fuh, J., Xie, S., et al.: Digital manufacturing and cloud manufacturing. Adv. Mech. Eng. 32(4), 1–2 (2013). (in Chinese) 8. Davis, J., Edgar, T., Porter, J., et al.: Smart manufacturing, manufacturing intelligence and demand-dynamic performance. Comput. Chem. Eng. 47(12), 145–156 (2012) 9. Roa, M.A., Berenson, D., Huang, W.: Mobile manipulation toward smart manufacturing. IEEE Rob. Autom. Mag. 22(4), 14–15 (2015) 10. Li, J.R., Tao, F., C’Henu, Y., et al.: Big data in product lifecycle management. Int. J. Adv. Manuf. Technol. 81(14), 667–684 (2015)

Performance Improvement and Evaluation of Computer Communication Network Based on Artificial Intelligence Wei Huang

Abstract Computer communication network is the core technology of enterprise automation system, network performance has become the focus of people’s attention. In order to study how to improving the performance of computer communication network, this article from the perspective of artificial intelligence technology, first of all, using the Stello toolbox in the MATLAB/Simulink software, establish a CAN bus communication simulation model, by running the simulation model, get the CAN communication network each performance index (throughput, average delay information, network utilization and load completion), and the throughput and bus transmission rate affect the performance of bus communication is analyzed. The analysis results are consistent with the characteristics of CAN bus communication control protocol (CCP), and the transmission rate is increased by 21.62%, which proves that the CAN bus CCP model based on Satelow toolbox is effective and feasible. Keywords Artificial intelligence · Computer communication network · Satelow toolbox · CAN bus communication protocol

1 Introduction More and more attention is paid to network performance. On the one hand, with the gradual maturity of network users, the requirements on network service content and Internet speed are increasingly high [1, 2]. On the other hand, in order to survive in the fierce competitive environment, network providers also need to know how their network performance is, whether it is consistent with expectations, and whether they can provide the best service for users [3, 4]. MA Yuhong mainly studied the role and significance of network security protocol in computer communication technology [5]. Real-time data collection, energy management and control of renewable energy systems will depend primarily on W. Huang (B) Department of Applied Technology, Lijiang Teacher’s Colleges, Yunnan, Lijiang 674100, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_101

821

822

W. Huang

the performance of the communications infrastructure. Ahmed Mohamed describes the design of a communications network architecture that USES wired and wireless technologies to monitor and control distributed energy systems, including smallscale wind turbines and photovoltaic systems [6]. Davide Della Giustina investigates the technologies available and describes the experimental evaluation conducted in an Italian operating environment [7]. This paper establishes the performance evaluation index system of CAN communication network based on artificial intelligence technology, and builds the performance evaluation model of CAN communication network based on BP neural network (NN) [8, 9]. Finally, through the training and testing of the model, the results confirm the effectiveness and accuracy of application of BP NN to the evaluation of CAN bus communication performance [10].

2 Artificial Intelligence Communicates with Computers 2.1 Computer Communication Network Performance evaluation is the computer information network system communication network and the application of computer communication system(CS) technology important scientific theories basis and technical support, is important in the field of information communication and computer network science academic research development direction, is also a science theory and practice closely linked, rich in content, complete system of specialized subjects. It is mainly to various dynamic behavior characteristics of the system dynamic analysis and performance evaluation, including the characteristics of the dynamic behavior of the actual network system for dynamic measurement and analysis modeling, according to certain performance of the system design requirements for linear solution model selection, to the current existing defects in the actual performance of the network system and the technical bottleneck problem for short-term improvement, for the future trend for long-term forecast, the actual performance of the network system, and can ensure the quality of network service system must be a necessary premise to system design.

2.2 Artificial Intelligence Technology The multi-layer NN model using BP algorithm is called BP network. The middle layer, also known as the hidden layer, can be one or more layers: 1 (d0 (k) − yoo (k))2 2 o=1 q

e=

(1)

Performance Improvement and Evaluation of Computer …

823

After the network is initialized, k sample data can be input randomly for training. The corresponding data results are as follows: x(k) = (x1 (k), . . . , xa (k))

(2)

3 Design of the Experiment 3.1 Experimental Background With the random distribution of all kinds of network information in the whole communication network, the communication network appears hierarchical and complex division, thus forming the computer communication network will become an important part of the future data society. Any device point is damaged, which will affect the whole network. Therefore, different communication equipment and technologies may be required for communication networks in different regions, resulting in different data. With the increase of communication network traffic, traditional technology has been unable to meet the demand.

3.2 Experimental Design In Mlal/Imulink software Stelow simulation environment, the simulation model of 10-node CAN bus CS and the motherboard model in Simulik were established. Set the node as a work node, search for the children of all the current work nodes, if not found, delete the work node after recording (to avoid repeated search), and set the child node as a new work node, until the search reaches the target node or the work node is empty. In the actual search, the busy degree of the link between nodes is also considered. If the link is busy, the line is considered to be interrupted. The search results are written to the system’s routing table for later use. When the network training is over, the sim function can be used to simulate the output of the network, so as to compare with the target output and verify the network performance. The simulation of BP NN USES the function SIM (), which can be used to conveniently obtain the simulation results of the network for multiple inputs in higher dimensions. The experimental results are shown in Table 1.

824

W. Huang

Table 1 Experimental results NO

thout/kbit

fz/kbit

yt/s

pl

1

0.92

0.92

1.13

1

2

1.211

1.211

1.14

1

3

1.073

1.073

1.17

1

4

1.129

1.129

1.18

1

5

1.237

1.237

1.62

1

4 Computer Communication Improvement Based on Artificial Intelligence 4.1 Performance Improvement Analysis of Computer Communication Network Based on Artificial Intelligence As shown in Fig. 1, in the editing environment of the software, users can add, delete or save network nodes and node links by themselves, and can set the damage probability, traffic volume, node description, link capacity, weight and other parameters. In the experiment, the network structure of only 5 nodes was constructed, so that the result of network performance simulation was obtained after 24 h. It can be seen from the simulation results that when nodes 1, 2, 3 and 5 were executed, the traffic volume that the network could complete had been reduced from 5.187 when the network was

Fig. 1 Comparison of information transmission damage rate in simulation experiment

Performance Improvement and Evaluation of Computer …

825

intact to 2.919. After 7458 times of simulation, 3255 calls will be lost, with the loss rate rising from 0.07 to 43.64%, basically unable to maintain normal communication. The abstract store Home implied in the segmented storedOn declaration indicates the abstract store type that will instantiate the segment. The HOME executor will use this abstraction to store the state of the home to create and manage segment instances. The face specified in the segmentation declaration is the face of the segmentation implementation. The simulation sets the transmission rate of CAN bus as 200 Kbit/s. Moreover, the data length of each frame is assumed to be 100BIT. It CAN be seen that 500 frames of data are transmitted when CAN bus is fully loaded. Computer communication network by the general use of generic search algorithm. When a user wants to call another user who is not on the same node, the node switch issues a routing request (RFR) to the adjacent node. If these nodes in the user table called users, these nodes are forwarded to the adjacent node RFR, when reach called RFR, where node, called the node along the RFR sent via the link to the originating node routing based response (RSM), so the RSM can relatively quickly reached the originating node, initial node is sent all adjacent nodes routing instructions (EOR) search is complete, in order to cancel RFR within the network, so only in the path of the selected node in call information. Each node does not need to know the location of all the users in the network, and more importantly, even if part of the network fails, a generic search automatically finds an available path for the user. As shown in Fig. 2, weight and threshold changes of the network are adjusted along the direction of negative gradient of network performance parameters. In the

Fig. 2 Weight and threshold changes of the negative gradient directional network under the NN algorithm

826

W. Huang

simulation experiment, the fast training function has a fast convergence speed, and some can even be dozens of times faster than the ordinary training function. The fast training function can be divided into two categories. The first category USES heuristic algorithm and makes appropriate changes to the negative gradient algorithm. The second type USES digital optimization algorithms. For example, elastic BP algorithm (TrainRP). In the process of training, the learning rate of adaptive modified traingda and TRAMgdx algorithm can be properly changed and its value will not be too large, so that the training speed of the network can be accelerated and the stability of the network can be ensured. BP algorithm with bouncing-back can eliminate the influence of gradient mode value on network training. After the experiment, it is necessary to test the effectiveness of the experimental sample needs to be based on the BP NN diagnosis of KPI statistical distribution deviation, the basic working process is as follows: model firstly property learning module for network normal state to learn the history of the KPI data, calculated in the diagnosis of the typical distribution of each KPI required set in the property database, then use anomaly detection module to analyze all kinds of fault cases network KPI calculation, get the BP NN learning samples, deposited in the learning samples in the library. After that, the BP NN was trained and the trained BP NN was obtained. Finally, the model USES the abnormal detection module to monitor the current network measurement KPI. If there is an abnormal KPI, the BP NN is called for fault diagnosis, and the output module of diagnosis result is used to analyze the output result of BP NN and output the final diagnosis result. If there are no exceptions to the KPI, continue monitoring. The element of attribute set is the statistical distribution of each KPI, that is, the empirical distribution function. BP NN is used for fault diagnosis of abnormal KPI. Before fault diagnosis, BP NN needs to be trained with corresponding learning samples in the learning sample base. The output module of diagnosis is used to analyze the output of BP NN and give the final diagnosis result of the diagnosis model. A threshold can be either a fixed value, such as 98% for CSSR, or a dynamic threshold, which is generated dynamically by some complex threshold generation formula based on the influence of user behavior. If the measured value of KPI exceeds the threshold, it is considered that there is an exception in KPI, and the reason for the exception needs to be further analyzed. If the measured value is within the threshold, the KPI is considered to be in a normal state.

4.2 Suggestions for Improving the Performance of Computer Communication Network Based on Artificial Intelligence Before the simulation experiment, it is necessary to judge whether the network error meets the requirements. The training ends when the error falls to the preset accuracy or the learning times are greater than the set maximum. Otherwise, randomly select the next learning sample, return to the third step, and move on to the next round of learning process. Note that the above algorithm steps are sequential training. When

Performance Improvement and Evaluation of Computer …

827

batch training is adopted, each training sample is a batch rather than one. In addition, the training learning steps are basically the same.

5 Conclusions In this paper, the state of computer communication network from the Angle of artificial intelligence is studied. By running the simulation model, the performance index of bus CS is obtained, and its communication performance is analyzed. Then, this paper analyzes the real-time performance of the bus and evaluates the performance of the bus based on the NN. From the aspect of real-time system scheduling algorithm, the dynamic priority scheduling algorithm is introduced into the real-time scheduling of the bus CS, and the improved bus simulation model is established.

References 1. Han, Q., Liu, Y., Yang, F.: Optimal communication network-based H∞ quantized control with packet dropouts for a class of discrete-time neural networks with distributed time delay. IEEE Trans. Neural Netw. Learn. Syst. 27(2), 426 (2016) 2. Heard, N.A., Turcotte, M.J.: Monitoring a device in a communication network. Anal. Bioanal. Chem. 399(6), 1999–2014 (2015) 3. Irie, K., Ohta, N., Morisaki, M., et al.: Low-end card for regional PC communication network. Electron. Commun. Japan 80(10), 20–28 (2015) 4. Zhang, X., Xu, H., Yu, T., et al.: Robust collaborative consensus algorithm for decentralized economic dispatch with a practical communication network. Electric Power Syst. Res. 140(Nov), 597–610 (2016) 5. Ma, Y.: The function and significance of network security protocol in computer communication technology. Wirel. Internet Technol. 99(1), 127–128 (2015) 6. Mohamed, A., Yong, K., Young-Chon, K.: Communication network architectures for smarthouse with renewable energy resources. Energies 8(8), 8716–8735 (2015) 7. Giustina, D.D., Rinaldi, S.: Hybrid communication network for the smart grid: Validation of a field test experience. IEEE Trans. Power Delivery 30(6), 2492–2500 (2015) 8. Zhang, Y., Cai, Z., Li, X., et al.: Analytical modeling of traffic flow in the substation communication network. IEEE Trans. Power Delivery 30(5), 2119–2127 (2015) 9. Rana, M.M., Li, L.: Microgrid state estimation and control for smart grid and Internet of Things communication network. Electron. Lett. 51(2), 149–151 (2015) 10. Song, P., Ke, X., Song, F., et al.: Multi-user interference in a non-line-of-sight ultraviolet communication network. IET Commun. 10(13), 1640–1645 (2016)

Network Security and Countermeasures from the Perspective of Overall National Security Yin Dan

Abstract With the development of national economy and technology, cyberspace is rapidly expanding and developing rapidly, which also brings a series of threats and challenges. The Internet has become the main battlefield of ideological struggles. In the new battlefield of cyberspace, whether it can be withstood and won is directly related to my country’s ideological security and political security. The proposal of the overall national security concept is not only a major innovation in national security theory, but also a comprehensive, systematic and scientific response to national security in the new era. This article analyzes the data leakage, abuse, malicious virus, cyber ideological security and other issues facing my country’s cyberspace security from the perspective of overall national security, and proposes relevant solutions, and looks forward to the future of cyberspace security in my country. Direction of development. Keywords Overall national security · Cyberspace security · Data protection

1 The Content and Structure of the Overall National Security Concept The continuous evolution of the world’s multi-polarization and social informatization has also had a profound impact on the changes in international politics, national security, and social multi-dimensional relations. Some of the changes in complexity, uncertainty, and linkage have brought huge changes to national security [1]. Threats and challenges. At present, China’s socialist construction is in a critical period. The report of the 19th National Congress of the Communist Party of China pointed out in many places that “currently, the situation at home and abroad is undergoing profound and complex changes”, “the world is facing outstanding instability and uncertainty, the world’s economic growth momentum is insufficient, the rich and the poor are

Y. Dan (B) Wuhan University of Science and Technology, Wuhan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_102

829

830

Y. Dan

Disparity is getting worse, regional hotspot issues are one after another, and nontraditional security threats such as terrorism, cybersecurity, major infectious diseases, and climate change continue to spread. Mankind faces many common challenges, “national security faces new situations,” and “adhere to overall national security View” [2]. The high frequency of “national security” being proposed fully illustrates the importance of national security in the process of building socialism with Chinese characteristics in the new era.

1.1 The Content of the Overall National Security Concept The “Overall National Security Concept” is a summary of our country’s national security history and experience, and is the wisdom crystallization of our country’s national security theory and practice in the new era. The “Overall National Security Concept” is an accurate reflection of the objective state of China’s national security during the construction of socialism with Chinese characteristics by the Chinese Communists in the new era. Its main content: “With people’s security as the purpose, political security as the foundation, economic security as the foundation, military, cultural, and social security as the guarantee, and relying on the promotion of international security, we will blaze a path of national security with Chinese characteristics.”

1.2 The Composition of the Overall National Security Concept After long-term efforts, socialism with Chinese characteristics has entered a new era. This is a new historical position for my country’s development. This is the accurate judgment of the report of the 19th National Congress of my country’s economic and social development. National security in the new era runs through the construction and development of socialism with Chinese characteristics in the new era. At the same time, national security does not exist in isolation. It is bound to be affected by changes, interactions and mutual influences in the domestic and foreign environments and virtual and real environments. Security concept, the national security field has 11 areas, such as political security, military security, economic security, technological security, information security, etc., but it is not limited to this. According to the different perspectives of national security, it can be divided into external security and internal security, traditional security and non-traditional security [3], self security and common security, etc., which fully reflects the dialectical thinking.

Network Security and Countermeasures from the Perspective …

831

2 The Connotation and Importance of Network Security The Connotation of Network Security. Network security is a country-specific security field in the information society. It also belongs to the emerging, composite, and crossdomain non-traditional security field. It is one of the most important non-traditional security fields and covers the widest range. In different periods, network security has had different titles and explanations, and its connotation is constantly deepening and its extension is constantly expanding. According to the object of network security assurance, its connotation development can be roughly divided into three stages, namely the basic network security stage, the basic information network and important information system security stage, the critical information infrastructure and online content security stage; its title is also from the computer Security, information system security, develop into network security or cyberspace security [4].

3 Threats to Network Security (1)

Data Leakage and Abuse

In 2019, major data breaches have emerged one after another. Frequent data breaches have aroused public vigilance, and data protection has become an important topic. The value and energy brought by big data supply the rapid operation of the entire cyberspace. The era of data prevalence has brought convenience to people but also troubles. Data breaches occur from time to time, threatening the security of individual users, enterprises, and the country. According to statistics, 2018 was the most frequent year of data breaches in recent years, with a total of nearly two thousand data breaches. In July 2018, according to media reports, 300 million pieces of relevant data from SF Express and logistics in China were reported on the Internet. The price of Bitcoin is publicly sold, including important personal identification information, contact information and address of the recipient and sender [5]. Hundreds of millions of users’ personal information has been publicly sold and illegally used, seriously harming the interests of individuals and society, and may even endanger the safety of personal lives and properties. Data information leakage incidents have exponentially increased. Information leakage involves a wide range of industries, and users will become the ultimate victims of loss of interests in information leakage incidents. (2)

Data Poisoning and Hacker Attacks

Malware is a virus, worm, and Trojan horse program that can spread through the network and perform malicious tasks. It is controlled by destroying the software process. The frequent hacker extortion incidents in 2018 have aroused widespread public concern. Hackers use the Internet to invade personal or corporate equipment, block systems, and conduct extortion. The temptation of illegal profit and the super difficulty of tracking criminals make hacker attacks unscrupulous [6]. On March 1, 2018,

832

Y. Dan

an antivirus software company laboratory detected a ransomware called “Kirin 2.1”. The virus spreads through file forwarding during online chats. The computer software will be blocked immediately after being recruited, and all Alipay money will be transferred when the user logs in again. This not only caused property losses to individuals and enterprises, but also caused all kinds of unnecessary troubles [7]. (3)

Weak Network Infrastructure

Technological innovation is the core element of the generation of my country’s network security capabilities. If the core technology cannot achieve breakthrough progress, it will always be impossible to get rid of my country’s passive situation of being constrained by people in terms of information strategies and policies. The hegemony of developed countries in the field of international networks not only threatens China’s network security, but also restricts the development of China’s information technology. At present, China’s critical network and information infrastructure are vulnerable, and they are independently controllable in terms of chip and hardware system integration technology. Ability is not high; mainstream network and information integration application systems are mastered by foreign companies, such as operating systems, service platforms, application software, etc.; at the same time, there are also technical aspects in the collection, storage and use of data, information and core intellectual property Security risks [8]. (4)

Cyber Ideology Security

General Secretary Xi Jinping emphasized: “Ideological work is an extremely important work for the party.” In today’s network, informatization and globalization, the issue of national ideological security has in fact extended to the cyberspace. Ideology has always been at the forefront of the division of hostile forces on our country. Especially with the rapid development of the Internet, Western capitalist countries headed by the United States rely on their advancement in information technology, the Internet, and hardware foundations. The characteristics of anonymity and strong concealment, and the use of various means to infiltrate, pose a great threat to my country’s ideological security. The ideological struggle in cyberspace has become the main battlefield of ideological struggles.

4 Countermeasures for Network Security Construction 4.1 Firmly Grasp the Main Connotation of the Overall National Security Concept and Xi Jinping’s Important Discussion on Cyber Security To maintain the security of my country’s cyber ideology under the guidance of Xi Jinping’s important discussion on cyber security, we must adhere to the guiding position of Marxism in the field of cyber ideology, resolutely resist bad social thoughts

Network Security and Countermeasures from the Perspective …

833

that slander the party and the country, and ensure that the socialist core value system is in the online public opinion field. The leading position of the Internet is to guide online public opinion to adapt to the needs of the era of the cause of socialism with Chinese characteristics, to speak out for the modernization of socialism with Chinese characteristics, and to achieve the healthy development of network ideology.

4.2 Enhance Scientific and Technological Innovation Capabilities and Consolidate the Foundation of Network Security Science and technology are the primary productive forces, and network core technology is the most active factor in informatization and the most advanced productivity. First, government departments need to increase capital investment and policy tilt to create a good market environment for the development of Internet companies; second, Internet companies also need to strengthen their independent innovation capabilities, focusing on the introduction, digestion and re-absorption of foreign advanced technology experience, and accelerate technological achievements In the process of transformation, get rid of the dependence on foreign technology in the key network infrastructure; the third is to strengthen the overall planning of the industry to avoid the waste of resources caused by blind competition [9]; the fourth is to base itself on the local area, increase investment in infrastructure construction, and develop information technology with independent property rights, To reduce dependence on foreign technology.

4.3 Promote the Legalization of Network Governance Comrade Xi Jinping pointed out: “We must adhere to the rule of law, run the network in accordance with the law, and go online in accordance with the law, so that the Internet can run healthy on the track of the rule of law.” At the government level, speed up the domestic legislation process, improve Internet information content management, key information infrastructure protection and other laws and regulations, establish a network governance subject responsibility system, clarify law enforcement subjects and powers, standardize law enforcement procedures, uphold the principle of open and transparent law enforcement, and follow the law. Punish cyber-criminal behaviors; at the individual level of citizens, it is necessary to clarify the rights and obligations of citizens in the law, clarify the boundaries of personal behavior, and allow citizens to follow the law and consciously regulate their personal behavior.

834

Y. Dan

4.4 Strengthen International Cybersecurity Cooperation To carry out international cybersecurity governance cooperation, one is to focus on the macro pattern of the “community of a cyber destiny”, to reach consensus and strengthen communication; the second is to uphold the concept of “to help each other, mutual trust and win-win”, and to build an international cooperation platform; the third is to clarify “multi-party participation”, “Multilateral participation” principle, build an international Internet security system under the United Nations framework, and jointly build an open, equal and cooperative cyberspace. Learn the strategies of other developed countries to deal with cybersecurity threats, and find excellent methods that can be used for reference by our country [10].

4.5 Do a Good Job in the Construction of Cyber Ideology Security Strengthen ideological education and improve the quality of netizens. First of all, we must attach importance to the party’s self-building, adhere to the ideological building of the party, strengthen party spirit education, so that party members and cadres have a deep understanding of the current situation and challenges facing ideological work, stand a strong Marxist political position, and strengthen the ideals and beliefs of the cause of socialism with Chinese characteristics. Second, to vigorously cultivate the Internet literacy of the general public, and to occupy the network ideology position with the core values of socialism, it is necessary to improve and innovate the methods of propaganda.

5 Conclusion In the face of complex domestic and international situations, conflicts caused by cyber security issues have become increasingly fierce. Domestic network security issues are emerging one after another, threatening the security of national infrastructure, social stability and citizen privacy to a certain extent. On the international level, the network security environment is intricate and complex [11], the big powers fight endlessly, and the politicization and militarization of cyberspace presents a tense situation, which makes the international network security in a generally unstable state. China has always been politically determined to follow the path of peaceful development, and remains firm in its original aspirations in today’s global game on network issues. Looking to the future, China will become the guardian of cyber security in the new era with stronger network technology development, a calmer and more confident attitude, and a more conscious international role in the development of world network integration and information globalization.

Network Security and Countermeasures from the Perspective …

835

References 1. The United States Computer Emergency Readiness Team: Enhancing cybersecurity awareness and resiliency through collaborative partnerships, 23 Aug 2012 2. The White House: International strategy of cyberspace-prosperity, security and openness in a networked world, vol. 5, pp. 176–177, May 2011 3. The White House: National strategy for trusted identities in cyberspace—enhancing online choice, efficiency, security, and privacy, vol. 23,pp. 78–79, April 2011 4. U.S. Department of Defense: Department of Defense Strategy for Operating in Cyberspace, vol. 67, pp. 23–24, 12 July 2011 5. Kumar, A.: New security concept of China, vol. 56, pp. 32–33 (2012). https://www.Ipcs.org/ special-report/china/new-security-concept-of-china-125.html 6. James, R.: Town send and Brantly Womack, Politics in China. Little, Brown and Company, Boston (1986) 7. King and Julia, It Takes a network To Protect a Network, Computer world (2014) 8. Gen, M., Lord, W.T.: Cyberspace Operations: Air Force Space Command Takes the Lead, High Frontier (2009) 9. National Initiative for Cybersecurity Education (NICE): Relationship to President’s Education Agenda, 89 (2010) 10. Clark, R.E.: Cyber War: The Next Threat to National Security and What to Do About It, 5, 32 (2010) 11. BATESGILL: China’s new security multilateralism and its implications for the Asia-Pacific Region (2004). https://www.sipri.org/yearbook/2004/06

Education Informatization: An Effective Way to Promote Educational Equity Luyao Zhang and Yun Zhou

Abstract Educational equity is the starting point and cornerstone of social equity. With the rapid development and continuous optimization of the Internet, artificial intelligence, virtual reality, big data, 5G and other information technologies, their role in the education field is also becoming more prominent. Education informatization is the only way for education reform and development in the information age, and it is also an effective way to improve the quality of education and promote educational equity. Nowadays, it has entered the era of educational informatization 2.0, which pays more attention to educational equity, innovation guidance and people-oriented compared with the era of educational informatization 1.0. While continuously building and optimizing educational informatization, it is necessary to guard against new educational inequities brought by “digital divide”. Keywords Education informatization · Educational equity · Network technology

1 Introduction In the era of “Internet+”, high-quality and fair education needs the support of education informatization. Information technology can break through the limitations of time and space on education, duplicate digital resources at zero cost, and share highquality educational resources. These advantages make it more and more possible to meet the needs of educational equity at different levels, thus promoting the development of education towards high quality and equity. In a word, it has reached a consensus to promote educational equity with educational informatization.

L. Zhang (B) · Y. Zhou Wuhan University of Science and Technology, Wuhan, Hubei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_103

837

838

L. Zhang and Y. Zhou

2 Educational Equity 2.1 The Connotation of Educational Equity Educational equity is the starting point of social equity. The implementation of educational equity is related to the cultivation of talents, the development of economy and the harmony of society. In the long run, ensuring educational equity is the fundamental means to promote social equity. The connotation of educational equity can be divided into three basic aspects, mainly including starting point equity, process equity, and result equity. (1) The starting point equity focuses on the equality of opportunity, with emphasis on the construction of infrastructure and educational resources, so that everyone has the opportunity to receive education. (2) The process equity focuses on differentiated teaching and pays more attention to the individual characteristics and needs of students. The standard of equity is no longer limited to the equality of the same, but reflected in the equality of differences. (3) The essence and ultimate goal of educational equity lies in the result equity. The kernel is to ensure the quality of education, and the key lies in whether its equity promotes the all-round development and personality development of students.

2.2 The Real Challenge of Educational Equity The allocation of educational resources, especially the imbalance of educational development among regions, urban and rural areas, schools and groups, is a prominent shortcoming in achieving educational equity in China. (1) The imbalance between regions is highlighted by the differences in the distribution of educational resources between regions. The less developed the region, the less public investment in education, the lower the overall level of education. (2) The imbalance between urban and rural areas shows that high-quality teachers are still concentrated in cities, and the quality education level of left-behind students in rural areas is far lower than that in cities. (3) The imbalance between schools is mainly reflected in the gap between key schools and ordinary schools. The scarce high-quality resources are concentrated in a few excellent schools, while ordinary schools present a vicious circle of limited development due to the lack of high-quality teachers, good learning atmosphere, excellent students and other factors. (4) The imbalance between different groups is prominently manifested in the difficulty of obtaining high-quality education for children of floating population. Due to the overall lack of educational resources, although the children of floating population have the opportunity to receive education, the cost of obtaining high-quality educational resources is relatively high.

Education Informatization: An Effective Way …

839

3 Education Informatization 3.1 The Connotation of Education Informatization Education informatization can break through the limitation of time and space, improve the communication efficiency, expand the coverage, and enrich the choices, which is the important cornerstone and endogenous driving force of education innovation. In the initial stage, information technology only consisted of computer technology. Later, Multimedia, computer network, artificial intelligence, AR/VR, Internet of Things, blockchain and other technologies emerged.

3.2 Optimization of Technical Advantages The educational informatization 2.0 era has the characteristic of “paying more attention to educational equity”. The needs of educational equity in the new era can be divided into three levels: “eliminating weak demands”, “providing high-quality demands” and “developing individual demands”. Corresponding to the above needs, the technical advantages of informatization are constantly deepening at the level of balance, quality and individuality. Firstly, the weak demand is eliminated to solve the problem of equilibrium. Educational informatization enriches the access channels of educational resources, so that students everywhere have more adequate choices and ensure the balanced allocation of resources. Then it provides high quality demand to pursue substantial equity, mainly through the diversified design of teaching mode, content and form to provide students with suitable educational opportunities and conditions. Finally, individual needs are developed to achieve high-level pursuits. Informatization methods such as big data and artificial intelligence ensure the learner’s self-adaptive and personalized development, and promote the full and comprehensive development of everyone by focusing on the teaching process, improving core literacy, and adapting to individual differences. With the increasing role of information technology in the field of education, the Ministry of Finance has continuously increased its investment in the construction of information technology in the field of education, with an average annual compound growth rate of about 8.7% (Fig. 1).

840

L. Zhang and Y. Zhou

Fig. 1 Statistics of China’s educational informatization funding investment from 2013 to 2020

China's educational informatization funding investment (100 million yuan) 5000

3863

4000 3000

2114

2388

2530

2731

1959

2013

2014

2015

2016

2017

2000 1000 0 2020

Table 1 Average Gini coefficient of education in China, East, Central and West from 2013 to 2017 (Source China Statistical Yearbook) Nationwide

East

Central

West

2013

0.21381

0.20033

0.19945

0.25719

2014

0.21793

0.20415

0.20424

0.26375

2015

0.22604

0.20934

0.21073

0.27245

2016

0.22414

0.20935

0.20896

0.26199

2017

0.22238

0.20509

0.20962

0.25998

Average

0.220860

0.205652

0.206600

0.263070

4 Measures to Promote Educational Equity 4.1 Sharing of Quality Resources and Digital Teaching 4.1.1

Full Coverage of Digital Education Resources in Teaching Sites

The “Full Coverage of Digital Education Resources in Teaching Sites” project aims to transmit high-quality digital education resources to 63,600 teaching sites across the country through IP satellites, the Internet and other methods. In terms of project arrangement, the number of projects in the eastern, central and western regions is in direct proportion to the Gini coefficient of education, which enables the areas with weak education to receive more adequate support. The resources provided by the project cover a complete set of courses, as well as teaching courseware, e-books, test questions, and tutorial materials (Tables 1 and 2).

4.1.2

“Double Teacher” Teaching Mode

“Double teacher” refers to the excellent teachers in the teaching video and the teachers in the local classroom, the “double teacher” teaching mode is a teaching community formed by excellent teachers in educationally-developed areas and local teachers

Education Informatization: An Effective Way … Table 2 “Full coverage of digital education resources in teaching sites” project schedule

Area

Number of teaching sites

841 Proportion (%)

East

7542

11.3

Central

22,839

34.1

West

36,586

54.6

Total

66,967

100

in rural areas. It adopts the mode of combining excellent teachers’ network video with local teachers’ guidance, or the mode of local teachers improving their teaching quality by learning excellent teachers’ teaching video. Excellent teachers have high subject quality and teaching level, and local teachers are familiar with local culture and students. They give full play to their advantages and combine online and offline teaching, which not only enables students in remote areas to obtain high-quality educational resources, but also further enhances the professional development of local teachers.

4.2 The Innovation-Driven Development of Education Information 4.2.1

Highly Developed Mobile Communication Technology

As the ITU-5G network continues to evolve, the technical advantages of 5G make it promising in education applications. The 5G Enhanced Mobile Broadband (eMBB) has greater throughput and data transmission rates can reach 10 Gbit/s, than the previous 100 times faster 4 g LTE cellular network. “High speed” makes video and remote synchronization courses more convenient, and helps solve the problem of big data storage and delivery in education scenarios, which will more effectively promote the sharing of educational resources. Ultra-Reliable and Low Latency Communications (URLLC) enables 5G to have a network delay of less than 1 ms. “Low latency” helps optimize the use effect of AR/VR, enhance the immersion and sense of presence of learning, so as to improve the quality of learning. The Internet of Everything (IoE) is conducive to the connection of educational elements and information, can help teachers more easily access to various data about students’ learning, and improve the effectiveness of education [1].

4.2.2

Artificial Intelligence Technology

Deep learning and machine learning are the key technologies of artificial intelligence technology. Artificial intelligence technology has played a significant role in image recognition, speech recognition, learning prediction, emotion analysis, natural language processing and other fields. The artificial intelligence education platform

842

L. Zhang and Y. Zhou

based on the Internet and big data can maximize the sharing of high-quality educational resources between urban and rural areas, and achieve precise teaching while further improving the speed and flexibility of learning. This can be achieved in both developed and remote areas; the system can significantly narrow the gap caused by different teachers and resources [2].

4.2.3

Virtual Reality Technology

Benefiting from the wide application of mobile Internet 5G network slicing technology and the development of ultra-low latency, ultra-high bandwidth and ultra-high reliability advantages, remote sharing VR/AR virtual classroom has been gradually optimized [3]. Through the whole holographic projection teacher’s class process and other Cloud VR holographic projections, students are provided with immersive learning experience, and various disciplines such as scientific experiment, history, culture and natural scenery are experienced in VR classroom [4]. Edgar Dale’s “The Cone of Experience” theory believes that the knowledge acquired through experience is much more than simply learned. Through VR technology, students in poor areas can feel the same experience as students in developed areas, which cannot completely bridge the gap, but at least narrow it. Combining various types of video surveillance sensor modules, applying visual sensing, eye tracking, motion recognition, voice recognition, learning motion capture, tactile feedback and other technologies to recognize the movements and expressions of students in class, and monitor the teaching process through multidimensional immersion, Dynamically adjust the teaching rhythm, realize online teaching interaction and supervision, so as to improve the quality of distance education (Fig. 2). Fig. 2 Number of VR education applications from the end of 2016 to 2017

Number of VR educational applications 200

164

172

Q3,2017

Q4,2017

139

150 98 100

59

50 0 Q4,2016

Q1,2017

Q2,2017

Education Informatization: An Effective Way …

843

4.3 The Role of Big Data Data has the role of resource foundation and innovation engine, and big data has broad development advantages and application prospects, which is conducive to the construction of high-speed, ubiquitous, mobile and secure new generation of information infrastructure [5]. Educational Data Mining (EDM) and Learning Analytics (LA) control the teaching quality in the whole process, track and record students’ class hours, homework, exams and other situations in real time, analyze and summarize them, and present students’ growth curve dynamically through visualized, intelligent and personalized charts. In the links of teacher qualification, teaching content, teaching process, teaching evaluation, targeted monitoring is carried out through platform data analysis, and data is used to promote scientific decision-making in education, improve the efficiency of school information management [6]. New smart learning technologies represented by cloud computing, digital twin, blockchain, artificial intelligence, and the Internet of Things have brought diversification of data sources, scale of data, and complexity of numerical control. Big data can effectively promote the organic unification of online, fragmentation, scale, and personalization. It not only solves the problems associated with the application of new technologies, but also accumulates the initial momentum for personalized learning, and solves the technical obstacle of cross-platform learning and cloud integration. The comprehensive application, exploration and practice of a variety of new technologies under the guidance of the big data strategy will accelerate the insight and breakthrough of educational science problems.

5 Conclusion and Outlook With the rapid development of science and technology, China’s education informatization has been upgraded from application-driven 1.0 to innovation-led 2.0. In the new era, the pursuit of education equity is expanded from promoting equality and narrowing the gap to equality of high-quality education. To achieve this goal, it still needs the effective assistance of information technology. With the continuous development of educational informatization, we should also guard against the “new digital divide” which produces new educational inequities. Based on the above contents, the following Suggestions are proposed.

844

L. Zhang and Y. Zhou

5.1 Update the Concept of Information Literacy and Ability Training Information literacy is the basis for the transformation of learning and evaluation methods in the information age [7]. It is very necessary to strengthen students’ information literacy and computational thinking training [8]. By implementing the courses of information technology, carrying out project-based learning, STEAM learning, and maker education, exercise students’ interdisciplinary thinking and promote the in-depth integration of information technology and curriculum teaching [9, 10].

5.2 Further Develop High-Quality Resources Resource construction is the core content of education informatization. In the future development of education informatization, the construction of high-quality educational resources is imperative. network cooperation has further broadened the ways for teachers’ professional development and information literacy improvement. According to the level of teachers’ teaching ability targeted different goal and the content of the training plan, improve teachers’ online teaching techniques, online teaching design ability and online education theoretical level, in order to effectively enhance the level of teachers’ information literacy [11].

5.3 Establish Systematic Project Design and Promotion Concept Application of information technology to promote the plan, command and engineering of educational equity should turn to the system integration model, including direct impact factors-environment, resources, content, process, teachers, and indirect factors-evaluation, leadership, use of results, At the same time, it is necessary to think with other social factors such as social system and environment that restrict and influence educational equity.

5.4 Establish a Diversified Funding Investing Mechanism In addition to government input, preferential tax policy can be implemented for education informatization enterprises to encourage them to provide quality services for education. Through the way of corporate donations or price discount to solve part of the funding gap, and implement appropriate remission policies for school network fees. Gradually formed a multi-channel funding model of “government guidance,

Education Informatization: An Effective Way …

845

social participation, market operation, and education-enterprise cooperation”, so that the government and enterprises can show their strengths and enable the continuous and stable development of education informatization.

5.5 Improve Network Security While information brings convenience to education, there are also hidden dangers of network security. Network security is to protect all kinds of data information, application software and network hardware devices in the network system, and prevent data information from leaking and being destroyed or changed. The security management mechanism covering the whole life cycle of data should be established to improve network security level in the future. It should also continue to carry out network security monitoring and early warning, improve data analysis and situation awareness, and improve the construction of the education system’s network security notification mechanism. In addition, it is necessary to promote the capacity building of cyber security posts in the education system, and promote the implementation of the training of cyber security professionals (ECSP) in the education system.

References 1. Lee, K.: Rethinking the accessibility of online higher education: a historical review. Internet Higher Educ. 33, 15–23 (2017) 2. Jacob, B., Berger, D.: Can technology help promote equality of educational opportunities? The Russell Sage Foundation J. Soc. Sci. 2(5) (2016) 3. Biocca, F.: Virtual reality technology: a tutorial. J. Commun. 42(4), 23–72 (1992) 4. Cho, J.I., Choi, H.J.: A study on the types of future teaching-learning and space. Des. Educ. 19(1), 13–24 (2020) 5. Sin, K., Muthu, L.: Application of big date in education data mining and learning analytics—a literature review. ICTACT J. Soft Comput. 5(4) (2015) 6. Bayne, S.: Teacherbot: interventions in automated teaching. Teach. Higher Educ. 20(4), 455– 467 (2015) 7. Thomas, S.: Future ready learning: reimagining the role of technology in education. 2016 National Education Technology Plan 106 (2016) 8. Bhagat, K.K., Wu, L.Y.: Development and validation of the perception of students towards online learning (POSTOL). Educ. Technol. Soc. 19(1), 350–359 (2016) 9. Frey, C.B., Osborne, M.A.: The future of employment: how susceptible are jobs to computerization? Technol. Forecast. Soc. Chang. 114, 254–280 (2017) 10. Daugherty, L., Dossani, R.: Using early childhood education to bridge the digital divide. Rand Corporation 142(11), 3147–3161 (2014) 11. Sun, Z.: A study on the educational use of statistical package for the social sciences. Int. J. Front. Eng. Technol. 1(1), 20–29 (2019)

A Comprehensive Energy Consumption Measurement Model for Building Envelope Components Based on Thermal Imaging Detection Xingzuo Yue and Lei Wu

Abstract The heating (air conditioning) energy consumption of building envelope is the main part of building energy consumption, and the window is one of the main building envelope components. At home and abroad, the heat consumption of Windows is mostly determined by hot box method, but it is limited to the measurement of heat transfer energy consumption. China’s building energy conservation work started late, although some achievements have been made, but the situation of building energy conservation is still very serious. The purpose of this paper is to study the comprehensive energy consumption measurement model of building envelope components based on thermal imaging detection, so as to provide better optimization Suggestions for the energy consumption of building envelope components in the direction of energy conservation. In this paper, the method of measuring the heat transfer coefficient of building exterior wall quantitatively by infrared thermal imager is studied. Through the study of building exterior wall heat transfer analysis, on the basis of one dimensional steady state heat transfer theory, established a heat transfer coefficient and surface temperature of building surrounding structure of mathematical relationship, through the outer wall of a residential field test found that the heat transfer coefficient of enclosure structure generally above 0.76, based on this proposed using infrared thermal imaging detection building palisade structure heat transfer coefficient of operation method. Keywords Infrared thermal imaging technology · Wall heat transfer coefficient · Field detection · Measurement and control model

1 Introduction With the development of social economy, the concept of building energy conservation is put forward. In recent years, building energy consumption is increasing day by day, building energy conservation has become an inevitable trend. At the same X. Yue · L. Wu (B) Wuhan Institute of Shipbuilding Technology, Wuhan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_104

847

848

X. Yue and L. Wu

time, the research on building energy conservation provides impetus to the development of energy conservation technology. Grasping the development concept of building energy conservation, grasping the right opportunity in time and promoting the development of building energy conservation can be beneficial to the sustainable development of the building industry and the environmental protection innovation of building technology. Because thermal imaging can detect temperature changes in different objects, it can reveal what the naked eye can’t see. Thermal imaging can detect and identify objects in complete darkness, low light or bad weather conditions. This makes them very useful in building energy consumption monitoring and predictive maintenance, etc. Ludovic Brasse has conducted in-depth research on the application of thermal imaging technology based on this [1]. Thermal insulation was installed on the exterior surfaces of the building’s three facades, the south, east and North. Župani level Doris’s goal is in proper time records of the day to renew the facade thermal imaging figure, and comparing with old before renovation create heat maps, you can see whether there is a heat leak. By observing the insulation is placed before and after the record, Župani level Doris can be concluded that although there are some can remedy the defect, but the thermal insulation building materials caused the total heat loss [2]. Hurni Maria presents the measured data of a typical single-family house in Poland, and gives the test methods and results of the assessment data necessary to determine building energy consumption. Field measurements include building envelope, heating system, domestic hot water system, heat recovery ventilation system and indoor environmental quality. A new wireless measurement system is adopted. Hurnik Maria used thermal diagnostics to analyze the energy consumption of this house at four different stages of continuous building modernization [3]. In this paper, the building palisade structure component testing on site, using advanced infrared thermal IR FLEXCAM T® TI45 and computer image processing and analysis system for Smart View (TM) typical of infrared thermal image taken by quantitative analysis, put forward a kind of rapid, accurate, convenient operation of building energy consumption detection technology, so as to building energy saving effect of detection and evaluation provides a feasible way, for the use of relevant quality inspection departments of relevant reference.

2 Proposed Method 2.1 Thermal Imaging Detection Technology (1)

Technical overview

Infrared radiation is ubiquitous, the concept of its existence is rather vague because the human eye cannot distinguish it. When people start trying to use part of the equipment to make infrared radiation can be used, it has been found that the infrared radiation can replace the human eye to do some more elaborate work, the scope

A Comprehensive Energy Consumption Measurement …

849

of its observation compared to the human eye, extended to the part of the infrared wavelengths, can observe what the human eye is unable to external characteristics and the temperature range of the observed objects. Based on this, infrared detection gradually developed. In addition, in combination with relevant professional theories, people have developed corresponding devices to observe the individual situation they want to detect. Since the temperature change is correlated with the characteristics of the individual to be measured, it can be concluded that the actual information of the individual can be analyzed with the help of infrared detection equipment. Based on this situation, infrared technology and detection device can be used to change the temperature change that cannot be recognized by human eyes into the relevant image that can be analyzed by human eyes, and then analyze the actual situation of objects from the image. When analyzing the actual condition and integrity of an individual according to its own needs, it can observe its own operation or the existence of problems through the change [4, 5]. (2)

Heat flow meter method

The heat flow meter method refers to sticking the heat flow meter on the wall to measure the heat flow density of all measured walls. The measured heat flow is conducted in one dimension, ignoring the possible other directions of the heat itself, and the thermocouple is used to judge the temperature change of the measured wall itself. Based on the actual temperature change, the heat transfer coefficient of the measured wall is obtained by using the heat transfer correlation algorithm. To make such measurements, relevant devices, such as two or more heat flow meters, should be placed on the outer wall of the building to be measured in advance, and the same number of thermocouples should be equipped at the same time. Relatively speaking, this method is the most commonly used in the test scene with the highest accuracy, and it is also one of the methods recommended in the domestic building energy saving code. Still, there are problems. Since the heat flow meter method is based on the theory of one-dimensional conduction and ignores the heat transferred when the heat flow passes through the wall, there may be a large gap between the actual measurement results and the heat flow detection results [6]. (3)

Hot box method

The hot box method itself is commonly used in laboratories to determine the heat and properties of materials to be tested. In general, the methods selected by the laboratory for the detection of heat transfer coefficient are more mature and standardized than the methods used in daily use, and have their own standards to be followed. In the measurement of heat transfer coefficient, a steady-state thermal environment is the basis and guarantee for all detection. In the process of the hot box method, corresponding devices should also be provided, usually with a large number of devices. Compared with other methods, the hot box method has a wider range of detection. Compared with the heat flow meter method introduced above, it can be found that the error of the measurement result is smaller. of course, the hot box method also has

850

X. Yue and L. Wu

some problems, that is, the device itself takes up a lot of space, needs to spend time and space for installation, and the installation steps are complicated, which is not a convenient measurement method. When the house needs to be rebuilt, the building itself will affect the living function and may even cause damage to the building [7, 8]. (4)

Detection principle

The above two common methods of detecting heat transfer coefficient rely on the same theory as support. In the same way, the divided heat of the wall itself is treated as 0, and the heat transfer process of the wall under such conditions is assumed to be based on one-dimensional conduction. In the buildings to be tested, it is necessary to create a similar thermal environment inside the object to be tested. On the other hand, it is also necessary to simulate the similar external natural conditions. When testing, it is necessary to adjust the indoor and outdoor temperature in a timely manner to maintain its stability. Under such a premise, the heat transfer of the detected individual is from the inside out, and after its temperature is stable, the difference between the air and the shown can be determined, and the heat transfer coefficient can be obtained through the relevant calculation formula [9, 10].

3 Experiments 3.1 Experimental Background According to relevant data, the total building energy consumption in China is increasing continuously. By the end of 2012, China’s relevant energy consumption had reached 316 million tons, accounting for 25.6% of the total energy consumption of domestic related resources. On the other hand, in China, the development of industrial technology in the early stage is relatively high in energy consumption, and the sustainable development does not combine with the concept of environmental protection. Even in the construction industry, energy-saving materials are rarely adopted in the building itself. In particular, in building energy consumption, heat loss of wall fence structural components and other heat loss is often ignored. In terms of environmental protection concept of sustainable development, it is necessary to establish a comprehensive energy consumption measurement model of building envelope components, which can effectively contribute to energy saving buildings.

3.2 Experimental Design In this paper, infrared thermal imaging is used to detect the heat transfer coefficient of the wall. In the course of the experiment, it is necessary to check the individual environment measured on time so as to avoid the unexpected situation affecting the

A Comprehensive Energy Consumption Measurement …

851

Table 1 Experimental data Exterior wall main structure

The wall thickness (mm)

Coefficient of thermal conductivity (m * k)

Thermal resistance

Coating







Fiberglass mesh cloth

1.5

1.1

0.001

Insulation layer of polystyrene plate

100

0.042

2.381

Mortar leveling

15

0.83

0.018

Clay solid brick walls

370

0.81

0.145

Lime cement mortar

20

0.29

0.023

measurement. In the experiment, the infrared thermal imaging detector was placed on a wall with relatively high temperature. The thermocouple needs to be around the device and on the opposite side. When the measured wall is a hollow structure, both the hollow position and the heat distribution of the solid part outside the hollow should be taken into account. The measured heat transfer coefficient is combined with the two to take the median value. The experimental data are shown in Table 1.

4 Discussion 4.1 Comprehensive Energy Consumption Measurement Model Analysis of Building Envelope Components Based on Thermal Imaging Detection As shown in Fig. 1, in the process of the experiment, both the heat flow meter method often used in daily life and the infrared thermal imaging detection method tried in the experiment can meet the basic standards of building energy conservation. This means that the relevant building materials tested in the experiment meet the requirements of energy saving building materials, save building energy consumption, avoid heat loss, and meet the quality requirements of the building itself. Moreover, it can be seen from the experimental results that using the common heat flowmeter method or thermal imaging detection technology, the experimental results can well prove the theoretical results, and the calculated values are all higher than the theoretical standards. It can be said that all kinds of indexes calculated according to the general calculation formula are based on the characteristics of all kinds of materials needed in the building and are not representative, so they can only be used as the reference standard for experiments. After the constructed building is put into use, with the increase of its service life, the building materials are faced with the problem of aging, and its energy-saving performance will naturally decline. Before the insulation effect is different, on this

852

X. Yue and L. Wu

Fig. 1 Comparison of heat transfer coefficient

basis, the change of heat transfer coefficient tends to increase. The change of indoor temperature is also one of the factors affecting the heat transfer coefficient, but these cases are all normal phenomena with a certain normality. By observing the application of infrared thermal imaging detection technology in the experimental process, it can be found that compared with the traditional heat flowmeter method, the stability of infrared thermal imaging detection technology cannot be guaranteed, and it is not suitable for the situation that it is difficult to control the environmental temperature in daily buildings. The heat flow meter method can control the temperature of the environment to a certain extent, and measures can be taken to ensure the stability of the experiment. When taking thermal image and measuring temperature, infrared thermal imager is bound to be affected by the external atmosphere and the environment around the building area, so it is not so stable in comparison.

4.2 Suggestions on the Comprehensive Energy Consumption Measurement Model of Building Envelope Components Based on Thermal Imaging Detection At the end of the experiment, it can be seen that there are areas for improvement. For example, care needs to be taken to select the appropriate temperature range. In the experiment, when infrared thermal imaging instrument is used to take images, it is necessary to set an appropriate temperature measuring range, so as to ensure that the device can take the best quality temperature measuring images. In addition, it is necessary to set the emissivity value in advance. At this time, it is considered to use

A Comprehensive Energy Consumption Measurement …

853

a more accurate thermometer to debug it to a certain extent, in order to reflect its actual emissivity value, so as to make the experimental results more accurate. Emissivity refers to a class of indexes that can affect the accuracy of infrared thermography detection results. Usually, some numerical values of emissivity can be seen in the specification attached to infrared thermography. However, this is only a theoretical reference, not a practical basis, the specific situation will be based on the actual environmental temperature changes. The emissivity must be as accurate as possible. In order to achieve this requirement, a temperature measuring instrument with higher accuracy is considered to judge the temperature situation of the measured area and to correct the emissivity value of the infrared thermal imager.

5 Conclusions Based on thermal imaging detection technology, this paper studies the application of infrared thermal imaging technology in building envelope with residential buildings as the research object. Firstly, the heat exposure and temperature distribution of roof and wall were measured. The heat distribution of the enclosure structure was studied qualitatively. Then, after in-depth analysis of the heat transfer process of the building wall, the mathematical relationship between the wall surface temperature and the thermal performance of the building wall-heat transfer coefficient is established according to the steady-state heat transfer theory. The wall heat transfer coefficient is tested by infrared thermal imager, and the test results are processed and analyzed.

References 1. Brasse, L., Trolez, F.: Thermal image sensors: ready for everyday life. Optronics 34(3), 66–70 (2015) 2. Župani´c, D., Bolari´c, A., Stanˇci´c, M.: Thermal imaging of the outer surface of the Laboratory for engines and vehicles at the Faculty of mechanical engineering and naval architecture. Inflammatory Bowel Diseases 19(6), 1194–201 (2015) 3. Hurnik, M., Specjal, A., Popiolek, Z., et al.: Assessment of single-family house thermal renovation based on comprehensive on-site diagnostics. Energy Build. 158(PT.1):162–171 (2018) 4. Bonmarin, M., Le, G.F.: A lock-in thermal imaging setup for dermatological applications. Skin Res. Technol. 21(3), 284–290 (2015) 5. Oh, G., Lee, K.-H., Chung, E.: Active thermodynamic contrast imaging for label-free tumor detection in a murine xenograft tumor model. Biomed. Opt. Express 8(11), 5013 (2017) 6. Arora, V., Mulaveesala, R., Bison, P.: Effect of spectral reshaping on frequency modulated thermal wave imaging for non-destructive testing and evaluation of steel material. J. Nondestr. Eval. 35(1), 1–7 (2016) 7. Duncan, A.E., Torgerson-White, L.L., Allard, S.M.: An evaluation of infrared thermography for detection of bumblefoot (pododermatitis) in Penguins. J. Zoo & Wildlife Med. (Official Publication of the American Association of Zoo Veterinarians) 47(2), 474–485 (2016)

854

X. Yue and L. Wu

8. Fraiwan, L., Ninan, J., Al-Khodari, M.: Mobile application for ulcer detection. Open Biomed. Eng. J. 12(1), 16–26 (2018) 9. Stanojevi´c, M., Bjelic, M., Pavlovic, D.S.: Estimation of incident energy angular distribution at the building envelope in urban environment. Acoust. Soc. Am. J. 141(5), 3883–3883 (2017) 10. Rodrigues, C., Freire, F.: Environmental impact trade-offs in building envelope retrofit strategies. Int. J. Life Cycle Assess. 22(4), 1–14 (2016)

Computer Financial Accounting Information System for International Trade Enterprises Wenwen Yang

Abstract With the one belt, one road strategy, the deepening of China’s opening up, the Chinese enterprises have entered a broader stage of competition and cooperation in international trade. With the development of international trade enterprises, the financial management of international trade enterprises is particularly important. Therefore, this paper studies the computer financial accounting information system of international trade enterprises. Based on cloud computing, this paper constructs a computer financial accounting information system for international trade enterprises. This paper first analyzes the functional requirements of the system and on this basis, constructs the system functional modules, and studies the possibility of the proposed system through functional testing and performance testing. In the system performance test, this paper analyzes the system response time and the function execution rate of each function module. The system performance test results show that the function execution rate of each function module of the system exceeds the expected value, and the average function execution rate of the system function module is as high as 99.54%. The results show that the computer financial accounting information system of international trade enterprises based on cloud computing has good performance, and the functions of each module can be basically realized. Keywords International trade enterprises · Financial accounting information system · Cloud computing · Functional requirements analysis

1 Introduction With the development of economic globalization and China’s accession to the WTO, China, as a major international trade country, plays an increasingly important role in the process of integrating into the process of economic globalization and promoting its own economic development and transformation. Among them, international trade enterprises play an indispensable and important role [1, 2]. Therefore, the financial W. Yang (B) Jiangxi College of Foreign Studies, 291 Tianxiang Avenue, Nanchang, Jiangxi, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_105

855

856

W. Yang

accounting information management of international trade enterprises is particularly important [3, 4]. With the development of information technology, the development of financial accounting information system has experienced different stages [5, 6]. There are also obvious differences in the construction of financial accounting information system at different information levels. With the development of science and technology, the financial accounting information system has basically changed from manual to computer [7, 8]. Because computers can transmit accounting data quickly and accurately, the application of computers in financial accounting information management improves accounting efficiency and decision-making level of managers [9, 10]. On this basis, it is of great significance to design the computer financial accounting information system for international trade enterprises. This paper studies the computer financial accounting information system of international trade enterprises. In the research process, this paper first briefly describes cloud computing and some related basic accounting knowledge. Secondly, on the basis of cloud computing, this paper analyzes the functional requirements of the system, determines each functional module, and constructs the computer financial accounting information system of international trade enterprises. Finally, we test the function and performance of the system. The test results show that the system is feasible and has excellent performance.

2 Overview of Relevant Basic Knowledge 2.1 Cloud Computing Cloud computing is a new computing model, which refers to large-scale distributed parallel computing. According to the types of services, cloud computing applications can be divided into three forms: infrastructure as a service, platform service and software as a service. Infrastructure as a service provides virtual hardware resources in the form of services. It provides an effective mechanism for most application developers to share the super large-scale computing power of cloud computing. “Platform as a service” is another “software as a service” transformation. This form of cloud computing provides the development environment as a service to users. Platform as a service runs on the infrastructure of the provider and can be transmitted from the server of the supplier to the user’s own application through the Internet. Software as a service is a kind of user using software through Internet. This type of cloud computing provides a single application that uses a browser to make up tens of thousands of customers using multi tenant shelves. On the client side, this means that there is no upfront investment in the server or software license; for the provider, only one application is used for maintenance, which is lower than the traditional hosting cost.

Computer Financial Accounting Information System …

857

2.2 Overview of Basic Accounting Knowledge Accounting is an integral part of financial management. It is mainly through the use of accounting methods and financial accounting information to carry out value management of economic activities. Its purpose is to improve economic benefits. The general object of accounting is the capital flow in the process of social reproduction. The flow of funds is manifested in the investment, distribution, consumption, withdrawal and withdrawal of funds. The flow of funds can be divided into static and dynamic. Static performance is the three elements of assets, liabilities and owner’s equity. The quantitative relationship between them can be summarized by the following accounting equation: Assets = Liabilities + Owner’s equity

(1)

The dynamic performance of capital is the circulation and turnover of capital, which is embodied in the three elements of income, expense and profit: Revenue − Expense = Profit

(2)

The fund movement is the unity of static and dynamic, and the six elements of accounting are organically linked. The quantitative relationship of the six elements of accounting can be summarized by the following accounting equation: Assets + Expenses = Liabilities + Owner’s Equity + Income

(3)

As a management activity, accounting includes accounting, accounting control, accounting analysis, accounting inspection, accounting forecast and decisionmaking.

3 Test Environment and System Test 1.

Test environment (a)

(b)

Hardware environment The computer used in this paper is Windows 7 system, its CPU is Intel Core i3-5010U2.10 GHz, memory is 8 GB, hard disk is 500 GB, video card NVIDI AGeforceGT620. Software environment The database used in this paper is MS SQL Server, and the server is Tomcat. In addition, we use the browser: IE browser, the enterprise application testing tool is silktest, and the test tool for predicting system behavior and performance load is Mercury Load Runner, etc.

858

2.

W. Yang

System testing In order to verify the feasibility of the computer financial accounting information system proposed in this paper, the system function test and system performance test are carried out. In the system function test, we test the function of each module and analyze the results. In the system performance test, we take the system response time and the execution rate of each function module as the evaluation index.

4 Computer Financial Accounting Information System for International Trade Enterprises As a new computing model, cloud computing can provide efficient, dynamic and large-scale expansion of computing processing capacity, and has an important position in the history of computer development. On the basis of cloud computing, this paper constructs the computer financial accounting information system of international trade enterprises, and studies it.

4.1 Analysis of Functional Requirements of Computer Financial Accounting Information System for International Trade Enterprises Based on Cloud Computing 1.

Provide user-defined operation interface generation function: (a) (b)

2.

Provide users with security authentication module and use rights to ensure the security of the system. It can provide a system platform for users to quickly generate operation interface, and users can freely set up personalized operation interface on this platform.

Provide daily accounting service function: (a)

(b)

It provides users with A/C set management, operator authority management, password management and other functions. Users can set up and establish A/C set that meets the needs of the enterprise itself, determine the type of A/C set according to the nature of the enterprise and the business type, name the A/C set and enter the A/C set to provide password authentication protection. It provides users with the initial setting of system data to meet the specific accounting requirements of the enterprise, including voucher number method, accounting subject and code, opening balance setting, foreign currency accounting, setting of relevant auxiliary accounting files, etc.

Computer Financial Accounting Information System …

(c)

3.

859

For users to provide input, audit vouchers, bookkeeping, reconciliation, closing, Sub Ledger query, general ledger query, financial statements generation and other functions.

Provide database support: (a)

(b) (c)

It provides strong database support for information system, and ensures that the data (including basic data and financial data) between the system and the database can be transferred, modified and saved in time. Ensure the consistency, validity and integrity of the data, and ensure the accuracy of the data. To ensure the security of data and password, data retrieval and update can only be operated by the operator authorized by the administrator, and the authority of data retrieval and update should be reasonably specified.

4.2 Module Function Design of International Trade Enterprise Computer Financial Accounting Information System Based on Cloud Computing 1.

2.

3.

4.

5.

Voucher processing module Voucher processing module is the basic function module of accounting information system. It is mainly used for basic processing of accounting voucher, including voucher preparation control, automatic numbering of voucher, selection of authority settings for voucher approval and query, consolidation of voucher, display and printing. If the enterprise has foreign currency business, foreign currency accounting function needs to be added. Account book processing module The main objective of the account book operation module is to classify and summarize the types of accounting vouchers in an accounting year saved in the voucher processing module, generate cash, bank deposit journals and category sub ledgers of each accounting subject, and finally generate the general ledger account book according to all accounting information of the whole accounting year. The account book operation module is also the basic function module of accounting information system. Report management module The report management module is to get the relevant financial information from the accounting processing module, and generate financial statements such as profit statement, cash flow statement and balance sheet. Financial analysis module The financial analysis module is based on the historical data and data obtained before to predict and analyze the future development trend, so as to provide a scientific basis for the decision-making level to make policies. System maintenance module

860

W. Yang

The system maintenance module is an extended function module of accounting information system, which is used to set the basic information and other auxiliary functions of the system.

4.3 System Test Analysis 1.

2.

Function test result analysis The test results are shown in Table 1. As can be seen from Table 1, the system function test results show that the computer financial accounting information system of international trade enterprises based on cloud computing has passed the test in five functional modules. It can be seen that the system constructed in this paper is feasible. Analysis of performance test results The system performance test of the international trade enterprise computer financial accounting information system based on cloud computing is carried out, and the results are as follows: (a)

System response time The response time test results of the system constructed in this paper are shown in Fig. 1.

Table 1 System function test results

Functional module

Test result

Voucher processing module

Pass the test

Account book processing module

Pass the test

Report management module

Pass the test

Financial analysis module

Pass the test

System maintenance module

Pass the test

System response time/s

Expected value

Actual value

0.6 0.5 0.4 0.3 0.2 0.1 0 -0.1

50

100

150

200

Number of users Fig. 1 Analysis of system response time test results

250

300

Computer Financial Accounting Information System …

(b)

861

As can be seen from Fig. 1, the response time test results of the system constructed in this paper. We know that in the system response time, the more users, the faster the system response time, so as to ensure that each user has an acceptable response time. Then, in the test of this paper, when the number of users is relatively small, that is, 50, the expected value of system response time is 0.5 s, the actual response time of this system is 0.45 s, when the number of users is 100, the expected value of system response time is 0.4 s, and the actual response time of this system is 0.32 s. When the number of users increases to 150, the expected response time of the system is 0.3 s, while the actual response time of this system is 0.24 s. When the number of users reaches 200, the expected response time of the system is 0.2 s, while the actual response time of this system is 0.13 s. When the number of users reaches 250, the expected response time of the system is 0.1 s, while the actual response time of this system is 0.08 s. When the number of users reaches 300, the expected response time of the system is 0.05 s, while the actual response time of this system is 0.01 s. It can be seen that the response time of the system in this paper has reached the expected standard, and is far better than the expected standard, which proves the superiority of the system in response time. Function execution rate This paper analyzes the function execution rate of the system, then the function execution rate of the system is shown in Fig. 2. It can be seen from Fig. 2 that the expected value of the function execution rate in the five function modules is 99%, then in the actual test, the function execution rate of the system in the voucher processing module is 99.38%, the function execution rate in the account book processing module is 99.41%, the function execution rate in the report management module is 99.56%, the function execution rate in the financial analysis Expected value

Actual value

Functional module

Voucher processing module Account book processing module Report management module Financial analysis module System maintenance module 98.4 98.6 98.8

99

99.2 99.4 99.6 99.8 100

Function execution rate/s Fig. 2 Analysis of test results of system function execution rate

862

W. Yang

module is 99.86%, and the function execution rate in the system dimension is 99.86%.The function execution rate of the protection module is 99.47%, and the function execution rate of each function module exceeds the expected value. The average function execution rate of each function module is 99.54%. It can be seen that the function execution rate of this system is very high. In conclusion, the computer financial accounting information system of international trade enterprises based on cloud computing has great advantages in performance.

5 Conclusions The reason for international trade is to exchange what is needed and reduce the occurrence of disequilibrium. With the advent of internationalization, there are more and more international trade enterprises in China, and the financial management of international trade enterprises is becoming more and more important. The traditional financial accounting information system can not meet the needs of the development of the times. Therefore, based on cloud computing, this paper constructs a computer financial accounting information system for international trade enterprises based on cloud computing, and verifies the feasibility of the system through functional testing and system testing. The results show that the system has good performance and can provide convenience for the financial accounting information management of international trade enterprises. The research results of this paper will provide certain reference value for the research of financial accounting information system.

References 1. Murphy, A., Taylor, C., Acheson, C.: Representing financial data streams in digital simulations to support data flow design for a future Digital Twin. Robot. Comput.-Integr. Manuf. 61(Feb.), 101853.1–101853.16 (2020) 2. Hutahayan, B.: The mediating role of human capital and management accounting information system in the relationship between innovation strategy and internal process performance and the impact on corporate financial performance. Benchmark. Int. J. 27(4), 1289–1318 (2020) 3. Fachri, Z., Mediaty, M.: Analysis using region’s financial accounting information system on the quality of local government finance reports. Hasanuddin Econ. Bus. Rev. 3(1), 13 (2019) 4. Asmuni-Program, I., Akuntansi, S., Asmuni, I.: Reliability implementation of accounting information systems in improving small and medium enterprises financial performance. Test Eng. Manage. 83(May–June 2020), 798–811 (2020) 5. Alsufy, F.J.H.: The effect of speed and accuracy in accounting information systems on financial statements content in Jordanian commercial banks. Int. J. Bus. Manage. 14(8), 160 (2019) 6. Al-Dalabih, F.A.N.: The impact of the use of accounting information systems on the quality of financial data. Int. Bus. Res. 11(5), 143 (2018) 7. Lin, P.: Design and implementation of financial accounting information management system of shipping companies based on ERP. J. Coastal Res. 94(sp1), 470 (2019)

Computer Financial Accounting Information System …

863

8. Efendi, R., Dewi, F.G., Gamayuni, R.R.: Usefulness analysis of accrual based accounting information on local government financial statement: a qualitative study. Int. J. Sci. Technol. Res. 7(11), 10–21 (2018) 9. Neves, M.E., Serrasqueiro, Z., Dias, A., et al.: Capital structure decisions in a period of economic intervention. Int. J. Account. Inf. Manage. 28(3), 465–495 (2020) 10. Elsharif, T.A.: The elements of accounting information systems and the impact of their use on the relevance of financial information in Wahda Bank—Benghazi, Libya. Open J. Bus. Manage. 07(3), 1429–1450 (2019)

Information Security of Internet of Things Based on Perception and Interaction Technology Haijun Huang

Abstract The security problem of the Internet of things (IOT) system has caused high attention in the information security (IS) industry. This paper studies the IS of the IOT based on perception and interaction technology. In the research, we put forward an IS protection method of the IOT based on the perception and interaction technology, and tested the method and the traditional IS protection method on the industrial IS attack and defense drill platform respectively. The test results show that the response time of the IOT IS measures based on perception and interaction technology proposed in this paper is 27 µs, while the traditional method needs 83 µs. From the perspective of false positive rate (FPR) and false negative rate (FNR), there are obvious differences between them. The FPR and FNR of the traditional method are 12.7% and 7.9% respectively, and the FPR and FNR of the method in this paper are 5.4% and 3.1%. The test results show that the IOT IS protection means based on perception and interaction technology can effectively ensure the IS of the IOT. Keywords Internet of things · Information security · Perception and interaction technology · Preventive measures

1 Introduction As an emerging strategic industry with high future prospects, the IOT has been highly concerned by countries all over the world [1, 2]. The important report of the US National Intelligence Commission and the EU’s inclusion of IOT technology in its seven science and technology framework plans show the importance of IOT technology in the future network development. Japan and South Korea have also followed closely the pace of the United States, released relevant science and technology strategies, and started relevant research work [3, 4]. At the same time, China H. Huang (B) School of Intelligent Systems Science and Engineering, Yunnan Technology and Business University, Kunming 657100, Yunnan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_106

865

866

H. Huang

is also vigorously carrying out research on the IOT, investing a lot of manpower and material resources [5, 6].

2 Concept Analysis of IOT 2.1 Overview of IOT The so-called “IOT”, as the name implies, is a network that connects “things”. Here, “things” mainly refer to objects in the real world, which can be inanimate or alive. While “Internet” mainly refers to such a network: it can collect information about “objects” themselves or “around objects” in the real world, and save these information in time, and on this basis, identification, processing, analysis and management are carried out. Relatively speaking, “Lian” is a verb, that is to connect, contact. The process of this connection needs corresponding technical support, such as radio frequency identification technology, intelligent positioning technology and wireless communication technology. In short, the biggest feature of the IOT is that it makes the real world “things” have the characteristics of “information” in the virtual world, that is, it greatly strengthens the degree of informatization and data of “things”, so that they can be collected, stored and processed like traditional information through wired and infinite networks. More importantly, the IOT technology can also timely send instructions from the virtual world to the “objects” in the real world, so as to achieve accurate and effective control.

2.2 IOT Security Awareness and Interaction Technology IOT perception interaction technology is to use data detection nodes to collect and classify sensitive data. At the same time, according to business requirements, data exchange and application are carried out to improve the basic content of data application. In order to be able to manipulate data information, in addition to the traceability of data transmission, it also ensures the security of information application, so as to realize the stability and stability of data application Security. Sensing algorithm based on absolute covariance is an important algorithm in sensing and interaction technology. In this algorithm, it is assumed that H0 , when the primary user signal does not exist, the noise signals at different times are independent of each other, so the statistical covariance matrix of the received signal is 0 except for the diagonal elements. Suppose H1 , when the primary user signal exists, the sampling covariance matrix of the received signal is an off diagonal matrix due to the correlation of the primary user signal. The structure of statistical covariance matrix under the two hypotheses

Information Security of Internet of Things Based …

867

is different. When n is large, the sampling covariance matrix can be approximated to the statistical covariance matrix. The element R˜ X of the sampling covariance matrix is ri j , 1 ≤ i, j ≤ M N . The sum of diagonal elements of sampling covariance is T0 , and the sum of all elements of sampling covariance matrix is T1 . MN 1  |rii | T0 = M N i=1

T1 =

MN MN 1     ri j M N i=1 j=1

(1)

(2)

3 Research Methods and Experimental Tests 3.1 Research Methods This paper summarizes and analyzes the IOT IS incidents, summarizes the main factors that threaten the IS of the IOT, and puts forward the IS protection measures of the IOT based on the perception and interaction technology.

3.2 Experimental Test This paper tests the IOT information security method based on perception and interaction technology on the industrial IS attack and defense drill platform, and compares with the traditional IOT information method. The industrial IS attack and defense drill platform is composed of PLC, motor, industrial PC, firewall hardware equipment, field/remote monitoring terminal, data collector, network performance test equipment and various network peripherals. The test content includes: response time, FPR and FNR.

868

H. Huang

Security threats of data acquisition layer Security threats of data transmission layer Security threats of data processing layer Privacy security threats 11.6% 16.3%

83.7%

12.5%

27.5% 32.1%

Fig. 1 IOT information security threats

4 Information Security Analysis of IOT Based on Perception and Interaction Technology 4.1 Information Security Threat Analysis of IOT This paper summarizes the IOT information security events in recent years, summarizes several major types of threats to the IOT information security, as shown in Fig. 1. As can be seen from Fig. 1, at present, the main threat to the IOT information security is that the computer system is under attack. This kind of event accounts for 32.1% of the total IOT security incidents, followed by privacy security events. This kind of problem is also the main type of IOT security events, accounting for about 27.5%. Next are the security threats of data acquisition layer, data transmission layer and data. These security incidents account for 16.3%, 12.5% and 11.6% of the IOT information security incidents, respectively.

4.2 Analysis of Test Results In this paper, two IOT information security protection methods are tested on the industrial information security attack and defense drill platform. The test is evaluated from three aspects, including response time, FPR and FNR. The experimental test results are shown in Table 1 and Fig. 2. It can be seen from Table 1 and Fig. 2 that the test results of the two protection methods on the industrial information security attack and defense drill platform are obviously different. First of all, in terms of response time, the response time of the IOT information security measures based on perception and interaction technology proposed in this paper is 27 µs on the test platform, while the traditional method

Information Security of Internet of Things Based … Table 1 Experimental results

Numerical value

100

869

Test method

Response time (µs)

FPR (%)

Missing report rate (%)

The method of this paper

27

5.4

3.1

Traditional method

83

12.7

7.9

83

80 60 40

27

20

5.4

12.7 3.1

7.9

0 Response time (microseconds)

False positive rate Test indicators

The method of this paper

%

Missing report rate (%)

traditional method

Fig. 2 Statistics of experimental results

needs 83 µs. Secondly, from the perspective of FPR and FNR, there are also obvious differences between them. The FPR and FNR of the traditional method are 12.7% and 7.9% respectively, while the FPR and FNR of this method are 5.4% and 3.1% respectively.

4.3 IOT Information Security Protection Measures Based on Perception and Interaction Technology (1) Operation and protection of perception layer: First of all, encryption control is applied to the perception layer of identity verification, and self-healing function should be added to deal with the ability to resist attacks. The spare node can be added in the process of node construction, so as to play a dual protection role. The security of authority setting should also be verified at the important level, so as to avoid the security risks caused by identification errors. (2) Network layer and application layer protection: IOT network layer and application layer of physical equipment security, should adopt the IOT network firewall technology (filtering firewall, proxy firewall, etc.) to improve the security of these physical devices, to avoid being attacked. In addition, the key physical equipment should be redundant and backed up to ensure

870

H. Huang

that the system can continue to run normally in case of equipment failure. (3) Encrypt important data: It is necessary to develop related cryptographic technologies. The security of data encryption system is just like a door lock of a secret room. Whether the data encryption system is safe or not determines whether our information can be transmitted normally and all kinds of privacy will not be disclosed. This requires us to encrypt and store all kinds of data flowing in the system, and even if it is obtained by various illegal hackers, it can not be easily cracked, So as to achieve the purpose of data protection. (4) User login and access rights: In order to ensure the security of data, we must establish a set of strict prevention mechanism.

5 Conclusions This paper studies the information security of IOT based on perception and interaction technology [7–10]. This paper first analyzes the security threats that the IOT may face and the shortcomings of the current security technology, and then summarizes the information security protection measures of the IOT based on the perception and interaction technology, which provides security for the information security of the IOT system from different angles. In addition, the proposed method is verified in this paper, and the results show that the proposed method has very high advantages.

References 1. Wei, P., Zhou, Z.: Research on security of information sharing in internet of things based on key algorithm. Future Gen. Comput. Syst. 88, 599–605 (2018) 2. Chu, H.C., Sung, C.H., Lee, H.L.: The digital fingerprinting analysis of generic Twitter sessions from internet of things security aspect. Mob. Netw. Appl. 24(3), 829–838 (2019) 3. Touq, A.B., Ijeh, A.: Information security and ecosystems in smart cities: the case of Dubai. Int. J. Inf. Syst. Soc. Change 9(2), 28–43 (2018) 4. Yang, Y., Peng, H., Li, L., et al.: General theory of security and a study case in internet of things. IEEE Int. Things J. 4(2), 592–600 (2017) 5. Hong, S., Park, S., Park, L.W., et al.: An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea. Future Gen. Comput. Syst. 82, 769–782 (2017) 6. Kaur, J., Kaur, K.: Internet of things: a review on technologies, architecture, challenges, applications, future trends. Int. J. Comput. Netw. Inf. Secur. 9(4), 57–70 (2017) 7. Zou, Y., Lv, J.: Information security transmission technology in internet of things control system. Int. J. Online Eng. 14(6), 177 (2018) 8. Qian, X., Liu, X., Pei, J., et al.: A game-theoretic analysis of information security investment for multiple firms in a network. J. Oper. Res. Soc. 68(10), 1–16 (2017) 9. Ariwa, E.: Synthesis lectures on algorithms and software in engineering. J. Inf. Secur. Res. 9(4), 156–156 (2018) 10. Tuna, G., Kogias, D.G., Gungor, V.C., et al.: A survey on information security threats and solutions for machine to machine (M2M) communications. J. Parall. Distrib. Comput. 109, 142–154 (2017)

Enlightenment of MOOCS Teaching Method in the Practical Course of Radio and TV Editing and Directing Yao Huang

Abstract With the development of the times, as well as the continuous advancement of China’s modernization process, the reform of teaching mode has become an important task for colleges and universities in China. In recent years, the reform and construction of radio and television editing and directing practice course is faster and faster, and has formed the mainstream trend. However, compared with the mature teaching mode of radio and television editing and directing practice course in foreign countries, the reform of teaching mode in China is not perfect enough. Therefore, combined with the reform of the practical course of radio and television editing and directing, this paper introduces the concept of MOOC teaching method, and puts forward a brand-new teaching method path of MOOC with the help of Internet technology, so as to strengthen the teaching ability of colleges and universities. In this paper, a number of investigations and experiments have been carried out on the teaching situation of radio and television editing and directing practice course and the teaching effect before and after the reform. Through the analysis of the survey results, the use of MOOC teaching method on the existing radio and television editing practice course teaching mode reform, can effectively improve the teaching effect, enhance the learning effect, enhance learning interest. Keywords MOOC teaching · Practice course of editing and directing · Reform in education · Teaching model

1 Introduction From the current teaching mode of the practical course of radio and television editing and directing, there is a widespread phenomenon of ignoring practice and emphasizing theory, which will eventually affect the cultivation of students’ sustainable innovation ability. Students’ artistic self-cultivation needs to be improved, they need Y. Huang (B) College of Humanities and Sciences of Northeast, Normal University, Changchun, Jilin Province, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_107

871

872

Y. Huang

to overcome difficulties, improve interest and enthusiasm, lack of a set of scientific teaching mode [1–3]. Therefore, we should use the teaching method of potential thinking to cultivate students’ interest in learning, cultivate students’ ability to discover and solve problems in law, enhance students’ subjective learning ability and cooperate with others, so that students can improve their practical ability, cultivate good sense of teamwork, establish a new mode and cultivate practical talents, It includes cooperative learning, event driven and scientific evaluation [4, 5]. MOOC is a new mode of online development, which is based on the past resource release, learning management system and the combination of learning management system and more open network resources [6–8]. Large scale online course opening, which means that MOOCS method is not necessarily suitable for all courses teaching, but from the practical course characteristics of radio and television director, this can be said to be good [9, 10]. This paper investigates and studies the existing practical course of radio and television editing and directing, and finds that there is a certain gap between the teaching mode of radio and television editing and directing practice course and that of foreign countries. Therefore, this paper establishes the enlightenment research of MOOC teaching method in the practical course of radio and television editing and directing. In the research, this paper introduces the core concept of MOOC teaching method according to the actual situation of radio and television editing and directing practice course in Colleges and universities in China, and puts forward a brand-new teaching method path of MOOC. This method provides effective suggestions and optimization measures for MOOC teaching reform of radio and television editing and directing practice course in China. In contrast to the experimental analysis, we can find that MOOCS teaching method can cultivate students’ active learning ability and help them master professional skills and learning methods.

2 MOOC Teaching Method and Its Application in the Practical Course of Radio and TV Editing and Directing 2.1 MOOC Teaching Method As a popular network course development mode, the concept behind MOOC has a long history. In fact, it originated from the old curriculum development mode of publishing information resources, learning management system and combining the system with more shared network resources. However, the actual proposition and structure of MOOCS have only recently emerged. MOOC is different from traditional distance education through TV broadcasting, Internet, tutoring and other channels. MOOC is also different from the teaching mode of network sharing class or open class, as well as the learning software or online application based on the network. MOOC is based on the connectivity theory and open teaching method of

Enlightenment of MOOCS Teaching Method in the Practical Course …

873

network learning. Different from the above-mentioned one-way “online courses”, MOOC teaching mode can easily achieve the effects of network teaching, student experience, teacher-student interaction and so on.

2.2 Application Significance of MOOCS Teaching Method in the Practical Course of Radio and TV Editing and Directing Compared with some theoretical majors, the major of radio and television director pays more attention to practicability and innovative thinking ability. At the same time, the quality and ability of talents require the current society; the ability to create, analyze and solve problems is an indispensable quality element. Improving students’ ability in this respect is also the internal requirement of innovative talent training mode. A large number of practice cases and actual cases of online open class teaching methods can not only make students intuitive understanding of classic works, typical events and the latest industry development trend, but also help students form and maintain habits and sensitivity, pay attention to the forefront of practice in this field, so that students can actively study theory and develop the industry, the comprehensive quality will be greatly improved.

3 A Questionnaire Survey on the Change of Teaching Ability Before and After MOOC Teaching Method Adopted by Radio and TV Editing and Directing Practical Course Teachers in School B 3.1 Experimental Ideas As one of the pilot teaching reform of MOOC teaching method, the practical course of radio and television editing and directing in school B is relatively less. It is mainly based on the transition from network courseware type to network course type, combining network video teaching with offline teaching, and innovating the teaching method of radio and television editing and directing practice course. The MOOC teaching in school B is different from that of large-scale online open courses. The number of students participating in the transition MOOC teaching is not large, which basically belongs to the small and medium-sized level. The purpose of this survey is to investigate the influence of MOOC teaching on cognitive ability, design ability, organizational ability, practical ability and research ability of teachers in a vocational college.

874

Y. Huang

Table 1 Analysis on the change of teaching ability before and after MOOC teaching method adopted by teachers of radio and TV Editing and directing practice course in school B Score

Teaching cognitive ability

Teaching design ability

Teaching organization ability

Teaching practice ability

Teaching research ability

Traditional teaching

71

77

74

79

72

MOOC Teaching

82

85

91

86

84

3.2 Experimental Design In the design, this paper adopts two forms: questionnaire survey and field interview. A total of 56 questionnaires were distributed to the teachers who had carried out MOOC teaching and were learning MOOC teaching in radio and television editing and directing practice course of Higher Vocational College B in Guangdong Province. 56 questionnaires were distributed and 56 were recovered, with the recovery rate of 100%. The development of teachers’ teaching ability after using MOOCS is analyzed from five dimensions. The score system is 100 points, and the results are shown in Table 1. Based on the survey results, before using MOOC teaching method, teachers’ teaching ability indicators are in the general level, but since the adoption of MOOC teaching method, their teaching ability indicators have been greatly improved, and the teaching quality has been significantly improved.

4 Discussion 4.1 Analysis of Problems in Practical Teaching of Radio and Television Editing and Directing Major (1)

The lack of practical talents is not conducive to teaching

Practice teaching is an indispensable part of talent training, but in the talent training of colleges and universities, especially in the professional training of radio and television director, the lack of practical teaching is a very common phenomenon. Although in the talent training plan of radio and television editing and directing major, many colleges and universities have written practical teaching into it, but from the actual situation, the development of practical teaching is not optimistic. (2)

The construction of practice teaching platform system is not perfect

The construction of practical teaching platform needs a system, which is composed of a variety of contents, including the management system, operating system and

Enlightenment of MOOCS Teaching Method in the Practical Course …

875

requirements of the platform. In the current colleges and universities, some schools have established practice teaching platform, but lack of a perfect platform system. (3)

Practice teaching is not paid attention to

In the practical teaching of radio and television editing and directing major, it is an obvious phenomenon that colleges and universities do not attach importance to practical teaching. As can be seen from Fig. 1, among the 30 colleges and universities that have set up the professional course of radio and television editing and directing, less than 70% of the universities have the practical course of radio and television editing and directing, and less than 30% of the colleges and universities have the class hours required by the demand theory. On the basis of the lack of reform ideas in Colleges and universities, it will be difficult to carry out the reform of practical courses by using MOOC teaching method. Therefore, the teaching reform should start from the top to the bottom, and design the corresponding supporting policies. In addition, this paper further investigates the teachers and students who have adopted the MOOC teaching method to carry out the reform of editing and directing practical courses. The results are shown in Fig. 2. As can be seen from Fig. 2, teachers’ adaptability to the teaching method of MOOC is obviously higher than that of students, which is because students think they have high self-control ability, but in fact they lack such ability. But relatively speaking, students are more interested in and love the new MOOC teaching mode than teachers, because the new MOOC teaching method enriches the teaching forms and increases the channels of communication

Fig. 1 Statistical analysis of the current situation of the practical course of editing and directing in China’s colleges and universities

876

Y. Huang

Fig. 2 Statistical analysis of teaching effect after the reform of MOOC teaching method

and cooperation. From the overall effect of the analysis, both teachers and students think that the use of MOOC teaching method to their own editing practice teaching and learning has brought help.

4.2 Choice of MOOC Teaching Method in Radio and TV Editing and Directing Practice Course (1)

Establishing modern teaching concept

First of all, all problems are cognitive problems. Cognitive problems are the precursor of action. MOOCS requires teachers to establish a learner centered teaching philosophy, treat students as partners and discuss problems with themselves. In the teaching design and teaching material supply, the real learning situation is created to show the exploration process of solving problems. MOOC emphasizes the integration of information technology and network teaching resources, and emphasizes online learning and mobile learning. (2)

Training of teachers’ knowledge and ability

Enlightenment of MOOCS Teaching Method in the Practical Course …

877

The reform of teaching methods means that teachers must re-examine and use the teaching methods they are familiar with and used to, which puts forward higher requirements for teachers’ knowledge structure and teaching ability. In MOOC learning, knowledge learning is placed outside the classroom (offline), while the discussion and solution of problems are placed above the classroom (online). Students master their own learning progress, students become pickier. Teachers should not only answer the questions of this course, but also answer the knowledge, trend and application prospect similar or related to this course. This requires teachers not only to master the professional knowledge of the subject, but also to understand the development process and application field of professional knowledge. (3)

Implementation of teaching incentive policy

The traditional teaching method is simple and easy, “teaching according to books” saves time and effort. In order to make the reform of teaching methods more in-depth and sustainable, schools need to provide incentive policy support from teaching workload, teaching reform project and evaluation.

4.3 MOOC Teaching Should Strengthen the Cultivation of Students’ Habit and Ability of Autonomous Learning Students complete their assignments by consulting materials and online discussions. Students can evaluate each other according to certain evaluation criteria. QQ teaching assistant system opened, according to the class of selected students, establish a QQ group. Among all the teachers in the practical course of radio and television editing and directing, 1–2 teachers are appointed as lecturers, who are especially responsible for the network Q & a work; one student. The course score is composed of offline examination (designated time and place) and online examination result. Through QQ group to share the video with students, students can choose the specific viewing time of a week, check the data, and carefully answer the questions raised in the video. If they have any questions, they can communicate with students and teachers directly in QQ group. According to the students watching the relevant videos, communicating online (recording), and answering questions within the specified time, the students’ usual performance is evaluated. In order to better complete self-evaluation and correct the homework of other students in the same class, students must check information and watch videos at the specified time, which helps to cultivate students’ autonomy and improve their autonomous learning ability.

5 Conclusions In the process of studying the Enlightenment of MOOCS teaching method in the practical course of radio and TV Editing and directing, this paper puts forward a

878

Y. Huang

brand-new teaching mode of MOOCS in radio and TV Editing and directing practice course, combining with the core concept of MOOC teaching method. Mainly relying on the Internet and MOOC teaching practice platform, and in the teaching practice, we should pay more attention to the cultivation of students’ autonomous learning ability and the craftsman spirit of hard work. Based on MOOC teaching method, radio and television editing and directing practice course can not only enrich teaching forms, stimulate students’ interest in learning, but also cultivate students’ practical skills and professional quality, and increase their adaptability after graduation. In order to improve students’ radio and television editing and directing ability, but also to cultivate students’ good work quality. The research in this paper has achieved ideal results and made a contribution to the reform of MOOCS teaching in the practical course of radio and television editing and directing in China. Acknowledgements This research is supported by the Social Science Foundation of Education Department of Jilin Province (Grants No. JJKH20190361SK).

References 1. Yang, H.: Research on practical teaching of radio and TV directing based on workshop mode. J. Jilin Prov. Educ. Coll. (1st) 033(011), 75–77 (2017) (in Chinese) 2. Hui, L.: Exploration and practice of professional practice mode of radio and TV directing major. Heilongjiang Sci. 008(015), 144–145 (2017) (in Chinese) 3. Wang, Y., Wang, D., Zhang, X., Pang, W., Miao, C., Tan, A., Zhou, Y.: McDPC: multi-center density peak clustering. Neural Comput. Appl. 32, 13465–13478 (2020) 4. Lili, H., Liming, L., Ying, W.: Analysis and revelation on cultivation model of practical skills for the TV editing and directing major in Heilongjiang Universities. J. Heihe Univ. 008(010), 126–127 (2017) (in Chinese) 5. Parmar, M.D., Wang, D., Zhang, X., Tan, A., Miao, C., Jiang, J., Zhou, Y.: REDPC: a residual error-based density peak clustering algorithm. Neurocomputing 348, 82–96 (2019) 6. Wang, Y., Gao, M.Q., Aai, Y., Wang, H., Exploration for the teaching method “MOOC” in clinical pharmacology. China Contin. Med. Educ. 009(006), 15–16 (2017) 7. Zhu, H.: Study on training methods of extending college students’ teaching skills with MOOC teaching context MOOC. J. Huainan Teach. Coll. 021(003), 137–140 (2019) 8. Yu, Y., Li, F., Zhao, S., Liu, H.: Virtual experiment method for MOOC to solve teaching practice skills and difficult points. Control Intell. Syst. 47(2), 77–82 (2019) 9. Leng, A., Ma, J.: Study of massive practice courses teaching method based on MOOC platform. J. Yanbian Univ. (Nat. Sci. Ed.) 042(003), 271–274 (2016) 10. Peng, Q.: Research on MOOC offline guidance teaching method of computer specialty. Softw. Guide 014(010), 182–184 (2015)

Application of MOOC Teaching Mode in the Practical Course of Editing and Directing Yao Huang

Abstract In recent years, with the rapid popularization of the Internet, the birth of new media such as micro film and we media has a huge demand for film and television editing and directing professionals. However, due to the fact that the teaching concept of the practical course of editing and directing in China’s colleges and universities attaches importance to theory rather than practice, and the mode is backward, the quality of film and television majors is uneven. Therefore, this paper puts forward the application research based on MOOC teaching mode in the practical course of editing and directing. This paper makes a deep research on the teaching concept and methods of the existing practical course of editing and directing, and analyzes the shortcomings of the traditional teaching mode. In view of the existing deficiencies, in order to improve the quality of practical teaching, this paper combines the core concept of MOOC teaching, puts forward the optimization and improvement measures for the traditional teaching mode, and establishes the corresponding MOOC teaching establishment principle, which can effectively guarantee the teaching quality of MOOC. In order to verify the actual effect of the new model, a large number of questionnaires were conducted. Through the analysis of the survey results, we can see that the teaching mode based on MOOC teaching concept can effectively improve the learning effect and stimulate learning interest. Keywords MOOC teaching · Film and television appreciation · Directing teaching · Practical course

Y. Huang (B) College of Humanities and Sciences of Northeast, Normal University, Changchun, Jilin Province, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_108

879

880

Y. Huang

1 Introduction It is of great significance to learn the film and television editing and directing course for improving the ability of film and Television Appreciation and mastering the film and television production technology. How to learn professional theoretical knowledge well should be measured and tested by students’ practical ability and innovation ability [1, 2]. The Ministry of education in printing and distributing the “opinions on strengthening university education” clearly put forward that “focus on improving students’ learning ability, practical ability and innovative quality education". Therefore, in the whole teaching process, we must realize: in the whole teaching process, how to do a good job in the teaching reform of film and television editing course is a crucial task, and also one of the effective ways to improve the quality of education and comprehensively improve students [3–5]. With the gradual penetration of the Internet into all walks of life, the relevant big data shows that Chinese citizens spend an average of one third of their time online every day, while college students spend nearly two-thirds of their time online in a day. MOOC teaching, which takes students as the main body, requires students to study independently after class and study in class with problems. With the help of network teaching platform, it subverts the traditional classroom teaching mode of teachers’ speaking and students’ listening [6, 7]. College students will use their effective time to absorb and learn more scientific knowledge, which will be the main task of students at present. In recent years, MOOC teaching mode has been widely used in practice teaching of various disciplines. However, the traditional practical course of editing and directing in Colleges and universities is in a critical period of teaching reform, and MOOC teaching mode will play an important role in this period [8–10]. Based on the investigation and Research on the actual situation of editing and directing practical courses, this paper points out that most colleges and universities in China have the deficiency of emphasizing theory and neglecting practice, which leads to the students’ low enthusiasm in the learning process and the lack of practical ability. Therefore, this paper establishes the application research based on MOOC teaching mode in the practical course of editing and directing. In the research, according to the teaching characteristics of the practical course, combined with the core concept of MOOC teaching, this paper puts forward the optimization and improvement measures for the existing practical course, which effectively improves the teaching level of the practical course. This paper makes a joint survey of teachers and students in the school. Through the analysis of the survey results, we can know that using MOOC teaching mode to carry out teaching reform on the traditional editing and directing practical courses can effectively improve the teaching quality and improve the teaching competitiveness of the school.

Application of MOOC Teaching Mode in the Practical Course …

881

2 MOOC and Practical Course of Editing and Directing 2.1 Practical Course of Editing and Directing After entering the era of digital media and information network, the film and television media industry has been further developed, and the number, theme and picture quality of film and television works have been significantly improved. With the increase of competition pressure and the flooding of industry homogenization, the road of development becomes more and more difficult. Innovation and talents is the key to improve the current situation. The teaching goal of film and television directors is to cultivate a professional team with multiple functions and perfect combination of art and technology. Many colleges and universities in our country offer this course, but under the influence of the traditional education mode, there are still many deficiencies. We should carry out reform, improve the comprehensive application ability of professional students, and promote a new breakthrough in China’s film and television industry.

2.2 Application of MOOCs in Radio and TV Editing and Directing Teaching The application of MOOC in the teaching practice of radio and TV Editing and directing is the inevitable product of the development of China’s education policy. China’s Ministry of Education recently issued a statement: strengthen the training of teachers’ ability, strengthen the training of teachers’ teaching methods, and constantly improve the level of teachers’ educational technology. The major of radio and television director cultivates certain cultural and scientific knowledge, and aims at cultivating high-quality talents with the main purpose of being good at directing, planning and creating. This kind of major has high requirements for skills, good career development prospects, obvious advantages and strong practicability. The traditional teaching methods still stay on the theoretical basis, attach importance to theory, and have poor practicality. MOOC teaching subverts the traditional teaching mode, takes the network as the platform, attaches importance to the main role of students’ learning, and improves students’ learning initiative. Therefore, under the background of “Internet plus”, it is the inevitable result of our education development to integrate mocking teaching into the teaching practice of radio and TV directors.

882

Y. Huang

Table 1 Survey results of the current situation of the teaching reform of editing and directing practical courses under the background of MOOC Teaching Investigation items

Teacher (%)

Student (%)

They are satisfied with the teaching reform

91

96

Identify with the teaching quality of teaching reform

95

92

Improve learning ability

93

97

Improve learning enthusiasm

92

91

3 A Questionnaire Survey on the Current Situation of the Teaching Reform of Editing and Directing Practical Courses Under the Background of MOOC Teaching In this paper, through the way of questionnaire survey, we have a certain understanding of the current situation of the teaching of editing and directing practical courses in Colleges and universities. By connecting with the relevant contents of MOOC teaching mode, we can guide the teaching design of editing and directing practical courses, which can not only improve the teaching quality of teachers, but also help students master and cultivate professional skills of editing and directing. In the investigation and research, the survey for teachers mainly evaluates the teaching concept, teaching methods and teaching strategies of MOOC, while the survey for students focuses on learning interest, enthusiasm and learning effect. A total of 300 teachers and students were randomly selected from 15 film and television editing and directing majors in 15 colleges and universities. 60 questionnaires were distributed to teachers and 240 questionnaires were distributed to students. A total of 300 questionnaires were collected, and the effective recovery rate was 100%. The survey results are shown in Table 1. Based on the analysis of the survey results of the two groups, it can be seen that the reform of the traditional editing and directing practice course with MOOC teaching method can better stimulate students’ learning enthusiasm, improve the shortcomings of traditional teaching methods, improve the teaching quality and enhance the teaching competitiveness of learning.

4 Discussion 4.1 Investigation and Analysis on the Teaching Reform Effect of Practical Course of Editing and Directing Under Background of MOOC Teaching Although the new information technology and Internet technology make the teaching reform and practice of film and television directors have a positive impact on teaching activities, it must be noted that in practice, the effect of teaching reform is not

Application of MOOC Teaching Mode in the Practical Course …

883

obvious. In classroom teaching, most teachers still use the old teaching methods. Classroom teaching is too abstract, too few science courses, to cultivate students’ learning enthusiasm and initiative, to improve students’ learning efficiency is a major obstacle. It is mainly manifested in attaching importance to theoretical teaching, neglecting educational practice, and students’ enthusiasm in learning is not high. Therefore, on the basis of the above survey, we have increased the investigation on the curriculum structure and students’ learning enthusiasm before and after the reform. According to the statistical results in Fig. 1, among the 300 teachers and students in the 15 universities surveyed, 255 teachers and students think that the theory part is too high and the practice part is too high. This is also one of the main reasons why students lack practical ability after graduation. This paper analyzes that the traditional teaching mode of laying stress on theory and neglecting practice will have a negative impact on the growth of students, but in the case of adopting the new MOOC learning mode, it can not only give consideration to theoretical learning but also strengthen practical learning. By contacting Internet technology in advance, students can master professional technology faster and more efficiently. In order to improve the shortcomings of the traditional practical course of editing and directing, this paper investigates the effect of the reform of the practical course of editing and directing through the teaching method of MOOC. According to the statistical results in Fig. 2, 89% of the teachers and students think that the learning enthusiasm has been improved, 75% of the teachers and students say that the quality

Fig. 1 Statistical analysis of the proportion of theory and practice in traditional editing and directing courses

884

Y. Huang

Fig. 2 Statistical analysis of the teaching effect of practical course based on MOOC

of learning and teaching has been improved, and 71% of the teachers and students think that the learning effect has been significantly improved. This paper analyzes that the MOOC teaching mode is more selective than the traditional mode, so as to improve the overall learning efficiency. It has played a positive role in promoting the teaching reform of course of editing and directing in Colleges and universities.

4.2 Basic Principles of MOOC Platform Construction (1)

The principle of combining traditional teaching with MOOC Teaching

In the traditional teaching process, the inheritance of knowledge is a kind of culture of classroom teaching through the display of personality charm and the interaction between teachers and students in classroom language, emotional expression and so on. All these are for teaching. Therefore, the teaching mode of traditional practice course in Colleges and universities cannot be ignored and abandoned, which is the bottom line of practical teaching in Colleges and universities.

Application of MOOC Teaching Mode in the Practical Course …

(2)

885

The principle of combining initiative with guidance

The initiative in this paper means that colleges and universities should take advantage of the advantages of network education and integrate MOOC into the teaching practice of Ideological and political theory course as a network assisted teaching tool. Under the premise of adhering to the guidance, we should take the students status as the guidance, step by step, and try to achieve targeted guidance. (3)

The combination of scientific principle and adaptability

The scientific principle mainly refers to the construction of guiding practice teaching platform for the class. The formulation of teaching objectives and the setting of teaching content must be scientifically unified planning. The practical teaching requirements of each director are not consistent. Therefore, each director should choose practice that conforms to teaching mode of course in teaching practice course.

4.3 Optimization Strategy of MOOC Teaching and Evaluation System (1)

Remolding educational concept and improving teachers’ comprehensive quality and ability

MOOC has advanced education concept. With the promotion of advanced concept and technology, the development of MOOC makes it easier to share teaching resources. Online learning can transcend the limitation of time and space and change people’s understanding of traditional education and teaching ideas. Based on the teaching concept of MOOCS, the video is used to realize the communication and dialogue between teachers and students in the classroom, self-construction and mutual consultation, so as to realize the transformation from “teaching” to “learning". Teachers become the driving force and guide. (2)

Based on the concept of MOOC, a diversified teaching mode is established

Due to the rapid development of economy and the vocational skills education function of higher vocational education, modern higher vocational education is facing a variety of students with complex background, which leads to different types of students have different requirements for the form of education. With the help of MOOCS, teachers can integrate into teaching, adopt flexible and diverse forms, and promote the development of teaching mode types from simplification to diversification. In order to meet the requirements of different types of students’ diversified teaching forms, we should pay attention to teaching to promote students’ conscious learning and give full play to students’ subjectivity.

886

Y. Huang

(3)

Innovating learning methods and cultivating students’ autonomous learning ability

The biggest change that MOOCS bring is to change the way we learn. With the powerful data acquisition and analysis function of the learning platform, MOOC can discover the new characteristics of individual cognition and learning, and realize the personalized learning of private customization. Through learning analysis, we can understand the characteristics of learners, learning process, learning performance, thinking mode and other information, and realize the whole process control, monitoring and continuous improvement. The innovation of learning mode is to restore the pursuit and interest of learning, restore the leading role of students in learning behavior, and restore the essence of education.

5 Conclusions In the process of studying the application of MOOC teaching mode in the practical course of editing and directing, this paper introduces the core concept of MOOC teaching into the traditional practical teaching mode of editing and directing. After research, this paper believes that in the future development of education, especially in the traditional teaching based on editing and directing practical courses, MOOC teaching mode will play an indispensable and important role. In this paper, a questionnaire survey was conducted among 300 teachers and students of film and television editing and directing major in 15 universities in China, and their views on the practical course of film and television editing and directing based on MOOC teaching mode was obtained. Results according to the actual needs of teachers and students, this paper designed a new teaching optimization measures based on MOOC teaching mode. After the reform, the new model takes into account both theoretical and practical, and is more abundant in form than the traditional teaching method, which effectively improves the teaching quality of the editing and directing practical course, and strengthens the teaching competitiveness of the school. The survey results show that most of the teachers and students have full confidence in the MOOC teaching mode and have a strong interest in it. Combined with a number of survey results, this paper analyzes that the integration of MOOC teaching mode in the traditional practical course of editing and directing is an important measure of teaching reform that is to improve the teaching quality of the practical course of editing and directing, and also comply with the requirements of the times. Acknowledgements This research is supported by the Social Science Foundation of Education Department of Jilin Province (Grants No. JJKH20190361SK).

Application of MOOC Teaching Mode in the Practical Course …

887

References 1. Wang, F., Wang, W., Wang, A., Shang, S., Li, C., Dong, Y.: Roll of film and television materials in the teaching of environmental public selection course in universities. Shandong Chem. Ind. 047(018), 149–150 (2018) (in Chinese) 2. Huang, L., Liu, L., Wang, Y.: Analysis and revelation on cultivation model of practical skills for the TV editing and directing major in Heilongjiang universities. J. Heihe Univ. 008(010), 126–127 (2017) (in Chinese) 3. Wang, Y., Wang, D., Zhang, X., Pang, W., Miao, C., Tan, A., Zhou, Y.: McDPC: multi-center density peak clustering. Neural Comput. Appl. 32, 13465–13478, (2020) 4. Yang, H.: Research on practical teaching of radio and TV directing based on workshop mode. J. Jilin Prov. Educ. Coll. 033(011), 75–77 (2017) (in Chinese) 5. Withers, M.C., Hillman, A.J., Cannella, A.A.: A multidisciplinary review of the director selection literature. J. Manag. 38(1), 243–277 (2015) 6. Zhang, Maoning: The essence, development and application of “MOOC” in teaching. J. Mianyang Normal Univ. 035(004), 72–75 (2016) (in Chinese) 7. Yao, Y.: Application of flipped classroom teaching mode based on MOOC in modern educational technology teaching. J. Comput. Theor. Nanoscience 14(2), 1075–1078 (2017) 8. Tian, X., Pang, W., Wang, Y., Guo, K., Zhou, Y.: LatinPSO: an algorithm for simultaneously inferring structure and parameters of ordinary differential equations models. Biosystems 182, 8–16 (2019) 9. Dehua, W.: The teaching resource development analysis of micro learning resource and MOOC in information teaching. Rev. Fac. Ing. 32(3), 271–278 (2017) 10. Wei, L., Yao, F., Guo, X.: Research on the new paradigm of MOOC teaching under the background of “the internet+education"%. Research on the new paradigm of MOOC teaching under the background of “the internet+education". J. Heilongjiang Inst. Educ. 038(003), 31–33. (2019) (in Chinese)

The Impact of Big Data Technology on International Trade Luanping Zhou and Yaling Fu

Abstract In the twenty-first century, the rapid development of big data technology has become an important factor of production in many industries, including international trade. Under the background of big data technology, international trade is facing severe challenges as well as opportunities. Based on a brief description of the concept of big data technology, this article focuses on exploring the impact of big data technology on trade resource allocation, trade facilitation, international trade methods, and international trade patterns. In terms of how to use big data technology to better serve international trade and how to adapt to the current international trade environment, it is proposed to use big data technology for international trade informatization, realize logistics model innovation, cultivate new financial mechanisms, and strengthen the training of big data technology talents. Strategies to finally realize the sustainable development of international trade. Keywords Big data technology · International trade · Influence · Countermeasures 2019 Fujian Provincial Department of Education’s young and middle-aged project science and technology, project number: JAT190900, project name: empirical analysis of supply chain financial synergy of cross-border e-commerce importing enterprises; project fund: National-level Department of International Economics and Trade, School of Economics and Management, Fuzhou University of Foreign Studies First-class professional scientific research team cultivation project.

L. Zhou (B) · Y. Fu Department of Economic and Trade, Fuzhou University of International Studies and Trade, Fuzhou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_109

889

890

L. Zhou and Y. Fu

1 Overview of International Trade in the Context of Big Data Technology 1.1 The Concept of Big Data Technology The concept of big data technology was originally proposed by Ken McKee, which refers to the ability to quickly extract effective information from massive amounts of data. The technologies involved include data acquisition, data management, data analysis, and data storage. With the advent of the Internet era, network information has increased substantially, and traditional statistical software tools cannot manage, extract, and integrate information within a certain period of time. Using the large number technology, people can study a steady stream of data, conduct data sampling purposefully, grasp its development trend, and accurately grasp the causal relationship between things. With the enhancement of human data production, storage, and application analysis capabilities, big data technology as a production factor has been widely used in various major industries. It has become an important or even decisive production factor in many industries. The application of big data technology in production practice in various fields of society helps enterprises to improve economic benefits, increase national financial revenue and improve international resource allocation [1]. People use and dig in-depth usage data, analyze and process data information in a certain phenomenon, marking the arrival of big data as a new productivity and consumer surplus era.

1.2 Characteristics of International Trade in the Context of Big Data Technology Under the background of big data technology, the use of big data technology in international trade can effectively collect regional economic information, promote the docking of supply information and demand information, and promote the optimal allocation of international trade resources. International trade channels will also be optimized, and international trade presents significant characteristics. 1.

The trend of economic and trade integration and economic and trade liberalization is obvious

With the application of big data technology, the scale of international trade has greatly increased, and each country can use its own advantages to carry out trade. With the increasing scale of international trade, the relationship between countries is becoming closer and closer. The trend of economic and trade integration and liberalization is becoming more and more obvious. The number of international trade transactions and trade types are increasing, and the corresponding data types and data volume are also increasing rapidly [2]. Big data technology provides a good platform for

The Impact of Big Data Technology on International Trade

891

Table 1 Statistics on the scale and growth rate of my country’s cross-border e-commerce export trade from 2016 to 2018 Export trade

2016 2017

2018

Total import and export transactions (trillion yuan)

6.7

8.06 9

Cross-border e-commerce export transaction scale (trillion yuan)

5.5

6.56 8.1

Cross-border e-commerce exports accounted for the proportion of import 82.1 and export trade (%)

81.4

90

Data source According to my country’s 2016–2018 Fujian Provincial Statistical Yearbook

foreign trade enterprises to obtain trade-related data and information. For foreign trade enterprises, big data can be used to track the actual situation of international trade in real time and make accurate judgment, so as to avoid trade risks, reduce trade costs and prompt economic benefits of foreign trade enterprises. 2.

The rapid development of cross-border e-commerce

At this stage, with the rapid development of e-commerce, cross-border e-commerce is also showing a trend of rapid growth. At present, my country’s economy is still in an important period of transition. With the introduction of related policies such as the “One Belt One Road” strategy and the “Internet + Circulation” action plan, cross-border e-commerce has gradually entered a stage of rapid development. As shown in Table 1, the proportion of cross-border e-commerce in export trade also shows a gradually increasing trend. In other words, in the future of my country’s export trade, the position of cross-border e-commerce will gradually rise. In the context of big data, the development of international economy and trade will rely more on the Internet platform to reduce international economic and trade costs and allow e-commerce to develop more rapidly. 3.

The trend of international trade facilitation is strengthening

Traditional international economic and trade procedures are relatively complicated. Big data technology has simplified international trade procedures, integrated the logistics industry, reduced traditional complicated procedures, and accelerated the process of trade facilitation. With the development of big data technology, most foreign trade companies only need to sell semi-finished products to other countries before foreign trade companies engaged in international trade sell their products. After the foreign trade companies export, they can complete the trade by implementing a value-added process [3]. For foreign trade enterprises, enterprises must, to a certain extent, clarify the role of big data technology, and continue to innovate the mode, and build a supply chain platform through big data to improve the logistics industry [4]. 4.

Increased trade frictions between economies

In the process of economic development, it is impossible for mutual benefit to be all. In the process of international economic and trade development, many countries

892

L. Zhou and Y. Fu

have not developed very well in some aspects. In the liberalization and integration of international economy and trade, they are greatly affected by the international market, and the domestic market has been greatly impacted. The increase in conflicts of interest is extremely detrimental to the country’s economic development [5]. And each economy will put its own interests first. Big data technology provides a platform for the analysis of economies, which can help economies effectively screen the information of international trade data, ensure the accuracy of the data, and better provide reference for international trade.

2 The Impact of Big Data Technology on International Trade Nowadays, big data technology has been widely used in people’s daily life and social production, and has had a profound impact. Experts and scholars have also increased their scientific research on modern data and information technology, and people are increasingly using big data technology. The important value of big data has become increasingly prominent. This is mainly reflected in the continuous increase in the scale of big data, the increasing sources of big data, and the diversification of big data types. This article summarizes the impact of big data technology on the field of international economy and trade into the following five aspects: 1.

Promoting the optimal allocation of international trade resources

In the traditional international trade mechanism, market regulation is regarded as the most effective means of resource allocation. The allocation of resources to the link with the highest production efficiency, consumption determines production, is the key point in the process of resource allocation. However, market regulation also has problems such as low efficiency and uneven capacity allocation. Production departments close to the consumer market will gain more competitive advantages and increase investment returns. In the traditional production model, since market information plays a non-negligible role in guiding the allocation of resources, the investment department will use human resources to analyze the investment environment and formulate a more scientific plan. The emergence of big data technology has changed the traditional information statistics model. Decision-making departments can use information technology to collect effective information and use data models to evaluate investment efficiency, which greatly improves the optimal allocation of production factors, and the effectiveness of macro decision-making will continue to improve. On this basis, the future industrial docking in international trade will rely more on macro policy adjustments, and resource depletion during the industrial docking process will be controlled. 2.

The level of trade informatization and facilitation is further improved

At this stage, my country’s international trade still has complicated procedures for customs declaration, inspection, and foreign exchange settlement. The management

The Impact of Big Data Technology on International Trade

893

standards of foreign trade in various localities and departments are not unified. The information windows of enterprises and government management departments have not been fully connected, and online transactions are more difficult to operate.The use of big data to carry out international trade is conducive to simplifying the trade process. The development of big data will help government departments to establish coverage for customs, inspection and quarantine, foreign exchange settlement, and export tax rebates as soon as possible. The platform provides conditions for multiple transaction links, so as to realize platform docking between government and enterprises, and synchronizes online and offline operations, until the entire process of electronic operation is realized, and trade facilitation is further improved. 3.

Innovating trade models and diversifying trade methods

In the past, international trade was mainly service trade and commodity goods trade. Although people would pay attention to the exchange of information between trade entities, they never realized that information exchange is as important as goods and services. They just compare it to service goods in general. Exploring the integration of trade commodities. In the era of big data, this reality has changed. Under big data, the international trade industry has realized the importance of information exchange for the development of enterprises, which has resulted in information trade, market positioning, consumer behavior, and so on. It can help trade entities to innovate international trade methods, form new business models, and promote the transition from cross-border B2B and cross-border B2C models to cross-border C2B and crossborder O2O models, truly realize on-demand production, and promote international trade centers to be producers Transform to consumers and seek more benefits for consumers. At present, most companies in our country have invested in analyzing and collecting data, making big data develop toward the trend of industrialization, and presenting new challenges to the content of international trade. 4.

Change the pattern of international trade

After years of development, the division of labor in international trade has begun to take shape. Western developed countries have become the dominant players in international trade by virtue of their advanced technology. Among them, the United States has undertaken the division of labor in important links such as research and development, brand design, and financial services, and has become the largest consumer market. East Asia and Western Europe have undertaken most of the production tasks and occupy an important position in the international consumer market [6]. Other regions are mainly responsible for energy exports and agricultural production, and the consumption potential remains to be tapped. Big data has changed the traditional way of trade, broke the absolute dominance of western developed countries in international trade, and provided new opportunities for developing countries to participate in the world economy and trade. Big data is a key factor for developing countries to enhance their comprehensive competitiveness and increase their international influence. It changes the pattern of international trade. In the context of big data, developing countries can use big data to collect various international trade

894

L. Zhou and Y. Fu

information that is beneficial to economic development., Through acquired cultivation to strengthen the ability to identify information and use information, clarify its own position in the world, and use big data to make scientific predictions on economic markets, optimize the allocation of national resources, and avoid imbalances in supply and demand. Reform of the economic and trade pattern and the diversified development of the world economy. 5.

Increase the risk of international economic and trade

In a sense, the impact of big data technology on the international economy and trade is a double-edged sword. Big data technology brings unlimited opportunities for the trade development of each country, but also has certain risks and challenges. National trade management under the background of big data technology needs to use more advanced data extraction and information processing technologies to realize the rapid sorting and analysis of data information. As a tool for rapid information transmission, big data has the characteristics of high-speed flow. In a sense, it increases the risk of malicious theft or disorderly dissemination of trade information, resulting in unpredictable losses. Some international trade information can also endanger the economic interests and personal safety of the national government and the public. Once the information is leaked or lost, it will inevitably cause very serious social impacts. Therefore, it is necessary to strengthen trade security awareness and take precautions against trade security.

3 International Trade Countermeasures Under the Background of Big Data Technology In the context of global economic integration, if foreign trade companies in various countries want to become bigger and stronger, they need to continuously accept changes in the international situation and continuously improve their core competitiveness. 1.

Use big data for international trade informatization

After entering the era of big data, due to the openness and transparency of information and data, foreign trade companies have gained convenient access to trade data. In particular, a large amount of real-time big data makes it easier for trading parties to understand the real-time dynamics of transactions and make accurate judgments, thereby reducing unnecessary trade costs, reducing misunderstandings between the parties, and promoting the smooth progress of international trade. At the same time, in addition to official data, third-party data service platforms are also emerging. These data platforms provide big data services through massive amounts of data generated in trade. For example, the service platform helps buyers and sellers accumulate credit by integrating international trade data service providers, buyers and transaction records generated by the platform. Data institutions have greatly promoted

The Impact of Big Data Technology on International Trade

895

the informatization process of international trade by accumulating large amounts of transaction data. 2.

Use big data technology to achieve innovation in logistics models

With the advent of e-commerce era, logistics has become the mainstream trend of international trade. We should be good at using big data technology to innovate logistics mode to realize the development of international trade. Since international trade is mostly transnational and trans-regional trade, logistics cost has become one of the main restrictive factors for enterprises to carry out international trade. Therefore, big data can be used to optimize the logistics distribution model and realize the optimization and integration of logistics resources. In particular, data information can be used to build overseas logistics warehousing bases, and the base model can be used to reduce logistics and distribution costs, improve logistics and distribution levels, and realize corporate international trade. Effective improvement of benefits. 3.

Use big data technology to cultivate new international trade finance mechanisms

In the process of international trade, financing is an essential part of the smooth development of trade. In the traditional model, due to information asymmetry and information obstruction, it is difficult for financial institutions to obtain the credit of foreign trade enterprises, and foreign trade enterprises cannot obtain sufficient financial support, which restricts the sustainable development of international trade to a certain extent. In the context of big data, big data can be used to build a new financial mechanism to realize the connection between international trade data and financial institutions, so that financial institutions can better grasp the credit status of customers, and provide sufficient capital protection for foreign trade companies. This approach can achieve mutual benefit and win–win results between financial institutions and international trade entities [7]. 4.

Train data analysis talents

In order to achieve high-quality development of international trade, major enterprises need to pay attention to employing professional data analysis talents to provide reliable productivity for data collection and collation [8]. If limited by objective conditions, it is impossible to hire a sufficient number of professionals, the management of the company will need to conduct personnel selection, training, and further education within the company based on market demand, and integrate employees with certain qualifications. Concentrate training on their professional knowledge and professionalism, or invite senior engineers in related fields to guide employees. Provide employees with a good working environment, improve employee benefits, so as to retain talents for a long time, and provide important talent guarantee for the sustainable development of the company. 5.

Further improve the legal system of trade

The use of foreign trade big data must ensure the security of information, credit and intellectual property rights. At present, the legal system in the field of data

896

L. Zhou and Y. Fu

information in our country is not sound, and issues such as corporate and personal information security, data authority, and technical standardization need to be strengthened and regulated urgently. Regulatory authorities should incorporate big data into the basic legal framework of e-commerce, strengthen supervision of data collection and use, and protect the rights and privacy of all relevant parties [9]. It is necessary to strengthen regulation and standardization, actively cultivate big data service demonstration entities, promote the establishment of big data publishing, sharing, transmission, software and hardware platforms, and establish a credit investigation system for foreign trade enterprises with reference to Credit China [10].

4 Conclusion In the era of big data, international trade faces various challenges while meeting opportunities. Big data technology has profoundly changed the development model of international trade, improved the optimal allocation of resources, changed the pattern of international trade, and promoted the process of trade facilitation. This article analyzes the impact of big data technology on international trade enterprises, how to better adapt to the international trade environment in this data age, broaden the existing international trade, and put forward countermeasures in the aspects of international trade informatization, logistics mode, financial mechanism innovation, talent Cultivation and other aspects.

References 1. Ma, Y.: Data flow creates new opportunities for Asian economic growth and international trade. Chin. J. Soc. Sci. (005) (2018) 2. Wang, Y.: Trade statistics under big data conditions. Dig. Ed. Econ. Manage. (7), 265 (2015) 3. Hu, Y.: Analysis of the development of international trade theory in the era of big data. China Int. Financ. Econ. (Chinese and English) 20, 12 (2017) 4. Wu, S.: Analysis of the new development of international trade theory in the era of big data. Market Res. (10), 7–8 (2015) 5. Chen, N.: Analysis of the impact of big data on international economy and trade. Econ. Trade Pract. (21), 59–60 (2018) 6. Yan, S.: The next generation of trade-the development trend of international trade. Macroecon. Manage. (5), 64–67 (2018) 7. Ma, D., Luo, Y.: Research on the impact of inclusive finance development on international trade—based on data from 36 countries. Financ. Rev. (02), 99–109 (2020) 8. Zhang, L., Liu, T.: The impact of big data on the development of my country’s international trade enterprises. J. Xiangyang Vocat. Tech. Coll. 16(6), 85–88 (2017) 9. Xiong, Y.: On the improvement of international regulation of data cross-border flow under digital trade and its enlightenment to my country. Zhongnan Univ. Econ. Law (4), 56–62 (2020) 10. Liu, X.: The legalization of data sharing promotes the elimination of new barriers to international trade. China Foreign Trade (7), 46–48 (2018)

Challenges and Countermeasures of International Trade Under the Background of Big Data Ping Ju

Abstract With the advent of the era of big data and the rapid development of Internet technology, the development of international trade is being influenced more and more profoundly. International trade under the application of the big data technology has a profound changes, while can help foreign trade enterprise for more trade opportunities, precise marketing, improve the efficiency of transactions, but also is a double-edged sword, foreign trade enterprises to grasp big data technology, lack of technical talents, imperfect logistics big data platform, such as a challenge to the foreign trade also bring new difficulty. International trade enterprises need to improve data application ability, improve logistics information platform, strengthen big data innovation and other aspects to strengthen to meet the challenges. Based on the background of big data technical analysis, this paper focuses on exploring the challenges faced by international trade in the era of big data, and works out corresponding countermeasures. Keywords Big data · International trade · Challenges

1 Introduction The world has been closely connected by the Internet thanks to science and technology, and the digital development of trade globalization is unstoppable. The World Trade Report 2018 released by the WTO points out that digital technology is not only beneficial to trade in goods, but also facilitates trade in services and gives rise to new forms of services. The widespread use of digital technology has changed the composition of trade in services and goods, with trade in information technology products tripling over the past two decades to $1.6 trillion in 2016. According to the Guidance of the CPC Central Committee and the State Council on Promoting Highquality Trade Development, we will promote the organic integration of the Internet, the Internet of Things, big data, artificial intelligence, and blockchain with trade, and P. Ju (B) Fuzhou University of International Studies and Trade, Fuzhou 350202, Fujian, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_110

897

898

P. Ju

accelerate the cultivation of new drivers of growth. With the wide application of big data technology, the digital economy has become a new competitive highland for all countries in the world, and digital trade has opened up new driving forces and new space for the development of global trade. This paper will discuss the opportunities and challenges brought by big data technology to international trade, change the cross-border transaction mode, impact people’s perception of traditional trade, and look forward to the coming of digital trade era in the future.

2 Reform Measures 1.

Big data

Big data (big data), first used in the IT industry, is refers to in a certain time range with conventional software tools to capture, manage, and process of data collection, the need to deal with the new model can have better decision-making, insight found mass force and the process optimization ability, high rate of growth and diversification of information assets. In this paper, big data refers to that in the Internet era, foreign trade data is large in scale and quantity, which cannot be processed by traditional processing methods. Big data and cloud platform technologies are needed to improve the processing efficiency of foreign trade data, and valuable transaction information for foreign trade enterprises can be obtained from a large amount of data [1]. 2.

Digital trade

Digital trade not only includes trade in physical goods facilitated by online publicity, transaction and settlement based on INFORMATION and communication technology, but also includes trade in digital services transmitted through information and communication networks (voice and data networks, etc.), such as trade in data, digital products and digital services. Letter according to the Ministry of Commerce, network office, the ministry of organization declared national digital services export base in the notice on the definition and classification of digital trade in services, combined with the actual situation in our country, think digital trade part of tzu chi trade in services including software, communications, cloud computing and other information technology services trade, trade in services, digital content through the Internet delivery of the offshore service outsourcing business; The other part refers to the trade of goods and the trade of services related to e-commerce. 3.

Characteristics of international trade in the context of big dataBig data today, for the development of international trade presents new characteristics, combined with big data effectively, embodied in these aspects: first, cross-border electricity become a new mode of the development of international trade, compared with the traditional trade, cross-border electricity make full use of Internet technology, use of data analysis, expand the trade opportunity and profit [2]; Second, the role of information technology in international trade development process

Challenges and Countermeasures of International Trade …

899

more and more important, traditional trade the relative value of goods, logistics services, and factors of production, is in a subordinate position in the data analysis, but the big data to build the chain of international trade, information technology and the factors of goods, services, equally important, even if foreign trade enterprises to grasp the full foreign trade data, analysis to use, can accurately predict the market rules and trade, and to ensure the progress of the international trade. At present, large enterprises and small and medium-sized foreign trade enterprises have started to use big data technology to analyze and sort out massive foreign trade data. Under the background of big data, international trade has become an inevitable trend of market economy [3]; Third, big data constantly accelerate the process of trade facilitation, in the Internet age using big data in the data analysis, the construction of cross-border trade big data platform, to address the trade port customs clearance facilitation and international security issues, international trade of the single window is to optimize the foreign trade business environment, improve the trade efficiency under the background of big data trade initiatives; Fourth, in the context of big data, the risk of international trade intensifies. Through big data analysis, when accurately predicting trade opportunities and consumer demands, there is also the potential risk of information leakage. The security of data is finally everything.

3 Experiments This paper mainly uses literature analysis, field visit, induction and questionnaire survey. 1.

Literature analysis

In this article, through reading a large number of domestic and foreign about the big data under the background of the challenge facing the international trade and countermeasures about literature, followed by research at the forefront of international trade, combing the domestic and foreign big similarities and differences between data on international trade influence, thus further understanding about international trade application big data, for the purpose of the thesis research laid a solid foundation. 2.

Visit survey method

Through a large number of field investigations and visits to government departments, industry associations and relevant enterprises, the difficulties and pain points existing in the application of big data in foreign trade enterprises are understood, and targeted countermeasures and Suggestions are proposed. 3.

Induction

The summary induction method of this paper is the effective reform measures established in the actual operation process of talent training. The reform measures are

900

P. Ju

fully studied, the logical thinking is clear, and the conclusion is based on the results and the methods can be popularized. 4.

Questionnaire survey method

This paper takes Fuzhou Chamber of Commerce for Importers and Exporters and Fuzhou Cross-border E-commerce Association as research objects to carry out questionnaire survey. A total of 200 questionnaires were issued and 191 were recovered, with a recovery rate of 95.5%. 189 questionnaires were valid and the questionnaire efficiency was 98.95%. Relevant analysis and research were conducted after the classification and sorting of the questionnaires.

4 Discussion According to withdraw, summarized the questionnaire, sorting out the data under the background of international trade risks and difficulties, of which 32% foreign trade enterprise big data technology using ability is insufficient, 28% enterprises think that big data era of foreign trade logistics supply chain system reconstruction, and 19% think that big data era international trade order and rules are established. 35% of the enterprises believe that the cross-border e-commerce level of foreign trade enterprises is uneven and lack of big data talents (Table 1).

4.1 Challenges Faced by International Trade in the Context of Big Data 1.

The application ability of big data technology is insufficient, and the demand forecasting ability needs to be improved

Coming of the era of big data, make a lot of foreign trade enterprises by surprise, especially foreign trade enterprise in the traditional big data infrastructure facilities is weak, lack of experience in data analysis, for the use of big data to predict demand, Table 1 Risks and difficulties faced by international trade in the context of big data The challenges and difficulties

Proportion (%)

Insufficient application ability of big data technology

32

Foreign trade logistics supply chain system is facing reconstruction

28

The integration of foreign trade and finance is insufficient under the background of big data

19

Cross-border e-commerce level of foreign trade enterprises is uneven, lack of big data talent

35

Challenges and Countermeasures of International Trade …

901

trade opportunities and precise marketing also has significant limitations, common areas of traditional trade in goods, has been paid attention to the analysis of trade data, but how to build the efficient data to predict assessment system or many foreign trade enterprises face a problem [2]. 2.

Logistics supply chain system is facing reconstruction in the era of big data

Closely related to international trade and logistics supply chain system, traditional trade is done rely on freight transport links, lack of end-to-end communication mechanism and cooperation platform, and restricted the sustainable development of international trade, trade logistics, security, accuracy, timeliness is restricted, the supply chain is to give the responsible for the logistics system. Big data technology has changed this unfavorable situation, the logistics supply chain system of international trade is facing reconstruction, but also for the development of the logistics supply chain system has brought great changes [1]. 3.

In the era of big data, foreign trade enterprises are facing the re-establishment of international trade order and rules

Big data era, the progress of science and technology, more and more developing countries realize the importance of application of international trade development data, also gradually begun to data information research and development, the demand forecast in the international trade market information, positioning for trade, realize the resource configuration optimization, to establish a more fair trade order. In addition, big data also plays an increasingly important role in the re-establishment of international trade rules, with the purpose of bringing more efficient delivery of solutions and more accurate docking of customer needs for global international trade, which brings great challenges to the traditional international trade rules [4]. 4.

Under the background of big data, cross-border e-commerce of foreign trade enterprises is uneven and lack of talents

Digital trade is the product of international trade adapted to the application of big data. As a new mode of international trade, cross-border e-commerce is developing rapidly. All industries are vigorously promoting the development of cross-border e-commerce, building a data platform, providing a trading platform for double trade, and creating value by using the collected data and information. However, the crossborder e-commerce development level of foreign trade enterprises is uneven, and there is a lack of cross-border e-commerce professionals. There are still many difficulties in online trading, data analysis, data application and transaction prediction [5].

902

P. Ju

4.2 Countermeasures of International Trade Under the Background of Big Data 1.

Make use of big data to develop international trade informatization

Coming of the era of big data, will certainly to move towards the information-based road, international trade is also a new feature of the current international trade, more and more foreign trade companies to use big data technology for massive trade transaction data and information, this is a traditional trade is difficult to imagine, vast amounts of data analysis for the foreign trade enterprises can more accurate prediction of the demand of consumer, looking for more trade opportunities, through real-time monitoring also grew to trust each other [6]. Cross-border e-commerce, as a new situation of international trade, USES online platforms to complete cross-border trade, which improves transaction efficiency and promotes trade facilitation. The application of a single window of international trade is a vivid case of international trade informatization, which explains the great promotion effect of informatization on international trade [7]. 2.

Using big data to establish a new international trade logistics supply chain ecosystem

Logistics supply chain is an important part of traditional international trade, and logistics cost accounts for 15–20%. Through big data, a supply chain platform is built to integrate the information between shippers and freight forwarders, domestic ports and international ports, and the integration of logistics data resources forms a new trade logistics supply chain ecosystem, which not only saves transportation costs, but also lays a foundation for improving trade efficiency [4]. The current logistics supply chain ecosystem can directly form an utilization community through big data, conduct online matching, greatly reduce product costs, and integrate express delivery and insurance services into the trading platform to provide value-added services for platform users [8]. 3.

Give play to the leading advantages of the government and cultivate data analysis talents

Big data has penetrated into all aspects of international trade. Whoever owns a large amount of data in the future may become the leader of the global innovation value chain. China attaches great importance to the development of big data, which has been promoted as a national strategy. In 2017, Xi Jinping always stressed the need to build a strong network, digital China and a smart society at the 19th National Congress. China already has the technical foundation and unique advantages for the development of big data. At the same time, government departments attach great importance to the data information supervision system to avoid data information being stolen and abused. Once illegal behaviors are found, they must be severely punished and stopped. With the development of big data, the training of data talents is particularly important. Universities and enterprises should keep up with the pace

Challenges and Countermeasures of International Trade …

903

of The Times, strengthen the training and training of professional knowledge and professional quality of data talents, and provide talents to meet the needs of big data in various industries [3].

5 Conclusions Big data era has come, the international trade information already is inevitable trend, how to meet the challenges posed by big data, foreign trade enterprises to use big data to better serve the international trade, through data analysis and application to optimize trade business environment, improve the level of trade facilitation is facing the enterprise era proposition, foreign trade enterprises need to keep up with the pace of The Times, to expand international trade innovation, using trade data accurate forecasts demand, optimizing the allocation of resources, realize the benign development of ecological system of international trade [8, 9]. Acknowledgements National first-class professional research team cultivation project of Department of International Economy and Trade, School of Economics and Management, Fuzhou University of Foreign Studies; This work was supported by: Educational and teaching reform research project of Fuzhou University of International Studies and Trade: reform and practice research on training international trade application-oriented talents oriented by innovation and entrepreneurship education (No. JF2019013); International settlement of innovation and entrepreneurship education reform project of Fujian province (quality resource sharing course) (No. JFS2017005); International business negotiation, Fujian provincial top quality online and offline blended course, Min Jiao Gao [2019] No. 20.

References 1. Zhang, L., Liu, T.: The influence of big data on the development of China’s international trade enterprises. J. Xiangyang Vocat. Tech. Coll. (6), 85–88 (2017) 2. Lei, F.: Analysis on challenges faced by international trade in the context of big data and discussion on countermeasures. Econ. Outlook Around Bohai Sea (5), 38–39 (2020) 3. Liu, X.: Challenges faced by international trade in the era of big data and countermeasures. Marketing (7), 1–4 (2019) 4. Cheng, F.: Challenges faced by international economy and trade in the context of big data and countermeasures. Mod. Econ. Inf. (3), 58–60 (2020) 5. Sun, B.: Challenges faced by international trade in the context of big data and countermeasures. Int. Commer. Trade (1), 73–74 (2020) 6. An, P.: Challenges faced by international trade in the context of big data and countermeasures. Shanxi Agric. Econ. (7), 26–27 (2019) 7. Guan, J.: Challenges faced by trade under the background of big data and countermeasures. Chin. Foreign Entrepreneurs (1), 66–67 (2020)

904

P. Ju

8. Lai, P.: Challenges and countermeasures of international trade in the era of big data. Econ. Trade Forum (2), 145–148 (2020) 9. Li, J., Wang, T., Chen, Z., Luo, G.: Machine learning algorithm generated sales prediction for inventory optimization in cross-border E-commerce. Int. J. Front. Eng. Technol. 1(1), 62–74 (2019)

The Application of Big Data Analysis Technology in the Value Evaluation of Cultural Enterprises—Taking the Value Evaluation of Wanda Film Co., Ltd. as an Example Haijun Kang Abstract Because of the particularity of economic profitability of cultural enterprises, the value evaluation of cultural enterprises has always been a controversial hot issue. With the rapid development of modern technology, big data has built a better platform for asset evaluation, and also opened a brand new door for cultural enterprise value evaluation. This article takes Wanda Film Co., Ltd. as the research object, uses big data analysis technology, and predicts Wanda’s future corporate free cash flow based on historical financial information, and uses Wanda’s database to calculate the weighted average cost of capital. Then the enterprise free cash flow discount model is used to analyze the enterprise value of Wanda Film Co., Ltd. The research results are conducive to providing reference for cultural enterprise value evaluation, promoting the development of theoretical research in this field, and also providing certain reference value for the asset evaluation industry to develop new businesses. Keywords Big data analysis technology · Cultural enterprise · Value evaluation

1 Introduction As a new industry, most of the assets of cultural enterprises are intangible assets, including copyrights, trademark rights, patent rights, etc. The diversity, exclusivity, public welfare and technological substitution of the right portfolio bring difficulties to the value evaluation of cultural enterprises. The traditional asset evaluation methods cannot reasonably and comprehensively quantify the intrinsic value of cultural enterprises [1]. For nearly half a century, a large amount of information has begun to appear, and social development has entered the era of big data. As a new modern information technology, big data can effectively collect and analyze massive amounts of data. The application of big data in enterprise value assessment will be a thrust that cannot be ignored [2]. Enterprise value evaluation needs to review and investigate H. Kang (B) School of Economics and Management, Fuzhou University of International Studies and Trade, Fuzhou 350202, Fujian, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_111

905

906

H. Kang

the assets and liabilities on and off the company’s balance sheet. The traditional evaluation process is cumbersome and complex, and requires a lot of time and cost. The advantages of using big data analysis technology can greatly improve the efficiency of data collection and sorting, and introduce many The new big data mathematical statistical model replaces manual analysis, enabling evaluators to conduct evaluations scientifically, quickly and accurately, simplifying evaluation procedures, and ensuring the scientific nature of the evaluation data [3]. Scholars at home and abroad have different opinions and discoveries on the integration and application of big data and enterprise value assessment. Scott Sochay (1994) used the independent variable of market concentration to construct a box office research model, and deeply analyzed the competitive intensity of movie box office influencing factors in different movie screening periods [4]. Blosch et al. (2000) believe that big data can record consumer behavior at all times, thereby forming a large amount of user information and behavior data, which is an important point that should continue to be paid attention to when evaluating enterprise value [5]. Chen Y. B. et al. (2012) believe that the development of the Internet era has led to the establishment of databases, and the use of databases has made enterprise value assessment more scientific [6]. Wang Sheng (2018) focused on the actual situation of Chinese enterprises and big data applications, constructed a value evaluation model based on the income method and an evaluation model based on the B-S option pricing method to study the impact of big data on enterprises [7]. Xu Mengmeng (2017) uses big data technology to analyze relevant data that affect box office factors, and provide a basis for the evaluation of the copyright value of movies [8]. Dai Yun (2016) predicted the importance of Internet big data for intangible asset evaluation, and pointed out that big data makes the evaluation results more efficient and accurate [9]. Wanda Film Co., Ltd., established in 2005, is a listed film and television company under the Wanda Group. As an emerging cultural enterprise, Wanda’s investment lies more in intangible assets such as screening technology, the number of scripts, copyrights, etc. As the core assets of cultural enterprises, most of them will play a role and generate value in the future. There are certain limitations using traditional evaluation methods to evaluate cultural enterprises’ value. Therefore, this article uses big data analysis technology to evaluate the value of Wanda on the basis of the free cash flow discount model of enterprises and Wind database, and explores the practice of big data analysis technology in cultural enterprise value evaluation.

2 Method 2.1 The Discount Model of Enterprise Free Cash Flow Calculate and analyze the value of cultural enterprises using a discounted enterprise free cash flow model:

The Application of Big Data Analysis Technology in the Value …

P=

n  i=1

907

Ri Rn + i (1 + r ) r (1 + r )n

(1)

In the formula, Ri —the expected return of the evaluation object in the future i year; Rn —the expected return of the evaluation object during the perpetual period.

2.2 Determination of Forecast Period and Profit Period Based on the analysis of the company’s industry development prospects and the company’s own operating conditions, Wanda Film Co., Ltd.’s evaluation base date is set to December 31, 2017. After the evaluation base date, it will continue to operate and the corresponding profit period will be indefinite. The profit forecast adopts a two-stage model. The first stage is divided into a clear forecast period from 2018 to 2022, and the business situation of the company will stabilize; the second stage is a perpetual period in 2023 and subsequent years.

2.3 Forecast of Free Cash Flow of Enterprises (1)

(2)

(3)

Forecast of operating income In Table 1, the operating income of Wanda has steadily increased in the past five years, with growth rates of 32.51%, 49.86%, 40.01%, and 18.02% respectively. This article uses the historical five-year operating income growth rate average of 35.1%. The perpetual operating income will remain at the income level of the next five years. Operating cost forecast It can be seen from Table 2 that the operating cost/operating income ratio of Wanda Films has remained at 82–88% in the past five years. This paper uses the average value to predict the operating cost of the next five years. Tax and additional forecast The business tax and surcharges of Wanda from 2013 to 2017 were 257 million yuan, 257 million yuan, 348 million yuan, 389 million yuan, and 443 million yuan respectively, showing an upward trend year by year. Its average growth

Table 1 Wanda film’s historical operating income over the years Years

2013

2014

2015

2016

2017

Operating income (100 million yuan)

40.23

53.39

80.01

112.09

132.29

Data sources China Business Industry Research Institute

908

H. Kang

Table 2 Wanda films’ historical operating costs over the years Years

2013

2014

2015

2016

2017

Operating costs (100 million yuan)

33.40

44.02

65.58

96.92

116.92

Operating costs/operating income

83.02%

82.50%

81.96%

86.47%

88.39%

Data sources China Business Industry Research Institute

(4)

(5)

(6)

(7)

(8)

rate is 15.26%, which predicts taxes and surcharges in the next five years, and the predicted perpetual period is the same as that of the next five years. Management cost forecast According to the financial data of the company, the proportion of management expenses to operating income in the past five years is 6.39, 6.33, 6.56, 7.93, and 8.01%. The average value of 7.04% is used to predict the management cost of the next five years in 2018–2022. Forecast of financial expenses According to the financial data of the company, the financial expenses in the past five years were −0.051 billion, −144.8 million, 59 million, 191 million, and 229 million, accounting for −0.13%, −0.28%, 0.74%, 1.7% and 1.73% of operating income respectively. In 2013 and 2014, the interest income from bank deposits of Wanda Films was higher than the related expenses, indicating that the financial risk of the company is small. Financial expenses have increased steadily from 2015 to 2017. This paper excludes the data for 2013 and 2014, and forecasts the administrative expenses for the next five years with an average of 1.39% from 2015 to 2017. Forecast of non-operating income and expenditure According to the analysis of corporate financial data, the company’s management predicts that there will be basically no large amount of non-operating income and expenditure under normal operating conditions in the future, so this article does not consider the company’s non-operating income and expenditure for the time being. Income tax expense forecast According to the information provided by the assessed party, the income tax rate implemented by the assessed enterprise is levied at a fixed rate, and the income tax rate is 2%. This article predicts the corporate income tax expenses for 2018–2022 and the next five years based on the revenue recognized by the company. Forecast of depreciation, amortization expenses and interest payment According to the financial data of the company over the years, the depreciation and amortization expenses of the company in the past five years are 207 million, 361 million, 488 million, 739 million, and 960 million. It can be concluded that the average growth rate is 45.72%. It is used to predicted the amount of depreciation and amortization in the next five years. (9)

Forecast of additional amount of working capital

The Application of Big Data Analysis Technology in the Value …

909

Table 3 Wanda Films’ working capital over the years Years

2013

2014

2015

2016

2017

Working capital (100 million yuan)

0.0700

0.1000

0.1173

0.2717

0.9000

Data sources China Business Industry Research Institute

Amount of working capital = sales revenue of the previous year × (1 − sales profit rate of the previous year) × (1 + estimated annual growth rate of sales revenue)/number of turnover of working capital Number of working capital turnover = 360/(Inventory turnover days + accounts receivable turnover days-accounts payable turnover days + prepaid accounts turnover days-advance accounts turnover days) After analysis and calculation, the operating capital of the 2013–2017 period is shown in Table 3. Due to the continuous self-built and acquisition of Wanda Cinemas in 2016, Wanda added 115 new cinemas in 2017, and there was no balance of accounts payable that year. As a result, Wanda Cinemas operating capital increased by 136.63% in 2016 and increased by 231.24% in 2017. Excluding accidental factors in 2016 and 2017, considering the future business plan of Wanda Films, working capital will only increase slightly in the next few years. This article predicts the increase in working capital in the next five years based on its 2015 working capital growth rate of 17.3%. During the perpetual period, the business scale of the enterprise tends to be stable, and the working capital is sufficient to support the normal operation of the enterprise, so the annual change in working capital during the perpetual period is zero. (10)

Capital expenditure forecast Capital expenditure includes asset renewal expenditure and additional capital expenditure. According to the historical data of Wanda Film, the capital expenditure of the company in the five years from 2013 to 2017 was 537 million, 672 million, 1.089 billion, 1.496 billion, and 1.747 billion, respectively, accounting for 13.33%, 12.59%, 13.72%, 13.35%, 13.21% of the operating income of the year. The average value of 13.24% is used to predict the capital expenditures in the next five years and perpetual period.

2.4 Determination of Discount Rate The caliber of the assessment income studied in this paper is the net cash flow of the enterprise, and the weighted average cost of capital (WACC) is selected as the discount rate according to the principle that the amount of income is consistent with the discount rate. The calculation formula is:

910

H. Kang

W ACC = Re ×

D E + Rd × × (1 − T ) D+E D+E

(2)

Among them, Re is the cost of equity capital, Rd is the cost of debt capital, E/(D + E) is the ratio of the market value of equity capital to the total asset market value, and D/(D + E) is the market value of debt in the total asset market The ratio of value.

3 Results 3.1 Results of the Prediction of Free Cash Flow of the Enterprise See Table 4. Table 4 The free cash flow forecast of Wanda Years

2018

2019

2022

2021

2022

Perpetual period

1. Main business income

178.72

241.46

326.21

440.71

595.39

595.39

(1) Main business cost

150.97

203.96

275.55

372.26

502.93

502.93

5.11

5.89

6.78

7.82

9.01

9.01

2. Main business profit

22.65

31.61

43.88

60.62

83.45

83.45

(1) Management costs

12.58

17.00

22.96

31.03

41.92

41.92

(2) Financial expenses

2.48

3.36

4.53

6.13

8.28

8.28

3. Operating profit

7.58

11.26

16.38

23.47

33.26

33.26

4. Total profit

7.58

11.26

16.38

23.47

33.26

33.26

Deduct: income tax expense

3.57

4.83

6.52

8.81

11.91

11.91 21.35

(2) Business tax and surcharges

5. Net profit

4.01

6.43

9.85

14.66

21.35

Plus: interest expense

2.68

3.62

4.89

6.61

8.93

8.93

Plus: depreciation and amortization

13.99

20.38

29.70

43.29

63.08

63.08

Deduct: capital expenditure

19.78

22.40

25.37

28.73

32.53

32.53

Additional working capital

0.16

0.19

0.22

0.26

0.30

0.30

6. Free cash flow of enterprises

0.74

7.85

18.86

35.57

60.53

60.53

Unit 100 million yuan

The Application of Big Data Analysis Technology in the Value …

911

Table 5 Calculation table of the corporate value for Wanda Years

2018

2019

2020

2021

2022

Perpetual period

Enterprise free cash flow (100 million yuan)

0.74

7.85

18.86

35.57

60.53

60.53

Discount rate

0.0253

Discount factor

0.98

0.95

0.93

0.90

0.88

34.88

Present value (100 million yuan)

0.72

7.46

17.50

32.19

53.42

2111.43

Total present value (100 million 2222.72 yuan)

3.2 Weighted Average Cost of Capital (WACC) From Wind database query, it is found that the cost of equity Ke is 2.33%, the cost of debt Kd is 3.76%, the bond adjustment factor is 2, the corporate income tax rate is 25%, and the equity capital E is 3,845,228,900 yuan, accounting for 86.14% of the total asset market value. Debt capital D is 618,527,200 yuan, accounting for 13.86% of the market value of total assets. The result of the weighted average cost of capital WACC is 2.53%. As a leading enterprise in the cultural industry, Wanda Film Co., Ltd. has relatively stable income. Its equity capital accounts for 86.14% of the total asset market value, and debt capital accounts for 13.86% of the total asset market value. This illustrates the capital structure of Wanda Film Co., Ltd. is stable and reasonable, and 2.53% of WACC is in line with its actual financial level.

3.3 Wanda Film Co., Ltd. Corporate Value Assessment Results Substituting the results of enterprise free cash flow and weighted average cost of capital into the enterprise free cash flow discount model, it can be concluded that the enterprise value of Wanda Film Co., Ltd. on the assessment base date is 222.272 billion yuan. The results are shown in Table 5.

4 Discussion This article uses the Wind database to calculate the WACC. Since many databases on the market cannot be fully opened for the time being, access and use are restricted to a certain extent, and the discount of other databases cannot be obtained. Current rate data, data cannot be filtered and compared. The fact that the database has not yet

912

H. Kang

been widely used has caused some data resources to be idle and wasted, and different data sources are likely to lead to differences in evaluation results. When using the Wind database, you will find that not all the data are meaningful. Sometimes you only need one of the data, and evaluators who are not familiar with computers and cannot find it accurately in the massive data. If the evaluator does not have big data thinking to classify, store and analyze the collected data, they will not be able to play the role of the data and reflect the value of the database [10]. In view of the above situation, the asset evaluation industry should build a data sharing platform, establish and improve industry databases, improve the ability of asset evaluation to navigate the era of big data, effectively use big data and other modern information technology means, ensure sufficient evaluation reference data, and promote the Internet of the asset evaluation industry The development of the platform [11]. At the same time, big data is applied to the analysis of market prospects and profit models of cultural enterprises, dynamic analysis of customer experience value data, and scientific evaluation of cultural enterprise value from multiple angles such as value discovery and evaluation [12].

5 Conclusions The development of cultural enterprises has opened a new page, and asset valuation has also ushered in a new point of reform in the context of the era of big data, gradually catching up with the pace of the Internet economy. This article uses big data analysis technology to predict the future corporate income, cash flow and rate of return of Wanda Film Co., Ltd., and evaluates and analyzes the company’s overall corporate value using a corporate free cash flow discount model. The research found that big data has had a profound impact on asset evaluation. The application of big data to the asset evaluation industry cannot be delayed. The establishment of the asset evaluation industry database, the innovation of evaluation methods, and the integrated development of the industry are all inseparable from the support of big data. The development of data has brought huge opportunities and challenges to the transformation and upgrading of the asset evaluation industry. The research results are conducive to providing reference for cultural enterprise value evaluation, promoting the development of theoretical research in this field, and also providing certain reference value for the asset evaluation industry to develop new businesses. Acknowledgements Project Fund: National First-Class Professional Scientific Research Team Cultivation Project of the Department of International Economics and Trade, School of Economics and Management, Fuzhou University of Foreign Studies

The Application of Big Data Analysis Technology in the Value …

913

References 1. Wenrong, Su: The application of big data in the evaluation of cultural assets. Coop. Econ. Technol. 14, 144–145 (2018) 2. Zhang, Y.: A review of research on the value evaluation of big data. J. Bus. Condition 10, 117 (2018) 3. Dai, C., Li, J., Liu, Y.: Research on the application of big data in the field of asset evaluation. Chin. Market (14), 51, 57 (2019) 4. Sochay, S.: Predicting performance of motion pictures. J. Media Econ. 7, 72–73 (1994) 5. Blosch, M.: Customer knowledge. Knowl. Process Manag. 7(7), 265–268 (2000) 6. Chen, Y.B., Liu, Y., Zhang, J.R.: When do third-party product reviews affect firm value and what can firms do? The case of the media critics and professional movie reviews. J. Marketing (2), 116–134 (2012) 7. Wang, S.: Research on the Value Evaluation Method of Big Data Enterprises—Taking M Company as an Example. Xi’an University of Posts and Telecommunications (2018) 8. Xu, M.: Research on the Application of Income Method Evaluation of Movie Works Under the Background of Big Data Era. Capital University of Economics and Business (2017) 9. Dai, Y.: The development status and prospects of the asset appraisal industry under the background of Internet big data. Shanxi Agri. Econ. 3, 71 (2016) 10. Wang, M.: Talking about the development status of talents in the asset appraisal industry. China Manag. Inf. Technol. 21(4), 66–67 (2018) 11. Yang, L., Li, L.: Talking about the application of big data in asset evaluation. China Assets Appraisal 6, 43–44 (2015) 12. Li, Zhang: Research on the Evaluation of Enterprise Customer Asset Value in the Big Data Era. Friends of Account. 17, 32–35 (2018)

Online ESP Translation Teaching Via Mobile Translation App Xiang Li and Juan Liu

Abstract This study explores how to design a mobile translation APP for ESP translation teaching. The paper firstly elaborates the modules and functions of the mobile translation APP and the information technology and artificial intelligence used in the APP. Then the paper discusses how to apply the APP to translation teaching and the values and benefits of the application of the APP in the cultivation of students’ translation competence. The application of the translation APP to ESP translation teaching is an effective way to enhance translation quality and solve existing problems in traditional ESP translation teaching. The dynamic monitor translation corpus, process monitoring mechanism and diverse evaluations are essential for both teachers’ teaching and research and students’ translation competence development. The connection with actual translation project and external translation resources will certainly enhance students’ psychological and technical adaptation to translation market. Keywords Mobile translation APP · ESP translation · Online teaching

1 Introduction The development of information technology utterly changed translation. Lan pointed out that E-Translation Studies will become an important translation concept and field and the objects of translation research and translation research methods have altered in the information age [1]. Information technology also brings a great challenge to translation teaching. Desmond Keegan said that the next generation learning mode will shift from remote and electric learning to Mobile learning [2]. In order to meet the need and keep up with Mobile learning, educational institutions have to reform traditional translation teaching models by introducing translation teaching APP because the APP, characterized by openness, sociality, multi-dimension and timeliness, can help learners study in any place and at any time. Although the APP is X. Li · J. Liu (B) Department of Basic Courses, Guangdong Police College, Guangzhou, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_112

915

916

X. Li and J. Liu

beneficial for translation teaching, little research has been conducted on building a teaching APP for translation teaching in China. Besides, how to effectively use APP to improve teaching efficiency, foster learners’ problem-solving capability, translation technique, cooperation and coordination, etc. is still a hard nut to crack for informationized translation teaching [3–5]. Therefore, constructing a translation APP is very practical and urgent for current distant and instant translation teaching.

2 The Development of Translation Teaching Platform The translation teaching platform or system originated from the project of online translation teaching of the College University of Saint—Boniface (CUSB). It built a learning management system based on WebCT, including such functions as file downloading, exercise management, online forum, student registration, etc. [6]. Inspired by CUSB, the first generation translation teaching platforms were built based on MOODLE, a Learning Platform or course management system. They mainly aim to help educators create effective online courses, manage students’ learning activities and enhance the communication between teachers and students. Therefore, the translation teaching platform based on MOODLE highlights the translation teaching activities and teaching modes such as blended learning, distance education, flipped classroom. This platform is in essence a course management platform filled with translation content. With the application of parallel corpus to translation teaching, another type of translation teaching platform came into being. A famous sample of this type is Clinknotes, a corpus-based, machine-aided mode of translator Training which is constructed by the City University of Hong Kong. Characterized by a translation corpus with elaborate annotation, it aims to teach translation methods and improve translation skills through translator’s self-learning and self-training. When the combination of translation teaching, teaching practice, translation techniques, translation localization became essential elements for translation teaching, a new type of translation teaching platform such as CATTP, Shiyibao, Transmate, etc. was built. These platforms usually emphasize teachers’ online instant instruction, online interaction, amount of translation practice, the mastery of translation techniques, translation evaluation, even translation commercialization. Up to now, although translation teaching platforms have been updated with the development of information technology and teaching theories, most of them can only be used on the computer and few translation teaching platforms focus on ESP translation training.

3 The Technology Used in Translation Teaching Platform Modern translation teaching platforms integrate a variety of technologies, which at least includes learning management, online communication, artificial intelligence, voice recognition, language evaluation, M-learning, translation technique. According

Online ESP Translation Teaching Via Mobile Translation App

917

to Alica, translation techniques are classified into the following five categories in a broad sense, computer, information exchange and retrieval tools, text editing tools, language resource management tools and translation tools [7]. Of all translation techniques, terminology management system, translation memory system, machine translation are regarded as the three core translation techniques [8]. Terminology management system mainly refers to terminology database which stores information in a certain method, including comparison table of terminology, terminology definition, context, part of speech, etymology, synonyms. When translation memory system is used to translate, it can use translation memory database and terminology database simultaneously. In collaborative translation projects, different translators can use the same terminology database, translators translate terminology according to the target translation provided by terminology database, which can save time and guarantee the consistency of terminology translation. The translation memory system is a computer-aided translation software designed and developed based on a translation system. In the process of translation, the system automatically searches for the same or similar bilingual translation units stored in the translation memory database and gives the reference translation. In this way, the previously completed translation can provide a reference for the translator. With the progress of translation, the completed bilingual memory units are constantly stored in the translation memory database, which enlarges the memory of the database. Machine translation is the process of transforming source language into target language by computer. End-to-end neuro-machine translation (ENNT) has developed rapidly recently, and its translation quality has improved significantly compared with statistical machine translation (SMT). Due to the improvement of the accuracy of machine translation, translation begins to shift from “machine-assisted manual translation” to “manual-assisted machine translation". In the language service industry, “MT + PE” (machine translation + post-translation editing) has been tried to replace the translator’s labor with machine translation to a greater extent, which not only saves costs but also greatly improves the translation output per unit time [9]. Besides translation technique, corpus with annotation, instant online communication, automatic translation evaluation are also dispensable factors for translation teaching platform. Translation corpus can not only provide classical translation examples for students’ learning but also offer a huge amount of translation training sources. Automatic translation evaluation can enhance students’ learning motives as well as reduce teachers’ workload. Instant communication and direction can foster students’ interests and improve interpersonal friendship.

4 The Design of Teaching APP for ESP Translation The big discrepancy of different disciplines and the limit of personal knowledge and energy make it impossible to cultivate versatile translators who work efficiently and effectively in any field or discipline. Therefore, it is feasible and practical to foster translators who are specialized in several fields. Only in this way can translation

918

X. Li and J. Liu

education meet the needs of the translation market segment. The factual market needs in turn propel the reform of the translation teaching platform, which does not highlight the translation of EGP, but the translation of ESP. So the establishment of the ESP translation teaching APP is a must for current translation teaching and training. The online ESP translation teaching not only involves the common elements of online course management such as student management, exercise management, quiz and test, online forum, etc. but also includes special modules characteristic of ESP translation teaching and training. We think that the translation teaching APP for ESP at least should include the following particular modules. (1)

(2)

(3)

(4)

(5)

The module of translation corpus and parallel corpus. The translation corpus here refers to the monitoring corpus which consists of students’ translation practice data. The translation APP firstly collects automatically the data of students’ translation, and then they are composed as learners’ translation corpus, which can be used as research data (e.g. the development of translator’s capacity, the shared translation phenomenon) as well as teaching examples (e.g. error analysis). The parallel corpus here refers to the corpus which is comprised of classic translation in a certain ESP field. The parallel corpus can not only be used as a translation reference but also translation method teaching especially when it is annotated with translation approaches and methods. Besides, the comparable corpus can also be added to the APP in order to make a comparison between translation language and source language. Machine translation module. It does not mean we should establish its own machine translation such as Google translation but establish the link with current online free translation or search engines for online translation. Of course, the link to online translation dictionary such as the Youdao dictionary, Lingoes or Iciba is standardized equipment for the APP. Translation teaching resources module. It usually consists of teaching videos such as translation micro lectures, teaching PowerPoint, translation notes, translation theories, translation technique, etc. Translation memory module. It includes classical translation and high-quality translators’ practice data. One of the main functions is to improve efficiency by avoiding the translation repetition of similar sentences and keep consistency among different translators. Meanwhile, it can automatically identify and edit different document formats to help improve the efficiency of post-editing. Terminology management module. Terminology is the key element of ESP translation. Terminology includes high frequently-used words, phrases, collocation, even clusters in ESP. The idiom principle should be taken into consideration when editing the terminology management module. Besides, we can design terminology memory game or competition to help translators master terminology. One point worthy of attention is that the common terms with special meaning in ESP should be attached most importance in terminology learning and teaching because it is these words that usually confuse translators and result in translation errors.

Online ESP Translation Teaching Via Mobile Translation App

(6)

(7)

(8)

(9)

919

Translation evaluation module. Based on the corpus and automated essay scoring techniques, the ideal translation teaching APP can automatically evaluate translation from the perspective of faithfulness and expressiveness. The evaluation should include translation scoring and suggestions. Besides the objective evaluation, the APP should include subjective various evaluations such as group evaluation, peer evaluation and teacher or expert evaluation. Translation process monitoring module. Process monitoring has been a vital factor in computer-aided learning and online learning, which can help teachers manage online classes and remind absent-minded students. Besides, the process monitoring data is essential for the research on translation process. Therefore, the translation APP should demonstrate the recording function which includes such parameters as translation time, learning time and content, communication time and behaviors, the quality and quantity of translation practice, students’ posting, the reference used in the translation process. Translation test module. This module usually includes daily quiz, midterm test, final test. However, the advance translation APP should establish a test bank for different levels of translators, which links with official or commercial translation tests for translation certificates or translation capability. Speech recognition and text-to-speech (TTS). The two techniques are used for the evaluation and post-editing of interpretation. When evaluating, the APP firstly recognizes the speech and change speech into text, on which the evaluation is made. Online instant communication module. Kiraly’s idea that the nature of translation teaching is an dynamic interaction process with an aim to enhance learners’ translation competence illustrates the importance of the instant direction and evaluation in translation teaching [10]. Therefore, The APP establishes online interaction channels such as forum, evaluation area and posting. The structure of the teaching APP for ESP translation is illustrated Fig. 1.

Fig. 1 The modules of the teaching APP for ESP translation

920

X. Li and J. Liu

5 Using the APP to Improve Translation Competence Teaching experience with translation APP has proven that it can raise students learning enthusiasm and teaching effectiveness. The recording of the translation process can help teachers discover problems and give instant directions. The connection of translation practice and commercial project certainly help students adapt to the translation market and improve their actual work capacity. Although Fig. 1 shows that the teaching APP for ESP translation includes several modules, all of them are intertwined and interconnected. All modules work together for improving translators’ translation competence. The PACTE team of the Autonomous University of Barcelona explored the acquisition process of translation competence through large-scale training projects and empirical investigations. It defined translation competence as the necessary and potential knowledge, skills and strategies for translators in the process of translation, and established a set of translation competence, which includes five kinds of competence and a series of psychological-physiological factors: bilingual competence, extra-linguistic competence, translation expertise, instrumental competence, strategic competence, psychological-physiological factors, attitude factors and psychological mechanism [5]. Here instrumental competence refers to technical competence for translators including computer applications, information retrieval, terminology management and computer aided translation. In order to make full use of the APP, the following teaching procedure is recommended on the basis of successful teaching practice. As shown in Fig. 2, the application of the translation APP goes through the whole teaching procedure. That means the teacher can try different teaching modes such as blended teaching, flipped classroom with the help of the translation APP. Before class, students are asked to learn translation methods used in ESP translation through watching translation micro-lectures and cultivate language sense and improve listening comprehension proficiency by reading and listen to ESP articles. During the before-class stage, the recognition and memorization of overt terminology

Fig. 2 The application of the APP in ESP translation teaching

Online ESP Translation Teaching Via Mobile Translation App

921

is of much importance. Overt terminology here refers to those special terms which easily identified. For example, in medical English, such terms as hepatitis, diabetes, arthritis are called overt terminology, which usually have fixed meaning and are only used in a specific language environment. In-class teaching, firstly teachers guide students to discover covert terms, which are neglected and play a vital role in ESP translation. Covet terminology refers to those polysemes which have special meaning when used in ESP. For example, in the following examples, the bold words are treated as medical terminology. (a) (b)

no access of fever (access means outbreak) transfection was added dropwise to the culture medium (culture means cultivate)

As said in part 3, ESP terminology not only covers the special terms but also the clusters and collocations. For example, in medical English translation teaching, more attention should be paid to the chunks such as “plastic operation”, “focus of infection”, “cell process” because research has proved that the mastery of chunks is essential for EFL learning. After mastering terminology, it is natural to conduct sentence translation teaching. But one important point in sentence translation teaching is that teachers should help students summarize the typical sentence structures used in ESP with the exploration of the parallel corpus. After-class training is most important during the whole translation teaching process as the enhance of translation competence need mount of translation training. With the translation APP, after-class translation training can directly link with actual or mock translation, which is useful for cultivating translators’ psychological adaptation. Besides, the APP also emphasizes the practice of translation tools with an aim to improve translators’ translation technical competence.

6 Conclusions Information technology and artificial intelligence bring about more chances and approaches for translation teaching. The teaching APP for ESP translation is an open system, which is very easy for teachers to add teaching content, so it is never limited to a specific field. However, it is different from the EGP translation platform or APP, which is hard to foster specialized translation talents. The application of ESP translation APP demonstrates the pedagogic idea of learner-centered, constructive teaching and situational teaching. The focus shifts from teachers’ lecture to students’ actual training, which is beneficial for both teachers and students. Automatic evaluation and peer evaluation reduce teachers’ burden and increase students learning enthusiasm by offering instant response and feedback. Process monitoring makes students feel that teachers are always with them. The big data collected from process monitoring and translation outcome not only provide teachers feedback but also basic data for translation research. One of the crucial factors is that the APP connects classroom

922

X. Li and J. Liu

teaching with the actual projects, which is favorable for the cultivation of overall translation competence. Acknowledgements This research is funded by the project “the Innovation Team of Applied Translation Research of GDPC (2018JSTD06)”.

References 1. Hongjun, L.: E-translation studies: challenges for developing translation studies in the new era. Lang. Translation 1, 52–57 (2017). (in Chinese) 2. Keegan, D.: Mobile learning: the next generation of learning. Distance Educ. Int. 40(1), 106– 121 (2005) 3. Pym, A.: Translation skill-sets in a machine-translation age. Meta: Translator’s J. 58(3), 487– 503 (2013) 4. Mészáros, A.: Translation and Web Searching. Routledge, NewYork (2014) 5. Prieto-Velasco, J.A., Fuentes-Luque, A.: A collaborative multimodal working environment for the development of instrumental and professional competences of student translators: an innovative teaching experience. Interpreter Translator Trainer 10(1), 76–91 (2016) 6. Zheng, W., Dongyun, S.: The design of functional modules for online translation teaching platform. Chin. J. ICT Educ. 17, 41–44 (2009). (in Chinese) 7. Alcina, A.: Translation technologies: scope, tools and resources. Target 20(1), 79 (2008) 8. Ming, L., Tianxiao, P.: A blueprint for the language resources platform applied to military translation. J. Yunmeng 39(2), 12 (2018). (in Chinese) 9. PACTE: Acquiring translation competence, hypotheses and methodological problems of a research project. In: Beeby, A., Ensinger, D., Presas, M. (eds.) Investigating Translation, pp. 99– 106. John Benjamins, Amserdam (2000) 10. Kiraly, D.: A Social Constructivist Approach to Translator Education: Empowerment from Theory to Practice, vol. 86. St Jerome, Manchester, UK and Northampton, MA (2000)

Stock Forecasting Based on BP Neural Network Optimized by Improved Particle Swarm Optimization Xueyan Zhang

Abstract With more accurate prediction results, we can guide and regulate the stock market in time, so as to provide an important guarantee for the sustainable and healthy development of China’s national economy. The purpose of this paper is to study the stock prediction of BP neural network optimized by improved particle swarm optimization algorithm, and put forward the neural network prediction method based on particle swarm optimization algorithm, and applied it to the stock market prediction, and achieved good results. At the same time, this paper compares the performance of PSO-BP network before and after the introduction of qualitative indicators. Through the prediction of stock index and stock price, the experimental results show that the prediction error MAE of PSO-BP network is reduced by 5, and the accuracy of trend prediction is increased by 7%, which proves the relative superiority of PSO-BP neural network. Keywords Improved particle swarm optimization · Algorithm optimization · BP neural network · Stock forecasting

1 Introduction With the development of the stock market and the deepening understanding of the law of the stock market, people have put forward a variety of stock market forecasting methods [1]. However, due to the complexity of the internal structure of the stock market system and the volatility of external factors, the existing analysis and prediction methods are not ideal in practical application [2, 3]. After years of development, a lot of stock market data information has accumulated [4]. How to obtain valuable information from these large-scale data and apply it to investment decision-making has become the focus of stock market forecasting [5, 6]. Neural network modeling is based on the inherent relationship of data itself [7]. It has good self-organization, adaptability, strong learning ability and anti-interference X. Zhang (B) Chengdu College of University of Electronic Science and Technology of China, Chengdu, Sichuan, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_113

923

924

X. Zhang

ability [8, 9]. Therefore, neural network has been widely used in the field of stock market prediction, and produced a series of neural network training methods. In the current neural network training, the most commonly used method is BP algorithm [10]. However, due to the slow convergence speed and easy to fall into local minima, the prediction accuracy and speed of neural network based on BP algorithm need to be improved. In this paper, based on BP algorithm, which is widely used in artificial neural network learning algorithm, it makes full use of the advantages of BP neural network, such as good fault tolerance, strong self-learning ability and strong nonlinear mapping ability. According to the characteristics of China’s stock market, this paper applies BP neural network to stock market forecasting modeling. In order to improve the robustness and generalization ability of the model to a certain extent, it is expected to improve the robustness and generalization ability of the model High algorithm performance and prediction effect.

2 Proposed Method 2.1 Concept and Architecture of BP Neural Network Optimized by Particle Swarm Optimization In the algorithm, we set a group of parameter vectors such as xi = (xi1 , xi2 ..., xid ). The value of each dimension in the vector represents the weight and threshold to be applied to the hierarchical connection of BP neural network. The dimension D of parameter vector X represents the number of ownership values and thresholds in the network. In the use of particle swarm optimization algorithm, xi is the particle swarm optimization variable. The fitness function value of particle swarm optimization is the sum of squares of the difference between the actual value and the ideal expected value of each dimension value of the sample. Here, the individual particle is set to be represented by I. Popindex is represented as the particle index number. From L to the population size in the particle swarm, Ipopindex is represented as the fitness function here.

2.2 Design and Implementation of PSO-BP Neural Network Firstly, the initialization operation of the model is carried out, and the initial parameters of PSO and neural network model are set. After the structure of neural network is determined, the model is constructed. In the running process of particle swarm optimization, the fitness of each individual in the particle swarm optimization is calculated. Firstly, an individual particle is input as a sample, and then a network output value is obtained according to the

Stock Forecasting Based on BP Neural Network Optimized …

925

forward calculation method of BP neural network:  2 Yi, j − yi, j Ii =

(1)

J

The mean value of the sum of squares of all sample errors is calculated as the fitness of particles. After setting the maximum number of iterations, the end confirmation condition is set for the particle swarm optimization algorithm. If the end confirmation condition is met or the maximum number of iterations is reached, the model running result is finished. The offline performance criteria are used to evaluate the algorithm: iter ERMS =

i=1

f un(gbesti ) iter

(2)

3 Experiments 3.1 Data Sources Select 278 trading target data of CSI300 index from 2019/1/21 to 2020/3/15 (data from wind information). According to the ratio of 6:4, 167 days’ data was used as training set, and the remaining 111 days’ data was used as test set to evaluate the model. Select the highest price, lowest price, closing price, trading volume and price limit as input variables, and the next day’s closing price or yield as output variables (Table 1).

3.2 Standardization Because of the difference of the magnitude of the variables and the size of the variables, they are not easy to identify. Therefore, it is necessary to normalize the data before establishing the model to eliminate the influence of different dimensions and data orders on the model. Table 1 Data sets

Training set

Test set

Total

167

111

278

926

X. Zhang

4 Discussion 4.1 Prediction of Shanghai Composite Index by Introducing Qualitative Index into PSO-BP Network According to the definition of qualitative indicators and quantitative methods, the selected sample data of Shanghai stock index are processed, and two guiding variables are obtained. In addition, the original four time series variables are selected. Now the input variables of the network are 6, and the number of hidden layer nodes is still 4. After adjusting the number of hidden layer nodes up and down, the training results are shown in Fig. 1. It can be seen that the networks with test numbers 3 and 4 have small training errors. The average absolute error MAE between the predicted value and the expected value, and the trend judgment accuracy PCD of the network prediction are shown in Fig. 2.

Fig. 1 PSO-BP network training error with qualitative index

Fig. 2 Prediction results of PSO-BP network with qualitative indexes

Stock Forecasting Based on BP Neural Network Optimized … Table 2 Performance comparison of PSO-BP network before and after introducing qualitative index

927

PSO-BP network

Time (s)

Error MAE

Accuracy PCD

Excluding qualitative indicators

169

15

82%

Including qualitative indicators

237

5

91%

4.2 Performance Comparison of PSO-BP Network Before and After Introducing Qualitative Indicators On the whole, the performance of PSO-BP network has been greatly improved after introducing qualitative indicators. Three of the four comparison indexes are obviously better than the PSO-BP network without qualitative indicators. The comparison results are shown in Table 2. From the perspective of training effect, adding qualitative indicators greatly reduces the termination error of training, improves the training accuracy, and further improves the problem that BP network is easy to fall into local optimum; after introducing qualitative index, the input variables of the network are increased by two, resulting in a slightly longer training time, which is also in line with the actual situation. However, from the error curve, the training error of PSO-BP network which only uses quantitative time series as input variable can reach the training error after 100 times of training. At this time, it can be reached after 60 times of training. It can be seen that the convergence speed of PSO-BP network has been greatly improved after adding qualitative indicators. From the perspective of prediction effect, the prediction error MAE of PSO-BP network is reduced by 5, the accuracy of trend prediction is increased by 7%, and the prediction performance of PSO-BP network is greatly improved. From the effect of fitting the predicted value with the actual value, the network has a strong ability to identify some mutation points due to the influence of national macro policies and other factors after the introduction of qualitative indicators, and has a greater forward-looking judgment on the network trend. In conclusion, adding qualitative input variables into the PSO-BP network stock market prediction model greatly improves the performance of the network, and enhances the robustness and generalization ability of the network. Especially after adding qualitative indicators, the ability of network to identify abnormal points is enhanced, the real-time performance of network prediction is greatly improved, and the problem of long delay in stock market prediction by traditional BP network is improved. Therefore, it is feasible and efficient to introduce qualitative indicators into the PSO-BP network stock market forecasting model, which has certain theoretical significance and practical value.

928

X. Zhang

5 Conclusions In this paper, after analyzing the common methods and their advantages and disadvantages, the neural network method is used to model and forecast the stock market. In the current field of neural network prediction, the most widely used method is BP algorithm, that is back propagation algorithm. However, BP algorithm also has its inherent shortcomings, that is, slow convergence speed and strong dependence on the initial value. Therefore, this paper introduces particle swarm optimization algorithm as a neural network training method. The problem of BP algorithm which depends on initial weight selection, low speed convergence speed and easy to fall to local optimum value is analyzed. In order to solve these problems, the traditional BP neural network weight adjustment method uses the global optimization evolutionary algorithm based on swarm intelligence theory and particle swarm optimization algorithm to optimize, which improves the slow convergence speed problem and easily falls into the local minimum value.

References 1. Wang, F., Zhang, Y., Rao, Q., et al.: Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction. Soft Comput. 21(12), 3193– 3205 (2017) 2. Jeon, S., Hong, B., Chang, V.: Pattern graph tracking-based stock price prediction using big data. Future Gener. Comput. Syst. 80, 171–187 (2017) 3. Nguyet, N.: An analysis and implementation of the hidden markov model to technology stock prediction. Risks 5(4), 62 (2017) 4. Liu, T., Yin, S.: An improved particle swarm optimization algorithm used for BP neural network and multimedia course-ware evaluation. Multimedia Tools Appl. 76(9), 11961–11974 (2017) 5. Mangale, C., Meena, S., Purohit, P.: Fuzzy logic based stock value prediction using fundamental analysis. Oriental J. Comput. Technol. 10(1), 120–126 (2017) 6. Guo, J., Xiao, J., Ni, Z.: How does informed trader trade the “reverse risk”? OTM Option volume as risk factor for stock prediction. J. Phys. Conf. Ser. 1549, 042013 (2020) 7. Sameerapallavi, T.P., Manjula, B.: An efficient approach on big data for stock prediction with the aid of optimal machine learning approach. Int. J. Comput. Sci. Eng. 7(2):482–486 (2019) 8. Li, Q., Tan, J., Wang, J., et al.: A multimodal event-driven LSTM model for stock prediction using online news. IEEE Trans. Knowl. Data Eng. (99):1 (2020) 9. Liu, J., Lin, H., Yang, L., et al.: Multi-element hierarchical attention capsule network for stock prediction. IEEE Access (99):1 (2020) 10. Cao, B., Zhao, J., Lv, Z., et al.: Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction. IEEE Trans. Fuzzy Syst. 28(5), 939–952 (2020)

Summary and Analysis of Typical Technologies in 5G Wei Qin

Abstract As an emerging mobile communication technology, 5G is more comprehensive in the face of differentiated performance requirements after 2020. Its main goal can be summarized as ‘Enhancing broadband and interconnection of all things’. 5G will have more abundant service providing capabilities compared with previous communication technologies, so it has been widely concerned and studied by enterprises, research institutes and universities all over the world. This paper first introduces the history of 5G and the current situation at home and abroad, and introduces and analyzes some key technologies of 5G from three aspects of wireless transmission, wireless access and the application of AI in 5G system. Finally, the development direction and prospect of 5G in the future are prospected and analyzed. Keywords 5G · Wireless transmission · Wireless access · AI

1 Introduction Facing the future, mobile data traffic is growing explosively, hundreds of millions of devices are connected to the network, and all kinds of new services and application scenarios are constantly emerging. Under this background, 5 g communication era has opened [1]. As shown in Fig. 1. The 5G concept white paper [2] released by the promotion group in China starts from the vision and needs of 5G, analyzes and summarizes the main technical scenarios, key challenges and applicable key technologies of 5G, and extracts key capabilities and core technical characteristics. Compared with the traditional communication technology, 5G can provide more entertainment and life services. In the face of personalized needs under different conditions, 5G is no longer a solution based on point-to-point technology like 4G. 5G focuses more on mobility, spectrum efficiency, network energy efficiency, user experience rate and other technical indicators, instead of simply emphasizing peak rate. With the increase of user demand, 5G network will focus on more challenges, W. Qin (B) School of Information Engineering, Shenyang Polytechnic College, Shenyang 110045, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_114

929

930

W. Qin

Fig. 1 5G application scenario

including lower overhead and end-to-end delay, larger capacity and data rate [3, 4]. With the integration of these technologies, 5G’s performance will continue to improve. This paper introduces and analyzes some key technologies of 5G in detail from the perspectives of wireless transmission, wireless access, and AI application, and expounds the representative viewpoints in academic circles. As early as 4G LTE was deployed on a global scale, 5G R & D has become the focus of the industry. The key is to further abstract the traditional network into network slices. Huawei has put forward a variety of new technologies in the fields of 5G networking architecture, spectrum utilization, air port technology, etc., and has jointly opened the first large-scale multi antenna base station with China Mobile in its off-site test [5]. It is urgent to establish a global uniform 5G standard. As shown in Fig. 2, ITU carried out the research on 5G technical service demand and evaluation indicators in 2016, and started to collect 5G related technical methods at the end of 2017. The development of 5G standard will be completed by the end of 2020. As the main standard setting organization of international mobile communication industry, 3GPP will undertake the work related to 5G international standard development. Under the organization of 5G promotion group, the first stage of wireless test specification has been completed [6].

Summary and Analysis of Typical Technologies in 5G

931

Fig. 2 5G work plan

2 Wireless Transmission The number of antennas in the base station in the 5G system is much higher than the number of antennas in the terminal. As a key 5G technology, large-scale multiantenna technology can effectively increase the peak rate, transmission delay, system capacity and reduce energy consumption. In the system, the maximum number of channels is established to ensure the high-speed and effective signal transmission in the system [7]. In addition, the design of the MAC layer is simplified by arranging large-scale antennas to achieve the purpose of low-delay signal transmission. Large scale multi antenna technology is a potentially feasible key technology to improve system capacity and peak rate, reduce energy consumption and transmission delay. In today’s experimental network, the conventional MIMO scheme is no longer suitable for the growing communication needs. The design and engineering of large-scale multi antenna system is also faced with the challenges brought by a series of key technical problems mentioned above. The channel modeling of the 5G system mainly reflects the following characteristics. • D2D terminals have dual mobility, and the traditional model in which only the receiver can move is no longer applicable. • In order to improve the use efficiency of spectrum resources and channel capacity, the channel modeling of large-scale multi-antenna arrays also presents many new characteristics. • Channel characteristics of high frequency communication. With the in-depth study of 5G, the corresponding channel models also show different characteristics. Therefore, the measurement and modeling of related new technologies need to be carried out in depth. Full-duplex technology (FD) is another key technology of the 5G system. The socalled full-duplex technology means that communication terminals can simultaneously perform two-way communication on the same frequency band. Compared with

932

W. Qin

time-division duplex and frequency-division duplex modes, the spectrum utilization rate of full-duplex technology has been greatly improved, and it can effectively reduce communication delay and communication losses. When the FD adopts the independent transceiver antenna, due to the short distance between the receiving antenna and the large power difference between the receiving and transmitting signals, strong interference will occur between different signals during the transmitting signals in the same frequency band. We call this phenomenon self-interference. How to effectively eliminate this self-interference phenomenon in real time and ensure communication quality is an urgent problem to be solved by full-duplex technology. From the current research results of self interference cancellation, the physical layer interference cancellation method is mainly used in full duplex system. The self interference cancellation technology of full duplex system mainly includes antenna self-interference cancellation, analog circuit domain self-interference cancellation and digital domain self-interference cancellation methods. Current research has found that the main method to eliminate antenna self-interference is to add loss between the receiving and receiving antennas, including separating the receiving and receiving signals, isolating the receiving and transmitting antennas, cross polarization of the antenna, and antenna zeroing. Self interference cancellation in analog circuit domain mainly includes reconstruction of self-interference signal through analog circuit design, circulator isolation and direct subtraction of reconstructed self-interference signal from received signal; digital domain self-interference elimination method mainly relies on parameter estimation and reconstruction of selfinterference, and subtracting reconstructed self-interference from received signal to eliminate residual self-interference. In addition, the application of full-duplex technology to cognitive radio networks enables secondary users to synchronize their perception and channel utilization, thereby effectively avoiding the possibility of secondary collisions between nodes and enhancing system performance.

3 Multiple Access Technology Multiple access (MA) is the key technology of modern communication system. In addition to traditional multiple access technologies, 5G will also support a variety of new multiple access technologies. The new technology can not only promote the number of user connections, but also effectively improve the spectrum efficiency of the system through multi-user superimposed transmission. By scheduling free competitive access, it can also significantly reduce the delay. Non orthogonal multiple access (NOMA) is a new multiple access scheme based on power domain multiplexing, which increases the complexity of the receiver for higher spectrum efficiency [8]. In the future, the computing capacity of equipment will be greatly improved, so the scheme is feasible. Noma also faces some technical problems. The structure of the non-orthogonal transmission receiver is very complicated, and the signal processing capability of the original chip needs to be improved in the design process of SIC.

Summary and Analysis of Typical Technologies in 5G

933

On the other hand, the power domain multiplexing technology is still in the research stage, and there is a lot of work to be done in the future. Sparse coded multiple access (SCMA) technology is a new type of multiple access scheme based on code domain multiplexing. At present, the research on SCMA mainly includes the optimal codebook design, low complexity receiving algorithm research, rate and energy efficiency research, and the combination of SCMA and other wireless technologies. Pattern division multiple access (PDMA) is a novel non-orthogonal multiple access technology based on the convergence of transceiver terminals. The implementation of PDMA must solve the following problems. In order to more easily distinguish between different users, how to design the transmitter mode, simplify the receiver, and how to effectively integrate PDMA and MIMO to design a spatial coding mode has become an urgent problem to be solved. Multi-user shared access (MUSA) is a multi-code-based uplink non-orthogonal multiple access technology used in complex fields. It is suitable for scheduling free multi-user sharing access scheme, which is conducive to the realization of low-cost, low-power 5G mass connection. MUSA is a potential multiple access technology in 5G, but its implementation is still challenging. For example, the mapping method of propagation sequence, the standard of pattern selection and how the system capacity changes with the increase of the number of users (Table 1).

4 Application Problems of AI in 5G System In this paper, the application problems of AI in 5G are divided into four types: unable to model, difficult to solve, efficient implementation of unified pattern, and optimal detection and estimation. For the first two types of problems, due to the lack of effective traditional solutions, AI technology usually has more application potential, whether AI technology is more competitive than traditional solutions in performance or implementation depends on the specific solutions [9, 10]. • • • •

The problem cannot be modeled. Difficult to solve problems. Efficient implementation of the first mock exam. Optimal detection and estimation problem.

5 Conclusion This paper introduces and summarizes the development of 5G and the research progress at home and abroad, and analyzes the new 5G technologies. From three aspects of wireless transmission, wireless access and AI application in 5G system, this paper introduces the potential key technologies and the latest development of 5G. In the future, 5G will usher in new opportunities and challenges in the following aspects.

934

W. Qin

Table 1 Characteristics comparison of multiple access technology Multiple access

Key technology

Advantage

Non Orthogonal Multiple Access (NOMA)

(1) SIC detection (2) power domain multiplexing

(1) There is no obvious (1) High complexity of near far effect receiver (2) The spectrum (2) Power domain efficiency of uplink multiplexing is improved by technology is still nearly 20% under study (3) The throughput of downlink is improved by more than 30%

Disadvantages

Sparse coded multiple access (SCMA)

(1) High-dimensional modulation technology (2) Approximate optimal detection through MPA (3) Low density signature algorithm

(1) Three times more (1) It is difficult to spectrum efficiency design and (2) The capacity of implement the uplink system is 2.8 optimal code times higher than (2) Increased that of OFDM interference system between users (3) Compared with OFDMA, the throughput and average gain of downlink cells are improved by 5% and 8% respectively

Pattern Division Multiple Access (PDMA)

(1) Joint/integrated design of SIC with appropriate complexity (2) Low complexity maximum likelihood SIC detection

(1) Downlink spectrum (1) It is difficult to efficiency increased design and optimize by 1.5 times the pattern (2) Downlink system (2) Increased capacity increased interference by 2–3 times between users

Multi User Shared Access (MUSA)

(1) Multivariate codes in complex field (2) SIC detection (3) Superimposed signal and coding extension technology

(1) Low block error rate (2) Support large-scale user access

(1) The design of transmission signal is difficult (2) Increased interference between users

• The new development of 5G technology and applications is mainly the Internet’s move towards ‘smart +’. With the development of 5G networks, various new technologies and new developments have emerged, which have become a major development direction of economic and social development. • The global communication standards have not yet been unified. The development of an effective 5G global communication standard will be a problem facing 5G technology.

Summary and Analysis of Typical Technologies in 5G

935

• Security issues of 5G networks. In view of the openness of 5G networks, its network security issues will face greater challenges. Safe and effective protection of network information, protection of personal information, network infrastructure, and information data will be the top priority of future 5G research. On the whole, 5G research is at the critical stage of development, and the technology research is progressing rapidly. However, there are still a lot of work to be done in the future, such as Smart 5G, the global unified standards, and network security based on user demand, scale, cost and energy consumption.

References 1. Li, L.M., Wang, D.M., Niu, X.K., et al.: mm Wave communications for 5G: implementation challenges and advances. Sci. China Inf. Sci. 61, 5–23 (2016). (in Chinese) 2. Yang, W.J., Wang, M., Zhang, J.J., et al.: Narrowband wireless access for low-power massive internet of things: a bandwidth perspective. IEEE Wirel. Commun. 24, 138–145 (2017). (in Chinese) 3. Gomez-Andrades, A., Munoz, P., Serrano, I., et al.: Automatic root cause analysis for LTE networks based on unsupervised techniques. IEEE Trans. Veh. Technol. 65, 2369–2386 (2016). (in Spain) 4. Zhang, P., Tao, Y.-Z., Zhang, Z., et al.: Survey of several key technologies for 5G. J. Commun. 37(7), 15–29 (2016). (in Chinese) 5. Zheng, G.: Joint beamforming optimization and power control for full-duplex mimo two-way relay channel. IEEE Trans. Signal Process. 63(3), 555–566 (2018). (in Chinese) 6. Lu, L., Chen, Y., Guo, W., et al.: Prototype for 5G new air interface technology SCMA and performance evaluation. China Commun. 1, 38–48 (2015). (in Chinese) 7. Liang, F., Shen, C., Wu, F.: An iterative BP-CNN architecture for channel decoding. IEEE J. Sel. Top. Signal Process. 12, 144–159 (2018). (in Chinese) 8. You, X., Zhang, C., Tan, X., et al.: AI for 5G: research directions and paradigms (in Chinese). Sci. Sin. Inf. 48(12): 1589–1602 (2018). (in Chinese) 9. Wang, T.Q., Wen, C.K., Wang, H.Q., et al.: Deep learning for wireless physical layer: opportunities and challenges. China Commun. 14, 92–111 (2017). (in Chinese) 10. Wang, X., Wang, J.K., Liu, Z.G., et al.: A spectrum sensing algorithm based on random forest in cognitive network. J. Instrum. 34(11), 35–41 (2013). (in Chinese)

Application of Information Technology in Economic Management Zhongzhen Qiu

Abstract The application of information technology and the establishment of management system in the operation and management of enterprises can improve the market competitiveness of enterprises, promote the orderly development of enterprises and ensure the development prospects of enterprises. The purpose of this paper is to study the application of information technology in economic management. This paper analyzes the problems faced by management informatization and introduces the definition and status quo of related concepts. It mainly introduces the application of cost management in Kingdee EAS system and the construction of DEA model for financial performance evaluation of the company, which lays a solid theoretical foundation for the case study later. Based on our company’s information cost accounting and information performance management, the experimental results show that the more skilled financial personnel spend less than 15% of their working time on all vouchers including cost. After the implementation of the project integrated management system, it is very helpful to improve the management efficiency. Keywords Information technology · Economic management · Cost management · Performance management

1 Introduction With the rise of the information revolution and the advent of the information network era, there is a rapid wave of information technology in the world [1]. Whether from a macro or micro perspective, the development and research of economy presents a brand-new look with informatization as the fundamental feature; from the perspective of management, there are significant changes in the content and form of management itself [2, 3]. Developing countries or enterprise organizations hope to rely on information networking strategy to catch up with each other in economy and science and technology, and make leapfrog progress in management means and Z. Qiu (B) Jiangxi University of Software Professional Technology, Nanchang 330041, Jiangxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_115

937

938

Z. Qiu

methods, And then to achieve the goal of the successor in the top [4, 5]. Therefore, promoting informatization is an important symbol of the comprehensive level and competitiveness of a country or enterprise organization [6]. The development and research of informatization also makes great changes in contemporary economy and management science [7, 8]. In the field of economics and management science, because information and network technology started in a short time, but developed rapidly, the situation often changed unexpectedly. The theories of economy and management science based on information technology are different. Some scholars have underestimated the impact of informatization on economy and management science, which makes the determination of weights of informatization and networking factors in the whole research system obviously inconsistent with reality, and can not be used as a research tool to explore the real individual system [9, 10]. This paper selects our company as the research object, briefly analyzes the specific application mode and application process of the company, and explores the effect of the implementation of management accounting informatization. Our company has a history of more than ten years. It has experienced the process from simply improving the transaction processing efficiency of single business to improving the production efficiency of the overall supply chain and improving the management performance. It has optimized the financial management effect and brought great influence and change to the management and operation of the enterprise, which has certain typicality. The case study of our company is helpful to summarize and obtain practical experience, expand the edge of management accounting informatization research, and contribute to the case study of management informatization.

2 Proposed Method 2.1 Cost Management In Kingdee EAS system, the preparation of responsibility cost is divided into direct engineering cost, other engineering cost, project personnel salary, indirect cost, engineering tax, etc. after all items are completed, the responsibility cost is summarized. The accounting of direct engineering cost can be collected around the work breakdown structure and bill of quantities of the project entity, and be allocated to the 0 # account by itself through the system; the material cost in the direct engineering cost needs to be manually written off before accounting, and then automatically allocated to the 0 # account through the selected purpose. Other engineering costs, involving other contracts, can be automatically obtained or manually entered. The collection is automatically retrieved from business documents. After successful collection, it needs to be apportioned according to 0 # account. The calculation method of

Application of Information Technology in Economic Management

939

apportionment can be based on the amount or the percentage of quantity, which is reasonable according to the actual situation.

2.2 Performance Evaluation Function Through the design of performance appraisal module in the cloud to achieve the function of performance appraisal, determine the evaluation model, conduct data analysis, and generate budget evaluation report. The determination of the evaluation model is to design a set of performance evaluation system or model suitable for the company in the cloud. Secondly, the data analysis is based on the budget data of Bi end and the actual data, and carries on the comparative calculation research. After data analysis, the evaluation report is generated, and the company compiles the budget evaluation report reflecting the budget line according to the report template or rules. Performance appraisal can be divided into employee level, department level and company level. The indicators and concerns of performance appraisal are not consistent. Therefore, budget analysis can be carried out quickly through different evaluation mechanism settings. In the evaluation of corporate performance, we choose the output oriented DEA model with variable returns to scale, namely BCC model, and the input-oriented BCC model based on variable returns to scale: n λ j xi j + si− = θ xik (1) S.t. j=1

Based on the output oriented BCC model with variable returns to scale, its programming formula is as follows: n j=1

λ j xi j − sr+ = ϕyr k

(2)

si− and sr+ are relaxation variables, s is the number of output indicators.

3 Experiments 3.1 Group Overview Our company’s main business scope covers automation product distribution and project integration. The company also has project department, key industry department, collaborative product department and other sales departments for specific markets. Taking M products as the center and providing customers with one-stop

940

Z. Qiu

Table 1 A group profile Subsidiary

Staff

Financial staff

Business income

Total assets

3

489

90

0.5 billion yuan

2 billion yuan

platform, we can obtain international famous brands in various fields including industrial network PC, security, connection, cabinet, cable and accessories. The company has three (Branch) subsidiary companies, with 489 employees, including about 90 financial personnel. In 2019, the newly signed contract volume of our company is 120 million yuan, with a year-on-year growth of 2.1%; the annual operating income is RMB 50 million yuan, with a year-on-year growth of 1.5%; the company’s total assets are 200 million yuan, with a year-on-year growth of 1.2%. The value maintenance and appreciation of state-owned assets are fully realized, as shown in Table 1.

4 Discussion 4.1 Informatization Cost Accounting After the implementation of informatization, the vouchers related to cost can be automatically generated by the system, and the financial personnel can submit them with only a little modification, which greatly shortens the time spent in cost accounting. At present, the time that the more skilled financial personnel spend on all documents including costs is usually less than 15% of their working time, which saves a lot of time for financial personnel to carry out other work, as shown in Table 2. According to the internal information of the enterprise, the voucher generation rate of cost related systems is up to 95%, as shown in Fig. 1. Before the implementation of informatization, the cost accounting of real estate project department is not clear and timely. With the progress of the project, various costs are occurring in succession. At this time, it is necessary to know the total cost, or the cost of a certain place or a certain part. The project department is not clear at all. It only knows a rough data. Only after the project is completed can we know whether the overall project is making money. However, it is too late to carry out cost control. Even if the overall project is to make money, but in part, which places are profitable and which areas are losing, most of the time it is impossible to calculate. At the group level, each real estate project can generate basic cost data, but there is no unified data acquisition and analysis system of the whole company, which can not supervise and control the whole project development process in real time. In addition, the company’s cost accounting is not strict due to the lack of strict accounting rules and regulations, and the cost accounting is not standardized. Some projects do not use cost accounting items according to regulations, which leads to difficulties in internal audit and consolidated statements of subsidiaries and group companies.

Application of Information Technology in Economic Management

941

Table 2 Voucher generation method of each system Generating system

Business description

Generation mode

1. Fixed assets

Asset warehousing and depreciation

System push

2. Cashier management

Collection and payment business not shared by finance

System push

3. Salary management

Wage accounting

System push

4. Cost management

Expense reimbursement, settlement payment, transaction payment and transaction listing

System push

5. Project integrated management system

Project labor cooperation, materials, equipment, weekly material cost accounting

System push

6. General ledger

Write off correction, accrual carry forward business, amortization of intangible assets, financing

Manual

Fig. 1 System generated voucher proportion chart

After the implementation of the project integrated management system, all the cost data are input by the business side, and arrive at the financial end according to the unified rules, so as to realize the integration of industry and finance, realize the automatic collection and flexible allocation of the cost, and the cost data is more authentic and reliable, and the enterprise cost management personnel can better grasp the project cost situation, It is very helpful to improve the management efficiency.

4.2 Information Performance Management The performance appraisal of the organizational units of our company has the following indicators: key performance indicators KPI, work objective setting indicators. Our company adopts the method of key performance indicators for performance management, which can make the organizational unit clear the responsibilities, and transfer the responsibility to the internal personnel of the unit, quantify the work of the personnel in the unit, and help the organizational unit to achieve the annual goal and help the enterprise to carry out practical performance management. Compared

942

Z. Qiu

with the key performance indicator method, the work goal setting method is a performance evaluation method which can assist KPI to play a role when it is suitable for the organization unit to carry out long-term business projects. The key of the work objective setting method is to determine the work objectives of the organization unit before carrying out the long-term project. The setting of the work objectives needs to be discussed and decided by the leaders and employees of the unit. This helps to mobilize the enthusiasm of the internal staff of the unit. After the project is completed, the management will evaluate the performance of the organizational unit according to the completion of the work objectives. Our company stipulates that different organizational units have different index weights, and the index weights determined by the sub units responsible for different business types in the same unit are also different. The value of the weight depends on the extent to which the functions of the organizational unit create value for the enterprise. The performance indicators and weight ranges of some organizational units of our company are shown in Fig. 2. Our company helps to lead the enterprises in the whole supply chain to carry out information construction and promote the common progress of enterprises in the supply chain. Through the formation of our company’s fund management and control platform combining bank and enterprise, we can help other enterprises to build a qualified supply chain transaction management system, accelerate the construction of enterprise information system and optimize the overall supply chain. It not only improves the enterprise resource integration ability of our company, but also strengthens the cost control ability of our company. What’s more, through the informatization promotion of the whole industry supply chain, we can realize the profound sharing of the transaction information data of the supply chain, improve mutual trust, reduce the uncertainty of the upstream and downstream of the supply chain to a certain extent, and contribute to the healthy and stable development of the whole supply chain.

Fig. 2 Evaluation index and weight range of organizational unit

Application of Information Technology in Economic Management

943

5 Conclusions Today’s society is the era of big data society, enterprise management has gradually realized the importance of data for enterprises, whether in budget management or in other aspects of enterprise operation. This paper collects the company’s information related to cost management and information construction, understands the relevant actual business and system process, understands the enterprise’s information construction and cost management module application status, and also communicates with Kingdee company’s personnel responsible for the company’s system development, so as to better grasp the actual situation and relevant knowledge. Starting from the basic situation of our company, this paper introduces the basic situation of the research object and the overall design of management informatization. From two aspects of cost accounting and performance management, the specific module and implementation process of informatization of our company are detailed, and the achievements are summarized and evaluated. The case study of our company provides experience and Enlightenment for the development of Chinese enterprises.

References 1. Sievidova, I.A.: Factors affecting the economic management efficiency of agricultural enterprises in Ukraine. Prob. Perspect. Manag. 15(2), 203–210 (2017) 2. Singh, A., Singh, R., Rag, A., et al.: Economic management and analysis of potato cultivation: a case study of Agra district (U.P), India. Int. J. Curr. Microbiol. Appl .Sci. 8(2), 525–530 (2019) 3. Fan, J.: Cost control innovation strategy in the economic management of marine construction. J. Coastal Res. 107(sp1), 117 (2020) 4. Abdelalim, M.F., Fahmy, M.: On the alliance of urban economic management in heritage zones: the case study of Rosetta houses. Egypt. Int. J. Appl. Eng. Res. 12(21), 11261–11267 (2017) 5. Nan, F., Xiao, R., Zhang, J., et al.: An analysis of economic management model using operations research. Agro Food Ind. Hi Tech 28(1), 3329–3332 (2017) 6. Li, H.X., Zhao, J.N., Ma, S.M.: Research on the way of rural economic management under the background of informationization. Agro Food Ind. Hi Tech 28(1), 1270–1274 (2017) 7. Zhao, X.: A research on innovation model of regional economic management based on market economy. Rev. De La Fac. De Ing. 32(11):129–136 (2017) 8. Li, T.: The functional research and model analysis of the social economic management in contemporary education. Agro Food Ind. Hi Tech 28(1), 1385–1389 (2017) 9. Hu, C.: Models and methods for interval-valued cooperative games in economic management. Comput. Rev. 58(8), 471–472 (2017) 10. Ma, S.M., Li, H.X., Zhao, J.N.: Research on economic management based on cost benefit analysis theory. Agro Food Industry Hi Tech 28(1), 1280–1284 (2017)

Data Analysis of Marketing Development Status Under the Background of Big Data Yishu Liu

Abstract For the past few years, thanks to the booming development of mobile Internet and big data, the combination of mobile Internet and big data technology has created a new mobile Internet precision marketing method. However, because the technology is so imperfect, although many enterprises have applied the technology for marketing, there are still many deficiencies. Therefore, put forward the data analysis research of marketing development status in the era of big data. The author investigated and studied the current situation of mobile Internet marketing in the context of big data, and analyzes the problems existing in the current mobile Internet precision marketing and the reasons behind the problems. In consideration of these disadvantages, this paper further proposes the optimization and improvement strategy. The optimization strategy can adapt to the majority of enterprises, reduce capital investment at the same time, and enhance of internet marketing. Finally, in order to verify the actual effect of the optimization measures in this paper, a comparative experiment was conducted on 100 enterprises involved in mobile internet marketing. Through the research of the comparison results, the success rate of the optimized mobile internet marketing strategy has been greatly improved compared with the traditional way, and the marketing success rate has been effectively improved. Keywords Big data technology · Mobile internet · Precision marketing · Data analysis

1 Introduction The combination of mobile communication and Internet has created today’s mobile Internet era. In the information age, a lot of information data are produced all the time [1–3]. In this context, the change of data information receiving, obtaining and sharing channels has subverted the traditional marketing mode of enterprises. The Y. Liu (B) School of Economics and Management, Fuzhou University of International Studies and Trade, Fuzhou 350202, Fujian, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_116

945

946

Y. Liu

traditional enterprise marketing mode cannot adapt to the development mode of enterprises in the new environment, so it needs to be changed and innovated. In terms of enterprise development, accurate enterprise marketing mode can broaden the development channels, and improve the core competitiveness of enterprises [4, 5]. For the past few years, because of the advent of the information age, mobile phone and third-party electronic mall, e-commerce has been integrated into all aspects of China. With the rapid development of national e-commerce, China’s e-commerce marketing has made great progress, but also faces a severe challenge [6, 7]. Under the impact of the international financial crisis, China’s total import and export volume and trade volume are growing, and the growth rate of domestic consumption and even GDP has dropped significantly. Multiple pressures make the development prospect of China’s e-commerce not optimistic. In the meantime, the application of big data in China’s politics, economy, culture, society and other aspects makes China’s ecommerce development face more choices and greater uncertainty. In the era of big data, we should consider how to make appropriate adjustments or even changes to the mobile internet marketing according to the changes of the external environment and the existing problems. Therefore, it is very important to study the development status of mobile internet marketing of enterprises in the information environment [8–10]. This paper makes an in-depth investigation and Research on the current development of mobile internet marketing. Through the analysis of the survey results, it is concluded that most of the enterprises in China have not established scientific management concept in mobile internet marketing, and there are some factors such as insufficient policies and related technologies, which lead to the situation of low efficiency and high cost of mobile internet marketing in China. In the research, in view of the shortcomings of the existing marketing methods, the characteristics of mobile Internet and big data technology were transformed and upgraded, and the optimization measures for the traditional marketing methods were proposed. The measures effectively avoid the shortage of resources and technology. Through the field survey of 100 enterprises involved, the analysis results show that using big data technology for mobile Internet precision marketing can effectively improve the marketing success rate of enterprises and enhance the competitiveness of enterprises.

2 Big Data and Mobile Internet Marketing 2.1 Big Data Era Although big data is closely related to “massive data” and “large-scale data”, its concept is relatively broad, abstract and fuzzy. At present, it can be regarded as “the data collection whose content cannot be captured, managed and processed by traditional software tools in a certain period of time”. IBM believes that big data has five V characteristics: large volume, speed, diversity, value and accuracy. In the

Data Analysis of Marketing Development Status Under …

947

global scope, this technology has been widely used in natural science, social science, environmental ecology, finance, communication information and other aspects, its huge impact can not be ignored.

2.2 Current Situation of Mobile Internet Marketing Mobile network marketing, from the initial SMS, MMS marketing to wechat, APP marketing, has developed rapidly, and the number of marketing means is amazing. However, small and medium-sized enterprises are still in the initial stage of Internet marketing, but the enthusiasm of mobile enterprises to participate in Internet marketing is still in its infancy. Enterprises are based on their own characteristics and characteristics to develop their marketing strategies, and even powerful enterprises have developed apps for themselves, striving to stand out in the mobile internet marketing competition. At this stage, big data has brought great impact on mobile marketing. However, some enterprises still use the traditional mobile marketing mode in the process of mobile marketing, which leads to the lag of their internal mobile marketing strategies, modes and means.

3 Comparative Experiment of Marketing Effect Between Big Data Precision Marketing and Traditional Marketing In this paper, through the way of experimental comparison, we have a certain understanding of the current situation of mobile internet marketing. By connecting with the relevant content of the core concept, we can guide the formulation of mobile internet marketing strategy based on the background of big data, It has improved the success rate of mobile internet marketing, but also improves the brand effect of enterprises. In this paper, 100 mobile Internet enterprises in a city conducted a comparative experiment. In order to ensure the objectivity of the experiment, 100 enterprises were divided into groups. The same type of business of the same enterprise is divided into the experimental group and the control group. The experimental group adopts the big data analysis precision marketing method, while the control group uses the traditional mobile internet marketing method. A total of 20,000 times of statistical analysis were conducted in the experiment, including 10,000 times in the control group and 10,000 times in the experimental group. Through the statistics of docking success number, marketing success number and marketing success rate, the results are analyzed. We can see that the number of successful docking, the number of successful marketing and the success rate of marketing in the experimental group with big data analysis are significantly higher than those in the control group. This paper analyzes that this is mainly due to the traditional mobile internet marketing strategy does not effectively

948 Table 1 Comparative experiment results of big data marketing and traditional marketing

Y. Liu Experience group

Control group

Number of experiments 10,000

10,000

Number of successful docking

3145

7542

Marketing success

2481

163

Marketing success rate

32.9%

5.18%

grasp the precise customers, which wastes human and material resources, but also delays business opportunities (Table 1).

4 Discussion 4.1 Analysis of Mobile Internet Marketing Deficiency Based on Big Data Big data not only means huge amount of data, but also means that there are many kinds of data, complex structure and extremely fast changing speed. One of the biggest challenges faced by enterprise management decision-making is no longer the lack of data, but too much data. In the face of these static, isolated, and not too many data that the information disclosure person means “primary products”, the enterprise information department needs to find valuable data through the system function to provide decision support for the company’s marketing management. At present, most enterprises are lack of relevant data analysis and processing talents, which makes them unable to accurately obtain the accurate information related to enterprise marketing in the first time, or cannot effectively analyze and predict the industry trends after obtaining the relevant information, which eventually leads to serious setbacks in the fierce market competition. In network marketing, enterprises should not only be good at helping big data, but also pay attention to their own protection to avoid data leakage. However, in the era of open use of big data, in the stage of data mining for customers, when consuming a sample, people’s browsing page has been locked, and enterprises will bring these users into the target customer group. When using big data to discover network resources, enterprises should protect their own marketing data, pay attention to protect users’ personal information, and avoid the loss of customer information resources or the theft of personal privacy information, which will bring serious disadvantages to users and themselves and cause adverse consequences. On the one hand, enterprises are also faced with the problem of big data self-protection. According to the statistical results in Fig. 1, among the 100 surveyed enterprises involved in mobile internet marketing, less than half of the enterprises have technical support or talent training plan for big data network marketing, only 37 enterprises,

Data Analysis of Marketing Development Status Under …

949

project

Technical support plan

36

Talent training plan

22

25

technical support

personnel training

12

statistics (%)

Fig. 1 Investigate whether there is talent training and technical support in enterprises

which show that enterprises generally do not attach great importance to technological innovation. However, in statistics on whether there are plans for personnel training or the establishment of technical support teams, the proportion has increased slightly, but still less than 60%. This paper analyzes that this is mainly due to the fact that big data technology has not been fully popularized. The establishment of personnel training and technical support team will increase a lot of expenses, which shows that the current technology cost is too high. If the cost is too high, cooperation or government subsidies can be adopted. It is suggested to establish a government enterprise communication mechanism. In addition, in order to further understand the current development status of mobile internet marketing in China, this paper continues to investigate the difficulties encountered by enterprises in implementing big data precision marketing, and conducts ranking statistics. According to the survey results in Fig. 2, the biggest difficulty faced by enterprises is the lack of technical team, accounting for 89%, followed by the shortage of funds, accounting for 72%. In addition, such as policy support, product creativity also accounts for a large proportion. This paper analyzes that the big data mobile internet marketing involves many aspects and needs to be coordinated in many aspects. While continuously enhancing its own strength, the government should also give more support and introduce preferential policies for enterprises.

950

Y. Liu

89

statistics (%)

72 63 57

technical support

lack of funds

policy support

product creativity

project

Fig. 2 Statistical analysis of difficulties in mobile internet marketing of enterprises based on big data

4.2 Development Trend of Mobile Internet Marketing Under the Background of Big Data Reasonable use of big data and big data technology to integrate, adjust, optimize and upgrade the traditional marketing strategy is the trend of mobile internet marketing, which is essentially the beginning of big data marketing. The way out for enterprises lies in attracting foreign talents together with the government, cultivating local talents, building high-quality marketing team, collecting, analyzing and mining big data combined with big data and “digital body language” of customers, so as to form a customer perspective, establish a dynamic prediction system for customers, predict customer demand, adjust product functions or develop new products, so as to realize “private tailor-made”. Using network big data modeling and analysis, we can find and screen channel partners with good credit, great potential and strong ability, extend the enterprise’s tentacles, and reduce the cost and risk of products in the circulation process. Keep close contact with consumers all the time. Through the comprehensive analysis of database customer information, age structure, gender ratio and other characteristics, we can make more accurate positioning of consumer consumption characteristics and consumption ability, and adopt various advanced network technologies to communicate with consumers one-to-one, so as to formulate a strategy with strong implementation and key promotion.

Data Analysis of Marketing Development Status Under …

951

4.3 Mobile Internet Marketing Optimization Measures Under the Background of Data Age (1)

(2)

(3)

Promote the intelligent progress of exhibition enterprises In the era of big data, enterprises should change the marketing mode, realize the value of big data technology applied to enterprise development, reflect the advantages of data analysis technology and promote the development of enterprises. Technology and Format Develop Together In the process of enterprise development, we should keep pace with the times, improve data utilization, provide strong data information support for the working mode, management, personnel management and leadership decision-making model of employees, and constantly strengthen data analysis, integration and information acquisition. Building membership system Promote the construction of membership system, recommend threedimensional marketing mode to target customers through data platform, strengthen publicity, promote market research activities, and realize the effective construction of enterprise brand development. The establishment of membership system can establish a stable customer relationship for the development of enterprises, strengthen the transformation of target customers, establish the integrity of enterprises, and then improve the influence of enterprise brand.

5 Conclusions In the analysis of marketing development data, the author makes a deep research on the current situation of network marketing, and understands the difficulties faced by enterprises in carrying out mobile internet marketing through investigation. For these difficulties and deficiencies, this paper creates a new mobile Internet precision marketing model in the form of mobile internet marketing + big data technology. Mainly relying on the characteristics of mobile Internet, such as wide coverage, fast transmission and high efficiency, combined with the data analysis ability of big data technology, it classifies and classifies customer needs, and carries out precise marketing according to customer needs. The research in this paper has achieved ideal results and made a contribution to the research on the development of Internet marketing.

952

Y. Liu

References 1. Yang, J., Qiao, Y., Zhang, X., He, H., Liu, F., Cheng, G.: Characterizing user behavior in mobile internet. IEEE Trans. Emerg. Top. Comput. 3(1), 95–106 (2017) 2. Izquierdo-Yusta, A., Olarte-Pascual, C., Reinares-Lara, E.: Attitudes toward mobile advertising among users versus non-users of the mobile internet. Telematics Inform. 32(2), 355–366 (2015) 3. Roostika, R.: The effect of perceived service quality and trust on loyalty: customer’s perspectives on mobile internet adoption. Int. J. Innov. Technol. Manag. 2(4), 286–291 (2016) 4. Shim, J.P., Koh, J., Fister, S., Seo, H.Y.: Phonetic analytics technology and big data: real-world cases. Commun. ACM 58(2), 84–90 (2016) 5. Alvarez-Dionisi, L.E.: Envisioning skills for adopting, managing, and implementing big data technology in the 21st century. Int. J. Inf. Technol. Comput. Sci. 9(1), 18–25 (2017) 6. Wang, Y., Wu, Z., Bu, Z., Cao, J., Yang, D.: Discovering shilling groups in a real e-commerce platform. Online Inf. Rev. 40(1), 62–78 (2016) 7. Cai, Y., Lang, Y., Zheng, S., Zhang, Y.: Research on the influence of e-commerce platform to agricultural logistics: an empirical analysis based on agricultural product marketing. Int. J. Secur. Its Appl. 9(10), 287–296 (2015) 8. Lee, B.-K.: Internet marketing in the medical industry; challenges and future. J. Korean Assoc. Oral Maxillofac. Surg. 41(6), 291–292 (2015) 9. Caride, J.F.L., Senra, A.I.M.: Marketing en internet: el sector vitivinícola gallego. Rev. De Estud. Regionales 2(73), 107–129 (2015) 10. Zhang, Y.: Analysis of internet marketing strategy based on consumer demand intention. Value Eng. 007(015), 77–78 (2018)

Challenges and Corresponding Strategies of Network Marketing in the Era of Big Data Yishu Liu

Abstract The twenty-first century is the era of information, and network marketing is also one of the most mainstream marketing means. Due to the rapid development of e-commerce, the previous network marketing methods no longer have advantages. Under the impact of capital and scale, technical breakthrough has become an important way to solve this problem. Therefore, this paper puts forward the challenges and corresponding strategies of network marketing. In this paper, combined with the current situation of online marketing in-depth study, analysis that the main problem is the lack of technical information analysis. Therefore, this paper introduces big data technology in the traditional network marketing mode. After analyzing the challenges of network marketing in the era of big data, this paper puts forward the strategies and measures of enterprise network marketing in the era of big data. According to the measures of this paper, the network marketing optimization reform. In order to verify the actual effect of the measures, this paper establishes the relevant investigation and research, and the analysis results show that network marketing with big data can effectively strive for the competitiveness of enterprises and improve the return rate of online marketing. Keywords Network marketing · Marketing model · Big data technology · Strategy analysis

1 Introduction Provides greater opportunities for the development of all walks of life. Through data analysis, it can help enterprises determine the market position, implement effective marketing strategy, and help enterprises obtain more short-term market resources. However, big data processing is not a one-stop process, and enterprises need to study it carefully [1–3]. By analyzing consumer behavior, e-commerce enterprises can better grasp consumer demand and market trends, and reduce sales costs [4, 5]. Y. Liu (B) School of Economics and Management, Fuzhou University of International Studies and Trade, Fuzhou 350202, Fujian, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_117

953

954

Y. Liu

However, many e-commerce enterprises in China do not have much knowledge of big data technology and have a stronger awareness of using big data. They believe that big data technology is not related to enterprise development and network marketing. Therefore, it is difficult to integrate the concept and technology of big data into the marketing strategy, so that the effect of the enterprise on the marketing strategy is very small, and it also hinders the development of the enterprise market [6, 7]. However, there are still many problems. Under the background of the implementation of E-marketing in most enterprises, big data, such as the lack of understanding of big data, the backward network infrastructure, the lack of perfect security mechanism and the lack of professional talents, are all serious problems faced by small and medium-sized enterprises in network marketing [8–10]. This paper makes an in-depth investigation and Research on the current situation of enterprise network marketing, and finds that there are still obvious deficiencies compared with the mature network marketing system abroad. Therefore, this paper puts forward the challenges and corresponding strategies of network marketing in the era of big data. In the process of research, according to the actual situation of China’s enterprise network marketing system, this paper introduces the core concept of big data technology, and establishes a brand-new enterprise network marketing system based on big data technology. Big data marketing can effectively reduce the marketing cost of enterprises, and optimization the overall return rate of marketing while doing a good job in precision marketing.

2 Network Marketing and Big Data Technology 2.1 Network Marketing Network marketing is the most representative marketing mode in the information age. The network environment affects the utilization of social resources and the internal decision-making of small and micro enterprises. The network has the advantages of high speed of information transmission, low cost, wide range of publicity and so on. Therefore, network marketing has become the main marketing mode of many small. Network marketing has brought many opportunities to small and micro enterprises.

2.2 Significance of Big Data Technology in Network Marketing People use data to learn, work, and even play. While using data, people leave it. In the passage of time, data will continue to accumulate, from quantitative change to qualitative change. If we integrate data from different sources, we will find that big data reflects people’s needs and even their preferences in daily life. In the operation

Challenges and Corresponding Strategies of Network Marketing … Table 1 Results of investigation on the main shortcomings of Internet marketing in China

955

Problem

Proportion (%)

Backward marketing means

96

Non precision marketing

87

Information leakage

75

Price war affects product quality

68

process of the company, the big data of the enterprise is obtained by combining the data of sales, marketing, service and supply. Big data has great value.

3 A Questionnaire Survey on the Problems Existing in the Network Marketing of Chinese Enterprises The arrival of big data era for enterprises with vision in various industries is a new opportunity. We should conduct comprehensive market research, actively seize the convenience of big data era, and realize enterprise reform. In this context, the current network marketing activities of e-commerce enterprises in China have experienced many tests, and there are still many problems in the operation. In the design, this paper uses two forms: questionnaire survey and field interview. Select 800 enterprise network marketing related personnel as the survey sample. There are network marketing personnel and enterprise managers among the interviewees. This study is to explore the current situation of the problems existing in China’s enterprise network marketing. In the process of investigation, this paper lists 30 possible problems in the current enterprise network marketing as options, and selects the most typical problems according to these problems, which can be supplemented if not listed. A total of 800 copies were issued and 786 copies were recovered with the recovery rate of 98.3%. Based on the analysis of the survey results, China’s current network marketing is or R & D stage, there are many technical problems, it is urgent to solve the relevant technical development problems (Table 1).

4 Discussion 4.1 Analysis of Advantages of Network Marketing Based on Big Data Technology The establishment of online retailers in China marks the beginning of the application of virtual currency in China. The great prosperity period of e-commerce marketing has begun. The advantages of these marketing forms are as follows:

956

Y. Liu

(1)

Marketing information is widely spread. The combination of marketing information and the Internet, the use of the Internet to spread information. As long as electronic products are connected to the Internet, information can be obtained anytime and anywhere. The marketing comprehensive cost is low, the information dissemination efficiency is high, the dissemination form is more abundant. The cost of publishing information on the Internet is very low and can be spread before the information fails. At the same time, in the network marketing, e-commerce can choose different channels for advertising, which is more convenient compared with the previous marketing methods. Marketing advertisements can be targeted. Through the collection and utilization of big data, enterprises can quickly lock in the effective audience of advertising information, so that consumers with goods or services can quickly and accurately obtain relevant information. People affected by marketing information are widespread and highly concerned. The correct choice of marketing methods can help enterprises better spread marketing information.

(2)

(3)

(4)

From the analysis in Fig. 1, it can be seen that various indicators of enterprise network marketing have changed significantly before and after the adoption. Enterprise network marketing is mainly in a kind of blind, no targeted marketing, the impact on customers is effective, not only the dissemination range is small, the cost Traditional network marketing

Big data network marketing

96

95

statistics (%)

88

47

86

49

47 32

areal limits

cost

Precise delivery

Yield

index Fig. 1 Research on the change of each index before and after the application of big data of network marketing

Challenges and Corresponding Strategies of Network Marketing …

Traditional network marketing

957

Big data network marketing

93

92

statistics (%)

87

68 62

Marketing means

57

Marketing program index

Market research

Fig. 2 Investigation and analysis on the application effect of big data in Internet marketing improvement

is high, and the rate of return is low, the lack of pertinence is the main reason. After using the big data technology for data analysis, it can effectively classify the crowd, carry out advertising and marketing recommendation according to the needs of users, so as to achieve the purpose of precision marketing. From the perspective of yield and index evaluation, big data is more suitable for online marketing. It can be found from the survey results in Fig. 2, Data analysis technology can change very well marketing means, marketing programs, and the construction of market research. This paper believes that this is mainly due to the information integration, which analyzes the needs of users, so as to achieve precision marketing. At present, if we want to do well in network marketing for a long time, we need to focus on technological innovation.

4.2 Challenges of Network Marketing (1)

Consumers’ distrust of the quality of e-commerce products Due to the particularity of network marketing, consumers can not directly contact the real e-commerce products. They can only make a general judgment through the description and pictures of products by e-commerce enterprises. In addition, because the current photos can be forged or copied, most

958

Y. Liu

(2)

people do not believe in the quality of e-commerce products. Even if network marketing means doing well, the e-commerce products that are difficult to be accepted cannot be contacted, which greatly limits the development speed of e-commerce enterprises in factories, and poses new challenges to the means of online marketing. Lack of supervision and management of authoritative institutions

E-commerce enterprises sell on the Internet without the approval of various licenses from the industrial and commercial departments and tax authorities. Ecommerce enterprises only need to register the corresponding virtual shop on the shopping website to carry out sales activities. Therefore, the supervision and management requirements are not very strict, leading to the factory fake marketing and product quality has not been strictly controlled. This will not only destroy the atmosphere of e-commerce industry, but also make people more distrust of e-commerce products.

4.3 Enterprise Network Marketing Strategy and Measures in the Era of Big Data (1)

(2)

(3)

Customer strategy Today, customers like to control their relationship with the business. Online marketing must be a good platform for communication with customers based on interactive mentality. In the development of customer interaction strategy, we should understand and draw the process of customer relationship, starting from the contact between customers and products and services, until customers complete the purchase of products and services and the completion of aftersales services. Data strategy In business activities, it is very important for a company to formulate a comprehensive and accurate data strategy. In order to implement the data strategy, we must ensure that the data strategy covers the whole company, rely on the cooperation of key business departments such as information technology and marketing, and connect the data strategy with the overall business objectives. With big data, enterprises need to integrate the data scattered in various departments. Then an overall strategy needs to be developed to reflect the company’s overall business objectives. Overall strategy Many companies find out the key factors in the process of customers’ purchasing products, focusing on the analysis of customer churn and which interactive factors will lead to customer churn. It is important for small and medium-sized sectors to conduct pilot activities with limited data, and then you need to determine what large technologies can be used to support the pilot project. End users can also understand the analysis ability of big data, optimize

Challenges and Corresponding Strategies of Network Marketing …

959

the cooperation between information departments and end users, and obtain better analysis results.

5 Conclusions Through investigation and research, we have a deep understanding of the current network marketing problems. In view of these deficiencies, this paper puts forward an innovative network marketing optimization. The scheme effectively improves the shortcomings of traditional network marketing, and improves the return rate of network marketing. The research of this paper has achieved ideal results and made a contribution to the research on the challenges and corresponding strategies of E-marketing in the era of big data.

References 1. Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14(1), 21–23 (2015) 2. Xu, W., Zhou, H., Cheng, N., Lyu, F., Shi, W., Chen, J., et al.: Internet of vehicles in big data era. IEEE/CAA J. Autom. Sinica 5(1), 19–35 (2018) 3. Zou, Y., Peng, Y., Deng, L., Jiang, T.: Monitoring infectious diseases in the big data era. Sci. Bull. 60(1), 144–145 (2015) 4. Huda, M., Maseleno, A., Shahrill, M., Jasmi, K.A., Basiron, B.: Exploring adaptive teaching competencies in big data era. Int. J. Emerg. Technol. Learn. 12(3), 68–83 (2017) 5. Liu, X. (2015). Development trend and coping strategies of financing sector in big data era%. Development trend and coping strategies of financing sector in big data era%. Sci. Bull. 60 (5), 453–459. 6. Hiranpong, R., Decharin, P., Thawesaengskulthai, N.: Structural equation modeling of a potentially successful person in network marketing. Kasetsart J. Soc. Sci. 37(1), 22–29 (2016) 7. Zhang, F., Li, S., Yu, Z.: The super user selection for building a sustainable online social network marketing community. Multimedia Tools Appl. 78(11), 14777–14798 (2019) 8. Li, Y, Lei, J., Sun, L., Li, H. (2018). Development strategy and trends of agricultural products network marketing platform of Beijing suburb areas%. Development strategy and trends of agricultural products network marketing platform of beijing suburb areas%. Agric. Outlook 14(10), 81–84 9. Lu, B.: Research on teaching mode optimization of “network marketing” under the “internet+” environment. Jiangsu Sci. Technol. Inf. 36(7), 55–57 (2019) 10. Lu, W.: Study on innovating e-business network marketing strategy for small and medium-sized enterprises. J. Heihe Univ. 9(3), 62–63 (2018)

Design of Kiwifruit Orchard Temperature Information Real Time Acquisition System Zuliang Wang, Chenhui Li, and Shi Zhao

Abstract As a big agricultural country, the application of Internet of things in the agricultural field is not popular. In the next few years, the Internet of things will play a great role in the process of agricultural informatization and modernization, and will have broad application prospects in the agricultural field. The kiwi fruit industry in guanzhong area can use the Internet of things technology, through the use of sensors to sense the orchard temperature, the application of 4G communication module to upload the kiwi fruit orchard temperature data to the cloud, using onenet cloud platform can real-time monitor the orchard temperature on the mobile phone, and use physical means to control the temperature in the best temperature of crop growth, so as to make the fruit farmers in our province to high yield High quality, high efficiency, safety, ecology and intensive development Keywords Zigbee moduleinternet of things · Smart orchard · Wireless communication technology · Onenet cloud platform

1 Introduction The planting area of Kiwifruit in Shaanxi and Sichuan accounts for 68.3% of the whole country, and the output accounts for 94.8%. It is the most important kiwifruit planting and industrial gathering zone in China, especially in Zhouzhi County of Xi’an city and Mei County of Baoji City, which forms large-scale production. Promoting the intelligent development of kiwifruit orchard is an important measure to promote agricultural development with characteristic orchard in Shaanxi Province. However, temperature is the main factor limiting the distribution and growth of kiwifruit. Each variety has a suitable temperature range, beyond which it will not grow well or survive. For example, the annual average temperature of Actinidia chinensis grows well between 4 and 20 °C, while that of Actinidia deliciosa ranges from 13 to 18 °C. The growth and development stages of kiwifruit are also affected Z. Wang (B) · C. Li · S. Zhao School of Information Engineering, Xijing University, Xi’an, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_118

961

962

Z. Wang et al.

by temperature. The research shows that when the temperature rises to about 10 °C, the buds begin to sprout, when the temperature is above 15 °C, it can blossom, when it is above 20 °C, it can bear fruit. When the temperature drops to about 12 °C, it enters the dormant period of deciduous leaves. The whole development process takes about 210–240 days, during which the daily temperature cannot be lower than 10–12 °C. Therefore, in order to improve the yield and quality of kiwifruit, it is very important to monitor and control the temperature [1–4]. After 2000, with the rapid development of science and technology in the world, the updating of hardware equipment is accelerating gradually, the Internet era is coming completely, and the era of Internet of things is gradually coming. Our country’s temperature measurement and control is also developing by leaps and bounds, from the beginning of learning applications to today’s R & D applications. But in terms of technology, there is still a long way to go compared with other countries such as Europe and the United States. Our country’s temperature collection is still in the individual sporadic situation, far from reaching the industrial level. There are still many problems in the operation of various industries. There are some limitations in the application and use of the current temperature real-time acquisition system in the market. The designed temperature acquisition system uses temperature sensor, Arduino processor, 4G communication module, and is connected to onenet platform. The temperature change of kiwifruit orchard can be detected clearly anytime and anywhere, so that farmers can make real-time adjustment for the growth of kiwi fruit. The temperature acquisition system is widely used in agriculture and other fields [5, 6].

2 System Design The kiwi fruit orchard temperature information real-time acquisition system is mainly composed of the following four modules: processor module, sensor module, wireless network communication module and power module. The system architecture is shown in Fig. 1. As a sensor module, the temperature sensor is connected with the Arduino UNO R3 development board, and the temperature sensor is placed in the kiwi fruit orchard,

Temperature sensor Arduino UNO R3 Humidity sensor

Fig. 1 System module diagram

4G wireless communication module

Onenet cloud

Design of Kiwifruit Orchard Temperature Information Real Time …

963

it is used to collect temperature information, and then transmit the temperature information to Arduino processor. Arduino processor processes, converts and packs the collected temperature information. It connects with onenet platform of China Mobile Internet of things through 4G wireless network module, uploads temperature data by HTTP protocol, and the temperature sensor begins to collect temperature data. Using Arduino uno R3 development board, Arduino can carry sensors to monitor the surrounding environment information, such as infrared sensor, pressure sensor, etc., and then change the external environment by controlling the mounted equipment such as motor, buzzer and led. Arduino programming language and Arduino development environment are used to write Arduino program. USB download cable can be used to directly enter the new program to burn bootloader through Arduino ide. The microprocessor controller can be directly connected with sensors and other electronic components, and the operation is easy and simple [7–10]. DHT11 temperature and humidity sensor is used to collect temperature and humidity information. It is a temperature and humidity sensor with calibrated digital signal output. The accuracy humidity of DHT11 is ± 5% RH, the temperature is ± 2 °C, the range humidity is 20–90% RH, and the temperature is 0–50 °C. DHT11 contains two components, a resistance humidity sensor and a NTC temperature sensor, which are connected with an 8-bit MCU. DHT11 digital temperature and humidity sensor adopts special digital module acquisition technology and temperature and humidity sensing technology to ensure high reliability and stability of the product. The 4G wireless network module is sim900a wireless communication module. The onboard sim900a module has MMS function. Sim900a module is an industrial dual band GSM/GPRS module of simcom company: sim900a, working frequency band: 900/1800 MHz, which can realize the transmission of voice, SMS (short message, multimedia message), data and fax information with low power consumption. The module supports RS232 serial port and LVTTL serial port, and has hardware flow control. It supports the ultra-wide working range of 5–24 V, which makes it very convenient to connect with your products. Onenet is an open platform of PAAS Internet of things built by China Mobile. Users can realize a whole set of functions of Internet of things through the platform, including equipment access, device connection, and then complete the product development. Onenet cloud platform has been applied in various fields of society, providing a reliable platform for the realization of the new era of Internet [11–14]. The specific working process of the system is as follows: the temperature sensor starts to collect the surrounding temperature data; the processor formats the temperature data, encapsulates it into JSON format, and then packages it into TCP packets, which are sent to the Onenet Internet of things platform through 4G wireless network module.

964

Z. Wang et al.

Fig. 2 Temperature and humidity detection results

Fig. 3 The temperature line chart of onenet cloud platform

3 System Function Test The collected data information displayed on the serial port monitor is shown in the Fig. 2. The line chart of collected temperature data displayed on the web page is shown in the Fig. 3. It can be seen from the Fig. 2 that the temperature and humidity of the detection results are 26 °C and 71%, respectively. It can be seen from Fig. 3 that the temperature change value at different times on the same day, and the temperature variation range on March 7 is between 22 and 23 °C. The platform can display 30 data. Through the cloud platform, the temperature values at different times can be queried, which is convenient for fruit growers to analyze. Figure 3 the temperature line chart of onenet cloud platform can also log in to onenet cloud platform through mobile phone to intuitively detect the temperature and its change, as shown in Fig. 4. It can be seen intuitively from the Fig. 4 that the current temperature is 27°, with strong visibility. It seems to be consistent with Fig. 2.

4 Conclusion Kiwi fruit orchard temperature information real-time acquisition system realizes the use of sensors to sense the orchard temperature, the application of 4G communication

Design of Kiwifruit Orchard Temperature Information Real Time …

965

Fig. 4 The onenet cloud platform temperature pointer

module to upload kiwi fruit orchard temperature data to the cloud, using onenet cloud platform can real-time monitor the orchard temperature on the mobile phone, and use physical means to control the temperature at the optimal temperature of crop growth, which has strong practicability. Acknowledgements The work was financially supported by science and technology achievements transfer and promotion plan project of Shaanxi Provincial science and technology department (Program No. 2020CGXNG-035), Xi’an Science and technology plan project of Shaanxi Province (Program No. 2019218414GXRC020CG021-GXYD20.6) and Key Research and Development Plan Project of Shaanxi Provincial Science & Technology Department (Program No. 2018ZDXM-NY-014).

References 1. Xu, B., Wang, J., Cao, J.: Design and implementation of temperature, humidity and wind speed information acquisition system based on Internet of things. LCD Display 31(10), 936–942 (2016) 2. Chen, J., Hu, K., Wang, W.: Design of plant growth environment information acquisition module. Electron. World 22, 156–157 (2017) 3. Yao, Z., Liu, T., Liu, S., Deng, G., Wu, W., Sun, C.: Design and experiment of farmland information collection vehicle. Crop society of China. Abstracts of the academic annual meeting of China crop society in 2019. Crop Society of China: Crop society of China, vol. 1 (2019) 4. Li, Z., Guo, Y.: Design of agricultural environment acquisition system based on Internet of things. Plateau Agric. 3(5), 566–570 (2019) 5. Tian, E., Zhu, F., Zhang, Y., Ma, H.: Improved design of farmland soil information collector based on DSP. Agric. Mechanization Res. 42(6), 216–219 (2020) 6. Jin, E., Chen, P.: A temperature and humidity detection system for intelligent greenhouse. Digital Technol. Appl. 37(7), 85–87 (2019) 7. Li, Y.: Design of Intelligent Greenhouse Environmental Information Monitoring System. Tarim University (2019) 8. Cui, Y.: Design and Implementation of Agricultural Product Information Collection System Based on ZigBee and QT. Jilin University (2019)

966

Z. Wang et al.

9. Jiang, Z.: Design and Implementation of Information Acquisition System Based on Nb IOT. Southeast University (2019) 10. Chen, Y.: Design of environmental monitoring system based on STM32. Electron. Des. Eng. 27(2), 160–165 (2019) 11. Duan, J.: Research on digital farmland information monitoring system based on Internet of things technology. Qingdao University of Technology (2018) 12. Long, G.: Design of wireless temperature and humidity monitoring system based on ZigBee. Modern Electron. Technol. 41(12), 36–39 13. Xue, C.: Design of Remote Monitoring System for Greenhouse Based on Embedded System. Harbin University of Technology (2018) 14. Yan, S.: Design and Implementation of ZigBee Temperature and Humidity Control System with Positioning Information. Guizhou University (2018)

Design of Fruit Florescence Tracking and Classification Management Based on RFID Shaofei Wang, Zuliang Wang, and Chenhui Li

Abstract In order to solve the problems of fruit farmers planting all kinds of fruit crops, there are some problems, such as inappropriate time node of fruit preservation and thinning drugs after flowering period, repeated blind use of drugs, heavy workload of fruit grading and difficulty of consumers and purchasers to grasp the true information of fruits. The paper designs a fruit flower period tracking and classification management system based on RFID. It obtains information through UHF handheld RFID reader. The data storage part transmits the information to the background to realize data analysis and sharing, which is convenient to remind fruit farmers to carry out relevant operations at the right time and improve fruit production. The system has the advantages of simple operation, low cost, stable and easy operation. Keywords Flowering period · Fruit preservation · Fruit thinning · RFID reader

1 Introduction On April 20, 2020, the China Agricultural Outlook conference was held in Beijing by live video. The conference released the “China’s Agricultural Outlook report (2020– 2029)” to forecast and analyze the production, consumption and trade situation of China’s major agricultural products in the next 10 years. Through the investigation, it is found that the current fruit growers basically adopt the way of manual operation for fruit preservation and thinning. At present, the fruit setting rate of fruit trees is generally very low, most of them are below 10%. For example, Hangman orange is generally only 2–3%, and the yield of high-yield orchard per mu is only about 10%; apple is generally less than 10%, and only some varieties with high yield can reach more than 40%. If the fruit setting rate of citrus can be increased by 2–3% and apple by 10%, the yield of fruit trees can be doubled in the original area, Flower and fruit conservation is the central issue of fruit tree production in China. Under the current S. Wang · Z. Wang (B) · C. Li School of Information Engineering, Xijing University, Xi’an, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_119

967

968

S. Wang et al.

fruit cultivation conditions, it is the concentrated expression of the specific application of agricultural “eight character constitution” in fruit tree cultivation. In particular, the time of fruit flowering is not uniform, which leads to the wrong and blind use of drugs by most fruit growers. In order to further improve the development of agriculture, a fruit florescence tracking and classification management system based on RFID was designed [1–4].

2 System Design The fruit florescence tracking and classification management system based on RFID is composed of fruit, fruit handle, strap, label, UHF handheld RFID reader, big database, data analysis and sharing module. The principle block diagram is shown in Fig. 1. The fruits involved mainly include grape, kiwifruit, strawberry sweet peach and other agricultural and sideline products. The common characteristics of fruits are that these fruits have fruit stalks in the flowering and fruiting period, and it is difficult to grade the fruit quality [5].

Wireless transmission

Fruit stalk

labels

UHF handheld RFID reader

Wireless transmission

Big database Fruits

Data storage module

Data analysis and sharing module Fig. 1 System module diagram

Design of Fruit Florescence Tracking and Classification …

969

Bandage is a kind of special binding belt for fruit stalk, which has strong ductility and corrosion resistance. The package of the label adopts IP68 protection grade, which has the characteristics of high temperature resistance, and the working frequency range is 860–960 MHz. The storage capacity is epc512bit, using iso18000-6c standard [6]. The UHF handheld RFID reader adopts R2000 module, which has the characteristics of multi tag reading and writing. The long-distance reading and writing distance can reach about 0–8 m. It adopts the advanced Android operating system, which runs smoothly and has good stability [7]. The bandage attaches a label to the top of the fruit stalk, and the label is used to record the information of flowering node and fruit grade. UHF handheld RFID reader reads the tag information and compares it with the data storage module established in advance, so as to confirm the status of fruit florescence and fruit grade. The data storage module transmits the information to the data analysis and sharing module to further analyze and share the information. The system is designed to solve three problems: fruit growers, when planting all kinds of fruit crops, are not suitable for the use of fruit preservation and thinning drugs after flowering; fruit growers have a lot of work on fruit grading, which leads to confusion of fruit grading in fruit sales market; and the problem that consumers and buyers are difficult to grasp the true information of fruits [8–10].

3 System Application The big database is one of the highlights of this design, which not only involves farmers, but also provides a good platform for consumers and buyers to obtain real information. Big database is divided into two modules, namely data storage module and data analysis and sharing module [11–14]. Data storage module function: store information, provide more convenient information statistics platform for farmers, and further optimize the work efficiency of farmers. There are three types of tags for storing information. Class A label: (information record of flowering node). On time node 1 (package color is red, serial number: 1–100,000). Half open time node 2 (package color is white, serial number: 100,001–200,000). Open time node 3 (color of package shell is black, serial number: 200,001– 300,000). Class B label: (classification of fruit grades). First class fine fruit (package with 1 red cross handle, serial number: 300,001– 400,000). Second class defective fruit (package mark: 2 pieces of red cross handle, serial number: 400,001–500,000). Class C label: (classification of fruit maturity grade).

970

S. Wang et al.

Maturity level 1: fully ripe (package shell mark is 1 red star, serial number: 500,001–600,000). Maturity level 2: half-ripe (package shell marked with 2 red stars, serial number: 600,001–700,000). Maturity level 3: is mature (package shell mark is 3 red stars, serial number: 700,000–800,000). There are three functions of data analysis and sharing module. Function one: to provide consumers with real fruit information. The information includes two aspects: (1) fruit state parameters in recent years (size, weight, grade, mature picking time, producing area and inventory time); (2) recommended retail price in recent years. Function two: provide real fruit information for fruit buyers. The information includes three aspects: (1) sales price trend chart of various fruits in specific producing areas in recent years; (2) output and sales trend chart of fruits in specific producing areas in recent years; (3) fruit quality parameters in recent years (size, mature picking time, origin and yield). Function three: it provides a lot of valuable information for researchers who are engaged in the relationship between flowering node, fruit preservation, fruit thinning and fruit setting rate. The information content includes three aspects: (1) through data analysis, we can generate the original data relation diagram of fruit specific origin, specific flowering node and flowering time in recent years; (2) the data analysis and sharing module can obtain the original data scatter diagram of the number of fruit preservation and thinning corresponding to the specific flowering node of local fruit from the data storage module, And the line chart of original data of fruit preservation and thinning in recent years. (3) Through the data analysis, the original data trend chart of fruit setting rate of specific producing areas in recent years can be generated.

4 Conclusion RFID based fruit florescence tracking and classification management system can provide fruit growers with good reference resources when planting all kinds of fruit crops. It can avoid improper time nodes of fruit preservation and thinning drugs after fruit blossom, fruit growers have a large amount of work for fruit grading, confusion of fruit grading in fruit sales market, and true trust of consumers and buyers for fruits The three problems that are difficult to grasp have played a certain role in promoting the development of modern information agriculture. Acknowledgements The work was financially supported by science and technology achievements transfer and promotion plan project of Shaanxi Provincial science and technology department (Program No. 2020CGXNG-035) , Xi’an Science and technology plan project of Shaanxi Province (Program No. 2019218414GXRC020CG021-GXYD20.6) and Key Research and Development Plan Project of Shaanxi Provincial Science & Technology Department (Program No. 2018ZDXM-NY-014).

Design of Fruit Florescence Tracking and Classification …

971

References 1. Zhao, X.: Research on object recognition and processing system based on RFID and image processing. Agric. Mechanization Res. 43(4), 42–46 (2021) 2. Guo, J., Li, Y.: Research on RFID based fruit packaging and automatic distribution system. Agric. Mechanization Res. 42(10), 251–254 (2020) 3. Chen, H.: Research on Quality and Safety Traceability System of Hengyang Zhuhui Grape Based on RFID. Central South University of Forestry Science and Technology (2019) 4. Li, Y.: Research on Fruit Gas Sensor with Saw Electronic Tag. Dalian Jiaotong University (2016) 5. Long, L.: Research on RFID Based Fruit Safety Traceability System. Wuhan University of Technology (2016) 6. Wang, D.: Technology and Device for Quality and SAFETY traceability of Navel Orange Based on Large Flux Classification system. Zhejiang University (2015) 7. Peng, B., Huang, J., Meng, X., Xie, Q.: Intelligent scheduling and monitoring management information system for Lingnan Characteristic Fruit Cold Chain Logistics. Mod. Agric. Equip. (3): 61–66 + 73 (2014) 8. Hu, L.: Application of RFID and wireless network technology in agricultural product supply chain. Mod. Commer. (12), 48 (2014) 9. France Auchan uses RFID technology to track cargo frames. China business daily, 2012-03-13 (A03) 10. Wang, L., Chen, X., Huang, B., Jin, W.: Information management in low carbon logistics of tropical characteristic fruits. Agric. Mechanization Res. 33(7), 243–246 (2011) 11. Xu, L.: Research on key technologies of quality and safety traceability system for subtropical fruit products based on web. Comput. Eng. Des. 32(4), 1174–1177 + 1189 (2011) 12. Tan, W., Liu, X., Chen, Y., Ren, B.: An implementation framework of logistics resource service based on RFID. Electromechanical Eng. Technol. 49(2), 8–11 + 174 (2020) 13. Meng, Y.: Research on the application of RFID technology in warehousing and logistics automation technology in the new era. Natl. Circ. Econ. 35, 19–20 (2019) 14. Zhang, S.: Research on RFID Tag Identification Reliability Technology in Internet of Things System. Beijing University of Posts and Telecommunications (2019)

Design of Automatic Intelligent Water Saving System for Faucet Ting Zhang, Lianglin Li, Mengjie Wang, and Binxin Wang

Abstract With the continuous development of human society and economy, fresh water resources are increasingly scarce, and the protection of water resources is becoming more and more important. An intelligent water saving system based on MCU is proposed. The system consists of Arduino development board, water level sensor, ZigBee module, relay and water pump module. The water level sensor is used to collect the water level information, and the collected information is sent to Arduino development board in the form of electric signal. The development board processes the information sent by the sensor, compares the processing results with the preset threshold value, and sends the signal of starting or closing the pump to the control terminal through ZigBee module, so as to realize the intelligent water storage in unattended environment. The aim is to effectively save water resources in daily life and improve the utilization rate of water resources. Keywords Water level sensor · Smart Faucet · Arduino · Zigbee module

1 Introduction Faucets are widely used in people’s daily life. Not only are faucets installed in every household, but also in public places. However, when using water taps to store water for a long time, due to the long storage time, manual monitoring is needed, and a little carelessness will cause waste of water resources. With the rapid development of science and technology, the Internet of things has become an emerging industry of national strategy and is in the core field of information industry development. Under the third wave of world information industry, we should use modern scientific and technological means to achieve the purpose of water saving. The automatic watersaving system of intelligent faucet can automatically shut down when it detects that the water storage position of the container reaches the set value, which can effectively eliminate the waste of water resources, and can complete the water storage without T. Zhang (B) · L. Li · M. Wang · B. Wang School of Information Engineering, Xijing University, Xi’an, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_120

973

974

T. Zhang et al.

the special person’s care, which greatly liberates the labor force. Especially in some production lines which need to use a fixed amount of liquid, the application of intelligent water-saving automatic control faucet can improve the production speed and quality [1–3]. The development of intelligent faucets is very rapid. There are various intelligent faucets on the market, such as universal faucets, voice controlled faucets, light controlled faucets, etc. However, there are not many high-tech faucets, and high-tech products have always been the goal of people’s life and work, just like from the blackand-white TV before to the LCD TV, from the previous manual bowl washing to the present bowl washing machine and other intelligent home machines, all of which reflect people’s pursuit of high-tech products. Therefore, the development road of intelligent faucet will be wider and wider, with broad development prospects [4–8].

2 System Design The intelligent faucet water-saving system is mainly composed of the following modules: the sensor end composed of liquid level sensor, Arduino and ZigBee modules, and the controller end composed of water pump, Arduino and ZigBee modules. The system module diagram is shown in Fig. 1. According to the functional requirements of intelligent water-saving system, Arduino uno R3 development board is adopted. The water level sensor used is telesky liquid level sensor module. By analyzing the collected water level information, different signals are converted and transmitted. The sensor head is smooth, easy to clean, and the accuracy is better than the float type liquid level switch. The controllable accuracy is within 0.5 mm. However, the current float type liquid level switch has a precision of 3 mm. Because of the optical principle, there is no friction and other mechanical moving parts, and the service life is greatly increased [9–13]. Water pump is to transport liquid or pressurize the liquid machinery. It transfers the mechanical energy or other external energy of the prime mover to the liquid so

Water level sensor

Water pump module

Relay module

Fig. 1 System module diagram

Arduino sensor terminal

Arduino control terminal

ZigBee module

ZigBee module

Design of Automatic Intelligent Water Saving System for Faucet Fig. 2 The flow chart of sensor end

975

Start Y

Is the water level data above the threshold? N

Initialization Assign "on" to string variable str Collect water level data

Assign "off" to string variable str

Send str to Zigbee module through serial port

as to increase the energy of the liquid, which is mainly used for conveying liquid, including water, oil, acid and alkali liquid, emulsion, suspending emulsion and liquid metal. Using 385 water pump, this is a small motor driven water pump. With the help of relay, it can realize the switch of faucet and water flow control. The wireless communication module is ZigBee module, and dl-20 wireless serial port module can be configured for point-to-point mode and broadcast mode. The point-to-point mode is divided into a-end and b-end. The data sent by a-end serial port will be received by b-end serial port, and vice versa. In the system, telesky liquid level sensor module, Arduino uno R3 and dl-20 ZigBee wireless communication module are used as sensor module end, water pump, Arduino uno R3 and dl-20 ZigBee wireless communication module are used as controller module. The sensor end and control end are connected through ZigBee wireless network. The flow chart of sensor end is shown in Fig. 2. When the water level sensor starts to collect data, Arduino will judge whether the collected data is higher than the threshold value. If so, it will assign the string “K” to the preset string variable STR, otherwise, assign the string “g”, and then send the data in the string variable STR to ZigBee. The ZigBee module at the sensor side will send the control command to the ZigBee module on the controller side through wireless channel.

3 System Function Test The physical diagram of the system is shown in Fig. 3. To test the system, the serial port monitor is used to display the data received by the sensor. When the liquid level sensor is exposed to the air, the analog data information displayed on the serial port monitor is shown in Fig. 4. Put the liquid level sensor into the water, and the analog data information displayed on the serial port monitor is shown in Fig. 5. The output of liquid level sensor is analog quantity, the value is about 3 mV when the liquid level sensor is exposed to the air; the value is about 7 mv when the liquid

976

T. Zhang et al.

Fig. 3 The system physical diagram

Fig. 4 Display results of liquid level sensor exposed to air

level sensor is put into the water; the value measured when there is water is small, and the value is large when there is no water. After many experiments, the threshold value is determined to be 4 mV in the middle. The processor receives the signal value sent from the liquid level sensor and compares it with the threshold value. When the signal value is greater than the threshold value, it sends the “K” opening signal. At this time, the green light of the relay is on and the water pump starts to discharge water. When the signal quantity is less than the threshold value, the “g” closing signal is sent to realize the closing of the switch. At this time, the red light of the relay is on, and the water pump stops discharging water.

Design of Automatic Intelligent Water Saving System for Faucet

977

Fig. 5 The putting liquid level sensor into water and its data

4 Conclusion When the water level reaches the sensor position, the water pump is in the closed state and stops storing water. When the water level does not reach the sensor position, the pump is in the open state and continues to store water. The system realizes the function of no special person to supervise and discharge water and can complete water storage, which liberates the labor force to a great extent. Acknowledgements The work was financially supported by science and technology achievements transfer and promotion plan project of Shaanxi Provincial science and technology department (Program No. 2020CGXNG-035), Xi’an Science and technology plan project of Shaanxi Province (Program No. 2019218414GXRC020CG021-GXYD20.6) and Key Research and Development Plan Project of Shaanxi Provincial Science & Technology Department (Program No. 2018ZDXM-NY-014).

References 1. Zhou, Q., Ding, L., Chen, J.: Design of intelligent faucet based on water flow energy storage. Sci. Technol. innov. Appl. 13, 46–47 (2019) 2. Niu, Z., Zhao, C., Du, Y.: Design of a module independent MCU development board. Integr. Circ. Appl. 37(4), 64–65 (2020) 3. Wu, J., Xu, Y.: Design and implementation of wireless scoring system based on ZigBee technology. Microcomput. Appl. 36(4), 31–34 (2020) 4. Li, L., Jiang, K., Zhao, Y.: Intelligent voice and touch dual control faucet based on STM32. Neijiang Sci. Technol. 39(2), 47–48 (2018) 5. Li, Y., Wang, B.: Design of data communication and display system based on msp430f449 MCU. Internet Things Technol. 7(1), 39–41, 44 (2017) 6. Han, Q., Tan, J., He, W, Ji, Z.: Design of anti scalding faucet based on at89.c51. Internet Things Technol. 9(1), 80 + 85 (2019) 7. Wu, D.: Design and Simulation of high efficiency water saving faucet. Sci. Technol. Innov. 32, 148–151 (2018)

978

T. Zhang et al.

8. Wang, X.: Application of artificial intelligence technology in bathroom product design. China New Technol. New Prod. 9, 107–108 (2017) 9. Du, Q., Liu, G.: A good helper for watering plants with intelligent faucets. Constru. Worker 40(3), 62 (2019) 10. Hou, J., Xiao, Y., Li, M., Dong, H., Yu, W.: Automatic control faucet flow and cut-off alarm device. Sci. Technol. Innov. Guide 15(23), 96 + 98 (2018) 11. Jia, H.: Research on the application of Arduino in scientific inquiry experiment. Educ. Equip. Res. (2018, July 12) 12. Huang, D., Guo, J., Hu, D., Zhang, G.: Exploration and reform of practical teaching mode of single chip microcomputer technology. Contemp. Educ. Pract. Teach. Res. 7, 198–199 (2020) 13. Jonathan, D.P., Wouter, B., Neeraj, S.: A technical evaluation of lidar-based measurement of river water levels. Water Resour. Res. 56(4) (2020)

On the Development of Computer Technology in Music Education Under the Background of 5G Chen Wang

Abstract With the development of the times and the progress of society, 5G communication technology with high speed, low delay and wide coverage will bring new opportunities for the development of online collaborative learning. The intelligent information environment in 5G era has begun to affect our way of life and work, and then extended to affect our way of learning. In today’s era, the rapid development of computer technology and communication technology, a large number of high-tech on our traditional curriculum has brought a huge impact. In order to help music education keep up with the development trend of the times in this new era, this paper puts forward the method of applying computer technology to the development of music education. It can not only apply computer technology to the teaching method of music education, but also can apply computer technology to music education Art has penetrated into all aspects of the music field and is closely combined with the current situation of music. In the practice of music teaching, the application of computer technology, to find the advantages of computer technology in the development of music education, so as to develop a set of the most suitable for music education development program. Through the analysis, the method proposed in this paper provides development ideas for the research of computer technology in music education under the background of 5G. Keywords 5G communication technologies · Computer technology · Information technology · Music education

1 Introduction 5G communication technology [1, 2] has brought great changes to our life. There is a great need to re-examine the mode, form and future development of our traditional network collaborative learning. Network learning is an important way for C. Wang (B) School of Children’s Welfare, College of Humanities & Sciences of Northeast Normal University, Changchun, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_121

979

980

C. Wang

students to acquire knowledge, improve their technical level and cultivate their quality. Through online and offline integration and cross regional school connection, it is convenient to obtain knowledge content, promote the balanced development of educational resources in different regions, and expand the learning channels of learning resources for learners. 5G communication technology will have a great impact on the content acquisition method, collaborative interaction process and collaborative school environment of online collaborative learning. For example, from the perspective of content delivery methods of online learning, the development of online learning and education [3–5] has gone through several stages of development, such as knowledge online, teaching networking, curriculum centralization, and learning personalization. In college music teaching, blackboard writing, piano and recording have been the main auxiliary means of teaching and played an important role. However, due to the weak foundation of music education [6, 7], many students do not understand the basic knowledge of music. Faced with such a teaching object, it is difficult for teachers to write and speak on the blackboard, what students feel and hear. For many students, this is almost “on paper”; the harmony on the piano is fleeting, equivalent to “playing the piano in the air". In this way, students often have “invisible, untouchable” psychological confusion. Although the teacher is serious and the students study hard, what they get is some abstract and complicated rules and regulations. They cannot feel the real musical beauty from their own ears, nor can they form the common habit of thinking about music. In the end, most people are entertainers. They are crazy and lose interest in learning. In a sense, this is the key to improve the quality of music teaching. It is necessary to improve the methods and means of music education in Colleges and universities. This paper mainly studies the development prospect of computer technology [8– 10] in music education under the background of 5G. In order to deal with the impact of the current social development on music education, this paper puts forward the method of applying computer technology to the development of music education. It can not only apply computer technology to the teaching method of music education, but also infiltrate computer technology into all aspects of music field, closely combined with the current situation of music. In the practice of music teaching, the application of computer technology, to find the advantages of computer technology in the development of music education, so as to develop a set of the most suitable for music education development program.

On the Development of Computer Technology in Music Education …

981

2 The Development Method of Computer Technology in Music Education Under the Background of 5G 2.1 Computer Technology Multimedia technology is an information technology which integrates text, graphics, images, animation, video and sound, and can be processed and controlled by computer and can support a series of interactive operations. Since 1980s, especially in recent years, with the rapid development of computer network technology, the development of multimedia computer technology has been widely concerned. People urgently hope that computers can communicate with human beings according to human habits, such as through sound and image, so that the application effect of computer can be greatly improved and the computer can serve human better. Therefore, multimedia computer technology emerges.

2.2 Music Education With the introduction of computer technology into music art and music education, music education is facing great breakthroughs in concept, content, means, methods and forms. To carry out relevant teaching and exploration research has become a hot spot in the research and development of music education. New technology enables students to try many possible new methods to solve problems. The continuous development of teaching technology plays an increasingly important role in the field of art. Computers can create unimaginable efficiency and opportunities in teaching. These technologies should be put into use immediately. If the man–machine audiovisual dialogue is used properly, it will have a significant impact on the cultivation of creative thinking ability.

3 Experimental Correlation Analysis 3.1 Experimental Background We use the method of computer network-aided teaching to collect and organize the data of famous musicians and representative works of different periods and styles into computer multimedia files for classroom teaching and students to browse online. Students can find pictures of musicians and life introductions from the Internet. Listen to the works of the master, even watch the video clips of the performance online, and observe the music evolution of a certain style and each historical period. In this

982 Table 1 Reasons for choosing different learning styles

C. Wang Learning style

Reason

E-learning

Better learning Better relationship with teachers Music communication is faster and more effective

Traditional learning

The classroom atmosphere and class ceremony are stronger The course content is more intuitive

way, as a teaching aid, our music history teaching can be more vivid, concrete and intuitive.

3.2 Experimental Design Our website has established a communication system, including teachers’ selfintroduction, work appreciation and email address. Students can contact teachers to discuss music through the network, so that the relationship between teachers and students is more harmonious. The music forum also provides a place for students to speak freely. Students can recommend excellent music works and articles, and can also publish their own feelings and music works. This kind of communication is more effective than face-to-face communication. The reasons why students choose e-learning and traditional learning are investigated. The specific profit value is shown in Table 1.

4 Discussion 4.1 Analysis of the Development of Computer Technology in Music Education Under the Background of 5G The computer has huge information storage and processing functions. With the help of computer technology, it can provide unprecedented information for music teaching. After the use of computer-aided instruction, sounds, pictures and text data of all kinds of music from ancient times to the present can be divided into computer databases, and teachers can call it at any time in the classroom. According to the needs of teaching, students can also access it through the Internet. This is particularly prominent in the teaching of musical instruments and music history. In the past, instrumental music teaching was mainly carried out by teachers’ explanation and watching pictures and the real sounds of various instruments could not be heard.

On the Development of Computer Technology in Music Education …

983

In the introduction of computer technology, instrumental music teaching is mainly based on the promotion of computer technology. For example, the multimedia software “musical instrument” developed by Microsoft Company in the United States is adopted. The CD-ROM preserves the sound, image and text information of hundreds of musical instruments from ancient times to the present. Even the most unknown minority musical instruments can get rich information. They can hear their own works and see the shape and structure, development history, performance skills and other color graphic materials. In order to have a profound and accurate understanding of the development of music teaching in basic education, the teaching methods of music teachers in a primary and secondary school were investigated. The results are shown in Fig. 1. As can be seen from Fig. 1, 39% of the music teachers like to use the piano teaching and singing teaching method, 25% of the music teachers like to use the multimedia singing teaching method, 19% of the music teachers like to use the singing teaching method, and 17% of the music teachers like to use the plot teaching method. In order to better popularize computer technology in the music teaching methods of primary and secondary schools, it is necessary to integrate the teaching methods of piano playing, plot teaching, singing with multimedia and singing in the computer music teaching, so as to better develop computer music happy teaching and education. Rational use of teaching methods and teaching resources is an important way to the quality of biology education. In music teaching, using computer music software Fig. 1 Teaching methods of music teachers

Playing piano teaching and singing

With multimedia singing

Singing teaching

Situational Teaching

984

C. Wang

Fig. 2 Problems in music education

70% 60%

Proportion

50% 40% 30% 20% 10% 0%

I

II

Type

III

IV

reasonably can image music knowledge, reduce students’ learning difficulties, stimulate their interest and enthusiasm, and stimulate their study. Promote the improvement of music teaching effect. The development of education needs continuous innovation, and the development of computer music technology provides a broad platform for innovation. It can be predicted that the future music teaching will be closely related with computer music technology, which requires teachers to adapt to the development of music teaching in the future. The paper investigates the problems existing in music education in schools in China. The results are shown in Fig. 2. I indicate that music lessons have not been paid real attention; II means that the teaching content is single, students’ musical literacy is low, III means that teaching equipment is missing, there is no good learning environment, and IV indicates that there are few music teachers. As can be seen from Fig. 2, there are a lot of problems in music education of traditional learning. 67% of schools do not pay attention to music lessons. 58% of schools have single teaching content and low music literacy of students. 44% of schools lack teaching equipment, There is no good learning environment, 35% of the schools have the problem of lack of music teachers. By changing the traditional teaching method and using the computer network online teaching method to carry out music education for students, the problems in Fig. 2 can be greatly reduced. The above problems should also be considered in the design of computer music teaching, so as to enhance students’ interest in learning music and improve their music quality.

4.2 Prospect of Computer Technology in Music Education Under 5G Background The school information environment in 5G era will be further improved. With the continuous development of digital campus and intelligent campus, and the school of continuous application analysis + big data technology for learning, this “intelligent” learning environment helps teachers develop flexible and diverse teaching designs,

On the Development of Computer Technology in Music Education …

985

Understand the teaching materials and students’ situation, dynamically receive the feedback information from students through 5 GB “expressway”, master the learning situation, analyze the needs of students for educational resources, adjust the teaching progress speed, provide targeted learning support services for students, and help them complete their learning better. Music education needs the combination of theory and practice in order to achieve better teaching effect. In vocal music teaching, teachers should use computer recording to analyze students’ singing part. Through computer data, we can directly see the deviation of students’ intonation and rhythm, so as to guide students. Students can also hear their own voice through computer music technology and software, and find the problems and advantages of singing process. Through computer music technology, students can record music works through many exercises, and obtain music products by using computer storage function, so as to communicate and learn with others in a wider range. In addition, computer music technology can also be applied to the protection and inheritance of national music. The use of computers and software to better preserve the endangered ethnic music and related materials can be used in teaching activities, so that the excellent Chinese traditional music can be inherited and promoted. The application of computer technology in music teaching can make students become the main body of music class and give full play to students’ initiative. After the use of computer technology, students can 100% participate in music teaching activities, through the sound, students can enjoy their own creative works, in the process of listening, need to modify the local recording, after serious class, let the students’ learning initiative get full play. At the same time, it also greatly stimulates the students’ desire to apply for jobs and create. Adding computer music technology into music teaching is the most effective teaching method for music teachers, which makes music class immediately full of unique charm and makes students get comprehensive development.

5 Conclusions This paper mainly introduces the development prospects of computer technology in music education under the background of 5G. With the development of society and economy, a large number of science and technology have been applied in our daily life, which has changed our traditional life style. In order to meet the challenges of music education in the new era, this paper puts forward the application of computer technology in the development of music education Methods, not only can the computer technology be applied in the teaching method of music education, but also the computer technology can be infiltrated into all aspects of the music field, closely combined with the current situation of music. In the practice of music teaching, the application of computer technology, to find the advantages of computer technology in the development of music education, so as to develop a set of the most suitable for music education development program. Through the analysis, the method

986

C. Wang

proposed in this paper provides development ideas for the research of computer technology in music education under the background of 5G.

References 1. Akpakwu, G., Silva, B., Hancke, G.P., et al.: A Survey on 5G networks for the Internet of Things: communication technologies and challenges. IEEE Access 5(12), 3619–3647 (2018). (in Chinese) 2. Osseiran, A., Monserrat, J.F., Marsch, P., et al.: 5G Mobile and wireless communications technology: millimeter wave communications 44(6), 137–157 (2016). https://doi.org/10.1017/ CBO97813164177. (in Chinese) 3. Jones, H.S.: Benefits and challenges of online education for clinical social work: three examples. Clin. Soc. Work J. 43(2), 225–235 (2015). (in Chinese) 4. Mitchell, L.D., Parlamis, J.D., Claiborne, S.A.: Overcoming faculty avoidance of online education: from resistance to support to active participation. J. Manag. Educ. 39(3), 350–371 (2015). (in Chinese) 5. Eom, S.B., Nicholas, A.: The determinants of students’ perceived learning outcomes and satisfaction in university online education: an update. Dec. Sci. Innov. Educ. 14(2), 185–215 (2016). (in Chinese) 6. Ockelford, A., Welch, G., Zimmermann, S.: Music education for pupils with severe or profound and multiple difficulties—current provision and future need. Br. J. Spec. Educ. 29(4), 178–182 (2015). (in Chinese) 7. Evans, P.: Self-determination theory: an approach to motivation in music education. Musicae Sci. 19(1), 65–83 (2015). (in Chinese) 8. David, B.: Computer technology and probable job destructions in Japan: an evaluation. J. Jpn. Int. Econ. 43, 77–87 (2017). (in Chinese) 9. Anderson, B., Horn, R.: Community colleges in the information age: gains associated with students’ use of computer technology. J. Educ. Comput. Res. 47(1), 51–65 (2015). (in Chinese) 10. Jerome, M.C.: Computer technology and the source materials of social science history. Soc. Sci. His. 10(2), 97–114. (in Chinese)

Research on Multiple Features and Performance of Visual Communication Design Based on Digital Media Environment Hongbo Sun

Abstract With the rapid development of digital media technology, digital media context emerges as the times require. Visual communication design also presents language features, aesthetic features and communication features, which have a great impact on visual communication design to a certain extent. However, based on the analysis of the actual situation, visual communication design is still in the situation of challenges and opportunities. Based on this, this paper studies the multiple characteristics of visual communication design in digital media environment. This paper expounds the main characteristics of visual communication design, and analyzes the changes of visual communication design performance in the digital media era. It also discusses the influence of digital media era on visual communication design from three dimensions: changing the form of information dissemination, promoting the development of multidimensional design and realizing virtual design. Finally, the paper compares the visual communication design based on digital media environment with the traditional visual communication design method, aiming to provide reference for the digital development of visual communication design. Research shows that visual communication design can reflect the characteristics of digital media era, break through the limitations of time and space, and bring more aesthetic experience to people. It is worth noting that on the basis of the visual impact brought by digital media technology, it is necessary to alleviate the contradiction between the progress of the times and the development of visual communication design. Keywords Digital media technology · Visual communication design · Multidimensional design · Multiple features

1 Introduction Under the social background of the rapid development of information technology, the rapid development of digital technology has caused a great impact on the traditional H. Sun (B) Department of Visual Communication, College of Humanities & Sciences of Northeast Normal University, Changchun, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_122

987

988

H. Sun

graphic design industry [1], leading to significant changes in the content of visual communication design [2, 3]. It not only provides rich language and creative methods, but also can transform from material level to spiritual level, from single creation method to compound creation method. Since the basic goal of art design is to give full play to the designer’s subjective initiative, continue to carry out free innovation and make the content of visual communication design more artistic. On the basis of bringing new visual impact to the public, promote the artistic development of visual communication design. In visual communication design, the information you want to express is expressed by visual art symbols [4]. The common visual communication design in daily life mainly includes character modeling in movies, brand names in product packaging and various buildings. Exploring the origin of visual communication design should start from ancient times. The traditional totem pattern [5] used by ancient primitive tribes is actually the earliest visual communication application. After a long period of development and reform, visual communication design relies on various media. Effectively carry and play the role of visual information dissemination. In the current social development situation, China’s network information technology is constantly updated. The emergence of digital media [6, 7] fully reflects the uniqueness and innovation of visual communication design. With the active use of digital media technology, visual communication design can get better development, that is to say, the arrival of digital media era provides new opportunities for the development of visual communication design, and also brings new development opportunities for visual communication design. On this basis, this paper analyzes and studies the multiple characteristics of visual communication design in the digital media environment [8]. This paper takes the visual communication design based on digital media context as the experimental group, and the traditional visual communication design method as the control group. This study analyzes and compares the two groups from three dimensions: change the form of information dissemination, promote the development of multidimensional design [9], and realize the vitality of design [10]. Research shows that visual communication design can reflect the characteristics of the digital media era, break through the limitations of time and space, and bring people more aesthetic experience.

2 New Needs in the Digital Media Era of Visual Communication Design 2.1 Information Transmission of Digital Media Technology In the process of digital media design, information transmission needs to follow the information transfer theorem. Shannon formula points out that if the information rate r of the information source is less than or equal to the channel capacity C, there is a method to make the output of the information source transmit through the channel

Research on Multiple Features and Performance of Visual …

989

with any small error probability. C=W



  S 1+ (bit/s) N

(1)

In the formula, C is the limit value of the data rate, in bits per second; W is the channel bandwidth, in Hertz; S is the signal power (watt), N is the noise power (watt), S/N is the signal-to-noise ratio; I is the amount of information transmitted in the channel, expressed as follows: S SNR = 10( 10 ) N

(2)

I = − log2 (P) (bit)

(3)

Digital media design is based on network technology and the unique design concept of professional designers. Therefore, it is necessary to strengthen the connection between digital media, establish good and close relationship, and make it more logical and interactive. Visual communication design colleagues need to use modern multimedia technology to achieve effective dissemination and communication of information. With the rapid development of digital media technology, the effective carrier of visual communication design is becoming more and more diversified. Moreover, This design completely breaks the limitations of traditional design, and the stronger audio-visual effect brings a new experience and feeling to users.

2.2 Characteristics of Visual Communication Design in the Era of Digital Media The design of visual communication has undergone tremendous changes in the use of language and its manifestations, because it integrates information technology, computer technology, and visual communication and design. In order to enrich people’s understanding and demand for aesthetics, it is necessary to arrange visual communication elements rationally through vivid comparison of colors, effective use of technology, changes and exaggerations of graphics. From two-dimensional static form to three-dimensional dynamic, through the development of two-dimensional form, it can continuously expand its visual communication methods and design content, and enrich its expression form. The visual effect of digital design based on two-dimensional plane is limited. Therefore, with the progress and benefit from the forward development of modern network communication, and the emergence of new information technology, digitization is the main way of visual communication. At the same time, it promotes the vigorous development of diversified visual communication and media design, and promotes the evolution of its visual expression from the “two-dimensional” space

990

H. Sun

layer to the “three-dimensional” space level, so as to make it more vivid and vivid, and endow it with more diversified forms of visual communication design.

3 Experimental Thinking and Design 3.1 Experimental Ideas In this paper, the multi characteristics analysis of visual communication design in digital media context is carried out. The experimental group is visual communication design based on digital media context, and the control group is the traditional visual communication design method. In the study, two groups of transformation of information dissemination form, promote the development of multi-dimensional design, the realization of virtual design of these three dimensions for comparative analysis.

3.2 Experimental Design Visual communication design refers to visual art design technology. The traditional visual communication field mainly includes advertising design, graphic design, commodity packaging design and corporate image design. Under the background of digital media, the visual design has become more expressive and rich, and reading has changed from passive mode to human–computer interaction mode. People can get information from different channels and different platforms. This study aims to explore the multiple characteristics and performance of digital media technology in the digital media environment. According to the division of experimental group and control group, The corresponding analysis of visual communication design based on digital media environment and early visual communication design method is carried out, and the influence of digital media era on visual communication design is deeply discussed from three dimensions: changing the form of information transmission, promoting the development of multidimensional design, and realizing virtual design. The visual communication design ability of the two groups was evaluated by simple scale. 10 is the upper limit. The higher the score, the stronger the visual communication design ability. Table 1 lists the characteristics and communication differences between visual communication design and traditional visual communication design in digital media environment, as shown in the figure below.

Research on Multiple Features and Performance of Visual …

991

Table 1 Characteristic performance of experimental group and control group Method comparison

Design of visual communication in digital media environment

Traditional visual communication design

Characteristic performance

Digitizing

Textualization

Diversification

Simplification

Multimedia

Two-dimensional visual graphic design

Interactivity

Unilaterally convey information

Way of communication

Virtuality

Intuitiveness

Two-dimensional static

Three-dimensional dynamic

4 Discussion 4.1 Analysis of the Multiple Characteristics and Performance of Digital Media Technology Based on the Digital Media Environment The full use of digital media technology has promoted and realized the all-round and multi-dimensional development of modern visual communication design. The extensive use of digital media has further accelerated the organic integration of digital media technology and contemporary multimedia technology, and realized the close integration of visual communication forms and their design content. The main display forms are as follows. The visual communication design consists of traditional newspapers, The development of the radio station into a network form has developed from the past two-dimensional graphic design form to three-dimensional spatial processing, from the visual sense to the dual combination of vision and hearing, and from a single information dissemination mode to a two-way information interactive communication mode. The above-mentioned changes in the development process, to some extent, reflect the multi-directional and multi-dimensional transformation characteristics of visual communication design. In visual communication art design, the use of digital media technology can promote the transformation of communication forms and broaden information transmission channels. In the context of the current digital media era, virtualization and informatization are the most prominent features. The scientific and reasonable penetration of these features into the visual communication design can demonstrate the artistic style of contemporary visual communication works in a new way of presentation, allowing visual communication The design features are more diverse. It brings unprecedented shocking effects to visual communication design, which not only improves the design sense of the work, but also gives the work a stronger sense of space. As can be seen from Fig. 1, compared with the control group, the scores of

992

H. Sun

Virtuality

Interactivity

Multimedia

Diversification

Digitizing 0

1

2

3

4

5

6

7

8

9

10

Score Control group

Test group

Fig. 1 Comparison of characteristics of experimental group and control group

digitization, diversification, multimedia, interactivity and virtuality of the experimental group are higher than those of the control group. Therefore, it is a basic feature of visual communication design based on digital media context. Its development trend fully embodies digitization, diversification, multimedia, humanization and interaction. As can be seen from Fig. 2, the development trend of digital visual communication art design is not only reflected in the digitization of design concept and communication mode, but also in the digitization of art design process and visual communication tools. Visual communication art design works are no longer only in the two-dimensional space of digital media plane, and various digital technologies can be used as terminals, including graphics, dynamic graphics, videos, 3D images, etc. These digital visual communication performance methods bring a perfect visual feast and sensory experience to the audience, making the content of visual communication design more extensive.

4.2 Suggestions for Adaptable Changes in Visual Communication Design Concepts 1.

Color design

Research on Multiple Features and Performance of Visual …

Digitizing

Diversification

Virtuality

Multimedia

Online game

Interactive image

993

Interactivity

Fig. 2 Distribution of multiple characteristics of digital media technology

2.

3.

In the digital age focusing on efficiency and speed, color matching standards are no longer limited to attractiveness, discernment and persuasiveness, but a way to distinguish and show vitality. Compared with the previous color function, the color function has changed: first, as a logical help to help identify, convey and store digital information; second, as an identification tool that caters to the needs of different levels of groups; then, as a guide and guide User use and operation. Advertising design In order to better form the characteristics of the product, brand positioning and market demand, the advertising design methods are more diverse. Value needs, image needs, rational needs and utilitarian needs are used to classify consumers. In the digital age, the emergence of the Internet has accelerated the speed of product upgrades. Conventional advertisement design is easy to be ignored by users, and advertisement design requires certain methods and techniques to improve the freshness of advertisements. First, try creative attractiveness to keep up with the rapidly updated market demand. Secondly, it turns from static to dynamic, and actively attracts the preferences of emerging markets. Layout design

The traditional layout design is the arrangement of pictures and texts. Elements such as text, images, colors and tables are arranged in a limited space to achieve the layout design that is most suitable for reading. In the digital media era, the layout design is limited by the size of the equipment. Due to the large amount of text, users don’t want to read or read useless information, which is easy to appear in traditional media. Visual image has become the main carrier of communication, text has gradually become the decoration of images, and layout design can meet the needs of digital media.

994

H. Sun

5 Conclusions The design method based on digital media is to study the design method of digital media group based on the traditional digital media communication process and control technology. From the transformation of information dissemination form and promoting the development of multidimensional design, this paper compares the realization of the three dimensions of virtual design, and then evaluates the characteristics and communication methods of the two groups. In the comparative analysis, the scores of digitization, diversification, multimedia, interactivity and virtuality of the experimental group were higher than those of the control group. Compared with traditional classification methods, from two-dimensional to three-dimensional, from traditional static communication to three-dimensional dynamic communication, is a basic feature of visual communication design based on digital media context. However, it is worth noting that with the increasingly fierce competition between different media, the same content appears in visual communication design. The same design style works, a large number of plagiarism. How to highlight the unique design style and works highlights in the digital media era is the main problem to be alleviated, which is the contradiction between the progress of the times and the development of visual communication design. Acknowledgements Jilin Province Educational Science “Thirteenth Five-Year Plan” Key Project in 2019 “Research on the Development of National Education Modernization under the Guidance of Conceptual Modernization” Project Approval Number: ZD19150.

References 1. Hamlin, R.P.: The consumer testing of food package graphic design. British Food J. 118(2), 379–395 (2015) 2. Wu, H., Li, G.: Visual communication design elements of internet of things based on cloud computing applied in graffiti art schema. Soft Comput. 6(1), 1–10 (2019) 3. Bo, Y.: Exploration on the application of 3d printing and dyeing patterns in modern clothing visual communication design. J. Phys. Conf. Ser. 1486(1), 42–45 (2020) 4. Akishina, E.M., Krasilnikov, I.M., Medkova, E.S.: Interpretation of religious plots in the 20th century russian music and visual arts. Eur. J. Sci. Theol. 13(3), 195–203 (2017) 5. Benchouaia, R., Cisse, N., Boitrel, B., Sollogoub, M., Le Gac, S., Menand, M.: Orchestrating communications in a three-type chirality totem: remote control of the chiroptical response of a moebius aromatic system. J. Am. Chem. Soc. 141(29), 11583–11593 (2019) 6. Sohrabi, B., Iraj, H.: Implementing flipped classroom using digital media: a comparison of two demographically different groups perceptions. Comput. Hum. Behav. 60(7), 514–524 (2016) 7. Duffy, K., Ney, J.: Exploring the divides among students, educators, and practitioners in the use of digital media as a pedagogical tool. J. Mark. Educ. 37(2), 104–113 (2015) 8. Seo, D.G., Weiss, D.J.: Best design for multidimensional computerized adaptive testing with the bifactor model. Educ. Psychol. Meas. 75(6), 954–955 (2015) 9. Foster, M.K., Abbey, A., Callow, M.A., Zu, X., Wilbon, A.D.: Rethinking virtuality and its impact on teams. Small Group Res. 46(3), 267–299 (2015)

Research on Multiple Features and Performance of Visual …

995

10. Hosseini, M.R., Chileshe, N., Baroudi, B., Zuo, J., Mills, A.: Factors affecting perceived level of virtuality in hybrid construction project teams (hcpts): a qualitative study. Constru. Innov. 16(4), 460–482 (2016)

New Model of China’s Financial Field Based on Cloud Computing and Big Data Under the Background of Digital Economy Yanni Zhao

Abstract The digital economy is the result of deepening the social and economic life of new generation technologies such as mobile Internet, cloud computing and big data, and will become an important driving force for global economic growth. Supply chain finance has established a good industrial chain environment for the continuous and steady progress of the company, financial institutions and product supply chain, and has created a new channel for SME financing. The purpose of this paper is to study the new model of China’s supply chain finance in the context of digital economy. Based on the existing traditional supply chain financing model and the application of emerging Internet finance, this paper analyzes the current situation of supply chain finance, and proposes to use financial technology and risk control theory to innovate in the supply chain finance of the Internet platform. Pure credit supply chain financing model, this paper proposes a new supply chain financial model based on long-term benign development, real business data and objective credit data, which can provide financing services under the premise of risk control, and further promote the development of supply chain finance. The research results show that the new supply chain financial model based on long-term benign development, real business data and objective credit data can provide financing services under the premise of risk control, and further promote the development of supply chain finance. Keywords Digital economy · Financial innovation · New financial model · National economy

1 Introduction With the rise of new technologies represented by the Internet, blockchain, big data and artificial intelligence, various new business models, new business forms and new economies have emerged [1]. According to the latest China Internet Development Report, the number of users using the Internet in China has exceeded 700 million, Y. Zhao (B) Yunnan University Dianchi College, Kunming, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_123

997

998

Y. Zhao

the Internet penetration rate is over 50%, and half of the Chinese use the Internet [2, 3]. In the Internet age, issues such as corporate propaganda, risk control, big data mining, and payment clearing cannot be achieved by relying on individual companies or financial institutions. In this case, we need to build an online supply chain with a multiparty synergy and cooperation in the new era. Financial platform to solve intractable diseases and attract customers [4]. In this context, supply chain finance and Internet finance technologies are combined, and supply chain finance based on online platforms has also emerged. The integration of the two creates a new supply chain financial financing model: based on the historical transaction data of the platform customer blockchain deposit, using the big data technology and artificial intelligence technology to intelligently calculate the customer risk, thus providing a pure credit financing model [5]. Based on the innovation of information and communication technology, the emergence of emerging industries such as the digital economy has greatly contributed to the growth of the national economy and has affected various fields of the economy [6, 7]. In the process of digital economy development, a variety of new business models have been derived. Its high dependence on data and strong liquidity makes its trading methods very different from those of traditional economic conditions that rely on entities. The traditional tax system has already No longer applicable to current trading activities. In the era of digital economy, data as a new production factor is combined with other factors of production and becomes a new driving force for economic growth. Data as a factor of production contributes to value creation [8]. If the contribution of data in the creation of digital economic value can be reasonably measured, it is enforceable to construct the principle of profit attribution in the context of digital economy based on the amount of value created by the data [9]. The value of data consists of two parts: the direct value generated by the data directly as a production factor and the indirect value generated by the combination of other production factors [10]. Based on the existing traditional supply chain financing model and the application of emerging Internet finance, this paper analyzes the current situation of supply chain finance, and proposes to use financial technology and risk control theory to innovate in the supply chain finance of the Internet platform. Pure credit supply chain financing model, this paper proposes a new supply chain financial model based on long-term benign development, real business data and objective credit data, which can provide financing services under the premise of risk control, and further promote the development of supply chain finance. This paper proposes a new supply chain financial model based on long-term benign development, real business data and objective credit data, which can provide financing services under the premise of risk control, and further promote the development of supply chain finance.

New Model of China’s Financial Field Based on Cloud Computing …

999

2 Proposed Method 2.1 The Connotation of the Digital Economy The digital economy is a new economic form produced during the development of ICT, and its emergence has contributed to the global economic growth. The emergence of the term digital economy has aroused widespread concern in academia, politics, and business. The rapid development of the digital economy has made people’s lifestyles more convenient and intelligent, and the quality of life has been continuously improved. At the same time, it has also promoted the traditional industry to optimize resource allocation, adjust the industrial structure, and achieve transformation and upgrading, which has driven the development of the global economy. The digital economy has increased the flow of transnational goods, services and capital, enabling resources to be deployed quickly and efficiently, accelerating the process of global economic integration. Governments have also taken measures to transfer policy centers to the digital economy and increase research on the digital economy. Nowadays, with the development and integration of new technologies such as mobile Internet, Internet of Things, cloud computing, big data, artificial intelligence, etc., innovative businesses, products, models and services are emerging one after another, gradually becoming the leading economic growth and industrial structure optimization. An important engine for the upgrade.

2.2 Characteristics of the Digital Economy With the continuous updating and application of information and communication technologies, the digital economy has shown some features that the traditional economy does not have. The digital economy is summarized as follows: (1)

Liquidity The liquidity of the digital economy is mainly reflected in the liquidity of its intangible assets, the mobility of users and the mobility of the location of business functions. Trading activities in the digital economy environment are usually carried out in a virtual space formed by the Internet, and transactionsrelated products, services, and assets do not have specific physical forms. In addition, the intangible assets have become more and more important for the creation of enterprises, and they are playing an increasingly important role in stimulating the economic growth of enterprises. However, the rights related to intangible assets are easily transferred between affiliated companies, separating asset ownership from activities that form those assets. The user’s mobility is reflected in the user’s use of digital information equipment for cross-border business transactions, where the user’s location, where the transaction takes

1000

(2)

(3)

Y. Zhao

place, and where the product is used can be in three different countries simultaneously. The mobility of business functions mainly means that the business activities of the company can be distributed in various countries around the world, even if they are far from the final customers. For example, enterprises can realize centralized management of global business from any location through Internet technology, information management software and personal terminals. Highly digitized In the digital economy, data is the most important resource for companies. From the collection, storage, analysis and application of data, the use of data has brought about an upgrade of the industrial structure and significant economic growth. Nowadays, the main assets of enterprises are gradually shifted from fixed assets such as machinery and equipment to intangible assets such as information technology and patents, and the value of data is increasingly prominent. In addition, the improvement of computing power, the increase of storage capacity and the decline of data storage costs have promoted the use of data by countries. Nowadays, countries all over the world are striving to promote the development of “big data”. Network effect That is, the user’s experience may have a direct impact on the benefits that other users receive. The transaction behavior and value creation of enterprises and users are two-way. Enterprises provide products or services to users and also obtain data resources of commercial value provided by users free of charge. Enterprises can improve existing products or services through data collected, such as consumer preferences, evaluation of products and services, or recommend suitable products or services to other customers to improve user experience and competitiveness. The more interactions users have, the greater the network effect they generate, which in turn increases the competitiveness of the enterprise.

3 Experiments 3.1 Research Object Due to the congenital characteristics of small and medium-sized enterprises, such as small scale and weak financial strength, it is easy to be in a weak position in a highly competitive market environment. And most SMES have a series of problems such as weak management ability, lack of core technology and poor anti-risk ability. In particular, many private SMES implement a family management model, and the professional competence of business managers is relatively low. This paper selects three SMES in Shanghai as research objects, covering traditional manufacturing, electronic technology, chemical industry, etc.

New Model of China’s Financial Field Based on Cloud Computing …

1001

3.2 Experimental Methods (1)

(2)

(3)

Literature analysis Offline access to journal articles and books through the library, online access to various supply chain finance related materials through CNKI and other data libraries, to understand the development and research status of supply chain finance at home and abroad. It lays a foundation for the research of supply chain finance theory, and provides a theoretical basis for the subsequent analysis of the current mode of SME supply chain. It can correctly distinguish and understand the applicable conditions, advantages and disadvantages of different financing modes. Quantitative qualitative comprehensive analysis In the analysis of credit risk and credit conditions and quota setting, this paper adopts a comprehensive analysis method combining qualitative and quantitative, comprehensively and scientifically evaluates the influence of various factors, and obtains credit conditions and credit setting modes in line with credit risk control to achieve the most. Actual, most realistic wind control requirements. SWOT analysis This paper uses SWOT analysis method to conduct a comprehensive and systematic analysis of the supply chain finance currently running in these three enterprises, from internal advantages and disadvantages to external opportunity threats. On the one hand, it summarizes the current supply chain status of these enterprises, on the other hand, Provide strategic support for the future development of enterprise supply chain finance.

4 Discussion 4.1 Average Profit of Corporate Business According to the 2018 annual report, during the reporting period, the company achieved an average operating income of 3.613 billion yuan, a year-on-year increase of 34%, and the net profit attributable to shareholders of listed companies was 518 million yuan. The ability to achieve such a large growth rate is mainly based on the continuous development and development of existing business development strategies in 2018, and is constantly committed to the mining and development of new businesses. Through vigorously developing supply chain management business, accelerating Internet operations, comprehensively deploying the Internet of Things, rapidly expanding the development of science and technology industrial parks, actively promoting innovation and entrepreneurship platforms, and participating in industrial docking. The industrial layout of these three companies has made breakthroughs and

1002

Y. Zhao

Table 1 Profitability of supply chain management business Unit: 100 million yuan

Business name

Operating income

Operating profit

Gross profit margin

Main business

23.9

2.73

0.114

Supply chain business

12.4

1.59

0.128

the average operating income has grown rapidly. The profitability of the supply chain management business is shown in Table 1.

4.2 Risk Control Analysis of Supply Chain Financial Credit Model Under the Background of Digitization (1)

Analysis before loan

According to the previous wind control theory, it is necessary to obtain as much sample data as possible. For customers with financing needs, comprehensive data is required. The data analysis of financial indicators and non-financial indicators, combined with the long-term accumulated experience of these three companies, designed the total score program, under the large sample situation, the distribution of customer credit value basically conforms to the normal distribution using statistics. Relevant theory, relying on expert experience, combined with the internal operation risk control requirements of these enterprises, take three thresholds of customer ratings, corresponding to bad thresholds, attention thresholds and credit thresholds: customers within the credit interval, whitelisted customers, otherwise Admitted. The distribution of credit score credit intervals is shown in Fig. 1. (2)

Post-loan analysis

Daily real-time business data, while continuously optimizing system parameters, dynamically calculate scores. After the provision of credit services, the customer scores within the attention and credit interval, no risk control measures, but need to monitor the data; when falling into the attention interval, need to take risk control measures, such as requiring early repayment. When the score falls below the attention threshold, the historical result shows that the credit risk is very large, and about 60% of the companies in the interest range will enter the bad depreciation after three months, that is, credit default will occur. Therefore, for companies in the interest interval, s companies need to take timely risk control measures to avoid the risk of credit default. Therefore, when the supply chain financial credit model is just launched, the borrowing period can be controlled to be three months.

New Model of China’s Financial Field Based on Cloud Computing …

1003

0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0

1.1 1.2 1.3 1.4 1.5 1.6 1.7

Fig. 1 Credit score credit interval distribution

5 Conclusions Although the emergence of supply chain financial financing models does help to fill the funding gap for SMES, in reality, not all SMES can apply this model well. As we all know, there are three financing methods for supply chain financing. The accounts receivable financing model is a model with a wide range of uses based on the real trade background and the credibility of the cornerstone enterprises. However, for the prepaid and inventory models, a pledge of the goods is required. Some special industries cannot apply these two modes because of the particularity of their products. For these special industry enterprises, financing channels and quotas will certainly be affected to a certain extent. Acknowledgements This work was supported by scientific research fund project of Yunnan Education Department (project number: 2019J0816)

References 1. Gholamian, M.R. Taghanzadeh, A.H.: Integrated network design of wheat supply chain: a real case of Iran. Comput. Electron. Agric. 140, 139–147 (2017) 2. Vighneswara, S.D.: Analyzing the agricultural value chain financing: approaches and tools in India. Agric. Fin. Rev. 76(2), 211–232 (2016) 3. Iman, K., Masoud, R., Hamed, F.-A.: A way to optimally solve a green time-dependent vehicle routing problem with time windows. Comput. Appl. Math. 37(3), 1–18 (2017) 4. Peng, Z., Kai, Y., Jessica, J.Y.: QuantCloud: big data infrastructure for quantitative finance on the cloud. IEEE Trans. Big Data (99), 1 (2017). (in Chinese)

1004

Y. Zhao

5. John, A., Luca, E.: The promise and perils of crowdfunding: between corporate finance and consumer contracts. SSRN Electron. J. 81(1) (2017) 6. Sergey, V., Leonid, P., Vladimir, Y.: Reasoning and learning in a digital economy. Technological challenges of the modern age. In: IOP Conference Series Materials Science and Engineering, vol. 497, p. 012038 (2019) 7. Hu, J.: Xiong’an new area—the future test bed for the chinese digital economy. China’s Foreign Trade 4, 52–53 (2017) 8. Akaev, A.A., Sadovnichii, V.A.: On the choice of mathematical models for describing the dynamics of digital economy. Diff. Equ. 55(5), 729–738 (2019) 9. Elena, M., Olga, S.: Main directions of development of infrastructure in digital economy. In: IOP Conference Series Materials Science and Engineering, vol. 497, issue no. 1, p. 012081 (2019) 10. Jan, D., Maria, J.: The digital economy and its implications for labour: 1. The platform economy (introduction to the special issue of Transfer). Transfer, 23(2), 103–119 (2017)

China’s Financial Poverty Alleviation Mechanism Under the Background of Digital Economy Based on Information Technology Yanni Zhao

Abstract Poverty is a problem that plagues the countries of the world. It is also a major social issue in the current development of the Chinese government. The precise poverty alleviation strategy is proposed by China to win the fight against poverty and achieve the goal of “two hundred years”. It is a historical, long-term and strategic mission. The purpose of this paper is to study China’s financial poverty alleviation mechanism in the context of digital economy. From the perspective of rural digital finance, based on the precise poverty alleviation strategy, on the basis of relevant realistic background and theory, this paper aims to promote the effective development of precision poverty alleviation work in Henan Province, from the information itself, the main elements of information, The basic framework of rural information poverty alleviation ecosystem is constructed in three aspects of information environment elements, and the mechanism of information poverty alleviation is analyzed from the supply and demand of information, the transformation of information and the realization of value. On this basis, the optimization path of information poverty alleviation is proposed. It is hoped that poverty-stricken areas can fully share the benefits of digital economic development. The experimental results show that financial poverty alleviation can alleviate the situation of information asymmetry of poor people, break the double poverty alleviation paradox, build a whole agricultural industrial chain, and achieve the precise docking of small farmers and big markets. Keywords Digital economy · Financial innovation · Precise poverty alleviation · Poverty alleviation mechanism

Y. Zhao (B) Yunnan University Dianchi College, Kunming, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_124

1005

1006

Y. Zhao

1 Introduction The development of the Internet has spawned a new economic form—the digital economy. The digital economy has strong penetration. The synergistic development of the entire industry chain and the horizontal development between industries have obvious spillover effects, gradually weakening the location disadvantage. The impact of economic development [1–3]. The digital economy has eliminated the spatial boundaries of traditional regional development and is of great significance to the economic development of poor areas with imperfect infrastructure. With the development of economy and society and the improvement of people’s living standards, the connotation of poverty has gradually expanded from single income poverty to multidimensional poverty [4]. Poverty does not only mean low income, but also involves capabilities, rights, social systems, culture, and law [5]. Along with the information and communication technology (ICT)-based information revolution, information technology has changed people’s production and lifestyle, changed resource allocation, brought automation of labor production and convenience of people’s daily life. However, not all members of society have equal access to the dividends brought about by the use of information technology. Information inequality caused by resources and opportunities has led to a new phenomenon of poverty, information poverty. At the same time, in this context, information poverty alleviation, the poor people to enjoy the dividends brought by information technology, and the role of the digital economy in poverty alleviation is an inevitable choice for anti-poverty [6]. Shao-Jin’s team established a theoretical model of peasant credit poverty alleviation mechanism, revealing the credit mechanism of peasant income growth, and based on the micro data of the peasant credit information system in China’s first rural financial reform pilot county, empirically tested the peasants’ credit poverty alleviation. effect. Using the propensity matching score method to control the growth of farmers’ credit to farmers’ income and controlling the endogenous factors of farmers’ credit, they found that farmers’ credit brought higher income and faster income growth to farmers [7, 8]. Dechaor believes that in the critical period of building a well-off society in an all-round way, the significance of targeted poverty alleviation policies has been greatly enriched by the introduction of a new national poverty reduction strategy. From the perspective of the core essence of goal poverty alleviation, internal goals and time tasks, there is inherent consistency between goal poverty alleviation and participatory help. Participatory help can not only strengthen the political basis of multi-agent interaction in targeted poverty reduction, but also promote the framework of action for multi-agent cooperation. In addition, participatory help helps ensure targeted fair value orientation for poverty alleviation and can effectively share and integrate poverty alleviation information [9, 10]. Shuai summarized the institutional obstacles and difficulties in implementing goal-oriented poverty alleviation in China, and discussed the necessity and feasibility of designing a market-oriented poverty alleviation system. From the three aspects of legal protection, motives for poverty alleviation and buffering, the paper proposes a targeted poverty reduction

China’s Financial Poverty Alleviation Mechanism Under …

1007

path guided by the government: a comprehensive mechanism for identifying poor families, a comprehensive poverty alleviation monitoring and evaluation system, and a list of poverty alleviation responsibility Promote innovation in poverty alleviation policy systems [5]. This paper constructs the basic framework of rural information poverty alleviation ecosystem from three aspects: information itself, information main element and information environment element, and analyzes the mechanism of information poverty alleviation from information supply and demand, information transformation and value realization [11]. On this basis, the optimization path of information poverty alleviation is proposed, so that the poverty-stricken areas can fully share the benefits of digital economic development.

2 Proposed Method 2.1 Theoretical Analysis of the Quality of Digital Economic Development (1)

1.

2.

3.

(2)

Principles for the establishment of a quality evaluation index system for digital economic development On the basis of the theoretical definition of the quality of digital economic development, we adhere to the principle of objective, fair and comprehensive, and scientifically select evaluation indicators. Scientific principle: Adhere to the objective law of the development of things, closely follow the development of China’s digital economy, highlight the most basic, most significant and objective quality characteristics, and adhere to the comprehensive characteristics of development quality from multiple dimensions. Principle of operability: According to the actual situation of the quality of digital economic development, combined with the availability, accuracy, authority, continuity and other factors of data to build a comprehensive evaluation index system to ensure that the evaluation of digital economic development quality is effective. Systematic principles: The comprehensive evaluation index system should be able to summarize the overall picture of the quality of digital economic development and explain the quality characteristics of digital economic development from multiple perspectives. The measurement of the quality of digital economic development should be time-series and spatial, not only focusing on integrity and locality, but also on time and space. Establishment of a comprehensive evaluation system for the development of digital economy

1008

Y. Zhao

Relying on the information network, through the close integration of digital technology with other traditional economic fields, a new way of production organization has been formed, which has brought more output, brought about the improvement of total factor productivity, and produced positive externalities. Taking into account the availability of data in quantitative analysis, the specific analysis indicators reflecting the quality of digital economic development are selected from the following four aspects.

2.2 Mechanism of the Existence of Poverty Alleviation Finance A sound financial system includes pro-poor finance. Poverty-stricken finance is “funding for vulnerable groups” and directly serves the poor. The theoretical basis of poverty alleviation finance and financial poverty alleviation is consistent. Finance has the function of distributing redistribution, making risk compensation, seeking checks and balances of rights and obligations, and equalizing everyone in front of credit to form a theoretical system of poverty alleviation finance. (1)

(2)

The financial system has the function of distribution and redistribution, and it pays attention to fairness while pursuing efficiency. It is the fundamental theoretical basis of poverty alleviation finance. It is generally believed that the initial allocation focuses on efficiency, and the redistribution focuses on fairness. As a distribution mechanism, financial activities allocate and redistribute national income and financial resources in their activities. There is also a question of efficiency and fairness. In actual business management, financiers usually pay attention to efficiency and love to support the strong groups and support them. However, in addition to efficiency, they also pay attention to fairness. For example, the implementation of preferential monetary and credit policies, and the backward areas and vulnerable groups “Financial poverty alleviation involves fairness and fairness.” Risk compensation is another theoretical basis for poverty alleviation finance. The financial industry is a high-risk industry. To dilute risk for members of society is one of the values of financial institutions engaged in financial activities. There are many ways and means to dilute risks, not only to avoid risks and transfer risks, but also to compensate for risks. Financial institutions engaged in compensation risks are fully reflected in the insurance industry. In fact, financial institutions such as banks and securities also have the function of compensating for risks. In the process of financing, if the “vulnerable group” borrowing cannot be returned and the loss of the fruit account is formed, the loss can be regarded as the risk compensation for them (“because of the weak”). Financial institutions dilute risks for vulnerable groups, which is conducive to poverty alleviation and poverty alleviation, and promote the realization of the goal of building a well-off society in an all-round way.

China’s Financial Poverty Alleviation Mechanism Under …

1009

3 Experiments 3.1 Experimental Object From the perspective of rural digital finance, with the background of precise poverty alleviation strategy, and based on the relevant realistic background and theory, to promote the effective development of precision poverty alleviation work in Henan Province, this paper analyzes the rural finance in Henan Province to promote precision poverty alleviation. The problems in the work have concluded that the rural financial mechanism in Henan Province is not perfect, the management is not in place, the rural financial market is chaotic, the products are single, the rural financial service system is rigid, the rural poor areas have difficulty accessing rural financial support, and they are not used in the precise poverty alleviation work. In place and other issues.

3.2 Experimental Methods (1)

(2)

(3)

(4)

Literature review method This paper explores the specific application of the rural financial precision poverty alleviation model by reviewing the relevant data of rural financial development in Henan Province and the theoretical explanations of rural financial precision poverty alleviation by domestic and foreign scholars, combined with the policies of precision poverty alleviation issued by the provincial government of Henan Province. Identify problems in the process of inquiry, and then propose countermeasures based on the theoretical basis. Inductive summarization Through the practical analysis of the rural financial precision poverty alleviation model in Henan Province, this paper systematically summarizes the overall situation and practice path of the implementation of the rural financial precision poverty alleviation model in Henan Province, and specifically analyzes the problems existing in each subject and link in the implementation process. Historical analysis This article traces the historical process of poverty alleviation in China, and puts forward corresponding countermeasures and suggestions on how to implement the implementation of rural financial precision poverty alleviation mode in the next stage. Comparative Research Method This paper analyzes the achievements and differences in the rural financial precision poverty alleviation model in different poverty-stricken areas in Henan Province, and proposes how to improve the practical problem of rural financial poverty alleviation in Henan Province.

1010

Y. Zhao

Table 1 Disposable income of residents of two poverty-stricken counties (unit: yuan) Nanzhao County

Sheqi County

Year

2018

2017

2018

2017

Disposable income

9274

8136

9012

7959

Speed increase

13.99%

10.06%

13.23%

9.61%

Source: Nanyang City Statistical Data Bulletin

4 Discussion 4.1 Analysis of Changes in Disposable Income of Rural Residents in Different Poverty-Stricken Areas Two major poverty-stricken counties in the economic development of povertystricken areas are used as an example to comment on the current economic development of poverty-stricken areas. The changes in disposable income of rural residents in the two poverty-stricken counties in the past two years, as shown in Table 1. The disposable income of rural residents in Nanzhao County is increasing year by year. In 2017, the disposable income of rural residents in Nanzhao County was 8,136 yuan. By 2018, the disposable income of rural residents in Nanzhao County reached 9274 yuan, and the disposable income of rural residents in Nanzhao County over the years. The growth rate of more than 10%, the increase of disposable income of rural residents has gradually changed the consumption pattern of rural residents, and the Engel coefficient of rural residents has been decreasing, indicating that the consumption pattern of rural residents in Nanzhao County is changing from food consumption to current consumption. Consumption in various aspects such as culture and tourism. The disposable income of rural residents in Sheqi County increased year by year. The average annual growth rate of disposable income of rural residents in Sheqi County was 13.23% from 2017 to 2018. The per capita disposable income of rural residents in Sheqi County increased from 7959 yuan in 2017 to 2018. 9012 yuan of the year. Since 2017, the economic development of Sheqi County has been in good shape, and the income of rural residents in Xishe County has been greatly improved.

4.2 The Relationship Between Financial Development and Poverty Level Impulse response analysis uses a random perturbation term as a pulse variable to apply a unit standard deviation of the endogenous variables in the model to characterize the current and future effects of the endogenous variable. The ordinate axis of the impulse response graph represents the response of the response variable to the impact, and the

China’s Financial Poverty Alleviation Mechanism Under …

1011

Response

0.01 0 1

2

3

4

5

6

7

8

9 10 11 12 13 14 15 16 17 18

Response

-0.01 -0.02 -0.03 -0.04 -0.05

Number of periods Fig. 1 Impulse response diagram

abscissa axis represents the lag period in which the impact is applied. In this paper, poverty has an impact on other variables, and an 18-phase impulse response map is made. Apply a positive impact of one unit of inclusive financial penetration to the poverty level and observe the response of the poverty level to the impact. In the first period, the performance lags to 0, then declines rapidly, the second period reaches − 4.1%, and the third period reaches the negative peak − 4.5%, indicating that in the second to third periods, the inclusive financial permeability will significantly reduce poverty. The fourth rebound was a slight positive effect of 0.05%, the fifth phase again showed a weakening effect of − 1.6%, followed by the sixth phase of the poverty reduction effect of − 0.4%, and the seventh phase of −1%. The 8–9th period rebounded again to a very slight positive effect, reaching 0.6%, and then the 18th period showed a very slight fluctuation close to zero. Overall, financial penetration can significantly reduce poverty in the short term, reaching a peak of −4.7% in the third period, and then showing weaker ability to reduce poverty, but still has a slight effect of suppressing poverty, and the long-term effect is not obvious (Fig. 1).

5 Conclusions The development of information technology and the Internet has given birth to the new economic form of the digital economy, which is characterized by digitization, integration and inclusiveness. The essence of rural poverty in the era of digital economy is information poverty, which is essentially the lack of information “potential” and “capacity” of poverty-stricken people. Rural poverty alleviation needs to

1012

Y. Zhao

focus on this new type of poverty problem, carry out information poverty alleviation, and improve the self-poverty of the poor. Ability and self-development ability. From the basic framework of the rural information poverty alleviation ecosystem constructed by the theory of information ecosystem, information resources, information providers and demanders, and the information environment are the core elements of the framework. The rural poor get information, transform information and realize the value of information. It is a key link in information poverty alleviation. Acknowledgements This work was supported by scientific research fund project of Yunnan Education Department (project number: 2019J0816)

References 1. Milskaya, E., Seeleva, O.: Main directions of development of infrastructure in digital economy. In: IOP Conference Series Materials Science and Engineering, vol. 497, issue no. (1), pp. 012081 (2019) 2. Nguyen, C.V., Pham, N.M.: Economic growth, inequality, and poverty in Vietnam. Asian-Pac. Econ. Lit. 32 (2018) 3. Drahokoupil, J., Jepsen, M.: The digital economy and its implications for labour: 1. The platform economy (introduction to the special issue of transfer. Transfer 23(2), 103–119 (2017) 4. Arnold, J.M., Farinha Rodrigues, C.: Reducing inequality and poverty in Portugal. Soc. Sci. Electron. Publishing 1258 (2015) 5. Shuai, D.: Targeted poverty alleviation: the institutional design and implementation. Front. 67(4), 561–470 (2017) 6. Tonks, P.: Scottish political economy, education and the management of poverty in industrializing Britain: patrick colquhoun and the westminster free school model. History 101(347) (2016) 7. Shao-Jin, H., Shan-Min, L.I.: Poverty alleviation mechanism of Farmers’ credit: a comparison between the loan and non-loan households. Financ. Theor. Pract. 28(6), 113–116 (2017). (in Chinese) 8. He, W.-h.: The research on the incentive and restrain mechanism of financial precision for poverty alleviation in China. Financ. Theor. Pract. 65(1), 78–85. (in Chinese) 9. Dechao, S., Tian, B.: On the internal mechanism and realization path of the participatory help under the perspective of targeted poverty alleviation. J. Soc. Sci. 43(11), 17–20 (2017) 10. Liu, X., Yang, H., Yun, W.: Patterns of land consolidation promoting poverty alleviation in poor areas and its application. Trans. Chin. Soc. Agric. Eng. 17(8), 234–240 (2018). (in Chinese) 11. Gong, C.: Research on the Coupling of Industrial Structure and Environment between China and the “Belt and Road” countries-take the 10 ASEAN countries as an example. Int. J. Front Sociol. 1(1), 89–98 (2019)

Optimization of Intelligent Elderly Care Industry Under the Background of Big Data Yifan Ji

Abstract Along with the aggravation of the aging problem, the burden on the supply of elderly care resources has increased, and the traditional elderly care mode and industrial structure have been unable to meet demand. It is necessary to analyze the structural problems of imbalance between supply and demand with the help of big data information technology. Under the condition, the intelligent elderly care industry emerged as a viable direction for the transformation of the industry, fully combining information technology and customized business concepts. This article will explain the concept of the intelligent elderly care industry and the reasons for developing the kind of industry, and focus on the future development direction and key points to attention of the intelligent elderly care industry from the perspective of industry optimization. Keywords Big data · Intelligent elderly care · Industry optimization

1 Introduction Aging is a social topic that has been on the rise all over the world. According to the statistics, the world’s “getting old” speed has accelerated significantly after entering the twenty-first century. In 2000, the world population’s old age ratio was 6.89%. As of 2019, the ratio has risen to 9%. Actually, the challenges faced by the elderly care industry are becoming increasingly severe. The dependency ratio has increased year by year, however, the universal problem of “getting old before getting rich” has become a key obstacle for the elderly care industry to develop high-quality services. How to improve the accuracy of matching health care services while maintaining costs or even reducing costs? How to quickly divide consumer groups and determine market positioning in the current era of diversified consumer demand? The elderly care industry is actually learning from the new practices of other service industries. Y. Ji (B) Wuhan University of Science and Technology, Wuhan, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_125

1013

1014

Y. Ji

Combining a certain industry with Internet technology has become a trend in the past five years. In the era of big data, the construction of a multi-dimensional information platform enables to share resources customers’ core data in the industry, and the market for smart products produced with the help of positioning technology and sensor technology is gradually opening up. Big data and cloud platforms have moved from industrial production to service supply at an extremely fast pace. The elderly care industry is also following the trend, creating a new smart elderly care industry through technological innovation, forming a new industrial ecosystem that combines both science and ethics.

2 Related Issues About the Intelligent Elderly Care Industry 2.1 What is Intelligent Elderly Care? The concept of intelligent elderly care is formed relative to the traditional elderly care mode. The current intelligent elderly care industry hopes to use the Internet of Things, the Internet and various information technologies (such as wireless positioning technology, intelligent perception technology, etc.) as the core technical support on the basis of conventional services such as life care and medical care in traditional elderly care institutions, taking elderly care institutions, large communities, public medical institutions, and non-profit health medical institutions as the main venues, extensively and comprehensively collect and grasp the personal information of the elderly in the community or institutions, and then fully integrate the diversified elderly service resources, and finally achieve as much as possible to meet the personalized and multi-level requirements of contemporary elderly living. The smart elderly care industry is an industrial restructuring resulting from the advancement of information technology and the needs of social and economic development. Once promoted, big data technology has developed rapidly and is applied to various production and service industries. As the elderly care industry is a common social problem in all countries, improving the quality and efficiency of services through data analysis and smart equipment will be beneficial to rational allocation of resources and fair open competition of the entire industry. The promotion of the smart elderly care industry in developing countries is conducive to preventing the unbalanced structure of available resources and service supply and demand for the elderly, and can also help the elderly to obtain more suitable services under limited economic conditions.

Optimization of Intelligent Elderly Care Industry Under …

1015

2.2 Why Develop Intelligent Elderly Care? The elderly care industry and related service care industries in developed countries have taken the lead to enter a state of orderly competition and high quality. In an active and orderly market environment, the richness of service content and coverage of service targets in some western countries’ elderly care industries has basically fulfilled the main needs of the local elderly groups (note that this mainly refers to the elderly who have the ability to pay and have better economic conditions), but the widespread application of the Internet and the popularization of big data technology have made the young and middle-aged people make new plans about elderly care that conforms to the brand new era. With the emergence of a number of smart elderly care industries, traditional elderly care institutions are also rapidly undergoing informatization and intelligent transformation. Developing countries are also experimenting with intelligent care modes, but they are currently in the exploratory stage. As the level of aging in developing countries is increasing year by year, and the burden of social pensions is too large, the current focus of the entire society is on ensuring the basic living standards and basic rights of the elderly. But the integration of big data technology has obviously advantages for developing countries to integrates resources and adjust the contradiction between supply and demand of old age service products, so the development of the smart elderly care industry has received attention and support from the government. In these countries, smart elderly care is not only an innovation in the elderly care mode, but also a strategic choice to address the burden of social supply. From the perspective of the needs of the elderly, based on Maslow’s hierarchy of needs theory, needs are divided into five levels: physiological needs, safety needs, emotional and belonging needs, respect needs, and self-realization needs, even under the constraints of economic conditions, the normal five-level needs of the elderly also exist in themselves. Some public service agencies or non-profit organizations are committed to satisfying the various needs of the elderly as much as possible under limited conditions. At the same time, the elderly’s needs for healthcare have also gradually changed with the upgrading of social concepts and technological levels, and their needs are more diversified and personalized. Whether it is home care or institutional care, they hope to achieve faster and more convenient communication feedback. Henna Hasson and Lungren Dan also pointed out in their research that emphasizing communication and feedback is conducive to the improvement of the service itself [1, 2]. This is fully realized by the current big data technology, which collects and counts various detailed information of residents (including family structure, health status, education background, economic income, etc.), and automatically matching for different types of elderly through scientific and systematic data analysis. For the elderly care products or institutions, the health care industry can also use the data of the information platform to achieve targeted research and development of smart terminal products, similar to health index monitoring bracelets and small home smart robots, etc.

1016

Y. Ji

The advantages of the intelligent elderly care mode and industry are more prominent from the comparison. The traditional elderly care industry is more inclined to determine the supply of products and services based on the actual needs and wishes of consumers, and then carry out large-scale delivery after determining the target group. In fact, this kind of supply mode has obvious delays, which can easily lead to a disconnect with the actual situation of the market and consumers, and seriously affect service efficiency. The service content of the traditional elderly care industry is relatively single and fixed for a long period of time, mainly focusing on medical care and basic life care, lacking customized and personalized services, and it has become increasingly unable to meet the needs of elderly people in the new era. It is even more difficult for the traditional elderly care industry to pay attention to the number and dynamic changes of potential market demand, because the elderly’ needs are influenced by too many factors, and sometimes residents or consumers themselves may not be able to fully express their personal demands, which is a major challenge for private elderly care institutions. The new smart elderly care industry relies on big data analysis methods to solve these problems to a large extent, analyzing and predicting consumer preferences,exploring the correlation level of data from different perspectives and the needs of the elderly, and preemptively customizing representativeness the list of services is available for consumers to choose from. In addition, Bennie Wong believes that the electronic medical system based on Internet of Things (IOT) technology is much more timeliness and scientific than the traditional medical care system for the elderly, and can enhance the medical service response capacity of the elderly [3].

3 Future Optimization Direction–Combining Big Data Technology A complete intelligent elderly care system generally adopts a combined online and offline mode (as shown in Fig. 1). While ensuring the quality of offline service organizations, it pays more attention to the development of online information platforms and all kinds of smart devices.

3.1 Smart Devices Intelligent elderly care equipment products designed in combination with the Internet and smart sensor technology are of great significance to ensure the personal safety of the elderly and improve their quality of life. This kind of intelligent equipment is mainly divided into several major categories, namely robots, monitoring products, sports auxiliary equipment and health management software. For the senile and disabled elderly, assistive devices and home robots can reduce the difficulty of

Optimization of Intelligent Elderly Care Industry Under … Fig. 1 Intelligent elderly care mode

1017

Information Platform & Online Service

Smart Devices

Offline Service

The Elderly

the elderly in their daily activities, so that the elderly can avoid safety risks caused by moving heavy objects or doing household chores. As tested by David Portugal’s team in the younger elderly population, they found that the elderly were generally receptive to the services and information provided by robots, and that home robots were somewhat effective in reducing the risks associated with heavy lifting and household chores, what’s more, it also has been shown to alleviate lonely depression in the elderly [4]. In countries with advanced medical technology, wearable medical devices (WMD) have a good performance in collecting raw data and disease conditions of the elderly. Major medical sponsor companies have also launched representative products that are generally well received by the elderly users [5]. For the elderly suffering from mental illness or chronic disease, monitoring smart products can help their children and family members to know the physical condition of the elderly in time. The early warning system will automatically ask for help or prompt relatives in emergencies to avoid delays in rescue. Paul C. found that about 41.2% of elderly people limit their activities for fear of falling, and the smart device alerts can reduce the risk of falling and other injuries [6]. The monitoring and positioning system can prevent the elderly from getting lost, and can timely return information and geographic location in the event of an accident involving the elderly. For the younger aged, some intelligent software (such as health information management software) can allow the elderly with operational and receptive ability to obtain effective advices through simple operations, and they can also directly book services and purchase auxiliary products through the software. One point that the industry must pay attention to in the future development process is that not blindly pursuing the gimmick of intelligent products, but focusing on the development of core technologies, as Riitta Suhonen argues, the whole industry need to further strengthen the integration of smart equipment and information technology (e.g. the proper use of costomized devices to complement care) to bring consumers a better experience [7].

1018

Y. Ji

3.2 Information Platform The online service platform is a supplementary form to the services of offline entities, saving the time cost and physical consumption of the elderly, and at the same time can provide a wider range of service items and information resources than offline places. Online platforms are more suitable for younger aged and their families to participate in. The current elderly care industry attaches great importance to the construction of network service platforms, although most companies use online and offline combination mode, there are also many companies that fully adopt online services as outsourcing service companies for some entities. The operating mode of the online service platform is very common in all types of service industries, but it still needs to be promoted and perfected in the elderly care industry, because the health of the elderly is a widespread and sensitive issue, and consumers and their families would demand a high-level of safety and security of the online platform, so the brand image of elderly care institutions has an important impact on the credibility of their online service platforms. The win–win cooperation between network service platforms is of key significance to the overall quality of the intelligent elderly care industry. The combination of medical service platforms and elderly care information systems can improve service quality on a larger scale and provide more scientific and reliable medical services for the elderly. Health data can also be connected to medical institutions and networks for remote video consultation and communication consultation, thus breaking through the limitations of time and space. The connection between the community information management platform and the elderly care information system can provide the elderly and community service centers with dynamic information about the resources within the community more directly. In terms of human resources, the shortage of professional talents and teams is a long-term problem that needs to be solved for the further development of elderly care institutions. Publishing project information on the official information platform can actively mobilize community staff and volunteers to provide on-site assistance for the elderly, which helps the elderly receive mental comfort while enjoying basic services. Scholars such as Ruiwang believe that the concept of an intelligent community service platform needs to be piloted as soon as possible, and an O2O model can be established to better coordinate the elderly care resources within the community on this basis [8]. On the other hand, for community work, this online service platform mode can greatly enhance the efficiency of such matters as the promotion of the rule of law, the protection of rights and interests, and the mediation of contradictions within the community, forming a mutual benefit pattern. In the future, the elderly personal information data platform will integrate more Internet technologies, such as the application of cloud platforms to achieve crossregional sharing of health data, and to achieve long-term and comprehensive health interventions for the elderly through the update of dynamic information, which helps the industry transformed from delayed elderly care services into a dynamic adjustment mode that actively matches the pace of consumer elderly care life. Schofield

Optimization of Intelligent Elderly Care Industry Under …

1019

Richard S. found in the process of conducting a veteran rehabilitation survey that many elderly rehabilitation organizations provide customers with remote medical management plans, so that elderly people with limited mobility or travel restrictions can also experience scientific and reliable customized service packages [9]. The role of big data is more prominently reflected in the analytical value of consumer group information. By collecting these data with reference value, the health status and demand preferences of the elderly and individual consumers can be analyzed separately through model calculations. The results can support the expansion of the smart elderly care industry in the field of medical healthcare and application in software development and product design, and promote the transformation of services in the entire elderly care industry (especially in developing countries) to personalized and customized services.

3.3 Network Security One of the major reasons why the combination of the Internet and old-age security cannot expand the audience is the issue of network information security, which is also a controversial aspect of the current service industry market. In the Internet era, the importance of personal information security has risen to a higher position. Consumers not only hope to obtain unprecedented convenience through smart terminals and huge information platforms, but are also very resistant to personal information leakage that causes damage to personal and family interests. How to solve this problem is not something that can be fully considered by a certain company, but rather requires the entire intelligent elderly care industry to reach a consensus on technology and concepts, and form a network supervision system with certain constraints. If necessary, sign a relevant aggreement to ensure fair competition and information security sharing. The elderly care industry can not only deal with information security issues from the supplier’s side, but also hand over rights to their consumers. In her research, Galina clearly pointed out that effective supervision and evaluation are essential in the long-term care of the elderly in China, and should be used as the basic threshold for the elderly care industry [10]. Similar practices are common, for example, in the evaluation system of online service platforms, the elderly can provide immediate feedback and evaluation after consumption, either on product or service personnel. Once infringement occurs, they can directly complain and feedback, and the consumer’s evaluation is publicized and verified by relevant government regulatory authorities. Similar methods are used to ensure that the elderly will not be cheated or even treated unfairly in the process of purchasing and enjoying services.

1020

Y. Ji

4 Conclusion Technological innovation always promotes industrial restructuring and innovation. Perhaps the elderly care industry lags behind other service industries in the process of informatization transformation, but this is also due to the special nature of the elderly care–this kind of industry has very high safety and professional requirements, and attaches great importance to humanistic care and corporate ethical culture. Therefore, the continued improvement of the smart elderly care industry needs to improve the technical foundation first, so that the various subdivided elderly care service projects and the big data analysis operation mode can be better integrated, and strive to avoid focusing more on forms than the content; secondly, to open the market and let more of consumers (especially middle-aged potential demand groups) see the special advantages of intelligent healthcare, focus on consumer experience, and gradually establish a good credibility of the indusrty.

References 1. Hasson, H., Arnetz, J.E.: Care recipients’ and family members’ perceptions of quality of older people care: a comparison of home-based care and nursing homes. J. Clin. Nurs. 20(9–10) (2011) 2. Lundgren, D., Ernsth, Bravell, M., Börjesson, U., Kåreholt, I.: The association between psychosocial work environment and satisfaction with old age care among care recipients. J. Appl. Gerontol. Official J. South. Gerontological Soc. 39(7) (2020) 3. Wong, B., Ho, G.T.S., Tsui, E.: Development of an intelligent e-healthcare system for the domestic care industry. Ind. Manag. Data Syst. 117(7) (2017) 4. Portugal, D., Alvito, P., Christodoulou, E., Samaras, G., Dias, J.: A study on the deployment of a service robot in an elderly care center. Int. J. Soc. Robot. 11(2) (2019) 5. Ba, T., Li, S., Wei, Y.: A data-driven Machine learning integrated wearable medical sensor framework for elderly care service. Meas. 5(4) (2020) 6. Fletcher, P.C., Guthrie, D.M., Berg, K., Hirdes, J.P.: Risk factors for restriction in activity associated with fear of falling among seniors within the community. J. Patient Saf. 6(3) (2010) 7. Suhonen, R., Charalambous, A., Stolt, M., Katajisto, J., Puro, M.: Caregivers’ work satisfaction and individualised care in care settings for older people. J. Clin. Nurs. 22(3–4) (2013) 8. Wang, R.: Internet plus pension service platform: O2O mode construction of supply and demand of pension services. J. Residuals Sci. Technol. 13(6) (2016) 9. Schofield, R.S., Kline, S.E., Schmalfuss, C.M., Carver, H.M., Aranda, J.M., Pauly, D.F., Hill, J.A., Neugaard, B.I., Chumbler, N.R.: Early outcomes of a care coordination-enhanced telehome care program for elderly veterans with chronic heart failure. Telemedicine J. e-health Official J. Am. Telemed. Assoc. 11(1) (2005) 10. Andryushchenko, G.I., Savina, M.V., Soldatov, A.A., Bikbulatova, A.A., Samofatova, K.A.: Efficiency improvement of long-term care for senior citizens in the Russian Federation. Acad. J. Interdisc. Stud. 8(2) (2019)

A Super Resolution Algorithm Based On Content Regional Division Xinyi Liang, Kaiyan Zhou, Chenlei Lv, Xin Zheng, and Qian Yin

Abstract In the field of image process research, super-resolution algorithm is very important and widely used in practice. Some traditional super-resolution algorithms run fast and keep a consistent structure between the original image and superresolution result, but cannot rebuild the detail information. Other deep learning algorithms can achieve better results, but are time-consume. We propose a new superresolution algorithm based on content regional division. According to the similarity of image content, the image is divided into several parts. If patches of these areas can match with the patches in the database, the corresponding algorithm is used to replace them; otherwise, the self-similar method is used for super-resolution processing. The experiment shows that we can get acceptable high-resolution images at higher speed. Keywords Super resolution · Contend regional · Division

1 Introduction Nowadays, with the development of image technology, there are many kinds of modern digital camera equipment and imaging equipment, but they are lack of uniform standards. The information about images and videos need to readjust the compatibility when they transfer among different equipment. Super-resolution refers to the reconstruction of corresponding high-resolution images from observed lowresolution images. The super resolution algorithm tries to keep consistency between the original image with super resolution result and reconstruct the detail information. There are kinds of super-resolution technologies: interpolation-based, learningbased and reconstruction-based. The classical interpolation algorithms are bilinear X. Liang · K. Zhou · X. Zheng (B) · Q. Yin Image Processing and Pattern Recognition Laboratory, School of Artificial Intelligence, Beijing Normal University, Beijing, China e-mail: [email protected] C. Lv School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_126

1021

1022

X. Liang et al.

interpolation and bicubic interpolation [1]. The reconstruction-based method mainly has two steps: registration and reconstruction [2]. Projection algorithm is a reconstruction-based method to deal with the super resolution. M.Irani’s work [3] based on this idea. The self-similarity method in Freedman’s paper [4] also uses the core idea of projection algorithm. Probability statistics are also widely used in superresolution image processing. Similar theories are used by [5–7]. The most popular machine learning algorithms are widely used in super-resolution processing. The most classic papers based on deep learning arithmetic like [8–10]. But the most important issue is deep learning model training data takes a lot of time. Another method is using an image database to process images. This method was first proposed by Freeman in 2002 [11]. A main idea of the method is using examples from previous successful super resolution results in a database and searching the detail to mixed new results for pending images. However, the speed of this method is slow in practice, and the performance has a close relationship with the quality and quantity of the database. Our super-resolution algorithm framework is designed to solve these problems by using an idea of finding the consistent content region and compute the result in the regional content division independently. For example, a natural image may have several contents such as cloud, blue sky, and sand beach. Through our algorithm framework, the super resolution results retain the boundary information, content details, and texture in the original image. We use the work of Freeman [11] to build the image database, but the difference is that we created a content area division preprocessing for the database. When we search the database to match a pair of image patches, the index can guide the algorithm to search only the relevant content area. Experimental results show that our framework can get a better result and is faster than the method of Freeman, and we add a self-similar matching method to improve speed and avoid unexpected errors that generated if the database does not have similar content to match a particular original image patch.

2 Theory Support for Content Information Partition The nature images are composed of different contents of regional information, including sky, cloud, cultural scenery and so on. It is crucial to recognize contents and divide the image according to the content information. Barnes [12] in 2009 proposed a method which named Patch Match to solve the problem of structural image editing, the interactive image editing tools for finding the approximate nearest-neighbor algorithm to find the patches which have similar content in context. In HaCohen 2011’s paper [13], the Patch Match method is used to find similar content in different pictures. Moreover, HaCohen used the method NRDC (Non-Rigid Dense Correspondence) [13] to find the content is strict and it considers most conditions such as scale and rotation. In our work, we do not compute so much information and just to find the similar texture region, so we modify the NRDC method and use the idea of histogram matching method to identify the content information. Through the experiment, it

A Super Resolution Algorithm Based On Content Regional Division

1023

Fig 1. The left pictures are the contents from images; the right picture is hue saturation histograms with 16 levels for H channel and 8 levels for S channel

can be seen that the pixel distribution of the image region with consistent texture or content information presents certain regularity. We use comparison diagrams to show that the same contents have a similar probability distribution in Fig. 1. The hue saturation histograms are built from the contents: cloud and Baboons’ hair. We divide the image into patches and calculate the histogram information for all patches to find similar patches. Finally, we use methods like the NRDC [13] for nearest neighbor search and combine the contiguous texture regions and store in the list. C( p) =  pm − pi 2

(1)

Tm = { pi |C( pi ) < s}

(2)

All the computing process works we talk about are through the histogram’s value to get the result. C is the value to assess the error of two patches’ match process. Pm is the patch we choose to be the texture match template, Pi is the patch which is waiting for match process with Pm . Tm is a texture region with discrete patches complies with uniform template Pm . s is the threshold for C.

3 Processing 3.1 Image Database Processing The main idea of establishing database comes from Freeman 2002 [7]. The image regions with similar content and regular texture information in the initial image database are divided and set the index of similar content. We establish the index set pindex for different regions of the image database so that we establish an image set with index divided according to the content information

1024

X. Liang et al.

for the image database, which is used to guide the content partition of the original image. We have partitioned all the content information of the image database and built the index of the content information. In this way, when finding the original image patches similar to the image from the image database (in the step 3.4), we avoid searching all the image database to improve the search speed and reduce the possibility of mismatching different content information.

3.2 Image Division The index set pindex obtained in step 3.1 is used to match the patch block of the original image. A region of the original image with the same information is partitioned and set a matrix in the image which is to represent the content partition. The hue saturation histogram matching is still used to distinguish different content information. So we divide the original image into patches according to the fixed size and compare the histogram matching degree patch by patch, and then find the similar content information location, and complete the partition of the original image. We set the match coefficient M to determine the patch’s content. In order to judge patch p whether belong to content i, we use the H function to get the hue saturation histogram of the patch p and match the histogram with the patch index p in content i. if the result less than M, the patch p is added to content i. All patched come from the original image I. Contenti = { p|H ( p, pindex ) < M}, p ∈ I

(3)

We set the M to 0.5. The scale of the patch is crucial because if the scale cannot make an unaccepted error when it is larger and cannot express the regular when it is small. We compare result based on the different scale of the patch and get a better scale range: 10*10~30*30. We use the scale 20*20 in our method. The Fig. 2 shows that use the histogram matching method can get consistent content. However, the boundary of the content is not clear and has serration. It can be solved by iteration subdivide for boundary patch in content.

3.3 Image Matching We build a matrix in the step 3.2 to represent the content division. In the search process for match patches, our method finds the related index in matrix first. Through the index, the method can get the position of the content that the match process. The matrix’s indexes have one to one correspondence with the image patches in the database. So after the content’s index is determined, the method avoids searching all patches in the database. In Fig. 3, the original image needs to find the content of the

A Super Resolution Algorithm Based On Content Regional Division

1025

Fig 2. The yellow region and the green region show different content

Fig 3. The process of search database

cloud. Through the step 3.2 and the process of search the content index matrix of the database, the method gets the position of all patches to belong to the content of cloud in the database. U1 is an original image, and P1 is the patch that is matching in the framework.

3.4 Synthesis of Result For the final resultant synthesis, our core idea is similar to Freeman’s work [7]. By comparing the matching degree of the low-frequency information of the preprocessed super-resolution image of the original image and combining the continuity of the high-frequency information, the final result can be reconstructed with details. According to the Freeman’s experiment, we found two problems exist in Freeman’s method. First, if the database has not a similar image patch to the original image patch, the final result will become unacceptable. The other problem is the method’s run time is unaccepted when the database has a large scale.

1026

X. Liang et al.

Fig 4. The pipeline of our super-resolution processing

Our method proposes a feasible solution for the two problems. Since we have finished the content, regional division for the original image in step 3.2, the method just searches the related content regional but not the whole database. We also combine the self-similar match that idea comes from Freedman 2008 [4]. Add the original image itself to the database and build the similar match patches pair. From the above, our method can improve the super-resolution algorithm and solve the two problems. In Fig 4, the framework of our method builds the preprocess super-resolution result U from the original image first. Then it gets the patch p with low-frequency information to match the database’s content. Through the method search matrix which has been discussing in step 3.3 to determine the associated content Z. The final process of the pipeline is searching the matching patch from the content Z to p and achieves the synthesis new p with the high-frequency detail. Compute the patches one by one the method would get the final super-resolution result. The process of patch match should consider two factors: low-frequency information’s consistency and high-frequency information’s continuity. For the first work, it can be solved through minimum function value. El_err or =  p − pdata 2 , p ∈ content Z

(4)

pdata belongs to a set of the patches from the content Z and the error value less than defined threshold h. After the search, we can get the most similar patch with the p. For the second work it can be expressed as a function:  2 E h_err or =  pdata − p pr evious  , pdata ∈ { pdata |El_err or < h}

(5)

It means that use the previous result patch p pr evious to search the most continuous patch in a patch set that concludes pdata which meets the condition. Combine the two functions can get a final energy equation to solve the match patch problem: E err or = λEl_err or + (1 − λ)E h_err or .

(6)

A Super Resolution Algorithm Based On Content Regional Division

1027

λ is a parameter for control the weight between consistency and continuity. We search the patch pdata which makes the E err or minimum to our final result’s patch.

4 Experimental Result We set the super-resolution multiple is 4 and use several pictures with different contents to observe the experimental results. SSIM is an index to measure the similarity of two images. The higher the SSIM, the more similar the structure, and the better the experimental results. We calculated SSIM values for different methods, as shown in Table 1. The experimental results show that Freeman [11] has the highest SSIM value in some pictures, in other images, the super-resolution results of our method have higher SSIM values which are much higher than bicubic interpolation in SSIM data. According to the experimental results, our method is superior to the traditional interpolation method. Intuitively, in Fig. 5 we present two sets of experimental results show that Freeman’s final super-resolution results have some noise information, but the boundary topography is relatively clear. The Freedman’s work [4] has a good result for a single content region, but details can be lost in a complex content region. Our method has a balance appearance whether the continuous content region or complex one. In terms of processing speed, we compare the results of Fig. 5 images which are zoomed from about 100,000 pixels to 400,000 pixels from different methods. We did these experiments on a computer of Intel(R) Core(TM) i7-7700 CPU, 3.60GHz, 16G RAM. SRCNN [8] is the slowest and needs nearly 14 hours. Our method faster than Freeman’s method [7]. In our approach, the average time to process a superresolution image takes about two minutes, while the freeman method takes about ten minutes. Our contribution is not to make the speed of the algorithm like Freedman’s method but try to make the method with search in the database has acceptable time consumption. In contrast, our method has a good reconstruction effect on the original image, especially on the complicated details of pixel distribution. Table 1 SSIM values of four super-resolution algorithms comparison Method

Linear

Bicubic

Freedman

Freeman

Our method

Beach

0.8094

0.8145

0.7779

0.8717

0.8746

Girl

0.6652

0.6906

0.6793

0.7358

0.7875

Daisy

0.7359

0.7823

0.7685

0.8910

0.8680

1028

X. Liang et al.

(a)

(a)

(b)

(b)

(c)

(c)

(d)

(d)

(e)

(e)

Fig 5. The final results for super-resolution come from different methods. a Bilnear; b Bicubic; c Gilad Freedman; d Freeman; e our method

5 Conclusions Our method improves Freeman’s work by using the idea of regional content division. It can make the method faster and more precise. In future research, we consider using the technology of parallel computing such as CUDA or OpenCL to increase the framework’s speed and make it to video super-resolution in real-time. The other idea for improvement is building the self-similar map. It can be used for patch match which can make the result more consistent [14, 15]. Acknowledgements The research work described in this paper was fully supported by the National Key R & D program of China (2017YFC1502505) and the Joint Research Fund in Astronomy (U2031136) under cooperative agreement between the National Natural Science Foundation of China (NSFC) and Chinese Academy of Sciences (CAS). Professor Xin Zheng and Qian Yin are the authors to whom all correspondence should be addressed.

A Super Resolution Algorithm Based On Content Regional Division

1029

References 1. Xin, L.I., Orchard, M.T.: New edge-directed interpolation. IEEE Trans. Image Process. 10(10), 1521–1527 (2001). https://doi.org/10.1109/83.951537 2. Keys, R.: Cubic convolution interpolation for digital image processing. IEEE Trans. Acoustics Speech Sig. Process. 29(6), 1153–1160 (1981) 3. Irani, M., Peleg, S.: Improving resolution by image registration. CVGIP: Graph. Models Image Process. 53(3), 231–239 (1991). https://doi.org/10.1016/1049-9652(91)90045-L 4. Freedman, G., Fattal, R.: Image and video upscaling from local self-examples. ACM Trans. Graph. 30(2), 12–11211 (2011). https://doi.org/10.1145/1944846.1944852 5. Cheeseman, P., Kanefsky : Subpixel resolution from multiple images 25, 241 (1994) 6. Schultz, R.R., Stevenson, R.L.: Extraction of high-resolution frames from video sequences. IEEE Trans. Image Process. 5(6), 996–1011 (1996). https://doi.org/10.1109/83.503915 7. Fattal, R.: Image up-sampling via imposed edge statistics. ACM Trans. Graph 26(3) (2007). https://doi.org/10.1145/1276377.1276496 8. Dong, C., Loy, C.C., He, K., Tang, X.: Image super-resolution using deep convolutional networks. CoRR abs/1501.00092 (2015). 1501.00092 9. Dong, C., Loy, C.C., Tang, X.: Accelerating the super-resolution convolutional neural network. CoRR abs/1608.00367 (2016). 1608.00367 10. Shi, W., Caballero, J., Husz´ar, F., Totz, J., Aitken, A.P., Bishop, R., Rueckert, D., Wang, Z.: Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network. CoRR abs/1609.05158 (2016). 1609.05158. 11. Freeman, W.T., Jones, T.R., Pasztor, E.C.: Example-based super-resolution. IEEE Comput Graph Appl 22(2), 56–65 (2002). https://doi.org/10.1109/38.988747 12. Barnes, C., S, E., Finkelstein, A., G, D.B.: Patchmatch: A randomized correspondence algorithm for structural image editing. ACM Trans. Graph. 28(3), 24–12411 (2009) 13. HaCohen, Y., Shechtman, E., Goldman, D.B., L, D.: Non-rigid dense correspondence with applications for image enhancement. ACM Trans. Graph. 30(4), 70–17010 (2011) 14. Z W, Bovik, A.C., Sheikh, H.R., Sim, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004) 15. Zhang, L., Zhang, L., Mou, X.: Fsim: a feature similarity index for image quality assessment. Image Process. IEEE Trans. 20, 2378–2386 (2011)

Construction of Dynamic Early Warning Mechanism for Economic Risks Based on Hybrid Ant Colony Algorithm Jingbo Yu

Abstract In order to improve the dynamic early warning ability of economic risks, a dynamic early warning mechanism of economic risks based on hybrid ant colony algorithm is proposed, and the models of explanatory variables and control variables are constructed. This paper uses descriptive statistical analysis method to carry out dynamic early warning and risk capital assessment of economic risks, and establishes a regression analysis model of economic risks dynamic early warning combined with credit funds and financial development scale. The hybrid ant colony algorithm is used to dynamically evaluate the economic risks, and regression analysis and correlation analysis are used to realize the dynamic early warning evaluation of economic risks. The empirical results show that the mechanism has high accuracy and good global convergence, and can effectively realize the economic risks prediction and early warning. Keywords Hybrid ant colony algorithm · Economic risks · Dynamic Early warning · Regression analysis · Descriptive statistical analysis

1 Introduction In recent years, with the development of China’s enterprise financing reform and financial innovation, trust companies, guarantee companies and micro credit companies have developed rapidly. These companies have the characteristics of high leverage ratio and information asymmetry, which makes the economic risk and economic risk increase continuously. Economic risk refers to economic risk [1]. We should carry out dynamic early warning and monitoring of economic risks, realize economic transformation and upgrading under the new financial normal, reduce economic risks, reduce the leverage ratio of financial products, and improve the ability of financial supervision. J. Yu (B) School of Finance, Jilin Business and Technology College, Changchun 130000, Jilin Province, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_127

1031

1032

J. Yu

Traditionally, the comprehensive statistical method of financial industry is adopted to carry out economic risks early warning, to realize the whole process and the whole chain dynamic statistical monitoring of all financial institutions and financial activities. Under the important principle of guarding against systemic risk, systemically important financial holding groups may face additional supervision [2]. The implicit endorsement of a “big but not failing” government will face higher regulatory requirements, and the next step will need to be to look at whether systemically important financial groups actually control financial licensees and whether they will also face higher regulatory requirements. In some innovative business areas, such as Internet finance, as statistical time points back, the corresponding statistical system before the improvement of the relevant regulation may be very strict. To establish the corresponding relationship between the statistical indicators of banking, securities and insurance financial institutions and the statistical index system of assets and liabilities, to draw up a unified balance sheet of the financial industry [3], and to find out the financial industry’s family situation, We will further improve the statistics on the flow and stock of funds in financial activities, do a good job of linking up with national accounts, improve the statistical system of monetary credit and macro-control indicators, and improve the statistical monitoring of the transmission of monetary policies and the process of creating liquidity [4]. On this basis, improve the macro-leverage ratio statistics. At present, the main dynamic early warning methods for economic risks include F fraction model and MDA multivariate discriminant model and BP neural network model. The dynamic assessment of financial practice is monitored and the economic risks dynamic early warning is carried out in combination with the risk conduction mechanism. Some early warning effects have been achieved, but there are some problems in constructing the dynamic early-warning mechanism of economic risks, such as low accuracy and poor real-time, which cannot effectively deal with the financial crisis [5]. This paper attempts to solve the above problems through research.

2 Models of Explanatory Variables and Control Variables for Dynamic Early Warning of Economic Riskss 2.1 Variable Model In order to realize the dynamic evaluation of economic risks, we need to construct explanatory variables and control variable models for economic risk dynamic early warning, and use descriptive statistical analysis methods to evaluate economic risk dynamic early warning and venture capital [6]. Economic risks are mainly divided into economic risks and operational risks. The main cause of economic risk is internal control [7]. Through the analysis of economic risk control variables, combined with sudden economic risk and gradual economic risk, a dynamic early warning explanatory variable of economic risk is constructed. See Table 1 for details.

Construction of Dynamic Early Warning Mechanism for Economic … Table 1 Variable settings for dynamic early warning of economic riskss

Type of variables

Variable Names

1033 Variable codes

Explanatory variables Financial development FME scale Explained variables

Financing mode

FM

Financial capital structure

SC

Financial development PC efficiency Controlled variables

Enterprise scale

Size

Fiscal expenditure

MB

Asset-liability ratio

ALR

Profitability

Profitability

Excess return

REV

Operating leverage

OL

2.2 Descriptive Statistical Analysis According to the variable model constructed in Table 1, the dynamic Economic early warning model risks is constructed, and the dynamic Economic early warning model risks is established by using descriptive statistical analysis method. The average data of enterprise debt ratio are calculated [8]. Based on statistical regression analysis of economic risks data, adaptive pairs are performed using hybrid ant colony algorithm. Assuming that the initial ant colony number is N and the intermediate ant colony number is Nc, all approximate solutions in the initial ant colony can be regarded as one of the state space S 1 . Point, the dynamic early warning of economic risks can be regarded as the process of optimizing in state space S 2 . By using the method of correlation statistical analysis, the test statistical model of dynamic early warning of economic risks is constructed. Let si = (x1 , x2 , . . . , xn ) ∈ S 1 denote it as state empty. The random sampling method is used to carry out the dynamic early warning of economic risks, and the random variable A is used to deal with the state sig at the k generation, so that f (si ) = ( f (x1 ), f (x2 ), . . . , f (xn )), where f is the economic risks on X. The whole process fitness function of dynamic early warning is used to represent the optimal solution of dynamic early warning of economic risks   in the state space of financing feasibility. If the firm’s stress capacity meets I = i|si ≥ s j , ∀s j ∈ S 1 , i ∈ I , the total asset turnover ratio si = (x1 , x2 , . . . , xn ) at economic risks meets: f (x1 ) = f (x2 ) = ... = f (xn ) = f ∗

(1)

probability In the case of hybrid ant colony optimization, then si ∈ s ∗ . The transfer   j of total assets {Ak } with economic risks assessment is pi j (k)= p Ak+1 /Aik ≥ 0, including:

1034

J. Yu

      l  j pi j (k) = p Ak+1 /Aik = p Ckl /Aik p Ck+1 /Aik Ckl

(2)

sc ∈S 2

While i ∈ I , j ∈ / I , the average data of the debt ratio of various enterprises is obtained. For any L, there are:        j j p Ckl /Aik Bkb p Ak+1 /Aik Bkb Ckl p Ak+1 /Aik Ckl =

(3)

sc ∈S 2

The higher the growth level is, the greater the development prospect is. According to the definition of Clone selection, the definition is:   j (4) p Ak+1 /Aik Bkb Ckl = 0 Under the condition of constant financial capacity and cash payment level, a stochastic game model of economic risks control is established, then pi j (k) = 0, while i ∈ / I , j ∈ I , the capital structure has been adjusted, it is obtained as:     j j j pi j (k) ≥ p Ck /Aik p Ak+1 /Aik Ck

(5)

Thus        j j p Bkb /Aik p Ck+1 /Aik Bkb p Ck /Aik = sc ∈S 2

    j ≥ p Bkb /Aik p Ckl /Aik Bk = 0

(6)

According to the above analysis, with the increase of dividend payment rate, the economic risks has increased. Under the condition of capital financing structure optimization, the descriptive statistical analysis method is used to analyze the original data of economic risks dynamic early warning [9]. Dynamic early warning of economic risks is carried out by means of dynamic adjustment of observation variables.

3 Optimization of Dynamic Early Warning Mechanism for Economic Riskss 3.1 Hybrid Ant Colony Algorithm On the basis of constructing the explanatory variable and control variable model of economic risks dynamic early warning, this paper optimizes the economic risks

Construction of Dynamic Early Warning Mechanism for Economic …

1035

dynamic early warning mechanism, and proposes a economic risks dynamic early warning mechanism based on hybrid ant colony algorithm [10]. Through the regression analysis of credit funds and financial development scale.The following is the conditional probability distribution of economic risk dynamic early warning:        j j j j p Ck /Aik Bkb p Ak+1 /Aik Bkb Ck p Ak+1 /Aik Ckl ≥   j j j ≥ p Ck /Ak+1 Aik Bk = 0

(7)

  where, pi (k) = pi Aik , pk = i ∈I / pi (k), the correlation detection method is used for economic risks early warning and dynamic fitting, and the hybrid ant colony algorithm is used to find the optimal solution. The properties of Markov chain can be obtained:  pi (k) pi j (k) pk+1 = sc ∈S j ∈I /

=



pi (k) pi j (k) +



i∈I j ∈I /

pi (k) pi j (k)

(8)

i ∈I / j ∈I /

According to the results of ant colony optimization, the economic risks is predicted linearly: 

pi (k) pi j (k) = pk −



pi (k) pi j (k)

(9)

pi (k) pi j (k) ≤ pk ≤ 1

(10)

i ∈I / j ∈I /

i ∈I / j∈I

Then: 0 ≤ pk+1 ≤ pk −

 i ∈I / j∈I

Initialize the position and speed of N ant colonies, including: lim pk = 0

(11)

k→∞

The dynamic early-warning solution space U is a measurable set, it is: 

1 ≥ lim

k→∞

si



s ∗ =φ

pi (k) ≥ lim

k→∞

 i∈I

pi (k) = 1 − lim pk = 1 k→∞

(12)

Under the optimal population control, the economic risks dynamic early warning is carried out.

1036

J. Yu

3.2 Regression Analysis Model of Dynamic Early Warning of Economic Risk A regression analysis model of economic risks dynamic early warning is established, a mixed ant colony algorithm to carry out dynamic assessment of economic risks is adopted, an iterative function D of economic risks early warning is described as:   D pg (t), pi (t) =



  pg (t) f  pg (t) ≤ f (xi (t)) xi (t) f pg (t) > f (xi (t))

(13)

By using multi-peak search method, the linear fitting formula of economic risks warning is obtained as follows: new = pid

pid + m()(X max − pid ) if m()> 0 pid + m()( pid − X min ) if m() ≤ 0

(14)

Elite learning strategies based on Cauchy distribution are defined as: pi (t + 1) = pi (t) + η1 .( pi (t) − p j (t)) + η2 Cauchy(θ, α)

(15)

The optimal allocation function of financial capital is defined as: φ(x) =

t 1 (−∞ < x < +∞, t > 0) 2 π t + x2

(16)

where, {(x1 , y1 ), (x2 , y2 ), · · · , (xn , yn )},xi ∈ R n is input vector, yi ∈ R n , the objective function of the dynamic early warning of economic risks is:  1

w 2 + C (ξi + ξi∗ ) 2 i=1 n

min imi ze

subject to yi − (w (xi ) + b) ≤ ε − ξi (w (xi ) + b) − yi ≤ ε − ξi∗ ξi , ξi∗ ≥ 0, i = 1, 2, · · · , n; C > 0

(17)

The global extreme value G dbest (t) and the individual extreme value G dbest (t) are used to update their positions and velocities: ⎧ d d d d ⎪ ⎨ Vi (t + 1) = W · Vi (t) + C1 · R1 · (Pbest (t) − Pi (t)) + C2 · R2 · (G dbest (t) − Pid (t)) ⎪ ⎩ d Pi (t + 1) = Pid (t) + Vid (t + 1)

(18)

Construction of Dynamic Early Warning Mechanism for Economic …

1037

where, Vid (t), Vid (t + 1), Pid (t), Pid (t + 1) are capital structure, investment scale and so on, and the RMS function of economic risks dynamic warning is obtained as: F f itness =

m 1  ( f i − yi )2 m i=1

(19)

4 Empirical Analysis and Simulation Test This article first builds a dynamic early warning model of economic risks, and then selects 200 small and medium-sized enterprises to conduct empirical data analysis. The company allocates financial resources through debt financing and selects 1024 samples. Observe the sample value of financial asset data in the year-end statistics of group companies. The data analysis software is SPSS 19.0 and Excel 2007. Combined with Matlab mathematical programming, a dynamic early warning simulation of economic risks was carried out, and an early warning model of economic risks based on hybrid ant colony algorithm was established. For optimal value calculation, set the economic risk assessment contribution to 0.32, FME = 1, the corporate financing market value book ratio is 0.201, the asset return correlation coefficient is 2.12, capital debt ratio β = 3.831. Through the correlation analysis of the main variables, it is found that under the dynamic economic risk early warning model, the financing ability of SMEs is positively correlated with the capital return. The correlation between risk assessment and prediction is 5%, which can effectively realize risk early warning. Multiple regression analysis method is used to analyze economic risk early warning. The effectiveness and results are shown in Table 2. Using mixed data and panel data for multiple regression analysis, the dynamic early warning of economic risk is carried out. There is a certain relationship between risk control decision coefficient and profit level. This method can effectively improve profitability and reduce economic risk. In order to compare the performance, different methods are used to test the accuracy of dynamic early warning of economic risks. The comparison results show that this method is more accurate for dynamic early warning of economic risks.

5 Conclusions This paper proposes a dynamic early warning mechanism of economic risk based on hybrid ant colony algorithm. The dynamic early warning and risk capital assessment of economic risk are carried out by using descriptive statistical analysis method. Combined with credit funds and financial development scale, a regression analysis

0.543

2.286

3.754

2.164

1.133

PC

Size

MB

ALR

Profitability

4.312

3.454

4.234

5.434

2.264

Mean

3.755

2.543

3.433

3.321

1.434

3.755

2.145

5.322

6.543

4.476

2.443

5.213

Min

Max

5.356

Min

2.434

SC

Correlation coefficient

Contribution weight

4.556

9.334

10.212

8.644

5.656

9.156

Max

Table 2 Results of effectiveness regression analysis of dynamic early warning of economic riskss Mean

6.423

7.545

8.354

6.323

3.656

7.534

6.234

5.323

8.143

5.431

2.544

4.434

Min

Decision statistics Max

7.324

6.254

9.434

6.434

4.565

6.544

Mean

6.265

5.455

8.434

5.943

3.565

5.452

1038 J. Yu

Construction of Dynamic Early Warning Mechanism for Economic …

1039

model of dynamic early warning of economic risk is established. The hybrid ant colony algorithm is used to dynamically evaluate the economic risk, and regression analysis and correlation analysis are used to realize the dynamic early warning evaluation of economic risk. The empirical results show that the mechanism has high accuracy and good global convergence, and can effectively realize the prediction and early warning of economic risks. Acknowledgements Subjects: The research in this paper was supported by The Education Department of Jilin Province Project: Research on the Symbiotic Development Strategy of Rural Revitalization and Inclusive Finance in Jilin Province (JJKH20200220SK); Social science research planning project of Jilin Business and Technology College: Research on Marketing Risk Assessment and Control of Jilin Property Insurance Company under the Internet Plus Background (SZ2020[021]).

References 1. Xuejie, B.A.I., Hongyin, S.U.N., Haifeng, W.A.N.G.: M&A behaviors and market power; an analysis based on chinese a-share enterprises. Contemp Econ Sci 23(3), 106–113 (2016) 2. Aslanidis, N., Christiansen, C.: Smooth transition patterns in the realized stock-bond correlation. J. Empirical Finance 19(4), 454–464 (2012) 3. Jizheng, P.A.N.: Improvement of accounting method of large scientific research project based on Evolutionary Game Theory. Manage. Eng. 22(1), 36–40 (2017) 4. Xiaolin, Z.H.A.O., Yipeng, W.U., Huiying, H.U.A.N.G., et al.: New generation of migrant workers housing purchasing power and the housing sales to inventory constraints relationship model—taking Zengcheng area as an example. Manage. Eng. 22(1), 8–13 (2017) 5. Anqi, B.I., Aimei, D.O.N.G., Shitong, W.A.N.G.: A dynamic data stream clustering algorithm based on probability and exemplar. J. Comput. Res. Dev. 53(5), 1029–1042 (2016) 6. Hongwei, H.U.A.N.G., Xiaotian, G.E., Xuansong, C.H.E.N.: Density clustering method based on complex learning classification system. J. Comput. Appl. 37(11), 3207–3211 (2017) 7. Yugang, J.I., Yitong, L.I., Chuan, S.H.I.: Aspect rating prediction based on heterogeneous network and topic model. J. Comput. Appl. 37(11), 3201–3206 (2017) 8. Zhang, B.Z., Gui, X., He, T., et al.: A novel recommender algorithm on fusion heterogeneous information network and rating matrix. J. Comput. Res. Dev. 51(S2), 69–75 (2014) 9. Lei, Y., Ganyin, J., Zhiku, F.: Life cycle characteristics and financing matching analysis on the lnvestment value of SME of technology type. Contemp Econ Sci 2016(03), 114–123 (2016) 10. Yuying, J.I.N., Songbo, J.I.A.: Study on the influence of the introduction of leverage ratio on the asset structure of commercial banks. Int Financ Res 350(6), 52–60 (2016)

Analysis of Medical Image Segmentation Xiaoli Wang, Zhanbo Liu, and Kui Su

Abstract At present segmentation of medical images is an important guarantee for treatment. Especially, accurate segmentation of medical images is of great significance for doctors to diagnose and analyze the cause of disease. However, there are many problems in medical image which can’t effectively improve the segmentation accuracy of medical image. For this purpose the basic flow of medical image processing is analyzed, and the segmentation of medical image is described mathematically in this paper. Three main methods of medical image analysis are discussed, including image segmentation based on region, edge and specific theory. The main ideas of Threshold analysis, edge detection method and watershed algorithm are elaborated in detail. Keywords Segmentation algorithm · Image segmentation · Medical image

1 Introduction With the improvement of imaging quality and the continuous improvement of image resolution, two-dimensional medical imaging technologies such as CT, Xray, nuclear magnetic and ultrasound have become the main methods of medical clinical diagnosis [1]. Although these technologies are becoming more and more mature, they also have certain problems. The problem, two-dimensional imaging, including CT NMR, can only provide the plane of a certain interface. Because medical images usually have low contrast, the variability of tissue characteristics, the ambiguity between lesions and tissues or the boundaries between different tissues, and the complexity of the distribution of fine structures such as nerves and blood vessels, doctors can only judge the severity of lesions from the images obtained [2, X. Wang · Z. Liu Department of Computer Science, Mudanjiang Medical University, Mudanjiang, Heilongjiang, China K. Su (B) Department of Medical Imaging, Mudanjiang Medical University, Mudanjiang, Heilongjiang, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_128

1041

1042

X. Wang et al.

3]. When the image is difficult to judge due to problems such as transmission being blurred, a more powerful method is needed for subsequent analysis. At present, the rapid development of computer-aided, pattern recognition, and three-dimensional reconstruction technologies based on medical image processing has provided great help for doctors in image identification and disease diagnosis [4]. However, no matter computer-aided, pattern recognition or three-dimensional reconstruction, they cannot do without image segmentation research. For the analysis and processing of the medical image, the segmentation technology of the medical image can play an indispensable auxiliary role in the three-dimensional display of the specific organs in the human body where the disease has occurred or the determination and analysis of the location of the disease. At present, the research of medical image segmentation method has become a hot field of medical image processing [5]. This paper discusses the main process, segmentation ideas and improvement methods of medical image segmentation.

2 Definition and Process of Image Segmentation When a person or computer obtains an image, they usually only care about certain specific parts of the image, and analyze and study the specific parts of the image. Other parts of the image often affect the doctor’s analysis and judgment of the condition. For example, in the research of medical imaging images, clinicians are usually only interested in a certain organ and the degree of disease in the organ. The critical and fuzzy parts that other doctors are not interested in may affect the doctor’s wrong judgment. Figure 1 shows the general flow of medical image processing. Image input Photoelectric conversion

Digitizing

Preprocessing

Image segmentation

Image enhancement

Threshold segmentation

Image restoration

Edge detection

Image coding

Region segmentation

Image identification Fig. 1 Basic flow of medical image processing

Image analysis and understanding

Description and explanation

Analysis of Medical Image Segmentation

1043

Image segmentation is a technology that divides an image into regions with specific properties and extracts the target region of interest from a complex scene for further research and analysis [6]. It can be seen that the purpose of image segmentation is to extract a number of interesting content from the image. We can use set theory in mathematics to define image segmentation: Let G denote a set in an image, where G1, G2 … Gn denote a number of different sub-regions into which the image G is divided, and the following conditions must be met:  (1) For ∀i ∈ n, there is ni G i = G (2) For ∀i ∈ n, G i is taken the connected region (3) For ∀i , j, i = j, and  i, j ∈ n, G i ∩ G j =  (4) For ∀i , j, i = j, P G I ∪ G j = False (5) For ∀i ∈ n, P(G I ) = True Where P is the logical predicate on G, and  represents the empty set in the mathematical sense. (1) This shows that every pixel in image G is in G1, G2,…Gn. (2) This shows that each segmented area is connected. (3) This indicates that the images inside different regions cannot have intersections. (4) This shows that the properties of pixels on different sub-images are different. (5) This shows that the pixels in each sub-image have similar characteristics.

3 Main Methods of Medical Image Segmentation Currently image segmentation can be roughly divided into the following three categories: Region based image segmentation, Edge-based image segmentation, based on specific theory image segmentation [7, 8].

3.1 Region—Based Image Segmentation Medical images represented by CT, MRI, ultrasound, etc. are usually composed of a certain number of black to white pixels with different gray levels arranged in a matrix. The gray level feature is the most intuitive feature in these images. Therefore, to segment the target from the image, a simple idea is to use the gray-scale feature to distinguish the target. The region-based segmentation method of medical image uses the similarity of each part of the image to divide images with similar characteristics together, and divides different image spaces according to different data characteristics such as grayscale, texture, and transformation of different images. Region-based medical image segmentation is typically represented by threshold segmentation. Threshold segmentation divides the medical image pixel set according to gray levels by setting different feature thresholds to obtain critical regions with the same or similar properties to achieve the purpose of segmentation. Figure 2 shows the

1044

X. Wang et al.

Image to be divided

Multi-threshold or single-threshold segmentation

Segmentation result output

Image preprocessing Fig. 2 Basic process of threshold segmentation image

basic process of medical image threshold segmentation. The image preprocessing includes image de-noising and smoothing. According to the number of thresholds, threshold segmentation can be classified into single threshold segmentation and multiple threshold segmentation. The mathematical model of simple single-threshold segmentation can be described as follows: Suppose that the point coordinates (m, n) of the medical image have gray-scale image values f(m, n) in the gray-scale range [t1, t2], if T is set Threshold, the mathematical expression of the segmented binary image is:  f(m, n) =

255, f (m, n) ≥ T 0, f (m, n) ≤ T

By scanning all the pixels in the image and transforming it according to the above formula, a black object with a pixel value of zero and a white background image with a pixel value of 255 can be obtained. In the above formula, only a single threshold T under the gray-scale range [t1, t2] is set. In the actual medical gray-scale image, the research object and the background are not necessarily distributed in two gray-scale ranges. Multiple thresholds must be set for segmentation, which is called multithreshold segmentation. The threshold segmentation algorithm is simple, stable and efficient, and especially suitable for grayscale images. Therefore, for most medical images, doctors can quickly read the desired segmentation image through threshold segmentation. Although the method is simple, the segmentation effect brought by different threshold settings is completely different. Therefore, the improvement of the key algorithm of threshold segmentation lies in how to select an appropriate threshold to efficiently and accurately segment the target.

3.2 Edge-Based Image Segmentation The edge of the image refers to the intersection of a certain area of the image and another area, and is the location where the degree of the area changes greatly [9]. Because the edge of the image in the medical image has gray-level discontinuities, the adjacent pixels are in a state of step transition and can be recognized by the human

Analysis of Medical Image Segmentation

1045

eye. The edge of the image is divided into two elements: amplitude and direction. The pixels along the edge change slowly, and the pixel values perpendicular to the edge change greatly. According to this feature, we can use the first-order and second-order derivatives to identify the edges and use the identified edges to segment the image. The first derivative can determine whether the pixel in the picture is an edge part, and the second derivative can determine which part the pixel belongs to. In the calculation, the derivative can be calculated by the differential operator. The differential operator is equivalent to a model. The model is used to scan each pixel of the image to determine whether it is an edge and outline it. Typical first-order differential operators include Sobel, Prewitt, Roberts, etc., and second-order differential operators include Kirsh, Laplace, etc. [10]. Because the calculation of the derivative is very sensitive to noise, image segmentation based on edge detection is similar to the basic process of threshold segmentation. Before detection, image preprocessing is required to reduce the impact of noise. However, if the noise is reduced, the edge will be smoothed and the edge strength will be lost. This requires enhancement of the image to highlight points with significant changes in the intensity value of the neighborhood, and to achieve a balance between noise reduction and intensity enhancement.

3.3 Based on Specific Theory Image Segmentation Region-based and edge-based image segmentation are two basic segmentation ideas for medical image segmentation. With the continuous development of modern theories, new image segmentation methods based on specific theories are also emerging, including: segmentation based on simulated morphology, segmentation based on graph theory, segmentation based on fuzzy rough set, segmentation based on wavelet analysis, and neural based segmentation of the network, etc. Among them, the watershed algorithm based on morphological theory is a representative common method of medical image segmentation. The morphological watershed algorithm is based on the three-dimensional visualization of the image. It simulates the topological topography in geology and regards the pixel gray level of each unit point in the image as the altitude of the point. If each pixel in the medical image is represented by (x, y), the gray value f(x, y) in the image represents the terrain height in the three-dimensional image [11]. In the algorithm of watershed segmentation, the local minimum points in the image area can be regarded as valleys in the topography, and the local maximum points can be regarded as the peaks in the topography. Assuming that the entire image, that is, the entire topographic map, invades the water vertically, and release water at the lowest point (minimum point) of all valleys, the water will continue to rise. When water is about to converge into one place at two valleys, dams need to be built here. When the water completely invades the entire terrain, the built dam will completely separate several valleys with minimum points as the unit to form watersheds.

1046

X. Wang et al.

4 Conclusion This paper analyzes the basic flow of medical image processing and describes the mathematical model of medical image segmentation. Through the analysis of three types of image segmentation methods based on region-based image segmentation, edge-based image segmentation, and image segmentation based on specific theories, the main ideas of threshold method, edge detection method and watershed algorithm are explained in detail. In the future, more and more researches will focus on the mixed application and improvement of these methods in order to achieve more accurate and efficient segmentation purposes. Acknowledgements This research was supported by 2018 Funds for basic scientific research in Heilongjiang Province (project number: 2018-KYYWFMY-0096).

References 1. Wu, L., Liu, L.: Analysis of the application value of MRI and CT diagnosis of lumbar disc herniation. Proc. Anti-Cancer Res. 4(4), (2020) 2. Zhou, S., Nie, D., Adeli, E., et al.: High-resolution encoder–decoder networks for low-contrast medical image segmentation. IEEE Trans. Image Process. 29, 461–475 (2019) 3. Thanh, D.N.H., Sergey, D., Surya Prasath, V.B., et al.: Blood vessels segmentation method for retinal fundus images based on adaptive principal curvature and image derivative operators. Int. Arch. Photogrammetry Remote Sens. Spat. Inf. Sci. (2019) 4. Wang, G., Chu, X., Yang, X.: Numerical simulation of gas flow in artificial fracture coal by three-dimensional reconstruction based on computed tomography. J. Nat. Gas Sci. Eng. 34, 823–831 (2016) 5. Freixenet, J., Muñoz, X., Raba, D., et al.: Yet another survey on image segmentation: region and boundary information integration. European conference on computer vision. Springer, Berlin, Heidelberg, pp. 408–422 (2002) 6. Hamuda, E., Glavin, M., Jones, E.: A survey of image processing techniques for plant extraction and segmentation in the field. Comput. Electron. Agric. 125, 184–199 (2016) 7. Mandiratta, S., Nagpal, P.B., Chaudhary, S.: A perlustration of various image segmentation techniques. Int. J. Comput. Appl. 139(12), (2016) 8. Field, E.U.M.R.: Skin lesion segmentation using enhanced unified markov random field. In: Proceedings of Mining Intelligence and Knowledge Exploration: 6th International Conference, MIKE 2018, Cluj-Napoca, Romania, December 20–22, 2018. Springer, 11308: 331, (2018) 9. Shirly, S., Ramesh, K.: Review on 2D and 3D MRI image segmentation techniques. Curr. Med. Imaging 15(2), 150–160 (2019) 10. Xiao, C., Wang, W.: Research on crack detection of crystal stone based on the laplacian operator. In: 2016 International Conference on Industrial Informatics-Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII). IEEE, pp. 96–99 (2016) 11. Chellappa, R.: The changing fortunes of pattern recognition and computer vision. Image Vis. Comput. 55, 3–5 (2016)

Surface Defect Recognition Classification Based on Multi-Scale Convolutional Neural Network Zhengcun Wang, Zhongjun Xiao, and Zhilong He

Abstract In order to improve the quality of industrial products, an image recognition model based on multi-scale convolutional neural network is proposed for different scale targets of surface defect detection. First of all, the traditional convolutional neural network structure was replaced with a three-layer full connection layer by a two-layer convolutional layer. After processing, the convolutional neural network was used as the skeleton network to deeply extract the features of defect images. Secondly, pooling is used to reduce dimension of feature images to obtain feature images of different scales. Then the defect detection of different sizes is realized by fusing feature maps of different scales. Experimental results on DAGM2007 data set show that this method can realize surface defect detection and the detection accuracy is optimized compared with other defect detection methods. Keywords Multi-scale · Convolutional neural network · Defect detection · Image classification

1 Introduction Due to the influence of technology and other factors, various defects will occur on the product surface, which will not only affect the appearance itself, but also affect the use [1]. The traditional detection technology relies on human eye recognition, and the high rate of false detection is not conducive to the development of industry. With the emergence of vision, digital image processing technology and convolutional neural network, it largely helps people get rid of the disadvantages of low efficiency and low accuracy of manual detection. In recent years, convolutional neural network has been applied to image classification, target detection and face recognition. Deep learning also penetrates into various fields of traditional industry by virtue of its excellent performance, including Z. Wang · Z. Xiao (B) · Z. He College of Electrical Engineering and Automation, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_129

1047

1048

Z. Wang et al.

surface defect detection of glass, cloth, paper, etc. For defect detection, various algorithms appear one after another. In literature [2], ZHOU Qiang et al. artificially improved the accuracy of paper surface defect recognition and classification. Twodimensional wavelet transform was used to denoise the image, and singular value decomposition method was used to extract the feature image. In literature [3], Jun Jo et al. used Gabor filtering and other five filtering methods to de-noise road cracks and extract features. In literature [4], Li Guangming et al. used multi-scale morphological gradient to enhance the edge contour information of paper surface defects and combined with convolutional neural network to identify and classify paper surface defects. In essence, this method still used traditional convolutional neural network to identify and classify the pre-processed defect images. In literature [5], Yu et al. used FCN semantic segmentation network to detect defects, which could accurately draw the contour of defects in real time and achieve a higher precision than the original FCN. In literature [6], Jian C et al. used grayscale IFCM as feature expression to extract defects on mobile phone surface screen. In literature [7], S. Mei uses the positive samples without defects to carry out the model and proposes an automatic detection and measurement method of texture surface defects based on unsupervised learning. This method can realize the detection, location and identification of defects without manual participation, and has high robustness and detection accuracy. Traditional image processing methods mainly use edge, morphology, texture features or spatial filtering, etc. The essence of which is to use manual design features and classifier for detection, which requires high requirements for the imaging environment and generally requires high contrast, low noise and poor adaptability. Traditional convolution network can learn in a large amount of data, strong adaptability, but in the process of model training, unable to change the dimension parameter matrix, which requires two adjacent layer full connection dimensions must be fixed, which requires all connection layer associated characteristic figure resolution remains the same, but figure resolution and associated with the resolution of the input image, so the traditional network with all the connection layer will need to make sure that the size of the input images by fixed. Therefore, in order to ensure the accuracy of the surface defects, to extract the characteristics of the different scale figure, in this paper, according to the different precision, the multi-scale convolution neural network used in six different characteristics of different scales of target detection, choose to low-level features when predicting small target figure, predict big goal is choose top figure.

2 Multiscale Convolutional Neural Network 2.1 Convolutional Neural Network The multi-scale convolutional neural network is also constructed based on the original structure of the traditional convolutional neural network, and special structural

Surface Defect Recognition Classification Based …

1049

units are added in the process of building layer by layer. Whether it is a traditional neural network or a multi-scale convolutional neural network, it basically contains convolution, pooling and nonlinear activation function, etc. The purpose of convolution is to extract the information of interest in the image. The next layer of convolution is to connect the local receptive field area of the extracted feature map with the convolution kernel for convolution operation again. The expression is shown in Eq. (1). ⎛ h lj = ϕ ⎝

N 



l−1

l l⎠ h l−1 j ki j + b j

(1)

i=1

In the formula, h li represents the j feature of the layer; ll represent ϕ(x) = max(0, x) is the weight parameter from layer l − 1 to layer l of the convolution layer; blj is the bias parameter of the convolution layer; ϕ(·) is denoted as an activation function. Convolution operation itself h lj is a kind of linear operation, although the essence of composite operation after multiple convolution kernelremains unchanged. Therefore, in order to get rid of the ability limitation of linear mapping, nonlinear mapping should be carried out. Relu mapping is used here, which can also solve the gradient disappearance problem, and its expression is as shown in Eq. (2). ϕ(x) = max(0, x)

(2)

Through convolution processing after the characteristics of the figure will be more big, the size of the increase in the number of number of parameters lead to the entire network at the same time also can become large amount of calculation [8], it is necessary to drop the data after the convolution sampling process, which uses nonlinear pooling constantly try reducing the size of each input characteristics graph data space, to a certain extent, can be done to prevent the fitting, the biggest pooling operation as shown in and Fig. 1. Defect detection problem is also a binary classification problem, at the end of the network layer uses the commonly used binary classification softmax logistic regression model, based on the results of mapping, will be the result of the said defect types in a certain kind of confidence that can predict the probability of the defect classes, and will be the biggest probability as output category, its expression such as type (3). Si =

evi iC e Vi

(3)

where, Vi is the output of the pre-classifier cell. i represents the category index, and the total number of categories is C. Si represents the ratio of the exponent of the current element to the sum of the exponents of all elements.

1050

Z. Wang et al.

Fig. 1 Max pooling

2.2 Multiscale Feature Map Detection In traditional convolutional networks, feature maps of different scales are obtained after the maximum pooling operation of images input into the network, but only the features of the last layer are selected for prediction. Multi-scale convolution prediction is based on the obtained feature maps of different scales. Although this will increase computation, it will help to improve the detection accuracy of the image. In order to enhance the ability of feature extraction, the VGG [9] network was used as the reference network, and the full connection layer in the network was replaced by the convolutional layer of 3 × 3 and 1 × 1. After multiple convolutional layers and pooling layers, feature graphs of different sizes were obtained, which contained different features. The feature map of the convolutional neural network is relatively large. With the maximum pooling of stride = 2, the image was processed for dimension reduction, and five convolutional layers of Conv7, 8_2, 9_2, 10_2 and 11_2 were added. These layers and three layers of Conv4_3 were used to extract a total of six feature maps, and the network structure built was shown in Fig. 2. Since the gradient of Conv4_3

Fig. 2 Network structure diagram

Surface Defect Recognition Classification Based …

1051

is too large, resulting in loss = NAN, which makes the model unable to converge, L2 regularization processing is needed for this layer. The whole network matches the position box of the detected target through the adjustment of anchor, so as to obtain the accurate prediction box. The setting of appropriate anchor can reduce the difficulty of the whole network training and improve the accuracy of model detection rate. However, as the number of anchors increases, more 3 × 3 convolutional layer is needed to predict the regression box, which makes the running time increase. When the number of anchors is 6, the accuracy and running speed of the model are relatively balanced.

2.3 Dataset Data sets are the basis for defect detection research. Due to different scenes and different detection targets, various defects may form on the surface of different objects. Currently, DAGM [10] and GDXray Casting are commonly used in surface defect data sets. In this paper, the DAGM2007 public data set is used to collect texture defects. Each development set contains 1000 images without defects and 150 images with defects in 8-bit PNG format grayscale. In order to ensure the stability and generalization ability of the model training in network training, a large amount of data is needed for training, that is, data enhancement. The defect images under different textures were selected, and the images were randomly sampled and rotated at 10 angles. The data set was expanded to 10,000 images (Fig. 3).

Fig. 3 Defects under different textures

1052

Z. Wang et al.

2.4 Configuration Intel(R) Core (TM) I5-7300HQ, 2.50 GHz is the CPU used in this experiment, and the memory is 20 GB, the hard disk capacity is 1 T, and GTX 1050GPU graphics card was used to accelerate to the training process.

2.5 Defect Detection Process Based on multi-scale convolutional neural network model for DAGM2007 tested surface defect training data set, the main process as follows: Step 1: choose the Torch deep learning open source framework as experimental environment construction of multi-scale convolutional neural network model; Step 2: Select complete samples and non-defect samples from eight kinds of texture defects in DAGM2007 data set, enhance the defect data set, and conduct normalization processing on detection defect samples. The obtained image size is 300 × 300, establish the defect standard image data set, and form experimental samples; Step 3: The samples were trained and verified based on the multi-scale convolutional neural network model, and the Softmax classifier was used to conduct experiments and label the 8 types of defects. Step 4: Randomly select images from each type of data image from the standard sample image data set in a ratio of 2:8 as test samples for the experiment, classify images of surface defects detected by the model and analyze their accuracy.

3 Conclusions Model Testing and Analysis When training, in order to avoid the model because of the data set is too small lead to convergence and cause a fitting model, improve the overall recognition rate and convergence speed, through the use of the preliminary training weights to training data set, each level by optimization of neural network, the network parameters to achieve a good initial point, the model test results as shown in Fig. 4. According to the experimental results in Table 1, the defect recognition accuracy based on multi-scale neural network reaches 96.5%. In order to more intuitively reflect the recognition accuracy of this method and other paper disease recognition and classification methods, HOG + SVM, VGG16 and CASAE [11] were respectively used in the same experimental environment and data set to conduct experimental comparison, and the results obtained are shown in Table 2. As can be seen from the experimental results in Table 2, the recognition accuracy of multi-scale neural network for surface defect recognition in DAGM2007 data set

Surface Defect Recognition Classification Based …

1053

Fig. 4 The test results

Table 1 The feature map

Name

Out_size

Anchor_box number

Total_number

Conv4_3

38*38

4

5776

Conv7

19*19

6

2116

Conv8_2

10*10

6

600

Conv9_2

5*5

6

150

Conv10_2

3*3

4

36

Conv11_2

1*1

4

4 8732

Table 2 Comparison of different identification methods

Identification method

Recognition accuracy%

Processing speed (ms/sheet)

HOG + SVM

72.13

201

VGG16

85.11

128

CASAE

92.08

79

Our approach

96.50

61

is better than that of traditional defect detection methods, which has the advantage of high classification accuracy.

1054

Z. Wang et al.

4 Conclusions Based on the research of surface defect detection, a surface defect recognition classification algorithm based on multi-scale convolutional neural network is proposed. Compared with the traditional machine vision recognition method, the proposed method can reduce the error rate of manual extraction and effectively improve the efficiency of surface defect detection. By constructing a multi-scale convolutional neural network, the DAGM2007 data set can be effectively identified and classified, which can meet the basic needs of industrial detection. The deficiency is that the data set needs to be annotated after data enhancement, and the types of defects are too few, which may cause missing detection in practical application.

References 1. Gong, R., Wu, C., Chu, M.: Steel surface defect classification using multiple hyper-spheres support vector machine with additional information. Chemometr. Intell. Lab. Syst. pp. 109–117 (2018) 2. Qiang, Z., Lu, Q.: Paper defect identification based on SVD and SVM for complex background noise image. Trans. China Pulp Pap. 31(2), 49 (2016). (in Chinese) 3. Jo, J., Jadidi, Z.: A high precision crack classification system using multi-layered image processing and deep belief learning. Struct. Infrastruct. Eng. 16(2), 297–305 (2020) 4. Li, G., Xue, D., Jia, X., Li, Y., Tao, L.: Paper disease identification and Classification based on multi-scale image enhancement combined with convolutional neural network. China Papermaking 37(08), 47–54 (2016). (in Chinese) 5. Yu, Z., Wu, X., Gu, X.: Fully convolutional networks for surface defect inspection in industrial environment. International Conference on Computer Vision Systems. Springer, Cham, pp. 417– 426 (2017) 6. Jian, C., Gao, J., Ao, Y.: Automatic surface defect detection for mobile phone screen glass based on machine vision. Appl. Soft Comput. pp. 348–358 (2016) 7. Mei, S., Yang, H., Yin, Z.: An Unsupervised-learning-based approach for automated defect inspection on textured surfaces. IEEE Trans. Instrum. Meas. 67, 1266–1277 (2018) 8. Boureau, Y.L., Roux, N.L., Bach, F., et al.: Ask the locals: multi-way local pooling for mage recognition. 2011 International Conference on Computer Vision (ICCV). pp. 2651–2658, (2011) 9. Wang, X., Hu, M., Mu, M., Tao, Q., Zhang, F.: Road crack type identification based on VGG deep convolutional neural network and spatial distribution. Traffic Inf. Saf. 37(06), 95–102 (2019) 10. DAGM 2007 Datasets. Available online: https://hci.iwr.uni-heidelberg.de/node/3616 (accessed on 27 Feb 2018) 11. Tao, X., Zhang, D., Ma, W., et al.: Automatic metallic surface defect detection and recognition with convolutional neural networks. Appl. Sci. Basel 8(9), 1575 (2018)

Application of Blockchain Technology in Short Video Ecosystem Bin Ye and Gang Chen

Abstract Driven by mobile technology, the short video industry has shown an explosive growth trend in recent years. This paper discusses the current situation of the short video industry and the problems existing in the short video business circle. Combined with the current application scenarios of blockchain technology, this paper discusses the necessity of building a new ecosystem based on blockchain, presents a method to solve the problems related to short video ecosystem by using blockchain smart contract and other technologies, and introduces the application process of blockchain in data sharing, smart contract, asymmetric encryption and other key technologies in the new ecosystem. Finally, according to the analysis of the application process, the possible problems are put forward and suggestions are given. Keywords Blockchain · Short video · MCN

1 Introduction With the development of mobile technology and the popularity of mobile short video platform app, people are more and more used to use short video to convey information. Because of its intuitionistic, people are also more and more fond of accepting this kind of visual video information. A large number of APP operators have taken this point into consideration. When developing short video platform, users’ usability is fully considered, almost all users are concerned It can quickly use the relevant tools of app to make and publish short videos, and record original videos quickly. In view of the original video, the platform will be inclined, and non-experts are encouraged to record original video. Meanwhile, with the help of relevant special effects, the whole people can become “creators". It is because of the lower threshold that makes the short video app operators have been developing rapidly. Meanwhile, the short video industry is also facing more pain points such as difficult content supervision, low quality, and even misleading consumers, these reasons have become the main B. Ye (B) · G. Chen Chengdu Neusoft University, Chengdu, Sicuan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_130

1055

1056

B. Ye and G. Chen

problems restricting its development. With the gradual maturity of blockchain technology, with the advantages of point-to-point network and distributed applications, as well as decentralization, it provides opportunities to solve many problems in the short video industry.

2 Development of Short Video Industry in China 2.1 Short Video has Gradually Become the Main Source for People to Obtain Information Due to the concentration information and strong interaction for the short video, in the current fast-paced modern life, people want to receive information faster and more effectively, which needs to be able to show the information we want to convey more intuitively and effectively. The emergence of short video just meets the needs of current people. Compared with traditional words and pictures, it can display information more effectively, integrate vision and hearing together, and make information impact stronger and more easily accepted by users; at the same time, its interactivity is stronger than simple words and pictures.

2.2 Short Video has Gradually Become the Main Marketing Tool Due to the explosive power of short video transmission, users and communicators are integrated into one. With the support of 4G network technology, video transmission no longer restricts the video. Its unique information impact force enables users to broadcast in a short time, making each user become the next communicator. Especially for the head quality video, the When people resonate, it can produce the characteristics of viral transmission, and the marketing effect produced in the tail is particularly prominent.

2.3 The Rapid Growth of Short Video Users Due to the further consolidation of the technical foundation of short video, and the outstanding performance of short video in information dissemination, information richness and ease of use, China’s short video industry has made initial development since the beginning of 2013, and by July 2019, according to the iResearch data, the number of short video apps used in independent devices in China has reached 1.1 billion. Tiktok was growing faster China in the first half of 2018 and in the first half

Application of Blockchain Technology in Short Video Ecosystem

1057

Fig. 1 Top 5 independent devices of short video app in China

of 2019 [1]. The top 5 short video APP in China were Tiktok, Kuaishou, Xigua, Huoshan and Baidu. As of July 2018 and July 2019, the specific data are shown in Fig. 1: Through data analysis, it can be seen that the top five short video apps are widely used. In China, nearly everyone uses one device and uses one short video app. And from July 2018 to July 2019, the use growth reached 41%. Moreover, with the advent of 5 g era, the growth rate of short video is expected to further accelerate.

2.4 Supervision is More Difficult, Low Content Leads to User Trust Crisis. In April 2018, the “Kuaishou “company was interviewed and ordered to redress for vulgar content. The “Kuaishou “company began to expand content auditors team urgently, to meet audit requirements for fast growing massive video, and to expand the manual audit team to five thousand people. At the same time, more than 50,000 short videos with low quality and even “potential harm” were seized, and more than 10,000 creators suspected of producing and disseminating “low-quality” videos were seized. Similar situations also appear on platforms such as “Xigua”, “Meipai” and “Huoshan". However, after rectification, the same problems will not be completely eliminated, and they will often appear again on some platforms, which will have a great impact on brand image and user trust.

1058

B. Ye and G. Chen

3 Short Video New Ecosystem Based on Blockchain Technology 3.1 Key Technologies and Application Scenarios of Blockchain Blockchain is a technology combining distributed database with data encryption and peer-to-peer network. Because of its high application value in decentralization, traceability, data security and tamper proof, blockchain has been widely concerned. The blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer [2–5]. With the gradual maturity of blockchain technology, blockchain technology has been extended from the concept stage to the implementation of specific scenarios [6]. In terms of industry, the technology plays an important role in the field of intelligent instruments in China, and closely connects the future industrial Internet and the Internet of things [7]. In terms of government administration, the Netherlands, the United States and other countries have taken advantage of the decentralized and traceable technology of blockchain to solve the problem of border management, which has been well applied in passport identification, trade certificate inspection, etc.; in the field of logistics, Canada’s Border Service Bureau has cooperated with IBM and Maersk to solve the problems of logistics and transportation by using blockchain; the United Kingdom has made use of blockchain to solve the problems of logistics and transportation It also uses blockchain technology to solve the problem of supply chain traceability. In the financial field, visa and Citibank have also launched “bitcoin debit card” and “citicoin".

3.2 The Necessity of Building a New Ecosystem Based on Blockchain In China, due to the rapid rise of short video industry, in order to solve the disadvantages such as low production quality in UGC (user generated content) creation mode and the content limitation of PGC (professional generated content) creation mode, the integration of UGC and PGC was carried out, and the development mode of MCN institutions at home and abroad was used for reference to form China’s MCN organization. MCN organizations originated from foreign video websites. They integrate content producers, advertising agents and online celebrities into one. They connect short video platforms with online celebrities and businesses. With the advantages of resource integration, MCN organizations collect business advertisements with online celebrities and platforms to obtain profits. At present, MCN institutions and platform side profit mainly through the product advertising and column title fees. However, how to realize the MCN mechanism and short video platform on a large scale has

Application of Blockchain Technology in Short Video Ecosystem

1059

always been an important problem for its development [8]. As a result, it realizes the transition from a short video platform to a complete video business platform for users, and realizes the development of video from a short and complete e-commerce platform. MCN organizations, video creators, Internet Celebrities, and businesses, as the beneficiaries, have an unshirkable responsibility for the supervision of video content and the protection of intellectual property rights. However, there are still many incidents in which the content violates civil morality and even laws and regulations. In the special rectification activity of “Jianwang 2018” in 2018, the Ministry of public security removed 570,000 works from 15 short video platforms from July 2018 to November 2018. The main reasons are as follows: on the one hand, the government regulatory agencies are faced with more platforms and objects to be supervised, and some of them are too busy; on the other hand, it is difficult for the platform side to achieve a balance between the platform traffic and content supervision, and they are often unwilling to kill their “own” video partners, resulting in the loss of traffic. Therefore, combined with the technical advantages of blockchain in information traceability, decentralization and other aspects, learning from the application experience of blockchain technology in many countries and fields, the application of blockchain technology in short video industry is still promising.

3.3 Short Video New Ecosystem Model Based on Blockchain In the new ecosystem, users have three identities, which are not only short video users, but also video creators and commodity value output objects. On the one hand, users, as creators, diversify their creative content through personal experience, and solve the problem of “ceiling” of content creation in the process of MCN organization content creation. However, in fact, the most important link between the video platform, MCN institutions, e-commerce platforms and users is “trust". Since all parties come from different platforms, there is no “consensus” mechanism between platforms. In theory, they can modify their own data, and in the event of rights protection incidents, they can shift responsibility to each other. Therefore, if the trust is only through moral constraints or the current supervision the management mechanism is extremely fragile and will eventually lead to the destruction of the ecosystem due to the emergence of disputes. After the introduction of blockchain, users’ comments, feedback, including video creation and optimization, and even the VIR (video information record) of user download and secondary use information, as well as the transaction information of e-commerce platform, are saved on the chain, and the response conditions are preset through time stamp and smart contract to realize automatic transaction warning and information traceability in case of disputes. Finally, the normal operation of the ecosystem is guaranteed by technology. The new ecosystem of “short video + MCN + e-commerce” based on blockchain is shown in Fig. 2:

1060

B. Ye and G. Chen

Fig. 2 New ecosphere based on blockchain

4 The Application of Blockchain Technology in the New Ecosystem of Short Video Blockchain technology can play an important role in many aspects of short video business circle, mainly reflected in the following aspects: (1)

Based on data storage and consensus mechanism, prevent short video infomation from being tampered. In the process of network transmission, short video information will pass through multiple nodes and multiple stakeholders, and the vast majority of short video platforms can even let users download and use at will. However, in the process of use, if the download information, including the original data, is not retained, it will lead to short video information, even the video content will be maliciously modified, and then spread again, which will lead to copyright disputes, the dissemination of false information and other conditions are more likely to occur; secondly, when the adverse effects are caused, because the video is used in multiple parties, it is impossible to determine which link the problem occurs It is easier to shirk their responsibilities.

As a distributed “account book” database, blockchain establishes “video information record” in the process of short video transmission. The video information is recorded by the distributed “account book” in each use link, and all blocks have the information of the previous block. Once the information is recorded, it can only be added but not deleted, so as to achieve the effect that the information can’t be tampered with, thus protecting the “copyright” of the data creator and ensuring the traceability of the data. Thus, the mechanism of video information storage, sharing and consensus is formed. The process is shown in Fig. 3: (2)

Based on asymmetric encryption and timestamp technology, cross platform. Transaction security and traceability are realized. Short video platform, MCN organization and e-commerce platform have formed a joint development mode;

Application of Blockchain Technology in Short Video Ecosystem

1061

Fig. 3 Video data sharing and consensus mechanism

for example, cooperation relationship has been established between short video platform and MCN mechanism, MCN mechanism agent short video production and distribution, at the same time, short video platform has formed a cooperative relationship with e-commerce platform. Short video has become an important tool for e-commerce platform to attract customers. The number of users in the platform, such as “TikTok”, “KuaiShou” and “XiGua” has exceeded 200 million users, and the ability of the most powerful creators to attract new customers is very strong. New customers are introduced into the e-commerce platform by implanting advertisements in short videos or through product links. These transactions are very frequent among short video platforms, MCN mechanisms, e-commerce platforms, and even logistics platforms. However, due to the lack of unified supervision and certification means between platforms, which leads to false transactions or mislead consumers, transactions often cross platform and cross industry, as a result, it is difficult for the government to supervise and protect consumers’ rights, and the cost is high. In the blockchain, the information is transmitted according to the asymmetric digital encryption technology of public key and private key to realize the mutual trust between the transaction parties. At the same time, combined with the technology of time stamp and distributed storage, it can form a record that can’t be tampered with and traceable to all links of commodity production, information release, transaction and circulation, so as to ensure the authenticity, validity and uniqueness of the data technically [9]. (3)

Based on the characteristics of de centralization and programmable intelligent. Contract technology, intelligent and automated transactions are realized. Short video platform has also realized e-commerce transactions. When customers trade goods, the basis of buying and selling is often based on the data provided by the platform, such as users’ comments, the content of short

1062

B. Ye and G. Chen

Fig. 4 Operation process of smart contract

video itself, and the number of transactions of users. However, as the interested party of commodity sales, the short video platform does not necessarily guarantee the authenticity of the data, which also reduces the trust of users and makes it difficult for users to protect their rights. The decentralized features of blockchain make the transaction data more objective and credible, and reduce the complaints of later users. At the same time, when the platform truly realizes the data “decentralization”, it is beneficial to the improvement of high-quality short video traffic. In the transaction, after ensuring the authenticity and validity of the data, and using asymmetric technology to ensure the security of the data, the user comments or scores, transaction volume and other aspects are taken as the basis of intelligent transaction, which ensures the security of the transaction, and makes the transaction more intelligent and automatic. In the practical application process, MCN institutions, video platforms, e-commerce platforms, and individual customers will participate in various data interaction services. In this process, their transaction information, request information and comment information are used as data input. Through programming preset conditions, business activities can run automatically and intelligently, and can be saved as unchangeable information in the block the operation process of contract [10] is shown in Fig. 4:

5 Conclusions The application of blockchain technology in the new short video ecosystem can greatly enhance user trust and better maintain the healthy development of the ecosystem. However, the application and promotion of the technology need the participation and cooperation of all stakeholders. In order to realize the construction of short video ecosystem based on blockchain technology, the following aspects should be paid attention to: (1)

Cross platform collaboration and integration

Through technological innovation, stakeholders in the short video ecosystem can find new profit growth points and realize business improvement and upgrading. However, the premise is that the platform where the stakeholders are located can

Application of Blockchain Technology in Short Video Ecosystem

1063

realize cross platform integration, including the integration of short video platform, e-commerce platform, and MCN institutions, so as to make the use information, transaction information, comment information and content information generated in the whole process To be more transparent and truly open to users and provide reference for users’ decision-making, all parties need to fully recognize the advantages of technology, and can form consensus from the perspective of long-term development, so as to jointly promote technological innovation and business model reform. (2)

Focus on content quality and product value

Short videos can be as short as tens of seconds or as many as a few minutes. Although they are generally very concise, but they can make many people indulge in them. With the introduction of blockchain technology, due to the more open, transparent and decentralized information, the relevant data can’t be forged. The living space of low-quality short video and inferior e-commerce products will be narrower. At the same time, MCN institutions and platforms should jointly assume the responsibility and obligation of content audit. Only when the product quality becomes better, the short video industry and e-commerce platform can have long-term development, be conducive to the healthy development of the ecosystem and form a virtuous circle. (3)

Rational use of blockchain Technology

Blockchain technology has developed to stage 3.0 [11]. Although blockchain technology has many advantages, but it is not perfect, for example, although asymmetric encryption and distributed storage technology are safe, they also cause slow transaction speed and higher requirements for distributed storage nodes. Therefore, in this paper, the short video itself is not distributed storage, but the use of information, transaction information storage and utilization, otherwise the abuse of technology will not be worth the loss. Acknowledgements This work was supported by "Key research base of Humanities and Social Sciences in Colleges and Universities in Sichuan Province", "Research Center for application and development of educational informatization in Sichuan Province", Subject: Application of blockchain technology in online teaching evaluation of colleges and Universities, (Project No: JYXX20-015).

References 1. China short video marketing Market Research Report, 2018. IResearch consulting Series Research Repor. 12, 5–10 (2018). (in Chinese). 2. Hou, Z., Liang, H.: Research on development status and characteristic application of blockchain technology. Sci. Technol. Innov. Appl. 30, 18–20 (2018). (in Chinese) 3. Jinqi, C., Shuxian, Li., Bing, F., Liangrui, T.: Energy trading based on blockchainin energy internet. Power Construct. 9, 24–31 (2017). (in Chinese)

1064

B. Ye and G. Chen

4. Dongqi, S., Xiaoyan, G., Xiaojie, M.: Research on the security status of China’s B & B based on airbnb. J. Baoji Univ. Arts Sci. (SOCIAL SCIENCE EDITION), 2, 134–137 (2017). (in Chinese) 5. Trump, B.D., Florin, M.V., Matthews, H.S., et al.: Governing the use of blockchain and distributed ledger technologies: not one-size-fits-all. IEEE Eng. Manage. Rev. 46(3), 56–62 (2018) 6. Guoqing, Z., Yuanhua, L.: Research on the application of block chain technology in B & B industry—taking airbnb as an example. Econ. Res. Guide 25, 158–161 (2019). (in Chinese) 7. Steve, H.: Fake news: a technological approach to proving the origins of content using blockchains. PubMed 4, 356 (2017) 8. Yongdi, Z.: Shake the voice and suck the powder, micro-blog makes money? China Entrepreneur 16, 64–67 (2018). (in Chinese) 9. Feng, Q., Debiao, H., Zeadally, S., Muhammad, K.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 10, 20 (2018) 10. Cha, S.C., Chuang, M.S., Yeh, K.H., et al.: A user-friendly privacy framework for users to achieve consents with nearby BLE devices. IEEE Access 1, 99 (2018) 11. Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harvard Bus. Rev. 1, 118–127 (2017)

Safety Management of Prefabricated Building Construction Based on BIM-RFID Jie Li and Xionghui Wu

Abstract Safety has always been a top priority in construction management. But changes in construction methods and sites of prefabricated building may result in new safety problems in the construction process. On the basis of detailed analysis and generalization of existing research on the safety management of prefabricated buildings, this paper takes the construction safety management of prefabricated buildings as the research object, clarifies the current status of prefabricated safety management, and analyzes the safety problems that arise in various aspects of the construction process of prefabricated buildings with the goal of optimizing the traditional safety management mode. In addition, this paper proposes a management process for the four aspects of transportation, stacking, hoisting and personnel safety during the construction of prefabricated buildings, and builds a BIM-RFIDbased safety management system for the construction of prefabricated buildings, which can provide some reference for the safety management of the construction of prefabricated buildings. Keywords Prefabricated buildings · BIM · RFID technology · Construction process · Safety management

1 Introduction Currently, with the advancement of a new type of urbanization in China, the construction methods of the traditional construction industry have become incompatible with the requirements of China’s green development. The difference between prefabricated construction and traditional construction is that it advances the construction process to the factory, so that the main operation on site is changed from casting-inplace to hoisting, which reduces material waste and environmental pollution. With the vigorous promotion and development of prefabricated construction in China, its scale growth is bound to play to even greater advantage. It is known that construction J. Li · X. Wu (B) Institute of Urban Construction, Wuhan University of Science and Technology, Wuhan 430065, Hubei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_131

1065

1066

J. Li and X. Wu

safety has always been the most important issue in the construction industry, although China has established a relatively complete safety management system for in-situ building construction, the shift in the major construction methods of prefabricated buildings has made traditional construction safety management methods unsuitable for their needs. The construction industry in China has played an important role in its economic development, but the complex and high-risk nature of the industry has led to a great number of safety accidents. In 2019, 773 housing and municipal production safety accidents and 904 deaths were reported [1], the safety situation at work is not optimistic. Zhong Qing et al. took BIM as a platform for information communication and sharing, and realized the early warning of construction site safety by using RFID technology to collect the unsafe information of people, materials and machines on site [2]. Luo Jie introduced the points of safety management such as temporary support system, safety protection of personnel working at high places, scaffolding construction, and safety education and training of construction personnel [3]. Guo Honglin et al. proposed the use of BIM and RFID technology in construction site safety management to achieve real-time positioning of construction site workers and establish a safety warning model [4]. Li Tianhua demonstrated the effectiveness of BIM-RFID fusion technology in improving the efficiency of information exchange and sharing throughout the building lifecycle [5]. Jiang Dongmin et al. analyzed the problems of BIM in the safety management of assembly building construction such as hoisting, storage, component collision and temporary support, and early warning of hazards through safety inspections and dynamic simulation [6]. Zou Xiaowei et al. used the Fault Tree Analysis method to analyze of assembly construction, and proposed a safety early warning platform based on BIM and IoT technologies for the hazard sources [7]. On the wedge, there is still some room for further improvement in construction safety management for prefabricated buildings in China. Based on the existing safety management of assembly construction, this paper will incorporate BIM and RFID technologies to analyze and study the safety management of assembly construction in four aspects: prefabricated component transportation, stacking, hoisting and personnel safety management, respectively, and propose a BIM-RFID-based safety management system for assembly construction to make the construction of assembly construction safer.

Safety Management of Prefabricated Building Construction …

1067

2 Analysis of Safety Issues in the Construction of Prefabricated Buildings 2.1 Analysis of Safety Issues in the Transportation of Prefabricated Components Prefabricated building is to advance a large number of wet operations on the construction site to the factory for operation. After the components are prefabricated in the component factory, they are transported to the construction site by vehicles. These components are often of large volume and various types. As a result, inadequate preparation of the actual transport process occurs from time to time. For example, there is no complete transport and emergency plan before the transport loading and unloading, and there is a lack of real-time communication platform between the carrier and the construction site; in addition, during the unloading, the loading and unloading order of the components is unreasonable, thus creating the problem of secondary loading and unloading, which makes the components bumped.

2.2 Analysis of Safety Issues in Stacking Operations of Prefabricated Components The prefabricated construction site is a complex environment with different working surface sizes, making the location and number of components stacked differently. Part of the construction site did not set up a special storage site; the location of the site is not reasonable enough, without combining the actual construction progress; and there is no arrangement of a reasonable stacking plan, which makes the subsequent hoisting operations more difficult. In the inventory management work, the variety and quantity of components lead to difficulties in supervision, and some storage sites do not take closed management measures, allowing unrelated personnel to enter and exit at will, thereby posing potential safety hazards.

2.3 Analysis of Safety Issues in Hoisting Operations of Prefabricated Components The hoisting of components is the core of assembly construction, and also the most dangerous part of it. Although the hoisting link generally has a special construction plan, it focuses more on the spreader inspection and the technical transfer of management personnel before hoisting, so there are certain shortcomings in its lack of effective safety management of the hoisting process. When carrying out hoisting

1068

J. Li and X. Wu

operations, it is common for a variety of equipment to run simultaneously and cooperate with each other, thus we need to plan the area of action of the relevant machinery appropriately. If we cannot adopt the principle of suitable layout, it will increase the difficulty of site safety management.

2.4 Analysis of Issues Related to the Security Management of Personnel The weak safety awareness of personnel and operation of violation and other factors can lead to the occurrence of the vast majority of safety accidents. Therefore, the safety education for on-site operators to enhance their safety awareness can reduce the probability of accidents. However, due to the industrialization of construction in China is still in the development stage, most of the personnel currently engaged in the construction of prefabricated buildings are transformed from traditional project personnel, and most companies are still continuing the previous “three-levels safety training” (company, project managers, teams) form of training, lacking specificity, which also lacks a reasonable response to problems that arise on the construction site.

3 BIM-RFID-Based Safety Management System for Prefabricated Building Construction Analysis of safety issues in the construction of prefabricated buildings shows that there is still much room for improvement in their safety management. The use of BIM technology can improve the efficiency of assembly building co-design, simulation and optimization of the construction process [8]. Radio frequency identification (RFID) technology can store information into the RFID tag attached to the label by digital coding, and read and write information through radio waves. Therefore, it has the advantages of large amount of information storage and long service life [9]. In this chapter, from the perspective of actual construction safety, and combined with the core application value of BIM and RFID technology, the corresponding management processes and recommendations are proposed. The prefabricated components need to be coded at the pre-production stage, and RFID chips need to be implanted during the production process and fed back to the BIM-RFID safety management platform. Chang Chunguang studied the component coding format, which is helpful to solve the one-to-one correspondence between the prefabricated components and the prefabricated components of BIM model [10]. Aaron, Nipesh, etc. proposed to connect the Thing Magic API of RFID and Tekla API (BIM) of BIM based on Visual C# 2010 to realize the integration of RFID and BIM and information interaction [11].

Safety Management of Prefabricated Building Construction …

1069

3.1 Transportation Safety Management of Prefabricated Building Components Based on BIM-RFID The RFID tags implanted in the production process can enable the sharing of information during transportation, storage and assembly of components. Therefore, it is necessary to formulate corresponding transportation and loading and unloading schemes in combination with traffic management information and construction progress, and form a safety management plan for transportation of prefabricated components, which shall be input into the safety management platform to conduct safety disclosure to the carrier through the management platform. If an unexpected situation occurs during transportation, the route can be adjusted in time or a backup plan can be enabled so that the components can arrive at the construction site safely and without error. The carrier can also feedback the actual situation during transportation to the management platform to improve its management level.

3.2 BIM-RFID-Based Safety Management of Stacking of Prefabricated Building Components Before the prefabricated parts arrive at the construction site, the transportation plan of the parts can be known in advance based on the safety management platform, and the stacking area can be planned in advance by taking into account the stacking conditions at the construction site. According to the real-time construction progress, BIM technology can be used to construct a 3D model of the site, visualize and simulate the stacking and transportation paths of the components, select the stacking plan and vehicle unloading route in advance, which should include the stacking order, height limit and type of support frame. The stacking safety management plan of prefabricated components should be formed and inputted into the safety management platform for information sharing in the construction process.

3.3 BIM-RFID-Based Hoisting Safety Management for Prefabricated Buildings The hoisting operation is the most important process in the construction of a prefabricated building, which is also a highly accident-prone part of the process. By using BIM technology, Navisworks or Tekla software to build a model, we can simulate the possible safety problems in the hoisting process and develop a solution based on the safety problems. With RFID receivers, the hoisting progress can be followed up in real time to ensure that the hoisting is done correctly. With the help of BIM and RFID technology, the existing hoisting special construction program can be optimized to form a prefabricated hoisting safety management plan, which will be uploaded to the

1070

J. Li and X. Wu

safety management platform to provide visualization and real-time guidance to the on-site hoisting center, thus realizing the dynamic safety management of the hoisting process.

3.4 BIM-RFID Based Personnel Safety Management Traditional construction safety training is mostly in written form, which is limited by time and space, making it difficult to give practical instructions and for practitioners to absorb and apply. The personnel safety management based on BIM-RFID technology is based on the BIM safety information model generated in the management process of transportation, stacking and hoisting. By combining the traditional “three-level safety training” and with the help of BIM technology, it can demonstrate the potential safety hazards in the construction process to the operators in the form of animation, so as to cultivate their safety awareness and practice to make up for the deficiency of traditional safety training.

4 Conclusion In view of the frequent occurrence of production safety accidents in the current construction industry, this paper proposes the application of integrated BIM and RFID technology in construction safety management on the basis of traditional construction safety management, combined with the characteristics of prefabricated buildings, and establishes a BIM-RFID-based assembly building safety management platform, so as to effectively promote the safety management of prefabricated buildings, thereby boosting the rapid development of prefabricated buildings.

References 1. Ministry of Housing and Urban-Rural Development. Announcement of the ministry of housing and urban-rural development on the production safety accidents of housing and municipal engineering in 2019. .https://www.mohurd.gov.cn/wjfb/202006/t20200624_246031.html 2. Zhong, Q., Zhenming, S., Xianhua, W.: Key Technology Applied to Construction Site of Safety Monitoring Based on Integrated Application of RFID and BIM. Build. Sci. 4, 123–128 (2015). (in Chinese) 3. Jie, L., Fabai, S., Lizhi, S.: Research on several key points of construction safety management of prefabricated building. Construct. Saf. 31(8), 19–25 (2016). (in Chinese) 4. Guo, H., Yu, Y., Liu, W., et al.: Research on the integrated application of BIM and RFID in construction safety management. J. Eng. Manage. 28(4), 87–92 (2014). (in Chinese) 5. Tianhua, Li., Yongbo, Y., Mingyuan, Z.: BIM and RFID assisted life cycle management of prefabricated buildings. J. Eng. Manage. 10, 72–79 (2012). (in Chinese)

Safety Management of Prefabricated Building Construction …

1071

6. Dongming, J., Jingzhi, L., Liting, G.: Research on safety management of fabricated construction based on BIM technologi. Value Eng. 10, 64–66 (2017). (in Chinese) 7. Xiaowei, Z., Dan, Z., Hui, Ma., et al.: The establishment of a pre-warning platform for prefabricated construction work safety based on bim and the internet of things. J. Eng. Manage. 33(2), 124–129 (2019). (in Chinese) 8. Shu, B., Yankun, Z., Feng, H., et al.: Analysis on the application value of BIM technology in prefabricated building. Construct. Econ. 36(11), 106–109 (2015). (in Chinese) 9. Wen, Lu., Guoqing, H., et al.: Scenarios for applying RFID technology in construction project management. Autom. Constr. 20(2), 101–106 (2011) 10. Chang, G., Wu, F.: Prefabricated construction process management based on BIM and RFID technology. J. Shenyang Jianzhu University (Social Science), 2, 170–174 (2015). (in Chinese). 11 Costin, A., Pradhananga, N., Teizer, J.: Passive RFID and BIM for real-time visualization and location track. Constr. Res. Congr. Global Netw. pp. 169–178 (2014)

Energy-Saving Transformation of Rural House Enclosure Structure in Yichang Based on DeST Jie Li and Jing Yuan

Abstract Yichang, Hubei Province is located in an area with hot summers and cold winters. The climate is cold in winter and high in summer. The thermal comfort of rural houses is poor. As the income level of rural residents increases, the past living environment can no longer meet their needs, and it is looking for a more comfortable, more energy-saving, environmentally friendly and economical living mode. This paper takes typical rural houses as the research object and uses DeST-h simulation software to calculate the energy consumption of representative rural buildings in the local area under different envelope structure. According to the simulation results, the annual cumulative heating load can be reduced to 6780.82 kW·h, which can save 48% of the heating energy consumption, and the annual cumulative cooling load is 7906.27 kW·h, which can save 11% of the cooling energy consumption. Buildings have great energy-saving potential, and proposed new rural residential energy-saving transformation plans. Keywords Building energy efficiency · Rural house energy consumption · Envelope structure · Dest energy consumption simulation software

1 Introduction The rural population of my country is nearly 800 million, accounting for about 60% of the total population; the construction area of rural houses is about 27.8 billion m2 , accounting for 65% of the total building area [1]. At present, rural housing is built spontaneously, lack of planning and design, and because of the economic property, very few use of building enclosed structure insulation measures, most of them still rely on the building itself and natural resources to regulate the indoor thermal environment, its thermal environment quality is poor [2]. In recent years, more and more attention has been paid to rural house energy consumption. Based on DesignBuilder, Zhang Ganlin conducted a research on the J. Li · J. Yuan (B) Institute of Urban Construction, Wuhan University of Science and Technology, Wuhan 430065, Hubei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_132

1073

1074

J. Li and J. Yuan

factors affecting energy consumption of traditional houses in rural areas of Kangding [3]; Jinhong uses EnergyPlus software to explore several main factors affecting the energy consumption of rural residential buildings in severe cold areas 4; Yuan Pengli [4, 5] conducts field monitoring on heating energy consumption of rural houses in Chifeng City; Huo Huimin [6] used the entropy method to propose a transformation plan for the enclosure structure of the northern rural house; Ma Leyuan [7] used the BIM sustainability analysis software Ecotect to simulate and optimize the layout and envelope structure of traditional rural houses in central Shandong. In summary, my country has a lot of research on rural houses, but most of them are exploring rural houses in cold regions [8, 9]. The research object of this paper is located in Wujiagang District of Yichang City in the southwest of Hubei Province. Its building thermal division is a hot summer and cold winter area. The typical climate features are humid, rain and hot in the same season, cold and dry in the same season; the annual average temperature is 13°C ~ 18°C; the average annual precipitation is 1000 mm ~ 1400 mm, mostly in summer, and the relatively long precipitation process occurs in June to September; the annual sunshine hours are between 1300 ~ 1800 h. Based on field measurement and investigation of typical rural houses, this paper uses DeST software to simulate its energy consumption, quantitatively analyzes the current status of the indoor thermal environment of rural houses in Yichang area, and proposes feasible energy-saving transformation plans, which provide a reference for the construction of new rural houses.

2 Typical Rural House Construction Status 2.1 Basic Situation Traditional rural houses in Yichang are mostly 1–2 storey buildings. In recent years, the income of rural residents is gradually increasing, rural construction land resources are in short supply, and new rural houses are gradually being built. It becomes a 3– 4 storey building. Most of the lower floors are equipped with elderly bedrooms, warehouses and halls, and each floor has toilets. The halls are larger in size.

2.2 Typical Rural House Construction Method (1) The external wall material is 240 mm thick ordinary sintered brick. (2) The floor slab adopts 100 mm thick reinforced concrete cast-in-place floor slab or prefabricated floor slab. (3) Roof is sloping roof or flat roof. (4) The doors are mostly metal doors, commonly used plastic steel, aluminum alloy and other materials; windows are made of plastic frame materials, and the number of glass layers is single.

Energy-Saving Transformation of Rural House Enclosure …

1075

Table 1 Existing model rural house enclosure structure construction method (Plan A) Enclosure

Material

U /[W/m2 ·K]

External wall

20 mm Cement mortar + 240 mm Ordinary sintered brick + 20 mm Cement mortar

1.318

Window

6 mm Single glass

5.70

Roof

35 mm Extruded polystyrene board + 100 mm RC

0.784

Floor

20 mm Cement mortar + 100 mm RC + 20 mm Cement mortar

2.991

See Table 1 for the construction method of the research model rural house enclosure structure.

3 Dest Software Simulation Analysis 3.1 Modeling This paper establishes a model of a typical four-story rural house in Yichang, Hubei. The model is a brick-concrete structure with a storey height of 3.2 m, facing north– south, with a total area of 16.2m2 of windows to the south and 4.5m2 of windows to the north. The total area of the south gate is 10.8 m2 (Fig. 1).

Fig. 1 Typical four-story building plan

1076

J. Li and J. Yuan

3.2 Rural House Energy Consumption Simulation The building structure method is shown in Table 1. The number of ventilation changes is 2 times from June to mid-September, and 0.5 times in the rest of the time; the kitchen is set without air-conditioning, the bedroom and hall are air-conditioned, the indoor heating temperature is 15°C in winter, and the indoor cooling temperature in summer It is 29 °C. Other parameters are the default values of the software. The outdoor parameters are set using the weather parameters of the typical weather year in Yichang area in the software. We use the software to simulate and calculate the annual energy consumption of the rural house, and the annual cumulative heat load of the typical rural house model is as high as 13,008.9 kW·h, the annual cumulative cooling load is as high as 8930.99 kW·h. If all this is converted into electricity bills, it will be a huge expense for rural households in this area. It can be seen that the lack of thermal insulation measures for rural houses in Yichang, Hubei has resulted in high cumulative heat and cooling loads throughout the year, and the cumulative heat load is much larger than the cooling load. Therefore, the rural houses in this area need to carry out energy-saving Transformation of the envelope structure to ensure the indoor thermal comfort of the rural buildings.

4 Energy-Saving Optimization and Transformation of Rural Houses 4.1 Factor Selection and Analysis The external walls, roofs, slabs and windows in the envelope structure all have an impact on the cumulative load of the building throughout the year. The combination of different factors will also have different effects on the energy consumption of the building. The structure, roof, floor slab and windows were transformed to simulate and analyze rural residential energy consumption. See Table 2 for the construction method of the enclosure structure of the modified model rural house. Table 2 Transformation model rural house enclosure structure construction method (Plan B) Enclosure

Material

U / [W/m2 ·K]

External wall

20 mm Cement mortar + 240 mm Ordinary sintered brick + 30 mm EPS + 20 mm Cement mortar

0.716

Window

Ordinary insulating glass(Hollow 9 mm)

3.10

Roof

160 mm Hydrophobic expanded perlite products + 100 mm RC

0.589

Floor

20 mm Cement mortar + 100 mm RC + 30 mm EPS + 20 mm Cement mortar

1.028

Energy-Saving Transformation of Rural House Enclosure …

1077

4.2 Analysis of Simulation Transformation Results According to the above construction methods, models are established and simulated calculations are performed, without considering the interaction between various factors. Use DeST software to simulate the annual cumulative heating load and cooling load of each scheme. See Table 3 for the experimental table and simulation data. The analysis of the test results mainly considers the mean value of each factor at different levels and the range of each factor (see Table 4). By comparing different water average values, reducing the heat transfer coefficient of external walls, roofs, and windows in cold winter and hot summer areas can reduce Table 3 Experimental table and simulation data External wall

Window

Roof

Floor

Annual cumulative heat load / kW·h

Annual cumulative cooling load / kW·h

1

A

A

A

A

13,008.9

8930.99

2

B

A

A

A

9525.41

8616.74

3

A

B

A

A

10,611.55

8308.29

4

A

A

B

A

12,809.10

8827.66

5

A

A

A

B

13,084.80

8907.37

6

B

B

A

A

7015.15

8001.68

7

A

B

B

A

10,390.12

8197.82

8

A

A

B

B

12,879.22

8803.89

9

B

A

A

B

9588.80

8598.11

External wall

Window

Roof

Floor

Annual cumulative heat load / kW·h

Annual cumulative cooling load / kW·h

10

B

A

B

A

9341.24

8466.67

11

A

B

A

B

10,683.80

8271.14

12

B

B

B

A

6780.82

7909.42

13

B

B

A

B

7117.19

7992.50

14

B

A

B

B

9352.59

8490.10

15

A

B

B

B

10,430.94

8162.22

16

B

B

B

B

6877.03

7906.27

Table 4 Range analysis of each factor (annual cumulative heat load) Existing model mean

External wall

Window

Roof

Floor

11,737.30

11,198.76

10,079.45

9935.29

Transformation model mean

8200.00

8738.33

9857.63

10,001.80

Range

3537.3

2460.43

221.82

-66.51

1078

J. Li and J. Yuan

Table 5 Range analysis of each factor (annual cumulative cooling load) External wall

Window

Roof

Floor

Existing model mean

8551.17

8705.19

8453.35

8407.41

Transformation model mean

8247.68

8093.67

8345.51

8391.45

303.49

611.52

107.84

15.96

Range

the annual cumulative heat load of rural houses in the area. However, reducing the heat transfer coefficient of the floor slab increases the cumulative heat load. By comparing the range, we can see the influence of the changes in the levels of various factors on the test results, and the most important energy consumption factor corresponds to the largest range. It can be seen from Table 4 that the influence of the cumulative heat load of the four factors is, in descending order, external wall, window, roof, and floor. Therefore, in the energy-saving design of rural houses in this area, in order to reduce energy consumption in winter, the two main factors of reducing the heat transfer coefficient of external walls and reducing the heat transfer coefficient of external windows should be considered first. The combination that minimizes the annual cumulative heat load is external wall installation with thermal insulation material-window material change-roof installation with thermal insulation material-floor slab without modification. Under this combination condition, the annual cumulative thermal load can be reduced to 6780.82 kW·h, reducing heating energy consumption by 48% (Table 5). The influence of the four factors on the cumulative annual cooling load in descending order is external windows, external walls, roofs, and floors. Therefore, in the energy-saving design of rural houses in this area, in order to reduce the energy consumption of summer houses, the two main factors of reducing the heat transfer coefficient of external walls and reducing the heat transfer coefficient of external windows are first considered. In the same way, by combining the levels of the above factors, it can be concluded that the combination with the smallest cumulative cooling load for the year is the installation of insulation materials on the external walls-changing window materials-installation of insulation materials on the roofinstallation of insulation materials on the floor. Simulation calculations show that the annual cumulative cooling load under this combined condition is 7906.27 kW·h, which reduces the cooling energy consumption by 11%. The reduction of heat transfer coefficient of external walls, external windows and roofs has a far greater impact on heating energy consumption in winter than cooling energy in summer.

5 Conclusions This paper conducts a field investigation on rural houses in Yichang, Hubei. Through DeST software simulation, it is found that the area has high cumulative load

Energy-Saving Transformation of Rural House Enclosure …

1079

throughout the year and lack of energy-saving residential design. Through the simulated energy-saving transformation of rural houses in this area, draws the following conclusions: (1)

(2)

(3)

The external walls and windows have the greatest impact on the heating energy consumption of rural houses in Yichang, Hubei. The installation of insulation materials on the floor will increase the cumulative heat load of rural houses. Therefore, the transformation of rural houses should first consider installing thermal insulation materials on the outer walls, such as polystyrene foam boards or extruded panels, and secondly, replacing ordinary single-layer glass windows with energy-saving windows with lower heat transfer coefficients. The biggest impact on the summer cooling energy consumption of rural houses in this area is the external windows, followed by the external walls. The installation of insulation materials on the floor slabs will reduce the cumulative cooling load of the rural houses, but the effect is not significant. The transformation of external walls, windows and roofs has a far greater impact on heating energy consumption in winter than cooling energy in summer. Rural houses in this area need to be installed with curtains and shading to further reduce the cumulative cooling load of rural houses.

References 1. Xueli, Z.: Rural building energy technology research and development overview. Intell. Build. 02, 61–66 (2017). (in Chinese) 2. Zhao, L., Ouyang, J.: Summer indoor thermal environment investigation and optimized design of energy saving reform project for new Ruralhouse in hot summer and cold winter Region. Refrig. Air Conditioning 32(06), (2016). (in Chinese) 3. Zhang, G., Zhang, Q., Wang, F.: Study on influencing factors of energy consumption in traditional rural dwellings of Kangding Prefecture based on design builder. Build. Sci. 35(06), 108– 115(2019). (in Chinese). Jin, H., Teng, S.: Study on optimal design of energy saving for rural housing in severe cold regions. Architect. J. (S1), 218–220 (2015). (in Chinese) 4. Pengli, Y., Lin, D., Zongshan, W.: Analysis of influencing factors of heating energy consumption of rural residence based on measured energy consumption data. Build. Sci. 36(02), 28–37 (2020). (in Chinese) 5. Pengli, Y., Lin, D., Zongshan, W.: Review of data acquisition methods for end-use energy consumption of chinese rural residences. Build. Sci. 35(08), 143–153 (2019). (in Chinese) 6. Huo Huimin, Xu., Wei, L.A.: Comparison and analysis of envelope structure retrofitting schemes for rural residential building in northern china based on entropy method. Build. Sci. 35(08), 57–64 (2019). (in Chinese) 7. Leyuan, Ma., Yuehua, C.: BIM application in energy-saving retrofitting of traditional rural residential buildings in Central Shandong Province. J. Huaqiao University (Natural Science) 40(04), 503–509 (2019). (in Chinese) 8. Lili, Z., Fei, L., Jawen, H.: Improvement study on existing rural house thermal environment in Southwest region of Shandong Province. J. Xi’an Univ. Architec. Technol. (Natural Science Edition) 48(01), 122–127 (2016). (in Chinese) 9. Zou Huifen, Hu., Hailang, K.Y.: Energy-Saving Reconstruction of Rural house Foundation in the Cold Region. J. Shenyang Jianzhu University (Natural Science) 31(02), 320–327 (2015). (in Chinese)

Automatic Adjustment Method of Urban Deceleration Belt Based on Intelligent Sensor Equipment Lingzhen Sun, Haozi Zhou, Chujie Zhu, Haitong Qiu, and Jiankun Deng

Abstract Due to the single function of the speed bump, there are still some problems such as installation and disassemble, so the workload is relatively large. Therefore, in this paper, intelligent sensor equipment is used to monitor the amount of vehicles passing by, and the vibration frequency of surrounding buildings is detected by the impact force attached to the ground when the passing vehicle just touches the deceleration belt, and the automatic adjustment of the deceleration belt is controlled by the joint robot, Greatly improve the comfort of the driver. Keywords Intelligent sensor · Deceleration belt · Vibration frequency

1 Introduction In traffic accidents, speeding is the main reason. In order to control the speed of vehicles at some intersections with large pedestrian flow, the road deceleration strip came into being [1]. While the speed bumps are widely used, The harmfulness to the suspension system and the unpleasant psychology of the driver are ignored. With the popularization of Internet of things technology, various sensors emerge as the times require [2]. Based on the above background, in order to create an intelligent sensor based urban deceleration belt automatic adjustment equipment. In this paper, the intelligent sensor technology is used to capture the vibration frequency caused by the impact force on the ground before the vehicle passes.

L. Sun (B) · H. Zhou · C. Zhu · H. Qiu · J. Deng Guangzhou Huali Science and Technology Vocational College, Guangzhou, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_133

1081

1082

L. Sun et al.

2 Research on Automatic Adjustment Method of Deceleration Belt Under Intelligent Sensor Equipment 2.1 Intelligent Sensing Equipment Intelligent sensor device is the middle layer between intelligent sensor device and management layer. Receive the control command sent by the management, obtain the state value of the state intelligent sensor [3], set the control quantity of the control intelligent sensor, return the acquired data to the management accurately.

2.2 Automatic Adjustment Method The vehicle detects the impact force of the vehicle on the ground nearby by the front sensor, and then calculates the rise and fall of the deceleration belt by detecting its vibration frequency by the sensor. At present, the detection of automatic lifting technology is mostly realized by joint robot. Based on the sensor, this paper uses the motion model method of joint robot to adjust automatically according to the content detected by the sensor. The second order differential equation can be used as the dynamic model of the joint robot:   M(q)q  + C q, q  q  + G(q) = τ + τd

(1)

Among them, q, q  , q  represents displacement, velocity and acceleration of the  joint robot; M(q) represents inertia matrix; C q, q  represents eccentricity of joint robot; G(q) represents gravity; τ represents control force; τd represents external interference vector. The dynamic model of joint robot has the following characteristics: (1)

The upper bound and the lower bound have the inertia of M(q). 0 < (M(q)) ≤ M M .

(2)

M M is the maximum value of M(q). (2)

  As an antisymmetric matrix, M M − 2C q, q  needs to satisfy the following formula:   ς T M(q) + 2C q, q  S = 0

(3)

The gravity vector value G(q) and external disturbance τd are limited: τd  ≤ τ M

(4)

Automatic Adjustment Method of Urban Deceleration Belt … Table 1 Parameter setting

1083

Parameter name

Numerical value

Experimental tools

MATLAB

Experimental methods

Roesset

Vehicle type

Private car

Quality

400 kg

Tire quality

40 kg

Tire damping

2500Ns/m

Ground elasticity

40 MPa

Poisson’s ratio

0.34

(G(q)) ≤ G M , ∀q ∈ R n

(5)

In Eq. (4), τ M and G M are normal numbers. Through the automatic adjustment model, based on the information collection of intelligent sensors, the position of the vehicle passing through is analyzed, and the lifting adjustment after analysis and calculation is carried out under the condition of determining the parameter setting of deceleration belt height. When the vehicle passes by, the deceleration strip will be raised automatically, and it will be retracted automatically after the vehicle passes [4].

3 Background and Process of the Experiment This paper puts forward the research of automatic adjustment method of urban deceleration belt based on intelligent sensor. Firstly, the sensitive information detection function of the sensor is used to detect the vibration frequency caused by the ground impact force before the vehicle passes by [5]. Secondly, the final data will be detected to control the rise and fall of the deceleration strip after the joint robot analysis. We also adjust the appearance of the deceleration, so that the impact force at a fixed position can be considered as the force when the vehicle jumps on the ground [6]. The experimental parameters set in this paper are shown as Table 1.

4 Results and Discussion 4.1 Automatic Adjustment Model In this paper, the surface structure of the new type of deceleration belt is designed. The intelligent sensor can make the deceleration belt have three different states. First

1084

L. Sun et al.

Fig. 1 Deceleration belt model

of all, the basic deceleration function can be implemented, and the traffic flow in the area can be recorded; secondly, the height can be automatically adjusted by the traffic flow [7]. When the traffic flow is very large, the height reaches its peak. When the traffic flow is small, it reduces to the level of the ground, and has good scalability. Finally, it will rise to the barrier state and reach the highest point. However, it is not recommended to take this way to avoid traffic accidents caused by machine failure [8]. Therefore, this paper only establishes the first two states. Shown as Fig. 1, starting from the mechanical properties, this paper extracts and analyzes each feature information of the deceleration belt. It is found that the higher the slope, the stronger the sense of turbulence, the wider the deceleration strip, and the higher the comfort of passing vehicles. The model is designed from the slope, size and other important parameters, abandoning the old ideas. When the car passes through the deceleration device at high speed, it will produce acceleration in the vertical direction. The uncomfortable feeling of violent vibration and the suspicion of safety problems force people to slow down. The rubber type deceleration belt is divided into arc type, isosceles type, trapezoid type and parabola type. Because the arc type deceleration belt is the most common and comfortable deceleration belt in daily life, this paper selects the round rubber deceleration belt for research. The length of the new speed belt is 500 mm, the width of the bottom is 350 mm, the width of the top is 50 mm and the height is 45 mm.

4.2 Effect Comparison of Vibration Frequency In order to better test the damping effect of the designed deceleration belt, we will test two groups of deceleration belt models respectively. The traditional group is

Automatic Adjustment Method of Urban Deceleration Belt …

1085

Fig. 2 Comparison of vibration frequency between traditional group and innovative group

an uncorrected deceleration belt model, while the innovation group is the deceleration belt model designed in this paper [9]. The vibration frequency is detected by intelligent sensor. When the same type of vehicle passes through several times continuously, the acceleration of each passing also changes, and the average value is obtained after recording for many times. Shown as Fig. 2, the speed bump designed by this experiment is compared with the traditional one. It is found that the vibration frequency of the new type of deceleration belt decreases rapidly under different accelerations. When the vehicle acceleration reaches 0.006, the vibration frequency basically does not change. The vibration effect of the new type of deceleration belt is remarkable, which is worthy of application.

4.3 Questionnaire Survey Results Shown as Fig. 3, we collected 130 drivers’ scores after the test of the speed bump model, and the scores before and after the application have increased significantly. Most people hold a neutral attitude towards the proposed speed bump model, but compared with the previous model, the number of satisfied people has been significantly improved.

1086

L. Sun et al.

Fig. 3 Driver satisfaction survey results

4.4 Vibration Principle of Vehicle Passing Through Deceleration Strip The principle of vehicle vibration through the deceleration strip is simplified as follows: (1)

(2)

(3)

(4)

During the interaction between vehicle and deceleration strip, there is almost no yaw motion [10]. The time of vehicle passing through the deceleration strip is short, the pitching vibration of vehicle can be ignored, and the process of vehicle on the deceleration strip is mainly vertical vibration; Compared with the vertical movement, the horizontal movement of the deceleration strip is ignored. When the driver observes the deceleration strip next time, he will judge that the vehicle will produce large vibration when passing through at high speed. The width of the deceleration strip is very small relative to the wheelbase of the vehicle, so the interference between the front and rear axles of the vehicle is ignored in the process of action; In the process of action, except for the tire suspension components, other parts are regarded as absolute rigid bodies.

5 Conclusions This paper designs a suitable deceleration belt model with length, width and height. The experimental results show that the vibration reduction and bumpy feeling of the new modified deceleration belt are reduced. In the case of non-stop acceleration, the vibration frequency of the new type of deceleration belt is also lower than that of the traditional one. The speed bump designed in this paper can not only automatically adjust the height, but also gain the favor of passing vehicle drivers.

Automatic Adjustment Method of Urban Deceleration Belt …

1087

Acknowledgements This work was supported by 2020 Guangdong Province Science and Technology Innovation Strategy Special Fund (pdjh2020b1408).

References 1. Clark, B., Chatterjee, K., Melia, S.: Changes in level of household car ownership: the role of life events and spatial context. Transportation 43(4), 565–599 (2016) 2. Kim, D.: Factors affecting electric vehicle sharing program participants’ attitudes about car ownership. Transp. Res. Part D 36(may), 96–106 (2015) 3. Chronopoulos, A., Michalopoulos, P., Donohoe, J.: Efficient traffic flow simulation computations. Math. Comput. Model. 16(5), 107–120 (2015) 4. Moretti, F.: Urban traffic flow forecasting through statistical and neural network bagging ensemble hybrid modeling. Neurocomputing 167(1), 3–7 (2015) 5. Mylotte, D.: Mitra-fr: speed bump or end of the road for percutaneous mitral repair in secondary mitral regurgitation? EuroIntervention: J. EuroPCR Collaborat. Working Group Intervent. Cardiol. Eur. Soc. Cardiol. 14(8), 841–842 (2018) 6. Graham, J.E., Jones, A.T.: A bump in the road: speed bumps’ impact on property values. Int. J. Hous. Markets Anal. 12(1), 43–58 (2019) 7. Wang, L., Todaria, P., Pandey, A., O’Connor, J., Chernow, B., Zuo, L.: An electromagnetic speed bump energy harvester and its interactions with vehicles. IEEE/ASME Trans. Mechatron. 21(4), 1985–1994 (2016) 8. Wu, Z.H.: Research on the application of internet of things technology to digital museum construction. Acta Geoentica Sinica 38(2), 293–298 (2017) 9. Javed, A.: Design and implementation of a cloud enabled random neural network-based decentralized smart controller with intelligent sensor nodes for hvac. IEEE Internet Things J. 4(2), 393–403 (2017) 10. Randers-Eichhorn, L.: On-line green fluorescent protein sensor with led excitation. Biotechnol. Bioeng. 55(6), 921–926 (2015)

Analysis of Yunnan Flower Logistics Demand Based on Grey GM (1, 1) Model Pingping An

Abstract Development conditions of Yunnan flower industry are superior, but the flower logistics is relatively backward, which has become the main bottleneck restricting the development of Yunnan flower industry to a higher level. Whether the intermediate logistics process from production to consumers can be improved is directly related to the quality of flowers and the performance of the whole logistics system. Therefore, this paper puts forward the analysis of Yunnan flower logistics demand under the grey GM (1,1) model. In this paper, through the analysis of the demand of the grey GM (1,1) model for flower logistics, a flower logistics forecasting model is established according to the demand, and the model is tested and analyzed. In the test, this paper uses the third-party testing tool GM (1,1) model to simulate the user operating system of more than 500, and records the small error probability and posterior error ratio of the model. The results show that when the small error probability is greater than 0.95, the posterior difference ratio is less than 0.35, and the prediction accuracy level is higher. Through the analysis, the research of this paper has achieved ideal results and made a contribution to the research of Yunnan flower logistics field. Keywords Model testing · Grey prediction method · Logistics needs · Yunnan flowers

1 Introduction Grey theory has a series of advantages such as less data, small sample size and high short-term prediction accuracy, which has been studied and applied by many scholars [1–3]. The grey theory is used to analyze and forecast customer demand. In this paper, the grey theory is used to forecast the demand of flower logistics in Yunnan. The modeling mechanism of non-equidistant sequence GM (1,1) model is studied and successfully applied to specific fields [4, 5]. P. An (B) Yunnan University Dianchi College, Kunming, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_134

1089

1090

P. An

Yunnan flower industry has developed significantly, which has become the pillar industry of rural economy in Yunnan flower producing areas and the advantageous industry for farmers to increase their income and become rich. According to the data, the per capita income of flower farmers in Yunnan Province is 16,117 Yuan, accounting for 75% and 1.79 times of rural per capita income in Yunnan Province [6, 7]. However, due to the restriction of logistics bottleneck, the performance of Yunnan flowers in the domestic and foreign markets is not satisfactory, especially in the whole flower logistics stage, the average flower drop rate is as high as 35%, even as high as 42% in serious cases, which directly leads to the market quality instability and price fluctuation. 70 large and medium-sized cities in China have a great impact on the flower market in Yunnan, “Huanong” brand is also affected by the increasingly squeezed profit space [8–10]. This paper analyzes the actual situation of flower logistics demand in Yunnan Province under the grey GM (1,1) model, and finds that the flower logistics in developed countries is lack of technology promotion and technical support. Therefore, this paper establishes the grey GM (1,1) model to study the application of Yunnan flower logistics demand. In the analysis and research, according to the actual situation of Yunnan flower logistics demand, the introduction of grey GM (1,1) model technology, the combination of the two can improve the work efficiency, scientific and technological strength and core competitiveness. Through the analysis of the survey results, this paper thinks that the use of grey GM (1,1) model can optimize the logistics situation in Yunnan and achieve good results.

2 Current Situation of Flower Logistics in Yunnan Province and Prediction Model of Flower Logistics 2.1 Current Situation of Flower Logistics in Yunnan In recent years, there is little research on flower logistics at home and abroad, which is mainly divided into flower logistics status analysis and flower transportation research. This paper analyzes and studies four kinds of common flower transportation modes, points out that automobile transportation and air transportation have obvious advantages, and emphasizes that the long-distance transportation of flowers must adopt cold chain transportation. This paper forecasts the demand of flower logistics in Yunnan, and points out that the output of flowers in Yunnan will increase greatly in the next five years. In view of the current situation of Yunnan flower logistics, this paper starts from the reform of advanced flower logistics mode, and then emphasizes that flower preservation and transportation is the most important link in Yunnan flower logistics. Based on the actual situation of Yunnan flower logistics in China, this paper puts forward some suggestions for the development of flower logistics in line with China’s affairs.

Analysis of Yunnan Flower Logistics Demand Based on Grey GM …

1091

2.2 Model of Flower Logistics Forecast At present, Yunnan flower logistics has a certain scale, but there are still many problems restricting the development of Yunnan flower industry. The main problems are as follows: the cold chain protection measures of Yunnan fresh cut flowers in the process of logistics transportation are basically missing, resulting in a serious decline in the quality of Yunnan flowers; the relatively professional flower logistics companies in Yunnan have not yet formed, making the production, transportation, and other links of flowers unable to be closely linked; the specialized long-distance transportation and preservation technology of flowers has not been further developed and applied. Grey prediction can predict the future development trend on the basis of existing data. It is widely used in industry, agriculture, commerce, environment, society, military and other fields. Grey prediction regards “random process” as “grey process” and “random variable” as “grey variable”. GM (1,1) model of grey system theory is used to deal with the well. Model is established with the assumption that the reference data is listed as:   x (0) = x (0) (1), x (0) (2), · · · , x (0) (n)

(1)

It is generated by adding once: x k (k) =

k 

x (0) (i), (k = 1, 2, · · · , n)

(2)

i=1

Therefore, the differential equation is established as follows: x (0) (k) + az (1) (k) = b, k = 2, 3, · · · , n

(3)

Modeling process of grey model is summarized as follows: firstly, the original grey sequence is generated to weaken its randomness and enhance its regularity; secondly, the GM (1,1) model is established for the generated data, and the model parameters are calculated by the least square method; thirdly, the generated model is tested, if the model is feasible, it will go to the next step, otherwise it will enter the first step; fourth, according to the established GM (1,1) model, it will enter the next step The model parameters are calculated by the least square method, and the actual values are obtained by inverse generation.

3 GM (1,1) Model Test and Analysis It is usually necessary to test GM (1,1) model, such as residual test and posterior error test, to determine the credibility of the model. The calculation formula of residual

1092

P. An

Table 1 Small error probability (P) and posterior difference ratio (C) of prediction model

Prediction accuracy grade

P

C

Good (Level 1)

> 0.95

< 0.35

Pass (Level 2)

> 0.8

< 0.5

Reluctant (Level 3)

> 0.7

< 0.65

Unqualified (Level 4)

< = 0.7

> = 0.65

test is residual test, which is an intuitive arithmetic test method of point by point comparison. They compare the predicted data with the actual data, and then observe whether the relative error meets the requirements. Posterior error test is a statistical concept, which is based on the probability distribution of the specific residual error. In order to test the actual performance of GM (1,1) model, this field performance test takes a logistics company as the test object. The GM (1,1) model is applied to a logistics enterprise. The logistics company has about 75 customers. Accuracy levels need to be calculated on a per customer basis. The larger the small error probability value of the prediction model is, the smaller the posterior difference ratio is and the higher the accuracy is. In order to meet the needs of the next five years, this paper sets the minimum concurrent clients to more than 500. According to the characteristics of Yunnan flower logistics decision-making system and the experience of developers, the performance requirements of the system are put forward. In this paper, the third-party testing tool GM (1,1) model is used to simulate a large number of user operating systems, and the small error probability and posterior error rate of the model are recorded. The test results are shown in Table 1. Through the analysis of the results, when the small error probability is greater than 0.95, the posterior difference ratio is less than 0.35, and the prediction accuracy is higher.

4 Discussion 4.1 Analysis of the Challenges of Yunnan Flower Industry Development (1)

Market and production are facing double pressure. From the perspective of international competition, Kunming is facing not only the competition from the mature developed flower producing countries, but also the challenge from the emerging flower producing countries. Moreover, most of the new flower producing countries has similar conditions with Yunnan. Guangzhou, Shanghai, Shenyang and other old flower production bases continue to expand production; while China’s tariff reduction, and relax the restrictions on the introduction of foreign investment, foreign flower enterprises will have more and more production bases in China, thus increasing the competition in the Chinese market.

Analysis of Yunnan Flower Logistics Demand Based on Grey GM …

(2)

(3)

1093

It is urgent to cultivate independent intellectual property rights. More than 93% of the varieties in Yunnan flower market were introduced from abroad. It means that if you don’t pay the patent fee, you will not be able to introduce good flower varieties, and the export of products will be strictly restricted. This is undoubtedly a heavy blow to the enthusiasm of domestic enterprises in developing new varieties of flowers. Transformation of flower production mode. Learning from the experience of foreign flower industry development, generally speaking, large-scale and specialized production is a powerful guarantee for the flower industry to become bigger and stronger. However, 85% of the flower growers in Yunnan have limited capital and small production scale, so they have to complete the selection, planting and sales by themselves, which eventually leads to the low quality and unstable supply of flowers, which makes it difficult to meet the export demand. Therefore, how to further change the mode of production and management, improve the management ability and promote the specialization of flowers and plants is the key to achieve “quality” breakthrough in Yunnan flower industry, and it is also a great challenge facing Yunnan flower industry. Figure 1 shows the analysis of the challenge factors of Yunnan flower development in 2016–2019.

In addition, this paper further analyzes the Yunnan flower logistics, the results are shown in Fig. 2. Through the analysis in Fig. 2, compared with the traditional mode, Planting scale

Variety research and development

Import in

60

Statistical value(%)

50

40

30

20

10

0 2016

2017

2018

2019

Statistical time Fig. 1 Analysis on the challenge factors of flower development in Yunnan Province from 2016 to 2019

1094

P. An Traditional model

100

Grey GM (1,1) model

90

Statistical value(%)

80 70 60 50 40 30 20 10 0 systematization

specialized

Standardization

Statistical items Fig. 2 Systematic, specialized and standardized comparative analysis of traditional mode and grey GM (1,1) model

Yunnan flower logistics can accurately predict under the influence of gray GM (1,1) technology, and effectively improve the competitiveness of the industry. Through the result analysis, it can be concluded that the grey GM (1,1) model can not only improve the quality, but also provide technical support for the whole flower logistics industry in Yunnan.

4.2 Suggestions on the Development of Flower Logistics Based on Grey GM (1,1) Model (1)

Increase government support

First of all, improve the relevant laws and regulations of flower logistics. Laws and regulations play a regulatory role in restricting and guiding enterprises, and formulate enterprise emission standards from the legal level. Secondly, financial subsidies and preferential tax policies are used to encourage enterprises to develop grey GM (1,1) logistics model. The enterprise is always a rational economic man, and its ultimate goal is to maximize its own profits. Therefore, the government can give low interest loans or financial subsidies and tax relief to enterprises using grey GM (1,1) logistics model equipment.

Analysis of Yunnan Flower Logistics Demand Based on Grey GM …

(2)

1095

Raise the level of science and technology

Improvement of flower science and technology level of grey GM (1,1) model mainly includes hard technology and soft technology. In terms of hard technology, it mainly includes grading, packaging, preservation and equipment development and application. Flower processing equipment can convert it into fertilizer and fuel; improve resource utilization and environmental protection benefits. The development and application of new technology will bring innovation power to the development of grey GM (1,1) flower model. Soft technology, mainly including logistics technology and personnel training. In the process of flower distribution, based on computer and Internet technology, promote the use of GPS positioning system, bar code identification technology, and automatic identification technology. At the same time, we should strengthen the cultivation of flower logistics talents, cultivate a group of high-tech talents, and enhance the ability of independent innovation. (3)

Speed up the construction of information platform

Efficient operation of grey GM (1,1) pattern flower logistics system needs a perfect information system platform to support. The timelier the information sharing and exchange, the timelier the resource allocation, the higher the logistics efficiency. Under the guidance of the government, the main body of logistics system participates in the construction of production information system, post-harvest processing information system and retail information system. Its purpose is to integrate all logistics participants into the information platform, effectively solve the problem of asymmetric information between the main bodies, realize the timely sharing and exchange of information, so as to improve the efficiency of flower logistics. (4)

Standardize logistics process and formulate industry standard

We should give full play to the guiding role of the industry logistics association and standardize the service management behavior of the third-party logistics enterprises and traditional logistics enterprises. The logistics association should standardize the work, punish and severely punish the deviant behavior of the third-party logistics enterprises; the logistics industry association should formulate the corresponding standard process according to the actual logistics characteristics of various flower products, and form a unified operation standard.

5 Conclusions In the research of Yunnan flower logistics system, this paper takes the introduction of grey GM (1,1) model into the flower logistics system as the main line of study. Through the analysis of different data test results, the grey GM (1,1) model plays an important role in optimizing the flower logistics system. When the small error probability of the grey GM (1,1) model is larger, the posterior error ratio is smaller, and

1096

P. An

the prediction accuracy level is higher. It can assist enterprises to optimize logistics demand. Therefore, the value of grey GM (1,1) model has been recognized by flower enterprises. At the end of this study, the traditional model and the gray GM (1,1) model are compared in systematization, specialization and standardization. Through the analysis of the data, the grey GM (1,1) model technology in this paper, whether systematic, professional or standardized, is significantly higher than the traditional mode, reaching a higher level in the same industry, and can meet the logistics needs of flower enterprises. This study has achieved ideal results and provided technical support for Yunnan flower logistics demand optimization. Acknowledgements This work was supported by Scientific research fund project of Yunnan Education Department (project number: 2020J1304)

References 1. Deng, L.-R.: Innovative prediction method: modified high-order multi-dimension nonequidistant grey model gm (1,1). J. Grey Syst. 18(2), 65–72 (2015) 2. Liu, W., Zhang, M., Wang, Y.: Weak thruster fault prediction method for autonomous underwater vehicles based on grey model. Proc, Inst. Mech. Eng. 233(3), 348–356 (2019) 3. Zhang, L., Li, S.M., Zhu, G.: Study of equipment material demand prediction method based on time-continuous grey markov model. Acta Armamentarii 38(9), 1862–1866 (2017) 4. Zhang, Z., Luo, J., Xu, B., Ma, W.: Metabolism adaptive multi-parameter prediction method based on grey theory. J. Shanghai Jiaotong University 51(8), 970–976 (2017) 5. Yeh, P.-L., Fahn, C.-S., Lin, Y.-T., Hung, H.-F., Hsu, Y.-L., Hsu, Y.-T.: A novel prediction method based on grey-lvq neural network. J. Grey Syst. 29(1), 34–50 (2017) 6. Kuhn, H.W.: Statement for naval research logistics: “the hungarian method for the assignment problem.” J. Royal Statist. Soc. 64(4), 611–633 (2015) 7. Zhou, J., Yang, Q., Zhang, X., Han, C., Sun, L.: Traffic prediction method for geo satellites combining arima model and grey model. J. Shanghai Jiaotong University (ence) 25(1), 65–69 (2020) 8. Li, H.R., Wang, Y.K., Wang, B., Xu, B.H., Li, X.L.: The method of grey markov remaining service life prediction specific to generalized mathematical morphological particle. J. Vib. Eng. 28(2), 316–323 (2015) 9. Xiuzhenkong, L.I.: Application of center approach grey gm (1,1) model to prediction of landslide deformation with a case study. J. Eng. Geol. 15(5), 673–676 (2007) 10. Zhang, L., Li, S.M., Zhu, G.: Study of equipment material demand prediction method based on time-continuous grey markov model. Acta Armamentarii 38(9), 1862–1866 (2017)

Signal Interpretation of Magnetic Resonance Technology Based on Compressed Sensing Li Li

Abstract Wireless power transfer (WPT) is a non-contact way to achieve energy transmission between power supply and electrical equipment. The core of compressed sensing theory is to be able to sparse original data in a specific area. The corresponding sampling rate is determined according to the frequency of the signal used, but it does not utilize other characteristics and parameters of the signal itself. The whole system mainly uses the principle of magnetic resonance to realize the function of simultaneous interpreting of wireless energy and signal. Firstly, the audio signal is loaded into the high frequency band through the frequency modulation circuit, and the high frequency carrier wave is transmitted by the resonant coil through the power amplifier. Then, the receiving coil with the same resonant frequency receives the high-frequency carrier wave with high energy. One part of the receiving coil provides the appropriate DC voltage for the audio power amplifier through rectification and voltage stabilization, and the other part restores the audio signal through demodulation and filtering. Finally, the restored audio signal will sound through the audio amplifier. Keywords Wireless power transfer · Magnetic resonance · Compressed sensing · Instrument signal · Sparse representation

1 Introduction Wireless power transfer (WPT) is a non-contact way to achieve energy transmission between power supply and electrical equipment [1]. There are four mainstream technologies: magnetic induction coupling, magnetic resonance, microwave radiation and laser [2, 3]. Among the four mainstream WPT technologies, magnetic induction coupled WPT and magnetic resonance WPT technology couple electric energy to load through alternating magnetic field, which can realize wireless energy transmission [4]. Because L. Li (B) College of Artificial Intelligence, Wuhan Technology and Business University, Wuhan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_135

1097

1098

L. Li

the principle of magnetic induction coupling technology is relatively simple, it has developed more mature [5]. It is found that the transmission efficiency of magnetic induction coupled WPT technology is high in a short transmission distance, but the transmission efficiency decreases rapidly with the increase of transmission distance. It is mainly used in transportation, consumer electronic equipment and some special industrial applications [6]. Microwave radiation WPT technology uses far-field radiation effect of electromagnetic field to transmit electric energy in free space [7]. This method has less power loss in the process of power transmission, and can realize ultra long distance wireless power transmission. However, the power density is low and the microwave divergence angle is large, which is mainly used in the field of space solar power station. The laser mode of radio power transmission has the characteristics of good directivity and high energy density. Its principle is also through the radiation effect of electromagnetic field far field, which is mainly used in the field of space solar power station, special military equipment wireless power supply, etc. The transmission distance of magnetic resonance type is longer than that of magnetic induction type. It realizes efficient energy transmission through the magnetic coupling resonance of transmitting coil and receiving coil. It is mainly used in the fields of wireless charging equipment and consumer electronic equipment in smart home. Magnetic resonance technology is mainly based on quantum theory and classical theory of Magnetic Resonance (MR) [8]. Subsequently, MR becomes an important means to study the chemical structure between various substances in chemistry [9]. MR technology combined with the MR method of pulse Fourier transform makes the use of pop more extensive, and has also led to the development of related technology.

2 Compressed Sensing Method At present, the theory of compressed sensing consists of three core parts [10]: the sparse transformation of receiving initial signals, the sampling analysis of the corresponding observation matrix and the information reconstruction of the initial signal. In the core of the three compressed sensing theories, the compression and decompression phases are respectively included. A frame diagram of the theory of compressed perception, as shown in Fig. 1. After the corresponding signal processing, the signal is classified according to the information entropy. The desired signal is obtained by selecting the corresponding observation matrix, and the effective compression of the signal is realized. In this process, if only the compressed sensing signals are processed, it is necessary to select the observation matrix to obtain the desired results. We can not only obtain the number of good sampling values of controlled fluctuation data with different adaptive signal processing methods, but also provide a better basis for signal reconstruction, and useful signals can be effectively transmitted to the decompression end. The main component of the decompression section is signal reconstruction, which mainly reconstructs the sampled sequence information that can be received. The

Signal Interpretation of Magnetic Resonance Technology …

1099

Fig. 1 The framework of compression perception theory

information reconstruction includes the whole wavelet packet reconstruction and the reconstruction of each wavelet packet coefficient block.

3 The Basic Principle of Magnetic Resonance 3.1 MR Theory The basis of MR technology is to understand the interaction between the magnetic field and the external magnetic field, and the spin moment is μ = λP

(1)

In the upper equation, μ is the magnetic moment, P is the angular momentum of spin, and λ is the spin magnetic ratio (the characteristic coefficient of atom). If there is no external magnetic field, the orientation of a single magnetic moment in the nucleus is random. When the magnetic moment is acted by the torque, it will rotate around the applied magnetic field, and its rotational frequency satisfies the following Larmor equation. ω0 = λB0

(2)

In the upper Eq. (2), ω0 is the precession frequency of external magnetic field and B0 is the intensity of magnetic field.

1100

L. Li

The macroscopic magnetization of the nuclear magnetic field is consistent with the direction of the applied magnetic field, and the whole system is in the equilibrium state of the magnetic field.

3.2 Detection of Free Attenuation of Signal The frequency pulse with frequency of ω0 can be used to detect the precession signal in the element nucleus, and the overall macroscopic magnetization of the frequency pulse type reaches a value, which is the degree of the relative static magnetic field and the original right angle of the magnetic field. If the external magnetic field is over, the original nucleus will also be subjected to a stationary magnetic field and will rotate with its action. When the detected coil is placed on the vertical plane of the original magnetic field, the relationship between the magnetic components corresponding to the rotating coordinates derived by Bloch can be described by the following formula. Mx = M y = M0 exp(−t/T2 )

(3)

Mz = M0 exp(−t/T1 )

(4)

In the upper Eqs. (3) and (4), Mx , M y is regarded as the component of M0 on the horizontal plane, that is, the transverse component. Mz is the component of the Z axis perpendicular to the horizontal plane, that is, the longitudinal component. T2 , T1 is the time required for the decay of the whole nucleus.

4 Instrument Signals Processing Based on Compressed Sensing The analysis shows that the core of compressed sensing is signal sparse transform. In order to make the coefficients more sparse, we transform the signal to the wavelet. In the process of decomposition, the coefficient of the signal coefficient does not have a positive correlation with the decomposition coefficient, so the wavelet packet decomposition series need to be determined when the wavelet signal is decomposed. In order to satisfy the signal to noise ratio in the signal receiving process, the free induction signal is used in the actual process of information processing. This signal is the pulse sequence obtained with the time interval T, and it is called the pulse sequence of GPMG, thus a series of CPMG spin echoes are obtained. These echoes can be obtained by magnetic resonance (MR) instruments and appear on the log records for the display of the obtained spin echo strings, and a certain regular

Signal Interpretation of Magnetic Resonance Technology …

FI

1101

Echo amplitude enveTE

2 90°

18

6

4 18

18

8

t

18

Fig. 2 The trend diagram of the pulse sequence

array of data is presented for subsequent analysis and processing. The trend diagram of the pulse sequence is roughly shown in Fig. 2.

5 Conclusion Compared with the transmission of some broadband information, the use of a specific feature structure can increase the degree of freedom in the signal transmission process, and give more detailed description of the signal that can be used. If the specific signal in the transmission process is very sparse, the linear structure can be reconstructed. By analyzing the basic principle of MR, this paper uses the compression sensing method to explain the signal of the instrument and detects the free attenuation of the signal, and the simulation results are good. With the introduction of the compression theory and the pioneering application in the field of data acquisition, the theory of compressed sensing is applied to the field of broadband detection, which is a good solution to the defects of the ADC sampling frequency of the hardware. On the basis of compressed sensing theory, the analysis of the collected signals is used to determine its structural characteristics. According to the detection mode of dynamic spectrum, the corresponding state of the related spectrum is evaluated without response to the initial signal, so that it satisfies the probability constraint conditions used in the detection of the spectrum state. Thus, a reliable solution for wide common detection is obtained by improving the scope of application of the spectrum monitoring belt.

References 1. Ahmad, K., Hassan, F.: Radial-basis-function-based nuclear magnetic resonance heavy oil viscosity prediction model for a Kuwait viscous oil field. Interpretation 4(2), 81–92 (2016)

1102

L. Li

2. Feng, Q., Zongbin, H.E.: Development and application of CIFLog-CMR nuclear magnetic resonance data processing and interpretation software. Well Logging Technol. 37(5), 513–524 (2013) 3. Baidyk, T., Kussul, E.: Flat image recognition in the process of microdevice assembly. Patt. Recogn. Lett. 25(1), 107–117 (2014) 4. Pantazis, D., Joshi, A.: Comparison of landmark-based and automatic methods for cortical surface registration. Neuro Image 49(3), 2479–2493 (2010) 5. Satoshi, I., Hirotoshi, A., Yoshifumi, Y.: Compressed sensing in magnetic resonance imaging using the multi-step Fresnel domain band split transformation. Magn Reson Med Sci 11(4), 243 (2012) 6. Nicholas, A., Pickersgill, A., et al.: Accuracy and variability of prostate multiparametric magnetic resonance imaging interpretation using the prostate imaging reporting and data system: a blinded comparison of radiologists. Eur. Urol. Focus. 6(2), 267–272 (2020) 7. Mallio, C.A., Lo Vullo, G., Messina, L., et al.: Increased T1 signal intensity of the anterior pituitary gland on unenhanced magnetic resonance images after chronic exposure to gadodiamide. Invest. Radiol. 73(55), 211–223 (2020) 8. Morales, C., Suril, et al.: Test-retest reliability of functional magnetic resonance imaging activation for a vergence eye movement task. Neuroence Bull. 36(05), 58–70 (2020) 9. Stern, C., Bouaicha, S., Grande, F.D., et al.: Postoperative MR imaging in shoulder instability and intra-articular damage. Magn. Reson. Imaging Clin. N. Am. 28(2), 88–96 (2020) 10. Ouellette, R., Mangeat, G., Polyak, I., et al.: Validation of rapid magnetic resonance myelin imaging in multiple sclerosis. Ann. Neurol. 87(5), 351–369 (2020)

Modeling and Simulation of Neutral Grounding Operation Mode of 10 kV System Beibei Song

Abstract To judge system performance of a power network, the neutral point grounding method is a very important one of various contrast factors, and it reflects the voltage level. During the period around 1980, the capacity of my country’s power network increased significantly and progressed rapidly. Especially after a large number of cables were put into use, a grounding method adopted by more peoplegrounding through the neutral point of the arc suppression coil, successively Used in many large cities in my country. This paper is discussing the more effective operation mode of the medium and low voltage power network. The arc overvoltage of the system operating in different grounding modes is explained theoretically. Realize the arc suppression coil to automatically compensate the short-circuit current to ensure that the system is reliable and runs as required. In view of the incomplete reliability of resonance grounding, the neutral point parallel resistance grounding method is proposed, and simulates it in the Simulink simulation software of MATLAB.so that the line can be correctly selected and tripped in the case of a permanent fault, so that the fault can be treated positively. Keywords Grounding method · 10kv power distribution network · Simulation optimization · Arc suppression coil

1 Introduction One of the main characteristics of the 10 kv power distribution network is that the user has a large load, a wide range of energy sources, and the user is likely to be interfered by large power signals. Therefore, in order to ensure the safety and reliability of power supply and complete a safe, fast and reliable power supply system, in the 10 kv power supply network [1].

B. Song (B) Energy Power, Shanghai Dianji University, Shanghai, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_136

1103

1104

B. Song

The correct choice of neutral point grounding can be realized, and the power distribution network can be found and resolved. Malfunctions and operational problems. In summary, a reasonable solution to the neutral point grounding problem is very critical and of far-reaching significance [2]. However, there are many areas for improvement in this article, and the accuracy of line selection needs to be improved [3].

2 Analysis on the Operation Mode of Neutral Point Grounding Through Arc Suppression Coil When the grounding current of the grounding system capacitor has exceeded a certain value, the neutral point ungrounded system will be prone to some problems [6]. Therefore, a grounding method that uses the neutral point to pass through the ground arc suppression inductance coil has appeared in the world [4]. Generally, a neutral point is used to form an inductance coil grounding method through the earth arc suppression like Fig. 1. The basic principle is as shown in the figure, that is, a neutral point inductance coil is connected between the neutral point of the capacitor and the earth. Compared with the current traditional direct neutral point without thermal grounding, the neutral point is grounded by a coil after thermal arc suppression [5]. Although it may require users to spend a lot of time and manpower investment in technology, it is effectively guarantees the stability of the system and the safety of power supply, and improves the safety and reliability of the DC power supply of the power supply system. The simulation diagram is shown in Fig. 2.

3 Automatic Tracking Compensation Arc Suppression Coil Type When a permanent single-phase grounding transformer fault occurs in my country’s power transmission network system, the rise of the damping resistance can be automatically withdrawn by the controller to effectively prevent its damage [7, 8]. The Fig. 1 The neutral point is grounded through the arc suppression coil

Modeling and Simulation of Neutral Grounding Operation Mode …

1105

Fig. 2 Simulation model of double circuit transmission line grounded by arc suppression coil in 10 kv power network

principle and wiring structure diagram of the arc suppression coil of the adjustable distance arc suppression coil automatic tuning device is shown in Fig. 3. The automatic tuning device consists of the adjustable distance z-type single-phase grounding transformer, the arc suppression coil, and the automatic tuning device controller [9]. Damping resistance box, control panel and other parts. Fig. 3 Schematic diagram of principle wiring diagram of load-regulating automatic tuning arc suppression coil

1106

B. Song

4 Modeling of Automatic Tracking Compensation Arc Suppression Coil Circuit The entire system is designed as a 115/10 kv substation, and the power network frequency is 50 Hz. He has a total of two output overhead lines, using the calculation and modeling of distributed parameters, and the system transformer is designed in a star-delta connection [10–12]. Among them, the low-voltage side is connected to the neutral point and ground via an arc suppression coil [13]. A phase single-phase grounding fault occurs 0.02 s after the line starts running, the grounding transition resistance is set to 0.001 , and the arc suppression coil inductance is 0.7 h. The rated voltage on the load side is 11 kv, the rated frequency is 50hz, the active power is 7 10 w, and the inductive and capacitive reactive power are both 100var. The parameter distribution of load segment line is shown in the Table 1. The length of each outgoing line in the segment is 10 km, and the transmission line of the bus-side transmission line is 20 km long. The specific parameters are shown in Table 2. The transformer parameter distribution is shown in Table 3. Table 1 Parameter distribution table of line 1, 2, 3 Parameter distribution after Resistance(Ohms/km) Inductance(mH/km) Capacitance(µF/km) segmentation Positive order

0.631

0.086

0.788

Zero sequence

0.284

0.465

0.985

Table 2 Parameter distribution table of bus Bus side parameter distribution

Resistance(Ohms/km)

Inductance(mH/km)

Capacitance(µF/km)

Positive order

0.01273

0.8737

0.023

Zero sequence

0.3964

4.0964

0.008

Table 3 Transformer parameter distribution table Primary and secondary side parameters

Voltage

Resistance(Ohm)

Inductance(H)

Primary side

115kv

2.18

0.27

Secondary side

11kv

0.007

0.00089

Modeling and Simulation of Neutral Grounding Operation Mode …

1107

5 Proposal of the Parallel Arc Suppression Coil with Low Resistance Ground In recent years, with the rapid advancement and development of urbanization and my country’s urban power distribution industry, the structure of the urban power distribution transmission network has changed greatly, and the proportion of cables in the transmission line of the urban feeder transmission line is increasing [14]. Some technical problems of forming a coil as a grounding transmission method through arc suppression are gradually exposed. With the rapid increase of the ground current of the power distribution network capacitance, it is difficult to completely guarantee the reliable and normal operation of the entire arc suppression coil. So a new type of circuit that can solve some of the above problems came into being [15, 16]. From the comparison of Figs. 4 and 5, it can be seen that the zero sequence current flowing through the fault line 2 after the arc suppression coil is grounded in parallel with a small resistance is significantly greater than the current of the fault Fig. 4 Before parallel resistance

Fig. 5 After parallel resistance

1108

B. Song

phase through the arc suppression coil grounding method. And the current of fault phase 2 is much larger than that of fault phase 1, but the current is always in A unit. This just confirms the theoretical analysis above, so the fault line can be correctly selected in the next step. It is reasonable and evidenced to prove the superiority and advancement of the neutral point via the arc suppression coil in parallel with small resistance in the selection of small current grounding fault lines.

6 Conclusions Combining the advantages and disadvantages of actual production and operation, a thorough analysis of the power supply and distribution system was carried out, and the 10 kv system was grounded through the arc suppression coil. Based on the analysis and comparison, it is concluded that the neutral point is not grounded because of its simple structure and is suitable for lower amplitude power networks, but the non-fault phase is greatly affected during a fault and is not adopted. The low resistance grounding method can effectively limit the overvoltage at the mains frequency, but it makes the power supply unreliable. Due to my limited ability and limited time, the research content is relatively simple. The application principles of automatic tracking compensation arc suppression coil, voltage changes caused by various resonances, maintenance and economic safety issues are not involved, so I still have a lot of knowledge to learn.

References 1. Griffe1, D., Hammand, Y.: A new deal for safety and quality on MV networks. IEEE Trans. Power Deliv. 12(4) (1997) 2. Givelberg, M., Lysenko, E., Zelichonok, R.: Zero sequence directional earth-fault protection with improved characteristics for compensated distribution networks. Electr. Power Syst. Res. 52(3), 217–222 (1999) 3. Hanninen, S.: A method for detection and location of high resistance earth fault. 1998 International Conference on Energy Management and Power Delivery. Singa Pore, 3 (1998) 4. Chaari, O., Bastard, P.: Prony’s method: an effect tool for the analysis of earth fault current sin petersen-coil-protected network. IEEE Trans. Power Deliv. 10(3), 1234–1241 (1995) 5. Taiwai, D.C., Yibin, X.: A novel technique for high impedance fault identification. IEEE Trans. Power Deliv. 13(3), 738–744 (1998) 6. Dunki-Jacobs, J.R.: The historical development of neutral-grounding practices. IEEE Indus. Appl. Mag. March, April, 3(2), 0–20 (1997) 7. Gohobar, V.N., Khedkar, M.K.: Faults locations in automated distribution system. Electr. Power Syst. Res. 75, 51–55 (2005) 8. Paul, L. D., Venugopalan, S.I.: Low-resistance grounding method for medium voltage power systems. Industry Applications Society Annual Meeting, 1991. Conference Record of the 1991. IEEE, 28 Sept 4–Oct 1991 9. OldfieldT Lang, J.V.: The long term planning of electrical power distribution systems. Proc IEEE PICA Conf, pp. 134–145 (1965)

Modeling and Simulation of Neutral Grounding Operation Mode …

1109

10. R VillasanaL L Graver.: Transmission network planning using lingcarprogramming. IEEE Transmission on Powre Apparatus and Systems, PAS-1041985:687–743 11. EC YehHahn Tram: Information integration in computerized distribution system planning IEEE Transactions on Power. System 12(2), 58–61 (1997) 12. Fawzi, T.H., El-Sobki, S.M.: A new planning model for distribution systems. LeeeTtans PAS 102(9), 3010–3017 (1983) 13. Converti, V., Ender, R., Gangel, M., et al.: Optimized distribution and sub-transmission planning by digital computer, part I. System philosophy. IEEE Trans, PAS-83, 422–631 (1964) 14. Willis, H.L., Tram, H., Engel, M.V., et al.: Optimizarions to power distribution. IEEE Comput. Appl. Power 8(4), 25–31 (1995) 15. Aoki, K., Nata, K., et al.: New approsimate optimization method for distribution system planning. IEEE Trans, PWRS-5, 126–132 (1990) 16. MAEl-Kady. Computer aided planning of distribution substation and primary fccder, IEEE Trans, PAS-103, 1986–2037 (1984)

Development and Change of Computer Science and Technology in Big Data Time Jian Huang and Zichen Bai

Abstract The development of information technology and Internet technology is also very rapid, which also promotes the data to move towards big data time In the development of the big data era, information data is also facing greater challenges, which also brings tremendous impact on information processing. How to face the needs of the society for the big data time, improve the speed and capacity of the computer, adopt new technology, and deal with massive data, are the problems faced by the current computer technicians. Keywords Big data time · The capacity of computer · New technology In recent years, big data development is very rapid, It also needs for the processing ability of the computer. However, in the actual computer processing, due to many technical defects. We can see that technology development will not only limit it’s expanding [1, 2]. The following is a detailed analysis and discussion of Computer processing data, in order to achieve a more long-term development of the computer industry.

1 What is the Big Data Age? Social development has also ushered in another major change. The appear of big data will lead us to a new situation, which can change social development and people’s living habits. In big data time, the consumers and netizens is blurred. As the basis and core of social development, data, supported by new technology, especially in information processing, will be more regional networked and intelligent [3–5]. Of course, the influence of it, the competition in the market is becoming more and more fierce. If enterprises want to take the lead in the market, they must master and use the J. Huang (B) · Z. Bai XiJing University, Xi’an 710123, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_137

1111

1112

J. Huang and Z. Bai

big data technology skillfully, and really integrate into the big data era. However, the economic development of society in big data time is still facing many challenges, we need to constantly improve the technical level. Therefore, if the computer industry wants to achieve better development, it must comply with the needs of the big data era and actively carry out technological innovation, so as to meet people’s needs of life and work, improve the quality of computer application.

2 Summarize Its Advantages and Disadvantages Through the computer and other related knowledge for data collection, processing, processing, etc., to manage a variety of data, including data structure organization, data query, modification, etc. Including network, computer, sensor and other disciplines. In addition, data processing ability especially the growth of artificial intelligence and cloud computing, they integrate with each other, learn from each other, and promote each other, improve the processing ability of computer to massive data to a new level, promote the social field of our country to a new direction of development, and further promote the computer industry’s longer-term development and progress [6, 7]. Computer processing data will also face enormous risks. On the back of the progress of the times, we will meet many challenges. Among them, it will face the greatest risk, such as computer viruses, malicious pirated software, making computer information processing face many security risks. Moreover, these are only one of the problems faced by us. There are still some related problems such as pseudonym replacement and tampering with information data. Many new network technologies have emerged, which can effectively solve some tedious problems and improve people’s work efficiency [8–10]. Especially under the premise of increasingly close network communication and communication, which leads to the bound of the authenticity of network information and not only increases the difficulty of information search. It also makes it impossible for people to get real information quickly. Therefore, it is very important to improve the Computer processing data, which is the necessary prerequisite to ensure the development of computers [11–14].

3 Analysis of the Problem It’s also facing many challenges, including many problems, which affect the stable development. we should actively study the technology level in an all-round way. The following main points are analyzed, and the specific analysis is as follows. Information acquisition has a direct impact on the institutions. The above mentioned shortcomings of the problem include above [15]. Security has always been the key point of computer information processing. On the basis of ensuring the effectiveness of data information processing, we should also ensure it’s security. Data security is of great importance, which is also one of the

Development and Change of Computer Science and Technology …

1113

key technologies. users experience the advantages brought by the era of it, but at the same time, Information security and privacy have always been the focus of attention around the world. In the face of the influence, a large number of professional and technical personnel should be introduced to increase the security technology, more advanced security [16–19].

3.1 Information Collection and Processing Information collection and processing technology is one of the key issues of computer database technology, with the rapid development of society and the continuous growth of population base. Data management and processing will become very large and complex, the current processing technology has been unable to meet the requirements of social development for technology. In order to respond to and meet the requirements of social development for data processing, new technologies are urgently needed to improve computer processing capacity. New technologies are urgently needed for data acquisition, storage and processing, and data security is also one of the issues that should be paid attention to. The following points can be used to improve the computer’s ability to process data. First of all, try to improve the speed and capacity of computer hardware, especially the processing capacity of CPU, and use distributed computing as much as possible to decompose the data. And increase the capacity of memory, and read and write memory, is the bottleneck problem to be solved by computer. DMA, channel and other technologies can be used to improve the computer’s ability to process batch data and realize high-speed and large-scale data processing [20–23]. Secondly, research new algorithms, especially for data retrieval and query, to improve the speed of data query as much as possible, and mine useful data from it. And it can realize the intelligent analysis and processing of data, and use the new achievements of artificial intelligence research to process complex data as much as possible.

3.2 Data Security Data security and confidentiality is also one of the issues to be considered at present, especially in recent years, the United States’ crackdown on Chinese enterprises, especially data security technology is very important. To achieve data security, we can start from the following aspects: First of all, strengthen the monitoring and management of network security, especially the security management of switch data exchange, as well as the data security management of mobile network. To prevent hacker’s invasion, domestic equipment

1114

J. Huang and Z. Bai

should be used as far as possible for key equipment. Huawei, in particular, tries to use domestic switches. In addition, every Chinese company, as far as possible, pays attention to safety in the process of product manufacturing and processing. Not only from the hardware aspect, but also to strengthen the research of software encryption technology. Especially in the recent research of quantum communication technology, the latest research results will be applied to national production as soon as possible.

3.3 Information Storage Information storage is one of the key issues that big data should pay attention to. Information storage technology can be considered from the following aspects: First of all, improve the storage speed and capacity of computer hardware. The reading and writing speed of computer memory is much slower than that of CPU. Therefore, it is necessary to improve the capacity and speed of computer memory chip as soon as possible, especially the improvement and improvement of SRAM, DRAM and other storage manufacturing processes. Secondly, strengthen the research of data processing algorithm. Data storage should adopt reasonable data structure to organize and process data, adopt simple data type as far as possible, and strengthen the management of data.

3.4 Information Processing Data processing is a huge and complex project, we should try our best to improve the speed of data retrieval, use new algorithms to find the relationship between data, improve the ability of data mining, from which we can find useful information.

4 Summary We mainly solve the analysis the problem in the new situation. Through the research of this paper, we know that in the development of the current era of big data, Computer processing data is also facing many challenges. Moreover, computer has penetrated into all areas of society, and has produced for people’s lives and production. Therefore, effective measures should be taken. In the above analysis, the author mainly focuses on what is big data time and puts forward relevant technical measures, hoping that through the analysis of this paper, it can arouse the attention of relevant technical personnel.

Development and Change of Computer Science and Technology …

1115

References 1. Dongxu, G.: Analysis of computer processing data in the background of big data era. Netw Secur. Technol. Appl. 01, 19–21 (2014) 2. Guleng, S.: Analysis of Computer processing data in the Age of Big Data. Electron. Technol. Softw. Eng. 01, 203 (2014) 3. Qian, H., Zengchuan, Z.J.: Analysis of computer processing data in big data era. Wireless Interconnection Technol. (12), 147 (2014) 4. Han, C.: Hidden dangers and preventive measures of personal electronic information security in the context of big data. Inf. Comput. (Theoretical Edition), (21), 185–186 (2018) 5. Suhua, L.: Research on the regulation of citizen’s data information security in big data time. Res. Rule Law 6, 57–65 (2018) 6. Jiangyao, Li.: Deep analysis of computer software technology in big data time. China’s Strateg. Emerg. Ind. 4, 21 (2018) 7. Hui, Y., Zhigang, D., Shuquan, Z., Zhuo, H.: Design and implementation of a service-oriented Internet of things middleware. Comput. Appl. Softw. 5, 65–67 (2013) 8. Dongmei, L.: Network security countermeasures in the era of big data. Digital Technol. Appl. 4, 202–202 (2019) 9. Niu, X.: Computer network security and preventive measures in the era of big data. Digit. Commun. World, (4), 264–264 (2019) 10. Lihua, Z.: Computer network security and preventive measures in the era of big data. Netw Secur. Technol. Appl. 6, 49–50 (2019) 11. Geng, D.: Analysis of computer information processing technology under the background of big data era. Netw. Secur. Technol. Appl. (01), 19 + 21 (2014) 12. Si, R.: Analysis of computer information processing technology in the era of big data. Electron. Technol. Softw. Eng. (01), 203 (2014) 13. Qian, He., Chuan, Z., Jinbang, Z.: Analysis of computer information processing technology in the era of big data. Wireless Internet Technol. 12, 147 (2014) 14. Changping, Hu.: On the theoretical development basis of information user research [J]. Inf. Sci. 9(4), 302–309 (1990) 15. Mikhailov, A.M.M., et al.: Scientific communication and Information Science. Xu Xin Wang, et al. Trans. Beijing, Science and Technology Literature Press, pp. 30–35 (1980) 16. Feicheng, M., EnMei, S.: The historical evolution and research progress of information science. Adv. Inf. Sci.. Wuhan, Wuhan University Press, pp. 3–5 (2007) 17. Wang, C., Hu, C.: On the theoretical research of contemporary information science. Inf. Sci. Newspaper 7(3), 171–177 (1988) 18. Changping, Hu.: On the theoretical research of information science in the network age. Knowl. Lib. Inf. Knowl. 2, 9–13 (1997) 19. Hu, C., Xu, Y.: Research and development orientation of information science from the international perspective. Intell. Theory Pract. 40(3), 143–144118 (2017) 20. BERNSENNO. Multimodality theory / /Multimodal User Interfaces, Signals and Communication Technologies. Heidelberg, Springer, pp. 5–29 (2008) 21. Alemu, E.N., Huang, J.: Health Aid: extracting domain targe-ted high precision procedural knowledge from on-line communi-ties. Inf. Process. Manage. 57(6), 102299 (2020) 22. Bandaragoda, T., de Silva, D., Alahakoon, D., et al.: Text mining for personalized knowledge extraction from online support groups. J. Assoc. Inf. Sci. Technol. 69(12), 1446–1459 (2018) 23. Shukla, N., Tiwari, M.K., Beydoun, G.: Next generation smart manufacturing and service systems using big data analytics. Comput. Ind. Eng. 128(2), 905–910 (2019)

Algorithm Design of Computer Aided Traditional Art Pattern Design Lin Pan

Abstract With the rapid development of society and the continuous improvement of science and technology, art scholars in the process of artistic creation form more and more changeable, at the same time, the definition of art has also been further expanded, so in this development situation, the computer has been more and more widely used, showing an irreplaceable important position in the art field. “Computer design” is a new interdisciplinary subject, which integrates traditional art design and computer design well. It can be said that the development of computer technology is not only the development trend of future technology, but also in line with the goal setting of art. Keyword Computer · Art · Tradition · Design

1 Traditional Art Design and Computer Art Design With the development of computer technology and the gradual popularization of Internet, the corresponding design industry has also been a certain form of innovation and development. Modern design is closely related to people’s life, which adapts to the practical needs of the development of market economy. Compared with traditional art design, computer design promotes the formation and development of a series of related industries of visual design, which is closely related to people’s life. From high-rise buildings to small clothing department stores, they are not as monotonous as in the planned economy of the last century. Instead, in a new stage of development, a design detail can determine their success or failure. Computer art design through the use of innovative tools for creative means of art design, on the basis of traditional art design, with the development of computer technology and constantly improve [1]. In the new century, computer graphics processing technology has been unprecedentedly developed, and a series of related industries with computer as the main body for visual design have been formed. Computer art design is born from it. It is a kind of L. Pan (B) Shanghai Publish And Print College, Shanghai 200093, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_138

1117

1118

L. Pan

art design which uses new tools as the means of creation. It develops continuously with the development of computer technology on the basis of traditional art design Multi objective optimization based on ant colony algorithm.

2 The Basic Position of Traditional Art Design Art design includes art theory, art skills and aesthetics. The task of art theory and skill education mainly focuses on the training of basic art knowledge and skills. Through the study of art history and art creation, students’ aesthetic ability is cultivated. Traditional art design can enable students to have a certain degree of cultural cultivation and good aesthetic and appreciation ability, as well as the ability to appreciate, identify and grasp the form of beauty in nature (scenery, characters and works of Art). The main body of design and creation will form a visual art creation process through certain design and materialization through aesthetic understanding in real life. An excellent designer should have a high level of art appreciation, solid art foundation, good artistic qualification and creative design thinking. Therefore, the cultivation of artistic accomplishment and the mastery of basic art skills play an important role in the development of art design.

3 Characteristics and Advantages of Computer Art Design 3.1 Powerful Design Function In the field of art design, computer is an advanced design tool, which has the advantages of sound and picture, large amount of information storage, convenient display, vivid and vivid images, dynamic effect, which is hard to be achieved by traditional art design [2]. At the same time, computer art design has the function of convenient modification. The wide application of computer has reformed and innovated all aspects of people’s life and work, so that it can not only be achieved by traditional design, but also is particularly convenient to modify. As an advanced production tool, computer is widely used in human production and life. It has played an important role in various fields and effectively improved the production efficiency. Computer art design has left more time for designers, and effectively expanded the imagination space, from graphic design to three-dimensional design, network animation design and film and television production.

Algorithm Design of Computer Aided Traditional Art Pattern Design

1119

3.2 An Algorithm of Pattern Filling Area in Computer Art Design Implementation of PFA algorithm As shown in Fig. 1, the filled image p is a rectangular area, the length and width of which are respectively: x = x2 − x1 + 1

(1)

y = y2 − y1 + 1

(2)

Then P consists of xy points. We use a two-dimensional array w to store the color number of each point of P. starting from the lower left corner of image p, we store the color number of each point in array W from left to right to bottom and up. The relationship between the elements of the array and the image p is as follows: w(i, j) → (x1 + i, y1 + j)

(3)

0 ≤ i ≤ x − 1

(4)

0 ≤ j ≤ y − 1

(5)

So far, we have established the corresponding relationship between each point of area D and the elements of color number array W. Note that the area we filled Fig. 1 Rectangular area

1120

L. Pan

is a rather than D. We only change the color number of the points in area a to the corresponding color number, and keep the original color of the points belonging to D. We use C language to program PFA algorithm on pc638 microcomputer, and apply it to the design of carpet napkin and decorative art pattern, which has good practical value. There are two explanations for this algorithm. The color number of each point of pattern P is read out and placed in a two-dimensional array. The purpose is to avoid repeating the color number of points and save time, but it increases the memory cost. The more points in P, the larger the memory occupied. From the actual needs, the area p is generally not large, and the memory of microcomputer is fully enough [3]. As for the selection of area D, it is required to select as small as possible on the premise of meeting the requirement of including filled area A. This is because each point of area D needs to be judged whether it is a point of area A. the larger the selected area D, the longer the filling time.

3.3 Rich and Diverse Art Design Software The diversity of computer art design is also reflected in the richness and diversity of art design software to a certain extent. For example, advertising graphic design software such as Photoshop, CorelDRAW and Google Picasa can realize the design of photos, logo signs, advertisements and pictures, and increase the effect processing of pictures. Construction drawing design, such as AutoCAD, 3DMAX, indoor and outdoor decoration design effect, etc. The mature art design software provides perfect adjustment and design scheme for art design. Through the adjustment of color, brightness, contrast and other pictures, the rapid modification of art works can be realized without the need of redrawing and coloring. The editing operation mode of computer has realized the transcendence and development of traditional art design. In the traditional art design, it is easy to cause the whole work to be scrapped due to a little mistake, while the computer art design can effectively avoid waste manuscripts and save the designer’s time and energy.

3.4 Design Materials for Mass Storage With the development and popularization of computer technology and Internet, a platform for sharing information resources has been established. The characteristics of computer network informatization and mass storage make it easy for art designers to obtain materials. At the same time, it can also realize the effect that traditional art design can not achieve through computer art design, and apply the previous creation design to new creation. Computer for art design works can be mass storage and network information, so that the publication of works, dissemination has a significant advantage. At the same time, computer art design also promotes the rapid

Algorithm Design of Computer Aided Traditional Art Pattern Design

1121

development of the whole art design industry, and establishes a platform for mutual exchange and communication between art designers.

4 The Relationship Between Computer Art Design and Traditional Art Design Although the development of computer technology design has brought great changes to the art industry, the core of computer art design is still art design. The development of art design mainly lies in the features of design works such as functionality, artistry and cultural taste. Therefore, art designers are required to have good artistic aesthetic ability and innovative thinking, so as to continuously annotate the cultural details for the design and development of art works. Excellent art designers should not only master the operation skills of art design software, but also have a good foundation of art design [4]. It is difficult to create art works with artistic aesthetics only with computer operation but without the basis of traditional art design. In order to create high-quality art works, we should effectively combine computer art design with traditional art design. In fact, we have formed a design mode based on traditional art design works and computer art design as means. The stronger the designer’s aesthetic ability and artistic accomplishment are, the higher the quality of the works designed by art designers will be, So as to be recognized and welcomed by the public.

5 Conclusion Computer art design is the product of the combination of traditional art design and computer image processing technology, which greatly reduces the workload of art design and expands the creative space. Therefore, it puts forward higher requirements for the creative ability of art design lion. It has become an indispensable tool for art designers, it is the trend of the development of the times. At the same time, we should cultivate good aesthetic ability and artistic creativity.

References 1. Lili, Xu., Yuan, Z.: Design and implementation of remote sensing monitoring system for resources and environment based on lidar technology [J]. J. Lasers 41(08), 54–58 (2020) 2. Chang, L., Huixin, Z., Qingqing, P., Fanyi, M.: Design of high speed optical fiber video image transmission module based on embedded system [J]. Electron. Devices 43(04), 882–887 (2020) 3. Hu, B., Ming, B.: Design and application of automatic test system for optical transmission equipment [J]. Decis. Making Explor. (middle), (08), 52 (2020) 4. Liang, Hu., Bo, W.: Design of 10 GB / s SFP + optical module based on CWDM [J]. Commun. Technol. 53(08), 2064–2069 (2020)

Product Modeling Innovation Design Method Based on Evolutionary Algorithm Peng Cong

Abstract In the traditional product modeling design, the production of the scheme mainly depends on the designer’s creative thinking. The excellent designer needs to have a certain breadth and depth of knowledge structure, and the perceptual and rational thinking are relatively active. At present, with the rapid improvement of computer logic operation and graphics evolution ability, it is possible to enrich product form by using evolutionary technology. Based on this, in order to meet the diverse emotional needs of users and simulate the initial design and detailed design in the design thinking, a product modeling innovative design method based on cellular genetic algorithm and standard genetic algorithm is proposed. This study takes product modeling as the research goal. Firstly, the overall process of product modeling innovation design is proposed based on cognitive thinking and evolutionary algorithm; secondly, the relationship between product form, function and image is analyzed; secondly, the initial design process is simulated to establish the initial system of product modeling innovation design based on cellular genetic algorithm; Finally, the detailed design process is simulated, and the product modeling innovation design refinement system based on standard genetic algorithm is proposed. The case study of cartoon expression modeling is verified based on the evolutionary design system developed by MATLAB. The results show that the method of product modeling innovation design based on evolutionary algorithm is reliable. Keywords Product modeling · Innovative design · Cellular genetic algorithm · Standard genetic algorithm · Design thinking

1 Introduction With the advent of the third industrial revolution with big data as the background, material revolution as the support and 3D printing manufacturing as the carrier, industrial design has become one of the most promising sunrise industries in the P. Cong (B) Dalian Institute of Art and Design, Dalian 116600, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_139

1123

1124

P. Cong

twenty-first century. In the past product modeling design, the production of product modeling scheme mainly depends on the designer’s creative thinking. Designers need to use analysis and comprehensive thinking to seek new schemes, and use evaluation thinking to evaluate schemes. Good design requires designers to have a certain breadth and depth of knowledge structure, brain thinking to achieve the coexistence of perceptual and rational. The designer’s thinking defect in one aspect may lead to the defect of product modeling design [1]. In the modern product modeling design, the efficiency of product modeling design has been effectively improved by relying on the powerful logic operation ability and graphic evolution ability of computer, which greatly enriches the form of product design, and makes it possible to make personalized customization. The change of service mode makes product modeling design in a state of crisis and opportunity, and makes product modeling design one of the most promising sunrise industries in the twenty-first century. With the development of economy and the coming of the era of product interactive experience, design has become an important part of modern service industry. For designers, how to efficiently enrich the shape of products and design products that can not only meet the functional requirements, but also meet the psychological needs of users, has become a very important topic.

2 Product Modeling Evolutionary Design Product modeling evolutionary design can use cognitive science, design thinking, design psychology and other theories to carry out intelligent design of product modeling, which belongs to a kind of product modeling design. Chen gathered the digital definition, analyzed the mapping relationship between perceptual image and product design elements, and established a CAD system based on the explicit characteristics of product modeling. Ishibuchi of Osaka perfection University in Japan studied the characteristics of elite strategy and established a cellular genetic algorithm model with double neighbor structure [2]. Xu Jiang analyzed the method of product modeling design, established a visual interface based on orthogonal interactive genetic algorithm, and pointed out that user interaction evaluation mechanism can reduce evaluation error. Through the animation toy modeling design experiment, Zhang Haining mined the emotional needs of users, and proposed an innovative design method based on genetic algorithm. Taking the small hatchback as an example, Jingchun summarized the process of automobile styling optimization design by combining genetic algorithm and interactive evaluation method. Su Jianning according to the needs of perceptual image and focusing on design cognition, product modeling design and information technology, product image modeling design system is established based on particle swarm optimization algorithm and ant colony algorithm respectively to optimize products. Based on this, this study proposes a new method of product modeling innovation design, which combines the simulation design thinking, cellular genetic algorithm and standard genetic algorithm, and provides a new idea for computer-aided product innovation design. Firstly,

Product Modeling Innovation Design Method …

1125

the representative samples are selected as the initial population and mapped into the regular quadrilateral grid. The neighbors of cells are defined based on the quadrilateral grid, and each cell can only interact with its neighbors. Secondly, according to the update strategy, the cells in the grid are scanned and genetic operations are carried out to obtain the progeny cells. Third, the progeny cells with high fitness value were used to replace the central cells. Fourth, judge the termination condition. If the termination condition is not satisfied, the cycle will continue. If the termination condition is satisfied, the result will be output. Fifthly, based on the results of cellular genetic algorithm, a shape that can best reflect its needs is selected as the parent, and the mutation operation is carried out to generate a new individual, and the offspring individual is merged with the new individual to obtain the new species group. Sixthly, the new species group was operated by genetic operation, and the individuals contained in it were ranked according to the fitness value, and the individuals with high fitness function value were selected as the new species group. Seventh, judge whether the termination conditions are met. If the termination conditions are not met, continue the loop; otherwise, terminate the loop and output the results [3, 4].

2.1 Cluster Analysis Cluster analysis is an exploratory statistical analysis technology aiming at the problems of samples, concepts or indicators. It mainly classifies related things reasonably according to the characteristics and laws of samples themselves. Sample clustering analysis takes similarity as the classification principle. Through comparison, analysis, induction and summary, the samples with greater similarity are clustered into one category, and the samples with great differences are classified into different categories. Sample clustering analysis mainly includes direct clustering method and distance clustering method, and distance clustering method is divided into shortest clustering method and farthest distance clustering method. The calculation method of cluster analysis is as follows:

dab

  M  = (yab − ybm )2

(1)

m−1

where, formula (1) dab represents the distance between sample a and sample b in the azimuth factor.

3 Theory of Cellular Genetic Algorithm Cellular genetic algorithm (CGA) [i62] is an evolutionary computing method combining cellular automata and genetic algorithm. By introducing cellular automata

1126

P. Cong

into genetic algorithm, the evolution rules of cellular automata are used to replace the traditional crossover mechanism in genetic algorithm. Cellular genetic algorithm inherits the advantages of genetic algorithm, such as wide adaptability, parallelism and expansibility. It not only improves the shortcomings of other traditional optimization methods, such as low efficiency and premature convergence, but also strengthens its ability to solve various optimization problems. It is considered as an effective method to solve a series of complex problems. Cellular automata was first proposed by John von Neumann when simulating cells in 1950. It is the core of cellular genetic algorithm. It is also a dynamic model with discrete time, space and state. It is composed of four basic parts: cell, cell space, neighbor and evolution rule: A = (L d , S, N , f )

(2)

where A is cellular automata; L d is cellular space, D is the dimension of cellular space; S is the set of cellular states; N is the neighborhood structure of a cell; f is the local transition function of the cell center and its neighbor states. In cellular genetic algorithm, the genetic operations among different fields can be affected by the setting of update strategy. In this study, a linear scan update strategy is used to perform cell operations with the central cell and its neighbors as the unit, as shown in Fig. 1. Fig. 1 Linear scanning

Product Modeling Innovation Design Method …

1127

4 Innovative Refinement Design of Product Modeling Based on Standard Genetic Algorithm The detailed design process of product modeling innovation refers to the convergence of multiple design schemes into the optimal design scheme. Firstly, the evaluation principle is established according to the user’s needs, and then the relationship between the evaluation principle and the design scheme is taken as the constraint to determine the design direction, and the excellent design scheme is retained until the final design scheme is formed. Based on this, this study proposed the simulation design thinking, combined with the standard genetic algorithm for product modeling innovation refinement design, in order to meet the specific emotional and practical functional needs of personalized users.

4.1 Standard Genetic Algorithm Professor John Holland borrowed the survival principle of natural selection of the fittest in the biological world, and introduced the mechanism of biological evolution and natural selection into the evolutionary system to form genetic algorithm, which has been applied in many fields. Based on the research of user’s tacit knowledge, the integration model of user knowledge and design knowledge is established, and the theory of product conceptual design based on integrated knowledge is proposed; Based on product semantics, through gene coding and constructing product shape fitness function, the product modeling design scheme is optimized; a hybrid coevolutionary product family optimization design method is proposed, and based on this method, the two-dimensional chromatin expression of multi platform product family design space is studied; A multi-objective cellular genetic algorithm based on decomposition strategy is proposed. The algorithm applies neighbor topology to its population, and each cell can only interact with its neighbors.

4.2 The Convergence of Genetic Algorithm Divergent thinking and convergent thinking are complementary in thinking mode and process, and genetic algorithm has better convergence. Therefore, based on the characteristics of convergence and convergence thinking of genetic algorithm, product modeling innovation design is studied. The global convergence of genetic algorithm is defined as follows:  Zt = max f (

(t) K

 (i)) : K = 1, 2, · · · , n

(3)

1128

P. Cong

When the random variable sequence Z reaches the best fitness in the time step state, if and only if lim P [Z t = f ∗ ] = 1, the genetic algorithm converges to the i→∞

optimal individual set. Among them, f ∗ = max{ f (b)|b ∈ I B l }, to ensure that the genetic algorithm finally converges to the optimal solution set.

5 Conclusions Determine product samples according to user requirements. After eliminating the similar and unreasonable samples, the reference samples were determined by SD questionnaire survey and cluster analysis, and then the evaluation values of samples were obtained through designer focus and quantitative analysis to determine the representative product samples; Using morphological analysis method to decompose product design elements, and its qualitative description and parameterization, to provide the basis for product modeling innovation design. Based on the corresponding relationship among design process, design thinking mode, design strategy and cellular genetic algorithm, the initial design system of product modeling innovation can be established. In the initial design stage of product modeling, divergent thinking is the main method. The application of cellular genetic algorithm (CGA) to global optimization based on the central cell can simulate the design thinking of this stage, and can generate a large number of innovative design initial schemes with a small number of prototypes. Finally, the evolution results are verified by SD questionnaire. The experimental results show that the system can simulate the initial design thinking of product innovation design. Based on the corresponding relationship between design thinking and standard genetic algorithm, the detailed design system of product modeling innovation can be established. In the stage of product modeling refinement design, the convergence thinking is the main idea. First, the partheno genetic algorithm is used to obtain the initial population through mutation and merger, and then the standard genetic algorithm is used to inherit the characteristics of the parent generation. The evolutionary design system can simulate the design idea of this stage and quickly generate satisfactory detailed design scheme; Finally, this example is applied to the innovative design of cartoon expression derivatives. The post it notes can be pasted in dictionaries, notebooks, tea cups, classrooms, desks, etc. Through the user survey and analysis, it is generally praised. From the case results, the cartoon expression modeling innovative design system developed in this paper has a certain practical value, and can be widely applied in many fields. Therefore, this study lays a theoretical foundation for the establishment of a practical computer-aided product modeling innovation system.

Product Modeling Innovation Design Method …

1129

References 1. Jie, L.: On the application of Maslow’s “hierarchy of needs” in landscape design [J]. Shanxi Architect. 39(14), 185–187 (2013) 2. Jianning, Su., Qinwei, Z., Shutao, Z., et al.: Research progress of product image modeling evolutionary design [J]. Mech. Des. 31(2), 97–102 (2014) 3. Li, F., Xiong, G., Tang, X.K., et al.: Development and analysis of design cognitive process research [J]. Comput. Eng. Appl. 47(20), 24–27 (2011) 4. Yanjian, W., Yan, Li., Wenqiang, Li., et al.: Endogenous product innovation design method with functional requirements and its implementation [J]. Comput. Integr. Manuf. Syst. 19(2), 235–243 (2013)

Optimization of Labor Value and Relationship Distribution Under the Blockchain Ding Yingying

Abstract With the advent of the era of weak artificial intelligence, material production and non-material production are fully automated. This emerging social reality means that the proposition that “all values come from human labor” in the classical labor value theory must be reconsidered. The author thinks that weak artificial intelligence should be regarded as a special laborer between people and things. Only in this way can we explain the problem of value creation in the era of weak artificial intelligence. From this point of view, it is an unreflected ideology to regard weak artificial intelligence as objects or tools, and its construction direction is the sustainable production mode combining capital principle and weak artificial intelligence. Therefore, only by emphasizing and establishing the laborer status of weak artificial intelligence can we effectively break the control of capital principle on social development mode and serve the purpose of human free development with the powerful production capacity of weak artificial intelligence. Keywords Weak artificial intelligence · Labor · Capital principle

1 Introduction of Weak Artificial Intelligence The evolution of artificial intelligence technology can be divided into two stages: weak artificial intelligence and strong artificial intelligence: weak artificial intelligence refers to that artificial intelligence has not yet reached the level of human intelligence, so it can not act without human management; strong artificial intelligence refers to that artificial intelligence has reached the level of human intelligence and can set goals and solve problems independently like human beings. The current artificial intelligence technology, in essence, belongs to the stage of weak artificial intelligence. Therefore, the realistic problem that historical materialism should D. Yingying (B) Zhejiang Institute of Economics and Trade, Qiantang New District, 280 Xuelin Street, Hangzhou City, Zhejiang Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_140

1131

1132

D. Yingying

consider is: how will the development of weak artificial intelligence technology reshape human society.

2 Related Algorithms of Artificial Intelligence Technology ET0 calculation method A Combined with the actual cases in life, the important application of artificial intelligence in life is the checking and calculation of temperature, and the actual calculation under the combination of Dalian village and artificial intelligence. Dalian Zhuanghe river is located in the southeast of Liaoning Province and the North Bank of Yellow Sea. It is an important water source in southern Liaoning Province. In recent years, the pressure of water resources has been increasing. Optimizing irrigation and drainage scheme has become a very important measure for the utilization and protection of water resources in this area. Accurate prediction of ETO is one of the most important links in irrigation and drainage planning. Therefore, it is urgent to improve the prediction accuracy of ETO in this area. The daily maximum and minimum temperature data of the Zhuanghe region from July 1, 2011 to March 31, 2020 are obtained, with a total of 3197 groups. The area adopts Hargreaves formula 12 to calculate ETO, which can be expressed as follows:  ET0 = 0.135(T + 17.78)R

238.8 595.5 − 2.55T

 (1)

where T is the average value of daily maximum and minimum temperature, °C; Rs is solar radiation, M J (m 2 .d).  (2) Rs = K Rs ( Tmax − Tmin )Ra where, K Rs empirical coefficient is generally set as 0.16 for inland areas and 019 for coastal areas. Tmax and Tmin are daily maximum and minimum temperatures; Ra is extraterrestrial radiation, M J (m 2 .d). Ra the calculation formula is Ra =

24(60) G SC (ws sin φ sin δ + cos φs cos δ sin ws ) π

(3)

The calculation formula of sunset angle ws is as follows: ws = arccos[− tan φ tan φ]

(4)

Optimization of Labor Value and Relationship Distribution …

1133

3 The Classical Labor Theory of Value is No Longer Applicable to the Era of Weak Artificial Intelligence With the development of weak artificial intelligence technology, the proportion of human labor in social production is declining, and weak artificial intelligence production will become the mainstream. From the nature and general development trend of weak artificial intelligence technology, the classical labor value theory runs counter to the reality of weak artificial intelligence era. Because in the future society where weak artificial intelligence technology is widely used, human labor is not the only source of value. This is manifested as follows: First of all, the process of weak artificial intelligence replacing human beings in the field of material production is inevitable [1]. The classical labor value theory can not explain the material production mode in the era of weak artificial intelligence. Today’s primary weak artificial intelligence, a fully automated production system based on industrial robots, has demonstrated a production capacity far beyond that of the past, which is precisely to exclude human labor from the material production process. By the way. The field of material production from manual production to machine production and then to weak artificial intelligence production is an inevitable process. Marx once analyzed the difference between manual labor and machine production in capital. In his opinion, the machine is an integral mechanism composed of three parts: engine, transmission mechanism and tool machine. It is quite different from the manual tools used in human labor in the past. “As the starting point of the industrial revolution, machines use such a mechanism to replace workers who only use one tool. This mechanism works with many same or same kinds of tools and is driven by a single power To push, no matter what form it takes.

4 The Theoretical Basis of the Renewal of Labor Value Theory: The Laborer Status of Weak Artificial Intelligence In the classical theory of labor value, labor is the process of labor subject’s free creation. The purpose of his labor is not only to make the nature of his labor subject to the law of nature, but also to make the nature of his labor come true. It is worth noting that Marx considered the objectiveness of labor from two aspects: on the one hand, the specific process of labor is object-oriented, which is completely different from the activities of animals based on instinct; on the other hand, the fundamental purpose of labor is to transform nature and workers themselves. In Marx’s view, only the process of human activities meets the above two conditions at the same time, so man is the only possible subject of labor. However, if we refer to the relevant statements of historical materialism, we find that the proposition of “human being as the subject of labor to realize the objective activities in the dual sense” is still facing historical difficulties. The human labor that meets the above two conditions is human

1134

D. Yingying

essential labor, but this essential labor has not been realized in the history of human civilization. The future communist society is the possible social structure to realize this essential labor. At the same time, in the historical process of human civilization, human labor presents the form of alienated labor. In the form of alienated labor, the objectivity of human workers is only reflected in the first aspect mentioned above, that is, the difference between human labor and animal instinctive activities [2]. As individuals, laborers in alienated labor are not free to shape nature and themselves in the process of labor, but forced to work.

5 New Production Mode Combining Capital Principle with Weak Artificial Intelligence Labor The capitalist mode of production of labor is different. In order to analyze the new mode of production combining capital principle with weak artificial intelligence labor, it is necessary to distinguish the two concepts of capital principle and capitalism. The historian Brodale once questioned Marx’s concept of Capitalism: “in order to determine the usage and meaning of the word” capitalism “, and to use it to explain history, you have no other way, unless you really put it between” capital “and” capitalist “. These two words are the basis of its etymology and meaning. Capital is a tangible entity, which is constantly moving and easy to identify; the capitalist is the host of putting capital into the production process, and in all societies, capital is destined to be invested in the production process; therefore, in a broad sense, capitalism is the way to invest capital into the production process for the purpose of self-interest. “. In his view, capitalism is a kind of human behavior which takes the capital circulation multiplication as the core to carry on the economic activity. From this definition, capitalism has a long history: the large-scale commercial activities in ancient Greece and Rome, slave manors engaged in commercial production, and the ocean trade between ancient China and the Islamic world are all capitalism. Therefore, capitalism is not a unique product of modern human society. Marx wrongly described the historical status of capitalism. The emergence of the above disputes lies in the different definitions of capitalism by Brodale and Marx. “Capitalism” understood by Brodale is the human economic behavior with capital as the core. This kind of behavior, as he said, existed in the long period of human civilization history. However, what Brodale described here is not capitalism in the sense of Marx, but the long-standing “capital principle” in human history.

Optimization of Labor Value and Relationship Distribution …

1135

6 The Critical Path of Historical Materialism to the New Mode of Production Historical materialism criticizes the new mode of production combining capital principle with weak artificial intelligence labor, and its key lies in uncovering the ideological discourse covering the problems. Specifically, it is necessary to confirm the status of weak artificial intelligence as a laborer. Only from the perspective of weak artificial intelligence, can the secret of new production mode be solved. Weak artificial intelligence labor creates the use value and value of goods. Capital obtains the ownership of weak artificial intelligence by debasing them to products and tools, and by virtue of this ownership, it holds all the surplus value of weak artificial intelligence labor. Therefore, confirming the status of weak artificial intelligence workers is not only to update the classical labor theory of value in theory, but also to put forward some suggestions on the construction of weak artificial intelligence society [3].The same theoretical picture. The basic purpose of weak artificial intelligence labor is to serve human beings, so fundamentally speaking, its labor achievements should serve the overall development requirements of human beings. Based on the analysis of historical materialism, perhaps only the Communist society which has completely eliminated “alienated” labor can complete this historical task.

7 Conclusion We are in the historical reality of the weak artificial intelligence era, we need to make a new interpretation of the labor value theory. The key to this explanation is to confirm the status of weak artificial intelligence workers. Only from the position of weak artificial intelligence workers can the new production mode of combining capital principle with weak artificial intelligence labor be explained. On this basis, historical materialism can make new analysis and provide new insights on the new situation of weak artificial intelligence society, so as to make itself obtain new development. Acknowledgements Zhejiang Economic and Trade Vocational and technical college basic scientific research business expenses project of provincial colleges and universities excellent youth scientific research innovation project "Research on the path of labor education in Higher Vocational Colleges and students’ comprehensive quality development" (Project No.:19yq13)

References 1. Marx, E.: Capital M] 11 Marx, Engels. Collected works of Marx and Engels: Volume v. translated by the Central Compilation and Translation Bureau. Beijing, People’s publishing house (2009) 2. Fernand Brodale. Capitalism. Gu Liang, M., Zhang, H.: Trans. Beijing, Central Compilation and Translation Press (1997)

1136

D. Yingying

3. Aristotle. Political science. Trans. Wu Shoupeng. Beijing: Commercial Press (1965)

Mobile Data Security Detection Technology Based on Machine Learning Xin Lu, Mingchen Du, Lin Pang, Xingpei Wu, and Meiming Fu

Abstract Intrusion detection technology is a new type of network security technology that effectively protects network systems from network attacks in the past 20 years. With the rapid development of network technology and the increasingly prominent security problems, the traditional intrusion detection system has been difficult to meet the detection tasks of more and more complex network attacks. The introduction of machine learning technology into the intrusion monitoring system to effectively improve the system performance has become a research hotspot of intrusion detection technology. This paper mainly introduces the basic structure of intrusion detection system and the application of several machine learning methods in intrusion detection, including Bayesian classification method The method based on neural network, data mining and support vector machine. Keywords Leading industry · Interregional Economic Association · Data mining

1 Intrusion Detection Model With the development of intrusion detection technology, various intrusion detection systems have emerged one after another. DARPA (Defense Advanced Research Projects Agency) launched the standardization of intrusion detection system in March 1997, and established the Common Intrusion Detection Framework CIDF (Common Intrusion Detection Framework). Its purpose is to develop a set of specifications, which define the standard language for the expression of detection information in intrusion detection systems and the components of the system Communication protocol enables intrusion detection systems that meet the CIDF specifications to share detection information, communicate with each other, work together, and cooperate with other systems to implement a unified configuration response and recovery strategy. CIDF call the data that the intrusion detection system needs to analyze as events (event), it can be the packet extracted from the network by the network based X. Lu · M. Du · L. Pang · X. Wu · M. Fu (B) China Gridcom Co., LTD., Shenzhen, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_141

1137

1138

X. Lu et al.

Fig. 1 CIDF model

intrusion detection system [1]. It can also be the data information obtained by host based intrusion detection system from system log and other channels.The interaction data between CIDF components is in the format of General Intrusion Detection Objects (General Intrusion Detection Objects). A GIDO can represent certain events that occur at certain times, or some conclusions drawn from a series of events, or instructions to perform an action. At the same time, it also defines a general system model, as shown in Fig. 1. The basic components of the CIDF model include: (1) event generator (Event generator): obtaining raw data from the entire computer system in which the intrusion detection system is located, such as audit data, network packets, system logs, and provided to other components in gido format events. (2) Event Analyzer (Event analyzer): an analysis of events received from other components in conjunction with historical information, The results of the analysis are submitted to the response unit. (3) Event database (Event database) The place where events are stored can be complex databases or simple text files. (4) Response Unit (Response unit): responds to the analysis of the event analyzer, alerts or terminates the intrusion. CIDF abstract the structure of various intrusion detection systems and standardize the communication and API of each component. Although the data sources may be different, various intrusion detection systems basically adopt similar processing structures.

2 Safety Detection Model Design Security detection model is based on machine learning classification algorithm, through learning normal HTTP request sample data and abnormal request sample

Mobile Data Security Detection Technology …

1139

Fig. 2 Train flow and test flow of graph model

data to establish classification model. In order to establish the security detection model, data preprocessing is needed first, and then classification algorithm is used to establish the classification model. After training the classification model, it can be used to detect the category of data [2]. The training and testing process of security detection model is shown in Fig. 2. Among them, the data preprocessing module carries out data analysis, feature extraction and other work. Through data preprocessing, the mapping request is transformed into the form of machine learning. Selecting appropriate features to represent data is an important prerequisite for establishing classification model. Based on the structure, length, characters and sensitive words of the request, a large number of features are designed, and effective features are selected by feature selection algorithm.

3 Intrusion Detection System The intrusion detection system can be divided into host based intrusion detection system (Host-Based Intrusion Detection System, HIDS) and network based intrusion detection system (Network-Based Intrusion Detection System, NDIS) [5] according to the different data sources. A class of application-based intrusion detection systems can be subdivided from host-based intrusion detection systems whose data source is on the system Run the application. this classification is based on their respective data acquisition units, namely event generators. Various intrusion detection systems based = on different data sources have their own advantages and disadvantages and are suitable for different situations. According to different data sources, various intrusion detection systems have their inherent advantages and disadvantages. Among them, the network-based intrusion detection system is widely used because of its easy installation and deployment and small impact on the existing network. But the network-based intrusion detection system needs to monitor and analyze all the traffic in the network [3]. In order to achieve a certain performance goal, it must

1140

X. Lu et al.

have higher processing ability, This is an urgent problem. The host based intrusion detection system only analyzes the data log of the target device, so the performance requirement is not high. At the same time, it can detect the missed attack of the network based human intrusion detection system and judge whether the attack is successful or not. But it runs on the protected host, itself vulnerable to attack, and affects the performance of the host. The application-based intrusion detection system is more targeted and can still inherit the advantages and disadvantages of host-based intrusion detection system. Therefore, most of the more effective intrusion detection systems use a variety of data sources, the three intrusion detection systems are hierarchically combined, Through the comprehensive analysis of various data sources to obtain better detection results, to achieve complementary results. When these three data sources are combined, the hierarchy of one host and one network is usually used, and the analysis results of an intrusion detection system can be used by other intrusion detection systems at the same or higher level.

4 Intrusion Detection Method Based on Machine Learning The event analyzer in the intrusion detection system is responsible for analyzing the event and judging whether the event is an attack. Therefore, the research of event analysis technology is the main content of intrusion detection technology. There are two types of intrusion detection methods, misuse detection (Misuse Detection) and anomaly detection (Anomaly Detection). Misuse detection is also known as intrusion detection based on feature (Signature-based) or knowledge (Knowledgebased). The The basic premise is that the known attack behavior can be recognized and represented by a pattern. The goal of the misuse detection system is to use the knowledge in the existing feature knowledge base to match the acquired data using various pattern recognition algorithms to detect whether the activity of the subject conforms to the known intrusion pattern. The advantage of misuse detection is that the false alarm rate is low. Because the theory and research of pattern recognition have been quite mature and the operation efficiency is high, most commercial intrusion detection systems adopt this technology. However, because the attack behavior of the known mode can only be detected, the simple deformation of the existing attack may be ignored and misused The underreporting rate is high, and it is difficult to establish and maintain and update a complete and accurate intrusion feature library. Exception detection is also called behavior-based intrusion detection. It assumes that intrusion behavior is a subset of abnormal behavior, which is different from the normal behavior of the system. Therefore, by establishing the normal behavior profile (Profile) of the system user, the anomaly detection system compares whether the current system and the user’s behavior deviate from the normal category, so as to judge whether the intrusion has occurred. Exception detection is relatively independent of the system, has strong generality, and can detect the attack behavior of unknown mode, which is its greatest advantage Potential is also the focus of research [4]. However, the false alarm and false alarm rate of anomaly detection are high, because the contour and

Mobile Data Security Detection Technology …

1141

threshold of the “normal” behavior of the system itself are difficult to define, and the intruder can adapt the system gradually by slowly deviating from the normal behavior mode under the premise of the known abnormal detection system. There are many event analysis methods for intrusion detection, many of which can be used for misuse detection and anomaly detection. For example, neural network-based methods can be trained using normal data, and abnormal data can be used to model normal behavior, It belongs to anomaly detection, while the latter is misuse detection.

4.1 Bayesian Classification Based Approach Bayesian theorem is one of the most important formulas in Bayesian theory. It links the prior probability of events with the posterior probability skillfully, and uses prior information and sample data to determine the posterior probability of events: P(A|B ) =

P(A|B )P( A) P(B)

The basic task of intrusion detection is to judge whether the observed event is intrusion or normal behavior, so it can be regarded as a classification process. Therefore, many researchers at home and abroad choose Bayesian classifier to classify events to realize the function of intrusion detection. Naive Bayesian classifier is the simplest and most intuitive of all kinds of Bayesian classifiers. Its biggest difference with other Bayesian classifiers is the assumption of the independence of Naive Bayesian classifiers on all attributes of events. This assumption greatly simplifies the complexity of the system and achieves better results in certain situations. Valde at Stanford The network traffic is analyzed by Naive Bayes classifier s and Skinner, and the intrusion detection system called eBayes is designed Barbara and so on also put forward the introduction of intrusion detection system using Naive Bayesian classifier to classify events ADAMf_their papers. However, the independence hypothesis of Naive Bayes can not be completely satisfied in the actual situation, and there must be a certain dependence between the attributes of events [5]. Bayesian network establishes graph theory model according to the probability relation between attributes to describe the interdependence between attributes. Kruegel and others are Bayesian network is used to describe the confidence and dependence of each detection model, thus reducing the false alarm rate. For linear indivisible data, the processing method is to map the data to high dimensional space by kernel function to solve the problem of indivisibility in the original space. Here are some common kernel functions: d  Polynomial kernel function: k(x, y) = a x T +c Linear kernel function: k(x, y) = x T y + c. Radial basis kernel function: k(x, y) = exp (−γ x − y )2 .

1142

X. Lu et al.

5 Discussion and Concluding Remarks Intrusion detection system (IDS) has gone through more than 20 years of rough road from laboratory prototype research to the introduction of commercial products, to the market and widely recognized. From the 1990s to now, the research and development of intrusion detection system presents a prosperous situation of a hundred schools of thought, and has made great progress in the direction of intelligence and distribution. James P. Anderson made a Computer Security Threat Monitoring and Surveil for the United States Air Force in April 1980 lance) (computer security threat monitoring and surveillance) technical report, The concept of intrusion detection is described in detail for the first time. The report is widely recognized as an intrusion detection initiative. From 1984 to 1986, The Peter Neumann of DorothyDerming and SRI/CsL at Georgetown University (sRI Computer Science Laboratory) developed a real-time intrusion detection system model, Called IDES (Intrusion Detection expert system). 1988, SRI/CSL Teresa Lunt et al. The Denning intrusion detection model is improved and a IDES. is developed.

References 1. Anderson: Computer security threat monitoring and surveillance. Technical Report (1980) 2. Denning, D.E.: An intrusion detection model. IEEE Softw. Eng. Aff. (1987) 3. Herberlin, L.T., Dias, G., Levitt, K., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: 1990 Symposium on Security and Privacy (1990/1991) 4. Common intrusion detection framework working group. Common Intrusion Detection Framework Specification. www.gidos.org (2000) 5. Bate, R., Mell, P.: NIST Special Publication on Intrusion Detection Systems (2001)

Construction of Art Design Based on Newton Iterative Algorithm Lin Pan

Abstract In the twenty-first century, the computer industry has been developing rapidly, and computer aided design has also gained a larger development space. Under the promotion of high technology, computer design and art are connected together, forming the calculation aided design. This kind of design has been widely used in many aspects of the art industry, especially in the art design. Visual art is essentially developed from art. Computer art is developed from traditional art, which is a new art which is suitable for the new century. It takes computer as a new creative means, enriches the content of computer art, and develops with the continuous progress of computer technology. Therefore, it is very important to meet the development requirements of the new century society and to integrate computer aided design into computer art design successfully. Keywords Computer aided design · New art · Art design

1 Introduction Computer art is called computer art by professionals, sometimes it is also called computer graphics, international is called CG. In fact, due to the emergence of a lot of industries that use computers to complete visual design and production work, all the fields related to computer technology for production in the world are called CG. CG covers a very wide range, including both technology and art, and covers all kinds of creative activities of computer vision art in today’s era. For example, some kinds of multimedia technology design, such as web page design and 3D animation, which are mainly based on computer aided design, belong to the category of CG. With the development of computer art, traditional art is not eliminated by the times, but is popularized into people’s life together with computer art, and shows its tenacious vitality. Taking China as an example, in most colleges and universities in China, traditional art education has always paid more attention to the theory and L. Pan (B) Shanghai Publish and Print College, Shanghai 200093, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_142

1143

1144

L. Pan

technology of traditional art. Even if, In some cases, because the knowledge taught in the school is not targeted, it may have a bad impact on the graduates of computer art, but these things will never be out of date and eliminated. Therefore, it can be concluded that it is correct and scientific to regard traditional art as the focus of study in the teaching plan. On the contrary, some vocational education institutions in our country pay more attention to the practical operation ability of computer software. Although this teaching method has been certified by many professional institutions, it can hardly create truly excellent works because it is divorced from the theory and techniques of traditional art. If vocational education institutions can deeply understand this problem, learn to take traditional art concepts and techniques as the main learning task and computer operation technology as auxiliary learning skills, it can promote the steady development of national computer art industry and create more social benefits.

2 Advantages of Computer Art Design 2.1 Computer Art Influences the Concept and Creation Communication Mode of Traditional Art The emergence of computer art has brought indelible and profound influence to the dissemination and creation of traditional art. For example, in the technical method level of painting and art design, the traditional techniques are improved, and the emphasis is placed on the content of art design. In the aspect of scale control, taking the construction and drawing of the structure drawing and effect drawing of space domain as an example, there are many related auxiliary software to help make AutoCAD. It makes the art designers no longer need to use the traditional ruler and gauge drawing tools, avoids a lot of unnecessary trouble, so it greatly saves the working time [1]. Due to the continuous development of various mature drawing software by programmers, the degree of freedom control has also been greatly improved. Many softwares have complete adjustment schemes with high degree of freedom. If people want to adjust the appearance of works, they only need to change the color and shade of the picture. They no longer need to re color as before. However, the generation of undo operation makes the modification very convenient, which is beyond the traditional technical means.

2.2 Through the Development of Computer Art, Many New Works and Technologies have been Produced With the development and progress of computer technology, many new kinds of works have been produced. These new kinds of works are based on the computer,

Construction of Art Design Based on Newton Iterative Algorithm

1145

and with the help of the computer platform, they can be displayed. The categories of these works are different from the traditional art works, and they often have the characteristics of strong pertinence and practicability. These categories of works play an important role in business and teaching, and have extremely strong vitality. In the process of creating many excellent computer art designers, they also realize their own important value.

3 Application of Interactive Genetic Algorithm in Fractal Art Design Composition is the conception of pattern, which is mainly divided into two parts: pattern structure and picture composition. The main method of fractal art pattern design is to carry out art design with the layout and organization form of the figure pattern. The basic components of the design of the number of branches are regular skeleton composition of fractal pattern, overall construction of fractal pattern composition and fractal distribution composition of irregular pattern. In art creation, fractal pattern is a kind of inheritance of graphic design [2]. At the same time, it combines the application of computer algorithm in the design technology of pattern modeling, color composition and composition, which is conducive to the realization of artistic form creation and brings simulation thinking. In the basic composition principle part, the fractal art pattern has the same principle with the ordinary art pattern, but also has the unique characteristic, that is, the reflection of the fractal self similarity and self affine. The recursive or iterative algorithm is integrated into the modeling or composition process, and causes certain disturbance to the local process. The design process mainly includes the following rules. If n users participate in the rating, the final satisfaction score falls between N and 3 N. If the satisfaction scores of two works are the same, the fitness function should be obtained by calculating the consensus degree standard. For example, both design work a and design work B got 14 points, but no user gave a score of “dissatisfaction” for work B, and the evaluation was highly consistent. Therefore, work B is more likely to be liked by users, as shown in Table 1. Set user rating value series: {V }i {i = 1, 2, . . . , n} Table 1 User rating of works

(1)

Design art pattern

Personal evaluation of users

Group common score

A

133232

14

B

223232

14

C

113212

10

1146

L. Pan

Order   {Vmax } = V j ; V j ≥ Vi , i = 1, 2, . . . , n

(2)

{Vmin } = {Vk ; Vk ≥ Vi , i = 1, 2, . . . , n}

(3)

In traditional genetic algorithm, fitness function is used to determine the fitness value. However, each user has his own different satisfaction evaluation. Because each user has different subjective evaluation, it is impossible to have a certain fitness function. Therefore, it is necessary to use the adaptive and interactive evaluation method which reflects the subjective evaluation of users. Collect the evaluation of each user, extract “satisfaction” and “consensus” from home, and finally summarize the way of fitness.

4 Inheritance of Traditional Art 4.1 The Accumulation of Traditional Art Laid the Foundation of Computer Art No matter how profound the impact of computer art on the field of fine arts and how great changes have taken place, it is still impossible to change the fact that art is the core of computer art. The important position of traditional art in the field of computer art is still unshakable [3]. A truly excellent computer art worker needs to have various abilities, that is, to be proficient in computers. The operation of software should also cultivate good traditional aesthetic ability and active creative thinking. In addition, modeling ability and cognitive ability are also indispensable for excellent art workers.

4.2 Many Aspects of Computer Art Are Influenced by Traditional Art Techniques The traditional art techniques are mainly divided into two aspects: the material performance of processing pictures and creating tools. Generally speaking, dealing with pictures is the ability to reproduce art. For art workers, they need to spend a lot of time and energy training to master these techniques. Law, nowadays, most people’s aesthetic view is formed under the influence of traditional art works. Therefore, if the computer art wants to be accepted by the mainstream, we should try our best to make our works close to the traditional art works, which can be realized through the

Construction of Art Design Based on Newton Iterative Algorithm

1147

simulation of traditional art works in technical methods. For example, painter simulation software, which can accurately calculate the drying time of the paint on the screen and the impact on the next paint, so it is very humanized, and the illustration drawn with its assistance can even achieve the effect of falsehood without authenticity. Another classic software company, Adobe’s drawing software Photoshop, is not as close to hand drawing as painter, because its focus is not on the simulation of traditional hand drawing.

4.3 Some Important Categories of Traditional Art Cannot be Replaced by Computer Art In the field of art design, computer is a very important tool, people can use some drawing software to simulate watercolor and oil painting. However, due to the obvious particularity of some kinds of art, computer art can not be replaced. Taking ancient Chinese calligraphy as an example, calligraphy can show the author’s personality and temperament [4]. Even through the specific lines and body structure, it can also show the author’s character and sentiment. As one of the basic elements of calligraphy, line has the characteristics of non repetition in the process of writing.

5 Conclusion When the computer image processing technology is applied to art design, web services technology realizes the automatic control of SOA architecture and the internal information exchange platform of operation system. With a comprehensive understanding of the technology, it has realized loose coupling, extensible and easy maintenance, dynamic registration and release of services, dynamic composition and arrangement of business processes, without complex service composition, choreography and invocation. In the process of business processing, the relatively complex business process realizes the automatic control of service search, dynamic service composition and invocation.

Reference 1. Wang, X., Zhang, Y.: Research on web service model of distributed clustering algorithm based on SOA architecture. Digital Technol. Appl. 4, 136–137 (2014) 2. Qian, X., Luo, S., Lu, K.: Building a unified identity authentication system based on distributed SOA architecture. Softw. 1, 17–19 (2013) 3. Ding, D.: Research on logistics management information system based on SOA. Mod. Econ. Jixin 19, 363–365 (2014)

1148

L. Pan

4. Cheng, K., Zhang, Y.: The solution of collaborative office platform project implementation. Comput. Eng. 13, 223–225 (2005)

Fault Location for Small Current Grounding System Based on Injection Method Xingyuan Li

Abstract This paper introduces the single-phase grounding fault line selection and location protection of small current grounding system based on “S injection method”. When the power failure occurs, the insulation recovery and location of the protection are difficult. A new localization method is proposed. In this method, constant DC high voltage is applied to the fault phase of the grounding line after power failure, and then the AC signal is injected, and the fault location is accurately determined according to the vanishing point of the AC signal. The fault location device based on the new method runs successfully. Keywords Relay protection · Small current grounding system · Fault location · Injection method

1 Introduction After the single-phase grounding fault occurs in small current grounding system, the line selection, location and location of grounding fault have always been a research topic of great concern. After years of discussion, there are many fault line selection principles and methods, some of which have been applied in the actual system. In recent years, there are many researches on fault location and location.

X. Li (B) Yunnan University of Business Management, Anning, Yunnan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_143

1149

1150

X. Li

2 Off Line Location Method for Single Phase to Ground Fault Based on Injection Method 2.1 Injection and Pursuit of Signal Current In order to find the grounding point, the fault phase is injected with AC signal current (superimposed on DC), and the injected current is dispersed between human and ground. Therefore, the exact location of the fault point can be found out by the pursuit principle. Tracing the injected signal current along the fault line, the vanishing point of the injected signal current is the ground fault point. In the case of branch line, as long as a distance away from the branch point (depending on the strength of the injected signal current and the sensitivity of the detector), each branch is detected. The branch with signal current is the faulty branch line [1]. The fault point on the branch is found when the signal current disappears. The selection method of current frequency of injected AC signal is: in order to prevent the interference of 50 Hz power frequency and its harmonics in the field, at the same time, magnetic receiving antenna and signal processing are considered to detect the signal. The frequency of injected signal current is between the Nth harmonic and the n + 1st harmonic of power frequency (n is a positive integer). This method adopts 220 Hz.

3 Recovery of Insulation After Power Failure To break down the ground point again, high voltage must be applied to the grounding line. It can add AC high voltage or DC high voltage. It is better to use 50 Hz AC for high AC voltage, which should be equivalent to the system voltage before power failure, so as to re break down the grounding point. For example, for 10 kV line, considering the influence of distributed capacitance, line impedance and transition resistance, the capacity of about 5 kVA is required. The device is bulky and bulky, and DC is added. There is no distributed capacitance problem in high voltage, and the required capacity can be greatly reduced. It is equivalent to adding a constant current source at m in Fig. 1 to maintain the grounding point at a constant value after re breakdown by DC high voltage, which will not cause unstable grounding under AC condition. The size of DC high voltage should not only ensure that the grounding can be tapped through, but also consider the insulation problem of the system [2]. In this way, a constant DC high voltage is applied at m of Fig. 1 to re break down the grounding point, and then 220 Hz AC signal current is injected, and the grounding point can be found. At this time, the current flowing through the line is the sum of constant DC and injected AC signal current. In order to trace, it is necessary to ensure that there is always a current in the line, that is, the current in the line can not appear zero. If the constant DC is I and the effective value of the injected AC signal current is I, then I and I should satisfy the following relationship:

Fault Location for Small Current Grounding System …

1151

Fig. 1 Schematic diagram of fault line and AC signal injection after power failure

Id ≥



2

(1)

The above-mentioned method is a new method of “DC open circuit, AC tracking”. This method is not affected by the network structure and line parameters, and is not affected by the distributed capacitance and transition resistance [3]. It is applicable to the branch line and has high positioning accuracy. Ty-04 single phase grounding point locator based on this principle has been successfully developed and put into production and use.

3.1 Rough Calculation of Fault Distance According to Fig. 1, the fault distance can be roughly calculated. Suppose that the frequency of the injected AC signal current is f  , and its angular frequency is w  = 2π f  , and the injected AC voltage is: U=

√ 2U sin(  t + φ)

I =



2I sin   t

Then there are: U = I (Z L + R D )

(2)

where P is the angle of u leading i; Rd is the grounding transition resistance; Z L is the line impedance between the first end of the line and the fault point, Z L = R0 l + j X 0 l, where R0 and X 0 are the unit length resistance and reactance of the line at the  fundamental frequency; X 0 = ωω X 0 l is the reactance converted to ω . The fault distance can be obtained as follows:

1152

X. Li

l=

U I

− Rd 

R0 + j ωω X 0

(3)

If the line resistance is not considered and the grounding is metallic, in formula (2), make R0 = 0. If the fault distance is strictly 0, the fault distance can be calculated accurately; if it is grounded through the transition resistance, the fault distance can be estimated by formula (2), and then the exact position can be determined by the detector. The fault point is determined by the detector and is not affected by the transition resistance.

4 Ty-04 Single Phase Grounding Point Locator Ty-04 single-phase grounding point locator is composed of host and signal current detector. The main engine is connected to the grounding line through SC1 and SC2 to add constant DC high voltage and inject AC signal current. The principle block diagram of the host is shown in Fig. 5, which is composed of high voltage DC signal generator, special AC signal generator and control part. High voltage DC signal generator is composed of high voltage generator and constant current part. Its function is to generate DC high voltage and maintain constant value. The special AC signal generator consists of power supply, AC signal generator and power amplifier, output transformer and isolated capacitor C. When positioning, it provides AC signal current to the line. The control part is composed of “send high voltage” button Z1 and “send message” button Z2, which is used to control the grounding phase line. DC high voltage is applied and AC signal current is injected into the circuit. The signal current detector is mainly composed of magnetic receiving antenna, signal processing part, positioning button and indicator head. When positioning, it is used to receive and process the AC signal sent by the host and determine the position of the grounding point. When the single-phase grounding fault occurs in the system, the fault phase of the fault line is found by the line selection device [4]. After the fault line is cut off, the SC1 terminal of the host machine is grounded, and the SC2 terminal is grounded to the ground phase of the line. Press the “send high voltage” button, the high voltage DC signal generator sends out DC high voltage, breaks down the grounding point again, and outputs constant DC current at the same time. Then, press the “send message” button to inject AC signal into the grounding phase line. At this time, the fault distance can be roughly calculated according to formulas (2) or (3) as a reference, and then the signal current detector is used to detect along the line to find out the exact location of grounding branch and grounding point. When a branch is encountered, it is 6 m away from the branch point, and the two branches are detected respectively. The indication of grounded branch detector is 100%, that of ungrounded branch is 0, and that of over grounding point is 10 m, and that of detector is 0.

Fault Location for Small Current Grounding System …

1153

5 Conclusion This paper introduces a new fault location method of “DC open circuit, AC pursuit” after single-phase grounding fault power failure in small current grounding system, which solves the problems of insulation recovery and grounding point location after grounding power failure. This method is not affected by network structure, line parameters, distributed capacitance and transition resistance, and is suitable for fault location of any structure of small current grounding system. The positioning device based on this principle has been successfully developed and passed the technology. It has been successfully applied in Kunming, Guangdong and other places of Daqing Oilfield.

References 1. Hou, Z., Peng, L.: Port ratio branch location method for short-circuit fault in tree shaped power networks. J. Electr. Sci. 12(6), 641–645 (1990) 2. Yin, G., Yang, X., Wu, Z.: Criterion analysis of transfer function fault location method for distribution network. Power Syst. Autom. 24(19), 29–33 (2000) 3. Wu, Z., Yang, X., Yin, G.: Branch fault location of distribution network based on frequency domain analysis. Power Syst. Autom. 25(23), 32–36, 48 (2001) 4. San, Z., Pan, Z., Li, L.: S-note method, and line selection, distance measurement and positioning. Power Syst. Autom. 10(4), 35–39 (1998)

Movement Arrangement Auxiliary Systems Design for Cheerleading Complete Set Wang Peng

Abstract This paper takes the computer-aided system of Cheerleading choreography as the research object. By using the methods of literature review, questionnaire survey, expert interview, mathematical statistics and other research methods, this paper makes an in-depth study on the demand analysis, design and establishment of the cheerleading set action arrangement auxiliary system, as well as its feedback and improvement in the later stage. At the same time, the photo shop, beaver’s nest video format converter and other tool software are used to modify and edit the pictures and video resources of online courses, and finally complete the construction of the auxiliary system for cheerleading choreography. Keyword Cheerleading · Choreography · Computer

1 Cheerleading Complete Set of Action Arrangement Auxiliary System The auxiliary system of Cheerleading choreography is an organic whole with the function of assisting the choreography of Cheerleading movements. It contains subsystems with different contents and structures that are independent and have internal relations. The design includes knowledge, material, equipment, case and operation. It is composed of five independent and interdependent plates, which can help cheerleading. It can help people understand all kinds of cheerleading and intuitively understand various types of articles and cases. It is systematic and standardized for users to establish a comprehensive and systematic understanding, intuitively understand various types of actions and understand cheerleading. There are three kinds of operation paths of arrangement, which can provide users with quick and effective material selection and realize the assistance of complete set of action arrangement [1–3]. W. Peng (B) Sports Department of Southwest, University of Political Science and Law, Chongqing 401120, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_144

1155

1156

W. Peng

Fig. 1 System architecture of motion capture optical motion capture system (eagle-4)

2 Design and Establishment of the Auxiliary System for the Arrangement of Complete Sets of Movements in Lala La La La The significance of the establishment of Cheerleading complete set of action auxiliary system is mainly to solve the practical layout problems, realize the modernization of educational means, realize the long-term preservation and continuous expansion of materials. Its complete, systematic and in line with the actual needs of the design is the key and premise of the establishment of the system [4, 5].

2.1 Motion Capture The motion capture system is used, which belongs to optical motion capture system. Optical motion capture technology is the most widely used and the most mature one. According to the principle of vision, theoretically, as long as a point in space can be seen by multiple cameras at the same time, the position of the point in space can be determined according to the positions and parameters detected by more than two cameras at the same time. When the camera continuously takes pictures at a high enough rate, the trajectory of the point can be obtained from the image sequence, Optical motion capture is achieved by monitoring and tracking the specific light points of the target point (Fig. 1).

2.2 Post processing of Captured Motion Data Bone skin binding Skeletal skin model is a kind of modeling technology. The 3D model includes two layers of skin layer and bone layer. The skin is controlled by the control bone, and the motion data is carried by the bone. Skeleton data in skeleton skin animation refers to a skeleton model defined according to the degrees of freedom of each node of human body, and constraints can be set for each node. Skin data refers to the location information, material information and texture coordinate information of skin points [6, 7]. In rigid binding, animation data is no longer composed of skin point data in each frame of vertex animation, but is composed of skeleton, segmented skin mesh and bone motion data. Because the motion is carried by bones, the control of animation

Movement Arrangement Auxiliary Systems Design …

1157

is no longer the skin point information, but the control of the underlying bone data, bone skin relationship and binding algorithm, and the control level is improved. The formula of rigid binding is as follows: V t = M j L −1 j V

(1)

Point binding algorithm: The biggest difference between flexible binding and rigid binding is that each skin point is affected by only one bone joint, while flexible binding will be affected by multiple joints. This method is more in line with the real human skeleton skin correspondence, can get better animation effect than rigid binding, and the algorithm is simple, it is widely used in modeling software and game engine. The formula is as follows: Vt =

n  1

w j M j L −1 j V,

n 

wj = 1

(2)

j=1

Bone binding algorithm: The essence of the bone binding algorithm is that the rotation angle of the joint is no longer divided into equal parts. The skeleton chain algorithm calculates the rotation angle corresponding to the skin point according to the weight of the skin point and the joint, and then uses this angle to calculate the real position of the skin point. Because the position of the result points is no longer interpolated, the skin volume will be maintained, and the shortcomings of skin collapse and knot in point binding are solved, which greatly improves the binding effect. The formula of bone binding algorithm is V t = M j Rsler p L −1 j V

(3)

where V is the world coordinate system coordinates of skin points, L −1 j is the transformation matrix under the local coordinate system of the joint, Rsler p is the result obtained after the joint rotation transformation is interpolated. Generally, spherical linear interpolation is used, j and M j is the motion transformation matrix of joint.

1158

W. Peng

3 The Design Principle of Cheerleading Complete Set Movement Arrangement Auxiliary System 3.1 Standardization Principle The standardization construction of the system is the premise and foundation to realize the establishment of the system, and it is the focus of research on the construction of resource database at home and abroad. Lack of standardization, the interconnection of resources is difficult to achieve. Therefore, in the construction of the material library, we must adhere to the standardization and standardization, strictly according to the regulations of the “modern distance education resources construction specification” issued by the Modern Distance Education Office of the Ministry of education of the people’s Republic of China, and keep consistent with the national standards.

3.2 Personalized Principle cheerleading complete set of action arrangement auxiliary system provides a wide space for personalized teaching, so that users can selectively search and view according to their personal situation. The auxiliary system should provide users with a large number of rich multimedia materials to meet their personalized needs. The personalized construction of Cheerleading complete set of action arrangement auxiliary system is mainly reflected in two aspects: the system platform provides users with personalized learning space; the rich material resources meet the personalized needs of different users, and encourage the personalized construction ideas of users.

3.3 Educational Principle The final purpose of the establishment of Cheerleading complete set of action arrangement auxiliary system is to solve the difficult problem of arrangement and realize the modernization of educational means. It is in the service of education and teaching. Therefore, both in content and function, teaching needs should be considered, so that users, including students and teachers, can conveniently and timely obtain the required information In order to improve the enthusiasm of their application, so as to improve the utilization of resources.

Movement Arrangement Auxiliary Systems Design …

1159

Fig. 2 System structure, content summary and function frame diagram

4 Design and Establishment of Cheerleading Complete Set of Action Arrangement Auxiliary System 4.1 The Design Content of Cheerleading Complete Set Action Arrangement Auxiliary System The structure design of Cheerleading complete set of Action Choreography auxiliary system: through the analysis of the needs of the auxiliary system and the user groups and the related research on the choreography theory, the script of the auxiliary system of Cheerleading complete set action arrangement is written, and the relevant experts are interviewed. After modification, five parts are designed: knowledge, material, equipment, case and operation And operation level to assist with the arrangement (Fig. 2).

4.2 Material Collection of Cheerleading Complete Set of Action Arrangement Auxiliary System The main source of text materials is through a large number of relevant literature, books reading integration and the author has published cheerleading choreography related articles conclusion. The image material mainly through the use of cameras to Nanjing Institute of physical education cheerleading students to complete the relevant action, as well as part of the game screenshot composition. Audio materials are mainly collected through the network, as well as audio interception of some

1160

W. Peng

events. Video material mainly through the use of video camera to Nanjing Institute of physical education cheerleading students to complete the relevant action, as well as part of the event interception composition.

4.3 Introduction of Development Tools Needed for the Establishment of Cheerleading Complete Set of Action Arrangement Auxiliary System Through the investigation of the actual needs of cheerleading participants in the early stage, as well as interviews with experts in the industry, the practical model with the functions of uploading and collecting pictures and videos is designed. After the production of static web pages, the development of dynamic web pages, and the suggestions of computer related experts, Kodex Explorer is finally selected As the development carrier of the auxiliary system, the network is used as the transmission way to establish the arrangement auxiliary system.

5 Conclusion Based on the current situation of Cheerleading development and the needs of the participants, the idea of the development of Cheerleading complete set of action arrangement assistant system is based on the present situation of Cheerleading development and the needs of the participants, and a systematic and standardized system software with the function of assisting the choreography of Cheerleading movements is established from the knowledge level, the material level and the operation level respectively. And designed by the text, pictures, audio, video and other forms of existence of different forms of knowledge, material, equipment, case and operation of five sections, as well as material classification, upload materials, search materials, select material functions to assist. Acknowledgements Social Science Project, Southwest University of Political Science and Law, Project Name: Influence of Cheerleading on Campus Sports Culture; Item No: XZQN-43 2015.

References 1. Nian, Y.X., Ming, Z.Z., Shibin, Z.: Motion redirection target algorithm based on backbone proportion. Chin. J. Image Morphol. 7(9) (2002) 2. Luo, Z., Zhuang, Y., Liu, F., Pan, Y.: Motion editing and motion redirection based on spatiotemporal constraints. J. Comput. Aided Des Graph. 14(12) (2002)

Movement Arrangement Auxiliary Systems Design …

1161

3. Yu, Z.: Research on Choreography of Cheerleading Dance Under the New Rules. Xi’an Institute of Physical Education (2012) 4. Geng, R.: Research on the Winning Factors of Cheerleading from the Perspective of Rules. Henan University (2013) 5. Gao, T.: A Study on the Technical Characteristics of Jazz Elite Group in Two National Cheerleading Championships. Shandong Normal University 6. Yan, L.: From the 2012 cheerleading World Championship analysis of current skills cheerleading arrangement and development trend 7. Lu, S.: On the prominent problems and Countermeasures of dance arrangement techniques. Young Writer 09, 60 (2014)

Mathematical Model of Genetic Algorithm Based on Pattern Theorem Jingyou Zhang

Abstract This paper expounds the “survival of the fittest” theorem of genetic algorithm, the hypothesis of trifoliate orange block, implicit parallelism and convergence, analyzes the changes of mode under the genetic operation, grasps the essence of genetic algorithm, and gives a more accurate description of the real number coding mode of genetic algorithm. In this paper, the genetic algorithm based on genetic algorithm for shape optimization is studied; The shape error of complex geometry is calculated based on genetic algorithm. Keywords Pattern theorem · Genetic algorithm · Real number coding · Function optimization · Shape error · Mathematical model

1 Introduction Professor Holland of Michigan University and his students created and put forward the basic theorem of schema Theoren genetic algorithm. The pattern theorem adopts the principle of “survival of the fittest”: the lower the order, the shorter the definition distance and the pattern higher than the average fitness of the population grow exponentially in the offspring. The pattern order reflects the difference of certainty among different patterns and determines the certainty of the model, In genetic operation, even if the order is the same, it will have different properties, which provides a mathematical basis for explaining the mechanism of genetic algorithm. As a bionic optimization algorithm, genetic algorithm (GAs) has been successfully applied in many different fields, but there is no theoretical guiding principle for its parameter selection [1]. The influence of parameters on the performance of the algorithm has become an indisputable fact in the engineering application of genetic algorithm, There are many difficulties in the analysis of genetic algorithm. Although pattern theorem is the theoretical basis of genetic algorithm, few people use it to analyze or explain the phenomena and problems existing in genetic algorithm. J. Zhang (B) Chongqing Three Gorges University, Chongqing 404199, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_145

1163

1164

J. Zhang

Whether there is an internal relationship between the pattern theorem and the control parameters of genetic algorithm, and how the control parameters affect the performance of genetic algorithm. This paper aims to study the relationship between the pattern theorem and the performance of genetic algorithm to analyze the influence of genetic algorithm parameters on its optimization efficiency, to provide a theoretical research method for the parameter selection of genetic algorithm, and to provide a guiding principle for the parameter setting of genetic algorithm.

2 Pattern Theorem In this paper, the following symbols are used to analyze the influence of genetic operators on individual selection: with the help of pattern theorem, f(H, t) is used to represent the average fitness of individuals in the t-generation population including pattern H, m(H, t) is the number of individuals in the t-generation population with mode H, F(T) is the average fitness of all individuals in t-generation population, l is the length of individuals in the population, pm is the mutation operator and pc is the crossover operator [2].

2.1 Selection Operation in Genetic Algorithm In the genetic algorithm, the real number coding method is used. After selection, the m(H, t) of the offspring individuals can draw the following conclusions: m(H, t + 1) = m(H, t)

f (H, t) F(t)

(1)

The hypothesis of c-times (1) is rewritten as follows: m(H, t) = m(H, 0) × (1 + C)t

(2)

According to formula (2), if C > 0, the population growth m (H, t) shows an exponential growth pattern, otherwise it decreases exponentially.

2.2 The Function of Crossover Operator Under the action of basic bit mutation operator, the survival probability ps is: ps ≥ 1 − O(H ) · pm

(3)

Mathematical Model of Genetic Algorithm Based on Pattern Theorem

1165

It can be concluded that the smaller the O(H), the greater the survival probability ps and O(H), the more difficult it is to survive.

3 Genetic Algorithm Based on Logic Operator and Its PCS 3.1 Logic Operation of Gene In binary GAs, the “0” and “1” in gene are usually treated as symbols, thus losing their function as a logical state [3]. Here, gene “0” and “1” are regarded as two logical states and given four logical operation functions: and, or, identical or, exclusive or.

3.2 Fusion Inheritance of Genes In order to overcome the shortcomings of the conventional mutation operator, a binary mutation operator with better performance is proposed in the paper. The genetic algorithm based on bionics adopts the order of “hybridization” and “mutation” in genetic operation. Therefore, there is no obvious evidence whether the birth of life really experienced these two relatively independent processes. The author’s view is: in the process of chromosome formation, hybridization and mutation exist at the same time, only under certain conditions, One of these genetic patterns plays a major role. Figure 1 shows the optimization region of galo genetic probability. Fig. 1 Genetic probability optimization domain

1166

J. Zhang

4 Building Block Hypothesis, Implicit Parallelism and Convergence 4.1 Building Block Hypothesis The building block is a mode with low order, short definition distance and high fitness. In the process of solving, genetic algorithm combines with each other through some better modes and splicing way like building blocks, so as to construct the mode with high long order and high fitness, and gradually generate the global optimal solution.

4.2 Implicit Parallelism In the process of improving the implicit parallelism genetic algorithm, in addition to the long high-order patterns destroyed by crossover and mutation operators, the genetic algorithm implicitly processes a large number of patterns [4]. When the number of strings is relatively small, for example, when the number of variables is n, it is a population of length with 2L to n × 2L different iterative patterns, The number of patterns generated by iteration is larger than the number of individuals of variables. The pattern theorem created by Professor Holland deals with the number of iterative patterns as ν (n3 ). According to the implicit parallelism, the pattern theorem states that all patterns will not be treated with high survival probability. Therefore, individuals should have relatively large differences when initializing the population, The diversity of individuals in the population will also be increased by introducing a new mutation operator.

4.3 Astringency Convergence the convergence of genetic algorithm is a key problem related to whether the algorithm can be realized. It usually means that the maximum or average value of its fitness function tends to the optimal value of the optimization problem with iteration, The probability of convergence of the genetic algorithm with improved selection operator, crossover operator and mutation operator is 98%, and the minimum error obtained is less than 2%. It is considered that the optimal individual is found, which provides a guarantee for the iterative process of seeking the optimal solution, The results of each iteration run are different, so we should constantly look for the deficiencies in details, and strive to make the results tend to be stable.

Mathematical Model of Genetic Algorithm Based on Pattern Theorem

1167

5 Surface Shape Error Calculation Based on Genetic Algorithm In essence, it is a complex nonlinear optimization problem to evaluate the shape error of standard function surface and complex surface according to the minimum area method, which is difficult to be calculated by traditional methods. Therefore, the calculation of shape error of complex surface contour based on minimum area method is an unsolved problem. In this chapter, the normalized real coded multidimensional parallel genetic algorithm proposed by the author is used to calculate the shape error of complex curved surface. It is an optimization problem to calculate the minimum distance from the measuring point to the theoretical surface contour. In this chapter, the mathematical model of the minimum distance between the measuring point and the theoretical surface contour is established. According to the characteristics of the practical problem, the method of evenly distributing the collection points in the feasible region of the theoretical surface contour is proposed, Based on the distance between the measured points and these acquisition points, the minimum distance from the measuring point to the theoretical contour is preliminarily found, and then the DFP variable scale method, a widely used multivariate function optimization method, is used to accurately calculate the minimum distance from the measuring point to the theoretical surface contour. This method has important practical value.

6 Conclusion So far, there is no theoretical guiding principle for the parameter selection of genetic algorithm. This paper studies the influence of the formation probability of pattern on the performance of genetic algorithm, and points out the relationship among the performance of genetic algorithm, the probability of pattern formation and the parameters of genetic algorithm, On this basis, a new method, galo, is proposed to determine the range of parameter selection by using the probability of pattern formation. The theoretical analysis and experimental study of galo fully verify the effectiveness of the method. Since the genetic operator in galo adopts the most commonly used logic operation in digital circuits, it is possible to realize galo with conventional logic gates, so it has a great application prospect.

References 1. Wang, H., Feng, Y.: Research on the specification of complex decision making problems based on cloud and or tree. J. Harbin Inst. Technol. 7, 131–134 (2007) 2. Dong, J.: Comparison and analysis of dynamic programming algorithm and greedy algorithm. Softw. Guide 2, 129–130 (2008)

1168

J. Zhang

3. Xu, Z., Song, B., Dong, J.: Research on solving large scale TSP problem by ant algorithm and simulated annealing algorithm. Comput. Eng. Sci. 10, 43–44 (2008) 4. Yang, M.: Analysis of several classical algorithms of intelligent computing. Comput. Knowl. Technol. Acad. Exch. 15, 816–820 (2007)

Optimization of Database Security Mechanism in the Supporting Platform of Distance Education Xiao Yin

Abstract Starting from the basic concept of cloud computing, this paper discusses the basic functional architecture and service model of cloud computing, expounds the basic status quo of cloud computing application in education and teaching, analyzes the problems existing in the application of cloud computing in Guangxi Radio and TV university system distance teaching, puts forward corresponding solutions, and explores the reform of distance teaching mode of law courses. It is of great significance to accelerate the application of cloud computing in other distance education courses. Keywords Cloud computing · Distance learning · Education cloud service · Law course

1 Introduction With the rapid development of information society, information technology has penetrated into various fields, and various complex computing models have changed from single large-scale processor to distributed processing, and then to the “cloud” model which is now processed according to the needs. In this context, cloud computing emerges as the times require. As a new computing model, it provides data, resources and application systems to users through network technology in the way of service [1]. Using grid, virtualization, distributed storage and other technologies to achieve information resource integration, unified integrated management, on-demand access to computing resources, data storage resources and application software resources [2]. At present, in the application process of education and teaching, students can obtain the virtual learning resources in the cloud through the network at any time and place. However, there are also various problems in the application. Aiming at these problems, this paper analyzes the problems existing in the application of cloud computing and cloud classroom in distance teaching in Beihai radio and Television X. Yin (B) Ji Lin Justice Officer Academy, Changchun 130062, Jilin, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_146

1169

1170

X. Yin

University, This paper puts forward feasible solutions and explores the application of distance virtual teaching mode in combination with the teaching problems of law course in TV University.

2 Basic Concepts of Cloud Computing 2.1 Definition of Cloud Computing At present, there is no accepted definition of cloud computing. According to the definition of NIST, cloud computing can be understood as a network that uses millions of server clusters to provide global users with social computing services. With resource leasing, application hosting and service outsourcing as the core, cloud computing provides fast and convenient access to shared computing resource pools according to needs (including network information resources, server hardware and software resources and storage resources) model, which can provide rapid allocation and release of resources with minimal management cost and interaction with server operators, and use any terminal connected to the Internet to access shared services and resources at any time and any place. In the industrial and academic circles, such as IBM , Microsoft and University researchers have also put forward a similar definition [3]. The three-tier service model is the core architecture of cloud computing, including infrastructure as a service (IAAs), platform as a service (PAAS) and software as a service (SaaS), as shown in Fig. 1. According to the above definition, we can summarize that cloud computing is the development of parallel computing, distributed computing and grid computing, which users can get the services they need through the network in an on-demand and easy to expand way. It has the characteristics of mass data storage and computing ability, virtualization technology, resource sharing ability, high flexibility, dynamic allocation and so on. Cloud computing will provide convenience for human life and social activities, and the fields of service will be more extensive. The most concerned is the application of cloud computing in education and teaching, which can be understood as an education oriented industry cloud, providing targeted services for people in the field of education. It is a subclass of Education technology system, and also a subclass of cloud computing application system, called education technology system Yuyun. The application of cloud computing in the field of education is becoming more and more diversified, but there are also various application problems that need to be solved.

Optimization of Database Security Mechanism in the Supporting …

1171

Fig. 1 Microsoft cloud computing infrastructure

3 Problems and Solutions of Cloud Computing in Distance Education In recent years, the national education authorities have increased their investment in distance education, and the provincial radio and television universities have also increased their investment in information-based teaching year by year. With the help and guidance of higher authorities and the strong support of school leaders, Beihai radio and TV University has built a cloud classroom system connected with the National Open University and a mobile optical fiber network directly connected with Guangxi Radio and TV University. The teaching infrastructure has been improved, laying a good foundation for the normal development of distance education and teaching activities in Beihai. The biggest obstacle for TV University to use cloud computing technology for distance education lies in the construction of soft environment. The specific problems are as follows: The utilization rate of distance education teaching facilities is low. Due to the influence of the management structure of distance education, the reform of teaching mode is relatively slow, and the traditional teaching mode is still the main mode. Teachers give students face-to-face teaching, and the learning efficiency is low. On the one hand, most of the teachers of Beihai TV University are non information professional teachers. Their teaching skills of information technology are not high, their hardware and software platform operations are not proficient, and without professional skills training, some teachers give up the use of digital resources and cloud classroom for distance teaching, which objectively restricts the application of cloud computing in

1172

X. Yin

classroom teaching. On the other hand, most of the students are from the community and the countryside, with a large age difference. There are young students and older students, and most of the students have families and jobs. They can’t carry out professional learning like full-time students, and can only rely on night or weekend time for centralized face-to-face teaching, which leads to the long-term vacancy of teaching equipment and places. The use rate of teaching facilities is low. There are few teaching resources to use cloud computing for education. At present, the provincial radio and Television University and the national development headquarters have not been able to establish a complete teaching resource base and a stable multi-functional online learning platform. Some teachers have insufficient experience in digital teaching, and the production of electronic teaching documents is inefficient and ineffective. They have not developed specific resources for students in a certain region and with different degrees of education. The update of teaching knowledge points is slow and there is no diversity. The types are not rich enough and the utilization rate is low. Cloud classroom and technical personnel are not strong in business ability. With the rapid development of cloud classroom and cloud computing technology, equipment and technical maintenance personnel do not master and understand the latest information technology and basic theory, equipment operation is not proficient and parameter setting is wrong, and teaching equipment is not used in strict accordance with the operation process and specifications, which to a certain extent increases the failure rate of equipment. Poor network bandwidth and equipment compatibility. Due to the limitation of unstable network bandwidth and poor equipment compatibility, some equipment models of branch schools, general schools and national development headquarters are different, which makes it difficult for technical maintenance personnel to accurately judge the equipment failure. Therefore, the use of cloud services and cloud classroom teaching lack of reliable technical support.

4 Virtual Teaching Mode of Law Course Based on Cloud Computing and Cloud Classroom Cloud computing technology promotes the rapid development of distance education, and promotes the profound change of distance teaching mode. It takes interaction and sharing as the core, service support and classroom teaching as the main body, and with the help of advanced technology to break the limit of learning space, endow students with more initiative, and advocate students’ learning mode to be personalized learning and group assistance based on learning resources and problem-solving. It supports both in school and out of school learning, formal learning and informal learning. It provides a digital learning environment for learners’ classroom learning, personal self-study, deliberative learning and learning at work. In order to fully meet the teaching needs of Guangxi distance education and each branch school. Constantly

Optimization of Database Security Mechanism in the Supporting …

1173

improve the construction of information education infrastructure, promote the interconnection of information resources construction between the head office and branch schools, explore the use of information technology, and realize the transformation from the traditional teaching mode to the virtual network teaching mode with the characteristics of simulation, resource sharing and multi-dimensional interaction.

4.1 The Basic Structure and Functions of Cloud Classroom Cloud classroom is mainly composed of two parts: terminal system and control management system. The terminal system consists of three levels: headquarters cloud classroom, branch cloud classroom and grass-roots cloud classroom. The control management system consists of headquarters general control center and branch sub control center, with online face-to-face teaching and long-range realtime teaching (synchronous teaching in different classes), real-time recording and broadcasting of courses, live online teaching, video conference, remote interview and reply, video monitoring of online examination and examination, real-time sharing of resources, collaborative teaching of teachers’ team, multi-site teaching and discussion, etc., which can support and meet the development of teaching, meeting, examination and other teaching businesses under various network conditions, are integrated learning, testing, examination Process monitoring and other functions are integrated to provide learners with multi terminal, all-round learning services and environmental experience, as shown in Fig. 2.

Fig. 2 Overall structure of cloud classroom

1174

X. Yin

At present, cloud computing is still facing many difficulties in the process of teaching promotion to other professional courses. Especially in the law major of Guangxi TV University, the number of students is relatively large and their knowledge level is different. In addition, in the online distance teaching platform of RTVU, there are about 80 courses for law undergraduate and junior college majors. These courses mainly include course description, teacher introduction, syllabus, implementation plan, teaching guidance, three screen courseware and three parts of course guidance, detailed explanation of course content and final guidance. MP3 Audio courseware, IP Network courseware, live broadcast classroom and so on 9 sections, in order to facilitate curriculum and answering questions between teachers and students, each course has its own independent curriculum forums, which mainly include new posts, elite areas, favorites, latest topics, latest replies and recent post users. However, this kind of network learning platform with simple accumulation structure of resources is difficult to meet the teaching of some courses of law major. Students can only obtain knowledge from text or boring course explanation video, unable to get rid of the traditional teaching mode. The teaching efficiency is relatively low, and the teaching effect is relatively poor. Through the teaching of law course, this paper studies and explores constantly in practice and summarizes experience. From the perspective of course teaching, it is believed that the use of cloud services and cloud classrooms for the construction of virtual teaching resources, the creation of virtual courts for simulation teaching, to a certain extent, adapt to the teaching practice of the part of the course of law major.

5 Conclusions To sum up, the application of cloud computing in distance education is still in the exploratory stage. Due to the different levels of economic development and education, the application of cloud service concept in teaching is restricted. There are many problems in distance teaching activities. However, with the increase of infrastructure construction, the development and use of education and teaching resources are more standardized, and related problems will also be solved. With continuous solutions, the dissemination of digital teaching resources has become smooth. Information technology has promoted the transformation from traditional teaching mode to information-based and virtual teaching mode, and carried out more flexible and diverse distance teaching activities, bringing professional, efficient, convenient and low-cost information services to distance education teaching, which will produce a new distance education operation closer to the application of distance education pattern.

Optimization of Database Security Mechanism in the Supporting …

1175

References 1. Zhang, H., Yang, C.: Research review of cloud computing education application in China. China Distance Educ. 1 (2013) 2. Boss, G., Malladi, P., Quan, D., et al.: Cloud computing [EB/OL]. IBM White Paper. http//download.boulder.ibm/ibmdl/pub/software/dw/wes/hipods/Cloud_computing_Wp _final_Eightyct.pdf (2007) 3. Zhang, J., Wu, H.: Summary of cloud computing core technology research. Minicomput. Syst. 11 (2013) 4. Zhang, J., Gu, Z.: Review of cloud computing research progress. Comput. Appl. Res. 2 (2010)

Legal Issues of SaaS Model in Cloud Computing Fen Li

Abstract In recent years, with the promotion and development of cloud computing technology, the business model of software as a service (SAS) is rapidly changing the way people use software. By providing users with “pay as you go” online software services, the business model of SAS software not only saves the costs of purchasing, installing, maintaining and upgrading software, but also brings new legal problems that do not exist in the traditional software business model. In terms of the content of software copyright protection, the business model of SAS software has broken through the current copyright bundle. How to find its position in the copyright system needs institutional response; the service subscription software licensing mode enables the obligee to achieve unprecedented control over the dissemination of works, leading to the public no longer having the opportunity to obtain copies of works, As a result, it is necessary for the copyright law to make adaptive adjustments to restore the balance of interests. Keyword Software as a service · Copyright · software licensing · user agreement

1 The Concept of Cloud Computing The definition and connotation of cloud computing have not been unified in the academic and industrial circles. Currently, the interpretation of NIST is widely used, that is, cloud computing is a model of centralized computing resources and efficient allocation, Using this model, a common computing resource pool (including network, storage devices, servers, applications and services) can be easily accessed according to users’ needs; these resources can be rapidly deployed and provided, while minimizing management costs and interference from service providers[1]. The definition accurately reflects the core concept of cloud computing, that is, the separation between “cloud” and “end” and resource reallocation: the computing power is gathered in the “cloud” (i.e. remote large server cluster), and based on modern information F. Li (B) Hainan Radio and Television University, Haikou 570000, Hainan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_147

1177

1178

Fen Li

Fig. 1 Basic framework of cloud computing

network, the centralized management and intelligent scheduling of large-scale pool resources are made by using core technologies such as distributed computing and virtualization; One side of the “end” is to access equipment through mobile phones, computers and other user end networks to access resources according to demand, thus greatly improving the management and utilization efficiency of computing resources. As shown in Fig. 1, the basic framework of cloud computing.

2 SaaS Model Service Correlation Service support refers to the frequency of service used by tenants in SaaS software. If the frequency is higher, the service is used more times, or the service participates in more business processes in SaaS software. Therefore, support is a measure of the importance of services in SaaS software. For service support, if the tenant behavior set TBS = {tb1 , tb2 ,…, tbn } and there are n tenant behaviors in the collection, the count of TBS is count T B S = n. If both T B1 and T B2 contain ser vice; then ser vicei Finally, the support of ser vice2 is support support (servicei ) = 2/n. suppor t(ser vicei ) = p(ser vicei ) =

count(ser vicei ) count(T B S)

(1)

3 Analysis of Legal Issues of SAS Software Business Model Under the Current Copyright System 3.1 Core Copyright Protection Items of Traditional Software Business Model From the origin of luxury copyright law, its birth is closely related to the emergence of printing. With the popularity of printing and its wide use for commercial purposes, the piracy of books began to spread, eroding the channels of dissemination of works officially authorized by copyright owners. In order to ensure that the copyright owners can get their due remuneration in the dissemination of their works, Britain promulgated the Anna act in the eighteenth century, which created the modern copyright system, and endowed the copyright owners with the right to copy works. Its English

Legal Issues of SaaS Model in Cloud Computing

1179

counterpart “copyright” reveals the essence of the exclusive right of reproduction. “In terms of the historical evolution of software copyright protection, the main way of software infringement is to make pirated carriers and sell them on the market. The core copyright items of copyright protection in the distribution stage of boxed software are the copy right and distribution right of software copyright owners [2]. However, due to the development of the rental industry and a large number of private reproduction problems, the exercise efficiency of the copyright right centering on “copy right + distribution right” has dropped sharply. Therefore, the rental right system came into being to maintain the ecological balance of copyright mechanism.

3.2 The Business Model of SAS Software Brings New Problems to the Current Copyright System However, when the academic circle has not reached an agreement on the boundary between the right of information network dissemination and the right of distribution, whether there is a difference between network distribution and network communication, and whether the second-hand digital works are applicable to the exhaustion of distribution right, the new software utilization mode of SAS appears again, which changes people’s use of software works from tangible possession to direct experience [3]. On the basis of cloud computing technology, only a copy of a work needs to be prepared in the virtual data center to provide software services for multiple users. Users submit processing tasks and get data processing results through the browser. This work utilization behavior is no longer covered by the traditional copyright property rights, The copyright law provides that the two pillars of the copyright law are the right of reproduction and the right of communication.

4 Comparative Analysis of Solutions Under the Current Copyright System 4.1 The Feasibility of Incorporating the Right of Information Network Dissemination Article 10 (1) (12) of China’s copyright law defines the right of information network transmission as “providing works to the public by wire or wireless, so that the public can obtain the rights of works at the time and place selected by themselves”. This definition is also applicable to software works. The two elements of “wired or wireless” and “time and place selected by individuals” are available in the business model of SAS software. Therefore, the key point of whether this right can be applied to the mode of using SAS software is how to understand the meaning of “obtaining”, that is, the so-called “obtaining works” should be interpreted in a broad sense, that is,

1180

Fen Li

including the use of tangible forms of non acquired works such as browsing, visiting and contacting works, Or the more narrow interpretation: that is, at least potentially implies the possibility that the public can obtain tangible copies of works. If it is the latter, then the business model of SAS software obviously goes beyond the scope of the regulation of the right of information network dissemination.

4.2 A Possible Way to Reconstruct the Connotation of Leasehold Under the Current Legal System Combined with the current academic research results, the author believes that it is of great value to reconstruct the connotation of lease right under the current legal system to include SaaS software business model, and to optimize the current copyright system in China. According to an important standard put forward by Professor Li Chen for the classification of copyright rights: “if the public perception of the impact of works on the interests of copyright owners is the same, it means that the legal consequences are the same, which can be classified into the same fact constitution”; If we apply the property of “temporary paid license works” to the authorization mechanism of SAS business model positively, Then the structure of copyright property rights can be shaped as a three pillar right system, which is characterized by the right of reproduction and distribution (characterized by the transfer of tangible forms and permanent use rights of works), the right of lease (characterized by the temporary right to use the transferred works) and the right of communication (characterized by the immediate perception of the public). Moreover, this new right structure can be divided into three levels according to the degree of copyright owner’s control over the dissemination of works, the public perception and the way of using works.

4.3 Responsibility Regulation of Cloud Service Providers as Platform Providers In order to integrate the upstream market resources and improve the competitiveness of the website, some SAS software suppliers gradually began to provide API open program interface for the third-party independent software developers, who directly provided software services to users on the platform of cloud service providers, which also provided better platform resources and market resources for third-party independent software developers, It is the development trend of SAS industry. However, at the same time, cloud service providers often avoid the responsibility of software availability in user agreements. For example, Huawei’s user agreement stipulates that “Huawei has no obligation to test or screen third-party services, and users shall bear their own risks when using any third-party services.” Taobao’s open platform service

Legal Issues of SaaS Model in Cloud Computing

1181

agreement stipulates that “users understand and agree that the only person responsible for the service provider’s application is the service provider [4]. Taobao is only the place or way to order or use the service provider’s application, and the owner (and operator) of Taobao shall not be liable to the user for the service provider’s application.

5 Conclusion As the “cloud” and “private sector” have begun to move to the “public sector” and “private sector”. However, this new mode not only improves user experience and reduces user cost, but also brings many legal problems to be solved. Especially with the cloud computing industry becoming more and more important in the strategic development of various countries, compared with the advancement of technology development, the legal system is facing the dilemma of lagging behind in balancing the interests of all parties. The author of this new software business model in copyright protection content, licensing mechanism and online software services related to the nature of cloud user agreement, legal application and format terms regulation and other issues, trying to sort out the triple legal relationship involved in this business model, and provide preliminary suggestions for achieving the balance of interests of all parties.

References 1. See, S.Y.: For an analysis of copyright issues in cloud computing. Internet Leg. Commun. 7(3), 84–85 (2011) 2. Wu, H.D.: Research on the Basic Issues of Intangible Property Rights, 3rd edn. China Renmin University Press, Beijing (2013) 3. Feng, X., Fu, J.: Study on the right of reproduction in copyright law. JURIST 201(3:103) 4. Li, Y.: Examining the right basis of copyright from “copying” to “spreading”. China Publishing (12), 25–28 (2012)

Network Security and Computer Virus Prevention in the Internet Liang Zhao

Abstract Computer network technology has been developed in the use of life, because of its open environment, the industry has dependence on the technology, therefore, do a good job of computer network security measures pool is conducive to create a good and healthy network environment, promote the development of various industries with the help of this technology, so as to make the whole society progress. This paper first introduces the necessity of implementing network security prevention, points out the common problems in network security prevention at the present stage, and puts forward preventive suggestions from three aspects of network itself, users and managers, and network environment for reference. Keywords Computer · Network risk · Artificial intelligence · Intrusion detection · Density peak

1 Introduction Network technology not only brings resources and information exchange platform for netizens, but also provides channels for criminals to commit crimes. The computer network has been improved in the use of computer network, and has been widely used in the promotion, which should continue to be such a virtuous cycle. However, due to the frequent outbreak of adverse network events, resulting in the loss of data and wealth, people began to be cautious about network technology. In the face of complex information network environment, it is necessary to keep a clear and alert mind, but too careful will inhibit the development of network technology and social progress. Therefore, rational understanding of the necessity of network security protection and taking correct protection measures are conducive to the maintenance of industry development and social and economic stability.

L. Zhao (B) Ji Lin Justice Officer Academy, Changchun 130062, Jilin, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_148

1183

1184

L. Zhao

2 The Necessity of Network Security 2.1 Complex Network Information The network has inserted the wings of high-speed flight for the transmission of information, instant messaging is no longer imagination [1]. The negative impact is that the network information is becoming more and more complex. People should not only find the valuable content from the new mass information, but also screen the garbage and virus carrying information one by one. If there is no higher awareness of network security and identification ability, it is easy to fall into the network trap, resulting in loss of reputation and money. Therefore, in the face of more complex network information environment, the implementation of network security measures is very necessary.

2.2 High Penetration Rate of Network Technology At this stage, under the circumstances that the daily work and life of netizens need network technical support, improving the awareness of network security management and prevention, and jointly maintaining the rule of law and healthy network environment can effectively reduce the probability of adverse network events. In particular, the use of network platforms to select suitable goods has become the main way of Chinese Internet users’ shopping. The popularity of Gangluo technology in the life of netizens is relatively high. Online shopping software and websites emerge in an endless stream. When people conduct transactions, they often involve more private personal information [2]. Once the information is leaked, it will affect personal reputation and capital, It will bring adverse consequences.

2.3 System Software Vulnerability System and software vulnerabilities are the design or logic defects of network technicians in programming. After the old vulnerability is repaired, the new vulnerability will occur again. Therefore, the leakage problem is accompanied by the life-long use of the system or software. Developers need to constantly find the vulnerability and issue patches to repair, and users download and install them by themselves. On the one hand, users find design defects in the system or software in the process of using, so that developers can better maintain it.

Network Security and Computer Virus Prevention in the Internet

1185

2.4 The Awareness of Network Security is Poor Poor awareness of network security protection refers to not only users, but also some network managers. For example, some network managers did not timely check and kill the virus that can be hidden in the system or did not upgrade the firewall. Some companies have internal networks that connect all of their computers. Once a computer is infected with a virus, it is very likely to infect a large area of the system. When employees use network technology to assist in office work, they have not received the systematic network security course, and most of their network prevention knowledge is obtained from the usual news.

3 Machine Learning Technology In a broad sense, machine learning is a method that can give machine learning the ability to complete functions that cannot be accomplished by direct programming. But in the practical sense, machine learning is a method of training models by using data, and then using models to predict. It is mainly divided into four categories, namely supervised learning, unsupervised learning, semi supervised learning and reinforcement learning. Intrusion detection mainly uses supervised learning to detect the intrusion of dangerous computers [3].

3.1 k-Nearest Neighbor In pattern recognition, k-nearest neighbor algorithm (kNN) is a nonparametric method for classification and regression. The input contains k nearest training samples in the feature space. The output depends on whether kNN is used for classification or regression. In kNN, the output is a member of a class. Objects are classified by a majority vote of their neighbors, and objects are assigned to the most common class of their k-nearest neighbors (k is a positive integer, usually small). If k1, then the object is simply assigned to the only nearest neighbor class. kNN is a case-based learning or lazy learning, where functions are approximated locally and all calculations are deferred to classification (Fig. 1). The training example is a vector in a multidimensional feature space, and each vector has a class label. The training phase of the algorithm only stores the feature vector and class label of the training samples. In the classification stage, K is a userdefined constant, and unlabeled vectors are classified by assigning the most frequent tags among the K training samples closest to the query point. Euclidean distance is a common measure of distance. For discrete variables, such as text classification, another measure, such as overlap measure (or Hamming distance), can be used. The accuracy of nearest neighbor classification can be significantly improved by special

1186

L. Zhao

Fig. 1 Demonstration of k-nearest neighbor algorithm

algorithms such as large interval nearest neighbor or neighborhood component analysis. European distance:   n  d(x, y) =  (xk − yk )2

(1)

k=1

Manhattan distance:   n  |xk − yk | d(x, y) = 

(2)

k=1

When the class distribution is skewed, a disadvantage of the basic majority voting classification appears. In other words, instances of more frequent classes tend to dominate the prediction of new instances, because they are common in a large number of k-nearest neighbors [4]. One way to overcome this problem is to consider the distance between the test point and each k-nearest neighbor. Each class of k nearest points is multiplied by a weight that is inversely proportional to the distance from that point to the test point. Another way to overcome skewness is abstraction in data representation. For example, in a self-organizing map, each node is a representative of a similar cluster, regardless of their density in the original training data. The main advantages of kNN are: mature theory, simple thought, can be used for classification and regression; can be used for nonlinear classification; training time complexity is O(n); no hypothesis for data, high accuracy, and insensitive to edge points.

Network Security and Computer Virus Prevention in the Internet

1187

3.2 Support Vector Machine Support vector machine (SVM) is an implementation of support vector machine (SVM) for pattern recognition. The optimization algorithm of support vector machine is described. The algorithm has scalable memory requirements and can effectively deal with thousands of support vector problems. Here are some basic concepts about support vector machines. Vector multiplication: xω = T

n 

ωi xi

(3)

i=1

Inner product: x, y =

n 

xi yi

(4)

i−1

4 Conclusion Most of the common network computer problems are for the benefit of network lawbreakers, who directly write virus programs to interfere with normal network equipment. In addition to enhancing citizens’ awareness of prevention, timely discovering and maintaining the loopholes in the system, and building a more powerful network firewall system, it is also necessary to correctly guide citizens to use network technology and strengthen the purification of network environment. In order to promote network technology to better serve the economy and the people. It is clear that there is no difference between network life and real life, and cyber crime also needs to accept corresponding legal punishment and moral condemnation. By listing the positive and negative network events as a comparison or making a series of network crime courses, the authoritative media can promote and publicize, highlight the advantages of a good network environment, call on netizens to consciously maintain the network environment and guide them to treat network technology correctly.

References 1. Ran, X.: Analysis of threats to computer network security and preventive measures. Comput. Prod. Circ. 05, 59 (2020)

1188

L. Zhao

2. Huang, R.: Analysis of influencing factors and preventive measures of computer network security technology. China New Commun. 22(05), 124 (2020) 3. Yu, L., Wang, Y.: Discussion on computer network security technology analysis and preventive measures. Comput. Fan (12), 158, 2 (2017) 4. Wang, C.: Analysis of computer network security and preventive measures under the background of big data. Inf. Comput. (Theoretical Edition) 15, 221–222 (2018)

Evaluation of Human Resource Management Benefit Based on Neural Network Zhi Li

Abstract In the twenty-first century, human beings ushered in the information age. In the process of people’s life and production, we can’t do without the application of information technology. Cloud computing is also born in time. In the development of an enterprise, human resource management is very important. Therefore, enterprises should keep pace with the times and use cloud computing to carry out human resource management, so as to better promote the development of enterprises. Based on this, this paper analyzes the new model of configurable human resource management based on “cloud computing”, in order to change the traditional human resource management model and better meet the development requirements of modern enterprises. Keywords Cloud computing · Configurable · Human resources · New model

1 Introduction In recent years, under the background of the rapid development of Internet technology, cloud computing technology has been born and developed rapidly. In order to maintain competitiveness in the fierce market competition, many enterprises have begun to use cloud computing technology to improve their operational efficiency, complete enterprise management through cloud services, so as to maintain their core competitiveness. At present, many enterprises have begun to use cloud technology to build a modern human resource management system. Through cloud computing technology, the human resources of enterprises can be configured, so that the human resources of enterprises can be reasonably allocated, and then improve the level of human resource management [1].

Z. Li (B) Guangzhou International Economics College, Guangzhou 510540, Guangdong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_149

1189

1190

Z. Li

2 The Development and Problems of Human Resource Management System Human resource management system has experienced three important historical stages. In the first stage, the human resource management system first appeared in the 1960s. In this period, the main function of the human resource management system is numerical calculation, which is to calculate the wages of personnel. The second stage, in the 1980s at the beginning of the s, the database technology in this period developed rapidly, which effectively solved the problem of data storage and management. However, because of the relatively slow development of the management theory at that time, that is to say, the concept of human resource management was not included in the demand analysis of system development, which led to the collection of human resource data and the generation of information in this period More one-sided and unscientific [2]. The third stage, in the 1990s At the end of S, the computer technology in this period has been rapidly developed and popularized, and the theories related to Internet technology, database technology, communication technology and management science have also been developed at a high speed. This has resulted in the algorithm based on management theory, modern computer information technology, overall planning and Mathematics, system theory and management science. Philosophy as the main idea of human resource management system, human resource management has been rapid development, and provides information and data support for the decision-making of enterprise managers, but with the continuous development of social economy in China, this management system has been unable to meet the development needs of modern enterprises, mainly reflected in the following points: the existing human resource management system. There is isomerization in the unified data source, which will make the degree of data sharing insufficient; with the continuous development of human resource management, unstructured data is increasing, which makes the management system lack of high-level management; the existing human resource management system has a single functional structure, which is also very important in talent recruitment, talent evaluation and salary performance management Large development space and narrow functional coverage.

3 Research on the New Model of Configurable Human Resource Management Based on “Cloud Computing” In the human resource management information system, the data source is very extensive, and the quantity is very large, the variety is various, the isomerization data is many, this also causes the human resource management system to have no way like the financial management system and the industrial process management system, forms the unified standard, but if uses the cloud computing technology to the data in the human resource information management system. By calculating, the system can be standardized, scientific and efficient management.

Evaluation of Human Resource Management Benefit …

1191

3.1 Data Collection of Human Resource Management Under Cloud Computing The data management under big data technology mainly focuses on the storage, analysis and processing of massive information, but the data management under cloud computing technology mainly focuses on the way of data calculation. Human resource management information system has a large amount of data and a wide range of types, which makes the whole information network sources and hostels will continue to increase, resulting in more and more information generated in the system, which is the generation of big data. The data collection layer in cloud computing is to collect the data in the process of recruitment, production and marketing. Some of these data are structured and some are unstructured. Then the data is transformed and transferred to the communication support layer. The processing of data here needs to be combined and transformed according to certain requirements of elements that have inevitable connection. Therefore, the data collected in the human resource management system under cloud computing can guarantee the “quantity” and “quality” of data [3].

3.2 Human Resource Decision Management Under Cloud Computing The decision-making function of human resource management information system based on cloud computing and big data is mainly to mine, analyze, process and calculate the system data in-depth, and then provide important information support for the decision-making of enterprise managers, so that the management level of enterprises can be effectively improved, and the decision-making of enterprises can be more standardized, scientific and accurate Improve the efficiency and level of enterprise management, maintain the core competitiveness of the enterprise, and promote the long-term development of the enterprise. The decision-making layer of human resource management system under cloud computing mainly consists of decision-making information resource pool, decision-making information analysis platform and decision-making information service. It integrates the data of each level and each node, and optimizes the data, so as to provide periodic and random services for the end-users. In a word, the decision-making information service under cloud computing service is to transform big data into charts, analysis reports and tables to provide scientific data services for decision-makers according to their needs.

1192

Z. Li

4 Conclusions To sum up, in this information economy, if enterprises want to get long-term development, they must combine enterprise management and information technology, so that they can survive and develop in the fierce market competition. Human resource management is the core content of enterprise management. It is an important attempt and application for enterprises to manage human resources through cloud computing. Cloud computing management can break the defects of the original information system, such as single function, unclear management idea and poor decision-making ability, and also can realize the comprehensive application and cooperation of multiple data, which can effectively meet the requirements of different managers in different management systems for decision-making information, thus greatly improving the level and efficiency of enterprise human resource management.

References 1. Ma, H., Wang, J.: Configurable human resource management information system based on cloud computing. Logistics Eng. Manage. (2), 121–122 (2014) 2. Li, Y.: Research on Human Resource Management of Small and Medium-Sized Enterprises Based on Cloud Computing. Inner Mongolia University of Technology, Hohhot (2015) 3. Han, J.: Design and analysis of configurable human resource management system under cloud computing. China Manage. Inf. 4, 48–49 (2018)

Application of Deep Learning in Keyword Extraction in English and American Literature Haimin Qian

Abstract With the advent of the information age, many new science and technology have been created. Computer network has been chased by people because of its express information, high accuracy of information and no longer the expression of information. In the teaching of British and American literature, the teaching mode based on computer network can change the mode teaching mode that people can only rely on the text, so that the teaching can develop to multi-mode. Students in multimodal teaching can also change the single way to acquire knowledge, and then can learn knowledge, accumulate knowledge, use knowledge and update knowledge from a variety of methods. At the same time, this paper also discusses that the multimodal English and American Literature Teaching Based on computer network can lead to the loss of cultural loss. Keywords Computer network · Multimodality · English and American literature teaching · Cultural deficiency

1 The Conception of Multimodal English and American Literature Teaching 1.1 The Theoretical Basis of Multimodal Teaching The mixture of different kinds of symbolic modes in a communication activity or finished product is called multimodality. In addition, it can also represent the way to mobilize various symbolic modes to form a certain meaning in a specific text. Multimodal teaching uses a variety of teaching methods, advocates using pictures, videos, music, network and role-playing to stimulate students’ interest in learning, mobilize students’ senses as much as possible to carry out language learning, and advocates encouraging interaction between students and teachers in teaching activities. When H. Qian (B) Xi’an Peihua University, Xi’an 710125, Shaanxi, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_150

1193

1194

H. Qian

the teaching conditions allow, it is advocated to combine text teaching materials, literary works, Internet music and the Internet to create a multimodal combination of words, colors, sounds and pictures. The emergence of computer network provides convenient conditions for the teaching of multimodal English and American literature. As we all know, computer network has a large number of resources, which provides rich teaching resources for teaching. Teachers can use computer network to develop teaching content. At the same time, rich teaching resources can provide students with a variety of ways to learn and use English. This curriculum resources close to students’ daily life can help students understand the times and enrich students’ knowledge in learning. Therefore, multimodal teaching based on computer network can make use of the resources provided by network to realize the change of modal teaching.

1.2 The Characteristics of English and American Literature Teaching The curriculum of British and American literature generally has a specific situation and an attractive plot. If the two characteristics are expressed only by text, they will get the best effect. The situational performance of English and American literature course is that the reader can display his imagination, combine the content of the text, have a specific image in his mind, can “see” the Eden that Adam and Eve live in, which is built by God himself, can “ascend” the magnificent palace of Hamlet, can “step” on the beach that Robinson has stepped on, and can see his gaze far away. The existence of this kind of scene endows the text with powerful life, and also enables the text to fuse a variety of information such as voice, color, image, etc., which realizes the change from single mode to multi-mode. The computer network can provide a variety of modalities for English and American literature courses including words, colors, sounds and images. In this process, students’ senses of hearing, touch and vision are mobilized, so that students are no longer bored in learning, and help students’ memory as well. In the Bible, Adam and Eve are driven out of the garden of Eden by God because of the irresistible temptation. After many tribulations, Hamlet, who died in revenge, Faust, who sold his soul, and the helpless “old man” who fought bravely, all have their own characters. When they are placed in a dangerous environment, their fate is always concerned. So the reader will always follow the characters to understand one by one. The computer network provides convenience for this kind of plot reproduction. Movies, short stories and other multimedia works can reproduce this exciting plot, and help students quickly master the general plot of British and American textbooks. Prepare for appreciation.

Application of Deep Learning in Keyword Extraction …

1195

1.3 The Construction of Multimodal English and American Teaching Mode Combined with the characteristics of British and American literature course and computer network, with the theory of multimodal teaching as the main guiding ideology, we can build multimodal teaching mode with the help of computer network. In the multimodal teaching mode of British and American culture, we should form multimodality from the text mode, image mode and sound mode. Then we should consider the characteristics of the course and computer technology to explore the teaching. Figure 1 is the basic framework of this mode. Character mode is the main part of English and American literature teaching, so we must adhere to the principle of character mode as the main body. To minimize the disadvantages of lack of culture. There are many ways to choose the mode of text teaching, including reading the text of teaching materials, important sentences in PPI ‘courseware and requiring students to read after class, which can make the mode of text teaching reflected. After learning, students can have feeling and experience. At this time, students can also be asked to comment on literary works. On the ways to stimulate students’ deep understanding of English and American Literature second thought. Image mode requires that the pictures related to the teaching materials or the films changed into be selectively played on the multimedia while learning the literature. The pictures can be in order to let students have a general understanding of the author or literature content, video can help. Help students master the context of the plot. In order to grasp the context of literary works to provide help. These modes are closely around the text mode, so that the text mode can be visualized and straight.

Fig. 1 English and American Literature Teaching

1196

H. Qian

The expression of view. Sound mode and image mode have something in common. At the same time of using images, there are usually text or voice explanations nearby, which are generally reflected by teaching ppt and network ppt courseware. To make a long story short. For the construction of multimodal English and American literature teaching mode, we can not abandon the original text mode. And it should be based on the text mode. Key information is represented by text mode, image and sound mode play the role of strengthening key information or secondary information, and can also provide background information or author’s information, etc. the teaching of three modes can add color to classroom learning. It can also strengthen the communicative purpose of literary teaching.

2 The Disadvantages of Multimodal English and American Literature Teaching—Cultural Loss Cultural loss refers to the phenomenon of cultural change in which new things are added due to invention and borrowing, and old things are lost at the same time. The replacement or automatic disappearance of some factors of traditional culture is an inevitable interest of social progress, but the loss of some excellent cultural factors will be an irreparable loss for mankind. There are the same problems in the multimodal teaching of British and American literature. We are teaching literature as well as culture. Because of multimodal teaching, the characteristics of British and American culture contained in the text may be ignored by students, which is not conducive to the learning of Chinese in the process of literature learning. The study of pure text is bound to be very difficult for students. At the same time, for the study of literature, we must not lose the culture in literature. This requires us to always adhere to the theme of text teaching and other teaching modes as auxiliary to strengthen the teaching effect in the whole process of multimodal Teaching. The study of pure text is bound to be very difficult for students. At the same time, for the study of literature, we must not lose the culture in literature. This requires us to always adhere to the theme of text teaching and other teaching modes as auxiliary to strengthen the teaching effect in the whole process of multimodal Teaching.

3 Systemic Functional Linguistics Among many schools of linguistics, systemic functional linguistics is the most interpretive one for computer-aided foreign language teaching, because the theory of systemic functional linguistics founded by Halliday pays more attention to the function and significance of language and its role in human social communication. The theory of systemic functional linguistics regards language as a system with social functions and a set of “potential” for people to choose in connection with social

Application of Deep Learning in Keyword Extraction …

1197

environment. In addition, Halliday believes that language use cannot be separated from context, which includes context of situation and context of culture. He believes that the variables of situational context determine the conceptual function, textual function and interpersonal function of language [4]. The research of systemic functional linguistics shows that language teaching must pay attention to both the form and the function of language, and turn the understanding of the form and function of language into the practical ability of language application, so as to achieve the ultimate goal of language teaching [5]. From the perspective of systemic functional linguistics, students’ learning of language is to develop their “meaning potential” [6]. There are many ways and means to cultivate and develop students’ meaning potential, and the use of computer-aided foreign language teaching undoubtedly provides us with convenience to cultivate students’ meaning potential. For foreign language teaching, multimedia and network are mainly from two aspects: the environment of language production and the carrier of language.

4 Second Language Acquisition Theory From the perspective of second language acquisition theory, Krashen’s input hypothesis and affective filter hypothesis have certain explanatory power to the English and American teaching model based on computer and network. Input hypothesis is a theory used by Krashen to explain how language acquisition occurs. He thinks that language loss should be meaningful and understandable. The acquisition of comprehensible input needs a certain context. Teachers can use non-verbal information to help and simplify the input of language knowledge to a certain extent, but teachers have certain limitations on the presentation and input of language, while computers and networks can make up for this. Learners are exposed to a lot of information about language knowledge and vivid pictures, texts and sounds on the Internet, which provide a good context for the realization of comprehensibility. Similarly, the affective filter hypothesis also helps us to understand the English and American Literature Teaching Model Based on computer and Internet. In Krashen’s Affective Filter Hypothesis, affective factor is regarded as a filter of language input. When learners have positive emotions, they will form a low (down) filter, and learners will try to get more from the losers. On the contrary, the negative emotions make the language input blocked by the filter, forming a high (up) filter, resulting in acquisition obstacles. Coelen, Lozanov and Trier also expressed the same view. In their view, language acquisition is extremely important.

References 1. Zhang, Y.: Multimodal English and American Literature Teaching Based on computer network. Theory and Practice of Foreign Language Education Technology

1198

H. Qian

2. Cao, H.: Advantages and disadvantages of Multimedia Assisted Mathematics Teaching. People’s Educ. Netw. (2010) 3. Ding, J.: New development of constructivism and teaching psychology. J. Nanjing Normal Univ. (5) (2000) 4. Chen, J.: On the discrimination of “center” and the “student center theory” in “computer based and classroom English multimedia teaching mode”. Foreign Language Audio Visual Teaching (10) (2005) 5. Zhu, D., Zhuang, Z.: Theory, practice and method of modern foreign language teaching. Shanghai Foreign Language Education Press, Shanghai (1996)

Deep Learning for Copyright Protection Chunlan Wu and Honghua Zhu

Abstract “One belt, one road” strategy cannot do without language service, and copyright problem of big data is prominent. One belt, one road, one belt, one road, one belt, one road, one belt, one road, is analyzed in this paper. The copyright object category of “one area and one road” language data under cloud environment is analyzed, and the category of “one area and one way” language data copyright risk under cloud environment is summed up. Keywords Cloud environment · One belt · one road data · Copyright risk

1 Introduction “One belt, one road” needs one belt, one road, one [1], and the other is the language. It requires the strategic planning of the language, including both the macro structure and the micro initiatives. In terms of macro structure, the top-level design is carried out by the national competent authorities (such as the State Language Commission) in response to the actual needs. In terms of micro measures, the relevant institutions formulate standards, sort out the process, clean up the copyright and develop the platform. China’s one belt, one road, January 2015, one of the “one belt, one road” big data integrated service portal was launched in April 2016, and the “language and culture” was set up in April 2016. The national language and social sciences development center was held in June 2015 by the State Language Commission. Data alliance “to establish a global open sharing platform. Thus, the “one belt, one road” language data in cloud environment has attracted wide attention. Under the cloud environment one is the “one belt, one road” language data source, which has many sources, various forms of carrier, different transaction modes, and involves a large number of copyright issues.

C. Wu (B) · H. Zhu Department Foreign Language, Qujing Normal University, Qujing 655000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_151

1199

1200

C. Wu and H. Zhu

2 “One Belt, One Road” Language Data has Increased Dramatically Under Cloud Environment 2.1 The Rise of Translation Network Promotes the Explosion of Language Data Big data is like the “oil” of industrial society [2]. In the era of big data, the production tools, collection channels, analysis means, application scenarios and functional areas of language data are increasing, and language big data is gradually formed. Big data, which provides services through the Internet, forms the Internet plus language processing service mode. It is called “networking of languages”, and it is applied to the field of translation to form “translation network”. “Internet of language” and “Internet of translation” have become an important platform for language data growth. Their development mode has attracted the attention of information management and language scholars, and has made important progress in the field of practice. Through the “Internet of language” and “Internet of translation”, there are more than 600,000 translators and more than 1000 translation companies working together [3]. In China, iFLYTEK’s input method was launched with the function of simultaneous interpretation in October 2015. Language recognition and machine translation are the core technologies. With the progress of these two technologies, social media translation, photo recognition translation, video recognition translation, file scanning translation, speech recognition translation, artificial intelligence translation and so on have become increasingly mature, which improves the translation efficiency, increases the language data and enriches the corpus. In 2015, in the language service market: 2015, the language service market: 2015, published by commonsense advisory, a US language industry research organization, Wensi Hisui and Chuanshen network ranked No.2 and No.3 in Asia and No.16 and No.19 in the world. In foreign countries, the size of the glowbe corpus of mark Davies in the United States is 1.9 billion words, the language data of Google Books: British English is 34 billion words, and the language data of Google Books: Ameri can English is 150 billion words. Social networks Facebook and twitter are multilingual. In 2014, Microsoft Embedded Machine Translation into Skype translator to realize cross language realtime communication from the technical level, and realized real-time voice dialogue between English and Chinese (Putonghua) in April 2015. In the cloud environment, the rise of translation network promotes the rapid growth of language data, which leads to a series of problems including copyright.

Deep Learning for Copyright Protection

1201

2.2 “One Belt, One Road” Strategy, Demand for Language Data The strategy of “one belt, one road” covers 65 countries and 4 billion 400 million population, and there are nearly 50 kinds of lingua franca. There are more than 200 kinds of dialect, ethnic or tribal language, and 2000 dialect. There are thousands of in the dialects of countries and regions directly bordering China. When Xi Jinping met with German sinologists in Berlin in 2014, he pointed out: “without language exchange, cooperation and exchanges will not have a basis. It will be difficult for people to connect with each other.” The one belt, one road strategy one belt, one road, requires language to pave the way. Language is not only a tool of communication, but also a carrier of culture. If one belt, one road, one belt, one road, the other countries can not achieve language exchange and cultural understanding, the “one belt and one way” strategy can not be orderly. “One belt, one road” language data needs to be collected, sorted, analyzed and used. It is necessary to use big data technology to meet the needs of language data processing in cloud environment. The language database also involves an important cultural mission—the preservation of endangered languages. There are 15 kinds one in China that use one thousand people below the one’s endangered languages. One belt, one road strategy, is to make full use of big data technology to realize the historical and cultural function of. The Fifth Plenary Session of the 18th CPC Central Committee raised the “big data strategy” into a national strategy. Under one belt, one road strategy, the construction of big data includes language data platform development, translation oriented corpora construction, artificial translation service, Machine Translation service, etc., involving copyright laws, different agency bodies, different data types and different business processes in different countries, and has copyright risk.

3 “One Belt, One Road” Language Data Copyright Object Category Under Cloud Environment Main features of language data (1) Instrumental. “One belt, one road” big data in language analysis no longer focuses on the pursuit of linguistic causality, but instead changes to the description of the relationship between languages and mining potential contents of language according to the relevant relations. The traditional language data answers “why”, now it answers “what is”, and uses “what is” to explore “why”, showing the results first and then showing the reasons. (2) Culture. Internationalization promotes the globalization of language, and further promotes the localization of Globalized Language. In the process of localization, the global language is constantly replacing the communication function of local language, weakening the growth space of local language, and finally gradually eliminating the diversity of language. Language is the carrier of

1202

C. Wu and H. Zhu

culture, and a language embodies a culture. The ethnic character, cognitive structure and cultural vision in culture are embodied by language. The elimination of linguistic diversity also eliminates cultural diversity. “One belt, one road” language big data is culturally related to public interest and should be reflected in the process of copyright protection. Copyright legal relationship of language data The copyright risk of one belt, one road, language data needs to be investigated from the perspective of legal relationship. From the perspective of copyright subject, it mainly includes three categories: language data producers, language data platform service providers, and language data end users. The producer uploads the language data to the platform, which is provided by the platform to the end users of the language data. There are three particularities in the subject of copyright. (1) The producers of linguistic data are not necessarily limited to natural persons. Machine translation will play an important role in generating a large amount of data and forming language logic rule data. The copyright problem of these data is special. (2) The copyright liability of language data platform. Language data platform collects a large amount of data and provides services. It is worth exploring what kind of copyright liability the platform should bear when the end user infringes. Specifically, the platform should bear direct or indirect liability or alternative liability, as well as the scope and conditions of each form of responsibility. (3) The responsibility of end users. With the rise of instant translation tools, users will apply a large number of translation resources, including machine translation resources. How to determine the infringement is worth paying attention to.

4 Copyright Risk Category of One Belt, One Road Language Data Under Cloud Environment “One belt, one road” big data is huge, structured, semi structured, unstructured coexist, and all the state ownership, enterprise ownership and individual ownership coexist, and there are coexistence of geographical restrictions, time constraints and restrictions on use. The one belt, one road, big data share the possibility of sharing only by solving copyright problems. Copyright issues and risks of language databases “One belt, one road” construction cannot do without the accumulation and application of language data. The external form of language data is usually database, which includes not only the language resource database 42 which is mainly used for resource preservation, but also the language service database mainly used for resource service. Copyright issues and risks in machine translation

Deep Learning for Copyright Protection

1203

If the database formed by machine translation has copyright, whether it is a kind of defective copyright, and how to identify the copyright should be explored. If there is copyright and is a defective copyright, whether the subsequent act of invoking infringes the copyright and what kind of copyright should be considered. Therefore, one belt, one road, Machine Translation has many copyright problems, and big data will enlarge these risks. Copyright issues and risks in transnational translation services Big data and the Internet make it possible for language services to break through the space-time constraints and make it possible to obtain and disseminate cross language information without barriers. The strategy of “one belt, one road” involves 65 countries, 4 billion 400 million population and 200 ethnic languages. The regional culture is diverse. It is impossible to rely solely on English and other international languages. Copyright problems and risks in principal agent “One belt, one road” translation is a system engineering, involving a lot of commissioned activities, generating large amounts of data and providing professional translation services through entrustment. With the development of transnational language cloud service platform, collaborative management, agent service, transnational language service through B2B, B2C and other modes will be more common. As an important way of language data accumulation, principal-agent can integrate various translation resources and provide personalized, seamless, in-depth and timely translation services.

5 One Belt, One Road Language Data Copyright Risk Mitigation Strategy in Cloud Environment In the cleaning up of language data copyright assets and classified protection, it is necessary to distinguish the copyright of the works owned by the organization, the copyright of the authorized work obtained by the organization, the copyright of the work in use by the organization, and the copyright of the work that can be reasonably used by the organization through the law, and carry out classified protection according to the urgency, importance and relevance of the copyright assets. The copyright and commonweal space exploration in language data service has a strong publicity, which involves the right protection of public space. The public welfare of language data needs to make full use of the time, space and use restrictions of copyright system. In the application of language data, the application of copyright treaty, the cultivation of language data talents and the promotion of copyright awareness are discussed.

1204

C. Wu and H. Zhu

6 Conclusions Under the environment of translation networking, the training of language data talents should pay attention to copyright issues and enhance the copyright awareness of language data talents. On the one hand, we need to understand the main risks of copyright and examine the copyright problems existing in database construction, translation, transnational cooperation, principal-agent and platform services; on the other hand, we need to clarify the copyright assets of language data, not only to protect the copyright of others, but also to protect our own copyright, and to protect the public interest in the actual business, and to explore the biggest copyright Public space. Acknowledgements Refer this research has been financed by Research Projact in 2019 Intarnational Fund of The Ministry of ducation “One balt one road” Interational Cooperation Resarch Projact 2019 Special Research China. It is a phased achievement in the study of One belt,one road, Thailand language education policy and its impact on China’s language planning No. (19YDYL29).

References 1. Zhao, S.: Language service is the basic guarantee for One belt, one road. China Soc. Sci. 2016-01-05 (003) 2. Li, K., Meng search one, Guo, H.: Let one big data become the one engine of “one belt, one road” construction. Yunnan Econ. Daily, 2015-10-29 (B02) 3. Wang, X.: Translation needs to be vivid. Qilu Evening News, 22 July 2015 (B08)

Algorithm Design and Function Realization of Home Decoration Design Software Based on BIM Zhang Lantu

Abstract Home decoration design industry is an important part of China’s construction field. The research work of this paper is based on the home decoration design industry, and establishes a set of home decoration design software system based on BIM. This paper introduces the main function realization of the software system, and then analyzes the algorithm design ideas of several main function realization in detail. The article also gives the screenshot of the software operation interface, and explains the function realization effect of the software. The innovative application of the software can bring home decoration designers and customers a new experience of home decoration design, and will promote the development of a new model of the whole home decoration industry. Keywords BIM · Home decoration design · Algorithm · Function realization

1 Introduction Decoration design industry is located at the end of the whole chain of construction industry, which plays a role in further improving and beautifying buildings and improving the quality and function of buildings. In recent years, with the rapid development of the real estate industry and the continuous improvement of residents’ housing level, the home decoration industry has entered a stage of rapid development [1]. Nowadays, while improving the living environment, people put forward higher requirements for the decoration and decoration of the home. They pursue different decoration styles, such as highlighting personality, simplicity and generosity, energy conservation and environmental protection, which challenges the traditional home decoration mode. In this study, we introduce BIM Technology into the home decoration design service, and establish a home decoration design software based on BIM. Using the Z. Lantu (B) Taizhou Polytechnic College, Taizhou 225300, Jiangsu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_152

1205

1206

Z. Lantu

advantages of building information model, we solve the problems and pain points in the traditional home decoration design mode mentioned above, and establish a new model of home decoration design service [2].

2 Main Function Realization The research work of this paper aims to introduce BIM Technology into home decoration design service: Taking BIM as the data carrier of design service, realizing 3D decoration design software system based on BIM Technology, so as to provide service mode for home decoration industry. The main functions of this 3D home decoration design software include: soft decoration design and hard decoration design. Among them, the function of hard decoration design mainly includes: wall and room type drawing, water and electricity design, skirting line design, ceiling design, wallpaper or wall paint design, cabinet design, wardrobe design, tile design, floor design, etc.; The soft decoration design function mainly includes: sofa, curtain, dining (Book) table, TV cabinet, bed, lighting, shower, sanitary ware product deployment design, etc.

3 Software Algorithm Design In this section, we will focus on the above three categories of functions: modeling drawing, product portfolio, 2D-3D view switching, respectively, to explain the programming ideas of function realization.

3.1 Modeling and Drawing Modeling drawing mainly realizes the splicing and cutting of any graphic pattern through visualization, such as house type design, water and electricity design, skirting line design, ceiling design, tile (floor) paving, latex paint, etc. This function can further support cutting and provide technical basis for the design of construction drawings and sample drawings. This function is the core part of home decoration design software, and its core algorithm mainly includes: wall drawing combination and generating corresponding functional area of house type; automatic pipeline arrangement and skirting line generation in hydropower design. The definitions of confidence and support are given below. 1.

Drawing combination of walls and generating corresponding functional areas of house type

Algorithm Design and Function Realization of Home Decoration …

1207

Operations such as creating/drawing/modifying walls belong to the plancon troller (panel logic control) category. To complete these operations, we need to call the getpoints in wall.java, calculate and obtain the coordinates of the four vertices of the wall through the getshapepoints method; after obtaining the coordinates of the four rectangular fixed points of the wall, determine its thickness. If the walls intersect, we need to get the square vertex of other walls, and modify the vertex coordinates of the current wall by using computer intersection method. When the pointscache of the intersecting wall exists, if the calculated point of the current wall and the intersecting wall exist. Points cache has a very small error, so they share this point to avoid computational errors. Finally, the contour of the wall is formed by drawing the wall in plancontroller, and the slope can be generated. 2.

Automatic pipeline arrangement in hydropower design

From the perspective of algorithm implementation, automatic pipeline arrangement in hydropower design mainly includes two parts: one is automatic generation of pipeline based on parametric modeling; the other is route finding based on routing rules. Pipeline generation based on parametric modeling means that given the starting point and end point of the pipeline, the pipeline path connecting the two points is drawn with line segments in the 2D plan, and is represented by cylinder in 3D space. Two dimensional line segments can be drawn using polyline. Polyline can complete the drawing of broken lines and arcs in the case of given position coordinates. The drawing and modification of the three-dimensional cylinder is drawn through polyline3d.java; the code below polyline3d.java controls the position and direction of the cylinder, vector is the starting position of the cylinder, and Vector2 is the direction of the cylinder. In addition, category determination is added in object3d branch factory. The pipeline routing function based on routing rules also contains two algorithms: one is the generation of the main route, the other is to automatically generate the ground automatic routing of two designated points. 3.

Skirting line generation

The algorithm of automatically generating skirting line is as follows: according to the specified room, after the section vertex coordinates of skirting line are given, the skirting line is generated along the room edge. The position of the door does not draw a skirting line. For a room without a door, you can start from any vertex of the room, rotate the point of the skirting line to the angle of the intersection point according to the angle between the edge vertices of the room, and move it to the adjacent room vertex; cycle the process until all the vertices of the room are traversed. At this time, the loop formed by connecting these points is the shape corresponding to the skirting line, which can be added to the 3D panel. If the room has a door, then it needs to start from the back intersection of the previous door and the room, until the front

1208

Z. Lantu

intersection of the latter door and the room ends, to generate an unclosed path. The starting point of the skirting line at the starting point should be rotated perpendicular to the edge of the room, and the end point is the same. The middle point is similar to the one above.

3.2 2D-3D View Switch The main purpose of 2D-3D view switching is to realize the real-time switching and interaction between 2D and 3D windows through WYSIWYG. The main idea can refer to the wall drawing, by modifying the corresponding material in the twodimensional panel to realize the linkage change of the material in the corresponding three-dimensional window. The implementation of the algorithm is as follows [3, 4]. In the method of creating Hometree of homgcomponent3d.java, the monitors of level, wall, furniture, room and environment are added. When the corresponding elements of two-dimensional plane change, the elements in 3D are changed by monitoring.

4 Function Realization Effect According to the above programming ideas, we established a set of 3D decoration design software system based on BIM Technology, and successfully realized the functions of the software system initially predicted. This section will show the function realization effect of the software. Two dimensional software can be used to display the interior structure of the house. At the beginning, the interface displayed by the software is the plan display interface (Fig. 1), where you can view and draw the plan. On the plan interface, click

Fig. 1 Plan display interface

Algorithm Design and Function Realization of Home Decoration …

1209

Fig. 2 3D display interface

the [3D interface] option to convert the plane display to 3D model display (Fig. 2). In the 3D display interface, we can also select different modes such as [bird’s view] or [roaming] to view the 3D model from different angles. In the hydropower design interface (see Fig. 3), click [show] hide to display or hide all switch panels. After confirming the corresponding point position, click [initialization] to see the corresponding initial line on the 3D view in the upper right corner of the interface. It should be pointed out that all lines are passed through the ground; according to the needs, the lines can also be set to go through the top of the house. As long as you click a node and select the top, you can change the corresponding line to go to the top of the house.

Fig. 3 Hydropower design point interface

1210

Z. Lantu

5 Summary and Prospect This paper mainly introduces the 3D decoration design software system based on BIM Technology, expounds the main function realization and algorithm design ideas of the system, and shows the function effect of some software. At present, the software has completed the research and development stage, and has established cooperative relations with several companies in the home decoration industry, and accepted the market test in practical application; through this process, we are also constantly upgrading and improving the software. Acknowledgements Enterprise Practice Project of Young Teachers in Higher Vocational Colleges in Jiangsu Province.

References 1. Research Report on market analysis and development trend of China’s building decoration industry from 2015 to 2020. https://www.chinaim.com/report/20160614/150322240.html (2015) 2. Fu, X., Zhou, J., Feng, X., et al.: Application and management mode of BIM Technology in home decoration engineering. J. Eng. Manage. (1), 131435 (2016) 3. Wang, S., Dong, J., Li, H., et al.: Research on the development of home decoration design based on BIM. Civ. Eng. Inf. Technol. 8(6), 64–67 (2016) 4. Zhang, J., Shu, Z., Li, Z.: Design and implementation of home decoration design system based on BIM Technology. Civ. Eng. Inf. Technol. 8(6), 73–78 (2016)

Intelligent Back Analysis of Geotechnical Mechanical Parameters Based on Differential Evolution Algorithm Xiu Zhang and Li Zhang

Abstract In view of the fact that the mechanical parameters of materials determined by indoor or field in-situ tests deviate greatly from the actual parameters in geotechnical engineering, the intelligent back analysis program based on elastic-plastic finite element and differential evolution algorithm (DE) is applied to the mechanical parameter inversion of tunnel surrounding rock and foundation. This paper introduces the principle, steps and implementation process of the program, and analyzes the influence of variation factor F, cross factor Cr and difference strategy on parameter inversion accuracy and iterative convergence speed in differential evolution algorithm. The research results show that the parameter inversion method has good reliability and good optimization performance, and has a wide application prospect. Keywords Geotechnical engineering · Material mechanics · Parameters · Back analysis · Inversion accuracy · Convergence rate · Differential evolution algorithm

1 Introduction With the rapid development of computer technology, the numerical theory and method of geotechnical engineering are becoming more and more mature. However, all kinds of theoretical analysis and numerical simulation must be based on reasonable mechanical parameters. The cost of testing rock mass related mechanical parameters by laboratory test or in-situ test is relatively high, and it is difficult to reflect the real situation in the whole project scope, and the determined mechanical parameters are quite different from the actual situation. Therefore, it is important to carry out quantitative identification and analysis from the mechanical model level Academic value and engineering significance [1]. X. Zhang (B) · L. Zhang Chongqing Vocational Institute of Engineering, Jiangjin 402260, Chongqing, China e-mail: [email protected] L. Zhang e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_153

1211

1212

X. Zhang and L. Zhang

Since the idea of displacement back analysis was put forward, it has attracted much attention in geotechnical engineering field because of its strong practicability and uniqueness in solving problems. At present, NATM is widely used in tunnel design and construction. It is of great significance to carry out the inversion work of surrounding rock material characteristic parameters according to the spatial and temporal convergence deformation of tunnel [2, 3] has been applied to inverse calculation of parameters in geotechnical engineering, and good results have been obtained. However, there are still some shortcomings in these algorithms, such as too much calculation, slow convergence speed and too long calculation time, which need to be solved further.In this paper, a self-developed intelligent displacement back analysis program based on elastic-plastic finite element and differential evolution algorithm (DE) is used to inverse the elastic modulus E, Poisson’s ratio U, cohesion c and internal friction angle ϕ by numerical simulation results instead of monitoring displacement in actual engineering. The influence of variation factor F, cross factor CR and difference strategy on evolution speed is discussed in detail.

2 Differential Evolution Algorithm 2.1 Elastoplastic Finite Element Based on D-P Criterion In this paper, the elastoplastic finite element method and Newton Raphson method are used to solve the nonlinear equations, and the D-P criterion is used to predict the plastic correction process. (1)

Drucker Prager (D-P) Criterion

The de yield surface of D-P yield criterion in the three-dimensional principal stress space is a smooth cone, and the projection on the π plane is circular: αI1 +



J2 − K = 0

(1)

Among them, α and K are constants related to cohesion C and internal friction angle respectively; I1 is the first step variable of stress measurement; J2 is the second part of stress measurement. (2)

Stress Mapping Algorithm

In the stage of elastic prediction, the state of elastic prediction is controlled by the increment of total strain, the plastic strain and internal variable remain stable, and the plastic correction state is controlled by the increment of plastic parameters. εn+1 = εn + ε

(2)

Intelligent Back Analysis of Geotechnical Mechanical Parameters …

1213

qn+1 = qn + λn+1 h n+1

(3)

  σn+1 = c: εn+1 + εn+1 p

(4)

2.2 Differential Evolution Algorithm Differential evolution (DE) algorithm is a new direct global optimization algorithm proposed by RM storm and K vprice in 1995. (1) In the d-dimensional space, NP chromosomes satisfying the upper and lower bounds of independent variables are randomly generated.   xi j = randi j (0, 1) xiUj − xiLj + xiLj i = 1, 2, . . . , N ; j = 1, 2, . . . , D

(5)

where xiUj and xiLj are the upper and lower bounds of the j th component in the i th vector, and randi j (0, 1) is the random number between [0,1]. (2) In de algorithm, the difference between any two objective vector individuals in the population is scaled and added to the third vector individual in the population to form a new variable. This process is called mutation. For each G-generation target vector, the j-th component of the mutation vector is:   vi j (G + 1) = xr 1 j (G) + F xr 2 j (G) − xr 3 j (G)

(6)

Among them, the subscripts r1 , r2 , r3 are random integers which are not equal to each other in [1, NP]; F is the scaling factor, which is used to adjust the step amplitude of vector difference, which is taken from 0 to 1. (3) A new sample vector μi (G + 1) was generated by crossing the target vector xi (G) with the variation vector vi (G + 1) according to the following rules: μi (G + 1) = vi (G + 1), r j ≤ C R j = n i μi (G + 1) = xi (G + 1), r j ≤ C R& j = n i

(7)

where j ∈ [0,1] is the random number corresponding to the j th component of the vector; CR ∈ [0,1] is the probability constant of hybridization; n i is at 1, 2. An integer randomly selected from D to ensure that at least one component of the variation vector vi (G + 1) is represented by the sample vector μi (G + 1) Adopt. (4) The sample vector μi (G + 1) is compared with the target vector xi (G). If μi (G + 1) corresponds to a smaller distribution function, the vector μi (G + 1) is selected; otherwise, the vector xi (G) is retained.

1214

X. Zhang and L. Zhang

(5) In de algorithm, the objective function is regarded as the fitness function. Parameter identification is essentially an optimization problem. According to the specific physical meaning of the model parameters, the upper and lower lines are set. If there are m observations in the region, the constrained optimization problem is as follows: min

E(x1 , x2 , . . . , xn ) =

m 2 1  0 Yi − Yi m i=1

xia ≤ xi ≤ xib , i = 1, 2, . . . , n

(8)

Among them, Yi0 is the measured deformation value of surrounding rock; Yi is thecalculated deformation value of surrounding rock; m is the number of observationvalues; xi is the parameter; n is the number of parameters; xia and xib are the upper and lower limits of xi respectively.

3 Back Analysis of Parameters Based on Elastoplastic Finite Element Method and Differential Evolution Algorithm The intelligent displacement back analysis program is programmed by C++ language. Under the given initial conditions, the “optimal value” of each parameter is obtained by forward iteration and optimization: {P} = [E, μ, C, ϕ]T

(9)

Taking the residual error between the measured displacement Uim and the calculated displacement Uic as the objective function, a possible value range of design variable {P} is given as a constraint condition: Ai ≤ P ≤ Bi [4, 5], f (P)

n   i 2 Um − Uic

(10)

i=1

where m is the number of measuring points, where parameter identification is transformed into finding the minimum value of the objective function f (P), and the parameter estimation will become a constrained optimization problem.

Intelligent Back Analysis of Geotechnical Mechanical Parameters …

1215

Fig. 1 Iterative convergence curves corresponding to the different F and CR values

4 Back Analysis of Mechanical Parameters of Tunnel Surrounding Rock The search convergence curves corresponding to different variation factors f and cross factor Cr are shown in Fig. 1. It can be seen that when F ∈ [0.7, 0.9] and CR ∈ [ 0.7, 0.9] are taken, they can converge. When CR = 0.9 and F = 0.7, they can converge in 300 steps; In other cases, the convergence speed is relatively slow, but it can converge around 800 on the whole, which reflects the good optimization ability of differential evolution algorithm.

5 Conclusions The intelligent displacement back analysis program based on elastic-plastic finite element method and differential evolution algorithm is used to calculate two engineering examples of tunnel and subgrade. The results show that the program has the characteristics of fast convergence speed and high precision of back analysis results, which can better meet the engineering requirements. In the process of back analysis, the cross factor Cr and the variation factor F are used For the two examples in this paper, when Cr ∈ [0.7, 0.9], the convergence speed and inversion accuracy are relatively high when de/best/1/exp and de/best/2bin are selected.

1216

X. Zhang and L. Zhang

References 1. Yang, L.: Inversion Theory and Engineering Practice of Geotechnical Engineering Problems. Science Press, Beijing (1996) 2. Jia, S.: Inversion of geotechnical mechanical parameters based on genetic algorithm and its implementation in ABAQUS. Hydrogeol. Eng. Geol. 39(1), 31–35 (2012) 3. Di, Z.H.A.O.: ZHANG Zong-liang, CHEN Jian-sheng: A combined application of particle swarm optimization and ADINA for parametric inversion of earth-rock dams. Advances in Science and Technology of Water Resources 32(3), 43–47 (2012). (in Chinese) 4. Wang, J.-X., Jiang, A.-N.: The analysis of moni-toring data and intelligent inversion of parameters of Dalian subway tunnel. China Civ. Eng. J. 44(Supp.), 135–138 (2011) (in Chinese) 5. Storn, R.M., Price, K.V.: Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11, 341–369 (1997)

Research on Virtual Human Animation Based on Motion Capture Data Yan Zhao

Abstract With the increasing demand for computer animation in 3D games and other industries, the manual adjustment of virtual human action in 3D animation software is no longer suitable for the current computer animation production. Motion capture technology directly records the motion data of an object and uses it to generate computer animation. It has the advantages of high efficiency and strong sense of reality of the generated animation, so it has been widely used. This paper presents a method to generate animation using motion capture data. Based on the motion capture data, a 3D skeleton model is established and driven to generate skeleton motion and animation. This method can make full use of a large number of existing motion capture data, so it has a great application prospect. Keywords Motion capture · BVH · Virtual human animation

1 Introduction Virtual human animation is a rapidly developing research field in computer graphics, and motion capture technology has injected new vitality into it. Motion capture technology directly records the motion data of the moving entity through the sensor tracking device, and uses it to generate computer animation. Motion capture data records the rich details of virtual human motion, and the generated virtual human animation has strong sense of reality and strong real-time. Using motion capture data to drive virtual human motion has become a common virtual human animation technology. In the 3D world, the animation process of virtual human mainly includes two ways: vertex animation and skeleton animation [1]. Vertex animation generated by key frames is the simplest way to make a mesh model’s active picture. Each frame animation is actually a “snapshot” of the specific pose of the model. Key frames are completed by modeling software, and smooth animation effect can be obtained by interpolating between frames. For each key Y. Zhao (B) Shandong Xiehe University, Jinan 250107, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_154

1217

1218

Y. Zhao

frame, the positions of all vertices must be stored, so a virtual human animation containing complex characters and many key points will need a lot of storage space. By using skeleton animation, we can make up for the geometric defects of vertex animation. In skeleton animation, a model is a skeleton structure composed of interconnected “bones”, which can be animated by changing the orientation and position of bones. Only need to store the skeleton of the animation controller, for each node to establish a matrix to describe its rotation and displacement relative to the initial position, greatly reducing the storage space requirements.

2 Motion Capture Data The data obtained from motion capture describe the structure of the skeleton and the motion parameters at each time point. The format of motion capture data includes BVH, HTR, asf-amc and so on. The hierarchical motion description method is used to record human motion data, and BVH format is commonly used. BVH format file is an ASCII file, the expression of human body adopts skeleton model [3]. The joint point name of skeleton can be defined by the user, and other strings must strictly follow the definition of the file. Figure 1 is an example of the definition of BVH format file. BVH file is divided into skeleton information and data block. The skeleton information part defines the skeleton structure used by the motion data, starting with the keyword “hier-arch”, followed by “root” to represent the root node, and then recursively defines the “joint” of each joint below the root node. The key word “offset” indicates the offset of the child joint relative to the parent joint, and channels gives the number and name of degrees of freedom. The root node has six degrees of freedom, including three Euler angle rotation parameters and three-dimensional space position parameters. The other joints have only three degrees of freedom. “End site” means terminal recursion, which can be regarded as an end effector. The data block section starts with the “motion” keyword. “Frames:” defines the number of frames. “Frame time:” defines the data sampling rate. Finally, the motion data corresponding to the skeleton information hierarchy is provided. Each frame data information is provided according to the joint sequence defined by the previous part of skeleton, which forms the representation and storage of motion information of a complex action [2].

3 Building a Hierarchical Human Skeleton Model In practice, the 21 joint skeleton system which can reflect the motion characteristics of virtual human and is consistent with BVH format data is adopted. The human body is regarded as a tree with layers, joints as nodes, and bones between joints as chains, that is, bones are connected by joints according to a certain level. At the same time, the position of bones or joints in each layer is determined by the position of

Research on Virtual Human Animation Based on Motion Capture Data Fig. 1 Example of definition of BVH format file

Fig. 2 Human skeleton model

1219

1220

Y. Zhao

the upper layer, indicating the relative position between joints, that is, defining the bone length of various parts of the human body. The specific definition is shown in Fig. 2. Because of the complexity of the human body structure, it is necessary to abstract and simplify the human body; in order to better describe the motion, the human body is constructed into a hierarchical structure. The human skeleton model is mainly composed of joints and bones. Some joint structures are relatively complex, such as the shoulder joint, which is actually composed of many tissues, but here it is only regarded as a hinge like joint; some joints do not exist, For example, the forearm is originally composed of ulna and radius. Here, the ulna and radius are combined into one bone. The skeleton is regarded as an immutable rigid body [3, 4].

4 Virtual Human Motion Driven by Motion Capture Data 4.1 Motion Principle of Virtual Human Skeleton Two kinds of coordinate systems are used to describe the motion of human limbs: the world coordinate system fixed at the hip joint and the local motion coordinate system attached to each joint point. Therefore, the whole human skeleton is a tree with root (hip), and each skeleton node has a local coordinate system with its own coordinate origin. In the process of skeleton motion, the local coordinate system of each skeleton node changes constantly, but the length of each skeleton and its position in the local coordinate system remain unchanged. The motion process of skeleton is actually the time-series change process of local coordinate system of each node of skeleton.

4.2 Driving of Virtual Human Skeleton Animation Based on the principle of virtual human skeleton motion and the definition of BVH file, the motion of virtual human skeleton is usually expressed in the form of translation matrix and rotation matrix. As the character moves, translation and rotation are applied to the root node (hip), while the other nodes only apply rotation changes. In the global coordinate system, the corresponding parameter of root node hip is position coordinate offset (data)_x, DATA_y, DATA_z) And three Euler angles (RADS)_x, rads_y, rads_z) Where, rads_x, y, z = Frames_I_CHANNELS_j*(!/180), i ∈ {1, 2, …, n}, n is the total number of frames defined in the motion data part, J ∈ {x, y, zposition, x, y, zrotation}. The transformation matrix of the root node is defined as: M = t * r * m:

Research on Virtual Human Animation Based on Motion Capture Data

1221

Fig. 3 Motion clips

 1  0 T =  0 0

0 0 0 0

0 0 1 0

 D AT A_ x  D AT A_ y  D AT A_ z   1

(1)

The transformation matrix of other sub nodes is m = R * M. the basic principle is that each joint is rotated relative to the previous joint. The position and rotation of each specific node in the global space is determined by the state of a series of nodes from the root node to the node. For example, the rotation of the shoulder joint not only affects the position and rotation of the upper arm, but also passes along the skeleton to the hand. Although the relative position of all joints in their local coordinate system has not changed, the spatial position of each bone in the global coordinate system has changed. In this way, all the joints in strict accordance with the motion data of each frame, through the corresponding coordinate transformation, drive the skeleton motion frame by frame, thus generating a realistic virtual human animation. Experiments were carried out in VC++ 6.0 and open GL environment. The BVH file data obtained by motion capture successfully established and driven the motion of 3D skeleton model. As shown in Fig. 3 is a screenshot of the virtual human skeleton after running the program.

5 Conclusions Computer animation is an important direction in the field of computer graphics. This paper studies the virtual human animation technology based on motion capture data. Using motion capture data to drive virtual human motion has the advantages of high efficiency and good visual effect of generated animation, so it has been widely used. However, as far as the technology itself is concerned, motion capture technology

1222

Y. Zhao

is the replication of motion, and the acquired data can only be applied in a specific environment, lacking of flexibility, and the process of obtaining information by using motion capture technology often costs a lot [3]. Therefore, further research focuses on reusing the existing motion capture data, adapting the captured motion to generate new motion, improving the utilization rate of motion capture data, so that it can be applied to new scenes to meet the needs of new users. Acknowledgements 1. 2019 Teaching Achievement Cultivation Project of Shandong Union University, “Research and Practice of Mixed Teaching of《Multi-dimensional Film and Television Animation Product Development 》 Based on OBE”, 201913; 2. 2019 Shandong Union University Teaching Reform Research Project, 《 “ 3d Animation Technology 》 Based on Smart Classroom Teaching Mode Reform”, 2019xH52.

References 1. Cai, Z.: Human Joint Motion Editing System. Hebei University of Technology, Tianjin (2004) 2. Wat, A., Policarpo, F.: 3D games animation and advanced real-time rendering (Trans: Shen, Y., Chen, W., Zhu, Y.), pp. 274–283. China Machine Press, Beijing (2005) 3. Meredith, M., Maddock, S. Motion capture file formats explained, pp. 4–9. University of Sheffield, Sheffield (2001) 4. Xu, J.: Research on animation generation method of 3D cartoon characters combined with motion capture data. Zhejiang University, Hangzhou (2003)

Prediction and Analysis of the Relationship Between Porous Structure and Strength of Concrete Based on Artificial Neural Network Chaohua Zhao

Abstract Based on the strength of traditional pre cavity concrete, a new pre established neural network model based on artificial intelligence, BP neural network and RBF neural network, is proposed to realize the complex nonlinear mapping from the composition and characteristics of fresh concrete to the strength of hardened concrete. Through the study of test data, the network structure can predict the compressive strength of concrete in 28d at early stage. In addition, BP neural network is used to simulate and analyze the influence of the change of the quality and quantity of concrete components on the compressive strength. The results are in accordance with the known classical concrete strength change law, which shows that the neural network model has high accuracy and strong generalization ability. Keywords Concrete strength prediction · Artificial neural network · MATLAB · BP network · RBF network · Computer simulation

1 Introduction As one of the main mechanical properties of concrete, the compressive strength of concrete usually needs to be maintained for 28 days according to the traditional method, and then obtained by testing. For the construction site, before we know the compressive strength of concrete, we often have poured a certain proportion of concrete, but do not know whether it meets the requirements. On the contrary, if the expected 28 day strength value can be obtained after several hours of concrete pouring, measures such as adjusting mix proportion can be taken to control the quality of concrete.In the design of concrete strength, the traditional calculation method is often used, that is, the formula of concrete strength proposed by Bolomey Ding, a Swiss in 1930.

C. Zhao (B) School of Civil Engineering, Chongqing Jiaotong University, Chongqing 400074, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_155

1223

1224

C. Zhao

 fe = A f∞

C −B W



In the formula, A and B are test constants, and the compressive strength of concrete is linear with cement strength and water cement ratio. In the past few decades, many test and analysis methods have been developed, but a large number of test data show that the factors affecting the concrete strength are various, even there are many factors affecting each other, so it is difficult to get satisfactory results for linear function, especially when studying the relationship between the comprehensive performance of concrete and its influencing factors, It is very difficult to establish analytical mathematical model and carry out more accurate quantitative calculation.

2 Bearing Capacity Calculation Under pure torsion, the strain of the steel bar is very small before the cracking of the ordinary reinforced concrete beam. The cracking torque of reinforced concrete beams can be calculated by using the ideal elastic-plastic materials, but the tensile strength of concrete should be reduced properly. In our country, the criterion is 0.7 for safety, and the corresponding cracking torque calculation formula is: Tcr = 0.7wt f t where Tcr is the cracking torque of the test piece; Wt is the cross section of the torsional member, Torsional plastic moment of resistance, for rectangular 2 sections:Wt = b6 (3h − 6): f t is the tensile strength of concrete, which is determined 0.55 calculation is available. by f t = 0.95 f cu

3 Two Kinds of Neural Networks 3.1 Brief Introduction of BP Network and Algorithm BP network is a back propagation learning algorithm of multilayer feedforward neural networks (MFNN), which is led by Rumelhart & mccleland. It is called BP algorithm for short. It is the application of gradient descent method in multilayer feedforward network. BP multilayer feedforward network is a kind of neural network model which is mature and widely used at present. It transforms the input-output problem of a group of training samples into a nonlinear mapping. The learning process of network consists of two parts: forward and back propagation. In the process of forward propagation, the state of each layer of neurons only affects the next layer of neural grid. If

Prediction and Analysis of the Relationship Between Porous Structure …

1225

the output layer can not get the expected output, that is, there is an error between the actual output and the expected output, then it will enter the back propagation process, return the error signal along the original connection path, and then enter the forward propagation process by modifying the weights of neurons in each layer, propagating to the input layer one by one. The repeated use of these two processes can minimize the error signal. However, in fact, when the error meets the expected requirements, the learning process of the network is over. In practical application, the original BP algorithm is difficult to be competent, and most of them adopt the improved BP algorithm. The author adopts the improved algorithm of driving quantity.

3.2 Introduction of RBF Network and Algorithm RBF (radial basis function) neural network consists of three layers. The input layer node only transfers the input signal to the hidden layer, and the hidden layer node is composed of radial action functions like Gauss function, while the output is usually a simple linear function. In theory, RBF network and BP network can approximate any continuous non-linear function, the main difference between them is that they use different action functions. In BP network, sigmoid function is used, which is nonzero in the infinite range of input space, while the action function of RBF network is local. When BP network is used for function approximation, negative gradient descent method is used for weight adjustment, which has its limitations, that is, slow convergence speed and local minimum. Radial basis function network is superior to BP network in approximation ability, classification ability and learning speed. For the detailed algorithm principle and in-depth discussion of BP network and RBF network, please refer to the literature. The topological structure of the two neural networks is shown in Fig. 1.

Fig. 1 Topological structure of two kinds of neural networks

1226

C. Zhao

4 Problems and Modeling Concrete is a kind of artificial material which is composed of water mixing, coarse and fine aggregate and water mixing, and through a series of physical and chemical actions. Generally, 14 characteristics of concrete are selected as the factors that affect the strength of concrete. These factors include the strength of cement, the water cement ratio, the amount of water, the amount of cement, the maximum particle size of coarse aggregate, the fineness modulus of sand, the rate of sand, the ratio of bone ash, slump and additives. Among them, 7 factors play a decisive role in the formation of concrete strength, and there is a complex nonlinear relationship between these factors and concrete strength. The problem in this paper comes down to the establishment of a nonlinear inputoutput relationship between the 28 day compressive strength of concrete and its influencing factors. The structure of BP neural network is 9-10-10-1. In learning, in order to make the network convergence speed fast and the system error small, this paper adopts the network correction method of the driving quantity term, the learning rate is 4 = 0.40, the momentum coefficient is 0.9, the number of iterations is epochs-5473, and the training error is t = 0.02. RBF network structure, the input layer is only used to input data, there is no transfer function; the transfer function of hidden layer unit is radial basis function; the transfer function of output layer unit is linear function.

5 Learning Training and Prediction Results of the Model In this paper, 43 sets of data are collected from literature [9], among which the first 36 sets of data are used as training samples, and the last 7 sets of data are used as test samples. BP network and RBF network are used for training and testing respectively. BP network learning training and prediction results. Under the development environment of MATLAB 6.5, the network program is compiled, and the corresponding program is run on the computer with the training sample set of the network. The simulation is carried out with the training network, and the calculation results are obtained. Compared with the expected results in literature [9] (listed in the above table together), the concrete strength output by the network is relatively close to the concrete strength obtained from the test, with an average error of 1.75%, a maximum error of 2.59%, and an error accuracy of less than 5%, which can well meet the engineering requirements (see Fig. 2). It can be seen from Table 2 that the overall accuracy of RBF network is higher than that of BP network. The output concrete strength of the network is close to the concrete strength obtained from the test, with an average error 1.24%, maximum error 3.84% The error accuracy is less than 5%, which can well meet the engineering requirements.

Prediction and Analysis of the Relationship Between Porous Structure …

1227

Fig. 2 Network training error and iterative convergence curve

From the above two network prediction results, it can be seen that the relative error of RBF network prediction value is smaller than that of BP network prediction value. Because of the difference of structure, transfer function and algorithm, RBF network is superior to BP network in nonlinear prediction in theory, which has been proved in this test.

6 Conclusions The neural network system has good performance, strong generalization ability and high prediction accuracy. And it can be used to simulate the performance of concrete. The results of the influence of concrete composition on the strength of concrete meet some accepted rules of the performance change of concrete, which shows the consistency of computer simulation and experimental research. According to some parameters of fresh concrete, the above two neural network systems can provide a fast and economic method to estimate the 28 day compressive strength of concrete in the early stage.Therefore, the application of artificial neural network system to the prediction of concrete performance and further application research will have a high practical value, and show a good development prospect.

1228

C. Zhao

References 1. Japanese building society, collection of early rapid test methods for concrete (Translated by Zhou Huilin), 1st edn. China Construction Industry Press, Beijing (1991) 2. Wu, Z.: High Performance Concrete, 1st edn. China Railway Press, Beijing (1999) 3. Tang, X., Li, J.: Study on Strength Estimation Model of Lime Stabilized Soil Based on Neural Network Technology. Changsha Institute of Communications 199015(3), 38–41 4. Chen, Q.: Prediction of Volume Properties of Asphalt Mixture Based on Artificial Neural Network, vol. 18(4), pp. 48–51. Changsha Jiaotong University (2002) 5. Matlab65 Auxiliary Neural Network Analysis and Design of Feisi R & D Center of Science and Technology Products. Electronic Industry Press, Beijing (2003) 6. Zheng, H.: Use Skills and Examples of Matlab5x Workboxes. Huazhong Science and Technology Press, Wuhan (2000) 7. Xu, L.: Neural Network Control. Harbin University of Technology Press, Halyan (1980) 8. Wen, F., Zhang, C.: Artificial neural network and simulation evolutionary computation. Tsinghua University Press, Beijing (2000) 9. Wang, J.: On the intelligent method of measuring and simulating the strength of Hou suppository concrete. J. Civ. Eng. 10(36), 24–29 (2003)

Effectiveness Evaluation of Business English Practice Teaching Based on Decision Tree Algorithm Hongmin Nie

Abstract Focusing on the problems in the current business English practice teaching, such as the lack of connection between talents and actual needs, vague training objectives, insufficient cooperation between schools and enterprises, and irregular teaching system, this paper designs a time teaching effectiveness evaluation model of business English in Higher Vocational Colleges Based on the improved ID3 decision tree algorithm, and optimizes the attribute selection and information gain of the data set based on the ID3 decision tree algorithm. The simulation results of station gate show that the improved algorithm greatly reduces the operation cost of meta algorithm. Then, it evaluates the colleges and universities with the help of the improved model, and designs the improvement strategies based on the evaluation results of examples, including the practical teaching objective system, the practical teaching content system, the practical teaching management and evaluation system, etc. Keywords Business English · English practice teaching · Teaching effect evaluation · Improved ID3 algorithm · Optimization of operation cost

1 Introduction In higher education, the most important is the practical teaching system, which is to help students obtain practical ability, especially professional ability, so as to create high-quality technical talents. The construction of practical teaching system of professional competence for business English majors not only makes business English develop, but also enriches students’ business English knowledge, so that the talents trained are more in line with the needs of the society [1]. There are narrow sense and system. The generalized practical teaching system refers to the constituent factors in various teaching activities, that is to say, it covers the practical teaching H. Nie (B) East China Jiaotong University, Nanchang 330100, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_156

1229

1230

H. Nie

content system, practical teaching objective system, practical teaching guarantee system and practical teaching management system. In addition, the narrow practical teaching system mainly starts from the content of practical teaching, and determines the training objectives of students. It combines the education of theoretical courses with practical teaching, that is to say, the practical training and graduation design of students are put together. At present, China’s higher education is in the process of development, so the practical teaching system has become very important. Many colleges and universities have specially organized scientific research teams to study the practical system of business English, thus forming “practical teaching” and “practical teaching system” with their own characteristics. But at the same time, there are also many deficiencies. First, the practical ability of students is not cultivated in the practical education of business English major, which leads to many problems such as professional mismatch or social needs. Second, the concept of practical teaching system is confused, and the “practical teaching mode” is injected into business English major It is often confused with the concepts of “practical teaching” and “practical teaching”, so it is difficult to achieve the fundamental goal. Third, the lack of communication between schools and enterprises, teachers and training base construction is not perfect. Fourthly, the practical teaching management system of business English Majors in Colleges and universities is not perfect. The practicality is often not strong and there are many grey areas, and some ideas are difficult to implement. Fifthly, the monitoring system of practical teaching quality of business English Majors in Colleges and universities is not perfect, so it is difficult to test students’ practical skills. All these have a serious impact on the cultivation of business English professionals. Therefore, it is very important to construct a perfect practical teaching system for business English majors.

2 Teaching Effectiveness Evaluation Based on ID3 Decision Tree Based on ID3 decision tree, the process of the evaluation model of business English practice teaching in higher vocational colleges is as follows: suppose s is a set, which is composed of |S| student achievement data samples. Define that the “class label” attribute has n distinct values, and define its n different classes as Ci (i = 1, 2, . . . , n). Assuming that there are Ci samples in class |Ci |, the expected information required for sample classification is given as follows (1): I (S1 , S2 , . . . , Sn ) =

n 

− plog2 ( pi )

i=1

where pi = |Ci |/|S| represents the probability of each sample in class i.

(1)

Effectiveness Evaluation of Business English Practice …

1231

Define that attribute A contains m distinct values {x1 , x2 , . . . , xm }, (S1 , S2 , . . . , Sm ) is that attribute A divides s into m subsets, where SJ samples have the same value x j ( j = 1, 2, . . . , m) on attribute a. In the definition subset  S j , there are  Si j  samples in class I. the entropy of subset a and the information expectation of teaching effectiveness are shown in formula (2):  m    S1 j + S2 j + · · · + Sn j   E(A) = I S1 j + S2 j + · · · + Sn j |S| j=1

(2)

The application of ID3 decision tree in the effectiveness evaluation model of business English practice teaching in Colleges and universities will also have the following defects: ID3 algorithm is greedy, in the incremental learning task, it can not obtain training samples incrementally at the same time, resulting in the abandonment of the original decision tree and the need to build another decision tree, resulting in complex calculation and high cost. Therefore, this paper improves ID3 decision tree algorithm according to the above defects.

3 ID3 Decision Tree Algorithm In the evaluation model of Higher Vocational Business English practice teaching based on ID3 decision tree, n operations are needed to determine the score data of one of the students. When there is a large amount of data, the operation will become very slow, resulting in the efficiency of decision tree generation. Therefore, we redefine the selection criteria of attributes in the data set to reduce the operation cost and time consumption of the decision tree. Based on the properties of convex functions, this paper optimizes the information formula. The log2p function in formula (1), P is the proportion of a certain type of records in the total number of records, and its definition domain is (0, 1]. When any two points P1 and P2 are selected on (0, 1], and P1 − P2 = P → 0, log2 P function is continuous on (0,1). According to (1), check the concave convex property of log2 P function, as follows (3) and (4) [2]:   log2 P = (log2 P) =

1 P × ln2

(3)

1 B indicates that a will occur at the same time as B. support (A -> B) indicates that the number of simultaneous occurrences of item set A and B accounts for the percentage of all transactions in transaction set D, that is: support(A -> B) = support(A ∪ B) =

4.

count (A ∪ B) |D|

Confidence: for A -> B, confidence (A -> B) represents the ratio of A ∪ B’s support to A’s support. Therefore, confidence can also represent the probability that item set B will appear at the same time when item set A appears in transaction set D, that is: con f idence(A− > B) =

suppor t (A ∪ B) suppor t (A)

1314

H. Li

The “strong rule” in association rules means that users usually preset a minimum value of support and confidence before data mining, that is, Smin and Cmin . In the process of data mining, we only care about those rules whose conditions are greater than or equal to these two minimum values, that is, we can filter out the rules that users are interested in through “strong rules”.

5.2 On the Spot Tactics Analysis System of Badminton Badminton on-the-spot technical and tactical analysis system is a sub-system of the research project “quality monitoring of badminton technical training and development and application of on-the-spot tactical statistics software based on tablet computer” by the State General Administration of sport. Its purpose is to realize the on-the-spot quick statistics of athletes’ competition data, and quickly summarize the statistical data to the backstage database by wireless transmission. After data preprocessing After processing, the association rules are mined, and the association rules are used to guide the daily training of athletes and the on-the-spot decision-making of coaches. The system mainly includes the following functions: 1.

2.

3.

4.

5.

On Android Tablet, it can realize the on-the-spot fast statistics of athletes’ score, total number of shots, round time, 5-point rate and relevant technical and tactical information of the last shot of each round, and store the collected information into the database in time and upload it to the backstage server for later analysis and mining of the overall data [3]. On the windows platform, we can input the technical and tactical statistical information in the form of Excel, and input the previous statistical data of athletes’ competition information into the same database, so as to realize the multi-channel entry of competition information. Realize the separation of data mining table and comprehensive information base, so that the operation of data mining does not affect the management and maintenance of comprehensive database. The user defines the constraint conditions, the minimum support and the minimum confidence, and mines the association rules that meet the user’s needs from the collected competition data. Realize the visual presentation of association rules and the generation of reports. Users can query the analysis results through mobile terminals.

6 Conclusions First of all, starting from the development of badminton in China, this paper discusses the feasibility of introducing data mining technology into badminton field, making scientific training plan and on-the-spot tactical assistant decision-making for coaches. The basic knowledge of data mining and association rules is studied. On the basis

Data Mining for Badminton On-the-Spot Tactics Analysis System

1315

of determining the association rules as the research direction, this paper studies the performance defects of the algorithm itself, and puts forward the method of introducing constraints to improve the performance of the algorithm in view of its shortcomings such as many times of traversing the database and the lack of pertinence of the mining results. After that, the paper discusses the types of constraints, combines the actual situation of badminton statistical data, applies the acarmi algorithm to the badminton statistical data mining, designs and implements the badminton on-thespot tactical analysis system, including the data collection software suitable for the mobile terminal and the PC terminal, a data conversion model suitable for badminton statistical data, and acarmi algorithm mining Mining tools and visualization of mining results. Finally, through the analysis and evaluation of the experimental results, the auxiliary supporting function of badminton training and on-the-spot decision-making is verified.

References 1. Maijiu, T.: New development of theoretical system of sports training in China. J. Beijing Sport Univ. 02, 145–148 (2003) 2. Jiawei, H., Kamper, M.: Data mining: Concept and Technology, pp. 232–233. Machinist, 1 Press, Beijing (2001) 3. Singh, J., Ram, H., Sodhi, D.J.: Improving efficiency of apriori algorithm using transaction reduction. In: Proceeding of IJSRP, vol 3, issue 1 (2013)

Integral Factor and Conserved Quantity of Lagrange System Based on Fractional Order Model Juqing Liu

Abstract In order to further study the conserved quantity of the mechanical system based on the fractional order model, this paper applies the integral factor method to the fractional order Lagrange system, and establishes a new method to find the conserved quantity of the Lagrange system under the fractional order model. Firstly, the necessary conditions for the existence of conserved quantity in fractional Lagrange system and the relationship between the integral factor and the conserved quantity are found. Secondly, the fractional generalized killing equation for determining the integral factor is defined and given. Finally, the conserved quantity of Lagrange system based on fractional order model is obtained. At the end of the paper, an example is given to illustrate the application of the results. Keywords Fractional model · Lagrange system · Integral factor · Conserved quantity

1 Introduction Many physical systems in nature exhibit fractional order dynamics due to their special material and chemical properties. In fact, most of the actual systems are fractional order. Therefore, it is more accurate to use fractional order model to describe various phenomena in nature and engineering practice. The research of fractional calculus expands people’s thinking and fills in the defect of traditional calculus representation. In recent years, fractional calculus has been widely used in various fields, such as physics, finance, hydrology, polymer polymerization physics, biology, chaos dynamics, control theory and so on. The application of fractional calculus to mechanical system modeling can be traced back to Riewe’s work. He established fractional Euler Lagrange equation and Hamilton regular equation of mechanical system. The study of symmetry and conservation of fractional variational problems is an important J. Liu (B) School of Mathemacics and Information Technology, Yuxi Normal University, Yuxi 653100, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_168

1317

1318

J. Liu

aspect of fractional dynamical systems. Frederico and Torres introduced the concept of fractional order conserved quantity based on the variational principle [1]. Firstly, the invariance of fractional order variational problem is studied, and the fractional order Noether theory is given. Atanackovic’ et al. Studied the invariance and Noether theory under the definition of Riemann Liouville fractional order derivative, and pointed out that the definition of Frederico and Torres fractional order conserved constant is not clear. In 1984, Djukic’ proposed an integral factor method to construct conserved quantities of nonconservative mechanical systems, that is, to directly construct conserved quantities of systems by multiplying regular equations by appropriate integral factors [2]. A series of achievements have been made in the study of the integral factor method applied to the conservation of mechanical systems. The integral factor method has few restrictions. The characteristic of easy calculation has great application value in finding the conserved quantity of all kinds of constrained mechanical systems, but there is no report about applying the integral factor method to the conserved quantity of mechanical systems based on fractional order model. In this paper, the integral factor method is applied to the fractional Lagrange system for the first time, and a new method to find the conserved variables of the mechanical system under the fractional order model is established [3]. Because the integer order system can be regarded as its special case, the results of this paper are of universal significance.

2 Fractional Derivative The left remiann lionville fractional derivative is defined as follows: α t1 D t

d 1 ( )n f (t) = (n − α) dt

t (t − τ )n−α−1 f (τ )dτ

(1)

t1

The right remiann lionville fractional derivative is defined as follows α t1 Dt2 f (t) =

d 1 (− )n (n − α) dt

t2 (τ − t)n−α−1 f (τ )dτ

(2)

t1

where, f is a continuous differentiable function on the interval [t1 , t2 ],  (*) is a Gamma function,n - 1 ≤ α < n. If the derivatives α are integers, they become α t1 Dt

α t12 Dt

f (t) = (

d n ) f (t) dt

f (t) = (−

d n ) f (t) dt

(3) (4)

Integral Factor and Conserved Quantity …

1319

Remiann-Lionville fractional derivative is related to the synthesis of integral derivative as follows dn α n+α f (t) t D f (t)) = t1 Dt dt n 1 t

(5)

3 Fractional Lagrange System and Its Integral Factors Suppose that the configuration of a mechanical system consists of N generalized coordinates qs (s = 1, …, n). Based on the fractional derivative of Remiann-lionville, that is, the Lagrange function is   L t, qs , q˙s+1 Dtα qs

(6)

The fractional Lagrange system can be expressed as   ∂ ∂L d ∂L α − −t D+2 = 0 n − 1 ≤ α < n, n ∈ N ∗ dt ∂ q˙s ∂qs ∂t1 Dtα qs

(7)

·

A function I (t, qs , q , t1 Dtα qs ) is defined as the fractional conservation of Lagrange s

system (7) under the fractional order model, if and only if the solution curve along the equation of motion (7) is constant  d  I t, qs , q˙s t1 Dtα qs = 0 dt

(8)

∂ ∂L d ∂L α − − t Dt2 )ξs dt ∂ q·s ∂qs ∂t1 Dtα qs

(9)

Definition 2 if invariant ( Identity becomes 

  d ∂L ∂L ∂L d ∂L α ξs ≡ Lξ0 + − −t Dt2 (ξs − q˙s ξ0 ) α dt ∂ q˙s ∂qs ∂t1 Dt qs dt ∂ q˙s ⎞  t  ∂L ∂L α α dθ + G ⎠ + ˙ 0 ) − (ξs − qξ ˙ 0 )θ Dt2 t1 Dθ (ξs − qξ ∂t1 Dθα qs ∂t1 Dθα qs t   d ∂L ∂L ∂L α + μs (10) − − t Dt2 dt ∂ q˙s ∂qs ∂t1 Dtα qs

1320

J. Liu

  · where, (ξ0 , G) and t, qs , q˙s ,t1 Dtα qs , then ξs = ξs (t, qs , q , t1 Dtα qs ) is the integral s

factor of fractional Lagrange system (7).

4 Conservation Theorem Combined (7) and (10), with  d ∂L Lξ0 + (ξs − q˙s ξ0 ) dt ∂ q˙s ⎞  t  ∂L ∂L α dθ + G ⎠ D α (ξs − qξ ˙ 0 ) − (ξs − qξ ˙ 0 )θ Dt2 + ∂t1 Dθα qs t1 θ ∂t1 Dθα qs t1   d ∂L ∂L ∂L α − μs (11) − − t Dt2 dt ∂ q˙s ∂qs ∂t1 Dtα qs Theorem 1 if the function ξ s is the integral factor of the fractional Lagrange system (7), then the system has a conserved quantity (the first integral), as shown in  I=

Lξ0 + t 

+ t1

∂L (ξs − q˙s ξ0 ) ∂ q˙s

⎞  ∂L ∂ L α dθ + G ⎠ D α (ξs − qξ ˙ 0 ) − (ξs − qξ ˙ 0 )θ Dt2 ∂t1 Dθα qs 1 θ ∂t1 Dθα qs I = Lξ0 +

∂L (ξs − q˙s ξ0 ) + G ∂ q˙s

(12)

(13)

For the Lagrange system (7), if the function ξs is its integral factor, then each group of functions ξs , ξ0 , G and μs must meet the necessary conditions (11). The Eq. (11) is expanded to   d ∂L ∂L ∂L α ξ0 + qξ ˙ 0+ D q s ξ0 ∂t ∂qs ∂t1 Dtα qs dt t1 t    d ∂L ∂L  ξ˙s + q˙s ξ˙0 + L ξ˙0 + (ξs + q˙s ξs ) + dt ∂ q˙s ∂ q˙s  ∂L  α + t D (ξs − q˙s ξs ) ∂t1 Dtα qs 1 t ∂L − G˙ +  = 0 − (ξs − q˙s ξs )t1 Dtα ∂t1 Dtα qs Among

(14)

Integral Factor and Conserved Quantity …

  = μs

d ∂L ∂L ∂L α − − t Dt2 dt ∂ q˙s ∂qs ∂t1 Dtα qs

1321

 (15)

Using Eqs. (7) and (14) can be further written as · ∂L ∂L ξ0 + ξs + L ξ0 ∂t ∂qs     d ∂L ∂L α α + D q s ξ0 t1 Dt (ξs − q˙s ξs ) + ∂t1 Dtα qs ∂t1 Dtα qs dt t1 t  ∂L  ξ˙s + q˙s ξ˙0 + G˙ +  = 0 ∂ q˙s

(16)

It can be seen that if the function groups ξs , ξ0 , G and μs satisfy the necessary conditions (16), then along the motion trajectory of the Lagrange system, the function group makes the right side of Eq. (12) a constant. So there are. Theorem 2 if the function groups ξs , ξ0 , G and μs satisfy the necessary conditions (16), then there is a conserved quantity (12) in the Lagrange system (7). Integral Eq. (16) or other methods can be used to obtain any special solution or function solution of function group ξs , ξ0 , G and μs corresponding to Eq. (16). From theorem 2, a conserved quantity of Lagrange system (7) can be obtained. The key to find the conserved quantity of Lagrange system by using the above theorem is to find the function. Group ξs , ξ0 , G, μs . Since the functions ξs , ξ0 , G do not depend on q¨ s , the Eq. (16) is expanded so that the coefficients with q-bite s and without q¨ s are zero respectively. The linear partial differential equation obtained is     ∂L ∂L ∂L d α α ξ0 + ξs + D q s ξ0 t1 Dt (ξs − q˙s ξs ) + ∂t ∂qs ∂t1 Dtα qs dt t1 t    d ∂ξs ∂ L ∂ξs ∂ξs + + q˙k + D α qs α ∂ q˙s ∂t ∂qk ∂t1 Dt qk dt t1 t    ∂ξ0 d ∂ξ0 ∂ξ0 α + − q˙s q˙k + D qs ∂t ∂qk ∂t1 Dtα qk dt t1 t    d ∂ξ0 ∂ξ0 ∂ξ0 α + +L q˙s + D qs ∂t ∂qs ∂t1 Dtα qs dt t1 t   d ∂G ∂G ∂G α + + q˙s + D qs ∂t ∂qs ∂t1 Dtα q S dt t1 t  2   ∂ L d ∂2 L ∂2 L α ξ0 + + μs q˙k + D qk ∂ q˙s ∂t ∂ q˙s ∂qk ∂ q˙s ∂t1 Dtα qk dt t1 t  ∂L ∂L α =0 − − t Dt2 ∂qs ∂t1 Dtα q S

(17)

1322

J. Liu

∂L ∂ q˙s



˙ 0 ∂ξs ∂2 L ∂ξ ∂G ∂ξ0 − q˙s + + μs = 0 (k = 1, n) +L ∂ q˙k ∂ q˙k ∂ q˙k ∂ q˙k ∂ q˙s ∂ q˙k

(18)

Equations (17) and (18) are (n + 1) equations for (2n + 2) unknown functions ξs , ξ0 , G, μs , which are called generalized killing equations. Because the number of equations is less than the number of unknown functions, the solution of generalized killing equation is not unique. Different conserved quantities can be obtained by properly selecting ξ s, τ, G, μ s.

5 An Example On the fractional Lagrange function of mechanical system L=

ω2 2 1 α 2 q (t) t1 Dt q(t) − 2 2

(19)

where Omega is a constant. The differential equation of motion of the system is α α 2 qt − t Dt2 t1 Dt q(t) = 0

(20)

The generalized killing Eqs. (17) and (18) are given     d α ˙ D q(t) ξ0 + − 2 q(t)ξ1 − t1 Dtα q(t) t1 Dtα (ξ1 − q(t)ξ ) 0 t1 t dt   ∂ξ0 ∂ξ0 ∂ξ0 d + q(t) ˙ + +L D α q(t) t1 t ∂t ∂q(t) ∂t1 Dtα q(t) dt   ∂G ∂G ∂G d α + + q(t) ˙ + D q(t) t1 t ∂t ∂q(t) ∂t1 Dtα q(t) dt  2 α α + μ1 q(t) −t Dt2 t1 Dt q(t) = 0 L

∂ξ0 ∂G + =0 ∂ q(t) ˙ ∂ q(t) ˙

(21)

(22)

Equations (21) and (22) have solutions ξ0 = 1, ξ1 = 0, G = 0, μ1 = q(t) ξ0 = 0, ξ1 = q˙ (t), G =

2 ω2 2 1 q (t) − t1 Dtα q(t) , μ1 = 0 2 2

(23)

(24)

According to theorem 1 and 2, there are the following conserved quantities for the system of function group (23) - (24)

Integral Factor and Conserved Quantity …

 2 1  α 2 2 t1 Dt q(t) − q (t) 2 t    α  −t1 Dθα q(θ )t1 Dθα q(θ + ˙ ) + θ Dt2t1 Dtα q(θ )q(θ ˙ ) dθ

1323

I1 =

(25)

t1

 2  1 2 2 q (t) − t1 Dtα q(t) 2 t  α   α  + tt Dθ q(θ )t1 Dθα q(θ ˙ ) − θ Dt2t1 Dtα q(θ )q(θ ˙ ) dθ

I2 =

(26)

t1

When α → 1, Eqs. (25) and (26) become I1 =

 1 2 q˙ (θ ) + 2 q 2 (t) 2

(27)

I2 =

 1 2 q˙ (θ ) + 2 q 2 (t) 2

(28)

6 Conclusions Finding the conserved quantity of the system is an important aspect in the study of fractional order dynamical system. In 1984, Djukic proposed to construct the conserved quantity of a complete nonconservative dynamic system by using the integral factor method, which is similar to the classical Lagrange method of constructing the energy integral of a conservative system, that is, to directly construct the conserved quantity of the system by multiplying the differential equation of motion by an appropriate integral factor. This paper is a further study on the application of the integral factor method. The integral factor method is applied to construct the conserved quantity of fractional Lagrange system, which provides a new way to find the conserved quantity of fractional Lagrange system.

References 1. Chengxiang, Z., Yun, Z.: Review of fractional order control research. Control Decis. 24(2), 161–169 (2009) 2. Torvik, P.J., Bagley, R.L.: On the appearance of the fractional derivative in the behavior of real material. J. Appl. Mech. 51(2), 284–298 (1984) 3. Kilbas, A.A., Srivastava, H.M., Trujillo, J.J.: Theory and Applications of Fractional Differential Equations. Elsevier B V, Amsterdam (2006)

Multi Objective Optimization of Construction Project Based on Ant Colony Algorithm Jin Chen

Abstract With the development trend of large-scale and complex construction projects, safety accidents occur frequently, leading to the original management mode can not solve the more complex and severe problems encountered in the modern construction project management. A new management mode is urgently needed to deal with the contemporary construction projects. In this regard, this paper introduces the concept of construction reliability, which is applied to the construction project management, so as to better achieve the management of construction projects. The construction project optimization model based on four objectives is constructed with the construction system reliability as the constraint condition. The qualitative indexes of quality objective and safety objective are quantified, and the model is solved by multi colony ant colony algorithm. Keywords Construction system · Multi-objective optimization · Ant colony algorithm

1 Overview of Construction System Reliability of Construction Project The meaning of construction network system reliability of construction engineering project is: in the process of project construction, the ability to safely and effectively reach the predetermined project quality within the required completion period and within the limited cost [1]. Therefore, we can understand the construction reliability of construction engineering project from the four aspects of cost, construction period, quality and safety, which is specifically understood as the construction period reliability, cost reliability, quality reliability and safety reliability of engineering projects. Reliability includes qualitative and quantitative meanings, and is generally described quantitatively by reliability. It is specially pointed out that the meaning of reliability J. Chen (B) Shandong Vocational College of Science and Technology, Weifang 261053, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_169

1325

1326

J. Chen

and reliability in this paper are the same, and both represent the size of reliability. The reliability of construction work unit of engineering project refers to the ability of each work unit in the construction project to complete the construction task safely and effectively and achieve the predetermined project quality under the required planned cost in the construction process. The reliability of construction network system is based on the reliability of each work unit. Only when the reliability of each work unit is determined can the reliability of the construction system of the whole construction project be determined.

2 Multi Objective Optimization Based on Ant Colony Algorithm 2.1 Basic Principle of Ant Colony Algorithm Ant colony algorithm is an intelligent optimization algorithm proposed by M. Dorigo, V. maniezzo et al. Ant colony algorithm (ACO) is a behavior process in which ants can always find the shortest path from nest to food. We use “pheromone” to describe the substance produced by ants in the process of searching for food. This substance can be perceived by subsequent ants and the concentration of this substance can guide its direction. The probability of ants choosing a path is based on the pheromone concentration on the path. The higher the concentration, the greater the probability of being selected by ants. According to this way of information exchange, ants finally find the shortest way to search for food. Taking TSP problem as an example, the basic ant colony algorithm is introduced. Let a denote the number of ants in the ant colony; di j represents the distance from city i to city j, where ti j (t) and N are the number of cities; represents the residual pheromone of ants on path d at time t, and set the pheromone amount on each path at the initial time to be the same, and set [2]. Ant determines its direction by sensing the pheromone concentration on each path. represents the probability that ant chooses from city I to city J at the moment, and the transition probability is determined by heuristic information (and residual information I on each path, according to formula.

2.2 Multi Objective Optimization Mechanism of Improved Ant Colony Algorithm Based on the basic ant colony algorithm, this paper adopts the ant colony optimization algorithm based on multi colony. The basic idea of multi colony optimization algorithm to solve the multi-objective optimization problem is: the ant colony is divided into the corresponding population number according to the number of objective functions. If there are m objective functions, then the ant colony is divided into

Multi Objective Optimization of Construction Project …

1327

m populations, and each population is independent when searching. According to certain rules, the path selection and pheromone updating are carried out to make the various groups interact and finally find Pareto The optimal solution. 1.

Abstract problem and definition of algorithm

Taking each process in the construction project as the path to complete the whole project, then the sequence of all processes constitutes a complete whole path of the project. That is, the path of artificial ant search is a construction network diagram composed of n processes. Because each process has different working modes, an n-process project constitutes an n ∗ m matrix (as shown below), in which ants search. In the matrix, Im represents the m-th working mode of operation No. ⎡

I1 I2 ⎢ . ⎢ i 1 .. ⎢ ⎢ . . ⎣ .. .. n1 n2

· · · Im



⎥ · · · im ⎥ ⎥ . ⎥ · · · .. ⎦ · · · nm

3 Implementation of the Algorithm Implementation and flow chart of the algorithm. The basic idea is: first initialize the four ant populations and pheromones, set four target values respectively for the four objectives of construction period, cost, quality and safety, and conduct independent search for the four populations. When one ant of a certain population has completed the search once, the results obtained will be brought into the objective function and compared with the target value, and then the pheromone described in the previous section will be analyzed The method of coevolution is coordinated to promote the evolutionary direction of different populations, and the solutions that meet the conditions are recorded in the external set. The algorithm flow chart is as follows (Fig. 1).

4 Multi Objective Optimization with Construction System Reliability as Constraint 4.1 Multi Objective Collaborative Optimization Model with Construction Reliability Constraints The objective system of engineering project should be a stable and balanced target system. Overemphasizing one target will usually affect and damage other objectives

1328

J. Chen

Fig. 1 Algorithm flow chart

[3]. The key of multi-objective optimization of engineering project is to improve the overall effect of project management and achieve multi-objective balanced development. In this chapter, the construction project optimization model based on four major objectives is constructed with construction reliability as the constraint condition, and the model is optimized by ant colony algorithm.

4.2 An Algorithm for Solving Multi Objective Optimization Problems The multi-objective optimization problem is proposed from the mathematical point of view. The difference between multi-objective optimization problem and single objective optimization problem is that there is only one objective function in single objective optimization problem, and people only need to find the optimal solution to meet the objective function; The multi-objective optimization problem, due to the existence of multiple objective functions and constraints, so when one goal is optimal, it is likely to make the other objectives the worst. It is difficult to achieve the optimization of all objectives if each objective is constrained and influenced by each other. Therefore, it is not possible to evaluate the merits and demerits of

Multi Objective Optimization of Construction Project …

1329

functional solutions according to whether one objective is achieved or not. Therefore, a set of optimal solutions is usually used Together, the solution of multi-objective optimization problem is represented [4]. The definition of multi-objective optimization problem is: let it be a decision vector, f(x) is an objective function, and the objective function contains n sub objectives: f (x) = ( f 1 (X ), f 2 (X ), f n (X )) s, t − gi (x) ≥ 0, i = 1, · · · , m x∈X

(1)

5 Conclusion Based on the existing reliability theory of construction system, this paper proposes to establish a multi-objective optimization model with construction reliability as the constraint condition, and optimizes the model by ant colony algorithm from the perspective of quality, construction period, safety and cost. Through the study of a large number of domestic and foreign research results on construction project management, based on the system theory, the construction project is regarded as a complex system engineering, and the construction network system is deeply analyzed based on the research method of network reliability.

References 1. Sheng, G.S., Lingxia, Z.: Reliability Theory and Engineering Application. National Defense Industry Press, Beijing (2002) 2. Chunrui, Z: Current Situation and Prospect of System Engineering, pp. 1–56. Department of Science and Technology of Japan, China Social Sciences Press, Beijing (1983) 3. Weiliang, J., Zhigang, S., Yuxi, Z.: Life cycle reliability and safety of engineering structures under disasters. J. Zhejiang Univ.: Eng. Edn. 40(11), 1862–1867 (2006) 4. Xiangrui, H.: Reliability Engineering, pp. 2–15. Tsinghua University Press, Beijing (1990)

On the Early Warning of Internet Financial Risk Based on Big Data Yangfeng Hu

Abstract Thanks to the rapid development of big data and cloud computing, Internet finance has made some progress. But in terms of the regulatory system, there are still some problems with Internet finance, such as legality, regulation, security and so on. These problems will lead to the emergence of financial risks, which is not conducive to the development of Internet finance. Therefore, it is necessary to establish an early warning mechanism to prevent the emergence of Internet financial risks. This paper mainly studies the early warning of Internet financial risk based on big data. By analyzing the characteristics of Internet financial data, this paper puts forward the principles and strategies of the design of Internet financial risk early warning system based on big data, which aims to provide relevant reference for the construction of Internet financial risk early warning mechanism. Keywords Big data · Internet finance · Risk warning The rapid development of big data and cloud computing provides new development opportunities for the development of Internet finance. To some extent, the Internet financial platform provides more investment and financial channels for the public, facilitates the financing of small and medium-sized enterprises, and promotes the development of the economy. However, there are many risks in Internet finance, which is not conducive to its long-term development. Therefore, it is necessary to carry out early warning of Internet financial risks.

1 Overview of Internet Financial Risks Internet finance, as a new financial development model, combines Internet technology and mobile communication technology to promote the financing and the development Y. Hu (B) Wuhan Textile University, Hubei 430000, Wuhan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_170

1331

1332

Y. Hu Internet Financial

Macro

L e g al ri s

P o li c y ri

Microfact

M a r k e t

E c o n o m

C r e d it ri

Li q u i d it

R is k o f ill

P a y m e n

R e p u t a

T e c h n ic

O p e r a Ɵ

S a f e t y

I n f o r m

Fi n a n ci al

M o r al h a

Fig. 1 Composition of internet financial risk factors

of financial industry. This financial model varies from commercial banks to capital markets. Thanks to the development of Internet technology, Internet finance has made some progress. But compared with the traditional financial market, in terms of regulatory system, Internet finance still has some problems, such as legal, normative, security and so on. These problems will lead to the emergence of financial risks, which is not conducive to the development of Internet finance. Therefore, it is necessary to establish an early warning mechanism to prevent the emergence of Internet financial risks. The construction of Internet financial early warning system should be based on big data, combined with the traditional method of analyzing financial risks, considering the actual situation of Internet economy, using artificial intelligence technology, computer technology and statistical related knowledge to compare and analyze big data, analyze the law of data change, identify the potential financial risks of the Internet, and also understand the trend of customers according to the change of data, and then promote the rapid development of Internet economy. The influencing factors of Internet financial risk mainly include macro and micro aspects, as shown in Fig. 1.

2 Data and Characteristics in Internet Finance 1.

Classification of Internet financial data

Big data runs through the development of Internet finance all the time. In the process of Internet financial transaction, the customers, enterprises and related financial products and services involved in Internet finance can save the information data of customers through Internet finance, and provide the relevant data information of products, so that the relevant data information of customers operating on the Internet platform can be saved. According to the process of operating Internet financial data,

On the Early Warning of Internet Financial Risk Based on Big Data

1333

the data can be divided into user information data, transaction information data, user operation data and so on. 2.

Characteristics of Internet Financial Data

For Internet financial data there are three characteristics: First, high speed. Mainly refers to when sending and receiving the data of Internet finance, it needs to be efficient and timely, can not appear long delay, otherwise it will bring big loss. Second, scale. Mainly refers to the Internet financial data information is massive, mainly manifested in two points: the number of users massive and the transaction scale massive. Third, diversity. Mainly refers to the Internet financial data types are very many, including structured and unstructured data. Combined with these three characteristics of Internet data, through a scientific and reasonable way to process data, there are two main ways in the current mainstream, one is batch processing, the other is flow processing. Potential risks in Internet finance can be detected in a timely and effective manner. Design Principles of Internet Financial Risk Early Warning System Based on Big Data. Under the background of big data, it is necessary to take big data as the center to construct the network risk early warning system. Combined with the characteristics of network finance, based on the relatively independent standards of each system, a system around the data is constructed to make the network finance diversified and three-dimensional, and to protect the overall operation of the system. 1.

Systematic principles

The function of the early warning system is complete and the system is huge, which can predict the data well and include the whole process of Internet finance. The early warning system includes all participants in the Internet financial business. In the design of Internet financial risk early warning system, it should be considered in the light of the macroeconomic and microeconomic situation of the country. 2.

Principle of timeliness

Because the data running speed of Internet finance is very fast, there are many kinds of databases, the scale is very large, the range of users is very wide, and the characteristics of industry are more diverse. These factors show that real-time, fast and accurate analysis of Internet financial data is very important, can identify risks in time, do a good job of rapid prediction, timely handling of risks. 3.

Operational principles

In the construction of Internet financial risk early warning system, we should combine the reality, analyze the situation of the economic environment, make the early warning system operational and executable, easy to implement and manage, easy to collect data and process data. In the analysis of data related to Internet finance, data formulation should be clearly defined, and the steps and standards of data statistics should be clearly defined. 4.

Principle of reasonableness

1334

Y. Hu

Table 1 Early warning index system of internet financial risk based on big data Level I indicators

Level II indicators III. Indicators

Mutual United Nations Credit risk Network Gold Finance Liquidity risk Wind Risk

Credit rating standards, credit rating content, credit audit procedures, whether there is a third-party guarantee, the borrower’s account is truly visible Transferable or net worth borrowing, per capita borrowing amount, withdrawal rate, borrowing period

Information risk

Are there communities or forums and QQ communication groups, relative freedom of forum, overdue rate and blacklist disclosure, disclosure of official announcements

Technical risks

Investor’s recognition of website security, convenience of website function, technical security, strict division of administrative authority, firewall isolation system cluster points, whether there is MD5 encryption processing

Reputation risk

Website trademark value, Enterprise strength, media report, Shareholder and team background, Negative Events

Financial risk

Total turnover, registered funds, average borrowing period, time-weighted turnover, capital leverage

In order to make the Internet financial early warning system become scientific, it should be designed with clear indicators, not only quantitative indicators, but also qualitative indicators. Through this dual guarantee, the quality of the early warning system can be controlled. Timely risk warning. Quantitative and qualitative indicators influence and cooperate with each other, which can make accurate and reasonable judgment on the whole process of Internet finance and avoid human mistakes. Based on the influencing factors of Internet financial risk, the early warning index system of Internet financial risk is constructed, as shown in Table 1.

3 Strategies for the Construction of Internet Financial Risk Early Warning Mechanism Based on Big Data Based on big data and cloud computing center, Internet finance has been developed rapidly. However, there are still some limitations in China’s supervision of the network financial system, so the development of Internet finance will appear some risks. But the industry supervision is not perfect, the entry threshold is low, causes the Internet finance to bear the risk aspect ability to become weaker. Based on this reality, in order to construct the Internet financial risk early warning mechanism under big data, we should do the following aspects. 1.

Improving the assessment and evaluation mechanism

On the Early Warning of Internet Financial Risk Based on Big Data

1335

Take the supervision principle as the angle, encourages the enterprise innovation, completes the risk prevention. When innovating Internet financial supervision, we should do a good job of balancing innovation and risk control, perfect the evaluation system, actively encourage innovation, do a good job of risk prevention, do a good job of principle supervision and routine supervision. 2.

Establish and improve the market Internet credit system

Compared with the traditional financial transaction mode, Internet finance has more virtuality and uncertainty, complex and diverse Internet financial behavior and low entry threshold of related industries, which invisibly increases the probability of Internet financial risk occurrence. Based on the new financial risk and the characteristics of Internet financial data, combined with the development law and basic national conditions of Internet industry, the threshold of market access should be standardized, and the government supervision system and the market credit system complement each other to promote the benign competition in the market. Establish Internet financial big data information management and credit system. 3.

Improving the operating procedures of the risk warning system

Internet financial institutions should monitor the internal system, but also monitor the database, storage space and subsystems in the system, track the operation process of maintenance personnel, collect and analyze security alarm logs, etc. Input the data information into the corresponding risk management model to generate a risk warning. Monitor the operation process to get and analyze the wrong log information. Timely transfer of operational vulnerabilities to risk management, so that risk management can be based on these data to determine the risk. 4.

Improving relevant laws and regulations on supervision

To perfect the early warning mechanism of Internet financial risk based on big data, we should establish and perfect the corresponding laws and regulations. For local governments, local regulations and industry guidelines should also be formulated to provide relevant criteria for the management of Internet financial risks. First, the existing laws and regulations should be based on the improvement of existing laws and regulations. Second, clarify the business scope of Internet financial institutions, such as business qualifications, business development model and risk prevention methods. In perfecting laws and regulations, we should pay attention to the confidentiality and use of data. Such a comprehensive and multi-level Internet financial laws and regulations system to promote the long-term development of Internet finance. In a word, based on the development background of big data, the main purpose of constructing the early warning mechanism of Internet financial risk is to make enterprises reduce the mistakes and loopholes in the course of operation, to do a good job of risk early warning, to do a good job of risk prevention, and to avoid the loss caused by risk. In the construction of Internet financial risk early warning mechanism, we should do a good job of assessment and evaluation, improve the staff assessment and evaluation mechanism; combined with the laws and characteristics of the development of the Internet industry, big data as the center to build a risk early

1336

Y. Hu

warning system. Standardize the scientific and reasonable Internet financial risk early warning operation system, timely transfer the operational loopholes in the operation process to the risk management department, so that the risk management department can achieve real-time monitoring, and take appropriate measures to prevent Internet financial risks.

References 1. Huang, A., Wenjing, Su.: An early warning study on internet financial risk based on big data analysis. Time Finance 11, 13–14 (2020) 2. Yuexin, Li.: An early warning study on internet financial risk based on big data analysis. Enterp. Technol. Dev. 04, 143–144 (2020) 3. Jialei, S.: Early warning study on internet financial risk under big data analysis. World Commun. 26(09), 174–175 (2019) 4. Shengzhi, S.: An early warning study on internet financial risk based on big data analysis. Bus. News (16), 21–23 (2019) 5. Yan, Z.: Early warning of internet financial risk based on big data. Time Econ. Trade 03, 73–74 (2019) 6. Jun, S.: Early warning and regulation of internet financial risk in big data era. Time Finance 30, 37–38 (2018)

BP Neural Algorithm for Mode of Scientific Protection of Art Heritage Xiaona Xie and Yitong Yang

Abstract It is a new path of scientific protection to study the inheritance of intangible cultural heritage. With eye tracking technology and equilibrium algorithm, traditional patterns can be observed and analyzed. Through the visual trace of different groups of people, the model towards observers, which is influenced by the three factors, including color, pattern and vision, can be concluded. Meanwhile, the public acceptance towards traditional art can be revealed. That provides the activation protection of intangible cultural heritage with scientific evidence. Keywords Intangible cultural heritage · Eye tracking technology · Equilibrium algorithm

1 Research Background At present, our country’s protection of intangible cultural heritage is faced with serious challenge. Influenced by a lot of factors the traditional art is gradually alienated by people. Moreover, many manual skills and crafts are short of successors, and artistic heritage is caught in crisis. To make traditional art integrate into life and attract people, it needs objectively to know some specific problems such as modern people’s preference, attention and focus towards traditional art. We strive to take a practical road which is based on scientific protection to promote the innovation of the traditional art. By virtue of eye movement recognition technology, for specified sample group, we would collect the data of physiological reaction, analyze the big data of body feeling, and design the preference equilibrium algorithm. Aiming at different factors of pattern changes, including background color, figurative degree, strong and faint contrast, we would analyze every factor’s impact on observer’s X. Xie (B) · Y. Yang College of Arts, Northeastern University, Shenyang 110819, Liaoning Province, China e-mail: [email protected] Y. Yang e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_171

1337

1338

X. Xie and Y. Yang

preference degree. According to scientific data, an objective qualitative assessment system of works would be established. Through the analysis of observer’s different influence factors towards traditional pattern, this paper explores the widespread rules of traditional pattern popularity in intangible cultural heritage, which, furthermore, is conductive to improve the methods of intangible cultural heritage protection.

2 The Research Method to Eye Movement Tracking Technology 2.1 The Fundamental Principles of Eye Movement Experimental System Through objectively recording and tracing readers’ eye movement, eye movement research method can obtain readers’ potential cognitive process. The fundamental principles of eye movement research are based on the hypothesis of eye-brain system, namely, the consistency between readers’ fixation process and brain’s information processing, which draws the conclusion that brain’s time of information processing is embodied by fixation duration [1]. By processing eye video information from infrared pupil camera, eye tracker system can recognize and determine the distance changes between the pupil center and the reflection point of cornea. The objective physiological data of subjects in observing visual information include visual motion trail of eyeballs, fixation duration, number of fixation points, average saccade duration, average saccade distance, average saccade speed and so on. By calculating and analyzing quantitative data, observer’s visual cognitive rules towards samples can be researched. Among these data, the number of fixation points and fixation duration are the basic indicators to measure the readers’ distribution of attention [2]. Besides, average saccade duration, average saccade distance, and average saccade speed are the process to reflect readers’ distribution of attention in different region of interest for one and the same picture. Comparing with traditional common research methods to obtain observer’s perception, such as questionnaire and interview, eye movement tracking technology focuses on objective means of users’ physiological reaction rather than depends on subjects’ own narrative. Thus, observer’s real-time perception towards picture can be obtained and the cognitive process in observer’s subconscious can be revealed.

BP Neural Algorithm for Mode of Scientific Protection …

1339

2.2 The Main Parameters of Eye Movement Tracking Technology (1)

(2)

(3) (4) (5)

Number of fixation points: the total fixation points in appointed region of interest, which reflects the information observer obtains during their observation as shown in Fig. 1. Average fixation duration: the average fixation duration in appointed region of interest, which reflects observer’s cognitive processing depth towards information. The longer fixation duration reflect two aspects: observer’s preference degree towards the information in region of interest, or observer’s difficulty degree towards information processing [3], as shown in Fig. 2. Average saccade duration: observer’s average duration of every saccade in appointed region of interest, as shown in Fig. 3. Average saccade distance: observer’s average distance of every saccade in appointed region of interest, as shown in Fig. 4. Average saccade speed: observer’s average speed of every saccade in appointed region of interest, as shown in Fig. 5.

By the research on the number of fixation points and fixation duration, observer’s preference and choice can be obtained [4]. Based on research needs, the different

Fig. 1 Number of total fixation points

Fig. 2 Average fixation duration

1340

X. Xie and Y. Yang

Fig. 3 Average saccade duration

Fig. 4 Average saccade distance

indicators in an appointed region should be analyzed deeply. In addition, according to experimental traits and objectives, more than two eye movement indicators should be researched.

BP Neural Algorithm for Mode of Scientific Protection …

1341

Fig. 5 Average saccade speed

3 The Equilibrium Algorithm 3.1 The Influence of Different Background Color in Traditional Art Pattern Towards Observer’s Attraction Degree In January 2017, the project “The Data Analysis on Traditional Woodblock New Year Painting’s Visual Intelligent Tracking” has been launched. Aiming at four different background colors for the same pattern, as shown in Fig. 6, modern people’s preference rules towards the background color of woodblock New Year painting can be analyzed with the help of eye movement tracking method. As the different background color of woodblock New Year painting has different visual influence towards observers, relatively, the bright color, on the one hand, more

Fig. 6 Woodblock New Year paintings collected by Art Heritage Institute of Northeastern University

1342

X. Xie and Y. Yang

easily attracts people’s attention, on the other hand, makes observer produce visual fatigue. Furthermore, the deep observation can’t be achieved. Conversely, relative soft colors are suitable to deep observe for observers, which cannot cause visual fatigue, but the attraction will be weakened relatively. Therefore, by the equilibrium algorithm combining number of fixation points with fixation duration, this paper explores the attraction degree in observation for the different background color of woodblock New Year painting. Based on the eye movement data mentioned above, this paper introduces equilibrium coefficient W to reflect observer’s attention towards woodblock New Year painting as shown in formula (1). W=α

ω ϕ +β ϕ ω

α+β=1

(1) (2)

Mark α represents the weight of number of fixation pois, β epresents the weight of fixation duration, ω average fixation duration in a single region of interest, ω mean value for average fixation durations of all regions of interest, ϕ mean value for average number of fixation points of all regions of interest. As shown in formula (2), α + β = 1.

3.2 The Influence of Pattern’s Figurative Degree Towards Observer’s Attraction Degree During the experiment, Manchu’s embroidery—“embroidery on pillow sides” had been chosen as representative pattern. And abstract and figurative patterns have been selected to collect fundamental pictures for visual tracking data. As shown in Fig. 7, both two patterns take flower and bird as the basic elements. The left pattern is relatively abstract. The right one is relatively figurative, whose bird details has been fully

Fig. 7 Embroidery on pillow sides with different figurative degree

BP Neural Algorithm for Mode of Scientific Protection …

1343

displayed. By contrasting visual tracking information of two patterns, the influence of pattern’s figurative degree towards observer’s attention degree can be realized.

3.3 The Influence of Pattern’s Strong and Faint Contrast Towards Observer’s Attention Degree During the experiment, Manchu’s embroidery—“embroidery on pillow sides” had also been chosen as representative pattern. With the same background color and same figurative degree, as shown in Fig. 8, the two patterns with different contrast had been chosen as fundamental patterns for eye movement tracking. In the process of comparing and analyzing, we take a single variable method in order to avoid the influence of other elements towards the parameters of eye movement tracking.

4 The Analysis of Eye Movement Tracking Result This paper takes Manchu’s culture as representative model of traditional art pattern. Aiming at three cases: the different background color with same strong and weak contrast of pattern, different figurative degree with same strong and weak contrast of background color, and different strong and weak contrast of background color with similar pattern of background color respectively, basic eye movement data, including the average number of fixation points, average fixation duration, average saccade duration, average saccade distance, average saccade speed, equilibrium coefficient W, have been collated and analyzed.

Fig. 8 Embroidery on pillow sides with different contrast

1344

X. Xie and Y. Yang

4.1 The Influence of Different Background Color Towards Observer’s Attraction Degree Table 1 displays the basic eye movement data on woodblock New Year paintings with different background color. Because of the different unit, property and magnitude of measure data, we split these different data. Table 2 displays the comparison of number of fixation points for woodblock New Year paintings with different background color. Table 3 displays the comparison of average fixation duration for woodblock New Year paintings with different background color. Table 4 displays the comparison of saccade parameters for woodblock New Year paintings with different background color. Table 1 Statistical table of eye movement tracking data

Table 2 Number of fixation points

BP Neural Algorithm for Mode of Scientific Protection …

1345

Table 3 The comparison of average fixation duration

Table 4 The comparison of scan/saccade parameters

From Tables 2 and 3, we discovered that in two sets of data, the responding results of woodblock New Year paintings with different background color are totally different, which proved our preceding assumption. The brighter background color is more attractive to observers, and accordingly, more fixation/retention points produce. However, the bright color can cause observer’s visual fatigue. Accordingly, the average fixation/retention duration of yellow is the shortest, which results in lacking in deep observation. By equilibrium algorithm introduced by this paper, the value of equilibrium coefficient W from two sets of eye movement data under different weight can be calculated. Comparing the equilibrium coefficient W changes for different background color and different weight, this paper explores different background color’s comprehensive impact for observers. As shown in Table 5, if

1346

X. Xie and Y. Yang

Table 5 The comparison of equilibrium coefficient W

α = 0.2, β = 0.8., the value of blue background’s equilibrium coefficient W reaches its maximum. If α ≥ 0.3, β ≤ 0.7, the comparison tendency of different background color’s equilibrium coefficient W gets gradually obvious. The values of equilibrium coefficient W for yellow background and white background are natively high and close to each other from Table 5. Then the sequence turns into blue background and then red background. Therefore, as traditional art pattern hasn’t a strict requirement in deep-thinking degree, to choose relatively bright background color can better attract observer’s attention. According to Table 4, the average saccade parameters for woodblock New Year paintings with different background color can be showed, the white background is the maximum of scan/saccade parameters. Yellow, blue and red follows. By the comparison of equilibrium coefficient W and the scan/saccade parameters for woodblock New Year paintings with different background color, we can conclude that the relatively bright color-white’s values are relatively high. Therefore, for traditional background pattern, the relatively bright colors are more attractive to observers.

4.2 The Influence of Pattern’s Figurative Degree Towards Observer’s Attraction Degree Figures 9 and 10 reflect the comparison of average fixation duration and average number of fixation points for flower-bird “embroidery on pillow sides” with different figurative degree. From the statistic in the figure, we can conclude that the relatively figurative patterns are more attractive to observers.

BP Neural Algorithm for Mode of Scientific Protection …

1347

Fig. 9 The average fixation duration

Fig. 10 The average number of fixation points

4.3 The Influence of Pattern’s Strong and Weak Contrast Towards Observer’s Attraction Degree Figures 11 and 12 reflect the comparison of average fixation duration and average number of fixation points for flower-bird “embroidery on pillow sides” with different strong and weak contrast. From the statistic in the figure, we can conclude that the patterns with strong contrast are more attractive to observers. To sum up, we conclude the fundamental rules to choose traditional patterns. The brighter colors, the more figurative degree and the stronger contrast are more attractive to observers, which conforms to the inheritance and development rules of traditional art patterns.

1348

X. Xie and Y. Yang

Fig. 11 The average fixation duration with

Fig. 12 The average number of fixation points with

5 Conclusion This paper explores the new path of scientific protection for intangible cultural heritage from an interdisciplinary perspective. The application of eye movement tracking technology opens a brand-new research method. The combination of eye movement tracking technology and preference equilibrium algorithm realizes the scientific protection for intangible cultural heritage.

References 1. Causse, M., Lancelot, F.: Encoding decisions and expertise in the operator’s eyes: using eyetracings input for system adaptation. Int. J. Hum. Comput. Stud. 125(1), 55–65 (2019) 2. Bendall, R.C.A., Lambert, S., Galpin, A., Marrow, L.P., Cassidy, S.: Psychophysiological indices of cognitive style: a triangulated study incorporating neuroimaging, eye-tracking, psychometric and behavioral measures. Personality Indiv. Differ. 141, 68–78 (2019)

BP Neural Algorithm for Mode of Scientific Protection …

1349

3. Bendall, R.C.A., Thompson, C.: Emotion does not influence prefrontal cortex activity during a visual attention task: a functional near-infrared spectroscopy study. In: 5th Annual International Conference Proceedings on Cognitive and Behavioral Psychology, pp. 36–43. Global Science and Technology Forum, Singapore (2016) 4. Masataka, N., Perlovsky, L., Hiraki, K.: Near-infrared spectroscopy (NIRS) in functional research of prefrontal cortex. Front. Hum. Neurosci. 9, 274 (2015)

Research on the Development of Artificial Intelligence into VR Practice Teaching Ning Ding

Abstract This paper focuses on the increasingly clear integration of artificial intelligence and virtual reality, to study the possible development and changes brought by the integration of AI into VR practice teaching from the aspects of VR practice teaching activities interactivity, scene authenticity, feedback intelligence, etc. This will provide a basis for VR practice teaching to break through environmental constraints and achieve in-depth development in a wider range of fields. Keywords Artificial intelligence · Virtual reality · Practice teaching

1 Introduction In recent years, artificial intelligence has made great strides into the education industry, and a large number of AI application scenarios have been formed in the education field, greatly promoting the development of AIEd. In AI and education technology development perspective, the education informatization development of China can be roughly divided into three stages: the first two stages, respectively is “stage of innovation means” and “stage of innovation platforms”, and the third stage, namely “beyond reality stage”, through the application of AI, data mining and analysis, simulation, 3D printing, brain-computer interface and other technologies, simulated experimental education, situational communication, inquiry learning and personalized teaching will be realized, which will have a fundamental impact on educational objectives and methods. Among them, AI is regarded as the most potential and influential educational information technology. As professor Byronson of Stanford University pointed out at the 2017 US educational technology summit, “science and technology can break the limits of time and space, but also better integrate people’s educational experience and emotional thoughts, so as to truly touch the N. Ding (B) Department of Information Engineering, Weifang Engineering Vocational College, Weifang, Shandong Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_172

1351

1352

N. Ding

foundation of education”, AI is making fundamental changes in human educational activities. As AI giants like Microsoft, Facebook and Google contribute to the virtual reality industry, the integration of artificial intelligence and virtual reality is becoming clear: First, render. Nvidia introduced a driver that includes deep learning super sampling (DLSS) that extrapolates high-quality anti-aliasing effects using Tensor Core, aiming to render content with smooth edges through deep learning; the second is content production. Virtual avatars with real users as the object become the development focus to further enhance the interactivity and sociability of virtual reality content; third, perceptual interaction. Artificial intelligence has made remarkable achievements in semantic understanding such as image recognition.

2 Core Concept Definition Artificial intelligence was initially defined by John McCarthy in the American Dartmouth conference in 1956. The initial significance of the concept of artificial intelligence is to enable computers to have the learning, thinking and cognitive abilities like human brains, and to simulate human intelligence. In the 1970s, artificial intelligence began to achieve in-depth development in theory and practical application of products. Artificial intelligence began to simulate people’s ability of language understanding, logical reasoning, seeking knowledge and solutions. Modern artificial intelligence is an intelligent machine created by human beings and consistent with human morality, values and emotional concepts, it can independently complete learning, thinking, decision-making, execution and assistance, and expand human intelligence with the help of artificial intelligence technology. Through the perception of the environment, learning knowledge, independent thinking and so on to achieve the expected results. Based on information technology, virtual reality technology creates a virtual environment of sensory simulation integrating touch, sight and hearing, enabling users to be immersed in the environment and interact with it. It has three characteristics, namely, conceivability, interactivity and immersion, which are simple, immersive, enhanced and shared. The application of virtual reality technology opens up a new way of practice teaching in colleges and universities, VR internship teaching focuses on the combination of teaching knowledge points with actual production and students’ future job requirements, it is an important teaching process for higher vocational colleges to improve students’ professional skills and cultivate their innovative ability. AI and VR practice teaching integrated development, it can not only show the teaching content more flexibly and vividly, customize the real practice environment for students through the scene simulation, but also it can also provide support for the future in-depth development of VR internship teaching in a broader field.

Research on the Development of Artificial Intelligence …

1353

3 Research on Integrated Development 3.1 AI Enhances the Interactivity of VR Practice Teaching Activities On the basis of big data, based on AI technologies such as OCR recognition, natural language processing and data mining, it provides intelligent recommendation service for the whole VR practice teaching and enhances the real-time interaction of VR practice teaching. Through natural language dialogue with students to help students choose suitable preview content, such as VR simulation software operation mode, process principles and operating procedures, and other videos. In the VR internship scene, students’ difficulties in understanding the structure and technology of the practical training, the AI uses an intelligent system to recognize facial expressions and body postures, and automatically tracks learners’ cognition and emotions, furthermore, the author makes use of learning analysis, learning resource recommendation, teaching strategy and other learning situation analysis services to cope with the changing learning and knowledge status of users, improve the effect of virtual world and the interactive experience of users, and learn the specific application of theoretical knowledge in practice.

3.2 AI Improves the Authenticity of VR Practice Teaching Scenes The application of virtual reality in practice teaching needs to rely on certain software and hardware systems. AI technology can realize the reproduction of enterprise scenarios and production management data in the school virtual environment, so that students can easily and quickly optimize the design in the virtual scene and complete the practice teaching tasks. The realization of VR real scene depends on the data integration and transformation of enterprise job platform, virtual reality platform and internship teaching platform. AI is used to collect enterprise job data according to the actual production management demand scenarios provided by each enterprise, the teacher completes the necessary scenarios, data definition and simulation environment establishment, complete the establishment of enterprise job platform. Then, through the network environment, the data of the enterprise job platform is transferred to the virtual reality platform, and the data specifications of different scenes are sorted out on the virtual reality platform, and the application is demonstrated by combining with the model in the virtual reality platform. students can practice content according to the needs of their choice in the virtual scene of practice teaching platform for the practice of the corresponding module operation, such as layout design simulation practice, students can reposition and optimize the evaluation of objects

1354

N. Ding

in the virtual scene, various forms of practical operation combined with the actual situation of the enterprise are realized, in order to achieve the immersive effect.

3.3 AI Improves the Intelligence of VR Practice Teaching Feedback AI technology can truly combine professional knowledge and students’ ability to achieve intelligent feedback of VR practice teaching, by Cognition practice, experiencing practice, understanding practice, practicing exercises and tests, by using AI technology, the questions and answers generated by the system are compared with those uploaded and learned by students. Then, they are selected to cover or analyze and extract, so as to objectively find the errors of understanding and practice in students’ learning, such as tracking grades, looking at individual students’ learning gaps, and helping teachers gain insight into students’ weaknesses. Then the results are returned to the knowledge base, and relevant knowledge contents are invoked to form a complete feedback chain to help teachers make teaching decisions, adjust teaching schedule and teaching planning. In addition, cognitive dissonance and cognitive confusion can be diagnosed as a cause of error, and intervention can be carried out to promote deep learning, and continuous support and counseling can be provided to learners, so as to significantly improve learning outcomes. For example, using the neural network approach, students are sent customized encouragement and guidance information.

Research on the Development of Artificial Intelligence …

1355

4 Conclusion To sum up, the integration of artificial intelligence and virtual reality technology has played an indispensable role in the practice teaching process in China. It plays an important role in improving students’ learning interest, comprehensive ability, professional quality and practical operation ability. It is believed that it will open up a new pattern of training high-quality and high-skilled applied talents for the practical teaching in China.

References 1. Qiu, Y.-H.: Development and application of virtual reality software for the practical teaching of sewage treatment plant. Journal of Graphics 17(1), 09 (2020) 2. Yuan, J.: Reform and practice of civil engineering construction course based on VR. Res. Higher Educ. Eng. (03):99–101+129 (2019) 3. Li, X.-L.: Research on the application of virtual reality technology in practice teaching. Educ. Teaching Forum 06, 140–141 (2018) 4. Liu, J.: Educational artificial intelligence: frontier progress and opportunities and challenges. Res. Higher Educ. Eng.

1356

N. Ding

5. Song, Y., Zhao, B.: The overall development trend of VR industry. China Informatization (11):94–96 (2019) 6. Li S.-M.: The innovative application of virtual reality VR technology in practical teaching. Technol. Ind. Straits (08), (2018)

Fatigue Measuring System Using Wearable Sensor Qiangqiang Fan and Hyoung SungEun

Abstract This research studied the user’s fatigue measuring system using healthrelated wearable devices. The fatigue measuring system can measure fatigue anywhere, anytime using a smart device, and can continuously monitor a person’s physical activity. This study is an Ontology driven Fatigue Healthcare System with Wearable Sensors (OdIHS_WS) based on wearable sensors for efficient developments. This system is a contents study that can check real-time information using the ontology methodology of the user’s healthcare service environment using wearable sensors. The ontology health information service technique is a method of deriving context information necessary for health management services through a context information model and using health information and inference rules. The survey contents composed of environmental information of external context information, and personal information and disease information of internal context information and equipment information. This system can be used by anyone with a more detailed measurement method than the existing fatigue measuring system. It has the advantage of being able to understand health status and manage health by applying automated measurement methods rather than the existing complex and subjective surveys. Keywords Wearable sensor · Fatigue measuring · Health information service

Q. Fan (B) College of Arts, Northeastern University, Shenyang 110819, Liaoning, China e-mail: [email protected] H. SungEun College of Mechanical and Electrical Engineering, Qingdao University, 308 Ningxia Road, Qingdao 266071, Shandong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_173

1357

1358

Q. Fan and H. SungEun

1 Introduction 1.1 Research Background There are various causes that make modern people tired during their busy daily life such as sleep, stress, and overwork. Accumulated fatigue affects people’s daily life, and when it is accumulated and chronic, fatigue can lead to depression or emotional anxiety [1]. Fatigue should be checked in advance so that it does not last long, and to maintain a healthy lifestyle sufficient sleep and rest should be taken. Therefore, periodic measurement and digitization are required to check the fatigue level in advance. Most of the existing fatigue measurement studies were conducted using the Fatigue Severity Scale (FSS). However, since the health condition is not checked every day, the fatigue measured value may vary depending on the user’s memory. In addition, the fatigue measurement procedure is complicated and subjective surveys and undesirable because it should be written by hand [2]. This is a study that can automate the measurement and easily check the fatigue anytime, anywhere to solve these problems. Health management using wearable devices can be measured using APP and information can be continuously monitored. This can satisfy the portability and usability compared to other measurement tools and can prevent health by real-time mutual transmission and continuous health monitoring by linking information with a smartphone. Currently, data analysis using wearable sensors has been studied in different ways due to the development of devices, but it has not been utilized continuously. Therefore, though wearable sensors it is necessary to study, real-time biometric information acquisition, deduction technology of medical support systems, and effective health management support systems using situational awareness computing technology [3]. To solve these problems more efficiently, this study proposes an Ontology driven Fatigue Healthcare System with Wearable Sensors (OdIHS_WS) based on wearable sensors. This system is a study on health management contents that can acquire realtime information using the ontology methodology of the user’s health management service environment using wearable sensors.

2 Theoretical Consideration 2.1 Emotional Information and Fatigue In the field of social psychology, Clack and Watson say that specific events that occur frequently in everyday life affect emotions [4]. In addition, sleep, weather, and activities are also closely connected to the emotional state. Recently, several studies

Fatigue Measuring System Using Wearable Sensor

1359

have revealed that there is a relation between the emotional information entered by oneself and his daily life. Based on these studies, several studies with specific behaviors and emotions have been attempted. In fact, there have been several studies based on activity data over the last decade [5]. However, since these studies rely on data from surveys or pre-designed experiments, it was difficult to continuously keep track of the user’s state. Fatigue can be divided into researches that measure physical fatigue to the extent of the fatigue felt by individuals in everyday life and researches that measure mental fatigue. Physical fatigue is due to the muscle fatigue during intense exercises and work, and thus it is easily recovered by taking sufficient rest [6]. Its common symptoms are drowsiness, slow in movement, loss of posture, headaches, and muscle pain. Mental fatigue is fatigue that arises when tension or anxiety persists for a long time due to the surrounding environment and atmosphere when studying or working [7]. Unlike the physical fatigue, which can be easily recovered if you take enough rest, if mental fatigue persists, it can affect your health and decrease the efficiency and concentration of your daily life [8].

2.2 Wearable Device In the 2010s, as the technological limitations such as the development of smart devices, building wireless communication infrastructures, and the improvement of battery life have been overcome and its availability to be used in everyday life, a connected method for the real-time mutual transmission and exchange of collected information through electronic machines M2M (Machine to Machine) was used [4]. The smart band is a device that measures basic exercise data such as number of steps, walked distance, amount of burned calories, and it also enables sleep monitoring [3]. The smart band is worn on the wrist like a watch, providing intensive services in the healthcare field. It is easy to purchase, thin and light, so it can be used daily without any difficulties [7]. In addition, the smart band has the advantage of being able to check even the fatigue and emotion by analyzing the user’s emotional changes and body measurement values through its connection with the smartphone APP. However, some of the disadvantages are that the battery life may be shortened by the measurement every hour, and to check specific data the device must be connected to the APP. Smart glasses can check a person’s emotions and body condition by tracking this person’s pupil movements using an EOG (electrooculogram) sensor. However, it may be inconvenient for a user who does not usually wear glasses, and another disadvantage is that it is impossible to measure the sleeping hours due to not wearing the glasses. Additionally, it does not exactly provide how it calculates and expresses physical and mental fatigue [9].

1360

Q. Fan and H. SungEun

Fig. 1 Fatigue measurement system steps

3 Research Content 3.1 Fatigue Measuring System Design The mental fatigue measuring system can be divided into a data collection phase, a data analysis phase, and a data storage phase (Fig. 1). The collecting data phase collects user’s heart rate, number of steps, and sleeping hours using for example smart watch among other wearable devices. At this phase, the smartphone collects data by communicating with the wearable device via Bluetooth. The collected heart rate and number of steps data is stored as an int type and sleeping hours data is stored as a double type. The data analysis step analyzes the acquired data and digitize it on a smartphone. In the data storage step, the data is stored in a quantified form to reuse it in line with health-related services [10].

3.2 Ontology Health Information Service In this chapter, the context information model was investigated to support health management in the data collection stage. The Ontology driven Fatigue Healthcare System with Wearable Sensors (OdIHS_WS) is a health information service technique for examining user’s environmental elements. This is to develop a context information service model for healthcare support based on the user’s living environment conditions. The health information service technique derives context information necessary for healthcare services through a context information model, and provides services using health information and inference rules. Context awareness-based services for healthcare services requires existing static data, external data, and personal context data.

Fatigue Measuring System Using Wearable Sensor

1361

Fig. 2 External context information structure

The investigation consists of environmental information of external context information, equipment information, personal information of internal context information, and disease information [9]. (1)

External Context Information (Fig. 2).

Environment Information. Environment Information Index consists of HI: Heat Index), FPI: Food Poisoning Index, DI: Discomfort Index, UI: Ultraviolet Index, WPFPI: Water Pipe Freeze Poss. Index, WTI: Windchill Temp. Index. Device Information. Device Information Index consists of BPD: Blood Pulse Device, BSD: Blood Suger Device, In-Body. (2)

Internal Context Information (Fig. 3).

Personal Information. Personal Information Index consists of ID, Name, Grade, Sex, Job, Income, Lifestyle. Disease Information. Disease Information Index consists of BP: Blood Pressure, HP: Heart Pulse, ECG: Electrocardiogram, BR: Breathing Rate, BS: Blood Suger, Height, Weight, BMI: Body Mass Index.

1362

Q. Fan and H. SungEun

Fig. 3 Internal context information structure

4 Conclusion This research studied the user’s fatigue measuring system using a health-related wearable device. The fatigue measuring system can measure fatigue anytime and anywhere using a smartwatch and a smartphone. It can also continuously monitor an individual’s activity. With sufficient rest and recovery, physical fatigue can be improved to enhance work efficiency and concentration, and through periodic checks health condition and fatigue can be monitored. In addition, the fatigue measuring system can determine when it is the right time to take a break, thereby increasing the user’s work efficiency. This system can be used by anyone and it is a more detailed measurement method than the existing fatigue measuring systems. It has the advantage of being able to grasp health status and manage health by applying automated measurement methods rather than the existing complex and subjective surveys. However, to increase the accuracy of the healthcare fatigue measurement in this study, it is required to stabilize the Bluetooth communication and maximize the data storage capacity. In addition, to make management easier for each user, it is needed to design additional contents of personalized history management function and development of guidelines to reduce fatigue.

Fatigue Measuring System Using Wearable Sensor

1363

References 1. Kim, K., Bang, S., Kim, S.: Emotion recognition system using shortterm monitoring of physiological signals. Med. Biol. Eng. Comput. 42, 419–427 (2004) 2. Chung, W.-Y., Oh, S.-J.: Remote monitoring system with wireless sensors module for room environment. Sens. Actuators, B 113(1), 64–70 (2005) 3. T. H. Kim, (2015). A Study on the Effects of Healthcare Services based on Wearable Devices on Intention to Exercise Adherence, pp. 32–48. University of Hongik 4. Commercializations, Promotion Agency for R&D Outcomes: Wearable device technology and market trends. S&T Market Rep. 26, 1–22 (2015) 5. Jones, S.H., Hare, D.J., Evershed, K.: Actigraphic assessment of circadian activity and sleep patterns in bipolar disorder. Bipolar Disord. 7(2), 76–186 (2005) 6. Lim, S.W., Kim, L.: Stress and Sleep. Korean J. Stress Res. 12(4), 1–8 (2004) 7. Park, J.T.: User Motion Recognition Healthcare System Using Smart-Band. J. Adv. Navig. Technol. 18(6), 619–624 (2014) 8. Nadella, B.: Eye detection and tracking and eye gaze estimation. Asia-Pacific J. Convergent Res. Interchange 1(2), 25–41 (2015) 9. N. H. Kim, (2018). An Ontology Driven Intelligent Healthcare System with Wearable Sensors, University of Inha. pp: 49–81. 10. Borrell, Jerry, (1992). Development of Mental Fatigue Measurement System using Wearable Device, University of Sangmeng. pp: 11–13. 11. Cohen, L., Sebe, N., Garg, A., Chen, L., Huang, T.: Facial expression recognition from video sequences: temporal and static modeling. Comput. Vis. Image Underst. 91(1–2), 160–187 (2003)

Study on the Growth of Bionic Mineralized Coating Induced by Different Magnetic Field Strength Chenyang Xu and Yan Ji

Abstract The morphology, crystal orientation, phase composition and other details of the resulting coating were characterized by means of SEM, XRD, FT-IR and so on. Then, a discussion was conducted about the growth mechanism of HA under the context of magnetic field. According to the research results, the magnetic fields of different intensities have impact on the morphology and crystal orientation of the hydroxyapatite coating to some extent. Additionally, the effect of high magnetic field is found to be more significant.

1 Introduction Due to such unique advantages as high specific strength and specific rigidity as well as the closest density to human bones, magnesium alloy as a variety of degradable material has attracted extensive attention from the field of biomaterials [1, 2]. However, the excessively fast corrosion rate in the human body imposes a restriction on the practical application of magnesium alloys in the field of biomedical materials [3, 4]. According to previous studies, the bionic mineralization method is applicable when a magnesium alloy surface needs to be coated with a layer of hydroxyapatite coating for addressing the excessive corrosion rate of magnesium alloy inside the human body. HA is not only characterized by excellent biocompatibility and bioactivity, but also conducive to promoting bone growth when implanted into the human body [5, 6]. However, it shows such drawbacks as low strength and high brittleness as well [7]. With the bionic mineralization method adopted to apply HA coating on the magnesium alloy, the mechanical properties of magnesium alloys can be combined with the biological properties of HA. C. Xu · Y. Ji (B) China University of Mining and Technology, Beijing 100083, China e-mail: [email protected] C. Xu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_174

1365

1366

C. Xu and Y. Ji

As the cycle of the bionic mineralization method is excessively lengthy and the thickness of resulting coating is small, a method of applying a magnetic field during the bionic mineralization process was once proposed by the author to solve this problem by adjusting the orientation of the HA crystal. Since HA is a sort of weakly magnetic materials, however, the higher the strength of magnetic field is, the more significant the effect would be on HA crystals. Therefore, in this experiment, the magnetic fields of different strengths were applied over the course of bionic mineralization. The coating was analyzed under different magnetic field conditions for its morphology, phase composition and so on, while the growth mechanism of HA under the context of a strong magnetic field was discussed in detail.

2 Experiment 2.1 Material Preparation In this experiment, AZ91D magnesium alloy was taken as the base material after being cut into pieces sized 10 × 10 × 2 mm, polished with sandpaper, and then cleaned. Subsequently, it was placed in the acetic acid solution with a volume fraction of 1% to be activated for 1 s. 100 ml of 0.25 mol/L EDTA-2NaCa solution and 0.25 mol/L KH2 PO4 were prepared and blended. After 8 h of pre-calcification at a constant temperature of 90 °C, the magnesium alloy was cleaned and dried for later use.

2.2 Coating Preparation A total of 16 or 20 rufeboron magnets were split into two groups before being placed outside the containers. Then, the matrix was positioned either vertically or horizontally in the m-SBF solution inside the container. The pH value of m-SBF solution was 6.2, the temperature was 37.5 °C, and the biomimetic mineralization time was set to 10 min, 45 min, 12 h and 48 h, respectively.

2.3 Coating Representation The microstructure of the coating was observed using a Hitachi S-3400 N scanning electron microscope (SEM). Then, the phase composition of the coating was analyzed with the assistance of D/ Max-2500PC X-ray diffractometer (XRD), which had a tube voltage of 40 kV, a tube current of 100 mA, a scanning speed of 4°/min, and a step length of 0.02°. In order to evaluate the biocompatibility of the material, the surface

Study on the Growth of Bionic Mineralized Coating Induced by Different …

1367

infiltration of the material was characterized using the EASYDROP DSA20 contact angle measuring meter.

3 Results and Discussions 3.1 Microstructure Analysis When the process of biomimetic mineralization lasted 10 min, spherical structures developed on the surface of the pretreatment layer under the condition of different magnetic fields, and the strong magnetic field gave rise to more spherical structures, suggesting that the strong magnetic field is effective in promoting the crystal nucleation of hydroxyapatite (Fig. 1). After 45 min of biomimetic mineralization performed in a vertical magnetic field, it could be observed that the spherical structure was expanded and the number of it increased. In a parallel magnetic field, the granular structure could be observed. Besides, the granular structure tended to increase in size and develop into larger-sized patches when the magnetic field was relatively strong (Fig. 2). After 48 h of biomimetic mineralization under different magnetic field conditions, a new layer of chip developed on the bottom chip. When a strong magnetic field was applied vertically, the newly-generated coating reached the maximum rate of

a

b

c

d

Fig. 1 Biomimetic mineralization for 10 min (a strong magnetic field, vertical, b weak magnetic field, vertical, c strong magnetic field, parallel, d weak magnetic field, parallel)

1368

C. Xu and Y. Ji

a

b

c

d

Fig. 2 Biomimetic mineralization for 45 min (a strong magnetic field, vertical, b weak magnetic field, vertical, c strong magnetic field, parallel, d weak magnetic field, parallel)

coverage, followed by the coating generated when a strong magnetic field was applied in parallel. Moreover, the biomimetic mineralization coating produced when a weak magnetic field was applied in parallel had the minimum rate of coverage (Fig. 3). As indicated by the SEM results, a strong magnetic field is conducive to the nucleation and growth of coating. Besides, it could be known from the Lorentz force model that, within the reach of the magnetic field effect, the ions Ca2+ and PO4 3− comprising hydroxyapatite crystals tend to agglomerate near the magnetic induction line under the influence of Lorentz force, and the effect produced by Lorentz force would slow down the movement of the charged particles. Therefore, the extent of aggregation for the constitutive crystal ions on the surface of the magnesium alloy substrate was increased, which could facilitate the concentration of surrounding ions to reach the level of nucleation supersaturation. Due to the presence of Lorentz force, an orderly relative movement would occur to the constitutive crystal ions of hydroxyapatite. In the meantime, their center of gravity would shift forward and backward constantly in alteration, thus increasing the likelihood of collision between individual ions. This is not only beneficial to make adequate preparations for the nucleation but also conducive to improving the growth rate of crystal nucleation.

Study on the Growth of Bionic Mineralized Coating Induced by Different …

a

1369

b

c

d

Fig. 3 Biomimetic mineralization for 48 h (a strong magnetic field, vertical, b weak magnetic field, vertical, c strong magnetic field, parallel, d weak magnetic field, parallel)

3.2 XRD Analysis As revealed by the XRD spectrum of coating generated under the condition of strong magnetic field, the diffraction peak and intensity of hydroxyapatite produced under the context of vertical magnetic field were (002) 2657, (102) 226, (210) 211, (112) 2372, (312) 482, (213) 142, and (004) 811, while the diffraction peak and intensity in the parallel magnetic field were (002) 2964, (102) 175, (210) 216, (112) 1340, (312) 367, (213) 120, and (004) 878 (Fig. 4). According to the XRD spectrum of coating generated under the context of weak magnetic field, the diffraction peak and intensity of hydroxyapatite produced under the context of vertical magnetic field were (002) 1498, (211) 274, (112) 1019, (312) 466, 124, and (004) 428 (213), while the diffraction peak and intensity under the context of parallel magnetic field were (002) 1656, (211) 169, (112) 925, (312) 1754, 106, and (004) 551 (213). In the context of parallel magnetic field, the intensity of diffraction peak (002) was relatively high, indicating that the coating was more likely to grow towards c-axis. Formula (1) was applied to calculate the graining angle θF of c crystal surface.  θF =

(Ihkl × θhkl )  Ihkl

(1)

1370

C. Xu and Y. Ji HA Mg

4500

a

4000

b

3500

(312) (211)

1500

(213)

2000

1000

(004)

(002)

2500

(112)

Intensity(Counts)

3000

500 0 10

20

30

40

50

60

70

80

90

Two-Theta (deg)

c

d

HA Mg

5000

(312) (213)

(211)

2000

1000

(004)

(002)

3000

(112)

Intensity(Counts)

4000

0 10

20

30

40

50

60

70

80

90

Two-Theta (deg)

Fig. 4 XRD analysis after conducting biomimetic mineralization for 48 h (a strong magnetic field, vertical, b weak magnetic field, vertical, c strong magnetic field, parallel, d weak magnetic field, parallel)

where θhkl represents the included angle between the crystal plane (hkl) and the crystal plane (00n), and Ihkl indicates the diffraction peak intensity of the crystal plane (hkl) in the XRD diffraction spectrum. When θF was 0°, the crystal was c-axis orientated. When θF was 90°, the crystal plane was a-axis and b-axis orientated. As indicated by the results, when a strong magnetic field was applied, θF was 18.1742° in the vertical condition and 16.0485° in parallel condition. By contrast, θF was 28.6708° in the vertical condition and 22.586° in the parallel condition when a weak magnetic field was applied. The results substantiated that HA crystals were more likely to grow towards c-axis under the context of parallel magnetic field. Meanwhile, it was confirmed that the stronger the magnetic field is the more and more significant.

3.3 Biocompatibility Evaluation The hydrophilicity and hydrophobicity of the materials are closely associated with their properties. In this experiment, the hydrophilicity and hydrophobicity of the materials reflected its biological compatibility. When a strong magnetic field was applied, the contact angle was found to be 26.23° and 30.27° under vertical and parallel conditions. In comparison, the contact angle was 35.13° and 78.86° when a weak magnetic field was applied. It is thus inferred that the coating produced by

Study on the Growth of Bionic Mineralized Coating Induced by Different …

1371

a

b

c

d

Fig. 5 Contact angle test after 48 h of biomimetic mineralization (a strong magnetic field, vertical, b weak magnetic field, vertical, c strong magnetic field, parallel, d weak magnetic field, parallel)

applying the magnetic field was hydrophilic, which means that the coating demonstrated an excellent biocompatibility. Differently, the optimum biocompatibility was achieved under the context of a strong vertical magnetic field (Fig. 5).

4 Conclusion The rate of nucleation growth for the coating in a vertical magnetic field was higher than in a parallel magnetic field. Besides, the effect on HA nucleation and growth was made more significant when a strong magnetic field was applied. Under the context of a parallel magnetic field, the coating showed a tendency to grow towards the Caxis, but it was even more noticeable when a strong magnetic field was applied. With a strong magnetic field applied, the coating exhibited an improved biocompatibility, while the coating generated in the strong vertical magnetic field demonstrated the optimum biocompatibility. Acknowledgements Special fund for basic scientific research operating expenses of central universities (2009 QJ7), innovative entrepreneurship training program for college students (C201804014).

1372

C. Xu and Y. Ji

References 1. Okuma, T.: Magnesium and bone strength. Nutrition 17(7/8), 679–680 (2001) 2. Vormann, J.: Magnesium: nutrition and metebolism. Mol. Aspects Med. 24(1/3), 27–37 (2003) 3. Staiger, M.P.P., Pietak, A.M., Huadmai, J., et al.: Magnesium and its alloys as orthopedic biomaterials: a review. Biomaterials 27(9), 1728–1734 (2006) 4. Erinc, M., Sillekens, W.H., Mannens, G., et al.: Applicability of existing magnesium alloys as biomedical implant materials. In: Magnesium Technology, pp. 209–214. TMS, New York (2009) 5. Hideki, A., Masataka, O., Seisuke, K.: Effects of HAP-solon cell growth. Rep. Inst. Med. Dental Eng. 26, 15–21 (1992) 6. Ijntema, K., Heuvelslank, W.J., Dirix, C.A.: Hydroxyapatite microcarriers for biocontrolled release of protein drugs. Int. J. Pharm. 112(3), 215–224 (1994) 7. Sakka, Y., Takahashi, K., Suzuki, T.S., Ito, S., Matsuda, N.: Texture development of hydroxyapatite ceramics by colloidal processing in a high magnetic field followed by sintering. Mater. Sci. Eng. A 475(1), 27 (2008)

Anti-opening Measures for Pre-fabricated Cable of Secondary Circuit of Current Transformer Shijiang Yang, Xiaoxia Cao, Jiawei Li, Yiheng Zhao, Yachang Guo, and Yaode Huang

Abstract When the conventional substation is used for the intelligent substation, the current secondary circuit can not adopt the prefabricated cable. This paper proposes a new technology of ct secondary circuit “anti-opening one-point grounding” connection, which uses the elastic self-sealing conductor connector to realize the current. The secondary circuit of the transformer is open-circuit prevention; the pre-embedded bridge in the connector realizes that the secondary circuit of the current transformer must have only one grounding requirement. Improve the secondary system of intelligent substation, Stability, “plug and play” for secondary wiring. Keywords Intelligent substation · Prefabricated cable · Anti-opening · Bridge · Plug and play

1 Introduction Since the launch of the new generation of intelligent substation demonstration project by State Grid Corporation, a large number of new technologies and equipments such as prefabricated secondary combined equipment, prefabricated intelligent control cabinets, prefabricated cables and prefabricated optical cables have been widely promoted and applied. The control circuit and the AC/DC power supply circuit can use a large number of prefabricated cable new technologies, which not only reduces the terminal block in the panel, but also greatly improves the site efficiency under the premise of ensuring the wiring quality, and realizes the “plug-in” of the secondary wiring. Ready to use.” S. Yang (B) · J. Li · Y. Zhao · Y. Huang State Grid Xinjiang Electric Power Company Economic and Technological Research Institute, Urumqi 830000, Xinjiang, China e-mail: [email protected] X. Cao · Y. Guo Energy Construction Group, Shanxi Electric Power Survey and Design Institute Co., Ltd, Taiyuan 030001, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_175

1373

1374

S. Yang et al.

However, the prefabricated cable connectors currently used, whether circular or rectangular, are voltage-type plug-and-connect connections, and cannot achieve current circuit anti-opening, resulting in 330 kV and above and 220 kV new intelligent substation involving system stability. The conventional transformer is still directly connected to the protection device via the secondary cable. In this paper, the technical problem of the prefabricated cable can not be adopted for the secondary circuit of the traditional current transformer. The new technology of “opening the grounding point” of the CT secondary circuit is proposed. The current test terminal in the panel is completely eliminated, and the secondary wiring of the current transformer is realized. The “plug and play” of the circuit also satisfies the requirement that the secondary circuit of the current transformer must have one point and only one ground.

2 Anti-open Current Type Connector Structure and Working Principle Current transformer prefabricated cable connectors can be divided into two types: socket anti-opening and plug anti-opening, as shown in Fig. 1. Among them, the anti-opening socket is prefabricated on the wiring side of the local intelligent control cabinet, and the anti-opening plug is prefabricated on the side of the secondary equipment panel.

2.1 Connector Socket and Plug Structure Figure 2 shows the structure of the connector when the prefabricated cable connector plug of the intelligent control cabinet is engaged with the socket. The connection part with the current transformer is a connector socket, which is composed of a conductor, a terminal, a copper post (conductive movable contact) and The spring

Fig. 1 Prefabricated cable connector for current transformer

Anti-opening Measures for Pre-fabricated Cable of Secondary …

1375

Fig. 2 Structure diagram of engagement state between plug and socket

is composed; the connection part with the secondary test circuit is a connector plug, which is composed of a terminal, a conductive pin and an insulator.

2.2 Connector Anti-open Circuit Working Principle When the plug and the socket are not engaged, a loop is formed between the socket portion terminal a-conductor a-moving contact-conductor b-terminal b and the transformer. The connector socket copper post (conductive movable contact) is connected with the spring. When the connector plug is inserted into the plug and the socket is fully engaged, the conductive movable contact is subjected to the external force of the plug portion to move to the spring side to the spring compression, and the electric conductor a out of contact with the conductor b, at this time terminal a—conductor, a—conductive jack a—conductive pin a —terminal a —test line— terminal b —conductive pin b —conductive plug. A loop is formed between the hole b-conductor b-terminal b and the transformer; after the external force of the plug is removed, the electrical conductor of the socket is in contact with the conductive movable contact. It can be seen from the above analysis that after the pre-fabricated cable connector is used in the secondary circuit of the current transformer, when the plug and the socket are not connected or the socket and the plug are not completely engaged, the secondary side of the transformer forms a passage with the elastic self-sealing conductor in the socket; When fully engaged with the plug, the transformer and the secondary circuit form a closed loop, and the secondary circuit of the current transformer is prevented from opening.

1376

S. Yang et al.

3 Prefabricated Cable “Bridge” Connection Technology The built-in elastic self-sealing conductor on the side of the prefabricated cable connector realizes the open circuit of the secondary circuit of the current transformer. The three-phase current forms three independent circuits, and the secondary circuit of the current transformer must have one ground and only one ground. The builtin bridge in the anti-opening prefabricated cable connector connects the three-phase current n phase in parallel, which can realize the “one-point grounding” wiring effect of the secondary circuit of the current transformer.

3.1 Working Principle of Bridge Type Prefabricated Cable Connector The current type prefabricated cable connector usually adopts a 6-core circular structure. As shown in Fig. 3, the holes 1, 3, and 5 represent the three phases of current a, b, and c, and the 2, 4, and 6 represent the n phase, and the hole position 1–2, 3–4, 5–6 built-in elastic self-sealing conductor to achieve anti-opening, hole 2–4–6 between the socket assembly, plug component housing embedded conductor to bridge, to achieve the purpose of parallel terminals. In the anti-open current type connector pre-buried bridge, whether the plug and the socket are in the meshing state or in the separated state, the secondary side of the current transformer can be prevented from being opened and the short circuit between different test circuits or different transformer circuits can be ensured. The secondary circuit of the current transformer has one and only one ground.

Fig. 3 Bridge principle of prefabricated cable plug and socket

Anti-opening Measures for Pre-fabricated Cable of Secondary …

1377

Fig. 4 Prefabricated cable for current transformer

3.2 Grounding Analysis of Prefabricated Cable Anti-opening Under Different Working Conditions Figure 4 is a schematic diagram of current-type prefabricated cable connection. This paper describes the grounding of the current-type anti-opening prefabricated cable from three different operating conditions. During normal operation: socket and plug are in meshing state, transformerintelligent control cabinet side anti-opening socket, bridge plug-double-ended prefabricated cable-secondary device side anti-opening plug, bridge socketprotection cabinet form passage, the whole circuit is intelligent Ground the socket side of the control cabinet. When the transformer is inspected: the prefabricated cable socket and plug on the intelligent control cabinet side are in a separated state, and the passage is formed by the elastic self-sealing member in the anti-opening socket 1–2-3–4-5–6, and grounding is performed at the socket end. When the operator accidentally inserts and removes: When the operator unplugs the prefabricated cable plug on the side of the secondary equipment cabinet, the 1’–2’–3’–4’–5’–6’ in the prefabricated cable plug passes through the elastic selfsealing conductor. Form the path and ground it back to the smart control cabinet socket through the prefabricated cable.

4 Prefabricated Cable Connection Reliability When the current type prefabricated cable socket is fully engaged with the plug, the transformer and the secondary device are connected to each other to form a path, and the quality of the engagement between the pin and the jack determines the connection reliability of the prefabricated cable and the stability of the secondary system, and the connector is inserted. The needle structure is a general form and the structure of the jack is critical to the reliability of the connection.

1378

S. Yang et al.

The jack structure has three types: leaf spring type, crown spring type and wire spring type. Compared with the leaf spring connector and the crown spring connector, the number of contact points of the wire spring connector, the number of insertions and removals, the failure probability, the contact resistance, It has great advantages in terms of service life and anti-vibration environment. It is the preferred structure for current-type prefabricated cable connector jacks. The current type prefabricated cable adopts the wire spring connection technology to make the substation equipment connection more reliable, and can meet the multiple insertion and removal of the equipment during the debugging process without degrading the performance and the use time is long.

5 Conclusion The use of anti-opening socket and plug in the prefabricated cable connector solves the technical problem that the intelligent substation current transformer can not use the prefabricated cable, realizes the “zero terminal” wiring of the secondary circuit of the current transformer; meets the current transformer II The secondary circuit cannot be opened and has only one grounding requirement.In the aspect of reliability, the wire spring connection technology is adopted to improve the connection reliability of the device and the stability of the secondary system. Acknowledgements 2017 State Grid Corporation relies on engineering infrastructure new technology research and application project (contract number: sgxj0000jjjs1700627).

References 1. Dong, L.: Application of prefabricated branch cable in engineering. Urban Archit. 11, 320–323 (2016) 2. Zhang, D.: Precautionary cable accessories should pay attention to the problem in use. High Voltage Technol. 27(z1), 14–15 (2001) 3. Luo, J., Xu, M., Li, C., Wang, J.: Defect analysis and preventive measures of prefabricated intermediate joints for 110kV cables. Sci. Technol. Innov. 12, 111–113 (2017) 4. Pan, Y., Yuan, D., Mei, Y., Ji, D., Gu, J.: Research on combined secondary equipment scheme and key technology of indoor intelligent substation. Huadian Technol. 4, 30–33 (2014)

WSR Algorithm for the Campus Cheerleading Xin Feng

Abstract Although the current cheerleading project continues to develop and grow, college cheerleading team still uses the traditional management model. The traditional management model is easy for the cheerleading sports team to lag in training and lack innovation. In view of this, based on the analysis of the current status and main problems of the management model of the cheerleading sports team colleges and universities, the paper proposes the construction strategy of the “WSR three-dimensional management mode.” The cheerleading sports team University of Economics illustrates the construction strategy of WSR three-dimensional management model. Keywords Cheerleading sports team management · WSR three-dimensional management model · University of economics cheerleading

1 Introduction With the rapid development of the information age, cheerleading has become more and more popular in Colleges and universities. All colleges and universities have started to organize their own cheerleading teams to participate in competitions at home and abroad, through which they can exchange and learn from each other. Schools at all levels actively participate in the cheerleading competition held in the past two years. Most of the team members have a certain understanding of the characteristics and influence of Cheerleading; compared with aerobics, most of them prefer cheerleading and strongly demand that cheerleading be brought into college physical education classes or become an elective content of college physical education courses. Although the current cheerleading project is constantly developing and growing, but the University Cheerleading Team still uses the traditional management mode. The traditional mode focuses on the improvement of the management system and management technology in the organization, and emphasizes the construction X. Feng (B) Chongqing Vocational Institute of Engineering, Chongqing 400000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_176

1379

1380

X. Feng

of formal or informal groups in the organization. The purpose is to improve the efficiency of the organization and implement equal management for employees. The main purpose of cheerleading team organization in Colleges and universities is to achieve excellent results in competitions. The traditional management mode is easy to make cheerleading team lag behind in training and lack of innovation. The disadvantages of the traditional management mode are as follows: the management process is not clear, it is difficult to control and predict its foundation, it is difficult to play the subjective initiative of people, and the final management effect cannot be comprehensive. WSR is the abbreviation of “Wuli, Shili, Renli methodology”. It was proposed by Professor Gu Jifa and Dr. Zhu Zhichang, famous Chinese system science experts, in 1994 at HULL University, UK. This methodology, in many cases, can organize complex things, and then subdivide them into three aspects: Physics, reason and human reason. It is also the unified result of many methods, and it is a systematic methodology. By using WSR system, we can divide the system resources into three categories: Physics, management and human management, and allocate them reasonably, so that the system can run more smoothly. Therefore, it is of great practical significance to adopt WSR three-dimensional management mode in the management of cheerleading teams in Colleges and universities to improve the cheerleading level in colleges.

2 Analysis on the Current Situation and Main Problems of the Management Mode of Cheerleading Teams in Colleges and Universities The traditional organizational structure and management mode of cheerleading teams in Colleges and universities. The first level is managed by the headmaster, and the tasks are distributed to all departments. The second level is implemented by each management department and lays the foundation for the formation of sports teams. The third level is managed by coaches. From the above figure, we can see that the coach is the main body of the sports team among all personnel, and the cultural learning, life, ideological education, training and competition of the athletes need the participation of the coach. Through the all-round understanding of each athlete’s thought and personality, make a targeted training plan suitable for cheerleaders. Other management departments at all levels mainly carry out systematic management to ensure the normal training of the sports team and the excellent performance of the competition.

WSR Algorithm for the Campus Cheerleading

1381

3 The Construction of “WSR Three-Dimensional Management Model” for Cheerleading Teams in Colleges and Universities The management mode is constructed under the guidance of management concept. According to the characteristics of WSR methodology management system, the management mode of University Cheerleading Team can be divided into the management behavior system structure composed of W Physics (facility guarantee subsystem), s management (rules and regulations subsystem) and r human resource (human resource subsystem). From the perspective of facility support subsystem, it can be divided into sports equipment, information network, sports clothing and moving equipment; from the perspective of rules and regulations subsystem, it can be divided into training mode rationality, training plan rationality and cultural course learning rationality; from the perspective of human resources subsystem, it can be divided into human resource evaluation system, athletes’ daily management and reasonable reward and punishment system. The structure of WSR three-dimensional management mode of this complete system is shown in Fig. 1.

3.1 Structure of W (Physical) Facility Support Subsystem See Fig. 2.

3.2 Structure of S (Administrative) Rules and Regulations Subsystem See Fig. 3. Fig. 1 Structure diagram of WSR three-dimensional management mode of University cheerleading team

S

W

R

1382

X. Feng

Fig. 2 Structure of W (physical) facility support subsystem

Fig. 3 Structure of S (Management) rules and regulations subsystem

3.3 The Structure of R (Human Resource) Human Resource Subsystem See Fig. 4.

4 Taking the Cheerleading Team Economic College as the Research Object The cheerleading team of economics is one of the university teams with high sports level in our. It won the fourth place in the World University Cheerleading Championship in 2013 and the first place in the National Cheerleading Competition Group street dance in 2016. However, if WSR system is used to evaluate the training of our college, many improvements can still be found.

WSR Algorithm for the Campus Cheerleading

1383

Fig. 4 R (human resources) human resources subsystem structure

4.1 Analysis and Improvement of Physical (W) Support Facilities System The physical (W) support facilities system can basically meet the requirements of WRS, which benefits from our leaders’ enough attention to cheerleading. As the material basis of training competition, he has also become the basis for our athletes to achieve results in various domestic and foreign competitions in recent years. Athletes usually have enough time and place to train, even if they do shock training before the game, there will be no contradiction between more people and less land.

4.2 Analysis and Improvement of Management (s) Rules and Regulations Subsystem Now, our college has fully used the science of other sports for reference in the training plan and training methods of athletes. In the way of sports, it is no longer to fight the body, fight the difficulty, to consume the body of the athletes or put the athletes in danger. In the normal training, our institute will take full account of the characteristics and advantages and disadvantages of our team’s athletes when drawing up the training plan, explore the strengths of each athlete, and make corresponding arrangements in terms of time arrangement. The advantages remain proficient, the disadvantages allocate more time to make up the deficiencies, but the total training time remains unchanged, which has no impact on the after-school rest and the learning of cultural courses. Nowadays, cheerleaders in our college have their own training plans. They use their spare time to train without taking up any class time. In addition to improving the special sports skills, the learning of cultural courses also enables them to have professional skills and basic cultural literacy of college students, even if they are no longer engaged in sports in the future, In the work competition with ordinary college students, it will not be in the downwind.

1384

X. Feng

4.3 Analysis and Improvement of R (Human Resource) Human Resource Subsystem The management of human resources is at the core of WSR three-dimensional system management. The coaches and athletes of our hospital have a good interpersonal relationship for a long time, and the coaches and athletes are also teachers and friends. No matter in life or in training, athletes and coaches keep good communication. Coaches track the training of athletes for a long time, and have a full understanding of each athlete. This understanding of each athlete plays an extremely important role in making plans for a single student, implementing the reward and punishment system and targeted lectures. Many athletes take into account the dual identity of college students, which inevitably brings about time conflict between the two sides. Coaches will also fully consider the time needs of cultural courses, not in the time aspect to make students embarrassed, with their own experience in training to coordinate the time, so as to make sure the sports learning is correct.

5 Conclusion The establishment of high-level Cheerleading Sports Teams in Colleges and universities should not rest on the old concept, but should absorb the relatively advanced management achievements and management concepts for a long time, no matter other advanced management methods of Cheerleading Sports Teams, Or advanced management experience of other industries, as long as it can be used to establish a high-level cheerleading team management, can be used for improvement, and get practical management experience suitable for this project. The establishment of a high-level sports team cannot be accomplished overnight. In the past, the improvement of the training system was usually based on the results, and then the problems found were improved. In this way, there are serious deficiencies in timeliness, and at the same time, it is a kind of damage to the athletes who have problems. With the deepening of education and the development of society, as well as the systematic WSR theory, now we can better prevent before the problem occurs, improve against the systematic requirements of WSR, and improve the level of Cheerleading in our.

References 1. Chen, L., Shi, M.: Relationship between systolic blood pressure recovery after exercise and simple obesity (overweight). J. Phys. Educ. 19(4), 134–139 (2012) 2. Chen, S.: Research on the planning and construction of youth sports livelihood project from the perspective of WSR. Fujian Normal University (2013)

WSR Algorithm for the Campus Cheerleading

1385

3. Fang, F.: Glasses design based on WSR system methodology. Nanjing University of Technology (2006) 4. Li, G.: Research on influencing factors and evaluation model of mass sports system based on WSR methodology. Sports Sci. 32(4), 29–34 (2012) 5. Li, K., Wu, Y.: The application of WSR system methodology in the construction of college sports culture—taking the construction of college sports culture in Songjiang University town of Shanghai as an example. J. Nanjing Inst. Phys. Educ. (Natural Science Edition) 13(2), 16–21 (2014) 6. Liu, J.: Research on management strategies of Fujian competitive sports training base based on WSR. Fujian Normal University (2013)

Model and Algorithm of Logistics Distribution Path in Model and Algorithm of Logistics Distribution Path in B2C e-Commerce Environment Based on Genetic Algorithm Peng Guo and Xueli Zhang Abstract Aiming at the most basic model of logistics distribution path optimization in B2C e-commerce environment, a tabu search algorithm is designed, and an example is tested and compared. The test results show that the tabu search algorithm has better performance than the genetic simulated annealing algorithm with memory function in terms of calculation time and optimization effect, and can meet the requirements of fast and low-cost distribution in e-commerce environment. Keywords Genetic algorithm · E-commerce logistics · Path optimization · Tabu search algorithm

1 Introduction B2C (business to customers) e-commerce is a business mode that enterprises directly provide products and services to individual network consumers through in te met, that is, online retail. There are three basic components of B2C e-commerce: online shopping malls providing online shopping places for customers, logistics distribution system for goods purchased by customers, and bank and authentication system responsible for customer identification and payment settlement. Among them, logistics distribution system determines whether B2C e-commerce can be ultimately realized, and vehicle scheduling optimization is one of the core technologies of logistics distribution system [1]. E-commerce logistics is based on goods distribution. Outsourcing has become the development trend of e-commerce logistics business. It can be said that e-commerce without logistics distribution cannot survive and survive. The fate of e-commerce is closely related to material distribution. In order to achieve the goal of zero inventory, e-commerce enterprises transfer the inventory to the distribution center. Therefore, ecommerce logistics distribution vehicles have actually become “mobile warehouses”. Through the optimization of e-commerce enterprise logistics vehicle routing system, P. Guo · X. Zhang (B) Jiangxi Tourism and Commerce Vocational College, Nanchang 330100, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_177

1387

1388

P. Guo and X. Zhang

it can optimize the logistics structure, effectively reduce the cost of e-commerce, improve the ability of rapid response to customer demand, and ensure the realization of the “customer-centered” concept of e-commerce enterprises.

2 Influence of B2C Environment on Vehicle Scheduling of Logistics Distribution Logistics distribution in B2C e-commerce environment needs to face a large number of customers, and has the characteristics of fast and timely, accurate, safe, highquality and efficient, low-cost, but small batch and multi batch, logistics distribution organization is extremely complex, especially the vehicle scheduling optimization is difficult [2]. One of the important measures to ensure the realization of these new demands of customers in distribution is to dispatch delivery vehicles quickly and accurately, and deliver goods to customers with the least number of vehicles and the shortest path. This paper discusses the fast, accurate and low-cost vehicle scheduling problem in B2C e-commerce environment. This kind of scheduling belongs to the logistics distribution path optimization problem, namely the so-called vehicle routing problem (VRP). It refers to the determination of the vehicle’s driving route between each customer when the customer’s demand and location are known, so as to make the transportation route shortest or the transportation cost lowest. According to the constraints contained, VRP can be divided into different types. The most basic type is vehicle routing problem with loading capacity restriction; if the vehicle has path length restriction, it is vehicle routing problem with distance length limit; if customer has service time limit, it is vehicle routing problem with time window; if vehicle has pick-up and delivery operation, VRP can be divided into different types, Then it is the vehicle routing problem with pick-up and delivery. In this paper, based on the actual situation of vehicle rapid scheduling in local logistics distribution under B2C e-commerce environment, the tabu search algorithm is studied for the most basic problem type vehicle routing problem with loading capacity constraints. Vpr has been proved to be a NP hard problem, that is, with the increase of the scale of the problem, the calculation time of the exact algorithm will increase exponentially, and it is difficult to get the global optimal solution in an acceptable time. Therefore, from the perspective of practical application, it has become the mainstream to design heuristic algorithms for solving various types of problems so as to obtain satisfactory solutions within acceptable computing time. Among them, the traditional heuristic algorithm mainly includes saving algorithm, circle algorithm, two-stage method and the hybrid algorithm formed by the combination of them; modern heuristic algorithm mainly includes tabu search algorithm, simulated annealing algorithm, ant algorithm and the hybrid algorithm formed between them or between them and traditional heuristic algorithm. At present, the application of TS algorithm in CVRP is still

Model and Algorithm of Logistics Distribution Path in Model …

1389

relatively small. This algorithm was first proposed by Glover (1986). It is an extension of local neighborhood search, a global step-by-step optimization algorithm, and a simulation of human intelligence process. TS algorithm avoids detour search by introducing a flexible storage structure and corresponding taboo criteria, and pardons some taboo good states by flouting the criteria, so as to ensure the effective exploration of diversity and finally achieve global optimization. Compared with simulated annealing and genetic algorithm, TS is another modern heuristic algorithm with different search characteristics. So far, TS algorithm has achieved great success in combinatorial optimization, production scheduling, machine learning, circuit design and neural network [3]. In recent years, TS algorithm has been widely studied in global function optimization.

3 General Vehicle Routing System In the B2C e-commerce environment, the logistics distribution path optimization problem can be described as follows: for the customer group with a certain location and goods demand, the logistics distribution center of an enterprise delivers goods to multiple customers with multiple vehicles according to customer requirements. The weight of each vehicle is fixed, and the sum of customer demand on each distribution path does not exceed the vehicle load capacity. It makes the delivery of goods in the hands of customers in a timely and accurate way, with the minimum cost of delivery. Use the following formula to determine. m=

gi aq

+1

(1)

where m is the number of vehicles required, which means rounding, and a is the parameter. The more constraints of 0 < a < 1, the more complex the cargo loading, the smaller the value of a. If a certain e-commerce logistics center has K transportation vehicles and provides transportation and distribution services for q customers, the weight of goods carried by each transport vehicle is bk , and the quantity of goods required by each customer is di , The distance from the demand point to the demand point J is Ci j . Suppose m is the number of customers that the kth transport vehicle needs to provide transport services (n k represents that the k-th transport vehicle has not been used for the freight). The set Rk is the kth transport line followed by the transport vehicle, where R is the transport order of the customer’s point in the transport line k. Then the objective function can be expressed as: min U =

nk K   k=1 i=1

ck +

c  k=1

ck+1 .sign(n k − 1)

(2)

1390

P. Guo and X. Zhang

4 Vehicle Routing System Optimization Based on Genetic Algorithm Genetic algorithm includes the following main steps: (1)

(2)

(3)

(4) (5)

(6)

Selection: the number of individuals that can determine the recombination/fork individuals and their offspring [4]. Any individual has the probability of being selected, which depends on the fitness and distribution of the population. Generation of initial population: random generation of a number of initial strings. Each strand constitutes a chromosome (individual) and exists in the form of coding. Together, a random initialization population (P) is formed. The content of the code changes with the solution of the problem. Initialization population: select the better individuals from the population and produce the next generation of chromosomes with other better individuals. Selection genetic strategy, including population size (n), the specific way of selection, crossover and mutation, crossover probability P. and mutation probability. After decoding, the fitness f (x). of individuals in the population is calculated. Through the functions of selection, crossover and mutation operators in the population, the offspring population is calculated together. Determine whether the newly generated population can achieve the goal or complete the expected number of iterations. If not, repeat step (5) until the goal is met, or achieve the result by optimizing the genetic strategy again (Fig. 1).

5 Conclusion E-commerce logistics vehicle routing optimization can not only reduce fuel consumption and greatly save logistics costs, but also provide customers with more timely and convenient services by saving vehicle delivery time, The optimized genetic algorithm has better convergence speed and better path selection in e-commerce logistics vehicle routing system, which provides technical support for improving the competitiveness of e-commerce enterprises.

Model and Algorithm of Logistics Distribution Path in Model …

1391

Fig. 1 Genetic algorithm flow

References 1. The sea is shallow. On the construction and improvement of China’s e-commerce logistics distribution system. Shopping Mall Modernization 206(8) 2. Yan, Y., Wei, J.: Countermeasures for establishing and improving logistics distribution system under e-commerce in China. China Manage. Inf. Comprehensive Edition (12), (2007) 3. Li, J., Guo, Y.: Logistics Distribution: Theory and Method of Vehicle Optimal Scheduling. Beijing China Materials Publishing House (2001) 4. Zhai, L., Zhang, X.: Modeling and Simulation of Lean Supply Chain Logistics in Automobile Manufacturing Industry. Harbin Institute of Technology, Harbin (2010)

Dynamic Learning of Cheerleading Rehearsals Based on Moodle2.0 Module Linna Hua

Abstract Based on the traditional cheerleading teaching foundation, combined with the development of computer technology, cheerleading combined with moodle2.0 modular dynamic learning research, taking modern education concept as the guide and promoting the two-way principal position of teachers and students as the starting point, focuses on the new breakthrough of traditional education and teaching mode under the guidance of the new curriculum concept, Carrying out the education and teaching activities of carrying out quality education and cultivating people’s all-round development. Keywords Modular · Cheerleading · Dynamic learning research · The definition of knowledge discovery and data mining With the in-depth development of modern education concept and the wide application of modern education technology, the current classroom teaching is no longer limited to the visible classroom. The development of network technology has greatly expanded the space–time boundary of education, and greatly expanded the space and time of teaching and hands-on practice. Modular cheerleading dynamic autonomous learning emphasizes student-centered, and emphasizes that knowledge is not only transmitted by teachers, but also actively constructed by learners through negotiation and interaction with others in rich social and cultural situations; it emphasizes learning interaction and cooperation, so as to form an interactive learning environment, so as to give full play to the leading role of teachers and the main role of students, It can better embody the innovative education idea of taking students as the center. This study is to try to broaden the theory and practice of Cheerleading teaching reform, effective use of network multimedia technology in physical education to do some useful exploration [1–3].

L. Hua (B) Yunnan Technical College of Industry, Yunnan Open University, Kunming 650500, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_178

1393

1394

L. Hua

1 About Moodle2.0 Moodle is a free open source software package for building courses and websites based on Internet. The project continues to be developed and is designed to provide a learning environment based on a web framework linked to “social con structurist pedagogy”. Modular dynamic autonomous learning education theory holds that learning from the students’ perspective is the best, far more effective than publishing and evaluating information that you think they should know. Moodle is a complete virtual learning environment, including the following core functions: learning module: transmission and management of course materials, reference materials, learning activities, etc.; security settings: access control such as password setting; student management: including student files, score verification, learning process records, etc.; learning tracking: such as timetable tools; learning assessment: usually feedback information assessment, Such as self-assessment; communication and cooperation: it can be one-to-one, one to many, synchronous or asynchronous communication; support system: such as online help; etc. [4, 5]

1.1 Fuzzy C-means Clustering Algorithm Clustering is a process of dividing the collection of physical or abstract objects into several classes or clusters composed of similar objects. Clustering method is used to divide similar groups or individuals of students, which can provide similar or personalized teaching. At the same time, the course learning process often needs to form a group to learn. According to the students’ learning habits, using clustering algorithm can reasonably allocate group members. In this paper, the widely used fuzzy c-means clustering algorithm is used to analyze the log data accumulated by Moodle platform, hoping to find out the students who have similar learning behavior [6, 7]. Fuzzy C-means (FCM) clustering algorithm is the most perfect and widely used fuzzy clustering algorithm based on objective function. Fuzzy c-means clustering algorithm is a kind of clustering algorithm which uses membership degree to determine the degree of each data point belonging to a certain cluster. It takes n vectors x, (I = 1.2 N) is divided into C fuzzy groups, and the clustering center of each group is calculated to minimize the objective function of the non similarity index. FCM uses fuzzy partition to determine the degree of each given data point belonging to each group according to the membership degree between 0.1 values. According to the introduction of fuzzy partition, the membership matrix U is allowed to take elements between 0.1. Definition 1: Given the set of data objects in p-dimensional space R p Let X = {x1 , · · · xn }.They are C1 · · · Cc fuzzy sets on c, and X i j is X i , which belongs to the membership degree of Ci . If

Dynamic Learning of Cheerleading Rehearsals …

1395

Table 1 Moodle2.0 supported web service protocols Name of agreement Moodle version Describe AMF

2.0

Adobe protocol and flash/flex application interact

REST(XML)

2.0

Using Xml format data access through rest API

SOAF

2.0

For Java and.Net application interoperability is important fully support PHP client

XMLRPC

2.0

Xml remote procedure call x 

X i j = 1, 1 ≤ j ≤ n

(1)

i=1

0≤

x 

X i j < n, 1 ≤ i ≤ c

(2)

i=1

Then set C1 · · · Cc is called the C-fuzzy partition of X . Definition 2: For any data object x j and y j cluster centered on y j , let di j denote the Euclidean distance between x j and y j .  di j = x j − yi  , 1 ≤ i ≤ c, 1 ≤ j ≤ n

(3)

Then, the membership of x j , which belongs to cluster C j , is defined as  Xi j =

 c   di j 2/(β−1) l=1

dk j

−1 , 1 ≤ i ≤ c, 1 ≤ j ≤ n

(4)

1.2 Web Service Ice in Moodle Moodle provides the web service function, and the supported web ser vice protocol types are shown in Table 1.

1.3 Web Service Access Service Settings Web service access service settings administrator can create a web service for users to access the service. Each user will have a unique and unique security code (also known as token) to access the service. (1) Make web services available. First, log in to Moodle site as an administrator. In settings—site management—advanced features, check “enable Web services”, and then click Save (2) make the protocol available. External

1396

L. Hua

Fig. 1 Working principle of web service in Moodle

applications usually used by users indicate which application protocol should be used. In the previous step, web services is set, This step is to set which protocol of Web services is available. The steps are: set up—site management—plug-in—Web Services—management protocol, and then make the corresponding protocols (soap, rest, XMLRPC and AMF) available. As shown in Fig. 1.

2 Advantages of Modular Cheerleading Dynamic Learning Based on Moodle 2.0 2.1 Moodle2.0 Modular Cheerleading Dynamic Learning Platform Can Improve the Cheerleading Education and Teaching Methods, and Improve the Teaching Efficiency Cheerleading teaching is a course combining theory with practice. Students should not only master solid theoretical knowledge, but also require them to complete a large number of difficult movements, especially cheerleading and other difficult professional complete sets of exercises. There are many kinds of Cheerleading movements and the movements change quickly. If students rely too much on teachers, they will lack independent thinking ability and practice opportunities. But if there is no teacher’s guidance, students will fall into a dilemma. When we use Moodle, we can use Moodle modular teaching platform to let teachers and students participate in the organization and construction of teaching content. The teaching content is open and dynamic, and the development of teaching content is also continuous and random. For students, this model provides a set of tools to help students build a learning environment that meets their own needs, and adopts constructive cooperative learning method in the learning process to cultivate students’ creativity, analysis ability and evaluation ability. For teachers, the application of virtual learning environment creation tools can quickly and quickly establish a course “website”, easily store course materials, and let students log in to visit and use these course materials.

Dynamic Learning of Cheerleading Rehearsals …

1397

2.2 Moodle2.0 Modular Cheerleading Dynamic Learning Platform Can Improve the Theory Examination System and Prevent the Same Papers and Papers Mechanism to prevent identical papers and papers. The theoretical homework of Cheerleading teaching is often collected in the form of electronic version. In the past, due to the heavy workload of the traditional evaluation method, it is difficult for teachers to evaluate the similarities and even the authenticity of students’ homework and papers. This has caused injustice to many students and made it difficult for teachers to master the situation of students’ homework. But with Moodle 2.0 modular cheerleading dynamic learning platform, through this platform, we can use computer technology to do more automatic processing, reduce the workload of teachers’ marking. We can check whether there are similarities in students’ homework, which is of great help to urge students to finish homework independently and improve teaching effect. Without this monitoring system, students’ easy plagiarism will destroy all teachers’ efforts and students’ learning enthusiasm.

2.3 Moodle 2.0 Modular Cheerleading Dynamic Learning Platform Can Strengthen the Teaching Evaluation Process and Results, and Make the Evaluation More Fair and Comprehensive The traditional cheerleading curriculum evaluation system is often “one test results”, many uncontrollable factors, often can not truly reflect the true level of students and the quality of teacher education and teaching, and basically can not reflect the students’ evaluation of teachers, generally belongs to “one-way evaluation”, so the traditional evaluation model is criticized. However, the interactive characteristics of Moodle 2.0 modeling cheerleading dynamic autonomous learning platform just makes up for the shortcomings of the traditional evaluation system. It can strengthen the relationship between teaching and learning between teachers and students. Teachers can make comprehensive evaluation according to students’ learning conditions, so as to make the evaluation more open, fair and fair, and reflect the accuracy and comprehensiveness of evaluation. At the same time, students can also use this platform to evaluate teachers.

3 Conclusion Moodle 2.0 modular cheerleading dynamic learning is not immutable in the implementation process, with the deepening of teaching reform, modular teaching will

1398

L. Hua

continue to improve. It establishes education and teaching on a broader communication background. Teachers and students will be more active in teaching and learning. Teachers and students can effectively carry out teaching, communication and discussion. Students can arrange learning content, learning time and learning progress according to their own situation.

References 1. (American) Fling, B., translated by Ma, J.: Design and Development of Mobile Applications. Electronic Industry Press, Beijing (2010) 2. Li, J.: Information Curriculum Design: The Creation Of Moodle’s E-Learning Environment. East China Normal University Press, Shanghai (2007) 3. Fu, L.: On the advantages of integrating Moodle’s final teaching platform with instructional design curriculum. Res. Audio Visual Educ. (6), 96–99 (2009) 4. Zhang, J.: International open source network final teaching platform. Localization application of Taiwan Moodle: secondary development and teaching experiment. Master’s thesis of Shenzhen University, (2011) 5. Liu, G., Wang, M., Zhang, Z., et al.: Data mining in mobile learning. China Distance Educ. (1), 31–35 (2011) 6. Wei Shunping. Research on data mining of Moodle platform: a case study of learning process analysis of an online training course. China Distance Educ. (1), 24–30 (2011) 7. Liu, Y., Li, W., Yue, K.: Intelligent Data Analysis. Science Press, Beijing, 20

The Application of Financial Analysis Model Based on SAS in Enterprise Financial Decision-Making Process Tao Huang and Yang Liu

Abstract Under the current situation that the state strongly supports the development of small and micro enterprises, small and micro enterprises enter the period of development opportunities. Due to their own problems, small and micro enterprises are faced with many risks in the process of development. SAS financial analysis model is a comprehensive model to analyze the problems of enterprises from the perspective of strategy and finance. SAS model has wide applicability in small and micro enterprises, but the practical application should be adjusted accordingly. This paper analyzes the practical application of SAS model in small and micro enterprises by case study, and the analysis results provide help for small and micro enterprises to seek ways to avoid risks, correctly choose development direction and strategic choice, etc. Keywords SAS financial analysis model · Financial distress · Financial ability

1 Introduction The Internet plus era has ushered in big data. How to manage data in the financial control center of enterprises, enhance the efficiency of financial management center, and provide scientific financial analysis report for the development and decisionmaking of enterprises, is a difficult problem for modern financial practitioners. In other words, with the application of modern information system in financial management, accounting is gradually changing to management accounting, and accounting positions have changed. At present, the main business responsibilities are to study information, create models, explore business planning and other new contents. It has been proved by practice that financial management is carried out by combining business with finance, Meet the needs of modern enterprise financial control center, make financial managers fully grasp the operation process of business department, can more scientific and efficient analysis of enterprise financial situation, provide T. Huang (B) · Y. Liu Fuzhou University of International Studles and Trade, Fuzhou 350202, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_179

1399

1400

T. Huang and Y. Liu

scientific financial analysis report for enterprise operation and decision-making, and lay a solid foundation for its long-term development.

2 Overview of SAS Financial Analysis Model Financial analysis is often regarded as the analysis of financial statements in practice, but it is not. Financial analysis should also include enterprise strategy analysis and accounting analysis. SAS financial analysis model is to analyze the company’s strategy, accounting and financial statements [1].

2.1 Three Dimensions of SAS Financial Analysis Model (1)

(2)

Strategic analysis The word “strategy” first appeared in the military field and was introduced from Europe. Now it is applied in the field of enterprise management, and the earliest is from Europe. Strategy is the enterprise through the external environment and internal management system analysis, combined with their own resources, to choose the path to achieve enterprise goals. Strategic analysis is to analyze the internal and external environment of an enterprise. The external environment is the survival environment of the enterprise, and the internal environment is the internal operation situation of the enterprise itself [2]. After the analysis, the position of the enterprise in the market industry, the advantages and disadvantages of its own existence, what kind of goal to achieve, what kind of decision should be made in order to achieve the goal. Strategic analysis can lay a good foundation for further financial analysis and make accounting analysis and financial statement analysis more accurate and objective. Accounting analysis Accounting analysis is simply to excavate the connotation of information and identify the quality of information. Accounting analysis is the information disclosed by an enterprise to judge whether the choice of accounting policy and the change of accounting estimate are reasonable, whether there is false information and so on. The accounting policy here is the principle, basis and accounting treatment method adopted by enterprises in accounting. Accounting policies should be selected within the scope of accounting standards. Accounting estimation refers to the judgment made by an enterprise on the basis of the latest available information for transactions or events with uncertain results. Accounting analysis also includes the correction of prior period errors, which refers to the correction of errors with large amount and serious nature caused by omission or misstatement of previous financial statements due to a series of reasons, and the retrospective adjustment of

The Application of Financial Analysis Model Based on SAS in Enterprise …

(3)

1401

previous financial statements. In addition, whether the disclosure of information meets the quality requirements of accounting statements and the analysis of accounting elements measurement. Analysis of financial statements Financial statement analysis is to take the financial statements as the object, and use certain methods to calculate and analyze the data in the balance sheet, income statement and cash flow statement. At the same time, the financial statement analysis also includes the analysis of the correlation between the statements and combining with other relevant information of the company to dig out deeper information. In short, financial statement analysis is to uncover the outer layer of data and explore the inner truth. The problems and hidden information of many companies will be reflected directly or indirectly through data.

3 Application of Statistical Methods in Enterprise Financial Analysis Enterprise financial analysis is one of the main application scenarios of statistical methods. Enterprise financial personnel use statistical methods to purposefully collect data, according to the actual needs of statistical data, information collection, analysis results, comprehensive planning [3]. The results of its work can provide decision support for enterprise managers and ensure the sustainable development of enterprises. The demand side of the financial analysis results of the company is the company’s managers, existing and potential customers, partners, etc. Managers pay attention to the choice of industry environment and development strategy, customers pay more attention to the profitability and qualification of the company, and partners pay attention to the development trend of the company. According to the company’s current situation and existing problems, the company’s financial analysis focuses on the industry environment, development strategy analysis, profitability analysis, risk analysis, etc. The SAS analysis model of the company is shown in Fig. 1.

4 Improvement of Statistical Methods in Enterprise Financial Analysis Under the Background of Big Data In the era of big data, the explosive growth of data increases the difficulty of data statistics and analysis, and also puts forward higher requirements for the effectiveness and timeliness of data. In this context, efficient information statistics method is the key for enterprises to gain market competitive advantage. Compared with the traditional data, the source, type and quantitative method of big data have undergone essential changes, the nature of data has become more complex, and the processing

1402

T. Huang and Y. Liu

Fig. 1 Company SAS financial analysis model

difficulty has also increased. Therefore, the application of statistical methods in financial analysis should achieve three “changes” and two “strengthening” [4]. Change the sampling method of statistical data. With the continuous upgrading of cloud computing, AI and other technologies, the computing power has changed with each passing day. Considering the diversity and complexity of data, sampling survey can not guarantee the accuracy and reliability of data. Therefore, the more scientific sample selection may ignore some clues in the data. Under the condition of big data, the sampling sample is more extensive, and comprehensive analysis is possible. This can not only avoid the subjectivity in the process of sample selection, but also find the subtle anomalies in the data. Using big data, taking massive financial and non-financial data as the overall sample for real-time analysis, and then draw a conclusion, which will have greater value for business decision-making. Maximum clearance problem. Real numbers, x1 , x2 , x3 , · · · , xn , the maximum difference between the n real numbers in the number of real axes requires a linear time algorithm. (max − min) n−1    x[i] − min  +1 index =  dbl AvGap 

dbl AvGap =

(1) (2)

Strengthen the level of enterprise financial information. To a certain extent, big data can strengthen the collection of non-financial information by enterprises. By adding cross processing analysis, it can effectively improve the internal control environment of enterprises, strengthen the awareness of external risk control, and further change the role of financial personnel. However, the processing of a large amount of data should be supported by a higher level of informatization. Therefore, enterprises should comply with the high requirements of big data on infrastructure and increase the investment in financial informatization construction.

The Application of Financial Analysis Model Based on SAS in Enterprise …

1403

5 Conclusion From the perspective of the company’s managers, it is feasible for the company to build its own R&D team. With sufficient financial support, the company can temporarily slow down its foreign investment and use the funds for the construction of the R&D team. The future development direction of the company is to focus on building its own characteristic brand, establishing competitive advantages and improving the company’s competitiveness in the market on the basis of expanding potential customers. SAS model has a wide range of applicability in enterprises, which helps information users to understand the overall situation of enterprises and provides the basis for accurate decision-making. When using SAS model to conduct financial analysis, information users should combine the industry characteristics and business characteristics of enterprises to determine specific indicators.

References 1. Xin, J., Huacheng, W., Junyan, L.: Financial Management, 8th edn. China Renmin University Press, Beijing (2018) 2. Zhang, G.: Causes of enterprise financial risk and selection of preventive measures. Bus. Account. (9), (2018) 3. Wu, L., Zhang, H., Wu, T.: Research on financial diagnosis and application of MCS model. Account. J. (2), 85–87 (2014) 4. Wang, M., Sun, X.: Diagnosis and analysis of enterprise finance. Sci. Technol. Inf. (21), 160 (2006)

The Development of Excellent Courses of BP Neural Network Teaching Platform Pinzhu Jiang

Abstract Blackboard online teaching management platform is an integrated, efficient and powerful network platform for “teaching” and “learning”. This paper expounds the necessity and design principles of the teaching reform of “Ideological and moral cultivation and legal basis” course based on the platform of the network teaching of BB under the new situation, explores the design of the network teaching content of BB, and then effectively improves the education effect of the ideological and political theory course. Keywords Ideological and moral cultivation and legal basis · BB network teaching platform · Network course design

1 Introduction “Ideological and moral cultivation and legal basis” is one of the most important ideological and political theory courses for college students. However, the pertinence and effectiveness of the teaching and education of “thinking and taking courses” need to be further improved. With the rapid development of information technology, the construction of network course of “Ideological and training course” based on the network teaching platform of BB has effectively realized the combination of practical teaching of teaching resources, effectively improved the teaching characteristics and advantages of the course, and provided a new way for the teaching reform of “Ideological and training course” [1, 2].

P. Jiang (B) Ji Lin Justice Officer Academy, Jilin 130062, Changchun, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_180

1405

1406

P. Jiang

2 The Necessity of Applying the Network Teaching Platform of B to the “Thought Course” The traditional teaching methods of “thought course” are mostly didactic and indoctrinated. The teaching methods are relatively simple, and the teaching effect is relatively prominent. In particular, the present college students are “post-90s”. Their ideological characteristics and cognitive style can not accept the traditional teaching form. Therefore, in the teaching process of “thinking course”, the effective use of the b-network teaching platform can realize the communication and interaction between teachers and students’ teaching activities. The learning resources in the b-network teaching platform are illustrated and interactive. In addition, online discussion, online testing, online consultation, online question answering, etc. can be realized in the platform teachers can also effectively use personal space, microblog and other channels to interact with students, so as to effectively stimulate students’ interest and enthusiasm in learning, and improve the teaching effect of “Ideological Course” [3].

2.1 Improve the Teaching Effect of “thinking Course” In the past “thought course” teaching activities, the expert professor’s listening in class, supervising the teacher’s teaching plan, checking the students’ teaching assignments and so on are the main teaching effect evaluation forms of the traditional “thought course”. This kind of form often increases the heavy work burden to the educational administration department and the teacher. Because the “thinking course” is generally a large class teaching, with a large number of students in the class. According to the traditional teaching methods, whether it is to check the students’ homework, or to convert the usual results and final results, etc., it needs a lot of energy from the teacher to complete, which to a certain extent affects the teaching effect. But, In the process of “thinking course” teaching, many problems will be solved by using the B-B network teaching platform. The platform system can provide classroom assignments, test questions and other modules. The teacher needs to import the relevant test papers into the system, organize students to answer. After students answer questions, the system can also carry out statistical analysis, which greatly improves the teaching effect of “thinking course” and fully plays a role to the effect of teaching with half the effort [4, 5].

3 The Design Principle of “Thinking Course” BP Network Teaching Course “Thinking course” BP network teaching course includes teaching objectives, teaching contents, teaching methods, teaching courses and other aspects into a one-body

The Development of Excellent Courses of BP Neural Network …

1407

Fig. 1 Main principles of online teaching curriculum design

teaching environment. The main content of “thinking course” BP network teaching course involves all teaching, such as pre class preview, class, teaching, after class reflection, online question answering, online testing and so on. The following principles are mainly adhered to in the design process of “thinking course” BP network teaching course:

3.1 Adhere to the Principle of “Student Oriented” With the rapid development of the Internet age, it has become an important way for college students to acquire knowledge. And “Ideological and political course” BP network teaching course mainly refers to in-depth and systematic analysis and exploration through students’ active observation of problems around them, which is consistent with the educational goal of Ideological and political theory course in Colleges and universities. Therefore, in the process of building, we should closely combine the law that college students like to get information online. In the teaching content, we should design pictures and texts, and increase interest. In the process of teaching, we should adhere to the standard of taking students as the main body, fully mobilize the enthusiasm of students’ participation, so that students can actively participate in the process of online teaching, and then effectively improve the education effect of “thinking course” (Fig. 1).

3.2 Adhere to the Principle of Synchronization with Classroom Teaching The traditional daily teaching process of “thinking course” generally involves syllabus, teaching objectives, teaching process, teachers, learning materials and so on. In the process of teaching, we should also adhere to the corresponding content and

1408

P. Jiang

progress principle. Only scientific and orderly management of teaching materials, such as opening and closing, can achieve orderly and continuous deepening, and realize the management and control of students’ online course learning. In addition, the course content and learning time should also be carried out in a sustainable and orderly manner. Just like the traditional daily teaching in Colleges and universities, the semester can achieve the completion of related teaching tasks simultaneously, and then can scientifically build the completed “thinking course” BP network teaching course. “Ideological and political course” is the first course of Ideological and political theory for college students after they enter the University. This course integrates ideological, political, intellectual, comprehensive and practical aspects. It focuses on the practical problems faced and concerned by contemporary college students in the process of growing up. In the teaching process of “thinking course” BP network teaching course, we should give full play to its network advantages and improve the interaction between teachers and students. The forms of interaction should be diversified, which can be one-to-many, one-to-one, anonymous participation or real name participation, so that teachers and students can participate in it with all their hearts. The “thinking course” B network teaching course not only enables teachers to guide their thoughts consciously and positively, but also helps college students to think independently, thus realizing the internalization into daily behavior and guiding their practice.

4 The Design Content of Network Teaching Course “Thinking Course” In the process of “thinking course” BP network teaching course, it mainly includes the introduction of teachers, the basic information of the course, the introduction of teaching content, the interaction between teachers and students, the comprehensive evaluation of teaching, etc. The specific contents of the column are as follows: in the design process of this column, the basic information of the teacher shall be provided, including the resume, teaching time, office location and contact information of the teacher. The basic responsibility of the teachers in the course of “ideological training” is to teach by words and deeds. However, it is different from other courses in teaching methods and educational effects. The teachers of the course have a great influence on College Students’ thinking and guidance. In this way, students’ comprehensive quality is required to be more and more comprehensive. In the course of teaching, we should put an end to the form of conventional empty talk, and lead students with their knowledge and skills level and personality charm education, so as to improve the effectiveness of the moral education function of the “thinking course”.

The Development of Excellent Courses of BP Neural Network …

1409

4.1 Basic Information of the Course and Clear Learning Orientation In designing the basic situation of the course, we should make clear the teaching objectives, teaching methods and teaching requirements of the course. From the aspects of course introduction, teaching object, syllabus, teaching calendar, class hours, examination methods, compulsory courses, etc. Through the introduction of the above content to the course, students can clearly understand the basic situation of the course, master the course nature and teaching tasks of the course, which can play a good guiding effect for college students, and establish a good benchmark and education effect for teachers and students.

4.2 The Introduction of Teaching Content and the Expansion of Classroom Teaching The teaching content of this column mainly includes the teaching plan (electronic version), teaching ppt, teaching cases, extracurricular learning materials, guidance of students’ social practice activities, etc. the “thinking and training course” consists of eight chapters, which are divided into three levels: chapter, section and item. The teaching content of each chapter includes teaching objectives, key and difficult points, teaching process, curriculum reflection, teaching methods and other contents. The teaching content of this course involves all aspects related to the growth and development of students, and then plays an effective role in expanding the “Ideological and practical courses”.

4.3 Interaction Between Teachers and Students to Promote Spiritual Communication The interaction between teachers and students is an effective carrier for the course to effectively improve moral education. In this section, teachers can effectively expand online through teaching interaction, which is also an important way to reflect teachers’ high level and personalized teaching. On the Internet, teachers and students can effectively carry out problems discussion, contact guidance, puzzlement answer, high-quality courses and other aspects, so as to effectively realize the good interaction between teachers and students. Through this form, teachers and students can realize the spiritual communication on the basis of the basic course communication, further expand the education and teaching effect of “thinking course” and promote learning Students’ Ideological and moral cultivation and legal quality are effectively improved.

1410

P. Jiang

5 Conclusions The purpose of the design of “Ideological and political course” BP network teaching course is to facilitate students to learn the theoretical knowledge of Ideological and political education, understand the level of independent learning, improve the teaching effect of Ideological and political theory course, and further reform the teaching methods of Ideological and political theory course. The comprehensive evaluation of teaching in the course of B-B network teaching is for the purpose of self-evaluation of students’ learning of Ideological and political theory. Through the B-B network teaching course assessment system, we can not only understand the completion of the students’ homework, but also review and grade the students’ homework, timely give feedback to the students, greatly improve the effectiveness of the classroom teaching of “thinking course”, and effectively implement the comprehensive teaching evaluation of the combination of students’ learning process and learning effect.

References 1. Yu, S., Yang, X., He, K.: Teaching design mode based on constructivism. Audio Visual Educ. Res. (12), 7–13 (2000) 2. He, K.: Theory and method of deep integration of information technology and curriculum. Audio Visual Educ. Res. (1), 7–15 (2005) 3. Zhang, Z., Wu, Z., Zhao, B., Zheng, Z.: Construction and application of excellent course “Ideological and moral cultivation and legal basis” based on web-based teaching platform. China Educ. Inf. Higher Vocat. Educ. (6), 67 (2012) 4. Fu, H., Wu, X.: Teaching reform of “Ideological and moral cultivation and legal basis” in the context of supply side view. New Curriculum Research: Mid Day, 2018000 (004) 5. Fu, H., Wu, X.: On the basis of ideological and moral cultivation and law in the perspective of supply side, “preliminary exploration of curriculum teaching reform”. New Curriculum Research (Mid Day Double) (2), (2018)

Consumption Pattern of Tourist Souvenirs Based on Apriori Algorithm Yizhi Jiang and Xi Li

Abstract In this paper, the apriori optimization algorithm is applied to the pattern mining of tourist souvenir consumption, and the process of producing personalized consumption pattern in tourist souvenir is described. Firstly, the theoretical basis of the current e-commerce sales recommendation system is briefly introduced, including data mining, information retrieval and filtering technology. On this basis, this paper focuses on the analysis of the classic Apriori algorithm, summarizes the main shortcomings of the algorithm, and puts forward a feasible solution. The improved ID3 algorithm proposed in this paper is based on the following three points: simplifying the calculation formula of information gain in ID3 algorithm, introducing penalty function to solve the multi value bias problem of the original ID3 algorithm, and discretization of continuous non nominal attributes. The process is realized and the results are analyzed, which not only further verifies the practicability of the optimization algorithm, but also provides an effective way to generate personalized consumption pattern in tourism business system. Keywords Association rules · Apriori algorithm · Decision tree · Personalized souvenir package

1 Introduction There are many mining methods that can be used in data mining [1]. Considering that there is a certain association between tourism consumers and the selected consumption patterns, and there are many associations between the content of consumption patterns and the personalized consumption of consumers, this paper introduces the

Y. Jiang · X. Li (B) School of Fine Arts and Design, Xiangnan University, Chenzhou 423043, Hunan Province, China e-mail: [email protected] Y. Jiang e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_181

1411

1412

Y. Jiang and X. Li

association rule algorithm and its optimization algorithm to explore its application in the personalized consumption mode of tourism e-commerce. As we all know, the sales of goods are affected by the change of seasons. Hot selling goods are in short supply when the peak season is coming. Therefore, it is necessary for sellers and producers to know the sales situation of commodities in time to ensure the supply rate of hot-selling commodities. When the off-season comes, the sales of some commodities will decline. The sellers and producers can find out the consumer interest by mining association rules, so as to optimize the product promotion mode, Increase the sales of products. In today’s market economy system, people in the business field hope to find useful association rules from their own database, because they can be used to help the enterprise high-level configuration, optimize the company’s resources, and also help the company to make plans, such as hybrid shopping, classification analysis, etc.

2 Association Rule Mining Algorithm Apriori Algorithm 2.1 Overview of Apriori Algorithm Apriori algorithm is a classic algorithm in association rules algorithm, and the research of association rule algorithm also starts from Apriori algorithm. Apriori algorithm makes full use of the properties of frequent itemsets. It is not only a non empty subset of frequent itemsets, but also must be frequent. The main idea is to first roughly count the frequency of all itemsets containing one project, and then generate frequent 1-itemsets, and mark frequent 1-itemsets as, and then seek frequent 2-itemsets according to [2]. Operate until a itemset m is found and is empty, the operation will be stopped.

2.2 Analysis of Apriori Algorithm The classic Apriori algorithm uses the feature that the subset of frequent item set is certainly frequent, and the superset of non frequent item set is not frequent. Although a certain number of candidate sets are reduced to a certain extent, it can not meet the needs of large-scale database. With the deepening of the research, the following two defects are more and more obvious. (1)

Candidate sets emerge in large numbers with the generation of frequent itemsets. When there are 10,000 frequent sets of length 1, there will be more than 106 candidate sets of length 2. It needs a lot of CPU processing time and a lot of memory space.

Consumption Pattern of Tourist Souvenirs Based on Apriori …

(2)

1413

The database needs to be scanned many times when the candidate itemsets are matched. For example, if there is a frequent item set with a length of 25 in the transaction database, it needs a considerable I/O load to scan the transaction database at least 25 times to determine its frequency.

3 Improved Apriori Algorithm 3.1 Support An important factor to judge the interest of a rule is to measure its potential usefulness [3]. Support degree is usually used to evaluate. In the form of predicate logic, it can be expressed as follows: let D be the object domain, A ⊂ D, B ⊂ D, and A ∩ B = ∅, the unary predicate Support (X) denotes the support of X, Num (Y) represents the number of tuples containing y, then. Suppor t (A → B) = N um(A ∪ B) ÷ N um(D)

(1)

The molecules of the support equation are called support counts, and usually support counts are used to measure the practicability of a rule.

3.2 Confidence Each association rule should have a measure of its validity or certainty. For association rules with the form of “A → B”, the measure of its validity is confidence. In the form of predicate logic, it can be expressed as follows: let d be the object domain, A ⊂ D, B ⊂ D, and A ∩ B = ∅; the unary predicate Confidence (X) is the confidence degree of X; Num (Y) is the number of tuples containing Y. Then. Suppor t (A → B) = N um(A ∪ B) ÷ N um(A)

(2)

3.3 Strong Association Rules When all frequent itemsets are found, strong association rules can be constructed by using frequent itemsets. Another formula for calculating confidence is introduced here. Con f idence(A → B) = Suppor t_Count (A ∪ B) ÷ Suppor t_Count (A) (3)

1414

Y. Jiang and X. Li

4 Introduction of Personalized Recommendation Technology 4.1 Content Based Recommendation Content based recommendation (CBR) uses two strategies to collect customer information, they are display strategy and implicit strategy. CBR creates different customer hobby models according to the collected customer data. The following describes various strategies. The implicit strategy is to build log files (logs) of different customers according to the links they browse, analyze and summarize the potential information in the log (for example, the length of time a customer spent browsing a web page and the amount of information on the web page visited) to obtain the overall evaluation range of the customer. The display strategy is different, it needs customer cooperation. In the actual operation process, the display strategy requires each customer to fill in a form file, through which the customer’s hobbies and interests can be obtained, so as to create a customer’s interest model [4]. An obvious advantage of 8cbr is that there are no Spae and level problems. It makes a separate analysis according to the characteristics of different customers, and recommends the products that meet the customer’s interest characteristics, Common CBR systems include message finder, web page monitor, etc. However, this strategy also has limitations. Firstly, the data used to analyze customer characteristics must be stored in a way that can be understood by the computer. However, for data such as vdeo, audio and photo, computers are not easy to carry out intelligent analysis. Secondly, it is difficult for computers to analyze such data as vdeo, audio and photo, CBR is not easy to analyze and detect the changes of customers’ interests in different periods of time, and it is not easy to analyze and process from the level of commodities. Therefore, it is not convenient to distinguish the characteristics of different commodities. The system model based on content recommendation is shown in Fig. 1.

5 Conclusion With the increasing application of database technology and network technology, people’s understanding and Research on data mining are also deepening. As an important branch of data mining technology, the potential research value of association classification is constantly reflected in the actual production practice. On the basis of introducing the meaning of data mining and the commonly used personalized recommendation technology of e-commerce, this paper analyzes the Apriori algorithm of mining association rules and the ID3 algorithm of constructing decision tree in detail, and proposes improvement strategies for them to be applied to e-commerce sales system.

Consumption Pattern of Tourist Souvenirs Based on Apriori …

1415

Fig. 1 System model based on content recommendation

Acknowledgements Xiangnan University’s specialty cultivation project “Product Design Specialty”, Xiao Fa [2018] No.154–11.

References 1. Liu, T.: Data Mining Technology and Its Application. Beijing National Defense Industry Press (2001) 2. Li, Q.: Research and Implementation of Data Mining Related Algorithms. Dalian University of Technology, Dalian (2004)

1416

Y. Jiang and X. Li

3. Deng, Z., Chen, J.: Personalized recommendation system based on association rules. Comput. Integr. Manuf. Syst. 9(10), 892–895 (2003) 4. He, B., Wang, Y.: We personalized information recommendation system based on data mining. Comput. Eng. Appl. 206(3)

Influence of Improved Apriori Algorithm on Predictive Public Management Min Kuang and Lingling Qu

Abstract The theory and practice of traditional public management cannot carry out predictive management due to the limitation of technology development. The intelligent era characterized by big data, algorithm and artificial intelligence provides strong technical support for predictive public management. However, intelligent management can not automatically derive from predictive management. The government must take the initiative to make efforts in data expansion, algorithm update, standard restriction and other aspects to ensure the correct value orientation of predictive management. Keywords Intelligent · Predictive management · Implementation conditions

1 Improved Apriori Algorithm At present, the improved Apriori algorithm proposed by scholars has less consideration on the number of times and time process of scanning database, and the research on Apriori algorithm has not overcome all the limitations, and has failed to improve the efficiency of Apriori algorithm [1]. Based on the deep study of traditional Apriori algorithm, this paper proposes an improved apriori-l algorithm, which optimizes the calculation process of frequent sets and improves the efficiency of running time. It plays a key role in the operation of frequent sets whose number of binomial frequent sets exceeds that of binomial.

M. Kuang (B) · L. Qu School of Economics and Management, Leshan Normal University, Leshan 614000, China e-mail: [email protected] L. Qu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_182

1417

1418

M. Kuang and L. Qu

1.1 Algorithm Description Combined with the relevant research process of Apriori algorithm in academia and the analysis of existing experimental results, it can be seen that the algorithm takes more time in the process of operation scanning [16–20 l, screening candidate set is S-function, and it is also a function of calculating support and generating frequent itemsets. Further analysis of the reasons why the algorithm takes a long time in the operation process mainly includes the following two aspects: (1)

(2)

The problem of too many candidate sets. In the process of generating canddate sets from frequent sets, that is, in the process of generating l-item sets from k-i, all l-item sets are obtained by association rules as candidate sets, and some k-itemsets are useless to the algorithm results. In this case, these invalid k-item sets result in the time consumption of the algorithm. The algorithm will generate more scanning times in the whole scanning operation. In the related scanning transaction set, support analysis and calculation, and frequent set acquisition operations, the correlation between the number of cycles in the algorithm application and the number of candidate sets has a strong relationship. If the number of candidate sets is large, it will directly affect the time effect of the algorithm in the running process.

1.2 Algorithm Analysis Suppose that the number of items in the item set a is b, n is the average element, and L 1 represents the actual number of frequent items in the algorithm application. Suppose that O(n) refers to the time complexity of all items in algorithm operation and frequent set, O(Cn2 ) represents the time complexity of binary subset in specific operation, and O(1) refers to the time complexity of storing table and V value in operation. Based on the above comprehensive analysis, we can see that the time complexity of apriori-l is expressed as follows in the operation process of comprehensive analysis and calculation of support when obtaining binomial candidate set C z  O

(n ∗ (n − 1)) +n∗b 2

 (1)

By scanning the above steps according to the professional standard process, thesupport h table s of the candidate set can be obtained effectively, and the time complexity of the relationship between the support degree and the minimum support degree of each candidate set in the algorithm application is judged and expressed as follows:   (n ∗ (n − 1)) ∗b (2) O 2

Influence of Improved Apriori Algorithm on Predictive …

1419

According to formulas (1), (2), the time complexity of apriori-l in the progenerat. ing binomial frequent sets is O(n 2 ∗ b)

(3)

Through comprehensive comparative analysis, we can clearly infer the time coplexity of Apriori algorithm in the process of forming binomial frequent sets. 

L 1 ∗ (L 1 − 1) O 2

 (4)

The time complexity corresponding to transaction set scanning, support analysis and calculation, and frequent set selection is shown as follows:  O

(L 1 ∗ (L 1 − 1)) n∗b 2

 (5)

According to formulas (4) and (5), the time complexity of Apriori algorithm in the process of generating binomial frequent sets is O(L 2 ∗ n ∗ b)

(6)

In conclusion, it can be seen that the Apriori algorithm needs more operation l than the improved apriori-l algorithm in the operation process [2]. By comparing and analyzing the time complexity representation of Apriori algorithm and aprioril algorithm, it can clearly infer that the apriori-l algorithm can scientifically and accurately obtain the acceleration effect of LN in the algorithm application in the operation of generating binomial frequent sets, which can improve the efficiency of the algorithm.

2 Practical Application of Apriori Algorithm 2.1 Data Preprocessing This paper analyzes the data distribution and calculates the massive test data set with the algorithm application, and divides the increase of each module into six parts: 0 < amplitude < 0.01; −0.01 < amplitude < 0.01; 0.01 < amplitude < 0.01 0.03; amplitude < − 0.03.Among these six species, they are the main criteria. According to the professional standard, the amplitude range is divided orderly, and the corresponding range of each module is arranged reasonably.

1420

M. Kuang and L. Qu

2.2 Frequent Itemsets Through the adjustment of different minimum support, the Apriori algorithm and apriori-l algorithm respectively analyze and mine the frequent sets of data. Based on the actual situation of various support degrees, Fig. 1 is the specific schematic diagram of the running time of the original Apriori algorithm and apriori-l algorithm in the calculation of binomial frequent sets. Under the support of 320, the comprehensive comparison of the total time and binomial frequent set time of Apriori algorithm and apriori-l algorithm in the application of association rule algorithm is shown in Figs. 2 and 3, where a is the calculation time of binomial frequent set, and B is the total time of calculating association rules. Fig. 1 Runtime under different support levels

Fig. 2 Calculation time of binomial frequent set

Influence of Improved Apriori Algorithm on Predictive …

1421

Fig. 3 Total time of calculating association rules

3 Conditions for the Realization of Predictive Public Management in the Intelligent Era Big data and artificial intelligence provide the technical basis for the realization of predictive public management, but the realization of predictive public management still needs some conditions to guarantee [3]. (1)

(2)

Under the premise of all, we should break through the data barriers among the government, society and market to achieve integration and sharing. One is that the government must have data that is large enough and covers a wide range of areas. At present, the commercial and social fields have a wide range of data sources and a large amount of data. However, due to the particularity of the government’s nature and the influence of bureaucracy, on the one hand, the amount of data is limited, and it is scattered on various information islands, so the utilization rate is low; On the other hand, government data, commercial data and social data have little integration with each other, and it is difficult to share data. The government’s predictive management must have a large number of data as support. First, it should enrich the government’s data and improve the database level by level; second, it should integrate the government’s internal data resources, build national, provincial and municipal data centers, and connect with each other; third, ensure data security Second, there must be a set of new algorithms to distinguish between business model and social model. The purpose of the algorithm in the commercial field is to make profits, the algorithm in the social field is to communicate, and the algorithm in public management should take justice as the purpose, which has obvious characteristics of public value. It’s a huge challenge. Data monopoly, data infringement, data disaster.The new social injustice caused by data is not a possibility problem, but has become a fact. With the general artificial intelligence and super intelligence becoming reality step by step, the consciousness problem and value judgment problem of artificial intelligence will gradually become prominent. In order to ensure the value goal of predictive

1422

(3)

M. Kuang and L. Qu

public management, the intelligent algorithm of public management must study these problems and control them effectively. As Klaus Schwab and Nicholas Davis said, we need to give value to technology. The organizational system of a point is likely to be more flexible and efficient. When looking forward to the future of urban governance, Tu zipei proposed that the organizational system and management mode must be changed to cope with the openness and uncertainty of the intelligent era. The existing public management system is the product of traditional society, which can meet the needs of traditional management, with stability as the premise and stability as the goal. However, the open and uncertain characteristics of the intelligent era require a revolutionary change in the organizational system and management mode of the government [4]. The traditional hierarchical system of vertical classification and horizontal division of labor will not be able to meet the new requirements

4 Conclusion Fourth, there should be a new set of rules and regulations in the era of intelligence to regulate and restrict the various processes of intelligence, as well as the behaviors of the government, citizens and the market. The practice of the development of human civilization has proved that science and technology is always a double-edged sword. Whether it is beneficial or harmful depends not entirely on the technology itself, but on the initiative of human beings. The more and more disputes on big data, algorithms and artificial intelligence are, the more favorable it is for us to grasp the value direction of technological development. Human active intervention in cloning technology and gene technology is a good proof. The regulation in the intelligent era should be composed of external control and internal control. Internal control refers to the ethical norms of technology, which is of industry nature and selfrestraint and supervision. According to Rosenblum’s theory, external control should be realized through political, legal and management ways. Political approach to ensure that predictive management in line with the basic value of human orientation, to ensure democracy and fairness. The legal approach requires legislation before doing business, so as to ensure that the predictive management does not exceed the rules and minimize the harm caused by technological development. The way of management requires the government to strengthen control and strictly implement political and legal norms. Acknowledgements Project of Sichuan Tourism Development Research Center, key research base of Humanities and social sciences of Sichuan Provincial Department of Education: Research on the integrated development of tourism service industry and institutional pension service industry under the mode of "tourism +": Taking Leshan City, Sichuan Province as an example, project number: ly20-12, project leader: Kuang min

Influence of Improved Apriori Algorithm on Predictive …

1423

References 1. Niu, H., Lu, H., Liu, Z.: Improvement of apriori algorithm based on spark. J. Northeast Normal Univ. (Natural Science Edition) 48(O1), 84–89 (2016) 2. Yue, M., Luo, Y., Jiang, C.: Application of improved apriuri algorithm in stock linkage. Inf. Technol. 13(07), 147–151 (2017) 3. Wei, L., Wei, Y., Gao, C.: Improvement of apriori algorithm based on BigTable and MapReduce. Comput. Sci. 42(10): 208–210 + 243 (2015) 4. Huang, D.: History of Western Administrative Theory. Wuhan University Press, Wuhan (2004)

Research on Security Detection and Response Technology of Edge IOT Agent Based on Behavior Analysis Jiyuan Li, Changhua Sun, and Hong Xu

Abstract Based on the design concept of service app, users can flexibly configure app according to business requirements to realize function customization. In order to realize the function customization, we should build the IOT management platform to manage and maintain the border green IOT agent. This paper discusses the interaction protocol between the IOT management platform and the edge green IOT agent, and verifies the function of the edge green IOT agent. Keywords IOT management platform · Edge IOT agent · Overview of construction system reliability of construction project

1 Introduction At present, there are a variety of different types of terminal equipment in various specialties of power system, such as: power consumption information acquisition terminal of marketing specialty, distribution automation terminal of distribution specialty, etc. Different terminal equipment access to their own business management system, there are certain professional barriers; the data source is not unique, there may be data conflict phenomenon, unable to achieve the national standard of “data collection, sharing and sharing”. It is of great significance to break the professional barriers and make the data effective through by using the intelligent station area integration terminal to integrate different professional services. Based on the design concept of business app, the smart zone integration terminal only has basic functions when it leaves the factory. Users can flexibly configure AP corpse according to business requirements to realize function customization. This paper J. Li (B) · C. Sun · H. Xu State Grid Zhejiang Electric Power Co., Ltd., Research Institute, Hangzhou 310014, Zhejiang Province, China e-mail: [email protected] H. Xu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_183

1425

1426

J. Li et al.

simplifies the business system, only discusses and verifies the interaction between IOT management platform and edge IOT agent.

2 Behavior Analysis Algorithm 2.1 Time Series Prediction Algorithm For airline revenue management, it is very important to accurately predict the η ashow behavior that may exist at a given time. It is a common way to take the historical data of flight rows as time series, extract the fields related to η OSHW, and predict through time series prediction algorithm. There are two kinds of commonly used algorithms: (1) (2)

traditional algorithms: multiple regression analysis, ARMA, exponential smoothing, etc. Machine learning algorithm: BP neural network, CNN, LSTM, etc.

Machine learning algorithm has a natural advantage in processing long period time series data. Before modeling, it is necessary to use processing techniques such as leave out method and cross validation method to divide historical η show data into training set and test set [1]. The training set is used to build the model, optimize the parameters, and then verify the generalization performance in the test set. However, due to the selection of many super parameters in machine learning algorithm, the workload in the training stage is heavy, and with the addition of new η show data, it is usually necessary to retrain the model to obtain the optimal combination of super parameters of the current data set. Because of this reason, machine learning algorithm has some limitations in the field of η show analysis, and its universality is low.

2.2 Behavior Prediction Model Based on Decision Tree Decision tree is a common machine learning classification technology, including a root node, several leaf nodes and internal nodes. The basic idea is to use the tree structure to classify tasks. Each branch of the tree represents a rule. Common decision tree algorithms include ID3, C4.5, C5.0, etc. Decision tree algorithm has an important application in nowow rule extraction. C4.5 algorithm is used to model and analyze the behavior of noshow, and good analysis results are obtained; Cao et al. 3 build a decision tree model usin, and then use Apriori algorithm to analyze the association rules of factors, and finally get the decision tree model with the prediction accuracy of 99.75%.

Research on Security Detection and Response Technology …

1427

Before using the decision tree algorithm, we still need to construct the noshow dataset {xi , yi }, and then train and optimize the model [2]. The core of the algorithm is how to select the optimal partition attribute accurately and satisfy that the sample set contained in the branch node belongs to one category as much as possible. The commonly used classification criteria are divided into the following categories: (1)

The information gain is calculated as follows: Gain(H, s) = Ent (H ) −

Q  |D q | q=1

(2)

|D|

Ent (D q )

(1)

The gain rate is calculated as follows: Gain r (H, s) =

Q  |D q | |D q | Gain(H, s) , I V (s) − log2 |D| |D| I V (s) q=1

(2)

When using decision tree algorithm to analyze noshow behavior, in order to avoid over fitting phenomenon, pre pruning or post pruning are usually needed to get decision tree model with strong generalization ability, which increases the complexity of modeling process, and the decision tree after pruning still has the risk of under fitting and over fitting.

3 Power Internet of Things System Architecture The power Internet of things is composed of “cloud, pipe, edge and end, with the edge IOT agent as the core.” (1) The cloud side is composed of IOT management platform, APP control service center and business application system. (2) Tube side mainly refers to the ubiquitous communication network, including wireless public network, optical fiber, HPLC, etc. [3]. (3) Side refers to edge computing, that is, edge IOT agent equipment. (4) The end side covers intelligent sensors, intelligent meters and household appliances (Fig. 1).

4 Agency of Edge Internet of Things Based on the design concept of “hardware platform and business app”, the edge IOT agent adopts the domestic CPU. The equipment installed on the site for the first time only pre installed the operating system, basic app, base image and edge agent daemons.

1428

J. Li et al.

Fig. 1 Main structure of the system

(1)

(2)

(3)

(4)

The operating system is based on the kernel transplantation of inux4.9.28, adapts to domestic CPU, drives peripheral interface, supports network display and other devices, and supports file systems such as yas2. The basic app manages the “shared resources” to avoid the conflicts caused by concurrent access of multiple apps. At the same time, it manages the shared resources with priority and has business independent characteristics. Shared resources include data, peripherals, etc. Base image is to package the file system and dynamic library that business app depends on into one image file. The image file can be imported into the local image library of IOT agent. IOT agent can run the image as an instance through docker run, which is called the running state of the image, that is, the container. The basic image preset resource monitoring service is started by default after the container is running. The resource usage information is refreshed according to a certain frequency. The event of exceeding the limit can be generated according to the set threshold value. According to the configuration policy, the abnormal app can be terminated. Edge agent daemons provide the ability to interact with IOT management platform. Each device is assigned a unique device code, client ID, user name and password. The p address, port and other information of IOT management platform are stored in the equipment in the form of configuration file, which can be repaired by liquid button.

The edge agent daemons have container management functions. After receiving the command of creating container, starting container, stopping reboiler, deleting container and calling container configuration information sent by IOT management platform, it will be converted into relevant command for docker operation, and the

Research on Security Detection and Response Technology …

1429

execution result of relevant command will be fed back to the edge agent daemons of IOT platform, which has application management function. After receiving the command of “install application” from IOT management platform, it will be converted into relevant command for docker operation, Resolve the application name, application version, application path in the app management and control service center, and then download the specified app from the app control service center to the specified container [4]. After receiving the start application and stop application command, call docker exec command to run and terminate the specified app. The application status information is obtained by communicating with the resource monitoring service in the container.

5 Conclusion A simple version of IOT management platform is issued to verify the function of edge IOT agent. IOT management platform adopts stand-alone operation mode, deploying proxy server in the same host and binding host | p address and port. It is agreed that the sending topic of IOT management platform is o t/device ID, and the sending subject of edge IOT agent is device ID/OT, and the subscription topic and sending topic of both parties are exchanged. The sending content is in JSON format, and the specific content is related to functions, including parameter setting and reading, container operation, application operation, event reporting, etc. The test process covers equipment registration and standby information call test, container creation, container operation, container stop, container deletion and installation, application run, application stop and application deletion. All functions of interaction between edge IOT agent and IOT management platform are verified through the test. Acknowledgements China Network Zhejiang Electric Power Co., Ltd. Science and Technology Project (Project No .5211 DS19003G) funding.

References 1. Zhang, Z.: Key supporting technologies of ubiquitous power internet of things. Power Eng. Technol. (06), (2019) 2. Yang, D., Fan, Y., Ma, D., Guo, Z.: Application research of energy storage cloud network platform based on ubiquitous power internet of things. Power Inf. Commun. Technol. (11), 25–31 (2009) 3. Huang W.: Nowow prediction model of air passenger based on support vector machine. Comput. Eng. 31(z1), 52–53 + 55 (2005) 4. Zhou, Z.: Machine Learning. Tsinghua University Press, Beijing (2016)

Design of Ceramic Art Design Assistant Teaching System Based on Cloud Computing Technology Qi Li and Yizhi Jiang

Abstract This paper studies the auxiliary teaching system of ceramic art design specialty based on cloud computing technology, and completes the design of teaching assistant system based on Google cloud platform. CAD and other computer-aided design schemes are widely used today. Hand drawn renderings still play a positive role in ceramic art design. This paper introduces the overall structure of the system, and elaborates the functions of the main modules of the teaching system, including autonomous learning, interactive communication, work display, learning resource management, etc. The actual test results show that the system can effectively meet the teaching needs of ceramic art design major, and can provide good auxiliary function for the students of the major, and has high practicability. Keywords Cloud computing · Hand drawn renderings · Ceramic art design · Course teaching · Auxiliary teaching system · Google cloud platform

1 Introduction With the development of ceramic art education specialty, teaching resources are difficult to meet the needs of expanding teaching scale. How to improve the utilization rate of teaching resources of ceramic art design specialty through resource sharing has become one of the key problems to be solved. Art specialty has obvious uniqueness. With the continuous refinement of professional categories, it is necessary to improve the utilization rate of teaching resources of ceramic art design specialty, It is difficult to meet the teaching needs of the present stage only by the traditional teaching mode [1]. In order to effectively deal with the challenges of education, teaching and personnel training of this major, it is urgent to establish and complete the auxiliary Q. Li · Y. Jiang (B) Xiangnan University, Chenzhou 423043, China e-mail: [email protected] Q. Li e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_184

1431

1432

Q. Li and Y. Jiang

system of art teaching. Making full use of computer network technology, designing and implementing the teaching auxiliary system to meet the needs of the professional development, breaking through the limitation of teaching time and space, has become one of the important issues in education.

2 The Characteristics and Significance of Ceramic Hand-Painted Renderings 2.1 The Characteristics of Ceramic Hand Drawn Renderings As the name implies, hand drawing is the main way. Students are required to master the basic sketch drawing skills, the main purpose of which is to cultivate students’ space innovation ability and basic art design ability. As a basic course, ceramic handpainted renderings include understanding design, basic design, deepening design and so on. Good renderings are not only the display of works, but also a way of communication between designers and customers [2]. Therefore, the development of teaching is of great significance. The ceramic hand-painted effect drawing is expressed by drawing the shape and structure analysis of the object, so that the image is presented in front of the designer, which is consistent with the purpose of most design methods, and needs to show the functionality and artistry of the picture. But different from other design methods, hand drawn renderings are more rational and pay attention to the accuracy of scale and size, so it has better effect in the expression of modeling and structure.

2.2 The Teaching Value of Ceramic Hand Drawing Renderings Ceramic hand-painted renderings should promote the teaching of design. At present, this method is mainly used in enterprise design and social design. It is not widely used in school education, but its practicability and closeness with social needs are inevitable for its application in enterprises. Based on experience and practice, the author analyzes the application value of hand-painted renderings in ceramic art design teaching as follows. First of all, design can improve students’ aesthetic ability. For the structure of ceramic design works more clearly, so as to improve their innovation ability and basic painting ability; secondly, through the ceramic products hand-painted effect drawing course, students’ comprehensive artistic quality can be improved, laying a foundation for them to become excellent designers in the future. In China, ceramic design has a long history. In modern society, how to inherit this excellent culture is

Design of Ceramic Art Design Assistant Teaching System …

1433

a problem that needs to be considered in teaching. The teaching method of handpainted effect drawing can deepen students’ understanding of art, stimulate their creative inspiration, and then play their own advantages in the industry. At the same time, it can promote the sustainable development of professional teaching. The development of ceramic hand-painted renderings course needs professional design. After necessary promotion, teachers need to master professional teaching methods to fundamentally solve the slow development characteristics. In the explanation, the traditional art and design history of ceramic products are explained. Combined with the basic design techniques, the contents are explained to improve the students’ design practice ability. The purpose of teaching is to ensure that students learn professional hand-painted renderings, so that students can fully master the ceramic art design course. And teachers should be good at cultivating students’ design creativity. The ultimate goal of ceramic art design teaching is to cultivate real designers, and innovation ability is one of the important criteria to judge whether designers are excellent or not [3]. In addition, in terms of teaching methods, ceramic art design can be combined with other related methods. It is not necessary to stick to the same method, but effective teaching methods should be given according to the needs of teaching and students. In short, the development of hand-painted renderings in school education is still in the development stage, which needs further adjustment and improvement.

3 Design of Assistant Teaching System The ceramic art design assistant teaching system designed in this paper is based on the advanced computing and expanding functions of cloud computing. It runs on the Google basic framework in the form of application. On the basis of integrating Google’s rich resources, it provides effective auxiliary role for art teaching. The overall architecture design scheme of the system is shown in Fig. 1. The system completes the overall architecture construction according to the Google basic framework. After the function design of the system is completed, it is uploaded to the Google cloud computing platform to realize the system access. In Fig. 1 System architecture design

1434

Q. Li and Y. Jiang

order to improve the scalability of the system and realize the development of the application program, the interface is provided when developing the system. The application program includes interactive display, autonomous learning, system management and other functions, On the basis of fully considering students’ habits and ways of using, Google App provides users with online search, translation, Google Calendar and other functions.

4 Principles of Cloud Computing n-ary calculation defines F as a calculation, x1 , x2 , · · · , xn , xn is the calculated n parameter variables, then F is called n-ary calculation, s is the result of calculation, which is marked as. S = F(x1 , x2 , · · · , xn )

(1)

If a1 , a2, , · · · , an an is n parameter variables x1 , x2 , · · · , xn . Then: s = F(a1 , a2 , · · · , an )

(2)

is a calculation of F and s is the result value. In the development process, Java or Python development language can be used to program the application (supporting the development environment), and the structure of the auxiliary teaching system is designed by using the structure framework; the overall layout of the system is realized by using the MC (model view control) mode. The advantage of this mode is that the business logic, data and interface display are separated when organizing the code, The data storage is different from the traditional data storage method. The data storage is based on BigTable, and the database is distributed structure, which has less restrictions on the attribute and mode of the data table. It can store unrecoverable data without designing or creating a schema, and the data storage area does not limit the attributes, and supports efficient data query and batch operation. In order to test the practicability and stability of the auxiliary teaching system for art and design specialty designed in this paper, 50 students majoring in art and design are selected and guided by teachers to use the system for after-school learning. The practical application results show that the integration of Google cloud platform can achieve stable and efficient functions with less code design, The system’s automatic update and prompt functions are welcomed by teachers and students. Online search, learning and download functions can help art design majors complete their learning plans anytime and anywhere, communicate with teachers in a timely manner and solve problems encountered in the learning process [4]. It can be seen from students’ questionnaires and final scores at the end of the semester, Compared with

Design of Ceramic Art Design Assistant Teaching System …

1435

the students of this major who use the system, the students’ enthusiasm and professional performance are significantly improved, which proves that the system has increased practical application value.

5 Conclusion In order to effectively deal with the contradiction between the expanding teaching scale and teaching resources of art and design major, this paper mainly studies the auxiliary teaching system of art and Design Specialty Based on cloud computing technology. The design of teaching auxiliary system based on Google cloud platform introduces the overall structure of the system, and elaborates the functions of the main modules of the teaching system, It includes independent learning, interactive communication, work display, learning resource management and system management, etc. the actual test results show that the system can effectively meet the teaching needs of art design major, and can provide good auxiliary role for the students of the major, with high practicability. Acknowledgements Xiangnan University’s specialty cultivation project “Product Design Specialty”, Xiao Fa [2018] No.154–11.

References 1. Zheng, Z.Z.: Application of cloud computing in network teaching platform. Ind. Technol. Forum (18), 211–212 (2013) 2. Zhu, Y.: Design and implementation of College English assisted teaching system based on campus network. Electron. Des. Eng. (11): 54–56 (2017) 3. Hu, H.: Research on the construction of a new mode of college English mobile information teaching based on cloud teaching client. Overseas English (17), 80–81 (2017) 4. Li, G.: Design and implementation of professional English assistant teaching system based on J2E campus network. Electron. Des. Eng. (22): 50–52 (2015)

Virtual Reality Chinese Teaching System Based on Deep Learning Algorithm Qian Li

Abstract One belt, one road initiative, China has been gradually strengthening its exchanges and cooperation with other countries along the way. Language communication is a prerequisite for the smooth progress of bilateral relations. Chinese has become an important language for international communication. Multi-objective genetic algorithm has the ability to deal with large problem space. In a step of evolution, multiple feasible solutions can be obtained, and there is no requirement for prior knowledge in the problem domain. It is insensitive to the convexity of function definition domain. This paper studies one belt, one road, and the basic theory and method of genetic algorithm and its multi-objective optimization problem. It studies the problems of language learning, teaching process, selection of teaching materials and teaching management. In order to improve the quality of Chinese teaching, we should consider and explore the reform of Chinese teaching from the aspects of standardizing student management. Keywords Genetic algorithm · One belt · one road · Chinese teaching reform · Function definition domain

1 Introduction China’s one belt, one road initiative, is being promoted. More and more overseas students choose to study Chinese and Chinese culture in China. China is already the largest destination in Asia. Multi-objective optimization problem (MOP) originates from the design, modeling and planning of many practical complex systems. These systems are in the fields of industrial manufacturing, urban transportation, capital budgeting, forest management, reservoir management, layout and beautification of new cities, energy allocation, etc. Almost every important decision-making problem in real life has to deal with several conflicting objectives while considering different Q. Li (B) Yunnan Chinese Language and Culture College, Yunnan Normal University, Yunnan 650092, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_185

1437

1438

Q. Li

constraints [1]. These problems all involve the optimization of multiple objectives. These objectives are not independent, they are often coupled and competing goals, and each goal has different physical meaning and dimensions. Their competition and complexity make it difficult to optimize them.

2 Basic Concepts of Multi-objective Optimization of Genetic Algorithm Because of the widespread existence and difficulty of solving multi-objective problem, the problem has always been attractive and challenging. Its earliest appearance can be traced back to 1772, when Franklin put forward the problem of how to coordinate the multi-objective contradiction. However, it is generally believed that the multi-objective optimization problem was first proposed by French economist V. Pareto in 1896. From the perspective of political economy, he summed up many objectives that are not easy to compare into multi-objective optimization problems. In 1927, the mathematician F. Hausdorf’s research on ordered space theory provided a theoretical tool for the development of multi-objective programming [2]. Since then, on Neumann and J. Morgenstern proposed contradictory multi criteria decision-making problems from the perspective of game theory in 1944; in 1951, T. C. Koopmans first proposed the concept of Pareto optimal solution from the analysis of production and distribution activities. In the same year, H. W. Kuhn and a W. T. Tucker proposed the concept of Pareto optimal solution of vector extremum problems from the perspective of mathematical programming; in 1953, Arron et al. Proposed the concept of efficient point on convex sets, and since then, multi-objective optimization has gradually attracted people’s attention; in 1963, lazadeh proposed multi-objective control problems from the perspective of control theory; during this period, Charles, Karlin, Klinger, Polak, Keeney, etc., Geoffrion and others have done some influential works. Leonid Hurwicz promoted H. W. Kuhn and a W.T.Tucker In 1968, zjohnsen put forward the Research Report of multi-objective optimization systematically, which was a turning point in the development of multi-objective optimization. The meaning of multi-objective optimization problem is introduced from the perspective of strict mathematical description. The mathematical definition of mop problem which is widely used and widely accepted in the field of multi-objective optimization is as follows: Generally, mop is composed of N decision variables, K objective functions and M constraints. The objective function, constraint conditions and decision variables are functional relations. The optimization objectives are as follows: y = f (x) = ( f 1 (x), f 2 (x), · · · , f k (x)) e(x) = (e1 (x), e2 (x), · · · , em (x)) ≤ 0

(1)

Virtual Reality Chinese Teaching System Based on Deep Learning …

1439

Among x = (x1 , x2 , · · · , xn ) ∈ X y = (y1 , y2 , · · · , yk ) ∈ Y

(2)

When there are multiple objective functions, the concept of “optimal solution” has a new change. Because in solving multi-objective problems, it is actually to find a set of equilibrium solutions, rather than a single global optimal solution. The concept of optimal solution, which is widely used, was proposed by Francis Ysidro Edgeworth in 1881. Then the famous French economist and sociologist, V. Alfredo Pareto, popularized this concept in 189. From the perspective of economics, he transformed the essentially incomparable multiple objectives into a single index for optimal solution. Here, the concept of multi-objective is involved. Pareto first proposed the concept of vector optimization, which is now widely used Pareto optimization.

3 Standard Genetic Algorithm Standard genetic algorithm (SGA) is a population type operation, which takes all individuals in the population as the object, and only uses the basic genetic operators: selection operator, crossover operator and mutation operator. Its genetic evolution process is simple and easy to understand. It is the basis of other genetic algorithms [3]. It not only provides a basic framework for other genetic algorithms, but also has certain application value. Selection, crossover and mutation are the three main operators of genetic algorithm. They constitute the genetic operation, which makes the genetic algorithm have the characteristics that other algorithms do not have. The following is the flow chart of SGA (Fig. 1).

4 Implementation of Coding The operation object of genetic algorithm is a coding string of solutions. The form of the solution is a combination of five features: word formation (14 kinds of order (9 kinds) word meaning combination (3 kinds) and the first and last semantic class (12 kinds of large categories). The encoding of solution requires completeness (that is, to show all points in the problem space) and non redundancy, i.e., the code and features are one-to-one correspondence). Binary features (non-existent or non-existent problems) are generally binary features In this way, the completeness and non redundancy of coding can be ensured, which is beneficial to crossover operation (i.e. substring exchange) and mutation operation (i.e. 0, 1 Interchange). However, since the problem studied is not binary, it is obviously inappropriate to use binary coding. For example, if binary coding is used, 3 bits are not enough, and 4 bits will produce many invalid

1440

Q. Li

Fig. 1 SGA flow chart

strings. The solution is to code the feature real number, discard the invalid code in the individuals of the initial population, and the operation object of crossover and mutation is the locus (feature) locus sequence (feature sequence), so as to ensure the coding and feature correspondence, In the process of exchange and mutation, it does not produce the integrity and redundancy of invalid codes.

5 Improving Teaching Methods and Strengthening Chinese Thinking Training The new teaching method focuses on language, breaks down one by one, integrates the concept of word based, and actively selects excellent traditional culture and good stories of the new era as the real corpus, so as to make students in China have a deeper understanding and understanding of Chinese society and culture. In teaching, we should not only teach students the basic knowledge of Chinese language, but also the content of culture. Timely update the teaching materials, optimize and adjust the content of teaching materials. One belt, one road, is selected to be the best Chinese textbook. Adjust the content of teaching materials, and increase the content of language knowledge and cultural background suitable for the new situation. Teachers can also adjust the order of teaching materials, do not need to strictly follow the sequence of teaching materials, according to their own understanding, some teaching units can be advanced or postponed, so as to achieve good teaching effect. Usually pay more attention to

Virtual Reality Chinese Teaching System Based on Deep Learning …

1441

the national website to get the latest information. Actively participate in extracurricular exchange activities, and communicate with teachers in other universities in the selection of teaching materials. Improve the teaching management mechanism. In the daily teaching management work, we should strengthen the construction of study style, strictly enforce the attendance system of students, combine the class attendance of teachers with the daily inspection of management teachers, timely input the attendance of students into the college’s student management system, strictly perform the leave procedures, and timely interview and educate the students who ask for more leave, and give written warning to the students who are absent from class more. Standardize the management of students [4]. We should make full use of the network media platform to broaden the communication channels between teachers and students, effectively improve the communication efficiency, push learning courseware and Chinese cultural knowledge through wechat group, and timely understand students’ dynamic situation, help students solve their learning and life difficulties, and achieve both strict management and humanistic care. Each activity and teaching inspection work carried out shall be scored quantitatively, and the learning dynamic of students shall be followed up in real time. Complete and detailed learning files shall be established for each student, and the learning dynamic of students shall be tracked and recorded. For students with abnormal learning status, they shall be interviewed at the beginning of each month to understand and analyze the reasons for the change and help them improve their learning status.

6 Conclusion After decades of development, Chinese teaching for international students in China has made some achievements, but we still need to be aware of the problems. One belt, one road initiative has been implemented in China, and China has closer cooperation with the countries along the border in politics, economy and education. This will also help improve the quality of education for overseas students. One belt, one road, one should be able to take advantage of the opportunities and meet the challenges. We should make full use of our advantages and improve the quality of teaching, and train more international friends who love China, know China, friends and China.

References 1. Zhang, H.: The one of “one belt, one road” background. The study of Chinese teaching strategies for Chinese students. J. Heihe Univ. 9(11), 91–92 (2018) 2. Sun, Z., Zhang, Z., Deng, Z.: Intelligent Control Theory and Technology. Tsinghua University Press, Beijing (1997)

1442

Q. Li

3. Xuan, G., Cheng, R.: Genetic Algorithm and Engineering Optimization, pp. 79–82. Tsinghua University Press, Beijing (2004) 4. Huanwen, T., Xuezhi, Q.: Practical optimization method, pp. 244–249. Dalian University of Technology Press, Dalian (2004)

Application of Cloud Computing in Ceramic Design Shuai Li

Abstract Considering the slow convergence speed of traditional large-scale data clustering analysis algorithm, a large-scale data clustering analysis algorithm based on cloud computing technology is proposed. Ceramic art is an important heritage of Chinese culture and an important part of product design. Ceramic art combines cultural heritage, shape design, pattern design, color design, structure and process manufacturing, material innovation design and other important attribute factors of product design, combines ceramic art with modern product design, and endows ceramic art with new design creativity from the perspective of new technology and new era, It can promote the development and innovation of product design specialty under the background of artificial intelligence. This paper explores the application of innovative ceramic products in the form of cloud design. Keyword Cloud computing · Ceramic art · Modern product design · Innovative methods

1 Clustering Analysis Algorithm for Large Scale Data in Cloud Computing Data clustering is to divide the data into several aggregation classes according to the inherent nature of the data. The elements of each aggregation class should have the same characteristics as far as possible, and the characteristics of different aggregation classes can be different.Big! The purpose of clustering analysis is to analyze whether the data belong to their own independent groups, so that the members of a group are similar to each other and different from the members of other groups. It can analyze the set of data objects, but different from classification analysis, the class of clustering analysis is unknown [1]. It divides data objects into multiple classes or clusters, and has high similarity between objects in the same cluster. S. Li (B) Product Design Teaching and Research Section, College of Arts & Information Engineering, Dalian Polytechnic University, Dalian 116034, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_186

1443

1444

S. Li

Fig. 1 Preserved data points

2 Cluster Center Regarding each data point as a data point, the variables in cloud space are defined: n, the input dimension, i.e., the number of each vector; Nd , the number of clusters; Nc ) the j-th cluster center vector; Nk , the calculation dimension of data point distance; Z p , the p-th vector data. Calculate the distance between data points, initialize the center vectors of n clusters randomly, and calculate the distance of all data points for each vector as follows:   Nd  dist (Z p , C j ) =  (Z p − C j )2 Nc Nk (1) k=1

Cj =

Nd 1  Zp n z ∈C p

(2)

j

The diagram of data points is shown in Fig. 1.

3 Ceramic Art Concept Ceramic products, as the utensils of ancient China’s daily necessities, are developing with people’s needs and creation. They reflect people’s thinking and summary of life, and are the design practice and creation of life. Ceramic art combines the characteristics of ceramic materials and art, and carries out practical creation process, including the use of ceramic slurry ratio, ceramic clay molding, ceramic works drying, ceramic works firing and other process procedures. It can be seen that ceramic art takes products as an expression medium of artistic emotion and social value. It can show

Application of Cloud Computing in Ceramic Design

1445

people’s pursuit of emotion, creation and transmission of technology, and social transformation of economy [2]. At the same time, ceramic art exists in a new cultural form, which is richer and more experimental than traditional ceramics. It is a concentrated reaction of people’s value creation and an artistic expression form that integrates people’s ideas and emotions in life. It can be said that since the development of ceramic art, ceramic tea sets and ceramic art decorations have occupied the main form of ceramic art products, and their craft and aesthetic value have high humanistic and economic value, which not only reflects the Ideological Expression of the unity of heaven and man, but also inherits the craftsman spirit of ceramic art, promoting the innovation and development of ceramic art design.

4 Innovative Application of Cloud Computing in Ceramic Art Design 4.1 Inheriting the Development of Ceramic Art China is the hometown of ceramics. The history of ceramics is a history of China’s development. In the long river of history, Chinese ceramics are famous for their long history, extensive and profound, rich resources and oriental charm. With the continuous progress of human civilization, ceramic art in the process of inheritance, also need to continue to progress and innovation, to form a unique artistic style to meet the growing spiritual and cultural needs of people. The integration of ceramic art and modern product design can promote modern ceramic art creation methods, methods, techniques and styles from the aspects of shape design, function setting, process structure, material selection, auxiliary pattern design and color design.

4.2 Provide New Design Ideas for Modern Product Design Ceramic art, as an art still under exploration in design practice, has more possibilities, which can provide new design ideas and design exploration for modern product design. Modern ceramic art creation methods, ways and forms are diverse, its creation can give birth to new products for modern product design, such as intelligent ceramic tea set, intelligent ceramic sound, intelligent ceramic temperature control pot, intelligent ceramic flowerpot and other products, which are the design practice products of ceramic materials and product design suitable for social development and the needs of the times [3]. Ceramic art can bring new design exploration to product design, and promote the emergence of new design products. In this way, we can not only make rational use of scientific design methods and technical means to provide support for the design innovation of ceramic art, but also bring new development and

1446

S. Li

market-oriented effect for product design and the development of modern ceramic art.

5 Innovative Application Method of Cloud Computing in Ceramic Art Design The era of artificial intelligence has come, and the product design promoted by technology has turned into easy-to-use and easy-to-use products to meet the spiritual needs of the public. Therefore, ceramic art products should not only ensure that they can inherit the connotation, spiritual quality and characteristic skills of the Chinese nation, but also reflect the development of the times and the integration of technology.

5.1 Individualized Design of Ceramic Art Products Ceramic art products are the continuous innovation on the basis of ceramic art and will continue to represent the traditional Chinese cultural characteristics. As the practical product of material and spiritual significance, ceramic art products have the multiple experience of product and artistic conception, product and cultural connotation in modeling, technology, material, color, environment and era values. Information technology, as an important factor of the development of the times, determines that ceramic art products are no longer just market media individuals who play handicraft and quantitative production. Mass production produces individual needs and individual satisfaction, as well as customized needs and high demand beyond individual expression [4]. The individualized design of ceramic art products is a way for designers to express the wishes of the audience. They pay more attention to the unique charm, personality and humanistic spirit of the products.

5.2 Humanized Design of Ceramic Art Products Ceramic art products, as a product of expressing the user’s emotion and character, are designed mainly by people. People oriented is to meet the concept of harmonious coexistence between human and nature in function, emotion, environment, economy and society of ceramic art products. Ceramic art design products should adhere to the unity of aesthetics and practicality, consider the relationship between environment and people, and consider the experience impact of materials on people and environment. The primary value of any product is to meet the functional needs of users. With the progress of science and technology and the change of society, the pain points of

Application of Cloud Computing in Ceramic Design

1447

people’s needs have changed. Therefore, the emotional and caring functions of products have become increasingly prominent. Ceramic art products involve ceramic tea sets, ceramic sculpture, ceramic wall hanging, ceramic clothing accessories, ceramic lighting and other types of products. Therefore, the design innovation of ceramic art products should be more reflected in the emotional expression, such as: pleasure, interesting, inspiring, stimulating creation, emotional satisfaction and other psychological aesthetic needs. These needs should be combined with the professional knowledge of ergonomics, psychology, visual information design, etc. in the field of product design, and based on the principle of applicability, generality and ease of use, it should bring users pleasant use experience and emotional release from the sensory level of vision, hearing, smell and touch, so as to truly achieve humanized emotional care design.

5.3 Localization Design of Ceramic Art Products As an excellent cultural treasure in China, ceramic art has always contained Chinese traditional culture to some extent. Based on this, the integration and innovation of ceramic art and local intangible cultural heritage is not only the inheritance of ceramic art in cultural implication, but also can effectively improve the value of intangible cultural heritage and local cultural pride.

Reference 1. Menshuang.: Ceramic art and its application in home decoration. Art Technol., 28(10), 128 (2015) 2. Chen, Y.: Research on detail design in product design. Art Technol. 30(11), 271 (2017) 3. Yi, Z., Wei, Y.: On the inheritance and development of Chinese ceramic art. Jiangsu Ceram. 01 (2019) 4. W, Li.: Analysis of the integration of ceramic art and modern product design. Art Educ. 11, 167–168 (2019)

Design of English Teaching Post Competency Evaluation System Based on K-means Clustering Algorithm Wei Li

Abstract This paper designs a competency evaluation system for English teaching posts in higher vocational colleges. On the basis of the established constraint parameter index analysis model, the ability of big data information model is evaluated and the feature information of ability constraint is extracted. According to this, the teaching ability of English teaching can be evaluated by integrating the average of teaching resources and teaching ability. The experimental results show that the designed evaluation algorithm significantly improves the ability and accuracy of information fusion analysis in the process of English education post competency evaluation, and has high practical application value. Keywords English teaching · Assessment of educational post competence · Information fusion

1 Introduction With the development and improvement of information processing and big data analysis technology, its application to teaching evaluation and resource information scheduling has high practical application value, which helps to improve the ability of quantitative management and planning in the teaching process. Because there are many advantages affecting English teaching post competency evaluation process, it is necessary to quantitatively test and analyze English teaching post competency, On this basis, we can complete the construction of the parameter model of the constraint competency, and then obtain the big data analysis model. By using the information fusion and clustering processing method to complete the construction of the objective function and statistical analysis model, it can improve the scientificity and practicability of the evaluation process, and improve the quantitative prediction ability. W. Li (B) Tianjin Light Industry Vocational Technical College, TianJin 300350, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_187

1449

1450

W. Li

2 Data Analysis Model of English Teaching Post Competency Evaluation 2.1 Data Analysis of Constraint Parameters The accuracy of the data classification of the evaluation algorithm is low for the traditional English education post competency assessment. Therefore, this paper mainly designs the competency assessment system of English teaching posts in higher vocational colleges. To evaluate the competence of English education posts accurately, we need to obtain the constraint parameters first, that is, to complete the construction of information sampling model of post competence constraint parameters. On the basis of using information fusion method, combined with time series analysis method, the statistical analysis of English education post competence is completed [1]. The index parameters of the competence of English teaching posts in yodong are essentially a set of nonlinear time series. This paper presents the distribution model of the parameter index in concrete form through the construction of high-dimensional distribution space of the post competence of English education. Combined with the current research results, the main index parameters restricting the competence of English teaching posts are analyzed, The paper includes teaching level, teaching management level and professional level. On this basis, the differential equation is constructed, namely, the information flow model of the Jordan parameter. The multivariate value function of English teaching post competency evaluation is expressed by h(), the evaluation error measurement function is expressed by ωn , and the specific expression is as follows (1). xn = x(t0 + t) = h[z(t0 + nt)] + ωn

(1)

The calculation of the solution vector of English education post competency evaluation is completed in the high-dimensional feature distribution space by correlation fusion method, and then the feature training subset of post competency evaluation is obtained. The teaching level and the distribution of teaching resources meet the continuous functional condition, that is, the post ability assessment has convergence solution, and the constraint conditions are as follows (2). c1x (τ ) = E{x(n)} = 0 c1x (τ ) = E{x(n)x(n + x)} = r (τ ) ckx (τ1 , τ2 , . . . , τk−1 )

(2)

On the basis of the information flow model of the evaluation of English education post competency, the construction of big data distribution model can lay a scientific and accurate data input basis for the evaluation.

Design of English Teaching Post Competency Evaluation …

1451

2.2 Quantitative Recursive Analysis of Evaluation The grey model is used to evaluate the post competency of English education quantiN represents the historical data of the competency tatively and recursively. The {xi }i=1 distribution of English education post. The probability density functional (initial value of disturbance characteristic is certain) is obtained to predict the competency of English education post. The specific expression is shown in Formula (3). u c (t) = K xc (t)

(3)

The continuous function of the statistical model is u : I × I R d → I R, in the high-dimensional feature distribution space. After iteration, the gray-scale sequence of post competency evaluation meets N (k) < L. through the use of big data information fusion method, the inter domain classification objective function of evaluation distribution big data information flow is constructed? The specific expression of big data clustering objective function is shown in Formula (4). Jm (U, V ) =

n  c 

m μik (dik )2

(4)

k=1 i=1

3 Simulation Experiment and Test Results In order to test the accuracy of English teaching post competency assessment and related data analysis performance, this paper uses Matlad simulation analysis method to test. The data sampling of English teaching post competency assessment is realized by using statistical analysis method [2]. The decision threshold of competency assessment is Dx = 2, and the correlation parameter of teaching resources and ability distribution is, The time domain waveform of big data distribution is obtained by data reconstruction of constraint parameters of English teaching post competency assessment, as shown in Fig. 1. The test results show that the accuracy of this method is relatively high, and the utilization rate of teaching resources is improved.

4 System Function Design The system mainly completes the online training and examination of information professional post competency evaluation [3]. The main function modules include examination module, video learning module, question bank module, learning library module, my examination room module and management module [4].

1452

W. Li

Fig. 1 Big data time domain distribution time domain waveform

1.

2.

3.

4. 5.

6.

Test module. The test module is mainly used for online testing of teachers, including the following module, stage test, simulation test, real test, exercise evaluation module, wrong question repetition module, wrong question ranking module, etc. The system has the functions of real-time storage, fault-tolerant handover and real-time monitoring. In case of power failure, machine failure and other special circumstances, the system can continue to answer questions again on the original basis. Administrators can monitor the examination room and answer status in real time, and implement the rights of strong withdrawal, cancellation, time increase, recovery and deletion. Users can detect, switch and jump the test paper at any time. Video learning module. The video learning module is mainly used for video teaching. The module summarizes the teaching videos associated with the examination questions, and the required teaching videos can be queried through the retrieval function. The question bank module. The question base module can classify all the questions in the system, and it has the function of searching questions. The test model can be divided into single-choice question, multiple choice question, judgment question, fill in empty question, simple answer question and combination question. Teachers can add custom type based on the above type according to the actual business needs, and can add, modify, view and delete the type of questions. Learning library module. Learning library module design reference Baidu library function, easy to query relevant learning materials at any time. My examination room module. My examination room module has designed a timeliness simulation examination room, the manager uploads the question for the teacher to carry on the examination, the teacher must carry on the examination in the limited time, surpasses the limited time, the examination is invalid. Management module. The management module mainly manages the basic operations and functions of module management, role management, system settings, department management, user management, online user management and version upgrade instructions.

Design of English Teaching Post Competency Evaluation …

1453

5 Conclusion For the traditional assessment of English education post competency, the accuracy of data information classification of the evaluation algorithm is low. Therefore, this paper mainly designs the competency assessment system of English education post in vocational colleges, and proposes a method based on fuzzy k-means clustering algorithm of dasou, and based on the establishment of the model of constraint parameter index analysis, The ability of big data information model is evaluated (using quantitative recursive analysis method), the entropy feature of ability constrained feature information is extracted, K-means clustering algorithm is integrated, and the index parameters of competency of English education post are clustered and integrated. Based on this, the planning of teaching resource allocation is completed, so as to realize the scientific assessment of competence of English education post. The results show that the evaluation algorithm designed in this paper improves the information fusion analysis ability and accuracy in the process of English education competency evaluation, and has a high practical value.

References 1. Li, B., Wang, J., Huang, W.: A new clustering algorithm in big data environment 12, 247–250 (2015) 2. Dang, W., Zhang, X., Suo, Y., et al.: Exploration of middle school English teaching design based on 4cid model. Teach. Manage. 6, 111–114 (2017) 3. Hang, Y., Hou, S., So, Z., et al.: Evaluation of spatial information technology practice teaching based on fuzzy comprehensive evaluation model. J. Hebei Agric. Univ. Agric. Forest. Educ. Edn.) 3, 90–94 (2016) 4. Hu, H., Cheng, J.: Big data hybrid computing model based on spark. Comput. Syst. Appl. 4, 214–218 (2015)

Design of Electrical Automation Engineering Control System Xingyuan Li

Abstract The emergence of electrical automation engineering control system has made great changes in the relevant industrial fields. It not only improves the speed and efficiency of equipment operation, but also makes the probability of safety accidents decrease gradually. It leads the industrial field to the direction of modernization and science and technology, and promotes the international development of China’s industry. Therefore, this paper analyzes the status quo, functions and existing problems of electrical automatic engineering control system, and puts forward corresponding suggestions. Keywords Electrical automation · Engineering control system · Status quo · Development trend · Overview of construction system reliability of construction project

1 Introduction The national strategy of sustainable development has been applied in all walks of life, and so is the electrical control system. Through the deepening and implementation of the concept of sustainable development, electric power workers can realize the automation and scientization of related technologies, and minimize the pollution and damage to the environment in the process of power generation and power transportation, so as to achieve the goal of harmonious coexistence between human and nature.

X. Li (B) Yunnan University of Business Management, Anning City, Yunnan Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_188

1455

1456

X. Li

2 Current Situation of Electrical Automation Engineering Control System In China’s industrial field, the development status of electrical automation engineering control system is mainly described from three aspects. First, the development level of China’s overall electrical automation engineering control system is lower than that of other developed countries in Europe and America. Since the development of information technology and automation technology in China started late, and developed countries began to use information technology after the Second World War, the development period and course of China’s electrical automation control system is relatively short, so the overall development level is far lower than that of European and American countries. Second, the lack of professional and technical personnel in the electrical automation engineering control system, and the lack of professional and technical personnel causes the research of enterprise technology.

3 Function of Electrical Automation Engineering Control System and Its Bad Problems 3.1 Function The electrical automation control system integrates the knowledge of multiple disciplines, so that the fields and disciplines such as electricity, system science, informatics, control science and transportation are integrated, and the modern information technology and communication technology are fully used to realize the automation [1]. From its meaning, we can see that the function of electrical automation engineering control system is mainly reflected in the aspects of enterprise management and picture monitoring. In the process of information retrieval, the information can be automatically integrated and the results can be analyzed through the electrical automation engineering control system. In addition, in the process of making financial statements and financial budget, the results can be summarized by retrieving relevant information, which greatly improves the efficiency of data sorting.

3.2 Bad Problems Electrical automation engineering control system problems, mainly in the field of screen monitoring. Through the investigation and data analysis, most enterprises reflect that there are problems in the operation and operation mechanism of the equipment in the process of screen monitoring. Therefore, the picture monitoring will be stuck, blurred video and information interruption. In addition, the long distance

Design of Electrical Automation Engineering Control System

1457

between the host and the extension leads to the instability of file transmission and information error. Later in the process of equipment maintenance, due to the lack of professionals and the complexity of technology, the system is prone to collapse and so on, which are often bad problems in the control system in the process of screen monitoring.

4 Suggestions on Strengthening the Construction of Control System of Electrified Automation Project 4.1 Innovative Electrical Automation Products Come Out Electrical automation engineering control system through innovation and scientific research forms, electrical automation products continue to enter the domestic and international market, and further expand the coverage and application field of electrical automation engineering control system [2]. The development trend of domestic and foreign markets is to take innovation as the guide, pay attention to the improvement of its quality, make its products meet the requirements of green economy and low-carbon economy, and pay attention to the cultivation and training of professionals.

4.2 Integration of Electrical Automation Control System and Artificial Intelligence Technology Electrical automation engineering control system is developed on the basis of modern scientific and technological information, and is the product of the Internet era. Therefore, in the process of updating and upgrading the electrical automation technology, we should pay attention to the combination with advanced artificial intelligence technology, and make full use of the advantages and advantages of the Internet and artificial intelligence technology, so that the electrical automation can play the greatest effect [3, 4]. Through the use of artificial intelligence technology, the automation technology for the control unit information processing has been further sublimated.

1458

X. Li

5 Development Trend of Electrical Automation Engineering Control System 5.1 Distributed Control Method is More Widely Used in Electrical Automation System The distributed control method means that in the electrical automation control system, the production process is monitored by separate method, and the general control, monitoring and production are separately supervised. Professional staff through the training of professional knowledge of enterprise information system control belongs to the general control, and monitoring refers to the operation of various departments of machinery and the status of system software supervision. Distributed control method through the separation of the three processes control, at the same time set up staff to monitor different fields, pay attention to the information exchange between staff, so that problems can be timely communicated and transmitted. (1)Design of PID function block in distributed control system PID control calculation note. In PID control, P is proportional part, I is integral part and D is differential part. The expression is as follows: 1 U (t) = K c ∗ [e(t) + T

1 e(t)dt + Td

de(t) ] + U0 dt

(1)

0

The working mode of PID controller is to calculate the control quantity once every other control period T and output it to the actuator. The control period is also called sampling period. When the sampling time t = k ∗ t, the calculation is approximately made by the following difference equation 

k 

Ts ∗ e( j)

(2)

e(k) − e(k − 1) de ≈ dt Ts

(3)

edt ≈

j=0

Then the mathematical formula of formula (1) is Ts U (t) = K c ∗ {e(t) + Ti

1 e( j) +

Td [e(k) − e(k − 1)]} + U0 Ts

(4)

0

According to the integral separation PID control algorithm, the program block diagram is obtained, as shown in Fig. 1

Design of Electrical Automation Engineering Control System

1459

Fig. 1 Program block diagram of integral separation algorithm\

The basic idea of integral separation control is to cancel the integral action when the deviation between the controlled value and the set value is large, so as to avoid reducing the stability of the system and increasing the overshoot due to the integral effect; when the controlled value is close to the given value, the integral control is introduced to eliminate the static error and improve the control accuracy.

6 Conclusion Electrical automation engineering control system is one of the directions of future economic development. Electrical automation control system has been applied to the fields of electrical equipment, automobile production and medical treatment, which is related to all aspects of people’s production and life, and its effect and influence are great. Through the research and further innovation of high and new technology, the automation technology can reach a higher level. The emergence of electrical automation engineering control system is the crystallization of the wisdom of elites all over the world. The barrier free trend of global information exchange is also one of the important reasons to promote the emergence of electrical automation engineering system. Therefore, to solve the problems of electrical automation engineering control system and promote its development to a higher level is the task that the relevant staff should undertake.

References 1. Shi, X.: Status quo and development trend of electrical automation engineering control system. Indus. Technol. Forum 16(22), 58–59 (2017) 2. Wang, Y., Liang, C.: Analysis of the current situation and development trend of electrical automation engineering control system. Comput. Knowl. Technol. 31, 249–250 (2017)

1460

X. Li

3. Yan, H.: Design principle of electrical control function incorporated into distributed control system of power plant. Jiangsu Electr. Eng. 21 (2002) 4. Liu, J.: Matlab Simulation of Advanced PID Control. Beijing Electronic Industry Press (2004)

Fault Detection Method of Electrical Automation Equipment Based on Neural Network Mengdan Lin

Abstract In order to identify the fault state of automatic electrical equipment accurately, this paper introduces the fault diagnosis method of RBE neural network. An improved algorithm is proposed to solve the problem that it can’t learn new state types. The improved algorithm can not only identify the known states accurately, but also find and learn the state types not included in the training sample set, so it has the recognition function of new state types. Keywords Electrical equipment · Neural network · State recognition · Fault diagnosis · Credibility

1 Introduction Equipment failure in power system will not only affect and perplex the normal operation of power system, cause huge losses, but also bring a series of potential safety and economic problems, and even lead to the paralysis of the whole system. Therefore, early prediction, monitoring and diagnosis of equipment, especially the key equipment failure, is an important link to ensure the safe operation of the system, and it is also a problem that people pay attention to and study in recent years. As one of the automatic electrical equipment, high voltage circuit breaker is the link between power generation and power consumption, and its importance is selfevident. The in-depth research on the state detection and fault diagnosis technology of high-voltage circuit breaker is conducive to the realization of scientific condition based maintenance, so as to maximize the reliability of power system operation. According to the statistics at home and abroad, mechanical fault accounts for the majority of circuit breaker faults. Therefore, the focus of fault diagnosis is to detect the mechanical characteristics of high-voltage circuit breakers. In recent decades, scholars from all over the world have carried out various researches on the detection M. Lin (B) Xuzhou College of Industrial and Technology, Xuzhou 221140, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_189

1461

1462

M. Lin

method of mechanical characteristics of circuit breakers, in addition to the research method of analyzing vibration signals to identify the status of circuit breakers.

2 Control and Detection Ann is also useful in Power Grid Condition Monitoring and diagnosis. Based on the above characteristics of circuit breaker, combined with the key and difficult points in the state detection of circuit breaker and the application of neural network in power system, it has been widely concerned and the feasibility of fault diagnosis in power system, In this paper, the key parameters of circuit breaker state detection (such as the detection of moving contact travel spindle angle) and the simulation analysis of mechanism dynamic characteristics are used as the theoretical basis for state detection. The useful information is extracted from the detected state parameters, and the working state of the circuit breaker is judged from various state characteristics. The state recognition method based on artificial neural network is studied. On the basis of summarizing the state recognition algorithm based on neural network, an improved algorithm is proposed to solve the defect that it can’t learn new state types [1]. The algorithm is applied to the state recognition of high voltage circuit breaker. The example shows that the improved algorithm can not only accurately identify the known state, but also find and learn the state types not included in the training sample set, so it has the recognition function of new state types.

3 Principle of State Recognition Based on RBF Network 3.1 Introduction to RBF Network At present, artificial neural network model BP model is widely used in power system. However, BP network is a kind of global approximation neural network, that is, for any point in the input space, the change of any one or more connection weights will affect the output of the whole network. Because of this characteristic of BP network, every training sample will change all the continuous weights and the learning convergence speed is extremely slow. When a new sample which does not belong to the known class is input into the RBF network, all the decision outputs will approach to 0, so the new sample can be rejected effectively.

Fault Detection Method of Electrical Automation Equipment …

1463

3.2 State Recognition Based on RBF Network The basic idea of applying NN to state recognition is to use the self-learning function of NN model to realize the mapping relationship between state feature and state code when the state of equipment is known (represented by state characteristic quantity) and corresponding state type (represented by state code) After that, the current state characteristic quantity of the equipment can be input into the network, and the output of the network can be compared with the existing state code, so as to determine the equipment state type corresponding to the state characteristic quantity. The above process involves the processing of the input vector, the quantization and coding of the state type, etc. The input vector refers to the state characteristic quantity of the input network. Since the characteristic quantity used to represent the state of the equipment varies greatly, this paper normalizes the input vector. If the normalized input vector is represented by B  = {Ai } then: B  = {ai j } = max {ai j } i=1,m

(1)

Since the state type is usually described by text, in order to process it with NN, it is necessary to quantify and code the state type, that is, if Si is the i-th state, then Si = {bi j } j = 1, 2, 3 . . . , p bi j =

0 j = p − i + 1 1j ≡ p − i − 1

(2)

(3)

4 State Recognition of High Voltage Circuit Breaker Based on (RBD) Neural Network 4.1 State Recognition Algorithm with Learning New State Types Analyzing the state recognition based on neural network mentioned in the previous section, we can find that it has certain limitations: the network can only output the state code corresponding to the existing state types in the training samples, that is, it can only identify the known states. In practical application, it is difficult to list all possible States of the equipment in the network design stage, so the training samples are always limited [2]. The corresponding number of states may be only a small part of the total number of all States of the equipment, so when identifying the state types that are not included in the training samples, the correct results will not be obtained.

1464 Table 1 Fault causes and corresponding fault codes

M. Lin 1

The system is normal

2

Fault of excessive friction force of spindle

3

Failure of shaft pin falling off at the bottom of insulating pull rod

4

The axle pin of intermediate phase crank arm falls of

5

Failure of outer crank shaft pin falling off

To solve the above problems, this paper improves the state recognition algorithm based on the positive BF network described in the previous section, introduces the concept of credibility, and gives the credibility of the identification results, The new state is identified by appropriate decision rules, and then it is input into the network as a new training sample. The weight and threshold value of the original network are modified. The modified network can accurately identify the new state category, so that the improved state recognition algorithm has the function of identifying new state types. In the state recognition of high voltage circuit breaker, there are many state characteristic variables which can be used as input vector of NN. Fault diagnosis is to extract the feature vector of equipment state, In the state recognition of high voltage circuit breaker, there are many state characteristic variables which can be used as input vector of NN. Fault diagnosis is to extract the feature vector of equipment state and classify it in the fault eigenvector space, In this paper, four kinds of typical faults are selected from the mechanical characteristics of operating mechanism in the physical process of opening, as shown in Table 1.

4.2 Application of Improved State Recognition Algorithm in Circuit Breaker State Identification From the simulation results of various faults of the operating mechanism, it can be seen that the influence of different fault types on the mechanical characteristics is not reversed, which is reflected on the main shaft, and its angle curve has obvious different shape. In order to quantitatively explain the difference of the spindle angle curve corresponding to the non fault type, so as to facilitate the state identification of the circuit breaker, It is necessary to parameterize the spindle angle curve. Combined with the physical process of circuit breaker opening, the spindle angle curve under various fault conditions is analyzed [3, 4]. The curve is composed of three parts. At the beginning of the curve, it is composed of a line segment that approximates a straight line; at the end of the curve, it is also composed of a line segment that approximates a straight line; and the middle part of the curve can be regarded as an arc with different radius of curvature (the straight line can be regarded as an arc with infinite radius of curvature), which are respectively described by slopes K and K and radius of curvature R, The geometric characteristic parameters k, K and R of the

Fault Detection Method of Electrical Automation Equipment …

1465

main shaft angle curve of the circuit breaker operating mechanism are obtained by simulation, and the eigenvectors are used as the learning samples, which are used as the input vectors for normalization processing, and the fault state types are quantized and coded. Then the RBF network is trained with these characteristics as the learning samples, and finally the RBF network has the ability to identify these fault types.

5 Conclusion In this paper, artificial NN is introduced into the field of state recognition of high voltage circuit breaker. Aiming at the limitation of state identification algorithm of RBF network, the concept of credibility is introduced, and an improved algorithm is proposed. The algorithm is applied to the recognition of the state characteristic quantity obtained from the simulation. The recognition results show that the algorithm can not only accurately identify the known multiple states, but also determine and learn new state types. Thus, it has the recognition function of new state types, which is the same as other artificial intelligence technologies, The application of artificial neural network in equipment fault diagnosis and monitoring also has limitations, such as over fitting of over training samples and low transparency. Especially for complex on-line fault diagnosis, it is required to make timely and accurate judgment and put forward corresponding solutions. It is often necessary to explore new intelligent algorithm and network structure, and constantly improve the algorithm of neural network, so as to monitor and diagnose equipment fault more effectively.

Reference 1. Xu, L.L., Zhang, Y.: Design and implementation of remote sensing monitoring system for resource and environment of lidar technology. Laser J. 41(08), 54–58 (2020) 2. Hu Bin, B.: Design and application of automatic test system for optical transmission equipment. Decision Exploration (middle) 08, 52 (2020) 3. Li, Z., Hehuimin, L., Xuehaiyun, S.Y., Yijuan, Caoli, Q.: Package design and implementation of 4 × 25 gbit/s photoelectric transceiver module. Opt. Commun. Res. 04, 37–42 (2020) 4. Zhang, J.: Design and implementation of multi-channel automatic test system for optical communication terminal products. Shandong University (2020)

Traffic Signal Machine Learning Controller Based on Genetic Algorithm Hui Liu

Abstract Through the fuzzy classification of the number of arriving vehicles, the traffic signal control scheme is implemented in the form of different rule sets. According to the actual control effect, genetic algorithm is used to improve the rule set, and a new control method with machine learning ability for single intersection traffic signal is formed. The control effect of this method is compared with timing control and induction control through simulation experiment, The simulation results show that the control effect of this method is better than the traditional control method. Keywords Machine learning · Traffic signal control · Genetic algorithm · Traffic simulation

1 Introduction Road traffic flow has strong randomness. The timing control mode controls the signal according to the preset timing scheme, without considering the real-time vehicle information, so it can not adapt to the changes of traffic flow; the induction control mode only considers the current phase of the vehicle arrival information, which has great limitations. In order to improve the control effect, the fuzzy control method is used to control the single intersection, and the simulation results show that the method is effective, but this method has no learning ability. The agent with Q-value learning ability is used to control a single intersection. The simulation experiment shows that the method is better than the timing control. Ellal “calculates the numbers in the fuzzy control of traffic intersections through neural network, which improves the effect of fuzzy control. In the single intersection intelligent control method proposed by Dusan et al., the prediction value of vehicle arrival number in the following period is taken as the input, the optimized signal timing scheme is calculated by using genetic H. Liu (B) Shandong Women’s University, No. 2399 University Road, Changqing District, Jinan, Shandong Province, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_190

1467

1468

H. Liu

algorithm, and then the scheme is modified according to the fuzzy control rules, thus the final signal control scheme is obtained.

2 System Design The basic green time and the maximum green time are set for each signal phase. When the green time is greater than the basic green time and less than the maximum green time, the green light time of the current phase can be judged at any time according to the number of vehicles within the range of the vehicle detector in the current phase and the number of vehicles in the vehicle detector of the next phase. According to the number of vehiclesThe number of vehicles in the range of vehicle detector can be divided into 10 levels by fuzzy classification: none, little, little, little, less, medium, more, more, many, and extremely many [1]. LessSee Fig. 1 for the method of membership function. Nmax in Fig. 1 represents the maximum number of vehicles in the direction of the vehicle detector controlled by a certain phase of the traffic signal, Nmax = (distance from vehicle detector to parking line × number of lanes × number of directions)/(parking space + minimum vehicle length). The rule set (R) of control signal change is divided into invariant rule set (R) and variable rule set (R). The former determines whether to extend the green light time of the current phase according to the traffic law and common sense; the latter can improve the rules in the actual control process according to the control effect, and modify the decision variable D value of whether to extend the green light time of the current phase under the specific vehicle arrival state. R = {Sc , Sn , D}

(1)

where: Sc is the arrival state of vehicles in the current phase, which can be divided into 10 types, such as none, very few, etc.; Sn is the green time of ending the current phase when the lower value is 0. The arrival status of vehicles in phase can be divided

Fig. 1 Schematic diagram of membership function value of vehicle number classification

Traffic Signal Machine Learning Controller Based …

1469

into 10 types, such as none, very few, etc.; D is the decision variable of signal control, when the value is 1, it means to extend the green time of the current phase, and the extension time is 1 s; the value is taken. In order to improve the signal control effect in the actual control process, the variable rule set is combined with genetic algorithm to improve the variable rule set according to the historical control effect. According to the number of rules in the variable rule set, the size of the scheme space of the variable rule set is 221 = 2×210 ×210 = 2×10242 ≈ 2×26 . Genetic algorithm is suitable for the optimization calculation in the huge scheme space.

3 Genetic Algorithm Different from the application of traditional genetic algorithm, genetic algorithm is regarded as a part of signal control decision-making, which is always accompanied by the signal control process, and carries out real-time signal control evolution, rather than just calculating the optimal control scheme [2]. This real-time signal control evolution process can be expressed as: 1.

2.

3.

N initial rule sets (n is an integer between 15 and 25) are generated, in which the D value of variable rule set is generated randomly, and each rule set is taken as an independent signal control decision scheme, thus forming an initial signal control scheme group containing N schemes (each signal control scheme can be regarded as an individual in the group). The signal control of t time (t is more than 5 min) is carried out for each scheme, and the total number of vehicles arriving and the total waiting time of vehicles in each scheme are recorded. After the signal control of T-Time is carried out in sequence for n schemes, n schemes are sorted from small to large according to the size of average parking waiting time per vehicle (average parking waiting time = total waiting time / total number of vehicles arriving). The fitness of each scheme is f, the genetic probability is Hk (k = 1, 2, . . . , n), formula. I in Eq. (4) is the sequence number of scheme K sorted from small to large according to the average waiting time per vehicle. According to the genetic probability of each scheme and roulette roulette, 2 m (M takes the integer between N/3 and N/1.5) from the initial population are selected as the population. On the premise of avoiding the same scheme pairing, the random method is adopted.A pair of 2 m schemes in the population was paired to produce m-pair parent scheme. Each pair of parent schemes generates a sub scheme, and the D value of the variable rule set in the sub scheme is inherited from the two parent schemes in a random way with the same probability (0.5). After all the M sub schemes are generated, the D value of the variable rule set in these schemes is mutated with the mutation rate µ (µ takes the decimal between 0.001 and 0.1). Finally, the M schemes with the worst control index in the original group are replaced by the newly generated m schemes (i.e. the reciprocal m schemes ranked from

1470

H. Liu

small to large according to the average waiting time per vehicle) to form a new generation of N schemes. Fk = n − i + 1 Hk = 4.

2(n − i + 1) n(n + 1)

(2) (3)

Repeat the process in step (2).

4 Simulation Comparison In order to test the control effect of the above traffic signal control method, it is necessary to compile simulation software to compare the method with the traditional control mode. Using visual C++ 6.0 high-level language, the computer simulation software is developed to simulate the traffic control process of two-way four lane cross intersection, and the vehicles in it are programmed with open GL.The twodimensional dynamic display module can monitor the vehicle running condition at the intersection in real time [3, 4]. The new control method is compared with timing control and induction control, and the total waiting time of vehicles is compared in the same arrival sequence, the same number of vehicles and the same time. The three signal control methods adopt two phases, in which the timing control adopts the theoretical optimal period according to the vehicle arrival density; the induction control adopts the same minimum green time and maximum green time as the new control method, and the unit extended green time is 3 s. In the new control method, the minimum green time of two phases is 7 s, the maximum green time is 30 s, and the distance between vehicle detector and parking line is 50 m. Because the length of the vehicle is 5 m and the distance between vehicles is 2 m in the simulation software of traffic control, it can be concluded that the maximum capacity of vehicles in one phase vehicle detection area is N1 = 2, N2 = 5, N3 = 8, N4 = 11. According to the number of vehicles fuzzy classification of vehicle arrival state membership function value.

5 Conclusion Under different traffic density, the new control method is stable through learning in the actual control (the 81st generation group scheme) compared with the timing control, the waiting time is reduced by 23.3–33.5%, the average reduction is 26.95%, and the control effect is significantly improved; compared with the induction control, the waiting time is reduced by 7.3–24.3%, with an average reduction of 16.06%, and the control effect is significantly improved. The control rule set of the new control

Traffic Signal Machine Learning Controller Based …

1471

method is composed of invariant rule set and variable rule set. The invariant rule set specifies the signal control decision which can reduce the waiting time in 79% of the cases that will be encountered in signal control. The control effect of the initial scheme of the control method can be significantly improved than that of the timing control and induction control. The improvement of the variable rule set of the new control method through genetic algorithm is the optimization of the signal control decision scheme which can reduce the waiting time in 21% of the signal control cases, and the improvement degree may not be as good as the initial control method Compared with the timing control and induction control, the scheme has a great improvement.

References 1. Xu, L.L., Zhang, Y.: Design and implementation of remote sensing monitoring system for resource and environment of lidar technology. Laser J. 41(08), 54–58 (2020) 2. Liu, C., Zhang, H., Peng, Q.Q., Meng, F.: Design of embedded high-speed optical fiber video image transmission module. Electron. Dev. 43(04), 882–887 (2020) 3. Hu Bin, B.: Design and application of automatic test system for optical transmission equipment. Decis. Explorat. (middle) 08, 52 (2020) 4. Hu, H., Bo, W.: Design of 10 gb/s sfp+ optical module based on CWDM. Commun. Technol. 53(08), 2064–2069 (2020)

Design and Implementation of Cloud Computing Platform Monitoring System Based on Nagios Jia Liu, Chengzhang Qu, and Tianhong Zhou

Abstract With the rise of cloud computing technology, cloud environment has gradually become the mainstream way of application system deployment. Cloud computing provides fast allocation, dynamic scheduling and other capabilities to the application system provides a rapid development of basic capabilities. In order to continuously understand the operation of the cloud computing platform itself, it is necessary to build a set of monitoring system suitable for the cloud computing environment. In this study, the monitoring system under the cloud computing environment was studied from the open source monitoring technology, and a cloud computing platform monitoring system was designed and implemented based on Nagios technology. The cloud computing platform monitoring system designed and implemented by this research institute. Keywords Cloud computing · Monitoring platform · Nagios · Distributed architecture

1 Introduction Since cloud computing was mentioned at the end of last century to technology research, after years of technical development, cloud computing has gradually become an indispensable mainstream technology in the development of today’s software and hardware industry. In the Internet field, Amazon’s AWS, Google’s cloud applications, and Microsoft’s cloud store provide a new experience for the growing number of Internet users. Amazon has more than 11 million websites hosted on J. Liu · C. Qu · T. Zhou (B) Wuhan Business University, WuHan 430056, HuBei, China e-mail: [email protected] J. Liu e-mail: [email protected] C. Qu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_191

1473

1474

J. Liu et al.

AWS, and Microsoft has more than 200,000 azure users. Several technical white papers on Google file system, map reduce and big table published by Google have already become the basis of learning and research in the industry in the field of big data computing and processing [1]. Since the first online bookstore was founded in 1995, Amazon has become a benchmark enterprise of cloud computing. Amazon has provided 248 new services related to cloud computing. At present, CRM, database and e-commerce systems of sap, Microsoft, IBM and other well-known manufacturers have been collected on the platform. Through the combination of these systems, we can easily and quickly complete the system construction for rental customers. User habits are also changing, with 90% of new start-ups in the United States using cloud computing services. Traditional data centers generally focus on the following aspects. The rationality of equipment layout, the rationality of resource planning, the maintainability of equipment, the high availability of system, energy efficiency, resource expansion and so on.

2 Introduction to Related Technologies Based on the monitoring function of cloud computing platform, this chapter mainly introduces the key technologies used in this monitoring system [2]. Firstly, the development of SNMP protocol involved in this research is analyzed in detail, and the characteristics of the protocol are studied in depth according to the technical needs of cloud computing monitoring platform. Then, according to the needs of the system, the principle analysis and introduction of Nagios framework are made.

2.1 SNMP Protocol In this study, we need to use the key technology of simple network management protocol (SNMP) protocol to obtain the information of monitored devices. Without affecting the performance of the monitored equipment, the information of the monitored equipment can be obtained through the interworking and docking of the protocol layer. In the cloud computing environment, there are a large number of devices need to be monitored. If the traditional manual inspection method is used, the monitoring efficiency is low and the error rate is high. In order to quickly obtain the performance parameter information of the device, the performance information can be collected accurately and efficiently by using SNMP protocol and following the protocol specification. Since the establishment of RFC standard, there are three versions of SNMP protocol. This section makes a detailed analysis of these versions, so as to make sure that the system adopts the appropriate version and guide the subsequent development work.

Design and Implementation of Cloud Computing …

1475

Fig. 1 SNMP management model

Simple network management protocol is composed of a set of network management standards, including an application layer protocol, database schema and a group of resource objects. The protocol can be used to monitor the state changes of the Internet devices that can be connected to confirm whether it is worth the attention of the system. The protocol is a part of the Internet Protocol cluster defined by the Internet Engineering Task Force (IETF). It was formulated by the Internet Engineering Task Force in 1988. It has been rapidly accepted and applied in the Internet era. Therefore, it has developed rapidly and has been developed to the third edition. SNMP belongs to the application layer protocol, its management model is consistent with the general network management model, including the following four key elements: management workstation, management agent agent, managed information base (MIB), network management protocol. As shown in Fig. 1.

2.2 SNMP Management Information Structure Because SNMP protocol has been widely used and supported, it is necessary to develop a standard specification to manage network devices in order to avoid compatibility problems during network operation. As a standard specification, SMI (structure of management information) specifies the syntax and type of management information base (MIB) [3]. It is the basic part of SNMP and ensures the smooth interaction between MIB objects and protocols. SMI consists of three parts: object identifier, object information description and object information coding.

1476

J. Liu et al.

3 System Design For cloud computing platform, monitoring system is the key factor for stable operation of cloud computing platform. The monitoring framework based on Nagios is selected in this system. Based on this framework, combined with the analysis of system requirements, customized development is carried out in order to make use of the open-source monitoring framework to adapt to the monitoring requirements of cloud computing environment. Based on the requirement analysis, the design principle of the system is put forward. From the overall architecture of the system design, through the comparison of centralized and distributed architecture, determine the selection of system architecture. Then, the key modules of the system are designed in detail, including basic functions, database, real-time alarm and push, mass device management, agent-free performance monitoring, graphical performance monitoring, etc.

3.1 System Design Principles Cloud computing resource pool monitoring system is a telecom operator level system, it must have high reliability and stability, whether in idle time or in business peak, the system can run stably. Cloud computing resource pool monitoring system is a system for telecom operators, the business data involved may reach million or even higher, so the system must be able to meet the normal business processing in this case. The system performance is mainly reflected in the response speed of system access and the ability to support a large number of concurrent access.

3.2 Overall Design of the System The cloud computing monitoring platform designed in this paper takes the open source Nagios monitoring system as the basic framework, and uses the basic monitoring engine provided by Nagios to poll the monitored devices. Based on the open source framework, combined with the front-end centreon display module, the devices involved in cloud computing are monitored [4]. The system consists of three domains. Portal domain is mainly used to provide the corresponding web operations of user portal and administrator portal. The operation and maintenance domain includes fault management, equipment management, performance analysis, information push and other modules. Business domain is based on the distributed architecture of resource monitoring, covering virtualized resource monitoring and non virtualized resource monitoring. From the physical infrastructure level of computing, storage, network,

Design and Implementation of Cloud Computing …

1477

security and other resources, to the upper level of the virtualization system layer, and then to the virtualization service layer, the integrated monitoring target is completed. In order to calculate the weight of leaf nodes on the flattened tree, it is necessary to define the request of internal nodes. In order to ensure the fairness between the sub nodes under the internal node, the internal node allocates resources to the sub nodes in a way that can make the proportion of dominant resources of all its sub nodes equal. Therefore, this chapter first normalizes all the resource requests of the child nodes, and then generates the resource requests of the internal nodes. j

j

si =

di c j ui

(1)

For example, assume that the total amount of resources in the current system is (10cpus, 12gb). ∼

d j = cj



j

si

(2)



i∈C(n)

4 Conclusion This paper focuses on resource allocation and scheduling in cloud data center network. This paper first discusses the problem of multi resource hierarchical fair queuing on a single server or intermediate device in the cloud data center. Then it studies how to reduce the complexity of the fair allocation algorithm of multi resources in the server cluster of cloud data center, and then studies how to deploy vnfs with placement constraints online at high speed to achieve the optimization goal of load balancing, Finally, we use multi resource allocation scheme to provide non preemptive and online task scheduling to maximize social welfare. Acknowledgements This paper is supported by the general project《ZTE Cloud Computing Server Early Warning and Monitoring System》 of Wuhan Business University No. 2017KY030.

References 1. Li, M., Andersen, D.G., Park, J.W., et al.: Scaling distributed machine learning with the parameterserver. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI)Broomfield, pp. 583–598. USA (2014) 2. Abadi, M., Barham, P., Chen, J., et al.: Tensorflow: A System for Large-Scale Machine LearningUSENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 265–283. Savannah, USA (2016)

1478

J. Liu et al.

3. Liu, P.: Cloud Computing. Electronic Industry Press (2010) 4. Wei, K.: Development of cloud computing at home and abroad. World Broadband Netw. 09, 22–24 (2013)

Research on Medium Voltage Distribution Network Planning Method Based on Improved Genetic Algorithm Xingdong Liu, Daolin Xu, Hui Peng, Xiaochuan Xu, and Huideng Liu

Abstract In this paper, an improved multi population genetic algorithm is proposed to solve the multi-objective optimization problem with multiple groups (father, son, elite group). The parent and subpopulation are introduced into adaptive operators, and the parent and sub populations carry out information exchange at a certain frequency, and the best individuals are saved by the best individuals. The analytic hierarchy process (AHP) is used to make the fuzzy weight operator of the planners more accurate: the multi power sources are included in the distribution network planning, which is closer to the real power grid planning of large cities; the improved algorithm and scheme proposed above are applied to the medium voltage distribution network planning to realize the global optimization. Keywords Medium voltage distribution network · Distribution network planning · Multi population genetic algorithm · Radial network repair · Multi source planning

X. Liu (B) · X. Xu · H. Liu Chongqing Urban Power Supply Branch, State Grid Chongqing Electric Power Company, Chongqing 400010, China e-mail: [email protected] X. Xu e-mail: [email protected] H. Liu e-mail: [email protected] D. Xu · H. Peng State Grid Chongqing Electric Power Company, Chongqing 400010, China e-mail: [email protected] H. Peng e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_192

1479

1480

X. Liu et al.

1 The Concept of Genetic Algorithm Genetic algorithms (GA) is a kind of simulated evolutionary algorithm, which was proposed by J. Holland in 1975. According to the natural evolution rule of “survival of the fittest, survival of the fittest”, genetic algorithm performs search calculation and problem solving. The solution of the problem is encoded in the form of chromosome, and the solution is expressed as the adaptive survival process of “chromosome” [1]. Through the operation of genetic operators, the “chromosome” group evolves from generation to generation, and finally converges to get the individual with “the most suitable environment”, so as to solve the optimal solution and satisfactory solution of the problem. Genetic algorithm is a random search algorithm for solving global optimization problems. It can obtain global optimal solution from large-scale search to local accurate search, which can solve combinatorial optimization problems and nonlinear optimization problems.

2 Basic Characteristics of Genetic Algorithm Genetic algorithm (GA) encodes the parameter space of the problem solution, and uses random selection to guide the search process towards a more efficient direction. Compared with conventional optimization algorithm, genetic algorithm has the following characteristics: 1.

2.

3.

Genetic algorithm starts with multiple individuals of at least one population, rather than limited to one point, so it can prevent the search process from converging to the local optimal solution to a great extent. Genetic algorithm uses fitness objective function to calculate the fitness value without any additional calculation or information, so it has less dependence on the problem. The optimization rule of genetic algorithm is determined by the operation probability of operator, not by certainty. In the solution space, efficient heuristic search is carried out instead of blindly exhaustive or completely randomized search.

3 Mathematical Method of Distribution Network Planning After the distribution network planning model is determined, the mathematical method is used to solve the model. The research methods of distribution network planning can be divided into traditional optimization algorithm and modern optimization method.

Research on Medium Voltage Distribution Network Planning …

1481

3.1 Traditional Optimal Algorithm The traditional optimization algorithm has mathematical rigor, certainty and accuracy, and the parameters are clear. The main methods used in distribution network planning are linear programming, branch and bound method, network flow method. Linear programming is a local search method. Starting from an initial solution, it looks for a point with a smaller target value in the neighborhood, and finally reaches a point that cannot be further lowered [2]. The selection of the initial solution is very important. If the initial solution is close to the optimal solution or there is no local optimal solution other than the optimal solution, the optimal solution may be found; otherwise, it is easy to stop searching when the local optimal solution is found, and eventually the global optimal solution cannot be found.

3.2 Modern Optimization Methods Simulated annealing (SA) algorithm is an extension of local search algorithm. It is different from local search in that it selects the state with the largest cost in the neighborhood with a certain probability. Theoretically, it is a global optimal algorithm, which simulates the annealing process of crystal in physics. When a metal object is heated to a certain temperature, all its molecules move freely in the state space. As the temperature drops, these molecules gradually stay in different states. When the temperature is the lowest, the molecules rearrange in a certain structure. The probability of molecules staying in the state of low energy is higher than that of molecules staying in the state of high energy. The simulated annealing algorithm in practical application is a heuristic algorithm. There are many parameters need to be adjusted, such as the initial temperature, the scheme of temperature drop, the iteration length and termination rule when the temperature is fixed. The emergence of human factors will affect the feasibility of the whole results, so a large number of data are needed to verify the results.

4 Distribution Network Planning Based on Improved Multi Population Genetic Algorithm 4.1 Mathematical Model of Single Source Planning in Distribution Planning Single source distribution network planning is to optimize the construction site of feeder section on the basis of known location and capacity of power source and load to form constraints such as feeder line capacity, voltage drop, radial network

1482

X. Liu et al.

structure, minimum network loss and high reliability. In this paper, the literature port model of single power supply planning is adopted, and the objective function is to minimize the annual operation cost: ⎧ n  ⎪ ⎪ (λ1 Ct Tt Z t + λ2 Ct τmax Pi ) ⎪ mincos t = ⎪ ⎪ i=1 ⎪ ⎨ n  f1 = Ct Tt Z t ⎪ i=1 ⎪ ⎪ n ⎪  ⎪ ⎪ f2 = C2t τmaxt Pi ⎩

(1)

i=1

The constraints are: (1) connectivity constraints, (2) radial network constraints, (3) voltage constraints, (4) conductor current constraints. When multi population genetic algorithm is used for distribution network planning, it is necessary to deal with the constraints in the mathematical model of the planning, and the penalty function acts on the objective function. 1.

Node voltage constraint: the voltage drop must meet the given requirements and meet the safety power supply standard. ⎧ ⎨ K u (Umin − Ui )2 Ui < Umin kU (Ui ) K u (Ui − Umax )2 Ui > Umin ⎩ 0Umin ≤ Ui ≤ Umax

2.

(2)

The long-term current carrying capacity of the conductor is required to be less than the rated current carrying capacity of the conductor.  kl (Ii )

K i (Ii − Ihi )2 Ii ≥ Ihi 0Ii < Ihi

(3)

4.2 Distribution Network Planning Based on Improved Multi Population Genetic Algorithm When genetic algorithm is applied to solve the problem of new or extended distribution network planning, the coding method adopts line by line coding, that is, each line to be selected is represented by one bit binary, “1” means that the line is selected to join the system, and “0” if it is not selected. This method can be applied to the substation to be built. Let f be the collection of all feeder lines to be built, and each branch has two states: selected or not selected, is the collection of all new load nodes in the planning period. S is the collection of all substations [3]. The capacity of the original substation can be expanded, and the capacity of the new substation will be constructed at one time. Four populations are set in the algorithm. The two subpopulations correspond to the

Research on Medium Voltage Distribution Network Planning …

1483

depreciation, maintenance cost and loss cost of distribution network and substation respectively. The parent population corresponds to the planned annual operating cost. Elite populations are used to preserve the best individuals in various groups in recent generations. The convergence condition is the largest iteration number Nm or continuous iteration W times, and the optimal individuals obtained from the parent population are the same as the best individuals in the elite population.

4.3 Repair of Radial Grid of Distribution Network In the application of genetic algorithm to solve the distribution network planning problem, based on the binary coding of gene loci, a large number of infeasible solutions T1 (mainly non radial network solutions) will inevitably be generated under the operation of genetic operators. If the complete scheme is not adopted in time, the feasible solution may not be obtained. In this paper, the variable representation method of upnode in paper 2102 is used to solve the power system restoration planning problem to find all the up node variable sets that can make the load point live, and form the feeder variable set between the new load point and the up node. In this paper, the repair scheme of radial network includes: isolated chain repair, ring network repair, island repair [3]. The cost and impedance of the feeder should be considered when selecting the specific feeder repair, and the capacity to load ratio of the substation supplying the new load point or the set of load points should be considered in the multi power planning (Fig. 1).

5 Conclusion In this paper, based on the study of the current situation and development of distribution network planning and summarizing the experience of predecessors, this paper proposes an improved multi population genetic algorithm and applies it to distribution network planning for the problems of slow calculation speed and low optimization efficiency in distribution network planning optimization algorithm, and proposes a radial network repair scheme for the network generated by genetic algorithm that does not meet radial constraints; In this paper, the fuzzy artificial language operators are quantified by analytic hierarchy process (AHP) and applied to distribution network planning.

1484

X. Liu et al.

Fig. 1 Flow chart of improved multi population genetic algorithm

Acknowledgements Research and Application of Grid Planning Technology for Distribution Network Based on Data Sharing, Project No.:2020 Chongqing Electric Technology 13#References.

References 1. Fan, T., Zhang, Z, Yue, Z.: Distribution Network Planning and Design. China Electric Power Press (1998) 2. Chen, Z., Tang, D.: Urban Power Grid Planning and Transformation, vol. 5. China Electric Power Press, Beijing (1998) 3. Xie, J., Wang, L., Tang, G.: Application of genetic algorithm in multi-objective power grid optimization planning, power system automation 22(10), 20–22 (1998) 4. Lin , J.: Transmission network planning using improved genetic algorithm. J. South China Univ. Technol. (NAT. SCI. EDN.) 30(8), 36–39 (2002)

Design of Incomplete 3D Information Recognition System Based on SIFT Algorithm Zhendong Liu

Abstract As an image information processing technology, image recognition has been widely used in recent years. The traditional basic principle of image recognition is to express the features of the object to be recognized in a certain form from the image to be recognized, which can be processed by the computer Then according to the discriminant function proposed before, the computer determines and identifies the object to be identified in the picture. Keywords Incomplete 3D information · SIFT algorithm · Cycle matching modeling · Image recognition

1 Application of SIFT Algorithm in Incomplete 3D Information Image Recognition SIFT algorithm is called scale invariant feature transform, and its Chinese name is scale invariant feature transformation. When the scale change, brightness change, space rotation and noise pollution of the image, SIFT algorithm can be usedMaintain good applicability. Moreover, even if there is a small part of the object to be recognized in the image, the algorithm can also generate a lot of feature information to represent the characteristics of the object to be recognized. Therefore, according to the particularity of this subject, we choose SIFT algorithm as the most basic algorithm. According to the limited number of images and incomplete three-dimensional information, with the increase of the number of images to be recognized, the extracted features will increase, and the number of recognized images can be gradually reduced [1]. Finally, the range will be reduced to a certain range, so as to realize “it is not it”. In addition, the difficulty of this paper is how to express “who it is” and how to use enough images to express the object to be recognized in the later stage. Therefore, based on the feature vectors extracted by SIFT algorithm, a new modeling method, Z. Liu (B) College of Information Science and Technology, Chengdu University of Technology, East Third Road, Erxian Bridge Street, Chenghua District, Chengdu City 610059, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_193

1485

1486

Z. Liu

cyclic matching vector modeling, is proposed in this paper. By using this method, the features of the object to be recognized can be expressed in the form of mathematical vectors.

2 SIFT Algorithm Flow 2.1 Scale Space Generation The scale space is generated for the image to be processed, and the function used is Gaussian kernel function. With the change of scale parameters, the image is Gaussian blurred by Gaussian kernel function, and each blur is processed by downsampling. In this way, the image pyramid is constructed; At the same time, in order to get the more constant feature points in the image, which are not affected by the external changes, we need to do the difference operation again to generate the Gaussian difference pyramid. It ensures that the detected image feature points are invariant to image scale scaling and image rotation.Detection of extreme points, when the scale changes, these detected extreme points will show a property, that is, they have certain invariance, we call this kind of points “key points”, positioning is to determine the location of these key points and their scale size. Determine the direction of the key points: the image will be polluted by various environments, including rotation. In order to protect the image from rotation, sift defines a unique orientation feature for each key point [2]. Generating feature point descriptor: from the above steps, we can get a description of this key point which is composed of several partsThe vector model is called eigenvector.

2.2 Constructing Scale Space Before the theory of SIFT algorithm was proposed, one of the difficulties in image processing was unable to describe the concept of image scale. In order to detect the position of the stable point in the image which has no effect on the scale change, koenderinkl341 is used in the reasonable hypothesis. In 1984 and 1994, lindeberg-3l proved that in order to realize the scale transformation of images. If the function I (x, y) represents the mathematical expression of the input image, and the function g (x, y, a) represents the Gaussian kernel function that changes with α, then the scale space function L (x, y, O) is shown in Eq. (1). L(x, y, σ ) = G(x, y, σ ) ∗ I (x, y)

(1)

Among them, σ represents the scale space factor of the feature point, and its physical meaning represents the smoothness degree of the image. With the increase

Design of Incomplete 3D Information Recognition System …

1487

of scale space factor, the image becomes more and more blurred. ∗ is convolution operation. The scaling variable Gaussian kernel function G(x, y, a) in Eq. (1) is defined as Eq. (2). G(x, y, σ ) =

2

1 

σ2

e

x 2 +y 2 2σ 2

(2)

The original image is magnified twice by interpolation, and then the enlarged image is downsampled. The new image obtained by downsampling is regarded as a new layer of pyramid. And so on, get the desired image pyramid. The calculation formula is shown in Formula (3)   n = log2 {min(M, N )} − t, t ∈ 0, log2 {min(M, N )}

(3)

In addition, in order to reflect the continuity of the scale, the image is de sampled first, and then the image is filtered by Gaussian filter.,each pyramid contains multiple processed images, called a group,each group contains multiple images blurred by Gaussian.

3 Direction Assignment of Key Points In order to assign a direction parameter to each detected key point. Lowe uses gradient histogram to give direction to key points, that is, statistical histogram and weighted calculation. Taking radius of 1.5 as the weighted range, Lowe makes Gaussian circular window. For specific description, please refer to the relevant direction invariant descriptors described in detail by Schmid and Mohr in 1997. L(x, y) = G(x, y, σ ) ∗ I (x, y)

(4)

The gradient modulus value m(x, y) and direction θ (x, y) of each feature point are calculated respectively. In this way, the gradient of pixels in the neighborhood and the distribution characteristics of each pixel’s direction can be used to make the image have the characteristics of no influence even if it is rotated. See Formula (5) (6) for details.  m(x, y) = (L(x + 1, y)) − L(x − 1, y)) + (L(x + y + 1) − L(x, y − 1))2 (5) θ (x, y) = arctan(

L(x + 1, y) − L(x − 1, y) ) L(x, y + 1) − L(x, y − 1)

(6)

Samples are taken in a circle with a radius of 1.5 α, and the gradient histogram of pixels in the neighborhood of key points is counted and expressed with. The

1488

Z. Liu

360° is divided into 36 directions, each of which is 10° and the gradient histogram is calculated by this principle. The most direction in histogram is regarded as the main direction of key points, that is, the main direction of key points. The auxiliary direction of the key points is proposed, that is, the direction in which the peak value in the histogram is not less than 80% of the peak value in the main direction is retained. In theory, this will make the descriptors more troublesome [3]. In fact, only 15% of the key points have multiple directions. Therefore, this method has been retained.

4 Modeling of Incomplete 3D Image Recognition System 4.1 Cycle Matching Vector Modeling Steps At this point, we can divide the process of loop matching modeling into the following steps: 1. 2.

3.

Firstly, the n images to be tested are extracted by Improved SIFT algorithm we need to match (N − 1) + (N + 2) · · · + 1 = (N 2 − N )/2 times, and a new set of eigenvectors can be generated by pairwise matching each time, which amounts to (N 2 − N )/2 groups. Finally, the (N 2 − N )/2 sets of eigenvectors obtained in the second step are integrated into one eigenvector. The principle of integration is to keep a feature vector principle, that is, the integrated eigenvector contains all the eigenvectors generated in step 2). In other words, the new eigenvector contains only one (N 2 − N )/2 group. At this time, the new feature vector can represent the mathematical model of the object to be recognized.

4.2 Circular Matching Vector Modeling First, we need to get the matching vector between two images. Using the matching algorithm of the Improved SIFT algorithm, we match four (i.e., n = 4) images in pairs, and need to match (4–4)/2 = 6 times in total, and obtain 6 groups of feature directions in total. Therefore, we can get the matching vector very quickly, and the feature vector after matching is very stable. The result of matching is shown in Fig. 4.5, in which the number of feature points and eigenvectors after pairwise matching are shown in Table 4.2 (partial feature quantities are intercepted). Because we improve the matching similarity measure and remove the mismatch of large deviation.

Design of Incomplete 3D Information Recognition System …

1489

4.3 Image Matching First of all, it is necessary to quantify all the images in the local database. Click the “image library” button to open the folder where the local library is located. Due to the large number of images in practical application, in order to save time, we choose.Several test images were selected. After opening the image, the system starts to quantify. Due to the high time complexity of SIFT algorithm and the large number of images in the library, it needs more quantization time. When the quantization is completed, the system will pop up the dialog box of “Gallery quantization succeeded”, indicating that the gallery quantization has been completed, and then click the “OK” button to return to the system interface. Next, we will realize “it is not it”. We will match the image to be identified with the image in the library in pairs, and find all the images that have been successfully matched in the library [4]. Click the “input to be matched” button, the dialog box will pop up, find the path of the image to be identified and open the image to be matched; then click the “start matching” button, at this time, the system background will process the image to be recognized SIFT feature extraction and feature quantization, and then match with all the images that have been quantized in the library just now, and the successful matching will be displayed in the right part. Because the number of images obtained in the early stage is small, we choose an image with incomplete 3D information as the image to be matched, so there are fewer features of the object to be recognized in the image. Therefore, there may be more matching images in the database library. Therefore, we can view the images successfully matched through the “previous” and “next” buttons.

5 Conclusion This paper is based on SIFT algorithm. In this paper, SIFT algorithm feature vector extraction and feature vector matching technology are studied in depth, combined with the particularity of the project, it is applied to this topic, and whether it is suitable for this topic is verified. In this paper, a mathematical representation method of object features in image is proposed. Based on the feature vector extracted by the Improved SIFT operator, the mathematical vector modeling of the recognized object is carried out by using the method of cyclic matching vector. Using multiple images with incomplete three-dimensional information, the incomplete objects in the image are extracted by feature vector, and the feature vector model is constructed to form the mathematical vector representation model of the object to be recognized.

1490

Z. Liu

References 1. Sheng, L.: Introduction to Pattern Recognition, pp. 1–2. Beijing University of Posts and Telecommunications Press, Beijing (2010) 2. Wang, L.: Research on Image Recognition System Based on Neural Network (Master Thesis). China University of petroleum Qingdao (2008) 3. Bao, L., Research on Image Recognition System Based on SCFNN (Master Thesis). Nanjing University of Posts and Telecommunications, Nanjing (2010) 4. Xiangru, S.: Recognition of Typical Mechanical Parts Based on RBF Network. Jiangsu University of Science and Technology (2011)

Real-Time Detection Technology of URL Attack Behavior Based on Machine Learning Xin Lu, Kang Wang, Bo Xu, Shuming Xu, and Pei Wang

Abstract This paper mainly studies the malicious URL detection technology based on machine learning, constructs a detection model of multi classifiers, and finally designs and implements a malicious URL detection system to process real-time data stream using the constructed multi classifier model. Keywords URL · Malicious detection · Logical regression

1 Research Status of URL String Detection In the face of the problems exposed by content-based malicious URL detection methods, taking URL string itself as the analysis object also promotes a new research direction. The analysis of URL string itself can effectively solve the problem of resource consumption and time consumption in content-based detection without downloading relevant web content or executing undecided URL. There are two methods to detect malicious URL by taking URL as the research object.

X. Lu · K. Wang · B. Xu · S. Xu · P. Wang (B) China Gridcom Co., LTD, Shenzhen, China e-mail: [email protected] X. Lu e-mail: [email protected] K. Wang e-mail: [email protected] B. Xu e-mail: [email protected] S. Xu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_194

1491

1492

X. Lu et al.

1.1 Blacklist Detection Technology The implementation of blacklist detection technology actually depends on the cooperation of multiple organizations. Usually, for blacklist detection, the authoritative organization crawls a large number of network traffic data, and then provides the data that may be judged as malicious URL to the analysis program. Sometimes, it is necessary to add manual judgment to improve the accuracy rate, and finally get the blacklist data. After getting the blacklist data, we can start to carry out simple detection [1]. For the received URL request, it searches and matches in the blacklist to complete the detection of malicious URL. If it is not in the existing blacklist data, the URL is determined as normal URL. The follow-up work of blacklist detection technology is to update the blacklist data regularly. It is necessary to search the known malicious URL data regularly, continue to analyze the collected data through program analysis and expert judgment, and finally release the updated version of blacklist data.

1.2 Research on Malicious URL Detection Using Machine Learning The process of building machine learning model to solve practical problems mainly includes analyzing problems, collecting data, extracting features, establishing and optimizing models. The application of machine learning algorithm to malicious URL detection research also needs to go through the above several steps, so the research results of various researchers, in most cases, are the differences between the two steps of feature extraction and optimization model establishment. Based on the consideration of different practical problems, researchers will use different features to extract, or use different machine learning algorithms to train models to solve their own problem concerns.

2 Feature Extraction Technology To calculate the TF-IDF feature matrix of URL is to analyze the URL as text and mine the semantic elements in URL. TF-IDF, in fact, is a statistical method. It is mostly used in the fields of text processing and semantic analysis. It mainly reflects the importance of an entry to the whole text and even to the whole thesaurus. When the frequency of an entry in a text is very high, but the frequency in other texts is low, it can reflect that the entry has a high representative ability for the article [2]. The TF-IDF value of each entry is mainly related to two contents. One is related to the frequency of the word appearing in the text. The tfwora of a word in an article can be obtained by Formula (1),

Real-Time Detection Technology of URL Attack …

T Fiwor d =

1493

countiwor d counti

(1)

It can be expressed as the ratio of the number of times word appears in the article and the total number of entries count in the article. The other is related to the reverse file frequency of the entry. The idfword of an entry in the text data set can be obtained by Formula (2). I D Fiwor d = Log

countiwor d counti

(2)

3 Construction of Malicious URL Detection Model Based on Machine Learning URL has the function of positioning in the abstract sense, and it is often used as the only identification to visit a web address. Because of this abstract feature of URL, malicious attackers often choose URL as the primary medium to carry out attacks. Therefore, the establishment of malicious URL detection model can effectively resist the Web attack through URL. In the era of iterative updating of science and technology, the traditional blacklist detection technology can only meet the basic needs of malicious URL detection, but there is a problem that can not detect new or disguised malicious URL.

3.1 Construction of Malicious URL Detection Model In this study, the final detection model that we want to build is actually isomorphic by multiple classifiers. By adjusting the weight of each classifier, when a new URL appears, multiple classifiers will detect the URL and get their own results, and then give the final detection results according to the weight ratio. Therefore, before constructing the overall classifier model, it is necessary to complete the training of each classifier. This chapter describes the training process of three machine learning algorithm models, including the training process of different detection models such as logistic regression algorithm, support vector machine algorithm and recurrent neural network algorithm [3]. For logistic regression and SVM, a variety of feature extraction schemes are used for training. In logic regression, it is usually necessary to define a threshold to classify P. for example, if the value of P is greater than the threshold, then the URL is a malicious URL, that is, the detection function of malicious URL can be obtained, as shown in Formula (3)

1494

X. Lu et al.

P(u = maliciousi f ) =

exp( f ‘w) 1 + exp( f ‘w)

(3)

3.2 Construction of SVM Detection Model The construction of SVM detection model needs several steps, including: (1) processing of model input data, (2) selection of kernel function of training model, (3) changing penalty factor and kernel function parameters, (4) training model with optimal parameters. In this study, libsvm integration package is used to complete the construction process of SVM detection model. Selection of kernel function in training model. Only by choosing the kernel function which is more suitable for the problem to be solved can the training model solve the problem better. In this study, radial basis function is selected as the kernel function. Compared with other kernel functions, radial basis function has the advantage of fewer parameters that need manual support, that is to say, compared with other kernel functions, it has lower complexity. In this study, radial basis function combined with C-SVC is selected to train the required SVM detection model.

4 Architecture Design of Malicious URL Detection System 4.1 Architecture Design of Malicious URL Detection System To meet the basic requirements of malicious URL detection system, the architecture of the detection system is shown in Fig. 1, which is mainly composed of data analysis layer, data transmission layer and offline machine detection layer [4]. The main reason for the existence of the data analysis layer is that the stream data processed by this system is the data flowing to the ngnix server, and it can obtain the required stream data by obtaining the traffic packets in the network. Therefore, in order to further process the convective data, the data analysis layer is needed to parse the convective data. After the analysis of the convective data is completed, the data will be stored in the distributed file system.In HDFS, the data transmission layer mainly relies on Kafka message queue to complete the construction of producer consumer model. Offline machine detection layer, in this layer, we need to extract the features of the data.

Real-Time Detection Technology of URL Attack …

1495

Fig. 1 Schematic diagram of architecture design

4.2 Design and Implementation of Data Analysis Layer Through the hard interrupt processing of the network card, the data packets passing through the network card will be transferred to the kernel, and the network data packets will be parsed in the kernel stack. This parsing method is a traditional technical way. However, with the advent of the era of big data, it is obviously unreasonable to let a large number of data be parsed through the kernel stack. In order to deal with this situation, this study does not use the traditional network packet parsing method, but uses the dpdk suite supported by Intel company to complete the network packet parsing work. The main advantage of using this suite is that it can avoid the system interruption operation in the traditional way, and at the same time, it can save the operation of multiple replication, shorten the time needed for network packet parsing, and improve the system’s ability to resolve network packets.

5 Conclusion With the continuous development of the Internet, there are more and more life scenes combined with the network, and the lifestyle gradually has a new mode, we also have to consider some hidden hazards in this new mode. How to prevent the harm caused by web security is also a problem we have to consider. Among them, malicious URL is an important way to attack web security, so how to effectively access malicious

1496

X. Lu et al.

URL.Line detection is also an important research content in the field of web security. This paper analyzes the current research situation of malicious URL detection. Combined with the existing feature extraction schemes, new feature extraction items are added, and a comprehensive feature extraction scheme is constructed. The other two classic feature extraction schemes are implemented. The performance of the models trained by different feature extraction schemes and different algorithms is compared, Finally, three matching schemes are selected to construct the detection model of multiple classifiers, and a malicious URL detection system is designed and implemented by using the detection model.

References 1. Wang, Z., Feng, X., Chi, Z.: Research on malicious webpage fast detection system based on two-layer classifier [Ding]. J. Netw. Inf. Secur. 3(08), 48–64 (2017) 2. Huang, H., Qian, L., Wang, Y.: URL detection technology of phishing website based on abnormal features. Inf. Netw. Secur. 1, 23–25 + 67 (2012) 3. Dai, Q.: Research on Routing Protocol of Vehicular Network. Beijing University of Posts and Telecommunications (2013) 4. Liu, J., Zhao, G., Zheng, Y.: Design and implementation of malicious URL multi-layer filtering detection model. Inf. Netw. Secur. 01, 75–80 (2016)

Application Value and Path of Computer Technology in Student Management in the Internet Era Yanmei Lyu, Yizhuo Zhang, and Camiwet David

Abstract Under the background of big data, there are some deficiencies in the management of college students in terms of personal ideological understanding, students’ own quality and skills, university management mode, data storage and supervision ability, network security, quality and ability of college student cadres. In view of this situation, we should improve the skills and ideological understanding of college student management personnel, establish the awareness of Internet big data, improve the quality and ability of student cadres, improve the student management system, and enhance the function of information technology, so as to make the student management work smoothly. For the student work system in Colleges and universities, data makes all student work traceable and makes all student work active traceable. How to make good use of the concept of Internet plus to make big data technology truly fall into place and serve students’ work has become a hot topic. This paper mainly expounds the problems existing in the management of college students in the era of big data, the positive impact of big data technology on the management of college students and the implementation path, so as to provide reference for peers. Keywords Big data era · College student management · New path · Cloud computing

1 Introduction With the continuous development of science and technology, human society has entered a new development model, from the initial agricultural society to the later industrial society, gradually entered the information age. The emergence of computer makes human being liberated from the heavy manual work. Artificial intelligence replaces the original backward production mode, and brings human development into a more advanced information digital era. From the “first year of big data era” in 2013 to the emergence of keywords such as “artificial intelligence” and “Internet” Y. Lyu (B) · Y. Zhang · C. David University of the Cordilleras, Baguio City, Philippines e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_195

1497

1498

Y. Lyu et al.

sharing “, it has become an indispensable part of people’s lives to analyze social hot spots through big data [1]. As a place with high population density, wide and fast information dissemination, and high acceptance and popularization rate of new industries and scientific research products, colleges and universities are a group of human elites who are full of vitality and creativity and are likely to change the process of social development. They are also an advanced group carrying the historical mission of national prosperity and prosperity, Student management must keep pace with the times, conform to the trend of the times, adapt to the era of big data, rely on its related technology and concept to carry out ideological and theoretical system education, group organization relationship construction, organization system construction, students’ daily management, mental health education, safety education, legal and moral education and other related management work. Under the background of big data era, many problems faced by college student management can be analyzed from different angles to sort out new ideas and new paths of college student management.

2 Challenges Faced by College Student Management Under the Background of Big Data 2.1 The Personal Ideological Understanding of Student Management Personnel As the staff of colleges and universities to manage students’ daily behavior norms, learning and life, student management personnel can be divided into direct management personnel (such as counselors, class teachers, etc.) and indirect managers (such as college leaders, staff of various functional departments, etc.) [2]. In the era of big data, there is bound to be a historical collision between the traditional working mode and the information and network working mode. Some senior teaching and management personnel are subject to the traditional working mode, and have strong resistance to the new working mode. They think that the mode of the new era will make the tradition lost, and the face-to-face teaching mode which has lasted for thousands of years will cut off the communication between teachers and students. Big data Era is an information age, so the requirements for computer skills operation are also higher and higher, However, some teaching managers can not keep pace with the times, think that they can not flexibly apply information equipment and lack a certain sense of the times.

Application Value and Path of Computer Technology in Student …

1499

2.2 Lack of Students’ Quality and Skills In the era of information technology, the overall quality of college students is required to be higher and higher. In Colleges and universities, most of the students are post99. They are active in thinking and break through the shackles of tradition. They have distinct personalities, like challenges and have a high acceptance of new things. This year, new China will enter colleges and universities after 2001, contributing to the development of the motherland and the world. However, as a new youth in the twenty-first century, its personality characteristics are more distinct. Therefore, in the era of big data, some social life problems are inevitable (Fig. 1). Fig. 1 Analysis of students’ ability

3 The Era Characteristics of Big Data A significant feature of big data is that the data flow propagation speed is extremely fast, and the big data propagation timeliness is high. Relatively speaking, big data can complete the whole process at a faster speed in the process of processing, so the processing time of big data is high. Compared with traditional data processing, it is also a big advantage of big data. In the era of big data, there is bound to be a historical collision between the traditional working mode and the information and network working mode. Some older teaching and management personnel are subject to the traditional working mode and have a strong resistance to the new working mode. They think that the mode of the new era will make the tradition lost, and the face-to-face teaching mode which has lasted for thousands of years will cut off the communication between teachers and students. Big data Era is an information age, so the requirements for computer skills operation are also higher and higher, However, some teaching managers can not keep pace with the times and think that they can not flexibly apply information equipment and lack a certain sense of the times. The “big data” refers to the large data volume of big data. Generally, the starting unit of big data calculation is at least P [3]. compared with the usual measurement

1500

Y. Lyu et al.

unit T, 1p = 1000t. In addition, the measurement units of big data also include E and Z, where 1E = 106t, 1z is as many as 1 billion t. It can be seen that the amount of big data is unimaginable. It is shown in the following formula. xn = x(t0 + nt) = h[z(t0 + nt)] + ωn L

∪ Si = V − vs

i=1

(1) (2)

4 New Path of College Student Management in the Era of Big Data Student management is the main work of colleges and universities. In the context of big data, the traditional management should also assess the situation, actively formulate management methods that meet the requirements of the times, and take the train of the times to transmit more effective knowledge and information.

4.1 Improve the Skills and Ideological Understanding of College Student Management Personnel The main feature of the era of big data is the collection of massive information, through the analysis and processing of a large number of data to obtain useful information. At present, with the continuous impact of big data, colleges and universities have realized the necessity and urgency of information construction of student management, and began to realize information management through some media, independent research and development, or third-party development. With the continuous popularization of information technology, higher requirements are put forward for the knowledge reserve and skills improvement of university administrators. Under the background of the new era, university administrators should have a correct understanding of their own situation, keep up with the pace of the times, abandon the traditional management concept, and advance with the times to improve the ideological understanding of individuals and organizations. Colleges and universities should strengthen the skill training of student management personnel, not only from the knowledge and skills, but also from the ideological understanding to strengthen the ideological and behavioral state of management personnel, so as to face the information construction of college student management in the era of big data with a better mental state, and effectively improve the efficiency and level of student management.

Application Value and Path of Computer Technology in Student …

1501

4.2 Build Internet Big Data Awareness In the face of various drawbacks of traditional student management mode, it is very important to enhance the awareness of big data management in the new era. According to statistics, the number of Internet users in China has increased year after year, and in this trend wave, whether online or offline, student groups occupy a large proportion. Therefore, it is necessary to use Internet big data to manage students. University student managers should strengthen the supervision of students’ network environment, realize the comprehensive management of students through the Internet, and understand the students’ daily behavior and life learning state. Network courses can be set up to shorten the distance between teachers and students through the network media, so as to realize personalized network teaching and make it a vivid and authentic teaching mode. In this way, students’ personality can be displayed, and students’ dominant position in the classroom can be fully understood. Teachers should think in a different position and perceive what students have learned from the perspective of students [4]. They can effectively find problems and solve them in time, and strive to create a new teaching and management atmosphere in the era of big data. In line with the original intention of “everything for students, everything for students”, while completing the established teaching tasks, actively care about students’ life and ideological dynamics, guide students to establish correct outlook on life and values through some network lectures and ideological and political education courses, so as to enhance students’ ability to resist bad network information.

5 Conclusion The era of big data has come, big data technology is quietly changing our lives, which not only brings opportunities to college student workers, but also ushers in challenges. The use of big data technology can not only help teachers better and more comprehensive understanding of students, but also help parents understand the situation of students in school through the Internet platform, Finally, school education and family education can cooperate with each other to promote the growth of students.

References 1. Gan, L.: Discussion on informatization of college student management in the era of big data. Qual. Educ. Western China 01, 134–135 (2018) 2. Wen, L.: Thinking on informatization construction of college student management in the era of big data. Taxation 10, 137 (2018) 3. Tao, C.: Analysis on the current situation and countermeasures of university student management based on big data. Knowl. Econ. 03, 180 (2018)

1502

Y. Lyu et al.

4. Yan, F.: Research and response to the cultivation mechanism of university student cadres under the background of big data. Teach. Edn. Electron. J. New Educ. Era 27, 171–171 (2016)

Application of Computer Technology in Engineering Cost Management Suofeiya Ma and Yiju Wang

Abstract The application of calculation technology in project cost management reduces the work of cost management personnel, improves the accuracy of calculation, the efficiency of cost management, and reduces the engineering management cost and repetitive work. There are still some problems in the application of computer technology in the project cost management: it is not in-depth in the various work of the project cost management; the application is not very balanced; all kinds of software still need to be further developed; the cost management application in some small and medium-sized enterprises still needs to be further improved. This paper makes some research and puts forward some new views, In order to jointly promote the application of computer technology in project cost management, and constantly realize the project cost information management. Keywords Computer technology · Project cost · Management application · Problem development

1 Introduction With the advent of the information age, the application of computer in project cost management has gradually deepened and refined. The development and application of project cost software and manual preparation of budget and settlement have become history [1]. In the past 15 years, the application of computer in engineering cost management has got the fastest development, one is due to the development and application of computer software and hardware, the other is due to the rapid development of China’s real estate industry in recent 10 years, which has brought inevitable and created conditions for the application of computer technology in project cost management. Computer technology in the construction project cost management, reduce the cost management personnel’s work, improve the accuracy of engineering S. Ma (B) · Y. Wang Qilihe District, Gong Jiaping East Road1#, Lanzhou 730050, GanSu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_196

1503

1504

S. Ma and Y. Wang

quantity calculation, the efficiency of project cost management, greatly reduce the office expenses and repetitive work of project cost management. With the deepening and gradual maturity of the application, there are still some problems: computer technology is not comprehensive and in-depth in the project cost management; the application in the company is not very balanced; the project management software needs further development; at present, computer technology is mainly used for construction drawing budget, engineering quantity calculation and quota application, quantity analysis and other cost calculation of project cost, In particular, the software development of the project pre estimate and preliminary design estimate needs to be further strengthened.

2 Analysis on the Application of Computer Technology in Project Cost Management 80% of the application of computer technology in project cost management is reflected in the application of engineering cost software, and the engineering cost software is a professional software with narrow application area. It does not have a large number of users as general software, so the price is often very high. With the development of computer technology and software technology, construction engineering application software has also been developed. The cost management software can release the construction cost personnel from the busy manual labor, and improve the work efficiency and the informatization level of the whole construction project management. However, due to different reasons, such as different development forces and positioning of software market, on the whole, the situation is not optimistic and there are still many problems [2].

2.1 Imbalance of Software Application in Engineering Cost The software price of project cost is relatively expensive, which leads to the imbalance of software application. Computer technology in some small and medium-sized enterprises project cost management, construction project cost is a complex system engineering. It involves many points, long lines, wide range and large quantity, which puts forward higher requirements for further work, including the requirements of cost and talents. Firstly, the application of SMEs is unbalanced. In large engineering construction engineering companies, all kinds of engineering consulting companies and cost offices, they are widely used. The price of software and the cost of upgrading and maintenance are not a problem for such companies. Cost talents can also be guaranteed. However, in some small and medium-sized enterprises, the cost of software is a high cost for them. This situation has changed in recent years, For small and

Application of Computer Technology in Engineering …

1505

medium-sized enterprises, the cost of talent is also a problem, there is no highquality cost personnel, so the application of engineering cost software in small and medium-sized enterprises is not very high. Secondly, some small and medium-sized enterprises, especially some professional contracting enterprises, do not have relevant management software due to industry reasons. The work of project cost management is still limited to excel and other electronic forms, which is only better than manual calculation of quantity and price. Of course, with the further application of computer technology, these problems will be gradually solved.

2.2 There are Many Kinds of Engineering Cost Management Software and the Existing Problems Due to the communication, cooperation and attention between software developers and cost professionals, the function of engineering cost management software is still unsatisfactory. At present, the mainstream engineering cost management software still has the following problems: repeated development of software functions, a large number of software products, but some software functions are single, some focus on cost estimation, some focus on design estimate, some are used for calculation of engineering quantity, pre settlement and rapid bidding quotation, which can not serve the whole process of project construction cost management, Basically, it can not analyze and judge the project cost data, and can not provide accurate decision-making basis for the project construction investment.

3 Work Procedure of Value Engineering 1.

Function definition Function definition is to use concise language to express the function of the research object, as shown in Fig. 1 [3].

2.

Functional analysis Function arrangement is to systematize the defined functions, find out the logical relationship between the functions, and sort out the upper and lower relations, so as to connect the functions from single to local and then to the whole according to certain levels and principles, so as to establish a complete functional system.

Fig. 1 Function definition process diagram

1506

3.

S. Ma and Y. Wang

Functional evaluation

Function evaluation refers to the process of clarifying the satisfaction degree of the project to the functional requirements, and obtaining the project value according to the relationship between the function and the corresponding cost. Functional evaluation is the key joint in the application of value engineering. Functional index refers to the proportion of a certain characteristic function of the research object in its overall function. The calculation of function index is the key link of function evaluation and value engineering. The methods to determine the function index can be divided into two categories: subjective evaluation method and objective weighting method. Cost index refers to the proportion of the cost of a certain function of the research object in the sum of the costs of all the functions of the research object. The formula is as follows. ci Ci =  , (i = 1, 2, . . . , n) ci

(1)

Calculate the value index value index V, which is the ratio of the function index and the cost index. Vi =

Fi , (i = 1, 2, . . . , n) Ci

(2)

4 Application Analysis of Computer Technology in Cost Management of Construction Project in Various Stages Cost management software is mainly divided into two categories: one is the calculation of engineering quantity software, such as the amount of concrete, steel consumption, building area, etc.; the other is the auxiliary calculation software of engineering cost, such as calculating cost, analyzing labor and materials, adjusting quotation, printing report forms. From the purpose, it mainly includes the calculation software of engineering quantity, the calculation software of steel bar, the software of engineering valuation and the software of bid evaluation. From the aspect of process, it mainly includes the realization of the whole process cost management from the aspects of estimation, budget estimation, budget, claim and settlement. These software can basically solve the budget preparation, audit, engineering quantity calculation, statistical statements and budget problems in the construction process, and the cost software has entered the practical application stage of project cost management. The project decision-making stage is mainly the work of the construction unit and the drawing design work of the design unit for the project. The investment decisionmaking stage of the engineering construction project is an important process for the construction party to select the investment scheme, which is the starting point of the

Application of Computer Technology in Engineering …

1507

project cost management and cost control, The project construction manager of the construction party should be able to analyze and compare the cost of various schemes in time, and make optimization selection for the scheme. In the design stage, through software design, the design speed and accuracy can be improved [4]. Therefore, the phenomenon of wrong items, missing items and missing items caused by imperfect design drawings can be reduced. These works can not be completed without the efficient and accurate application of cost management software.

5 Conclusion This paper mainly focuses on the application of computer technology in various aspects of project cost management, analyzes the main problems existing in the current application, and puts forward some directional development ideas based on the application of computer application technology and project cost management. The software of project cost should be further refined and its application needs further promotion, In particular, the application of small and medium-sized enterprises needs to be further strengthened and deepened. The future development direction of computer technology in project cost management is to increase government investment, unify standards, reduce the cost of software, and make engineering management software affordable, useful, well used and live in various industries at all levels. Therefore, in the field of engineering, computer technology and network information technology are applied in an all-round way to serve the informatization of construction project cost management, so as to comprehensively promote the process of information management of engineering construction in China.

References 1. Li, H.: Application of software technology in engineering cost industry. Sci Technol Innov Guide (2009) 2. Li, X.: Discussion on how to use the bill of quantities valuation method to do a good job in project cost management. Urban Constr. 10 (2009) 3. Guo, J.: Comparative analysis of engineering cost management modes between China and developed countries. J. Northern Jiaotong Univ. 2(1), 23–24 (2015) 4. Xiao, Z.: On the application of value engineering to control municipal engineering cost. Ding Sci. Technol. Econ. Market 02, 69–70 (2007)

Short Term Power Load Forecasting Based on Meteorological Accumulation and AcA-GRNN Yiming Ma, Yongliang Li, Rui Ma, and Dongge Zhu

Abstract According to the characteristics of cumulative effect of meteorological conditions and different meteorological conditions on load, a weighted geometric distance formula is used to select training samples of neural network, which not only speeds up the training speed of neural network, but also strengthens the approximation ability of neural network. Compared with traditional neural networks, the training process of generalized regression neural network is actually adjusting the smoothing parameter sigma constantly. Therefore, the simultaneous interpreting of the different values of o has an important influence on the output of the network. When optimizing the smoothing parameters of the generalized regression neural network, the ant colony algorithm, a new optimization algorithm based on ant colony population, is used to optimize the smoothing parameters, which greatly reduces the subjective influence of artificial selection of parameters. Finally, the effectiveness of the model is verified by an example. Keywords Load forecasting · Meteorological accumulation · Generalized regression neural network · Optimization · Ant colony algorithm

1 Introduction At present, BP network of neural network has been widely studied in short-term load forecasting and achieved certain results. However, the number of hidden neurons and hidden layers is difficult to determine, which often affects the prediction effect. Y. Ma (B) · Y. Li · R. Ma · D. Zhu Electric Power Research Institute of State Grid Ningxia Electric Power Co., Ltd, Yinchuan 750002, China e-mail: [email protected] R. Ma e-mail: [email protected] D. Zhu e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_197

1509

1510

Y. Ma et al.

Although many scholars have made many improvements, they have not reached a unified conclusion. The generalized regression neural network (GRNN) used in this paper is a new type of neural network based on mathematical statistics. It has the advantages of fast calculation speed and automatic determination of network structure. Once the sample is determined, the training of GRNN is only a process to determine the smoothing parameter σ in the kernel function of the implicit regression unit. By establishing the objective function, the problem is transformed into a function optimization problem about σ. Traditional optimization algorithm is restricted by many conditions and easy to fall into local optimal solution. In this paper, a new simulated bionic algorithm ant colony algorithm is used to solve the problem, which can effectively avoid local optimization. At the same time, the cumulative effect of meteorological conditions is fully considered in the training of neural network, that is, the meteorological conditions of a certain day may affect the load forecasting of several consecutive days. The weighted geometric distance formula is used to select the days which are closest to the meteorological conditions of the forecast day as the training samples of the neural network, It also improves the generalization ability of neural network.

2 Analysis of Meteorological Factors 2.1 Accumulation of Meteorological Conditions There are many factors affecting the accuracy of load forecasting, among which meteorological conditions are one of the main factors. For example, the research object of this paper is the load of the main network in a certain area of Guangxi. The load base value of this area is relatively small, and there are many small hydropower stations which are self supplied. The proportion of industrial load is not as high as that of large power grid. The change of meteorological conditions often causes the load of main network to fluctuate greatly, and meteorological conditions (such as heavy rainfall on a certain day) will not only affect the load of that day, It may also affect the load for several consecutive days [1]. In view of this cumulative effect of meteorological conditions, process meteorological information. The relationship ii between the j j th meteorological characteristic relative value L i j and the actual value L i j is defined as.  L i j = L i j + ri j .L i−1 j

(1)

In the calculation, the above conversion scheme fully reflects the “cumulative effect” of meteorological characteristic values, but not all meteorological values have obvious cumulative effect. Some meteorological values only show certain cumulative effect when they reach a certain threshold. This paper takes the meteorological and load data of a region in Guangxi in 2005 and 2006 as an example. Based on

Short Term Power Load Forecasting Based on Meteorological …

1511

the historical data, it is found that the load in this area is greatly affected by rainfall, maximum temperature and minimum temperature. Therefore, rainfall accumulation, high temperature accumulation and low temperature accumulation are the main research objects. The statistical analysis shows that only when the rainfall of a certain day reaches the order of moderate rain (more than 25 mm), the high temperature in summer (more than 32 °C) and the low temperature (less than 10 °C) for several consecutive days in winter, the cumulative effect will appear. Therefore, this paper introduces “cumulative threshold function” μ to modify formula (1) as follows: Suppose that the j meteorological factor value of day i is the cumulative meteorological component wk , of the day after it wi j = h k .wi j .μ j

(2)

2.2 Evaluation Function of “similarity” of Meteorological Conditions Due to the influence of industrial structure, economic situation, geographical location and other objective factors in different regions of China, the influence of different meteorological conditions on the load of each power system is different [2]. According to the above meteorological cumulative effect, the prediction model selects training samples according to the “similar” degree of meteorological conditions between the forecast day and the known day, that is, the following weighted geometric distance formula is used as the evaluation function for selecting neural network training samples. min(ds ) =

n 

(wi [Ti (S) − Ri ]2 )

(3)

i=1

Among them, S is a certain day before the forecast date; Wi is the important degree coefficient of the influence of the first meteorological factor on the load; Ti (S) is the first meteorological factor of S day; and Ri is the first meteorological factor of the forecast day.

3 Generalized Regression Neural Network General regression neural network (GRNN) is a new type of neural network based on mathematical statistics proposed by Donald E. Specht in 1991. Its network structure is simple, even if the sample data is small, it can converge to the optimal regression plane, and as long as the sample data is determined, the network structure can be

1512

Y. Ma et al.

Fig. 1 The structure of GRNN

determined automatically, instead of artificially determining the number of hidden layers and hidden layer neurons like the traditional neural network, so as to minimize the impact of human subjective experience on the prediction results. The structure of generalized regression neural network is constructed, as shown in Fig. 1, which is composed of input layer, mode layer, sum layer and output layer. Similar to the structure of RBF network, the mode layer implicit regression layer   2  ( p)  generally adopts Gaussian kernel function exp(−x ( p) − c j /2σ ) as the transfer j function X0 of a neuron, which is the p-dimensional input vector of neural network and the p-dimensional center vector of kernel function corresponding to neuron J in mode layer. The sum layer has two units, the numerator and the denominator. The unit of output layer divides the numerator and denominator of sum layer, and then outputs the result.

4 Ant Colony Optimization Algorithm 4.1 Establishment of Objective Function Because the GRNN learning algorithm does not need to adjust the connection weights between neurons in the training process, but adjusts the transfer function of each unit in the mode layer by changing the smoothing parameter σ, thus changing the output results continuously. Therefore, determining the optimal smoothing parameter σ has a significant impact on the prediction results of GRNN. Theoretically speaking, the smaller σ is, the more accurate the approximation of the function is. Therefore, this paper makes σ belong to the (0,10] interval to meet the requirements [3, 4]. According to the Formula (1) and (2), the training samples are selected and divided into two parts, one is used for the training of neural network, the other is used for testing. Define the objective function as follows: 2

N L 1  [ yˆi j (σ ) − yi j ] min(ds ) = N j=1 i=1

(4)

Short Term Power Load Forecasting Based on Meteorological …

1513

4.2 Basic Ant Colony Optimization Algorithm Ant colony algorithm (ant colony algorithm) is a new optimization algorithm based on ant population, which was first proposed by Italian scholar M. Dorigo in 1991. It has the advantages of strong robustness, distributed computing and easy to combine with other algorithms. It was originally used to solve the traveling salesman problem (TSP). At present, ant colony algorithm has been successfully applied in many fields. If the model is modified properly, it can be used to solve other problems.

5 Conclusion In this paper, the GRNN network with fast calculation speed and automatic network structure is used to establish the load forecasting model. At the same time, the cumulative effect of meteorological conditions is fully considered in the neural network training. The training samples are selected according to the weighted geometric distance formula, and the new optimization algorithm ant colony algorithm with global optimization ability is used to optimize the smoothing parameters of GRNN, which has certain theoretical and practical significance. It should be pointed out that ant colony algorithm is a new type of optimization algorithm. It has shown good performance in solving combinatorial optimization problems, and has some research on solving continuous function optimization. However, there are still some defects in calculation speed and convergence, which need continuous improvement and perfection. This paper discusses the application of ant colony algorithm in parameter optimization. How to use the improved ant colony algorithm with faster calculation speed and better convergence to solve the parameter optimization problem will be the main research direction in the future.

References 1. Xie, H., Chen, Z., Niu, D., et al.: Study on daily load forecasting model of power system based on wavelet decomposition and meteorological factors. Chin. J. Electr. Eng. 21(5), 5–10 (2001) 2. Niu, D., Cao, S., Zhao, L., et al.: Power Load Forecasting Technology and Its Application. China Electric Power Press, Beijing (1998) 3. Hu, Z., Chen, X., Liu, S., et al.: Short term load forecasting system with automatic operation in Shenzhen Power Grid. Power Grid Technol. 27 (5) (2003) 4. Li, S., et al.: Ant Colony Algorithm and Its Application. Harbin Institute of Technology Press, Harbin (2004)

Reform and Practice of Traditional Chinese Medicine in Information Teaching Method Promoted by ID3 Algorithm Shumin Mao

Abstract Under the promotion of ID3 algorithm, the continuous development of information technology and the penetration of micro class and MOOC concept are increasingly affecting the reform of traditional classroom teaching mode of traditional Chinese medicine course. The application of information network teaching platform of Chinese pharmacy course plays an active role in classroom teaching. Under the promotion of ID3 algorithm, the reform and practice of traditional Chinese medicine in the information-based teaching method is of great significance to further explore the deep integration of classroom teaching and network teaching platform in the information environment. Keyword ID3 algorithm · Information teaching

1 Basic Concepts of ID3 Algorithm ID3 algorithm is a decision tree learning algorithm based on information entropy, which was proposed by Quinlan in 1986. He introduced Shannon’s information theory into the decision tree algorithm, used information entropy as the standard of selecting test attributes, classified the training instance set and constructed a decision tree to predict how to divide the whole instance space by attributes [1]. Let X be the training instance set, and the learning purpose is to divide the training examples into n classes, which are recorded as C = {X 1 X 2 , . . . X n }, and the number of training cases of class I is |X i | = Ci , X ; the total number of training instances in X is |X |, if the probability of an instance belonging to class I is P(xi ), then: P(xi ) =

Ci |X |

(1)

S. Mao (B) Department of Infornation Engineering, Laiwu Vocational and Technical College, Jinan 271100, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_198

1515

1516

S. Mao

Fig. 1 Decision tree generated by ID algorithm

In this case, the uncertainty degree of decision tree to partition C is H (X, C), which can be abbreviated as H (X ): H (X, C) = −



P(X i ) log P(X i )

(2)

The learning process of decision tree is a process that makes the uncertainty of decision tree partition decrease gradually. If the test attribute a is selected for testing, suppose that attribute a has the properties a1 , a2 , a2 , . . . , ai if A = a j , the number of instances belonging to class I is Ci j . Remember: P(xi A = a j )

Ci j |X |

(3)

That is, P(xi A = a j ) is the probability that test attribute A belongs to class i when its value is a j . When y is a = a, the uncertainty of decision tree to classification is the condition entropy of training instance set to attribute A. H (Y j ) = −



  P(X i  A = a j ) log P(X i  A = a j )

(4)

i

Obviously, the smaller the value of Formula (1), the larger the value of Eq. (4), which indicates that the greater the information provided by test generatrix a for classification, the smaller the uncertainty degree of classification after selecting A. ID3 algorithm takes H (X, C) as the selection standard of test attributes to segment the training instance set and finally generate a decision tree. As shown in the figure Fig. 1 decision tree generated by ID algorithm.

2 Construction of Integrated Platform for Informatization Teaching of Traditional Chinese Medicine The construction of middle school curriculum platform in the information-based teaching integrated platform includes basic information, teaching activities, teaching resources, etc. The construction of curriculum basic information mainly includes

Reform and Practice of Traditional Chinese Medicine …

1517

course introduction, syllabus, teaching calendar and information of teachers; the construction of curriculum teaching activities mainly includes curriculum general.The construction of teaching resources mainly includes text resources, video resources, online test questions, etc.

3 Reform of Deep Integration of Classroom Teaching and Network Teaching of Traditional Chinese Medicine To carry out the practice of online teaching platform of Chinese pharmacy course to assist classroom teaching, promote the deep integration of classroom teaching and network teaching, and build an open interactive communication platform for students’ autonomous learning and research-based learning.

3.1 Promote Deep Integration Based on Micro Idea Under the guidance of micro concept, the network teaching platform of traditional Chinese medicine course is mainly to solve the key and difficult problems in the classroom teaching of Chinese pharmacy. In the broadcast unit of the platform, we should carry out the resource construction of the broadcast unit under the guidance of micro idea, develop targeted micro video, micro test, micro training, micro discussion, etc., to promote the integration of micro teaching mode and traditional classroom teaching mode. To carry out the practice of micro teaching mode in the teaching of traditional Chinese medicine, such as the production of micro video with tangerine peel and green peel as the core content, aiming at the key traditional Chinese medicine pairs in the classroom teaching of traditional Chinese medicine.micro video set up a micro test to evaluate the learners’ mastery of relevant knowledge points, such as discrimination of similar drugs for difficult problems in the classroom teaching of traditional Chinese medicine.

3.2 Promotion of Teacher Student Interaction Based on Problem Discussion Guidance The integrated platform of network teaching of Chinese pharmacy course is not only a platform for students to obtain the teaching resources they need, but also a platform for students to participate in effective teaching activities in the second classroom [2]. Combined with a series of related problems such as classic culture, scientific research and innovation, which have been relatively mature in the classroom teaching practice of traditional Chinese medicine, teachers or students put forward questions in the

1518

S. Mao

classroom teaching. After class students analyze the problems through self-learning, share relevant topics in the discussion area, and communicate and discuss with teachers and other learners in a timely manner. Students can post on the integrated platform of online teaching of traditional Chinese medicine course, and teachers can answer the questions; students can also participate in the questionnaire of traditional Chinese medicine course, and timely feed back the relevant teaching information to the lecturer. Teachers give students reasonable thinking guidance, immediate evaluation and real-time feedback, so as to optimize the interaction between teachers and students.

4 Reform and Practice of Traditional Chinese Medicine in Information Teaching Method 4.1 Carrying Out Research Teaching to Promote Deep Integration The network teaching platform of Chinese pharmacy course is an effective carrier for students’ autonomous learning and research-oriented learning. With the help of the platform, the research-oriented teaching is integrated with the design concepts of case teaching, sandwich teaching and split classroom. 8–8 students in each group will be assigned to discuss in groups, and each group will complete the research report according to their needs. The research-oriented teaching pays attention to the design of collaborative and interactive learning, establishes the learning community and realizes the cross group learning reasonably; the research-oriented teaching attaches importance to the design of learning evaluation, and completes a series of evaluation work such as group mutual evaluation, intra group mutual evaluation and self-evaluation.

4.2 Introducing Student Teaching Assistants to Promote Deep Integration In the process of constructing the new teaching mode of Chinese pharmacy course, we should pay attention to the initiative of student teaching assistants and introduce them into the teaching and research work. After systematic training, they will participate in the whole process of teaching and feedback students’ teaching needs and suggestions in time. Student assistants assist the lecturer to complete the daily teaching arrangement, carry out research-oriented teaching and practical teaching, and maintain the course network of traditional Chinese medicine.Network teaching integrated platform, participate in micro video production, etc. Under the information environment, the exploration and practice of new teaching mode of Chinese pharmacy

Reform and Practice of Traditional Chinese Medicine …

1519

cause the teaching workload to rise. The reasonable introduction of student teaching assistants will help to promote the exploration and practice of the new mode of Chinese pharmacy curriculum, and also give full play to the students’ teaching assistants’ mobility, exercise their comprehensive ability and deepen the student-centered teaching service model In this paper [3, 4].

5 Conclusion To carry out the construction and application of comprehensive platform resources of Chinese pharmacy course network teaching, promote the deep integration of classroom teaching and network teaching of Chinese pharmacy course, and help to improve students’ autonomous learning ability; based on the integration, carry out research-based teaching and problem discussion guided teacher-student interaction activities to cultivate students’ Application ability and innovation ability; The integration of online and offline formative assessment based on fusion helps to realize the trace management of students’ formative assessment process.

Reference 1. Shi, Z.: Knowledge Discovery. Tsinghua University Press, Beijing (2002) 2. Guo, J., et al.: Study on parallelism of decision tree algorithm [small computer engineering], 2 (2002) 3. Teng, H., et al.: Research on improving decision tree. J. Jinan Univ. 16, 231–233 (2002) 4. Yang, M., et al.: Study on decision tree learning algorithm ID3. J. Comput. Dev. 12 (2002)

Research on the Development and Application of Sports Video Analysis Platform in Sports Training Zili Niu and Fei Wang

Abstract In view of the shortcomings of the modern sports training video analysis system, a new sports training video analysis system is proposed. This paper comprehensively analyzes the functional requirements of the sports training video analysis system, and then takes the digital processor as the core of the system, so as to realize the sports training video data collection, storage and target tracking. After that, the paper introduces the way of connecting the multimedia structure and digital processor, gives the target tracking model of sports training video based on Markov chain, and realizes the synchronous playing of sports training video and the synchronous tracking function of multiple dynamic targets through studio. Finally, experiments show that the sports training video analysis system designed in this paper has strong target tracking ability, and the cost is relatively low. Keywords Sports training · Sports video · Video analysis · Studio

1 Introduction In the process of the continuous development of modern video and image processing technology, sports training is gradually developing towards the direction of intelligence and science. Using the method of video frame sequence analysis to realize the collection of sports training action characteristics and information recovery, can correct the irregular sports training action, and realize the improvement of sports training level. Using embedded control chip to design and develop the system can realize the communication of motion video information and real-time monitoring. Based on the Internet of things environment, the integrated control of sports training video information can effectively guide sports training. In the process of sports video Z. Niu Sports Institute of Wuhan Business University, WuHan 430056, HuBei, China e-mail: [email protected] F. Wang (B) WuXi City College of Vocational Technology, Wuxi 214000, JiangSu, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_199

1521

1522

Z. Niu and F. Wang

analysis and design in this paper, the focus is on the design of hardware and software. Based on the hardware creation of video collection and analysis system, the software design of sports video analysis system is analyzed. The traditional methods of motion video analysis use embedded design, but in the process of increasing interference, the automatic control and scheduling of video analysis system will be distorted and the control performance will be reduced. In view of the problems in the current sports training video analysis system, this paper implements a new sports training sports video analysis system, and then uses simulation to test the performance of the system, so as to verify the stability and reliability of the system.

2 Requirements of Motion Video Analysis System Traditional sports training video analysis system is mainly based on human eye observation and analysis, which has serious shortcomings and limitations. The purpose of sports analysis is to be able to use the video of athletes training and competition for a comprehensive analysis, through the correlation of video images in space and time, so as to get the relevant parameters of human kinematics, and also to get the information that coaches and athletes hope, so as to conduct scientific guidance training [1]. According to the related software development platform, this paper realizes the design of sports video analysis system in sports training.

3 Design of Motion Video Analysis System 3.1 Function Design of Motion Video Analysis System In this paper, we mainly implement human motion analysis on monocular video. Figure 1 is the functional framework of motion video analysis system [2]. The system designed in this paper controls the moving video through DirectShow technology, uses the mosaic based image phase technology to extract the background information in the video, realizes the time-domain segmentation of the video image, extracts the video moving object, and finally realizes the synthesis of panoramic image. The static background is filtered by the inter frame difference method to suppress the background. Combined with color block matching and Kalman filter, the key parts can be tracked automatically, and the human motion parameters can be obtained.

Research on the Development and Application of Sports …

1523

Fig. 1 Functional framework of motion video analysis system

3.2 Hardware Structure of the System In the process of realizing the hardware structure design of the sports video analysis system, the digital processor is particularly important. This paper uses the internal and external storage structure of tms236351 and tms236351 processor. The internal fast buffer storage area belongs to the dual computer buffer architecture. The storage space and digital signal processing area include the first level buffer architecture, because the processor has dynamic random access memory, It can not lose sports training video data in case of sudden power failure. The hardware structure of sports training video analysis system mainly includes power module, synchronous control chip, video collection and processing module, multimedia structure and external memory. The system uses storage bus to allocate storage address through processor and surrounding components for storage. In the process of video analysis, the system can realize video analysis, The storage bus transmits video to the collection processing module. The main purpose of the network control chip is to realize the network bandwidth adjustment. The main purpose of the power module in the system is to provide power for the video collection and processing module, the processor and the storage bus, so as to ensure the stable operation of the system. In order to effectively ensure the security of the modules and components in the operation process, when the system is

1524

Z. Niu and F. Wang

Fig. 2 Connection diagram of multimedia interface and processor

to be shut down, the storage bus power should be turned off first, then the processor power should be turned off, and finally the video collection and processing module should be turned off. Multimedia interface is the main output end of the system. Before analyzing the video, the connection between multimedia and processor should be defined effectively to ensure the integrity of video content. Figure 2 shows the connection between multimedia interface and processor.

3.3 Design of Image Processing Algorithm The specific algorithm is: assuming θ represents the gradient direction of motion monitoring video image, the direction space is 0°–360°, Hg represents the gradient histogram feature, 0 represents the non signed gradient direction space between 0° and 180°, the feature is HOG, i represents the quantization channel in gradient direction, the value is M H G (i), l represents the number of channels, then the HOG calculation method is:    L   (1) M H OG (i) =  M H G (i) + M H G (i + ) 2 In order to effectively control the shortcomings of traditional HOG algorithm, DiffHG is defined as the absolute value of the difference between hy(i) and hy (i + L/2) in each ce of HG:     L MDiffHG (i) =  M H G (i + )−M H G (i) (2) 2 L +1≤i ≤ L 2

(3)

In the process of video capture, due to the randomness of external environment and motion process, the interference becomes more and more diversified and complicated [3]. There are too many noise interferences in the monitoring image, and a large gradient peak is derived from the extracted Hg behavior characteristics. Therefore, image interference processing must be carried out.

Research on the Development and Application of Sports …

1525

4 Development and Implementation of Sports Video Analysis System Based on Sports Training The embedded Linux system in the motion video analysis system is mainly divided into four levels. Firstly, using bootloader method, loading video image processing algorithm of motion video integrated control, initializing VNE bus transmission clock, compiling kernel D/A resolution, controlling the normal operation of different file systems, constructing Linux root file system, realizing D/A conversion of MXI bus control in motion video. The main task of the Linux embedded system kernel is to give full play to the specific functions of the motion video analysis system, transmit, transmit, convert, sample and cross compile in the device, add the system environment variables based on the compiler path, and realize the detailed recording of multi-channel data information. The ini process is further executed to configure the kernel and files [4]. Thirdly, the goal of file system is to implement the storage and scheduling of motion video integrated intelligent control data. Fourthly, the task of user application module is to design the interface between program and device. Based on the kernel configuration and compilation, according to the mode of operating conventional files, the user application module can access and control the hardware device and realize the read–write operation of the device.

5 Conclusion In a word, in order to effectively guarantee the scientificity and perfection of sports training guidance, measures must be taken to improve the efficiency and quality of guidance. Therefore, it is imperative to design and develop a new sports video analysis system in sports training. Through the overall design of the system, the detailed design of the system is carried out, and finally the performance test is carried out. The practical results show that the reliability and stability of the system are good. It can not only accurately and comprehensively describe the whole process of sports training, but also improve the accuracy and comprehensiveness of video key frame extraction, and the recall rate is very high, Its practicability and application value are very prominent when it is applied to the guidance of sports training. Acknowledgements Wuhan Business University, Research on the Current Status and Solution of College Students’ Physical Exercise under the Background of Healthy China—Taking the example of Wuhan Business University, 2018KY002.

1526

Z. Niu and F. Wang

References 1. Hong, L., Chen, Y., Jiaqu, et al.: Development of land training and testing equipment for sports balance ability. Sports Sci. 15(11), 61–66 (2015) 2. Yin, Y.: Development and research of sports evaluation decision support system based on data mining. Mod. Electron. Technol. 9, 108–111 (2017) 3. Xian, L.A., Pan, W.: Research on video object location technology of sun shadow. Electron Technol. 6 142–145 (2017) 4. Chen, J., Liu, X.: Application of computer multimedia technology in auxiliary physical education. Autom. Instrum. 2, 129–130 (2017)

Calligraphy Teaching System in Primary and Secondary Schools Based on Artificial Intelligence Xuxia Ouyang

Abstract Aiming at the demand of artificial intelligence popularization education, this paper designs and implements a web-based a-algorithm visual assistant teaching system. The system realizes the functions of algorithm visualization teaching, adaptive test, learning navigation based on knowledge map, knowledge recommendation and so on. This paper introduces the system structure design, algorithm visualization process, adaptive test based on learner model and knowledge map, knowledge recommendation and other key issues. Calligraphy is one of the quintessence of Chinese excellent traditional culture, and the writing level is the concentrated embodiment of one’s comprehensive quality. The 2017 edition of the new curriculum standard strongly advocates the integration of excellent traditional culture into all aspects of student education. But in recent years, with the rapid development of artificial intelligence technology, calligraphy teaching in primary schools has encountered unprecedented challenges and opportunities. Keywords Artificial intelligence · Primary and secondary school teaching calligraphy · Teaching system

1 Introduction In an interview with the media before the “two sessions”, Minister of education Chen Baosheng also clearly pointed out: “in the revision of curriculum standards for primary and secondary schools, we should increase the proportion of Chinese excellent traditional culture such as calligraphy. But in the era of rapid development of artificial intelligence technology, students are increasingly indifferent to the study of writing and calligraphy, and even feel that it is useless to write good characters in the information age. If this goes on, as one of the quintessence of Chinese excellent traditional culture, calligraphy art will fall into a dangerous situation. Therefore, X. Ouyang (B) Jiangxi Engineering Vocational College, Jiangxi Open University, Nanchang 330025, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_200

1527

1528

X. Ouyang

the front-line teachers have the obligation and responsibility to analyze the difficulties of students’ calligraphy learning under the impact of artificial intelligence, constantly explore effective measures to improve the artistic quality of calligraphy, arouse students’ enthusiasm for learning calligraphy, and guide them to actively inherit and carry forward the art of calligraphy.

2 Design and Implementation of Teaching System Based on Artificial Intelligence 2.1 Design and Implementation of Visual Teaching Module The purpose of algorithm dynamic visualization teaching module is to realize the dynamic visualization of algorithm principle into visual teaching system. The system should solve the problem of visualization of algorithm execution process (2) system interactivity (3) necessary theoretical explainability. In view of the visualization of algorithm execution process, we need to analyze each algorithm principle in the process of designing the visualization teaching module [1]. By splitting the internal execution process of the algorithm, a number of sub processes P (where i = 1, 2, . . . , n) are obtained (n), where f is the function to realize the graphic visualization of the subprocess Pi . Finally, the teaching visualization function of algorithm principle is realized by calling Fi .

2.2 Determination of Students’ Learning Speed Calligraphy In the student model to measure students’ learning speed. Learning speed is an important index to measure the learning effect. We use fuzzy sets to express it. If the sum of the shortest learning time of the components used in the current micro strategy is T imemin , the maximum learning time and the actual learning time of the students are T imemax ,be. T =

⎧ ⎨

T imemin T imetr ue ≤ T imemin T imetr ue T imemin ≤ T imetr ue ≤ T imemax ⎩ T imemax T imetr ue ≤ T imemax

(1)

Calligraphy Teaching System in Primary and Secondary Schools …

1529

Fig. 1 Design flow of interactive teaching system of calligraphy in primary and secondary schools

3 Structure Design of Calligraphy Interactive Teaching System in Primary and Secondary Schools 3.1 Model Design of Calligraphy Interactive Teaching System This research design comes from “the design and development of calligraphy interactive teaching resource platform”. On the basis of participating in the design research, a series of primary school calligraphy interactive teaching system resources are designed based on the guidance of situational cognitive theory. Based on the analysis of learning contents and objectives, in view of the particularity of primary school calligraphy and the characteristics of learners, the implementation process of the following system design is formulated, as shown in Fig. 1: In order to improve the limitations of traditional calligraphy teaching, we can achieve a variety of teaching modes, such as teacher’s classroom demonstration mode, multimedia classroom teaching mode and so on. The primary school calligraphy interactive teaching system is based on the “calligraphy practice guide”. Under the guidance of situational cognitive theory, the teaching content covers different types of media resources, such as text resources, audio-visual resources, online learning resources and mobile learning resources, and follows the principle of “comprehensive, anytime and expanding” [2]. Each module has the first mock exam and the specific function and advantage. It is an educational product serving the whole process of calligraphy teaching. Calligraphy teaching is relatively traditional. Pupils are not self-control and active, so it is difficult for students to focus their attention all the time. Therefore, situational teaching mode is used to let students “move” in the whole learning activities. Therefore, human–computer interaction and human–computer interaction run through the whole platform, which will be described in detail in the following two parts. Through

1530

X. Ouyang

a series of learning processes, such as task situation, resource situation, activity situation, evaluation situation and learning feedback situation, it provides support for the development of calligraphy teaching.

4 Module Division of Calligraphy Interactive Teaching System Based on the cognitive characteristics of learners, combined with the teaching content and function of primary school calligraphy interactive teaching system, the whole system is divided into three parts for design, They are computer hardware design, software resource design, transmission and interaction design. The hardware support system of this platform mainly includes teacher demonstration terminal, student practice terminal and other external teaching calligraphy auxiliary equipment (high-resolution instrument, writing pad, digital induction pen, electronic whiteboard, teaching and learning integrated machine), etc., which is mainly to meet the learning mode of teachers’ classroom demonstration and autonomous learning. Software system mainly refers to the development and application software involved in the design process of this platform, especially in the design of information-based teaching resources, the organization of knowledge points is presented in the structure of related network knowledge chain. The digital assistant teaching platform is actually the concrete connection between the server (teacher machine) and the client (student machine) to realize the realtime transmission and interaction of data. This situation is particularly beneficial to the teacher’s classroom demonstration teaching mode, realizing the communication between teachers and students, students and students. The biggest advantage of the primary school calligraphy interactive system based on Situational Cognition Theory is that it can realize real-time interaction with teaching content in a specific learning situation. The real-time stroke track of learners is transformed into 32 bit bitmap information by compiler, and the data is transmitted to the communication interface to realize the dynamic effect of writing track on the display, Using the stroke recognition function to bring more direct human–computer interaction to learners.

5 Interface Design of Calligraphy Interactive Teaching System in Primary and Secondary Schools And support primary school calligraphy interactive teaching system in the threedimensional layout, strictly follow the principles of overall completeness, scientific and reasonable design layout, consistent overall style and strong practicability. In the context design, we pay attention to the combination of dynamic and static. The effect of ink splashing animation can highlight the flexibility of calligraphy. The main

Calligraphy Teaching System in Primary and Secondary Schools …

1531

layout is flexible and ancient rhyme style. The main interface shows all the units and classes of calligraphy in this book in detail. It can attract the attention of primary and secondary school students by highlighting the unit list, vivid background music and live dubbing system. The art of calligraphy expresses people’s emotions and emotions by sketching lines, “joy reflects stretching, anger reflects roughness, sadness reflects depression, and joy embodies beauty” [3]. Different structure, brushwork, composition and even habits and personalities can lead to different forms of calligraphy. From the psychological point of view into the design of the teaching system, interface design in line with the cognitive characteristics of students, all levels of navigation directory jump flexible humanized, so as to attract learners’ interest in calligraphy. Let students look at calligraphy learning in many ways, and increase calligraphy knowledge and skills in the interaction with teaching content.

6 Conclusion Under the advance of further in-depth theoretical and practical research, through understanding the current situation of calligraphy education in primary and secondary schools, the importance of calligraphy education in primary and secondary school learning stage is clarified, which lays the foundation for cultivating students’ personalized learning, autonomous learning and writing ability, and makes contributions to the promotion of quality education. By analyzing the problems existing in primary school calligraphy education, this paper clarifies the main purpose of the design of primary school calligraphy interactive teaching system. Calligraphy education is a combination of theory and practice. Both classroom teaching and students’ autonomous learning should be carried out in an intuitive and visual way. The basic knowledge of calligraphy is relatively abstract. Combined with the cognitive characteristics of primary school students, through the integration of multimedia teaching resources such as micro lecture, audio and animation, the learners have strong learning interest and motivation, and the interactive demonstration and practice between the learners and the teaching content are added, which makes calligraphy learning more interesting, It is of great significance for the cultivation of primary school students’ innovative thinking ability, and it also strengthens students’ understanding of Chinese traditional culture. Acknowledgements Research Project of Humanities and Social Sciences of Advanced School of Jiangxi Province (No. YS1404)

1532

X. Ouyang

References 1. Pu, W.: Human interaction behind human computer interaction. Comput. Knowl. Technol. 15, 4157–4159 (2010) 2. Feng, J.: Research on the Human Human Interaction Interface Model and Its Application. Chinese Academy of Sciences (2000) 3. Yuan, B.: Conceptual framework features and key technologies of new generation (fourth generation) human computer interaction. Acta Electron. Sin. 12, 1946–1948 (2003)

Automatic Generation Algorithm of Electrical Wiring Diagram for Distribution Network Based on Topology Stratification Lin Qiao

Abstract The automatic generation of electrical wiring diagram of distribution network is a complex optimization problem. Its essence is to determine the relative coordinate position of each equipment in the distribution network topology in a plane. In this paper, a mapping algorithm based on topological layering is proposed. Firstly, a three-layer simplified hierarchical mapping topology model is constructed based on the original topology model. On this basis, the automatic mapping problem is decomposed into three steps: preliminary layout, skeleton routing and complete drawing. The layout algorithm based on gravity repulsion model is used to complete the preliminary layout. The power station is mapped by equipment classification and comparison of the inclination angle of the outgoing line. The algorithm based on the priority of regional distribution lines is used to complete the non overlapping cross wiring of the main lines, and finally the electrical wiring diagram of the distribution network completely corresponding to the original topology is generated. An example of a city distribution network shows the effectiveness of the proposed algorithm. Keywords Distribution network · Electrical wiring diagram · Automatic mapping · Hierarchical topology model · Preliminary layout · Skeleton wiring

1 Hierarchical Topology Model of Distribution Network Distribution network has the characteristics of large number of equipment and complex topology structure. It is very complex to directly calculate the reasonable coordinate position of all equipment in the wiring diagram at one time. In this paper, the distribution network topology is abstracted into a hierarchical structure, and the mapping based on the hierarchical model will greatly reduce the difficulty of solving the problem. On the premise of strictly following the actual power grid topology connection relationship, the electrical wiring diagram of distribution network only displays the L. Qiao (B) Yunnan Institute of Economic Management, Kunming 650000, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_201

1533

1534

L. Qiao

backbone equipment in the topology in a graphical way. Therefore, it is necessary to simplify the original topology including all equipment before mapping. It mainly includes the following three aspects [1]. (1)

(2)

(3)

Delete incomplete lines. In the original topology, the branches or outgoing lines that do not end with load and distribution transformer do not constitute a complete power transmission line, so it is not necessary to draw them in the wiring diagram. Combine the series wire equipment, merge the direct series connection in the original topologyIt can reduce the number of mapping devices without changing the original topology connection structure and the accuracy of the final mapping results. Remove redundant switchgear. In the original topology, only one of the switches connected in series in the original topology can be reserved in the wiring diagram, and the breaking state of the reserved switchgear is taken as the union of the breaking states of the previous series connected switchgear.

2 Construction of Hierarchical Topology Model Based on the skeleton topology model, if we continue to abstract all power stations into a single node. The main line is abstracted as a single wire device, and all nodes in the topology model are abstract nodes or key nodes of power station, and they are directly connected by a short line. This layer model is the final abstraction of the distribution network topology model [2]. The layout position of the abstract node of the power station roughly determines the coordinate position of the equipment in the whole power station, and the key node roughly determines the coordinate position of all the equipment outside the station. The graph topology model is formed in the process of gradually abstracting the distribution network topology, which is a process of gradually reducing the solution dimension of automatic mapping problem. In this paper, the mapping process is opposite to the above abstract process, and the layout, skeleton and mapping topology modules will be applied in turnAutomatic generation of electrical wiring diagram of distribution network is realized step by step. The corresponding relationship between them is shown in Fig. 1.

3 Preliminary Layout of Automatic Mapping The principle of the placement algorithm based on the gravity repulsion model is that after abstracting the layout object as a node edge model, the repulsion force is introduced between each node to separate all nodes from each other. At the same time, the two nodes connected by edges are endowed with gravity so that they can

Automatic Generation Algorithm of Electrical Wiring Diagram …

1535

Fig. 1 Application of 3-layer topology model in automatic mapping process and the corresponding relationship between them

not be completely separated. When the forces of all nodes reach balance, the layout ends.

3.1 Calculation of Node Coordinate Moving Distance In the layout, an ideal length value L 0 : lshould be assigned to the edge connecting a node. L 0 = k(n 1 L 1 + n t L t + n s L s )

(1)

where: n 1 , n 2 , n 3 the number of conductor equipment, distribution transformer equipment and switch equipment of the side in the corresponding original distribution network topology; L 1 , L 2 , L 3 . They are the length values of conductor equipment, distribution transformer equipment and switch equipment set in drawing; K is the scale coefficient, and the empirical value k1 = 2.5. The gravitational force F between the two end nodes connected by the edge is: Fk = k g (r L 0 − L 0 )

(2)

where: k is the gravitational scaling coefficient, and its size determines the growth speed of the edge length in the layout. Generally, the empirical value k = 1.5 is taken; L is the actual length of the edge; R is the ideal length L of the edge in the calculation of gravity. If the length of the edge increases rapidly in the iteration process, the value of the variable introduced by crossing each other is calculated according to Formula (3).

1536

L. Qiao

 r=

0.1 × (1 + 1n < 450

n )n 50

< 450

(3)

In the formula: n is the number of times of this cycle, which means that the value of R increases by 0.1 every 50 iterations, and the ideal length is directly substituted into the calculation of gravity after 450 iterations. The setting of this parameter plays an important role in the process of realizing the reasonable layout of each node. The moving distance of the nodes at both ends of the edge under the action of gravity f is as follows. 

V (x)−V (x)

dx = Fr i L i V (y)−V (y) d y = Fr i L i

(4)

where dx And dy They are nodes V and F, respectively. The moving distance along x-axis and y-axis respectively; Vi (x) and Vi (y) are the horizontal and vertical coordinates of node Vi ; respectively. For node V j , the calculation of the moving distance is similar to that of node V.

3.2 Layout End Condition Let dm . Represents the maximum moving distance of the node along the x-axis and Y-axis directions during each iteration. When dm is less than a certain value, all nodes are in a relatively stable state, and the initial layout process is finished.

4 Automatic Mapping and Complete Drawing The complete drawing of power station outgoing line is to determine the coordinate position of each equipment according to the mapping position determined in the process of skeleton wiring and the corresponding equipment in the original topology and the topological connection sequence among the equipment. According to the previous definition, the number of equipment corresponding to the branch line in the original topology is small, and the space occupied by the drawing is small, so it can be directly drawn In one direction [3, 4]. The branch lines are directly connected to the key node, and the specific coordinate position of each equipment in the branch line can be determined by the coordinates of the key node.

Automatic Generation Algorithm of Electrical Wiring Diagram …

1537

5 Epilogue According to the characteristics of large number of equipment and complex topology of distribution network, this paper proposes an automatic mapping algorithm based on topology hierarchy. The algorithm first constructs three layers of simplified hierarchical mapping topology model based on the original topology model, and then realizes the automatic mapping of electrical wiring diagram by using different algorithms in three steps. The hierarchical and step-by-step and step-by-step refinement of the mapping idea effectively reduces the difficulty of solving the automatic mapping problem, and realizes the automatic generation of electrical wiring diagram of distribution network. The effectiveness of the algorithm is verified by different practical examples.

References 1. Jian, L., Wu Y., Liu, G.: Conversion from geographical map of distribution feeder to electrical wiring diagram. Power Syst. Autom. 29(14), 73–77 (2005) 2. Fang, Z.: Research on automatic mapping of electrical system wiring diagram of urban distribution network. Electron. World 2012(15), 40–42 (2012) 3. Wei, S., Wu, W., Zhang, B., et al.: Automatic generation algorithm of power flow single line diagram in energy management system. Power system automation, 2010(5), 48–52 (2010) 4. Zhang, J., Ye, L., Sun, W., et al.: Automatic generation of provincial transmission network uniform connection diagram based on geographical relative position. Power Syst. Autom. 20(4) 55–59

Neural Network Prediction Model of Real Time Data of Thermal Power Plant Based on L-M Algorithm Yanfang Qiao

Abstract A neural network prediction model for real-time data of thermal power plant based on levenber rg-m arquardt (L-M) algorithm based on BP neural network is proposed to reduce the training times and improve the training accuracy. The importance of data preprocessing is analyzed by training and checking the inlet temperature of high pressure heater of a 300 MW unit in a power plant. The simulation results show that the model can obtain reasonable prediction results at the future time, which can be used for missing data supplement and real-time data verification, improve data reliability, and be suitable for online evaluation of future state, and provide reference for condition based maintenance. Keywords Thermal power plant · L-M algorithm · BP neural network · Real-time data neural network · Prediction model · Data preprocessing · Simulation

1 Introduction Thermal power generation is a complex thermal process and there are a large number of random processes, so the real-time data of generating units belong to discrete time series, while the artificial neural network has good nonlinear mapping characteristics, fault tolerance and generalization ability, and can make good time series prediction. In this paper, the inlet temperature data of high-pressure heater of a 300 MW unit in a power plant is preprocessed, and the real-time data neural network prediction model is established by using L-M algorithm on BP neural network, and the reasonable prediction results are obtained through simulation research.

Y. Qiao (B) Department of Mechanical and Electrical Engineering, Xilingol Vocational College, Xilingol League, Xilinhot 026000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_202

1539

1540

Y. Qiao

2 Basic Principles of Time Series Prediction 2.1 BP Neural Network Multilayer forward BP network is one of the most widely used neural networks. Its model includes input part, input layer (hidden layer 1), hidden layer (existing in multi-layer network) and output layer [1]. The layers are connected by weights. The learning process includes the forward propagation of signals and the back propagation of errors. The core of the learning process is to continuously adjust the network parameters (weight and threshold) by backward propagation error and correcting the direction of error, so as to approach the desired input–output mapping relationship.

2.2 L-M Training Algorithm L-M optimization algorithm is an improved form of Gauss Newton method. It has both local characteristics of Gauss Newton method and global characteristics of gradient method. It is obviously superior to conjugate gradient method, momentum gradient method and BP algorithm with variable learning rate in convergence speed and training accuracy. Set up x = [w1 (1, 1)w2 (1, 2) . . . w2 (si , R)b1 . . . b1 (s1 )w2 (1, 1) . . . b3 (sm)]

(1)

mse(x) is the Rumelhart performance function and mse(x) is the sum of the response errors of the output nodes of BP network under the stimulation of the s-th learning mode of the knowledge set e1 (x) =



  mse1 (x), mse2 (x) mse N (x)

g(x) = mse(x) = H (x) =2 mse(x) = E(x) =

2 T J (x)e(x) N

2 T {J (x)J (x) + E(x)} N

N 

es (x)2 es (x)

(2) (3) (4)

(5)

s=1

where: J (x) is Jacobi matrix, xi ∈ x(i = 1, 2, . . . , N p) is the ith element of parameter vector x,ei (x) ∈ e(x)(i = 1, 2, . . . , N ) is the I th element of vector e(x), H (x), g(x) are the Hesse matrix and gradient vector of Rumelhart performance function at point X , and E(x) is the error function.

Neural Network Prediction Model of Real Time Data of Thermal … Table 1 Segmentation method of sample data

Input

1541 Output

x(1), x(2), . . . , x(n)

x(n + 1)

x(2), x(3), . . . , x(n + 1)

x(n + 2)

.. .

.. .

x(k), x(k + 1), . . . , x(k + n)

x(n + k + 1)

2.3 Principle of Time Series Prediction One of the essential characteristics of time series is the dependence of adjacent elements. Time series prediction is to use a certain model to reflect the correlation between time series elements, according to which the future time can be predicted. N-step time series prediction refers to predicting the time value from t + 1 to t + n according to t time and previous values [2]. In order to ensure that the input time series can find a good matching correlation, the training samples are divided into overlapping data segments, which increases the correlation information and improves the prediction accuracy. For predicting the value of the next time by using the past consecutive n(n ≥ 1) moments, the sample data is divided into k groups, and the segmentation method of sample data is shown in Table 1.

3 Real Time Data Prediction Model of Thermal Power Plant The inlet temperature of high-pressure heater of a 300 MW unit in a power plant is selected as the research object, and the data is from the unit DCS. After sorting out, it is found that the number of intervals is inconsistent. Considering that the unit load of the power plant is not significantly affected by the power grid dispatching, the temperature changes slowly under stable operation conditions, and the hourly sampling is sufficient to reflect its change rate, so the inlet temperature of highpressure heater is used.Taking the average value of degree per hour as the sample set element, a three-layer BP neural network is established, and the real-time data is learned and trained by using L-M algorithm to complete one-step prediction. On this basis, the prediction results are introduced to predict the next step, and then the prediction model of temperature value in the future is established.

1542

Y. Qiao

4 Data Preprocessing Effective data processing before training is an important factor to ensure the success of network training. The results show that the maximum change of data collected in a certain period is 2.4789 °C, the maximum change and the minimum change between two adjacent data are 1.6048 °C and 0.002 5 °C, which generally change little. Therefore, the following two methods are used for data processing. (1) x0 = (x − min)/(max − min) was used for data processing. Among them, Max and min should not directly select the maximum and minimum values in X , because the samples are only limited observations, and there may be larger or smaller observations [3, 4]. Therefore, the appropriate choice should be max selection is larger than the sample maximum value, min selection is smaller than the sample minimum value. (2) The data processing is carried out by using the method of x0 = 1/(1 + e x ) sigmo D function transformation. Simulation and result analysisThrough the data of the first 14 h and the data of the last 7 h, a three-layer BP neural network is established. The calculation and analysis show that when the neural elements of the network are 20, 40 and 1 respectively, the prediction accuracy is higher than that of the similar network. On this basis, the results of network training are given. It can be seen that the training results are in good agreement with the expected values, indicating that the training of the network is successful. Because the actual value is replaced by the predicted value, the prediction error increases with the increase of L, so the predicted value (trend) after 4 h in the future can not reflect the actual situation. At the same time, as time series prediction, the network trained from the data of adjacent stages can reflect the future data trend better. Therefore, when the prediction time exceeds the function range of the network, it is necessary to re learn the network.

5 The Significance of Neural Network The quality of data preprocessing directly affects the performance and practical value of the network, especially for the sample sequence of small digital signals loaded with associated information, which is the key to the success or failure of training. Considering the influence of big data on small digital information inundation, due to the inevitable disturbance, we can’t exaggerate the digital information, otherwise the fault tolerance ability of the system will be reduced. The time series prediction model established by using L-M algorithm on BP neural network has certain timeliness, so it is necessary to update the learning samples to ensure the accuracy of prediction. Using L-M algorithm, we can get the expected convergence effect by only 10 steps of iteration, and it has high accuracy, so it is suitable for on-line prediction. The data preprocessing method proposed in this paper only considers the influence of past temperature value on the predicted value, and does not involve other influencing

Neural Network Prediction Model of Real Time Data of Thermal …

1543

factors such as extraction parameters and load. For simple data prediction, the prediction accuracy has reached the expected effect. However, at present, the prediction results can not subdivide the weight of each influencing factor. If we consider more variables, expand the range of samples to increase the criteria, or to improve the slope and threshold of the sigma od function, the accuracy and reliability of data prediction will be further improved. These contents need to be further explored in future research.

6 Conclusion The good nonlinear mapping ability and learning ability of neural network can better reflect the correlation of real-time data of non-linear correlation of thermal power plant, and can be used for missing data supplement and real-time data verification, improve the reliability of data, be suitable for the evaluation of future state, and provide reference for condition based maintenance. When using neural network to predict, the network topology has a great influence on the prediction accuracy, and different prediction objects often need different network topology. Using L-M algorithm, we can get the expected convergence effect by only 10 steps of iteration, and it has high accuracy, so it is suitable for on-line prediction.

References 1. Xu, L., Zhang, Y.: Design and implementation of remote sensing monitoring system for resources and environment based on lidar technology. J. Lasers 41(08), 54–58 (2020) 2. Liu, C., Zhang, H., Peng, Q., Meng, F.: Design of high speed optical fiber video image transmission module based on embedded system. Electron. Devices 43(04), 882–887 (2020) 3. Hu, B., Bao, M.: Design and application of automatic test system for optical transmission equipment. Decision making exploration (middle) 2020 (08), 52 (2020) 4. Hu, L., Wang, B.: Design of 10 GB / s SFP + optical module based on CWDM. Commun. Technol. 53(08), 2064–2069 (2020)

The Design and Application of Dance Teaching System Based on Moodle Platform Jianxing Shi

Abstract In order to improve the effect of dance teaching in Colleges and universities, a dance teaching system is designed based on Moodle platform. The system adopts B/S structure, including user login module, Moodle platform module and database module. The application of the system in dance teaching is analyzed. The results show that after the application of the system, the number of classroom questions and answers increased. Keywords Moodle platform · Dance teaching · B/S structure

1 Introduction Moodle platform is a teaching management software, which is designed based on constructivism, and contains various functions, such as teaching, homework, testing, etc. after the platform came out, it was upgraded and transformed, and was applied in the teaching process by more and more disciplines. In recent years, in the information environment, great changes have taken place in the concept of school education. The core of this change is the innovation of teaching mode, which emphasizes studentcentered, so is music teaching in Colleges and universities. Applying Moodle platform to music teaching can provide students with a personalized and collaborative rich media learning environment This paper proposes the design of dance teaching system based on Moodle platform.

J. Shi (B) Baotou Teacher’s College, Inner mongolia, Baotou 014030, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_203

1545

1546

J. Shi

2 The Current Situation of Dance Teaching in Colleges and Universities and the Problems Solved by the Platform Looking at the current situation of dance teaching in Colleges and universities, it can be seen that professional dance teaching adopts the collective teaching method, and the teaching content is mostly limited to the teaching materials used. The teaching process relies on the teacher’s explanation and demonstration performance. It is mainly “oral and heart-to-heart”, and the theoretical teaching occupies a high proportion of class hours. Teachers regularly organize students’ learning achievements display to guide students’ problems in the process of learning. This teaching method has the following disadvantages: first, with the expansion of enrollment, the number of students is increasing, and the teaching team can not be satisfied with the increasing number of students [1]. After the large class teaching, due to the limited class hours Teachers have limited time to guide each student, and the learning effect is not ideal, which reduces students’ interest in learning; second, there are less opportunities for students and teachers to communicate after class; third, online teaching resources of music courses are not perfect. The application of Moodle platform in dance teaching can solve the above problems. First, students can review and preview the knowledge explained in class after class, and complete the knowledge transfer in advance. In class, they can ask questions for specific problems, so that the classroom teaching can focus on the key points and difficulties of students’ learning, so that students can be limited in time Second, through the online Q & a module of Moodle platform, the “one-to-one” interaction can be realized through the platform, breaking the space limitations, strengthening the communication between students and teachers after class, and realizing interactive teaching; third, the online Q & a module of Moodle platform can be used to realize the interactive teaching Yes, build online resource module.

3 Overview of Moodle Platform Moodle (modular object-oriented dynamic learning environment) is a free open source software Compared with many e-learning platforms, the customized teaching and learning platform has the following advantages: first, it is a comprehensive and systematic platform, which conforms to the B/S structure, provides rich learning resources, and meets the needs of course content arrangement, teaching evaluation and teacher-student interaction [2]. Second, Moodle platform is in line with the constructivism design concept. Thirdly, Moodle platform breaks through the limitation of time and space and emphasizes cooperation and exchange. Fourth, the platform adopts the consistent interface design style, and the technical threshold is low. You can use free Linux platform with a-pache webserver, or use Microsoft Windows platform with IIS or Apache webserver, with high security, forms will be transmitted through data validation and cookies encryption.

The Design and Application of Dance Teaching System Based …

1547

4 Design of Dance Teaching System Based on Moodle Platform The dance teaching system based on Moodle platform adopts three-tier B/S structure. The user login interface, database module and Moodle platform module are separated. The relationship of each part of the system is shown in Fig. 1.

4.1 Design of Dance Teaching System Based on Crud Operation of Database Access The first step, SQL classification and fusion refers to the fusion of SQL statements and parameters from the operator before keyword extraction, which requires the following implementation and process: (1)

(2)

Because of the different structure of SQ statement, the SQL language (including place holder) is divided into insert statement and non insert statement by Formula (1); For the inserted statement, such as Formula (1), use the method of iwan to put the parameter in param; TLA, double, into J D sqli ; the corresponding position in the bracket of parameter can be obtained by J D sqli and HR; as in Formula (2), Fli method is used to put the parameter value in param; in the corresponding position of parameter holder, the fused statement H D sqli hpsql: is obtained 

l parami

J D sqli =

Ii (sqli , parami)

(1)

F Ii (sqli , parami)

(2)

t=0



L parami

H D sqli =

t=0

For the statement J D sqli , such as Formula (3), use Z i ; method obtain the value Iz corresponding to “zoneid” from the parameter bracket, and use FZ for the statement H D sqli , such as Formula (4); method obtain its value from multiple “zoneid”

Fig. 1 Dance teaching system based on Moodle platform

1548

J. Shi

parameter equations, and obtain Sz []; Iz = Z i (J D sqli )

(3)

Sz = F Z i (H D sqli )

(4)

4.2 Moodle Platform Structure (1)

(2)

(3)

Add dance lessons. After the Moodle platform is installed, add music courses such as “harmony acoustics”, “music appreciation”, “Introduction to Musicology”, “history of Chinese and foreign dance” and “Introduction to national dance". Fill in “course number”, “course name” and “Course Introduction” as required, and set other options of the course to generate a course. Arrange the homework. According to the teaching needs of dance teaching homework, we can also set the deadline and the highest score of each homework submission in dance teachingp [3]. The teacher can also clearly understand the late submission time of students’ homework, and the teacher can score and evaluate the students’ homework. Access tracking. Teachers can also view the learning records of each student, such as the number of times, time, place and score of a dance course; the report can be dynamically generated in the form of charts and can also be downloaded. Teachers can conduct in-depth analysis of the downloaded data through other tools such as excel.

5 Specific Application Analysis Based on the teaching of “Indian music culture” in the course of “world folk music”, this paper analyzes the application of dance teaching system based on Moodle platform. Firstly, the system administrator adds the course “World Folk Dance” to the platform, and imports the user data of students. Then, the teacher uploads the teaching plan and relevant teaching materials and opens the Start teaching. (1) Pre class section. Teachers upload relevant teaching materials and videos of “Indian dance culture” in dance teaching on Moodle platform, such as “praying for the drupade of the God of Korina”, ask students to appreciate and ask related questions, such as “how is the line of vocal melody? Is there decorative sound? What rhythm and rhythm are there?” etc. teachers and students can discuss relevant issues online to determine whether there is decorative sound or not? What rhythm and rhythm are there? “Etc. teachers and students can discuss relevant issues online to determine The key points, difficulties and targets of teaching.

The Design and Application of Dance Teaching System Based …

1549

For teachers, the following operations can be carried out: (1) online tracking access. The teacher carries on the targeted statistical analysis to the study situation and the result in the system, (2) arranges the homework after class. Assign homework to upload to the platform, consolidate and review the knowledge. (3) Online testing. Regularly use the online test module of the platform to test the students’ knowledge of “Indian dance culture”. (4) Teaching evaluation. According to the students’ learning situation of “Indian dance culture”, teaching evaluation is carried out and learning strategies are adjusted. (5) Answer questions online. For students in the review after class, autonomous learning questions for online answers. For students, the following operations can be carried out: (1) online learning. Learn the knowledge of “Indian dance culture” online, and preview the related content of the next class according to the materials and videos uploaded by the teacher. (2) Online testing. The paper of “Indian dance culture” published by teachers was selected for online detection. (3) Online questions, for review and preview of the relevant questions online questions. (4) Submit the assignment. After the assignment of “Indian dance culture” assigned by the teacher, it is completed and submitted online. (5) Check the scores and comments. Check the scores of online tests and teachers’ comments. For the application of traditional teaching methods and teaching methods based on Moodle platform, the number of times students ask questions and answer questions are counted.

6 Conclusion This paper designs the dance teaching system based on Moodle platform, and analyzes its application effect. Practice shows that dance teaching based on Moodle platform can significantly improve the enthusiasm of students in classroom questioning and answering in class. Therefore, in the future research and exploration process, we should constantly improve the platform function, so as to improve the teaching effect of dance in Colleges and universities.

References 1. Yuan, S.: Auxiliary application of Moodle platform in college teaching. J. Hebei Agric. Univ. (Agriculture and Forestry Education Edition) 17(3), 82–85 (2015) 2. Zhang, W., Duan, C.: Global cooperation and co construction and sharing in the development of online teaching platform: a summary of 2012 international Moodle conference. Distance Educ. China 10, 32–36 (2012) 3. Zhao, T.: Design and Implementation of High School Chinese Writing Teaching Based on Moodle Platform. Shenyang Normal University, Shenyang (2013)

Remote Digital Management Resource Base Mode Based on Cloud Computing Meie Shi

Abstract In order to realize the sharing of learning resources in distance digital management and meet the needs of different learners for resources, this paper studies the mode of remote digital management resource library, and discusses the model construction of teaching resource library from three aspects of cloud computing technology, digital resource library mode and key technology, This paper expounds the logical architecture and platform architecture of the resource library mode, and points out the broad prospects of the application of cloud computing technology in the construction of remote management resource database. Keywords Leading industry · Interregional economic association · Data minin

1 Cloud Computing Technology Cloud computing technology is based on the network and a large number of computer equipment. Different tasks are distributed on the resource pool composed of these computers. Users can obtain the corresponding information services, storage space and computing power according to their own needs. When users use cloud computing mode, they only need to pay some fees to “cloud computing” service providers.The corresponding resources can be obtained [1]. “On demand service” is an important feature of cloud computing. The resources in the resource pool can be flexibly allocated according to needs, and can dynamically carry large capacity information processing requirements. According to the service type and application scope, cloud computing can be divided into different types. According to the types of services, cloud computing can be divided into three categories: infrastructure as a service, platform as a service and software as a service. According to the application scope, cloud computing can be divided into three types: public cloud, private cloud and hybrid cloud. Different types of cloud information security coefficient is not the same, if the information security requirements are low, you can rent the public cloud, if the M. Shi (B) Yunnan University of Business Management, Kunming 652501, Yunnan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_204

1551

1552

M. Shi

information security requirements are high, you can use computer technology to establish your own private cloud or hybrid cloud.

2 Optimization of Energy Saving Scheduling Algorithm for Cloud Computing Data Center 2.1 3D Reconstruction of Cloud Computing Data Center Resources On the basis of completing the resource output conversion Scheduling of the virtual cloud computing data center, the energy-saving scheduling algorithm of the center resource is further optimized. The embedded fuzzy clustering fusion analysis method is used to reconstruct the cloud computing data center resources. The iterative formula of matching filter scheduling of cloud computing data center resources is obtained as follows w = θ1 (k) − R[y(k)∗ (k)]

(1)

where θ1 (k) is the resource information obtained after filtering iteration, and y(k) is the matching resource information.Information, φ ∗ (k) is the filtering resource information, combined with the real-time feature sequence distributed scheduling method, the resource scheduling and output scheduling of cloud computing data center are carried out. Spectrum analysis of data center resources is carried out by using spectrum adaptive scheduling method, and the output spectrum characteristic quantity e of virtual cloud computing data center resources is obtained [2]. Then, the fuzzy association rule scheduling method is used to virtualize cloud computing Data center resource optimization scheduling, resource transmission optimization scheduling set is √ A(t) = E + W a B h (t)

(2)

where a is the oscillation amplitude of resource information in virtual cloud computing data center, and B H (t) is the fuzzy association rule coefficient. Using empirical mode decomposition method, the VR reconstruction output of virtual cloud computing data center resources is obtained as follows vx (t) =

A(t) + (v0 + 2βt) Y p (u)

(3)

Remote Digital Management Resource Base Mode Based on Cloud …

1553

2.2 Energy Saving Scheduling Algorithm for Cloud Computing Data Center The energy-saving scheduling algorithm of cloud computing data center is as followsInput: according to the priority clustering model of resource sharing scheduling in virtual cloud computing data center, the fuzzy index set of resources in virtual cloud computing data center is input by using VR immersion expression method. Output: virtualized cloud computing data center resources. (1)

(2)

Based on the decision correlation analysis method, a fusion model of resource information intelligent sharing in virtual cloud computing data center is constructed Using multiple regression analysis method, the calculation formula of intelligent resource sharing of virtual cloud computing data center is obtained as follows   U1 (t) = cx p [z1 (t) − V ]2

(4)

Among them, is the statistical analysis eigenvalue of correlation, and the similarity of resource sharing in virtual cloud computing data center is Z i (t) =

pi (t) − s. pi, j (t) p(t)

(5)

where: s is the resource correlation coefficient of virtual cloud computing data center, pi j (t) is the fuzzy correlation characteristic distribution set of virtual cloud computing data center resource sharing, and p(t) is the fuzzy decision increment value of virtual cloud computing data center resource sharing.

3 The Model of Distance Education Digital Teaching Resource Database Based on Cloud Computing 3.1 The Logical Framework of Resource Network Model The logical architecture of distance education digital teaching resource database mode based on cloud computing is shown in Fig. 1. The resource “cloud” in distance education is composed of various e-learning resource libraries. The user terminal can choose any learning resource through the cloud platform and match the best path for the transmission of learning resource. As the cloud platform is composed of multiple servers, the transmission of data resources can also be constituted by multiple servers. Therefore, if a server fails to work normally, other servers can be selected to avoid delay in data transmission. The cloud platform can realize the sharing of different

1554

M. Shi

Fig. 1 Logic architecture of distance education zizification teaching resource mode based on cloud computing

learning resources, and the end-user can access any learning resource with a unified resource list [3]. When users access learning resources, in order to improve the speed of access, the system will first automatically analyze the user’s IP address, determine the route, and establish the best link of learning resources. In this way, users can learn from the cloud resources and can learn from the cloud, so they can learn and learn from the cloud. In addition, the distance learning terminal can be installed in broadband television (IPTV), personal digital assistant (PAD), personal mobile phone and personal computer, so as to expand the application range of the terminal.

3.2 Platform Architecture of Mode After analyzing the logical architecture of the pattern, we need to further study the platform architecture of the pattern. According to the current situation of network infrastructure of distance education system, the platform architecture of distance education learning resource library mode based on cloud computing is constructed. The application of cloud computing technology provides better technical support for learners. This study mainly designs the teaching resource database from the perspective of distance education, aiming to provide students with standardized, integrated, efficient, scalable and interactive teaching resource library. The end-user can also become the builder and manager of the resource database, so as to realize the co construction and sharing of resources among multi platforms of distance education and the high utilization rate of resources. (1)

Client user interface layer. The users of this layer mainly include system administrator, resource administrator, teachers, students and tourists. System administrators are mainly responsible for authorization management, security management and technical support: resource managers mainly audit, upload and assign permissions to resources; teachers, students and tourists mainly

Remote Digital Management Resource Base Mode Based on Cloud …

(2)

(3)

1555

browse, query, upload and download learning resources according to their different permissions. Shared service layer. This layer is in the top layer of cloud platform, including infrastructure, basic office, student status management, academic management, online teaching and research, comprehensive evaluation, teaching evaluation, etc., which reflects the multiple functions of distance education digital resource database, and provides external terminal services with multiple interfaces, reflecting the sharing logic of resource database mode. Platform service layer (management middleware layer). This layer is the central layer and core part of distance education digital teaching resource database mode platform, mainly composed of management modules, such as user management module, service management module, resource management module · monitoring management module, log management module, automation management module, process service management module, backup management module, etc. These modules can be freely combined and expanded to realize the sharing of cloud resources.

3.3 Large Scale Learning Resource Processing Technology Parallel processing technology is used in learning resources, and MapReduce technology is used in this study. This technology is a distributed parallel computing model, which is mainly used to process large-scale data sets. The basic idea is to decompose the problem to be executed into map and reduction (Reduce operation, that is to cut the data through the map program to form different blocks, and then allocate these data blocks to different computers for processing, so as to obtain the results of distributed operation, and then summarize the parallel processing results through the reduce program, and finally output the results required by users [4]. The whole system adopts the master–slave architecture. One of the servers is designated as the master node, and the others are the slave nodes. The master node obtains the pending data submitted by the user node through the service interface, preprocesses the data, divides the data by reasonable partition mechanism, and then submits them to the slave node for processing.

4 Conclusion With the increasingly fierce competition between distance education institutions at home and abroad, the construction of teaching resource library plays an increasingly important role in improving the core competitiveness of distance education. More and more mature cloud computing technology will not only provide more effective resource services for distance education institutions and end users, but also become

1556

M. Shi

the development trend of distance education resource database construction in the future, with broad application prospects.

References 1. Wanli, W.: Analysis of cloud computing and its application in higher vocational education. Sci. Technol. Inf. 34, 232 (2010) 2. Chen, Y.: A probe into the construction of teaching resource bank of vocational education. Vocat. Educ. Forum 8, 52–54 (2011) 3. Wang Q., He, L., Zhao, Y., et al.: Virtualization and cloud computing LM], pp. 126–127. Electronic Industry Press, Beijing (2009) 4. Hong, S., Yang, Y.: Key technologies of cloud computing and cloud computing model based on hadkaop. Softw. Guide (9): 9–11 (2010)

Research on Post Production of Film and Television Based on Computer 3D Technology Zaijun Song

Abstract In recent years, with the continuous development of China’s film and television industry, film and television has become an indispensable part of people’s life. The pace of development is more and more rapid, making people’s life more colorful. Computer three pile technology began to appear in the film and television, the technology has a prominent role in cutting national atmosphere and film and television effect. Many film and television works began to join the computer three pile technology, which increased the amount of film and television advertising, in the film and television industry has a greater impact. This technology can create virtual motion lens, marvel field, character pair and some impressive visual effects in a short time, making the perfect combination of science and technology and technology. Keyword Construction system · Multi-objective optimization · Ant colony algorithm

1 New Media Background Under the background of the new era, teachers should give full play to the advantages of new media technology in the process of teaching design for the film and television post production course, combine with the discipline characteristics, build a variety of V teaching activities, teaching should be clear about the film and television view, after the production of the course is divided into different prices, in the early stage of teaching, the main teaching content is the current frequency editing technology [1]. Therefore, in this teaching price stage, teaching 5 should focus on the theoretical knowledge and practical skills of video pillow cutting, and carry out teaching activities for students. In order to improve the quality of learning and the saving rate of teaching, Professor xiunuo should match the traditional world with multi-disciplinary science. For the theoretical knowledge of video clips, teachers can Z. Song (B) College of Literature and Journalism, Inner Mongolia University for Nationalities, Tongliao 010010, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_205

1557

1558

Z. Song

use the teaching and casting system to convey the corresponding content to students. At the same time, according to the understanding of Yu lazy friend Qiao, the teacher can make 5 pictures of the students and show them in the classroom. Will have the United States Black Xiaosheng.

2 Synthesis and Treatment Effect of the Technology Yan mingsiyi, the editor of Taicheng, can synthesize images after post-processing in the computer. It can synthesize multiple sounds and images, and let the whole plane painting country show art through the article tiling and Nari drawing. Generally, the plane carries out image adjustment according to the following formats, and processes the pre color brightness, image beaming and other modes. Technology in improving people’s living standards, people under the guidance of technology more wonderful life, looking at those beautiful face King kind of moving scene morning, these in addition to the natural integration of actors, the most important thing is the use of special skills can make the film and television become more wonderful, more send people. In people’s traditional thinking, special effects are false feelings, which will not let the audience create true inner C wave, but also simply use technology to improve the image surface. Such a way of understanding is a little high, Jiaren is particularly moved by the current film and television Tongxiang, now the province film and television entertainment coal has paid more and more attention to the use of computer three-dimensional technology technology. Since its emergence, this technology has occupied an important position in the film and television entertainment media. People can feel the role of technology and realize the ubiquity of technology in life.

3 Computer Aided Design 3.1 3D Reconstruction Algorithm of Point Cloud Segmentation and Matching Based on 3D Technology The Euclidean cloud segmentation algorithm is one of the point cloud clustering algorithms. The segmentation value method on the shoulder of Euclidean distance uses the political distance information between the points in the point cloud to quickly construct the segmentation region. This segmentation feature can greatly affect the segmentation of small point group with large heavy day area. In order to control the size of the segmentation area, the container size can also be set [2]. The Euclidean point cloud segmentation algorithm can divide the point cloud into m small point groups

Research on Post Production of Film and Television Based …

1559

Fig. 1 Comparison results

(1) (2) (3) (4) (5)

Set multiple containers cm (m can take multiple values) and set Euclidean distance threshold Cm ; Select container C1 ; Find a point Pi in the point cloud as a reference point; K − d tree is used to find k points near it; The Euclidean distance dk from each point to Pi point is calculated respectively. dk =



PiK + Pi 2

(1)

CThe comparison of point cloud Euclidean segmentation with PIC algorithm is shown in Fig. 1.

3.2 Advantages of 3D Technology in Film and Television Processing Three dimensional computer technology, the United States good wing Wu to the technology provides a wide range of platforms, so that the technology in the film field bright, fully demonstrated the importance of computer three-dimensional technology in the film. In the birth of the works, all use computer three-dimensional technology for production, these representative works have profound anti ambiguity technology and wish to play a high role in film and television. It is the technology with the traditional mode can not achieve the effect, so the technology has been widely used in the world since its germination [3]. Due to its own particularity, 3D technology plays an important role in the international film and television production platform. Its free and efficient characteristics are loved by the industry. Hollywood film and television production performance is called the first class in the world film and

1560

Z. Song

television production. The world name is established because Hollywood uses the world foreword technology.

4 Research on the Application of 3D Technology in Film and Television Post Production Computer technology plays an important role in it, and its achievements are well known. From the first color moving back to snow white, in addition to some simple ink moving surface, sand moving and mutual imitation of his country, as well as the help of drill rod painting, the basic mode of animation surface is two-dimensional touch. At that time, people were far away from the three-dimensional moving surface, and they were satisfied with the current moving surface mode. However, Pixar company has the glare of overselling. On the basis of two-dimensional satire, Pixar has been constantly updating its technology through continuous newsletters. The vivid pictures deeply attracted people’s attention. People realized the feeling of being on the scene from the realistic effect pictures, so as to consider the film’s own value. These national morning rules are two-dimensional moving surface, and three-dimensional moving surface is applied in the links of material, construction and replacement, and threedimensional dynamic surface helps computer technology. Help restore some of the most popular, so that people love watching movies. The three-dimensional moving surface painting has its advantages. It is not subject to the bottom system of the frame number. It can automatically add color to the face, making the national surface look very unified and harmonious. The quasi dyeing part is particularly prominent. It can finish all the work automatically. The picture is very smooth and clear. Moreover, the limitation of frame by frame coloring is broken. This greatly improves the working speed, reduces the repeated labor, and improves the social and economic benefits.

5 The Development Prospect of 3D Technology in Film and TV Post Processing With the continuous development of check-in technology, this technology has been widely used in the film industry. It has rich forms of expression and rich and colorful pre color reorganization, so that film and television puppets all over the world are in love. The three child check-in technology greatly reduces the real-time recording, the whole editing process and the use of expensive equipment. This is the most outstanding contribution of check-in 3D technology in the film. It reduces the human and material resources between them, and saves the economic expenditure for film and television shooting. In order to realize automation in the work, the Department has greatly increased the number of payment rooms, In order to improve social and economic benefits, the computer three standards technology plays an important role

Research on Post Production of Film and Television Based …

1561

in film and television, and also has great strength in the level of game production. It constantly shows the spirit of the game, transforms the two-dimensional game into the magic effect of three-dimensional swimming. The easy transformation makes people have to take advantage of the technology in the film and television. It realizes the tearful exchange of entertainment and technology, Give full play to the advantages [4]. Today’s 3D computer technology has occupied an important position in the film and television industry, it has successfully become the leading industry in the entertainment industry. This technology not only has a significant impact on film and television advertising design, film and television special effects, game production and so on, it has become the leading factor of film and television economic growth.

6 Conclusion With the continuous development of counting machine technology, the threedimensional technology of counting machine has been developed in an all-round way. Good results have been achieved in the course of development. In many films, people can see the figure of the three-dimensional technology of the check-in machine. The three-dimensional technology is used in advertising, film and television, and the coal industry has also begun to use three-dimensional technology. The technology has successfully occupied the modern film and television entertainment coal market, its figure can be seen everywhere. With the rapid development of the film and television industry, the technology has been widely used. It saves a lot of human resources and promotes the development of social economy. Acknowledgements Funding Agency:Scientific research project of Inner Mongolia University for Nationalities “Research on digital image recording practice of Inner Mongolia University for Nationalities during the 13th five year plan” (Project number:NMDYB18056).

Reference 1. Cui, J.: Analysis of computer 3D technology and its application in modern film and television entertainment media. Film review, 2008 (24) 2. Zhang, J.: Application of computer 3D technology in general layout. Nat. Gas Oil 1997(7) (1997) 3. Sun, X.: Application of new media technology in film and television post production courses. Commun. Res. 3(13), 217–218 (2019) 4. Fei, J.: Research on practical teaching of film and television production course in the context of media integration. China Media Technol. 2019(03), 102–104 + 114 (2019)

Research on Security Situation Analysis and Intelligent Disposal Technology of Edge Side Area Xin Sun, Jiyuan Li, and Qinyuan Li

Abstract This paper expounds that network security situation awareness is an important means and key development direction of protecting key information infrastructure and important information system. This paper comprehensively studies the technical status of network security situation awareness system at home and abroad, analyzes the main functions and key technologies of network security situation awareness system, such as network security data source collection, data analysis, network situation assessment, network threat assessment and network situation prediction, and concludes that the future development trend of network security situation awareness system is to deeply integrate big data and artificial intelligence technology, Its infrastructure should be dynamically scalable and provide accurate prediction and defense disposal recommendations. This paper has a good guiding significance for the research and development, construction, evaluation and supervision of network security situation awareness system. Keywords Network security · Situation awareness · Cloud computing · Big data

1 Introduction Network security situation awareness refers to the acquisition, analysis and visualization of security elements that can cause changes in network security status in large-scale network environment, and predict the development trend, so as to provide the basis for decision-making and subsequent disposal. Network security situation X. Sun · J. Li · Q. Li (B) State Grid Zhejiang Electric Power Co., LTD. Research Institute, Hangzhou City 310014, Zhejiang, China e-mail: [email protected] X. Sun e-mail: [email protected] J. Li e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_206

1563

1564

X. Sun et al.

Fig. 1 Intelligent terminal edge calculation model

awareness system is a system that collects network traffic, security log, security alarm, Threat Intelligence and other security data, analyzes network behavior and user behavior by using data analysis and machine learning technology, and analyzes and predicts the current status and development trend of the network. With the rapid development of information technology, the domestic network security work has made rapid progress. From the security guarantee of information system to the security guarantee of the whole cyberspace, situation awareness can make the network security work more active, and has become a hot spot in the field of network security in recent years, and more and more institutions have invested in the research.

2 Edge Side Area Calculation Model Edge computing is a new computing model that performs computation at the edge of the network. In edge computing, the downstream data of the edge represents the cloud service, and the uplink data represents the Internet service of everything [1]. Sensors, smart phones, wearable devices, smart home appliances and other terminal devices will become a part of the Internet of all things, and generate massive data. Therefore, it is necessary to better evaluate the security of mobile intelligent terminals to meet the requirements of reliability, data security and privacy protection in the edge computing model. Figure 1 shows the terminal edge computing model.

3 Intelligent Level Division Calculation of Edge Computing For example, in this paper, the security level of mobile intelligent terminal is divided into four levels, and three threshold values are set as positive number η1 , η2 , η3 and initial 3, where η1 = 0.25, η2 = 0.50, η3 = 0.75. According to these three

Research on Security Situation Analysis and Intelligent …

1565

thresholds, the intelligent terminal is divided into four levels, which are represented by x. x ∈ {1, 2, 3, 4} represents four grades. The expression of X is as follows ⎧ x ⎪ ⎪ ⎨ x x ⎪x ⎪ ⎩ x

= 1, 0 ≤ X ≤ 0.25 = 2, 0.25 ≤ X ≤ 0.5 = 3, 0.5 ≤ X ≤ 0.75 = 4, 0.75 ≤ X ≤ 1

(1)

Among them, 1, 2, 3 and 4 represent level 1, level 2, level 3 and level 4 respectively. The higher the safety level, the stronger the safety performance. By testing K smart terminals once, the test results of M1 , M2 , . . . , Mk are obtained N Each test result consists of M’s test items. The higher the score, the stronger the safety. By calculating the total score X of each evaluation and grading it through the above threshold, we can get the training set sample T , T = { (M1 , x1 ), (M2 , x2 ), . . . , (Mk , xk )} .

4 Research Motivation 4.1 Apt and Other New Attack Methods Emerge in Endlessly References With the development of information technology, the situation of network security is becoming more and more serious. Because the key information infrastructure and important information system of government and important enterprises have massive high-value data, they are often attacked by advanced persistent threat (APT) technology by hacker organizations [2]. Because apt attacks are covert, they attack specific targets, bypass the traditional security protection methods based on signature detection, and can hide in the target information system for a long time. Therefore, it is difficult to detect apt attacks in the traditional defense system based on anti-virus software, firewall, IPS, IDS and other security devices.

4.2 Security Risks of Cloud Computing and Big Data With the application of new technology, cloud computing and big data technology are more and more applied in key information infrastructure and important information system, which not only brings the convenience of new technology, but also brings new security problems. The core technology of cloud computing and big data is a series of emerging technologies, such as distributed structure, non relational massive data storage, open interface, real-time processing of stream computing, which are deployed on massive devices across regions to store and run massive data. Moreover,

1566

X. Sun et al.

the rapid update and immaturity of new technologies lead to their own security risks, It is difficult to establish a security protection system for cloud computing and big data based on the traditional security protection system.

4.3 The Existing Safety Protection Measures Are Difficult to Cope with the New Security Situation The existing security defense mechanism cannot support the data protection of cloud computing and big data platform. After more than 20 years of development, China’s network security industry has developed from the early firewall, antivirus software, intrusion detection, intrusion prevention, security audit and other security products to the current security management platform and application firewall. At the same time, the attack complexity of attack tools is higher and higher, and the attack is more and more difficult to prevent. The evolving attack means also make the effect of traditional defense system worse and worse. The convenient and diversified virtual machine and virtual network communication methods of cloud computing and big data platform break the security boundary of traditional defense system, making it difficult for traditional security defense technology to play a protective role in cloud computing and big data environment.

5 Intelligent Disposal Technology 5.1 Network Security Situation Awareness System Architecture International network security companies, such as fireeve, mandiant, mitre, RSA, lastline, etc., have released products related to network security situation awareness. China’s network security companies, such as 360 company, Asia information technology, Anheng technology, Green Alliance Technology and other security enterprises, have also launched network security situation awareness systems, which have their own characteristics. The early network security situation awareness system uses data analysis technology to identify valuable information in massive security data by collecting massive security data, and displaying it as understandable reports and charts, so that network security personnel can discover and analyze the security threats of the whole network through the report and chart data. In recent years, with the emergence and development of big data technology, the full integration of security technology and big data technology has greatly enhanced the ability of security detection and analysis, and promoted the development of security situation awareness, mainly manifested in APT interception, threat perception and threat intelligence sharing.

Research on Security Situation Analysis and Intelligent …

1567

5.2 Main Functions of Network Security Situation Awareness Network situation assessment includes situation element extraction and current situation analysis. Network threat assessment is about the destructive ability of malicious attacks and the threat degree to the whole network [2, 3]. Network situation prediction is to deduce and analyze the security events that will happen from the known data, deduce the unknown threats from the known threats, and realize the prediction and judgment of the occurrence probability of security threat events. Through network situation assessment, network threat assessment and network situation prediction, the security status of national or industrial key information infrastructure and important information system can be visible, known, manageable, controllable, traceable and early warning.

6 Conclusion Due to the differences in the adoption of new technologies and the level of capability, various manufacturers.The network security situation awareness system based on the network security situation awareness system has deficiencies in data collection, processing, analysis and visualization, which also makes the operation and use units of key information infrastructure and important information systems at a loss when choosing network security situation awareness system. Therefore, this paper studies the architecture, main functions and key technologies of network security situational awareness system. On the basis of fully investigating the current situation of network security situation awareness system at home and abroad, this paper expounds the next development trend of network security situation awareness technology, which has a good guiding significance for the development, development, construction, evaluation and supervision of network security situation awareness system. (edited by Cheng bin).

References 1. Tao, Y., Huang, T., Zhang, M., Li, S.: Key technology research and development trend analysis of network security situation awareness. Inf. Netw. Secur. 2018(08), 79–85 () 2. Hou, W., Jiang, Y., Wen, H., Lei, W., Xu, A.: Terminal security classification model based on edge side BP neural network. Commun. Technol. 51(10), 2455–2458 (2018) 3. Liu, L.: DAG Scheduling in Edge Computing. University of Science and Technology of China (2020)

Fractal Method Algorithm for Art Pattern Generation and Design Yulin Tan

Abstract This paper introduces the principle and method of computer-aided generation and design of fractal art pattern, discusses the generation algorithm of fractal pattern, the composition algorithm of fractal art pattern and the related problems of developing art pattern design system based on fractal method. A large part of art design work is art pattern design. Combining fractal theory with computer graphics, a large number of beautiful and complex fractal patterns can be generated by simple iterative formula, which is very suitable for the auxiliary design of art patterns. The pattern generated by fractal theory can be used in many fields, such as advertisement design, packaging graphic design, home design and so on. Keywords Fractal · Art design · Pattern · Composition

1 Introduction Computer aided art pattern design and drawing is an important research and application of computer graphics in art creation and performance. With the powerful interactive graphic design and display technology of computer, the modern advanced technology and means can be fully used in the modeling, color and composition of art patterns. Since the 1990s, a number of software for drawing, graphic design, advertising and animation production has appeared in advanced industrial countries. Special pattern design software for product appearance, decoration and art products also came into being. In our country, the application of computer in the design and drawing of fine arts patterns has attracted extensive attention and interest among computer technicians and art workers. In 1994, China held the first computer art conference and exhibition, and launched a batch of individual computer art pattern works and CAD system for computer-aided art creation, showing the broad application prospects of computer art pattern design.

Y. Tan (B) Yunnan Normal University, Kunming 650500, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_207

1569

1570

Y. Tan

However, as far as the computer art pattern design systems have been developed, they mainly adopt the traditional Euclidean geometry method in the basic pattern and the principle and method of pattern composition. That is to use aesthetic principles and composition rules to make rational repetition of patterns composed of basic geometric elements (point, line, surface, body), change or cross combination of position, various arrangement, rotation, symmetrical layout and color change, etc., so as to produce various pictures. This method of pattern generation and design based on Euclidean geometry can only draw single patterns or regular patterns composed of basic patterns. However, a large number of self similar structures and natural simulation are available. The fractal geometry created by Mandelbrot, a Polish scholar in 1973, provides some methods for describing self similar bodies and irregular configurations in nature. Fractal is a self similar shape with infinite details in scale-free sense, which embodies the disordered and changeable beauty of nature. By using the self similarity of fractal, we can produce a variety of artistic patterns with arbitrary high lobe rate structure. In recent years, based on the theory of fractal design, fractal design has been further expanded based on the principle of fractal design. This paper introduces the basic principle of fractal art pattern generation and design, the generation algorithm of fractal pattern, the composition algorithm of fractal art pattern and the design and implementation of fractal art pattern design system.

2 The Basic Principle of Fractal Art Pattern Generation and Design The graphic art pattern based on the fractal method refers to the decoration design on the plane object by using the fractal method. Like ordinary pattern design, it includes pattern modeling, color composition and composition. Pattern is the basis of pattern, and its basic unit is called unit pattern. In fractal art patterns, unit pattern is a kind of free pattern with fractal characteristics, which is generated by fixed fractal algorithm. The modeling of fractal patterns is the focus of our research. The main research directions include the concrete modeling of natural scenery, the abstract modeling of self similar geometry and the combination of them. Composition is the composition of patterns, including pattern structure and picture composition. In fractal art pattern, it mainly refers to the layout and organization form of fractal pattern picture. The common forms include regular skeleton composition based on fractal pattern, overall fractal pattern composition and fractal distribution composition with irregular configuration.

Fractal Method Algorithm for Art Pattern Generation and Design

1571

3 Using Periodic Function to Adjust and Generate Different Styles of Art Patterns For the patterns generated by the generalized Mandelbrot set and Julia set, we can introduce a periodic function to adjust the iterative function to generate artistic patterns of different styles. The periodic function used in this paper is trigonometric function: sine, cosine, tangent, arctangent. The specific method is to adjust the real part and imaginary part of the iterative formula by using periodic function. Then the escape time algorithm is used to plot the new production. Running example: For the generalized Mandelbrot set function z n+1 = z n6 + c is adjusted. The expansion of the real part and the imaginary part is as follows: 

x = x 6 − y 6 − 15x 4 y 4 + 15x 2 y 4 + Re(c) 

y = 6x 5 y + 6x y 5 − 20x 3 y 3 + Im(c)

(1) (2)

Composition is the structure and expression form of pattern combination and the embodiment of artistic creativity. In fractal art patterns, patterns can be combined in two ways: one is to combine fractal patterns into a pattern according to the traditional skeleton structure; the other is to combine patterns (ordinary or fractal) according to a certain fractal construction model. This paper discusses three composition methods based on these two ways. (1)

Regular skeleton composition of fractal patterns In the composition of art patterns, skeleton refers to the organizational structure including the outline border and the patterns inside the border, which is the basis and standard for organizing patterns and basic unit layout. It plays an important role in composition. The combination of fractal patterns can be realized by using the regular skeletons of traditional composition forms (including individual patterns, suitable patterns, corner patterns, edge patterns and continuous patterns). Combined with the interaction ability of computer, the composition skeleton used to combine fractal patterns should be mainly based on the scattered symmetrical skeleton, balanced skeleton, free skeleton and various forms of continuous skeleton and quadrilateral continuous skeleton. (see Fig. 1).

(2)

Fractal integral construction model composition The feature of this composition method is to construct the whole fractal pattern according to a certain algorithm model, so as to produce a picture with infinite self similarity. A typical example of this method is the braided pattern generated by fractional matrix and ractal magic square. This paper introduces an algorithm of generating turtle back pattern based on this method (see Fig. 2).

1572

Y. Tan

Fig. 1 Regular skeleton of combined fractal patterns

3.1 Fractal Distribution Composition of Patterns One of the most creative embodiment of pattern artists’ design is the combination layout and organization form of patterns on the screen. Regular skeleton composition brings regular beauty to people, but lacks natural and hierarchical beauty. According to a certain recursive model, the fractal distribution composition distributes the pattern (fractal or ordinary) on the scatter points of the calculated bits, forming a self similar pattern with randomness in the layout and obeying the statistics. Therefore, the composition of fractal distribution is more creative in art, and its works have more appreciation value. (see Fig. 3).

4 Conclusion This paper systematically summarizes the basic theory of fractal; studies the generation methods of various fractal patterns; designs a variety of pattern adjustment schemes and color schemes; designs the method of genetic selection of fractal patterns by using genetic algorithm; and designs an art pattern design system based on fractal principle.

Fractal Method Algorithm for Art Pattern Generation and Design Fig. 2 Generation of turtle back pattern

Fig. 3 A recursive model for generating fractal distribution

1573

1574

Y. Tan

References 1. Li, Q., Han, J.: Research on realistic simulation of tree morphology based on IFS. Comput. Dev. 15(7) (2005) 2. Tian, J., Meng, K., Han, Z.: A fractal image coding method based on iterated function system. Appl. Sci. Technol. 32(7) (2005) 3. Sun, B.: Classification Algorithm and Program Design. Science Press (2004) 4. Zhong, Y.: Theory of Complex Function, 3rd edn. Higher Education Press (2004)

Design and Implementation of Remote Indoor Monitoring System for Empty Nest Elderly Based on Internet of Things Yan Tang

Abstract In recent years, many countries are facing the problem of aging population. In China, with the development of social modernization and urbanization, only children spend more time in their daily work, which leads to the phenomenon that many empty nesters are left unattended. The empty nest elderly with physical function decline are prone to some accidents. If they can not be found and rescued in time, the consequences will be unimaginable. In view of the above problems, this paper proposes to design a remote monitoring system for empty nest elderly based on Internet of things to realize real-time remote monitoring of the elderly. The content of this paper mainly involves the realization of Android terminal software, including login registration, “shake” emergency dialing function, using webrt °C technology to achieve video and audio transmission, so that the elderly can timely ask for help through mobile terminals and communicate with their children through video calls. In order to achieve an efficient development mode, hybird app hybrid development mode is used; and the implementation of sensor network service is also completed to realize the indoor environment monitoring, including indoor temperature, smoke and gas content and other information, and real-time information is transmitted to children’s mobile phones through cloud server. The core research of sensor node networking is based on the background technology of nodes; in addition, the beacon module based on Bluetooth low power consumption is used to realize indoor positioning, so that children can always master the location of the elderly at home. Keywords Empty nest elderly · Guardianship · Android · Video and audio transmission

Y. Tang (B) Jinan Preschool Education College, Jinan 250307, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_208

1575

1576

Y. Tang

1 Introduction In China, family planning has been implemented for many years. Many young people with only child have to face the dilemma of taking care of their elderly parents alone, even the parents of both husband and wife. Now, in the social situation of great work pressure and social competition, overtime has become a common practice, resulting in children’s lack of time to accompany their parents. On the other hand, with the development of China’s modernization and urbanization, young people need to leave home and seek greater development in other places. The problem is that the number of empty nesters is rising. According to the survey data from the Ministry of civil affairs, 50% of China’s urban and rural families have empty nesters. Among them, there are about 40 million left behind elderly people in rural areas alone, accounting for about 7% of the rural elderly population [1]. Such a large number of elderly people are alone at home without care. Due to the inconvenient action and weak self-care ability of the elderly, they can’t find help immediately when they encounter difficulties. Therefore, unexpected accidents often occur. Based on the above pain points and needs, it is meaningful to develop a remote monitoring system for the elderly. Through this system, children can communicate with their parents remotely through the intelligent terminal. At the same time, they can learn some information about their parents at home, including location information and some environmental information at home. In addition, the system also includes the function of remote emergency alarm, so as to achieve the goal of remote monitoring of the elderly by children. It is an intelligent home for the elderly, Solutions for emergency handling of emergencies.

2 Introduction of System Development Related Technology 2.1 Android Platform Android system is an open source operating system based on Linux. Android applications are usually developed with object-oriented Java language, mainly used for the development of intelligent portable devices. Originally developed by Andy Rubin and others, Android has dominated the global smartphone operating system market share since 2012. There are endless changes in the interface and function of Android. The four major components are activity, service broadcast receiver and content provider. Among them, activity class is mainly used to express functions, service is used for background service, broadcast receive is used to receive broadcast, and content provision is used to support storage and data reading in multiple applications.

Design and Implementation of Remote Indoor Monitoring System …

1577

2.2 Nodes, Express and Mongodb Because the system involves the cloud control of the Internet of things, it needs the development of the Internet of things SERVER background to complete the function of sending requests and processing from the client. Therefore, this paper selects the BS solution of nodes + Express! - mongodb to complete the development of IOT server, and embeds the B/S page into android app in the way of HTML5 [2]. At the same time, it happens that the webrtc mentioned above has a very good compatibility with nodes, so nodes is selected for development in the server.

3 Implementation of Mobile Client in Monitoring System This chapter gives the specific implementation of mobile client app for the design scheme. The client adopts the classic three-tier structure design, which is divided into user interface layer (UI), business logic layer (BLL) and data access layer (DAL). The main UI is responsible for displaying data and receiving user’s operation request. BLL is responsible for the logical calculation of user operation request and data transfer. DAL is responsible for data reading and storage. In the three layers, all data structures should be stored in the entity library. Mobile client is divided into hybrid app, which is a combination of native app and web app [3]. In the system, such as video call module, indoor electrical control and indoor positioning are all developed in this mode. HTML5 pages are created in advance and embedded into the system. In order to manage the security system anytime and anywhere, users need to have their own user names and accounts. Even if users switch to a new platform to log in to the system, they only need to re-enter the user name and account number once. This system is for registered users. The registered user name is limited to the email address. Only after the registered account is logged in, you can choose to pay attention to the parents’ account. After the parents agree, the children have the right to pay attention to their parents. The program class diagram of the registered user is shown in Fig. 1. After the user enters the user name and password, it is processed in the log activity class. After the login user name is encrypted by MD5, it is sent to the server, and connectserverlogin returns the login correctness result. Result is a Boolean value, correct or incorrect. After the login is correct, the server returns the result to true, otherwise the returned result is false, and the user name or password is wrong. If the user who successfully logs in for the first time, choose to save the account and password. The client will save the user name and password locally. There is no need to log in again when entering the system next time. The process of saving password is handled in shared preference.

1578

Y. Tang

Fig. 1 Registered user program class diagram

4 Realization of Indoor Location Algorithm As described in the above indoor algorithm design, in order to obtain the distance between the two devices, a mobile phone is used to detect the base station, and the RSS I signal transmitted by the beacon is measured and received by the mobile phone. In Android system, core Bluetooth & colocation framework is used to measure Bluetooth RSSI signal. The measured signal strength value is returned in DBM units. The signal strength below the return signal corresponds to the corresponding distance. Formula 1 is used to convert the distance into RSSI signal: RSS Id Bm = −(10 × n log(d) − A)

(1)

where n is a constant, D is the distance in meters, and a is a constant value. Then, the inverse equation is derived, that is, the RSSI signals are converted into distance: d = 10−

RSS Id Bm −A 10×n

, A ≈ −62d Bm ≈ lmeter, n = 43.19

(2)

Trilateral measurement uses the distance measured by, by using the geometry of a circle, ball or triangle to determine the absolute or relative position p42 of a point to point [4]. This method is used in surveying and navigation (such as GPS) and other practical applications. Figure 2 is an example of trilateral measurement calculation.

5 Conclusion The elderly are a group of vulnerable groups that are easy to ignore in the fast-paced modern life style. With the aging society, there are more and more empty nest elderly people. The elderly living alone may be inconvenient to move, which may cause

Design and Implementation of Remote Indoor Monitoring System …

1579

Fig. 2 Schematic diagram of trilateral measurement

safety hazards. This project is to study the implementation of remote monitoring system for the elderly, which is a monitoring system based on the thinking of the Internet of things. The system is based on TCPP and HTTP protocol, combined with the mobile Internet, can monitor the status of the elderly at home in real time. Acknowledgements Shandong Humanities and Social Sciences Research Program Project Research on the “guardianship alliance” in the pension service system No. j16wb02.

References 1. Du Peng, Zhai Zhenwu. Centennial development trend of China’s population aging. Population Res. 205,6:90–93 2. Zhou Yincheng. Software design and implementation of elderly health monitoring system based on Android (2014) 3. Tang Yiping, Gu, X.: Research on remote monitoring system for the elderly living alone based on activity analysis. Comput. Eng. Appl. 2007 (03) 4. Chen Jing, Chen, P., Li, W.: Analysis of Android kernel. Modern computer (Professional Edition), 2009,11:112–115

Study on Fuzzy Soil Balanced Fertilization Model System Based on Neural Network Zheqing Tang, Shan Ning, Xiqiang Sun, and Qiuduo Zhao

Abstract With the rapid development of economy and society, a series of problems have become more and more serious, such as the increase of people and the decrease of land, the shortage of resources and the deterioration of ecological environment. The deep integration of the new generation of information technologies such as artificial intelligence, big data, Internet of things and the agricultural field has laid a solid foundation for the development of precision agriculture and smart agriculture. The results will provide a new way to solve the problems of resource shortage and environmental pollution. Precision fertilization is the core link of precision agriculture. It is very necessary to understand the relationship and law between soil nutrients and yield, and carry out precision fertilization to improve crop yield; maize is the largest crop in the world and China, and plays an important role in ensuring national food security. In the existing agricultural technologies to solve the problem of precision fertilization, there is no good fitting for the complex nonlinear relationship between multiple parameters of soil fertility and yield in the process of fertilization, which affects the accuracy of the fertilization model to a certain extent, and limits its application scope, Therefore, based on the project of “integration and demonstration of corn precision operation technology based on Internet of things” of national Spark Program, this paper selects soil nutrients and corn yield as research objects, and studies the optimization algorithm of maize precision fertilization model based on Fuzzy means (FCM) and RBF, It can provide decision-making basis for Precise Fertilization of maize. The main research work of this paper is as follows Keywords Precision agriculture · RBF neural network · Fuzzy clustering · Intelligent decision system Z. Tang · X. Sun HeiLongjiang Polytechnic, Harbin 150040, Hei Longjiang, China e-mail: [email protected] Z. Tang Harbin Yuyang Horticultural Research Institute, Harbin 150040, Hei Longjiang, China S. Ning · Q. Zhao (B) College of Engineering, Northeast Agricultural University, Harbin 150030, Hei Longjiang, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_209

1581

1582

Z. Tang et al.

1 Introduction China is a big agricultural country, agriculture is the basis of ensuring the national economy. The stability of agriculture and rural economy has a great impact on the whole national economy and is of great significance to the maintenance of social stability and sustainable development. However, China’s agricultural development is still facing many problems that are difficult to solve, such as high production costs, poor product quality, low fertilizer utilization rate, serious environmental pollution, low labor efficiency and unsustainable development [1]. The planting area and total yield of maize are the first in the world. It is an important multi-purpose crop such as food, feed, industrial raw materials, energy and so on. Therefore, increasing the yield per unit area and total yield of corn is an important way to ensure national food security and promote farmers’ production and income. In the traditional precision fertilization methods, fertilizer effect method and nutrient balance method are mostly used to fertilize crops. The former is mainly a method that contains multiple one variable quadratic equations, but there is a complex nonlinear relationship between the amount of fertilizer applied and soil factors. Although the former is convenient to use, it does not fully consider the soil nutrient content. In the latter, the soil nutrient is mainly in a dynamic equilibrium state, so it is difficult to adjust the correction coefficient and reflect the interaction between nutrients.

2 Key Technology Principle 2.1 RBF Neural Network RBF neural network is a three-layer feedforward neural network, which is composed of input layer, hidden layer and output layer. The first layer is the input layer, which is a nonlinear transformation from the input layer to the hidden layer; the second layer is the hidden layer, which takes the radial basis function as the basis of the hidden layer unit to form the hidden layer. Its function is to map vector to highdimensional space, using activation function, this paper uses radial basis function (Gaussian function in this paper) to transform the linear inseparable problem into linear separable problem: the third layer is the output layer, and the hidden layer is converted into the output result for output. There are three main methods to select the center of RBF neural network: fixed center method, self-organizing Selection Center and supervised Selection Center. In this paper, fuzzy clustering method is used to find the center of RBF network. In this paper, the gradient descent method is used to calculate the weight parameters iteratively [2]. Through many iterations, the parameters are adjusted to achieve the optimal parameters.

Study on Fuzzy Soil Balanced Fertilization Model System Based …

1583

2.2 Orthogonal Least Square Method Orthogonal least square method, this method can use the orthogonal method, through the calculation of regression operator to get the center of RBF neural network, which can avoid the problem of large error of output results caused by random selection of network center of RBF neural network. Therefore, OLS can be combined with RBF neural network to effectively calculate the network center, so as to ensure the accuracy of RBF neural network. The main idea of the fusion of 0ls and RBF neural network is: Taking the center of RBF neural network as the training subset, selecting samples step by step, iterating circularly, selecting the appropriate regression operator through orthogonal regression matrix, determining the regression operator according to the performance index of the network, and finally obtaining the weight of the network. Using OLS to train RBF neural network, the expected output response matrix is expressed as follows: 

Y = Y + E = φW + E

(1)

3 Research and Application of RBF Neural Network Algorithm Based on FCM Optimization 3.1 Characteristics of FCM Algorithm FCM is a flexible fuzzy partition, which is a clustering algorithm based on partition. His basic idea is that the similarity between objects divided into the same cluster is the largest, while the similarity between different clusters is the smallest. Its membership matrix U must satisfy Formula 2: c 

u i, j = 1, ∀ j = 1, . . . , n

(2)

i=1

The output of the algorithm is C cluster center vectors and a fuzzy partition matrix of C * N, which represents the membership degree of each sample point belonging to each class. According to this partition matrix, we can determine which class each sample point belongs to according to the maximum membership principle in fuzzy set [3]. The cluster center represents the average characteristics of each class, which can be regarded as the representative point of this class. From the derivation process of the algorithm, it is not difficult to see that the algorithm has good clustering effect for data satisfying normal distribution. In addition, the algorithm is sensitive to outliers.

1584

Z. Tang et al.

3.2 RBF Neural Network Optimized by FCM Algorithm In the process of RF neural network prediction, the selection of activation function call plays an important role in RBF output. Therefore, through the analysis and comparison of six typical activation functions, it is found that the most widely used one is Gaussian function, which has good smoothness and differentiability of arbitrary order. Moreover, the expression of Gaussian function is simple and can keep the input features mapped. This paper uses the same data set to train the RBF neural network before and after optimization. When the maximum iteration is set to 100, the objective function curve of traditional RBF neural network is shown in Fig. 1. The fitness curve of objective function generated by RBF neural network optimized by FCM clustering algorithm based on kernel function after training is shown in Fig. 2. Fig. 1 Change curve of RBF objective function

Fig. 2 Fcm-rbf objective function curve

Study on Fuzzy Soil Balanced Fertilization Model System Based …

1585

Through the comparison between Figs. 22 and 23, it can be seen that the number of iterations of RBF neural network optimized by FCM algorithm based on kernel function is obviously less than that of traditional RBF neural network, and the convergence speed of optimized network is about 10 times that of traditional network. The efficiency of the optimization algorithm is proved [4]. Compared with the traditional FCM algorithm, the FCM algorithm based on kernel function can effectively overcome the shortcomings of a large number of noise features and high-dimensional data resulting in poor clustering effect and even falling into local minimum by mapping the data set to high-dimensional space by kernel function when dealing with non-linear and small amount of data, It can divide the data set well.

4 Conclusion With the rapid development of information science and technology and artificial intelligence, China’s agriculture is rapidly advancing from traditional agriculture to modern agriculture and intelligent agriculture. As a key link in agricultural production, fertilization has a significant impact on crop yield. Therefore, in this paper, a maize precision fertilization model is constructed, and an intelligent management decision-making system for precise production of maize is developed based on the model. Through precise fertilization, the crop yield can be improved, and the economic value and ecological benefits can be taken into account. Agricultural information management system plays an important role in precision agriculture. Through dynamic monitoring of farmland nutrients, combining with yield information, regulating the supply of farmland soil nutrients, improving the effective utilization of nutrients, achieving the purpose of high yield, high quality and high efficiency, and promoting the sustainable development of agriculture. In this paper, fuzzy clustering and neural network were used to build the precision fertilization model. Finally, the model was introduced into the precision fertilization intelligent decision-making system. The research results can provide scientific and reasonable fertilization basis for agricultural producers and improve corn yield.

References 1. Huai, B.: Study on Control System of Variable Rate Application of Granular Fertilizer Based on Neural Network. Heilongjiang Bayi Agricultural University (2012) 2. Liu, Z.: Research on E-commerce Sales Forecast Based on Data Mining. Beijing Jiaotong University (2018) 3. Lun, J., Ding, H.: Improvement of fuzzy c-means clustering algorithm. Comput. Digital Eng. 38(02), 4 (2010) 4. Liu X., Zhang, X., Ma, Y., Li, C., Yang, Y.: DTI image segmentation algorithm based on improved spatial fuzzy clustering. Chin. J. Biomed. Eng., 37(04), 394–403 (2018)

Optimization and Embedded Implementation of Gesture Recognition Algorithm Based on Convolutional Neural Network Hong Wang, Liyuan Chang, Lina Yu, and Xiangli Dong

Abstract With the rapid development of information technology and the maturity of computer vision technology, the application of gesture recognition based on vision has gradually become an important research direction in the field of artificial intelligence. As a very natural way of semantic expression, gesture plays an important role in human–computer interaction. However, complex gesture structure and changeable environment increase the difficulty of gesture recognition, resulting in low recognition rate. Convolutional neural network (CNN) improves the problem of manual feature selection in traditional recognition methods, and has been widely used in video monitoring, human–computer interaction, big data analysis and other fields. The real-time requirement of algorithm implementation in these fields is also higher and higher, which makes it very important to study how to use FPGA to accelerate CNN algorithm. Therefore, combined with gesture recognition technology, this paper studies the embedded implementation of convolutional neural network in ZC706 platform. Keywords Gesture recognition · Convolutional neural network · High level synthesis · FPGA · Embedded implementation

H. Wang (B) · L. Yu · X. Dong Shandong Xiehe University, JiNan 250107, ShanDong, China e-mail: [email protected] L. Yu e-mail: [email protected] X. Dong e-mail: [email protected] L. Chang Shandong Xiandai University, JiNan 250004, ShanDong, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_210

1587

1588

H. Wang et al.

1 Introduction In recent years, with the continuous development of artificial intelligence technology, computers occupy an increasingly important position in people’s lives. Human computer interaction technology has been widely used, and people’s requirements for the convenience and efficiency of human–computer interaction are also higher and higher. Different from the rapid development of computer software and hardware technology, the development of human–computer interaction technology is relatively slow. The traditional interaction mode based on mouse, keyboard, handle and touch screen has shown its limitations, which can not meet the growing demand for interaction diversity. Therefore, vision based human–computer interaction technology, especially gesture recognition, has gradually become a research hotspot in the field of artificial intelligence. Gesture is a very natural and commonly used way of semantic expression. Through gesture, computer equipment can be controlled intelligently, so that people can get rid of the restrictions of keyboard, mouse and other devices, and enhance the natural and convenient human–computer interaction. In addition to human–computer interaction, gesture is also an important way for deaf mute to communicate with normal people [1]. In many cases, normal people do not have the ability to understand sign language. If we can use intelligent devices to translate the sign language of deaf mute people, the communication efficiency between deaf mute and normal people will be greatly improved. In the field of medical research, hand gestures can also be used to remotely control the robot to complete the refined operation, so as to reduce the risk of manual operation.

2 Gesture Recognition Based on Convolution Neural Network The common structure of deep learning network includes deep neural network, deep belief network and convolution neural network. Among them, convolutional neural network with multiple hidden layers has excellent feature learning ability. The features obtained by network learning can be used as the abstract expression of target image, which is conducive to the classification and recognition of targets. Firstly, this chapter describes the whole process of gesture recognition. Secondly, in order to improve the recognition rate of gesture, some preprocessing methods are used to segment the gesture before using CNN for gesture recognition. Then, the network structure and algorithm of convolution neural network are described and reasoned in detail. Finally, a convolution neural network method based on deep learning is studied to recognize gesture images. The robust features of gesture can be extracted by layer by layer iterative convolution and down sampling technology, and the number of parameters in the network is reduced by weight sharing technology.

Optimization and Embedded Implementation …

1589

Fig. 1 Gesture recognition process

2.1 Gesture Recognition Process Traditional gesture recognition requires a series of complex preprocessing and feature selection of input information, extraction of image features, and then feature classification. Different from traditional methods, this paper presents a gesture recognition scheme combining skin color model and convolutional neural network. The process of gesture recognition is shown in Fig. 1. For gesture images collected by camera under different backgrounds, firstly, appropriate skin color model is selected to segment gesture regions, and then morphological operation mean filtering, connected region labeling and other algorithms are used to extract and reconstruct gesture regions [2]. Finally, combined with the convolution neural network method of deep learning, the gesture image is taken as the input directly, and the high-level semantic features of the gesture are extracted through the convolution layer and the down sampling layer, and the classification results are obtained.

2.2 Hand Gesture Region Reconstruction In the acquisition and transmission of gesture image, there will inevitably be a variety of noise, the quality of the image will be reduced, thus affecting the recognition results. Therefore, this paper uses the mean filter to filter part of the noise and improve the image quality. The template of the mean filter is shown in Fig. 2, and its output is the average value of the pixels in the filter template, so as to filter out the high-frequency signal. In addition to the effective gesture region, there may be some skin color like small areas in the gesture image processed by morphology and filtering, which will affect

1590

H. Wang et al.

Fig. 2 Mean filter template

the recognition results. Therefore, connected domain labeling algorithm is used to eliminate the influence of small regions.

3 Forward Propagation and Back Propagation Algorithm A typical CNN consists of multiple convolution layers, pooling layers and full connection layers. The network calculation includes prediction process and training process. The prediction process is forward calculation, and the output value of the network is obtained by forward propagation [3]. The weights are adjusted and updated by back propagation in the training process. This section takes CNN as an example to introduce the related algorithms of different layer prediction and training process. (1)

Forward propagation process Convolution layer receives η feature maps as its input and generates m output feature maps. Each image is convoluted by k × k shift windows, and then each convolution result is added to the offset value, and the pixel value is limited to a reasonable range by using appropriate nonlinear activation function. Common activation functions include tanh, sigmoid and relu. x lj = f (



xil−1 ∗ kil j + blj )

(1)

i∈M j

(2)

Back propagation process Back propagation algorithm uses gradient descent method to solve neural network. For labeled samples, its cost function is shown in Formula 2 [4]. Then the remaining data is input into the neural network until the set conditions are met, such as the error value less than how much, to complete the construction of the neural network. The construction of neural network is to use the derivation process of cost function to continuously spread the error forward until the optimization of the network is completed. E(w, b; x, y) =

 1 h w,b (x) − y 2 2

(2)

Optimization and Embedded Implementation …

1591

4 Construction of Embedded Linux System With the continuous development of information technology, artificial intelligence technology has been applied to all aspects of people’s life, electronic consumer products occupy an increasingly important position in people’s lives. From the original PC to the portable embedded devices, these devices can realize the functions of browsing the web, listening to music, watching video, sending and receiving QQ information and email. However, with the application of the system more and more widely, the requirements of system function and flexibility in different fields are also higher and higher. Only relying on their own hardware devices can not meet the requirements. Therefore, it is necessary to build an operating system in embedded devices, so as to provide unified process management, memory management, file management, driver interface and so on. At present, the mainstream embedded operating systems are embedded Linux, WindowsCE, Vx Works, μC/OS-II and so on.

5 Conclusion This paper mainly studies the optimization and embedded implementation of gesture recognition algorithm based on convolutional neural network. Through the analysis and comparison of different color spaces, combined with gesture segmentation and convolution neural network algorithm, a software implementation scheme of gesture recognition is proposed. Aiming at the real-time requirement of gesture recognition application, this paper improves the prediction process of convolutional neural network and analyzes its parallelism. FPGA accelerator is designed based on zynq-7000 platform and vivado HLS development tool. The diversity of gesture images and complex background will increase the difficulty of recognition, resulting in low recognition rate. In this paper, a gesture recognition method based on skin color model and convolution neural network is proposed. Firstly, GWT algorithm is used to correct the color of the image, so as to extract the skin color information better. Through the comparison of three different color spaces, the gesture region is segmented by threshold method in YCbCr color space. Secondly, the binary image of gesture region is generated by using morphological method, mean filtering, connected region labeling and so on, which is used as a mask image to multiply the original image, so as to obtain the region of interest of the gesture image and complete the gesture segmentation. Acknowledgements (1) Key projects of Art Science in Shandong Province Project Name: Current situation analysis and Countermeasures of Shandong Cultural Tourism from the perspective of Digitalization Project No.: ZD202008461 (2) Key projects in Shandong Province Project Name: Construction of talent training system for IOT Engineering Specialty in Post Internet Era Project No.: Z2018x092

1592

H. Wang et al.

References 1. Jiang, l., Qiu, Q.: Research on gesture recognition technology based on neural network. J. Beijing Jiaotong Univ. 2006(05), 32–36 (2006) 2. Liu, Z., Huang, F., Tangg, W.L., et al.: Real-time Sign Language Recognition with guided deep convolutional neural networks. In: Symposium on Spatial User Interaction. ACM 2016, pp. 187–188 3. Yu, Q.: Design and Implementation of Deep Learning Accelerator Based on FPGA. University of Science and Technology of China (2016) 4. Yu, Z.: Convolution Neural Network Accelerator Based on FPGA. Zhejiang University (2016)

Research on BIM Assembly Building Cost Accounting Model Based on Genetic Algorithm Huan-yu Wang

Abstract At present, prefabricated buildings are gradually accepted by the industry, but the management problems exposed in the construction process of prefabricated buildings are relatively serious. The application of BIM Technology in the whole life cycle management of prefabricated building will play a great role in the cost control of the whole process. To sum up, BIM Technology Applied to prefabricated buildings has a very broad application prospect. Keyword BIM · Prefabricated building · Cost control

1 Genetic Algorithm 1.1 Overview of Genetic Algorithm Genetic algorithm has been successfully applied in industry, economic management, transportation, industrial design and other fields, and solved many problems. For example, reliability optimization flow shop scheduling, job shop scheduling, machine scheduling, equipment layout design, image processing and data mining. This paper summarizes the current research status from the theory and technology of genetic algorithm, describes the main characteristics, basic principles and various improved algorithms of genetic algorithm, introduces the application fields of genetic algorithm, and analyzes the performance of genetic algorithm.

H. Wang (B) School of Investment & Construction Management, Dongbei University of Finance & Economics, Dalian 116025, China e-mail: [email protected] Institute of Construction Management, Dongbei University of Finance & Economics, Dalian 116025, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_211

1593

1594

H. Wang

1.2 Basic Principles Different from the traditional dragline algorithm, genetic algorithm starts the search process from a group of randomly generated initial solutions, called population. Each individual in the population is a solution to the problem, called a chromosome. These chromosomes continue to evolve in subsequent iterations, known as heredity [1]. Genetic algorithm is mainly realized by crossover, mutation and selection. The next generation of chromosomes generated by crossover or mutation operations is called offspring. The quality of chromosomes is measured by fitness. According to the fitness, a certain number of individuals from the previous generation and offspring are selected as the next generation population, and then continue to evolve. In this way, after several generations, the algorithm converges to the best chromosome, which is likely to be the optimal solution or suboptimal solution of the problem. In genetic algorithm, the concept of fitness is used to measure the degree of excellence that each individual in the population may reach the optimal solution in the optimization calculation. The function of measuring individual fitness is called fitness function. The definition of fitness function is generally related to solving problems.

1.3 Coding Problem of Genetic Algorithm For some continuous optimization problems, the local search ability of binary code is poor because of the random property of genetic algorithm. In order to improve this feature, people propose to use gray code for coding. Gray code coding method is a variant of binary coding method. It is such a coding method, in which only one code point is different from the coding value corresponding to two consecutive integers, and the rest are identical. Suppose there is a binary code B = bm bm−1 b1 b2 , and the corresponding gray code is G = gm gm−1 g2 g1 . gm = bm

(1)

g1 = bi+1 ⊕ bi i = m − 1, m − 2, , 1

(2)

Gray code has such a characteristic: the difference between any two integers is the Hamming distance between the gray codes corresponding to the two integers. This feature is the main reason why gray code is used to encode individuals in genetic algorithm. In addition to the advantages of binary coding, gray code can also improve the local search ability of genetic algorithm. For some multi-dimensional and high-precision continuous function optimization problems, using binary code to represent individuals will bring some disadvantages. For example, binary coding has mapping error when continuous function is discretized, and it is not convenient to reflect the specific knowledge of the problem. In order to overcome these shortcomings, people propose a real coding method, that

Research on BIM Assembly Building Cost Accounting Model Based …

1595

is, each gene value of an individual is represented by a real number. The advantages of the real number coding method are as follows: (1) it is suitable for the number with large range in genetic algorithm; (2) it is convenient for genetic search in larger space; (3) it improves the accuracy requirements of genetic algorithm; (4) it improves the computational complexity and operational efficiency of genetic algorithm; (5) it is convenient to mix the algorithm and classical optimization methods; (6) it is convenient to design genetic operators for special problems.

2 Cost Control Based on Genetic Algorithm The main characteristics of cost control are: (1) priority. As one of the important factors of the project, cost runs through the whole project. Therefore, the cost control plan should be ahead of the project plan. At the same time, various technical measures and management measures were carried out to complete the project successfully. (2) Optimization. Cost control does not exist in isolation, but is closely linked with project progress and quality [2]. Only by combining the control function, control object and various control elements can the project cost be fundamentally controlled and the expected goal can be achieved. (3) Dynamic. Under the market economy, the cost control of engineering project has its unique characteristics. In the process of the project, many costs are greatly affected by the external economic environment. Therefore, the project control is not completed at one time, but dynamically adjusted according to the actual project progress and external environment.

3 Building Information Model BIM BIM information is a kind of shared information resource, which can provide reliable basis for all decisions in the life cycle from construction to demolition of facilities. At different stages of the project, different stakeholders can support and reflect the collaborative work of their respective responsibilities by inputting, reading, changing and modifying information in BIM. The core value of BM is visualization, data, collaboration, simulation and optimization. The application of BIM makes the construction period, quality and cost can be directly fed back to the staff, which provides convenience for project management. In BIM Technology, BM model is the basis of the whole technology. The information based on data plays an important role in the whole process of construction. The application of BIM can be divided into three levels: the model as the lowest level is the carrier of information; the information as the intermediate layer provides support for the follow-up analysis; the actual economic benefit as the ultimate goal is the highest level of BM technology. BIM software refers to the software developed by applying BM technology. Among them, BM core modeling software is an effective tool for 3D modeling. Other software is based on BM core modeling software. At present, the more common BIM software

1596

H. Wang

in China is a series of software represented by Luban BM. At present, the amount of engineering information is huge, the form of engineering information is diversified, the correlation is large, the variability and anti-interference are poor. The application of BIM technology can save, contact and share the data in the whole life cycle of the project, and serve for the management of the whole project. BM model has information relevance, which is mainly reflected in the interrelationship of various parts of the system. For example, the change of unit cost of a certain part can be directly reflected in the actual project cost, that is, each part has a joint effect; Unity means that the whole life cycle of the project is unified before and after. When modeling in different stages, it can be done successively without multiple modeling.

4 The Necessity of the Combination of Prefabricated Building and BIM The necessity of the combination of prefabricated building and BM mainly includes the following aspects (1)

(2)

(3)

Improve the efficiency of prefabricated building design [3, 4]. Due to the need for the design of embedded components and reserved holes in prefabricated buildings, the communication between different disciplines is more important than that of cast-in-place buildings. Through the BIM platform, it is convenient for the exchange of various disciplines. The designers of each specialty can realize their own demands, and find out the omissions in the process of model design through collision simulation, so as to reduce the cost of changing design. The standardized design of prefabricated components is realized. In prefabricated buildings, the use of building modules is conducive to promote the standardization of prefabricated buildings. The component size and style of different building components can be uploaded to the cloud for integration, and a standardized family library of prefabricated components can be established to promote the formulation of prefabricated building codes and standards. At the same time, the components in each family library can be assembled arbitrarily, which increases the diversity of architectural styles of prefabricated structure, and also reduces the cost and time of architectural design. Reduce the design error of prefabricated building. Through BIM technology to design prefabricated building components, the size of components, reinforcement diameter, spacing and the thickness of protective layer can be refined design. In 3D model, the connection between adjacent files can be judged, and the conflict between components can be detected by collision detection. Avoid rough design and problems in the process of hoisting and assembling, which will affect the construction period and cause economic losses.

Research on BIM Assembly Building Cost Accounting Model Based …

1597

5 Conclusion and Prospect This paper mainly expounds the basic concept of BM technology and the necessity of integrating BIM Technology into prefabricated buildings, and introduces the life cycle cost control based on BIM in detail. Through research, it is found that BIM based project cost control has obvious advantages compared with traditional cost control, and has promotion value. Due to the national conditions, the development of BIM is still in the exploratory stage. The general situation is that the theoretical system is not perfect and the engineering experience is less. This paper only puts forward the idea and method of applying BIM to prefabricated building, and how to apply it to practical engineering construction is the next problem to be considered. Acknowledgements Youth Project of Liaoning (LN2017QN004). Postdoctoral program (BSH201710).

Provincial

Education

Department

References 1. Yang, Y.: Analysis of Project Cost Control Based on BIM. Dalian University of Technology (2014) 2. Qian, C.: Research on Lean Cost Control of Engineering Projects Based on BIM. Xi’an University of Architecture and Technology (2014) 3. Hu, B.: Research on Cost Control in Construction Stage Based on BIM. Hubei University of Technology (2015) 4. Xu, Y.: Research on Sustainable Development of Prefabricated Buildings in China. Wuhan University of Technology (2015)

Intersectional Leading Industry Based on Data Mining Liming Wang

Abstract With the development of digital technology, it is of great significance to realize the functions of accurate classification and quick search of Chinese painting images. Traditional Chinese painting recognition system mainly includes two steps: feature extraction and classification. Feature extraction is mainly based on personal experience. Although Chinese painting can be classified, there are still some problems such as easy loss of detail information and low generalization ability of model. Looking for an automatic and efficient recognition technology of painting is a hot spot in the current and future research. This paper first proposes a method based on deep belief network to classify Chinese painting images. On the one hand, the twodimensional structure information ignored by deep belief network is used to extract high-order statistical information. On the other hand, convolution operation is applied to the network structure, which can reduce the noise and enhance the expression of the original signal features. At the same time, the maximum probability model and sparse regularization algorithm are introduced into the hidden layer constrained Boltzmann machine structure, so as to realize the reasoning of probability and the weakening of the over complete phenomenon. Finally, the feasibility of this method in Chinese painting image classification is verified by experiments. Keywords Chinese painting image classification · Deep learning · Convolution depth belief network · Convolution neural network

1 Introduction Chinese painting is one of the most precious treasures in China’s art field. It not only carries profound cultural heritage, but also conveys the social consciousness and aesthetic concept of the Chinese nation. We call Chinese painting “Chinese painting” and call it “Chinese painting” for short. It mainly refers to painting and mounting on silk, Xuan paper and silk [1]. It can be said that Chinese painting is a L. Wang (B) Shihezi University, Shihezi 832000, Xin Jiang, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_212

1599

1600

L. Wang

traditional Chinese painting with high cultural value. With the rapid development of information technology, people are eager to apply machine recognition technology to classify Chinese painting, so as to realize the digitization of Chinese painting. At present, the research of image classification has been a hot spot. Although Chinese painting is also a kind of image, many techniques in its field need to be studied. Because the semantic information of Chinese painting is more abundant and abstract, the classification methods applied to traditional images are not necessarily suitable for Chinese painting. Traditional Chinese painting classification technology mainly relies on shallow learning, which adopts the way of setting features manually. Obviously, when dealing with complex classification problems, its generalization ability will be greatly limited. When designing a large number of artificial features, it is not only time-consuming and laborious to select a large number of artificial features, but also requires the selection personnel to have heuristic professional knowledge, which largely depends on luck and experience. Deep learning can automatically learn the features of data, and can abstract the underlying features into high-level features through supervised or unsupervised ways, so as to achieve better data classification. Because the research of deep learning in painting is still in its infancy, this method will undoubtedly become a hot spot of painting classification research.

2 Overview of Image Classification 2.1 The Concept of Image Classification Image classification is a technology of classifying the extracted object features (usually expressed by feature vectors) by using classification technology. Pattern recognition is to simulate the identification ability of human by using computer technology, and more specifically, to analyze, describe, distinguish and distinguish many things or objects by computer. So image classification belongs to pattern recognition, and its classification process is pattern recognition process, and it is the continuation and development of visual interpretation. Figure 1 is the process of image recognition [2]. The quality of image is improved by preprocessing the input data of the image, and then the image is segmented to extract the interested target area. Finally, the target is extracted from the feature and the appropriate method is selected for classification. Now, the following brief explanation is given for each stage. After collecting and quantifying the original data, the data is expressed in the form of matrix or vector. Generally, there are three kinds of input object information: two-dimensional image, such as text, picture, ultrasonic image, etc.; one dimensional image, such as electroencephalogram, electrocardiogram, mechanical vibration waveform, seismic wave, electromagnetic wave, etc.; physical parameters and logical values such as various data in medical diagnosis.

Intersectional Leading Industry Based on Data Mining

1601

Fig. 1 Image recognition process

2.2 The Process of Image Feature Extraction Good feature extraction is a necessary condition for image classification to achieve good results, so feature selection is very important for image classification. The main methods of feature selection are as follows: to obtain the original features, such as color histogram, color moment, texture feature, Hough transform and geometric moment feature; linear feature, such as PCA and FDA; nonlinear feature extraction, such as kernel method and popular learning; feature bag model, also known as bag of words model; Sparse coding. Among them, it is often necessary to select some feature subsets which are beneficial to the classifier measure from many initial features, and the initial features with high correlation or high noise can improve the performance of the classifier after being removed. Therefore, feature extraction can be regarded as a process of continuously eliminating useless features and aggregating related features, which can ultimately make the performance of classifier achieve the best [3]. The following two initial feature cases are taken as examples to analyze the process of feature extraction. Calculate the characteristic mean value of each class: 

μx j = 

μy j

Nj 1  xi j N j i=1

Nj 1  = xi j N j i=1

(1)

In Formula 1, the results are based on the estimated values of training samples N j , refers to the number of samples in class j, and xi j and yi j are the two characteristic components of the ith sample in class j. The characteristic variance is calculated, and the j-type two estimated eigenvalues are as follows: 2

σ xj =

Nj 1   (xi j − μx j )2 N j i=1

1602

L. Wang 2

σ yj

Nj 1  = xyj N j i=1

(2)

In an ideal environment, the corresponding characteristic components of all objects with the same category are generally very close, that is, the estimated value of the characteristic variance in 2 is very small in the ideal case.

3 Type of Classifier After image feature selection, it is usually necessary to judge the similarity between images, so as to provide the final recognition results for image recognition. However, classifier is usually used to judge the approximation, and the common classifiers can be divided into the following four types[4]: (1)

(2)

(3)

(4)

Statistical classifier the formation of statistical classifier is based on the theory of probability and statistics, and classifies targets by decision function. According to the composition of decision function, the model can be divided into two types: classifier based on likelihood function and classifier based on cluster analysis. In image classification, structural classifiers often recognize or classify objects according to their own structural characteristics, such as fingerprint, face, chromosome recognition and classification in biological features, and text discrimination. This kind of classification method is called structure classification, which can distinguish or recognize the classification according to the difference between the pattern or the structure of the object itself. This classification method is generally based on formal language theory. According to its structure, it can be decomposed into schema primitives or sub patterns. For schema primitives, grammar is usually used to describe the connection between them. Fuzzy classifier fuzzy classifier fuzzy classifier through the use of fuzzy set theory, to achieve the collection and analysis of fuzzy information, and then classify the data. The idea of this method is close to human intelligent thinking, and it is one of the important topics in the field of machine learning. The common methods include maximum membership principle method, nearest principle method and fuzzy cluster analysis method. Ann, a neural network classifier, comes from the imitation of the structure and function of biological neural network. Its model, topology structure learning and training algorithm are all based on biological neuron system. It has the advantages of associative storage, high-speed searching for optimal solution, automatic learning and so on. It is suitable for solving classification problems, and has been widely used in image classification or recognition. First of all, the matching degree is calculated, and then the matching degree is transmitted to the second level. The second level of the classifier gives feedback to the

Intersectional Leading Industry Based on Data Mining

1603

first level. Through some algorithms to train the corresponding weights in the network, this step is executed circularly until the expected value is obtained.

4 Conclusion The establishment of digital image is not only the demand of electronic information development of contemporary products, but also the basic requirement of convenient retrieval, inspection and management of images. As a kind of image, Chinese painting image has high artistic value, collection value and appreciation value. Therefore, the establishment of digitization in this field will have a significant impact on the establishment of image digitization and related research in the field of art in China. The classification of Chinese painting images is one of the important issues in the establishment of Chinese painting digitization. This paper summarizes the common methods of Chinese painting image classification, and concludes that the current general application of shallow learning to its classification. Although this method has made some achievements, it has the following defects: in the case of limited samples and calculation units, its ability to represent complex functions is limited; for complex classification problems, its generalization ability is limited; the features set by engineering are not only cumbersome and troublesome in design, but also very difficult to express middle-level features. The multi-layer nonlinear network structure with deep learning can not only achieve the approximation of complex functions, but also automatically learn features, and achieve good expression of middle-level features through layer by layer training method. Therefore, this paper proposes a Chinese painting image classification based on deep learning.

References 1. Yang, B., Xu, D., Yang, X., et al.: Classification of painting images based on similarity rules of artistic styles. J. Zhejiang Univ., Eng. Ed., 47(8), 1486–1492 (2013) 2. Jiang, S.: Research on Key Technologies of Automatic Extraction of Visual Media Language. Institute of computing technology, Chinese Academy of Sciences (2005) 3. Wyk, V., Benjamin, A.: An Analysis of Overfitting in Particle Swarm Optimised Neural Networks (2015) 4. Shi, X., Manduchi, R.: A Study on Bayes Featue Fusion for Image Classification (2003)

Clustering Algorithm for the Spread of Traditional Culture in Jilin Region Ping Wang

Abstract The wave of artificial intelligence has brought new opportunities for inheriting and reviving Chinese excellent traditional culture. What is the new opportunity for social forces to participate in the excavation of the contemporary value of traditional culture and commercial realization. Based on the profound insight into the needs of the audience, the cross-border cooperation of the artificial intelligence industry and the ecological layout of the terminal products can effectively enhance the social participation in the dissemination of Chinese excellent traditional culture, activate the broad consumption market of traditional culture through government guidance, organization coordination and public participation, and create a win– win situation of social and economic benefits, So as to promote the contemporary dissemination of excellent traditional culture. Keywords Artificial intelligence · Chinese excellent traditional culture · Cultural industry

1 Introduction Traditional culture embodies the essence of China’s 5000 year old culture. It can unite people’s hearts, enhance national centripetal force and cultural confidence. At the national level, the general office of the CPC Central Committee and the general office of the State Council jointly promulgated the opinions on the implementation of the project of inheriting and developing Chinese excellent traditional culture, which points out that excellent traditional culture is the core connotation of China’s economic development and the construction of a harmonious socialist society, and requires local governments to earnestly study and understand the spirit of the opinions and implement them. Under the background of new media, the rapid development of communication technology, the great innovation of traditional communication P. Wang (B) College of Humanities & Sciences of Northeast Normal University, Changchun City 130117, Jilin, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_213

1605

1606

P. Wang

mode, and the rapid change of audience concept have added variables to the transmission and inheritance of Chinese traditional culture. Therefore, the dissemination of Chinese traditional culture should be combined with its own characteristics and digital media technology, through content optimization, communication innovation and other ways, to continue our excellent traditional culture, in order to promote cultural prosperity and the Chinese dream of cultural power.

2 The Mode of Transmission of Chinese Traditional Culture at the Present Stage At present, the dissemination of Chinese traditional culture is mainly achieved through oral communication, graphic communication and group communication. These modes of communication are intertwined and bear the important responsibility and mission of spreading the excellent traditional culture of our country [1].

2.1 Oral Communication Oral communication refers to the primitive communication form of interpersonal communication with language as the medium. At present, oral communication can be divided into two types: direct face-to-face communication and media communication. The former refers to the face-to-face communication of the transmitter and the receiver through conversation, speech and lecture; the latter refers to the indirect communication between the transmitter and the receiver through the modern media such as mobile phone, telephone, computer and so on. Oral communication is the basic means of spreading traditional culture. In the long history of human cultural communication, oral communication plays an important role, oral communication has become an important way of cultural transmission.

2.2 Graphic Communication Graphic communication is a large-scale information dissemination activity carried out by specialized media organizations using advanced communication technology and industrial means. In essence, graphic communication is a kind of mass communication [2]. At present, the main media of graphic communication include newspapers, radio and television, which play an important role. For example, in terms of newspapers, the series of “remembering nostalgia” organized by the Propaganda Department of Hebei provincial Party committee and Hebei Daily newspaper group has made more people understand the history and current situation of Hebei traditional

Clustering Algorithm for the Spread of Traditional Culture …

1607

culture. In terms of broadcasting, Jiangxi Radio and television station’s traffic broadcast, people’s livelihood broadcast and tourism broadcast are professional media to promote Jiangxi’s traditional culture. On December 7, 2018, it carried out a live broadcast of the innovation and development of traditional culture of Confucius School in Jiangxi Province, which spread the excellent traditional Chinese culture. Far apart from each other, Xi Jinping glorious and resplendent column of “Jiangxi people in Jiangxi” is introduced to promote Jiangxi’s ancient, red and green culture. These media can deeply display the connotation of traditional culture, present the essence of traditional culture to the public, and better spread the excellent traditional culture of our country.

2.3 Mass Communication It refers to the communication activities between specific groups and within groups, which is a standard two-way communication. In recent years, Nanchang, Pingxiang, Jinggangshan, Ruijin, Yihuang and other places in Jiangxi Province have spread the excellent traditional culture of “loyalty, filial piety, benevolence and righteousness” through on-the-spot visits, classical reading, holding poetry conferences, listening to traditional cultural allusions and traditional culture entering the campus. This way can also arouse people’s concept of protecting traditional culture. For example, in June 2015, Shahe City, a famous city in Southern Hebei Province, held an onsite experience exchange meeting on the filing and investigation of ancient villages. Leaders from all units in the country and experts and scholars from various provinces, cities and autonomous regions gathered together to summarize and exchange the census experience and measures, and discuss the ingenious plan for rescuing and protecting ancient villages with traditional culture. On December 7, 2018, at the Hawthorn theater of the high tech Experimental School of Nanchang No.28 middle school education group, the communication meeting of traditional culture innovation and development of Confucius School in Jiangxi Province and the exchange summary meeting of Jiangxi Confucius school were held. Ms. Xu Guojing, cultural ambassador of China Confucius Foundation and chairman of the National Association of primary and secondary schools Confucius schools, made a wonderful speech, systematically expounding the core ideas of Confucian culture, And the Confucius school motto “write good words, read good books, be a good man” made a vivid interpretation, so that the participants benefited a lot and praised one after another [3].

1608

P. Wang

3 Creative Transformation and Innovative Development: The Internal Driving Force of Traditional Culture Communication In the era of “content is king”, generating high-quality narrative content is the premise to achieve efficient and high-quality communication of excellent traditional culture [4]. Promoting social participation in content creation is the main way to promote the dissemination of traditional culture. Artificial intelligence technology provides the audience with the conditions to participate in the cultural narrative process, forming the narrative content symbiosis mode. This mode is not only reflected in the secondary communication behavior, such as feedback, forwarding, praise and other simple interactive behavior itself is a kind of practice of participating in communication, but also reflected in the creation of the first communication content, for example, The artificial intelligence device can set the audience’s preferences and requirements in advance before generating the creative content, and generate different content through different commands. The audience has carried out a brand-new cultural consumption experience based on their own preferences, changing the object into the subject, and both the narrator and the receiver participate in the generation process of the narrative content. Although content symbiosis improves social participation and promotes the classification, stratification and popularity of traditional culture, this kind of narrative generation is a symbolic simulation, arrangement and combination according to the given rules and orders. The randomly generated content may be too patterned, the plot and character depiction are not full, and the aesthetic charm of traditional culture is greatly reduced (Fig. 1). The AI formula is as follows: p = exp(β0 + β1 age) = eβ0 +β1 age

Fig. 1 Narrative generation of strong artificial intelligence

(1)

Clustering Algorithm for the Spread of Traditional Culture …

p=

eβ0 + β1 age exp(β0 + β1 age) = β exp(β0 + β1 age) + 1 e 0 + β1 age

1609

(2)

4 Conclusion Artificial intelligence is profoundly changing human thinking mode and life style. In many countries, artificial intelligence technology has been applied in the fields of promoting cultural heritage, economic development, social stability and national security. Artificial intelligence is open, and the integration of science and technology and culture forms the huge social and economic benefits brought by the industry, which also provides the possibility of long-term cooperation among the government, enterprises and the public. Artificial intelligence has incomparable advantages in cultural heritage. It can spread excellent traditional culture by using artificial intelligence, so that traditional culture can glow with new vitality in contemporary society, meet people’s needs for diverse cultures, enrich people’s life, and make our nation more cohesive and centripetal. At present, the advantages and disadvantages of artificial intelligence technology in the application of traditional culture communication are prominent. The advantages are that domestic leading enterprises have paid attention to the scene ecological integration of artificial intelligence and traditional culture, and have made practical exploration in visual recognition, voice recognition, game implantation and other aspects, and have developed successful product applications and terminal products, which are deeply loved by consumers; The disadvantage is that traditional culture in the process of digital acquisition, the development of core hardware equipment in China is backward compared with developed countries, the policies and regulations of artificial intelligence need to be improved, and the training of advanced talents of artificial intelligence technology is not enough. In the future, artificial intelligence will connect people, objects and scenes through 5 g network, and help the creative transformation and innovative development of Chinese excellent traditional culture through the complete ecology and landing terminal of interconnection of all things. The integration of cutting-edge technology and excellent traditional Chinese culture is bound to help the revival of Chinese excellent traditional culture and make Chinese stories vivid and colorful. It can be predicted that in the future, more and more Chinese cultural images will enter the hearts of Chinese people with the help of artificial intelligence, go overseas, and become business cards for spreading “Chinese stories”. Acknowledgements Jilin Provincial Department of Education “13th five-year Plan” Social Science Research Project《Research on the New Communication Strategy of Jilin Regional traditional Culture in the era of artificial Intelligence》Contract NO.: JJKH20190365SK.

1610

P. Wang

References 1. Zhang, L., Yang, A.: Research on memory place: development trends and trends. J. Guizhou Normal Univ. (Social Science Edition), 2018 (06) (2018) 2. Qin, X.: On the TV media transmission of Chinese traditional culture. Press Cradle 2019 (02) (2019) 3. Wang, J.: Hebei Province, a Study of Culture Communication in Baoding, Hebei Province 4. Lu, L.: Transformation strategy of Confucian culture communication mode from the perspective of media integration. Media Obs. 2015 (08) (2015)

Research and Implementation of Layering and Path Planning Algorithm in 3D Printing Technology ShanShan Wang

Abstract In view of the current 3D printing software processing scanning path planning problem, this paper proposes a path planning method based on offset algorithm. On the basis of contour offset algorithm, equal distance contour offset is adopted, and the output is in common cli file format. The scanning path planning and display are also realized by programming. Keywords 3D printing · Data processing · Layering · Path planning

1 Layered Algorithm in 3D Printing Technology 1.1 The Concept of Stratification Layering, as the name implies, divides the three-dimensional entity into slices, that is, the closed contour line obtained by intersection of a plane parallel to xoy plane and the model is the layer section. However, in the actual manufacturing, this layer has a certain thickness. Therefore, in the process of layer by layer manufacturing, the surface of the three-dimensional solid is not smooth, and it is step like, and its precision has a certain gap with the three-dimensional modeling software. In the field of 3D printing, it is called principle error, resulting in this phenomenon called step effect [1].

1.2 Hierarchical Process and Algorithm of STL File The layering process of 3D printing is to use a series of parallel planes to cut STL model along the forming direction (generally Z direction). There are equal thickness S. Wang (B) Electromechanical College, ChangChun Polytechnic, Changchun 130033, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_214

1611

1612

S. Wang

layers and adaptive layers, which can be determined according to the processing technology and processing accuracy. In its layered software system, the establishment of scientific and reasonable data structure can improve the efficiency of layering. Therefore, according to the characteristics and layering of STL file, the establishment of data structure and the acquisition of plane intersection line and contour line are the key points.

1.3 Hierarchical Processing Algorithm This paper mainly focuses on STL file model, so the research is based on STL model hierarchical algorithm. Before introducing the layered algorithm, we should first understand the properties of triangular patches in STL files: the continuity of triangular patches themselves. In geometry, triangles are special graphics, which have the characteristics of regional continuity, scan line continuity and edge continuity. The triangle itself is a plane simply connected convex domain, and the regional continuity is not necessary to prove. The continuity of scan line means that if a scan line intersects a triangle patch, then the intersection line must be composed of the line connecting the intersection point of the scan line and the two sides of the triangle. The continuity of the edge can be achieved by intersecting the triangle. The recurrence relation of the line segments cut by two layered surfaces is shown. For example, the triangle vertex coordinates are V1 (x1 , y1 , z 1 ), V2 (x2 , y2 , z 2 ), V3 (x3 , y3 , z 3 ) the current layered plane height z h = z[i], and the coordinates intersecting with V1V2 edge are z h = z[i + 1]. When the thickness of a layer is increased, the current layer height is z h = z[i + 1] and the intersection coordinates are (x[i + 1], y[i + 1]). As shown in Fig. 1. If the interval between layers is Z , the intersection coordinates between adjacent layers can be obtained by the algorithm based on triangle continuity. If the coordinates are on the same side, there is a recurrence relationship Fig. 1 Continuity characteristics of unit triangle

Research and Implementation of Layering and Path Planning …



k x (x1 − x2 ) − (z 1 − z 2 ) k y (x1 − x2 ) − (z 1 − z 2 )

1613

(1)

where k x and k y are proportional coefficients, then x[i] = x1 + k x (z 1 − z[i])

(2)

y[i] = y1 + k y (z 1 − z[i])

(3)

X and Y are constants that can be determined by Z . if an edge of a triangle intersects n layered patches, only two multiplication and division operations and 2N addition operations are needed to calculate the coordinates of N intersection points, which reduces the computational complexity of all intersection points [2].

2 The Importance of Path Planning In 3D printing data processing. No matter what kind of process, the principle of layering is the same as that of path planning. Therefore, after the cross-section information obtained by layered intersection, it is necessary to plan the machining path of these section information, that is, the filling of scanning path. In the field of 3D printing, the importance of path planning is no less than that of layering. It is a process that data processing software processes layers after layering. Path planning affects the forming method of parts. In the manufacturing process, due to the different scanning and filling methods, it has a great impact on the precision and quality of formed parts. Therefore, reasonable planning of filling path is an important part of 3D printing technology [3].

3 Research on Path Planning Algorithm 3.1 Research on Filling Algorithm of Offset Path Planning In 3D printing technology, the planning of scanning path has a great impact on the forming parts. Firstly, if the scanning mode is not correct, the surface accuracy of the formed parts will be affected; secondly, the incorrect scanning mode will lead to the deformation of the forming material due to the stress generated during cooling shrinkage; thirdly, if the scanning filling process has too much empty stroke, start 3D The research and implementation of layering and path planning algorithm in printing technology 40 stops too many times, which will inevitably prolong the processing time, affect the processing efficiency, and also damage the use of forming head.Life,

1614

S. Wang

which is not in line with the concept of 3D printing technology fast and efficient. Therefore, in this paper, based on the research of various scanning paths, combined with their own research direction, in order to achieve 3D At the same time of printing hierarchical path planning technology, taking into account the medical requirements of high precision, high strength and small deformation of denture, a contour offset scanning algorithm with high manufacturing accuracy is used. In this paper, the offset algorithm is improved. When the contour is offset, the offset distance is the same, that is, the offset distance of each edge is the same, so it is called isometric Offset path planning algorithm.

3.2 Analysis of Existing Scanning Path Planning Methods As the scanning path planning is an important part of 3D printing data processing, it has a great impact on the precision and physical properties of the formed parts. Choosing a reasonable scanning path can greatly improve the processing speed and the stability of the scanning mechanism, and can effectively reduce the start-up and stop times in the forming process. Since its advent, 3D printing technology has not been studied. Thus many path planning methods are derived. After a large number of scholars and experts, there is a scanning algorithm called contour offset, which can ensure the surface accuracy of parts with uniform wall thickness or few cavity structure, and can solve the problems of deformation and warpage in the forming process. The following figure is the research object. First, determine the size of the offset D, and then consider the problem of the distance L between the inner and outer contours. If l is less than D, the offset will not be carried out, otherwise, the offset will be carried out. In the process of offset, if a point on the outer contour offsets D inward, it stops and offsets point by point. Finally, all the points are connected to form an offset line. Then, based on this offset line, offset point by point, and so on, and finally complete the offset.

3.3 Implementation of Offset Offset Algorithm In fact, contour offset is the parallel offset of the inner and outer contour of the model along different directions. The key problem is how to realize the offset of the inner and outer contour to generate scan lines, so as to make 3D printer manufacture rapidly. In the actual production, it is very similar to the tool interpolation in NC machining. There are two types of tool interpolation: shortened type and non shortened type [4]. Shortened type: when machining the inside of a corner (α ≥ 180°), the tool goes to the intersection of two equidistant linesAt the point, the trajectory is shortened by a section, which is called shortening type. Non shortening type: when machining the outside of a corner (α ≥ 180°), the tool goes to two equal distances.The intersection of the lines is longer than that of the

Research and Implementation of Layering and Path Planning …

1615

original track (in this paper, fillet treatment is used), which is called non shortening type.

4 Conclusion With the continuous progress and development of social science and technology, all kinds of high-tech gradually come into the public view and serve the society. As an advanced additive manufacturing technology, 3D printing technology was rated as the most potential science and technology in 2015. Its excellent characteristics have been developed and applied, and achieved good results. Among them, the core part of 3D printing technology is the research of data processing part layering and path planning algorithm. Acknowledgements Research Project of Jilin Provincial Department of Education: Based on the mode of school-industry connection, Research the methods and practice of improving the quality of vocational education of Mechanical Engineering Specialty in Higher Vocational Education, JJKH20201328SK.

References 1. Wu, H.: 3D Printing, 3D Intelligent Digital Creation. Electronic Industry Press, Beijing (2014) 2. Wang, X.: Development and prospect analysis of 3D printing technology and industry. China High Tech Enterp. 26, 3–5 (2012) 3. Jin, Y., Wang, Y.: Free Forming Technology. China Machine Press, Beijing (2012) 4. Jing, H.: Principle and forming accuracy analysis of 3D printing technology. Mech. Res. Appl. (2) 183–187 (2013)

Research on Smart Home-Community-Based Pension Model of Combination of Medical and Health Care Based on “Internet +” Caifen Han, Lei Liu, and Caixin Han

Abstract Based on the analysis of the needs and preferences of smart elderly care services for the elderly, this paper constructs a platform of smart home-communitybased pension model of combination of medical and health care based on “Internet + ”, and analyzes the obstacles that the smart pension platform may face, and proposes corresponding suggestions and countermeasures. Keywords “Internet +” · Smart elderly care · Combination of medical care · Pension

1 Introduction The global population aging problem is getting more and more serious. According to reports issued by the WHO, the number of people over 60 will increase to 2 billion in 2050, which will put tremendous pressure on the health care system and health care workers. Compared with developed countries, China’s aging population is featured by large population base, rapid growth, a combination of aging family and smaller family size, loss of only child family, numbers of distressed families and rapid increase in old-age dependency ratio. By the end of 2018, China has 294.49 million people in their 60 s or above, accounting for 17.9% of the whole population. Among them, there are 166.58 million people over 65, accounting for 11.9% of the total population. At the end of 2017, there was an increase of 8.59 million in terms of them number of over 60 and an increase of 8.27 million over 65 [1]. With an aging population, pension issue comes. On March 6, 2017, the “13th Five-Year Plan for the Development of the Aged Career and Pension System” issued by the State Council, proposed the goal to build a more improved social security system by 2010 which has C. Han · L. Liu North China University of Science and Technology, Tangshan 063000, China C. Han (B) College of Economics and Management, Hebei University of Technology, Tianjin 300000, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_215

1617

1618

H. Caifen et al.

the “multi pillars, full coverage, and is fairer and more sustainable as well as the goal of building a better old-age care system combining medical care and maintenance, with family and community as a basis and other institutions supplements [2]. “Internet + old-age care” has become a new model for the elderly to support, and is also one of the priorities of future development [3].

2 Analysis of the Elderly’s Needs and Preferences in Smart Elderly Healthcare 2.1 Basic Situation of the Respondents This paper selected the survey objects in a city in Hebei Province. The author selected 5 towns and all the streets in the district (cities, districts)) and issued questionnaires to 40 elderly people over 60 years old in each district and township. The age group is stratified and according to the age. This thesis adopts the standardized interview and self-administered questionnaire [4]. A total of 4458 elderly people over the age of 60 were selected in the city, with male accounting for 48.64%, female for 51.36% [5]. Among them, 29.39% are of 65–69 years old, 24.16% of 60–64 years old, 21.69% of 70–74 years old, 12.47% of 75–79 years old, 12.29% of 80 or above. About the education level, 37.46% only finish primary school education, which also accounted for the most. The junior middle school accounted for 31.39%, the uneducated accounted for 14.10%, the high school or secondary school accounted for 12.97%, the junior college accounted for 3.09%, the undergraduate accounted for the least (0.99%). Concerning the work unit, till retirement, the farmers accounted for 43.61%; 22.24% worked for state-owned enterprises, the other accounted for 11.29%; 8.95% for the public institutions, 5.90% worked for private enterprises; 4.67% have individual businesses; and 3.34% of the government agencies. About the place of residence, the number of people living in rural areas accounted for 42.57%, urban residents accounted for 30.16%; the number of those living in counties accounted for 15.22%, and the township elderly accounted for 12.06% [6].

2.2 The Elderly’s Needs and Preferences in Smart Elderly Healthcare Among the elderly people surveyed, the pension mode that the elderly want to choose is shown in Table 1. As for the pension mode, the number of elderly people who choose the home-based self-supporting model is 2198, which is the most, accounting for 50.26%. The home + social service organization followed, with 613 people choosing it, accounting for

Research on Smart Home-Community-Based Pension Model … Table 1 Pension mode that elderly want to choose

1619

Favorite pension mode

Number Percentage (%)

Home-based self-supporting

2198

50.26

613

14.02

Home + Social service organization Home + Nanny

505

11.55

Home + Community

501

11.46

Pension Institutions

556

12.72

14.02%; The number of home and nanny care is the third, which 505 followers, accounting for 11.55%; There are 501 people choosing the home + community, accounting for 11.46%. Only 556 people of the elderly choose to go to the pension institutions, accounting for 12.72%. When it comes to smart elderly healthcare, although the current penetration rate is low, it is highly recognized by their children. Living in a community which elderly are familiar with, it seems more in line with the living habits and psychological needs of the elderly and the family. It can compensate for the lack of family care in some ways. According to the survey results, in the future, some special attention should be paid to the effective integration of home pension and community pension. With the help of “Internet +”, we will build a comprehensive community-based pension service system for the community, strengthen community medical services for the elderly and community-based intelligent network services and form a three-in-one embedded pension service network of “family + community”, “age care + medical care” and “online + offline”. It can be concluded from Table 2 that there are 2525 people over 60 hoping hope to choose the health care projects in the community “smart pension platform”, accounting for 58.10%. There were 1773 people choosing the emergency assistance category, accounting for 40.80%. Thirdly, there are 1,706 people choosing the life service category, accounting for 39.25%. There are still 711 people who are unwilling to use the smart pension platform. Table 2 Elderly’s choices about services in the “smart pension platform”

Services

Number

Percentage (%)

Health care

2525

58.10

Emergency assistance

1773

40.80

Domestic services

1706

39.25

Mental care

1092

25.13

Legal rights

757

17.42

Unwilling to us the platform

711

16.36

1620

H. Caifen et al.

Fig. 1 Framework of smart pension platform

2.3 Build an Internet + Smart Community Pension Model Platform that Combines Medical and Health Care The platform will be an integration of home care service with the Internet, and provides effective aged care service for the elderly living in the home and community through an online smart community pension service platform. In the current community, community pension service center should be built or the number of family doctors increased. This platform will combine the community and the aged care center to make up for the shortage of the traditional family pension model. The framework of the platform is shown in Fig. 1.

3 Analysis the Obstacles of Home-Community-Based Pension Model of Combination of Medical and Health Care According to the survey results above, there are 711 people who are unwilling to use the smart pension platform. After interviews with the elderly who are unwilling to use the smart pension platform and the managers of the community pension center, as well as the relevant departments of the civil affairs department and the health department, it is possible to find obstacles in the implementation of the home-based pension model of the medical-integrated smart community. First of all, the combination of medical and health care services is dependent on information technology. The development of facility is directly related to the quality and level of smart pension. However, the quality of some smart devices is intermingled. The quality of hardware smart devices on the market is intermingled. The increase of facilities may also increase family’s economic situation. Even some

Research on Smart Home-Community-Based Pension Model …

1621

of the smart platforms which have not fully considered the subsequent use during the construction process, resulting in poor implementation and low utilization rate. Secondly, because of the elderly relatively low level of education which caused that they have no ability to accept new things. It also forms a contradiction with the high level of smart and smart for the elderly. The use of smart devices is a very big challenge for the elderly, especially the rural elderly. Third, there are difficulties in promoting the smart pension platforms. The creation of a smart community home pension platform and the use of smart pension products are the key to the implementation of the home-community-based pension model of combination of medical and health care. At present, there is still a huge gap in the construction of smart pension platforms in cities already built in China. In particular, the ability to collect health information is weak. The analytical ability is not good. Mobile medical and telemedicine cannot meet the needs of the elderly. They want to have products that are easy to operate and carry. To a certain extent, this will result in high cost of design and manufacturing of smart pension products, which is too expensive for most elderly people in China. In addition, there are no clear standards and laws and regulations on the service quality and personal safety of the platform, which will also limit the use of the platform. Finally, the rate of professional brain drain is high and talent shortage. For a long time, the entry threshold of China’s old-age care service market is very low, resulting in a low level of personnel quality. Generally, it can only provide basic life care, which is difficult to meet for medical care and nursing care. Moreover, due to the low income and heavy workload of the pension medical care industry, the loss of personnel is very serious. In addition, the smart talents require more complex talents with certain information processing capabilities, which restricts the promotion of the combination of medical and health-based community home service models to a certain extent.

4 Suggestions and Countermeasures Based on the above analysis, as a new type of old-age service model, it is still in the initial stage of development and faces many challenges. In order to overcome the above obstacles, we can start from the following aspects: First of all, the government should strengthen guidance, improve laws and regulations, and introduce standards for smart aged care services and hardware equipment. Formulate standardized and quantifiable standards for all aspects of smart retirement, accelerate the formulation of medical data information platforms and telemedicine responsibility regulations, and clarify the responsibilities and obligations and service standards of families, communities, medical service departments, and third-party service organizations. To ensure the quality of service enjoyed by the elderly and personal and information security. Second, deepen the cultivation of talents and provide talent protection for the development of smart old-age care. Colleges and universities should provide more

1622

H. Caifen et al.

related professional services and courses such as aged care, smart product research and development, and cultivate professional compound talents. A well-trained team of professional skills can also be formed through planned job training. By improving the salary level of the industry, the stability of the talents in the pension industry is guaranteed. Finally, strengthen the popularization of information technology for the elderly. Through media learning, community propaganda, and training courses, we will go deep into the elderly group, convey the concept of smart old-age care, teach them to use smart products, let them feel the convenience brought by smart devices, and improve the information level of the elderly. Acknowledgements This paper was supported by the project: Social Science Fund of Hebei Province (No. HB19GL022);Health Commission of Hebei province (Granted No. 20190103); Hebei Provincial Department Human resource and Social Security (Granted No. JRS-2020-3111).

References 1. Sudan: The legal characteristics of China’s smart endowment model and its system demand—a study based on the smart pension policy. Jianghan Acad. 18(6):50–59 (2009) 2. Lian, H., Shen, X.: Research progress of “health-care combination” smart and Ald-age model in the “Internet +” environment. Chin. Gen. Nurs. 19(23), 2580–2583 (2002) 3. Li, T., Huang, K.: Research on the construction of smart community pension service system under the background of medical and health. Chin. Rural Health Serv. Adm. 18(09), 1140–1143 (2015) 4. Xie, Y.: Thoughts on the research and informatization practice of medical care combined with smart old-age service model. Comput. Knowl. Technol. 18(27):277–278 (2017) 5. Wang, Z., Zhao, Y.: A summary of research on smart endowment in the background of Big Data. Shandong Trade Unions’ Tribune 19(3):54–60 (2001) 6. Liu, X.: Optimization Research on the Mode of Community Retirement in Shijiazhuang City. Hebei Normal University (2019)

Design Problems of Bridge Pile-Soil Interaction Based on Machine Learning Wenyu Xu

Abstract Pile foundations are usually buried deep underground and form an interactive whole with the surrounding soil. The pile foundation is mainly to bear vertical forces. Its main function is to improve the bearing capacity of the foundation and effectively control the settlement of the foundation and the foundation. In order to understand the working performance and interaction law of the pile-soil interaction system to carry out reasonable in-situ tests and correct numerical simulation analysis, it is necessary to conduct an in-depth theoretical analysis of the vertical bearing characteristics of the pile foundation. This paper analyzes the process of bridge pile-soil interaction based on machine learning algorithms. The analysis includes the different classification methods of pile foundations, the load transfer mechanism of the pilesoil system, the exertion mechanism of pile side resistance, the exertion mechanism of pile tip resistance, and the factors affecting the vertical bearing capacity of a single pile. The research results have a certain effect on the bridge pile-soil design. Keyword Machine learning · Bridge pile-soil · Design problem · Design analysis

1 Overview of Bridge Pile Foundation Problems Before understanding the load transfer mechanism of the pile-soil system, it is necessary to understand the method for determining the ultimate bearing capacity of a single pile. The ultimate bearing capacity of a single pile reflects the maximum ultimate load that a single pile can bear. It is composed of the ultimate resistance of the pile side and the ultimate resistance of the pile. The method for determining the vertical bearing capacity of a single pile is divided into in-situ test method and empirical parameter method. When the in-situ test method is adopted, the “Technical Specification for Building Pile Foundations” (JGJ94.2008) stipulates [1]: W. Xu (B) School of Mechanical Engineering, Nanjing University of Science and Technology ZiJin College, Nan Jing 210023, Jiangsu Province, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_216

1623

1624

(1)

W. Xu

When determining the standard value of the vertical ultimate bearing capacity of a single precast concrete pile based on the static cone penetration data of a single bridge probe, if there is no local experience, the following formula can be calculated:  qsik li + αpsk A p (1) Q uk = Q sk + Q pk = u When psk1 ≤ psk2 : 1 ( psk1 + βpsk2 ) 2

(2)

psk = psk2

(3)

psk = When psk1 > psk2 :

Q uk Q sk , Q pk psk qsik psk1 psk2

the ultimate bearing capacity of a single pile (kN); indicates the standard value of the total limit side resistance and the standard value of the total limit end resistance (kPa), respectively; the standard value of static penetration resistance near the pile end (kPa); the ultimate lateral resistance (kPa) of the f-th layer of soil around the pile estimated by the static cone penetration resistance value; the average value of specific penetration resistance (kPa) within the range of 8 times the pile diameter above the section; the average value of specific penetration resistance in the range of 4 times the pile diameter below the full section of the pile tip. For example, if the pile end bearing layer is a dense sandy soil layer, when the average specific penetration resistance exceeds 20 MPa, it needs to be multiplied by the coefficient C in Table 1 to reduce it, and then psk is calculated [2].

u—the perimeter of the pile (m); A p —the area of the pile tip (m2);li —the thickness of the f-th layer around the pile (m);α the pile tip resistance correction coefficient, and its value is in accordance with Table 2;β—the reduction factor, and its value according to Table 3. Table 1 Reduction factor

Table 2 Pile tip resistance correction coefficient

Psk(PMa)

20–30

35

> 40

C

5/6

2/3

1/2

Pile length (m)

l < 15

15 < l < 30

30 < l < 60

α

0.75

0.75–0.9

0.9

Design Problems of Bridge Pile-Soil Interaction …

1625

Table 3 The reduction factor Psk2/Psk1

≤5

7.5

12.5

≥ 15

β

1

5/6

2/3

1/2

(2)

When determining the standard value of the vertical ultimate bearing capacity of a single precast concrete pile based on the static cone penetration data of the double bridge probe, for cohesive soil, silt and sand, if there is no local experience, the following formula can be calculated: Q uk = Q sk + Q pk = u



li βi f si + αqc A p

(4)

In the formula: f si qc

α βi

the average lateral resistance of the probe of the f layer of soil (kPa); the resistance of the probe above and below the pile end plane. It selects the weighted average (kPa) of the probe resistance in the 4d range below the pile end plane according to the thickness of the soil layer, and then averages the probe resistance in the ld range below the pile end plane; correction factor for pile tip resistance. The value of cohesive soil and silt is 2/3, and the value of saturated sand is 1/2; the comprehensive correction coefficient of pile tip resistance of the first layer of soil [3].

When using the empirical parameter method, the “Technical Code for Building Pile Foundations” (JGJ94-2008) stipulates: 1.

When determining the standard value of the vertical ultimate bearing capacity of a single pile according to the empirical relationship between the physical indexes of the soil and the bearing capacity parameters, it is estimated according to the following empirical formula: Q uk = Q sk + Q pk = u



qsik li + q pk A p

(5)

In the formula: qsik the ultimate lateral resistance of the f-th layer of soil around the pile (kPa); q pk the standard value of ultimate resistance (kPa). 2.

When determining the standard value of the bearing capacity of a single largediameter pile based on the empirical relationship between the physical indicators of the soil and the bearing capacity parameters, the following formula is used to calculate:  ϕsi qsik li + ϕ p q pk A p (6) Q uk = Q sk + Q pk = u In the formula:

1626

qsik q pk ϕsi , ϕ p

W. Xu

the ultimate lateral resistance of the i-th layer of soil around the pile (kPa); the standard value of ultimate end resistance of pile diameter 800 mm. For dry work digging (clear the bottom), it can be determined by deep load board test; the size effect coefficient of side resistance and pile tip resistance of large diameter piles.

In fact, the calculation methods of pile foundation bearing capacity adopted by different codes are similar. In actual engineering, under the action of vertical load on the pile foundation, both the foundation pile and the soil will produce vertical relative displacement. The load on the top of the foundation pile is borne by the pile side friction resistance and the pile end resistance. Therefore, the load transfer process of the pile-soil system is the interaction between the pile and the soil, and the process of gradually exerting the lateral resistance and end resistance is shown in Fig. 1 [4]. Through machine learning to analyze the vertical force of a single pile, the basic process of pile foundation load transfer can be described as: When the top of the pile foundation bears the vertical load transmitted by the upper structure, the pile body first produces a certain compression deformation, and the pile body undergoes a vertical downward displacement relative to the surrounding soil. After that, the frictional resistance of the pile-soil interface of the overlying soil layer begins to play, generating upward positive frictional resistance, and transferring the load to the soil around the foundation pile, which caused the axial load of the pile section Fig. 1 Schematic diagram of single pile vertical compression

Design Problems of Bridge Pile-Soil Interaction …

1627

Fig. 2 Single pile vertical compression load transfer process (pile body displacement, lateral resistance, pile axial force)

and the compression deformation of the pile to gradually decrease with the increase of depth. As the load is further transmitted downwards, the pile end produces vertical displacement and vertical reaction force, and the pile end resistance starts to play. At the same time, the displacement of the pile tip increases the displacement of each section of the pile body, making the pile side resistance to be further exerted. When the pile side resistance reaches the limit state (when the foundation pile is a friction pile, the bearing capacity of the pile foundation has reached the limit state), all the transferred loads of the superstructure will be borne by the pile end resistance until the pile body or the pile end bearing layer is damaged. At this time, the pile foundation reaches the ultimate state of bearing capacity. In general, the lateral resistance of the overlying soil layer comes into play before the underlying soil layer, and the lateral resistance comes into play before the end resistance. The load transfer process is shown in Fig. 2. Under the action of vertical load, the settlement deformation of a single pile can be summarized into the following three parts: (1) The settlement of the pile top caused by the elastic compression of the pile body under vertical load. For super-long piles, its value cannot be ignored; (2) The pile side friction resistance is transmitted below the pile tip soil layer, which in turn causes the pile tip soil layer compression and further increases the pile top settlement; (3) In the process of pile tip resistance, the elasto-plastic compression deformation of the pile tip soil caused by the tip resistance causes the pile top settlement [5].

2 Mechanism of Lateral Resistance of Single Pile Through machine learning to analyze the lateral force of a single pile, it is found that under the action of vertical load, during the bearing process of the pile foundation, the displacement of the pile body and the axial force of the pile body section gradually

1628

W. Xu

decrease with the increase of the soil depth, and the pile side friction resistance gradually develops from top to bottom. At the same time, the pile side friction drives the soil around the pile to produce displacement, so that the soil around the pile generates evenly distributed shear stress and strain in the circumferential direction, and spreads into the surrounding soil along the radial direction. When the shear stress in the soil at the side of the pile reaches the maximum shear stress, plastic slip occurs in the soil immediately. However, the slip surface does not appear at the interface of pile-soil contact, but occurs in the soil layer close to the surface of the pile. The reason is that the cement slurry and soil will form a hard layer of cement-soil close to the side wall of the pile during the pile formation process, which causes plastic slippage to occur on the outside of it. It is equivalent to increasing the effective pile diameter of the foundation pile and the contact area of the soil on the side of the pile, which improves the total frictional resistance of the side of the pile to a certain extent [6]. The pile side friction resistance can be solved according to Fig. 3. The axial force at any section of the pile body is:  P(z) = p0 − U

z

τ (z)dz

(7)

0

The compression deformation produced by the micro-segment dz is: ds(z) = −

Fig. 3 Situation of side resistance of single pile

p(z) dz Ep Ap

(8)

Design Problems of Bridge Pile-Soil Interaction …

1629

The vertical displacement at this section is: s(z) = so −

1 Ep Ap



z

p(z)dz

(9)

0

According to the static balance relationship, the side resistance is: τ (z)U dz + p(z) + dp(z) = p(z) τ (z)= −

1 dp(z) U dz

(10) (11)

The axial force at any section of the pile body can be further expressed as: p(z)= − E p A p

ds(z) dz

(12)

The pile side friction resistance can be expressed as: τ (z)=

E p A p d 2 s(z) U dz 2

(13)

Formula (13) is the basic differential equation for load transfer analysis and calculation of pile-soil system. Among them, E p is the elastic modulus of the pile and A p is the cross-sectional area of the pile. At present, there are two main methods for solving equations: the first method is analytical method, which simplifies the load transfer function to curve equations such as exponential curve, hyperbola, and parabola, and then directly solves it. The second method is the displacement coordination method. According to the balance condition and the principle of displacement coordination, the pile side resistance and the pile shaft axial force are solved through repeated trial calculations. This method overcomes the shortcomings of the very complicated transfer function of the measured method. Furthermore, in order to obtain the curve of the pile side friction and axial force along the pile, measuring elements can be embedded in the pile during the test pile test, and then the formula (13) can be used to solve it [7].

3 Mechanism of End Resistance of Single Pile There are many failure modes of end resistance. According to the nature of the soil, the depth of the foundation pile and the speed of the load, it can be summarized into three failure modes, namely: overall shear, local shear and penetration shear. The characteristic of the overall shear failure is: in the process of the pile tip resistance exerting its effect, when the nature of the supporting layer of the pile tip soil is weak,

1630

W. Xu

the side friction resistance of the pile has been exerted to the limit at this time, and the soil of the supporting layer is not enough to provide the end resistance required for the downward sliding of the pile. Therefore, an overall shear-slip surface is formed at the pile end bearing layer, the soil at the base level rises, and the foundation settlement increases sharply. The load-settlement curve presents a “steep drop” failure feature, and the entire foundation loses stability and is destroyed. Such failures are prone to occur for friction-type end-bearing piles that enter the harder soil from the soft soil layer. The characteristic of local shear failure is that the lateral compression of the soil caused by the settlement of the foundation is not enough to spread the shear slip surface to the base level. The soil uplift on the side of the foundation is small, and there is no obvious failure load characteristic point on the load-settlement land line. Moreover, its bearing capacity for the pile end bearing layer is insufficient, and pure friction piles where almost all the pile top load is borne by the pile side friction are prone to such damage. The characteristics of penetration shear failure are: due to the compressibility of the bearing layer, the vertical and lateral compression of the soil is large, the vertical displacement of the foundation is large, and the discontinuous downward radial shear is generated along the periphery of the foundation. When the foundation “pierces” the soil, there is no uplift in the horizontal plane of the foundation, and obvious failure load characteristic points appear on the load-settlement curve. This type of failure is likely to occur for ordinary end-bearing friction piles. In summary, through the study and analysis of the mechanism of the side resistance and end resistance of a single pile, the process of pile top load transfer can be expressed as a curve as shown in Fig. 4. At the same time, the load transfer of a single pile under the load of the pile top is summarized as the following four processes: (1) The first stage: When the pile top load is small, the external load is almost entirely borne by the pile side resistance, and the side friction resistance gradually comes into play from top to bottom, the pile end resistance has not yet played its role, and there is no settlement at the pile end; (2) The second stage: With the increase of the pile top Fig. 4 Changes of side resistance and end resistance under pile top load

Design Problems of Bridge Pile-Soil Interaction …

1631

load, the friction resistance of the soil layer above the pile body has reached the limit, the friction resistance of the soil layer under the pile body gradually increases, and the pile tip resistance also starts to play a role. The external load at this time is borne by the side resistance and the end resistance, and the soil layer at the end of the pile settles due to elastic compression deformation; (3) The third stage: With the further increase of the load, the exertion of the frictional resistance of the soil layer on the side of the pile has completely reached the limit, and the increased load is all borne by the end resistance. Therefore, the soil layer at the end of the pile produces plastic compression deformation, and the settlement increases sharply; (4) The fourth stage: When the pile top load increases to a certain value, the pile foundation is crushed or the pile end produces excessive plastic deformation, which causes the settlement to be too large and causes damage [8].

4 Conclusion This paper introduces the bearing characteristics of pile foundations under vertical loading, including the different classification methods of pile foundation, the load transfer mechanism of pile-soil system, the exertion mechanism of pile side resistance, the exertion mechanism of pile tip resistance and the influence factors of single pile vertical bearing capacity. In general, the load on the top of the pile foundation is borne by the pile side resistance and the pile tip resistance. Moreover, the lateral resistance of the overlying soil layer is exerted before the underlying soil layer, and the lateral resistance is exerted before the end resistance. The relative displacement of the pile-soil required for the exertion of the end resistance is far greater than the value required for the exertion of the lateral resistance. In addition, in order to improve the bearing capacity of piles, reasonable pile length and pile diameter should be adopted to ensure the quality of pile foundation and avoid waste in pile foundation design. Acknowledgements This study was financially supported by the Department of Education, Jiangsu Province, China: Study on unloading deformation and failure mechanism of soft soil in Nanjing area (Grant No. 18KJB170006)

References 1. Rajkomar, A., Dean, J., Kohane, I.: Machine learning in medicine[J]. N. Engl. J. Med. 380(14), 1347–1358 (2019) 2. Ward, L., Agrawal, A., Choudhary, A., et al.: A general-purpose machine learning framework for predicting properties of inorganic materials[J]. npj Comput. Mater. 2(1), 1–7 (2016) 3. Amershi, S., Cakmak, M., Knox, W.B., et al.: Power to the people: the role of humans in interactive machine learning[J]. Ai Mag. 35(4), 105–120 (2014) 4. Coley, C.W., Barzilay, R., Jaakkola, T.S., et al.: Prediction of organic reaction outcomes using machine learning[J]. ACS Central Sci. 3(5), 434–443 (2017)

1632

W. Xu

5. Sieg, J., Flachsenberg, F., Rarey, M.: In need of bias control: evaluating chemical data for machine learning in structure-based virtual screening[J]. J. Chem. Inf. Model. 59(3), 947–961 (2019) 6. Thabtah, F., Peebles, D.: A new machine learning model based on induction of rules for autism detection[J]. Health Inf. J. 26(1), 264–286 (2020) 7. Narudin, F.A., Feizollah, A., Anuar, N.B., et al.: Evaluation of machine learning classifiers for mobile malware detection[J]. Soft. Comput. 20(1), 343–357 (2016) 8. Bzdok, D., Meyer-Lindenberg, A.: Machine learning for precision psychiatry: opportunities and challenges[J]. Biol. Psychiatry: Cogn. Neurosci. Neuroimaging 3(3), 223–230 (2018)

Development of Multi-Parameter Wireless Sensor Network Monitoring System Based on ZigBee Technology Jun Lu

Abstract With the rapid development of semiconductor technology, sensor technology, embedded technology, and communication technology, wireless sensor networks with sensing, computing, storage and communication capabilities have broad application prospects in the fields of smart home, industrial monitoring, automation, biomedicine, smart buildings, and environmental detection. These areas have something in common: first, the requirements for data throughput are very low, and second, the power consumption is lower than that provided by existing standards. This paper constructs a multi-parameter wireless sensor network detection system based on ZigBee technology, constructs the system structure, and designs experiments to analyze the model performance. The results show that the research results meet the expected goals. Keywords ZigBee technology · Wireless sensor · Network detection · System development

1 Introduction Wireless sensor network technology (WSN) originated in a national defense project in the United States in the mid to late twentieth century. Later, Intel’s “smart dust” project opened the curtain for civil research. The wireless sensor network is composed of three parts: data acquisition network, data transmission network and control management center [1]. With the rapid development of wireless sensor technology and Internet of Things application technology, wireless sensor network technology has been widely used in industry, national defense and other fields. Moreover, it is gradually applied to people’s daily life, such as the field of smart home. Smart homes mainly include security systems, intercom systems, automatic meter reading systems, fire alarm systems, home theater systems, indoor lighting and home appliance control systems, indoor environment monitoring systems, home management J. Lu (B) Wuhan DongHu University, HuBei 430212, WuHan, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_217

1633

1634

J. Lu

information platforms, and home appliance intelligence and control. Constructing an indoor comprehensive environmental monitoring system that improves the quality of people’s lives and offices has broad prospects for promotion and application.

2 Design of a Network Monitoring System Based on Zigbee Wireless Sensors As an embedded device, wireless sensor network can monitor, perceive and collect various information of monitored objects in the network distribution area in real time, and send it to observers after processing. However, for the decentralized measurement and control system using wired sensor networks, due to the high line laying and maintenance costs and the unfixed spatial location of field devices, the signal derived through the cable becomes unreliable, or even impossible. However, the new shortdistance wireless communication technology can provide technical means for solving the problem, and shows its superiority in these occasions. The spatial arrangement of a large number of wireless access points in these application areas can promote the emergence of a large number of simple, convenient and freely used wireless devices. Therefore, the equipment is required to have a low price. Due to the wide application prospects and huge market space of short-range wireless communication and network technology, wireless communication technology has attracted the attention of many manufacturers. Among all short-range wireless communication technologies, the ZigBee protocol standard is used as a new wireless connection technology. It has the following obvious advantages: low power consumption, low cost, short time delay, license-free wireless communication frequency band, multiple networking methods, short-range communication, reliable data transmission, large-capacity network, selfconfiguration and three-level security mode, etc. Therefore, this paper designs a wireless sensor network monitoring system based on ZigBee technology [2]. The overall frame structure of this system is shown in Fig. 1. Zigbee wireless sensor network includes three levels of nodes: terminal nodes, routing nodes and coordination nodes. The communication functions of terminal Fig. 1 The overall structure of the network monitoring system based on Zigbee wireless sensor

Development of Multi-Parameter Wireless Sensor …

1635

nodes mainly include reading sensor data, encapsulating sensor data, sending sensor data, and receiving response instructions. The terminal node functions are shown in Fig. 2 [3]. The routing node reads sensor data, encapsulates sensor data, sends sensor data, receives response instructions, and routes. Its functions are shown in Fig. 3. The remote management software subsystem of this system selects the software development tool Eclipse and the database management platform as auxiliary development tools respectively. Moreover, based on the three-tier architecture model of JBoss Seam, this paper designs the overall system framework as shown in Fig. 4, which mainly involves three levels: presentation layer, business layer and data entity layer. Among them, the presentation layer mainly uses technologies such as Facelets, Richfaces, Javascript and JSF to provide users with an interactive Web operation interface. The data entity layer mainly uses the components of the business layer to query, add, delete, and modify data to establish a mapping relationship with the database table. The business layer mainly implements data operations by processing business logic to meet the different business needs of the presentation layer, which Fig. 2 The terminal node functions

1636

J. Lu

Fig. 3 Functions of routing nodes

is equivalent to the communication link between the presentation layer and the data entity layer [4]. The presentation layer feeds back the results of the business layer processing to the system users in the form of pages. The presentation layer page of the remote management software subsystem is designed with a layout of “title bar + sidebar + content area”. Specifically, the presentation page mainly includes two types: real-time data monitoring page and system management page. The real-time data monitoring page is shown in Fig. 5. Logo icon, system name, and system function are placed in the title bar, data is placed in the side bar, and the content area displays the data in the form of a changing curve. In the system management page, the logo icon, system name, and system function are placed in the title bar, and function menus (such as user management, TCP configuration and gateway communication, etc.) are placed in the sidebar. The management area is designed according to different management functions. At the same time, the two types of pages can jump to each other [5]. According to the needs of the system, the performance page can be further subdivided into homepage, real-time data monitoring page, query and statistics page, user login page, user and device management page, data download page, and system configuration page. The implementation of these pages mainly uses the JSF Facelets framework as a template for page layout, and uses XHTML and CSS tags. In this way, there is no need to manually add headers, sidebars, and footers for each specific page, and a reusable and flexible Web page is constructed. On the other hand, operating this system will involve frequent jumps between pages. In order to improve the

Development of Multi-Parameter Wireless Sensor …

1637

Fig. 4 The overall framework of remote management software subsystem

maintainability of the system, the system uses Seam navigation rules to formulate page flow. Before rendering the page, this rule has completed the page jump configuration in the pages.xml file, and realizes the conversion between pages based on the specified navigation rules. When the user clicks “TCP configuration” or “Gateway configuration” on the real-time data monitoring page, Seam navigation will jump to the specific page according to the returned character string [6]. The design and implementation of business components are based on the following two aspects. On the one hand, the basis for dividing business components is the independent functions of business modules. On the other hand, it improves the reusability of business components based on the following two points. The first point is that the design component function phase requires the component to only implement part of the business logic functions of the system. The second point is to design components in a way that interfaces and implementations are separated. Specifically, only the name of the business method is specified in the interface, and the method implementation specified for the interface is all reflected in the implementation class. The business components designed for the remote management software

1638

J. Lu

Fig. 5 Layout design of real-time data monitoring page and system management page

subsystem of this system are shown in Fig. 5, which mainly include real-time data monitoring components, query and statistics components, user login components, user and device management components, data download components, and system configuration components. Furthermore, on the one hand, dashed and solid lines are specified to indicate the calling relationship of business components. The dotted line and the solid line respectively indicate the calling relationship between the system page and the business component, and the calling and injection relationship between the business component. On the other hand, the presentation layer page of the subsystem achieves access to business components through the local interface (Local) and uses #{component name. Attributes/Methods}, while the JSF file uses the remote interface (Remote) to remotely call the query management component. Furthermore, similar business components can call each other through the @In declaration in the Seam annotation, and call and inject the corresponding business components through the specified dependencies at runtime [7] (Fig. 6). This article refers to the business components of the subsystem to take the call of the system configuration components on the system configuration page of the remote management software subsystem as an example. The system configuration page calls the system configuration components through Local access. Therefore, the system configuration page of the presentation layer uses #{component name.attribute/method} to view the gateway’s ID number (ID), network address (address), gateway name (name) and other information. The remote management software subsystem introduces ORM (Object Relational Mapping, object/relational

Development of Multi-Parameter Wireless Sensor …

1639

Fig. 6 Business component diagram of remote management software subsystem

database mapping) technology that solves the mismatch between object-oriented and relational databases. This technology automatically persists objects to the database mainly by mapping metadata between objects and databases. The database is an important part of the remote management software subsystem, and it is responsible for the persistent storage, management and access of data. According to the requirements of the remote management software subsystem, the E-R diagram modeling of this subsystem includes data entities and attributes such as users, equipment, configuration, data, and logs, as shown in Fig. 7. The following is a brief introduction to the above entities. The device entity includes attributes such as device name, device type, network ID number, network address, and remarks, and is mainly used for device information and parameter management of the ZigBee wireless sensor network subsystem. The configuration entity includes attributes such as gateway name, network ID number, network address, page refresh cycle and zoom level, and is mainly used for the configuration of the gateway and page refresh cycle [8]. The database is an important part of the remote management software subsystem, responsible for the persistent storage, management and access of data. After analysis, it is found that the database connection pool is far superior to the general database connection. For the remote management software subsystem of this system, this system needs to store and process gateway data, which leads to frequent creation and closing of database connections. In order to improve the efficiency of operating

1640 Fig. 7 Statistical graph of system performance test

J. Lu 100

140

98

120 100

96

80 94 60 92

40 Accuracy(%)

90 88

Transmission speed (ms)

1

3

5

7

9

11 13 15 17 19 21 23 25 27 29

20 0

the database, the remote management software subsystem uses a database connection pool to manage database connections. Specifically, the connection pool of the subsystem database is realized by configuring the RvvsSystem-ds.xml file [9].

3 Performance Test of Wireless Sensor Network Monitoring System Based on Zigbee The multi-parameter wireless sensor monitoring system based on Zigbee designed and developed in this paper is mainly for data collection and monitoring tasks based on actual conditions [10]. Therefore, in order to verify the function of the system, considering the application scenarios of the system, the performance test of the system constructed in this paper is carried out. This paper mainly conducts the identification of model data detection accuracy and data processing speed. A total of 30 sets of data are collected. The results are shown in Table 1. As shown in Fig. 8, the model constructed in this paper performs very well in data monitoring accuracy and data transmission speed, so the system in this paper can meet actual needs.

4 Conclusion Due to the wide application prospects and huge market space of short-range wireless communication and network technology, wireless communication technology has attracted the attention of many manufacturers. Among all short-range wireless communication technologies, the ZigBee protocol standard, as a new wireless

Development of Multi-Parameter Wireless Sensor …

1641

Table 1 Statistical table of system performance test NO Accuracy(%) Transmission speed (ms) NO Accuracy(%) Transmission speed (ms) 1

93.9

107.7

16

93.7

94.8

2

94.8

108.4

17

94.5

94.6

3

99.9

80.6

18

95.7

118.1

4

94.7

129.1

19

95.0

122.5

5

97.9

93.5

20

93.8

124.1

6

93.3

104.8

21

99.2

88.5

7

98.4

106.2

22

94.0

119.3

8

93.0

88.9

23

95.3

119.3

9

93.0

90.2

24

98.9

111.9

10

92.8

111.3

25

95.3

83.1

11

93.0

85.6

26

98.2

115.2

12

93.7

114.3

27

99.5

115.0

13

93.7

124.7

28

97.5

85.7

14

96.0

123.0

29

93.4

85.6

15

99.0

98.6

30

97.6

86.5

connection technology, has the following obvious advantages: low power consumption, low cost, short delay, license-free wireless communication frequency band, multiple networking methods, short-range communication, reliable data transmission, large-capacity network, self-configuration and three-level security mode, etc. Therefore, this paper designs a wireless sensor network monitoring system based on ZigBee technology. The basic goal of the smart home monitoring system based on Zigbee wireless communication technology is to connect various communication devices to the intelligent monitoring and management system through wired or wireless transmission, so as to realize the centralized monitoring, control and management of these equipment, to ensure the reliable and safe operation of the facilities, and to ensure the harmony and safety of the environment.

References 1. Bui, X.N., Nguyen, H., Choi, Y., et al.: prediction of slope failure in open-pit mines using a novel hybrid artificial intelligence model based on decision tree and evolution algorithm[J]. Sci. Rep. 10(1), 1–17 (2020) 2. Yaseen, Z.M., El-Shafie, A., Jaafar, O., et al.: Artificial intelligence based models for streamflow forecasting: 2000–2015[J]. J. Hydrol. 530, 829–844 (2015) 3. Laird, J.E., Lebiere, C., Rosenbloom, P.S.: A standard model of the mind: toward a common computational framework across artificial intelligence, cognitive science, neuroscience, and robotics[J]. Ai Mag. 38(4), 13–26 (2017) 4. Hashemi, M.R., Spaulding, M.L., Shaw, A., et al.: An efficient artificial intelligence model for prediction of tropical storm surge[J]. Nat. Hazards 82(1), 471–491 (2016)

1642

J. Lu

5. Sustrova, T.: A suitable artificial intelligence model for inventory level optimization[J]. Trends Econ. Manage. 10(25), 48–55 (2016) 6. Enshaei, A., Robson, C.N., Edmondson, R.J.: Artificial intelligence systems as prognostic and predictive tools in ovarian cancer[J]. Ann. Surg. Oncol. 22(12), 3970–3975 (2015) 7. Chou, J.S., Bui, D.K.: Modeling heating and cooling loads by artificial intelligence for energyefficient building design[J]. Energy Build. 82, 437–446 (2014) 8. Ghahramani, Z.: Probabilistic machine learning and artificial intelligence[J]. Nature 521(7553), 452–459 (2015) 9. Zappone, A., Di Renzo, M., Debbah, M., et al.: Model-aided wireless artificial intelligence: Embedding expert knowledge in deep neural networks for wireless system optimization[J]. IEEE Veh. Technol. Mag. 14(3), 60–69 (2019) 10. Keel, S., Lee, P.Y., Scheetz, J., et al.: Feasibility and patient acceptability of a novel artificial intelligence-based screening model for diabetic retinopathy at endocrinology outpatient services: a pilot study[J]. Sci. Rep. 8(1), 1–6 (2018)

Intelligent Logistics Based on the Internet of Things and Cloud Computing Zhengnan Wu

Abstract According to the current low-efficiency and lack of supervision in the logistics system, this paper designs a complete set of overall design schemes for intelligent logistics systems. Moreover, this design schemes explain the architecture design and working principle of the system. While the system uses logistics network technology to complete the logistics supervision, it uses a variety of technologies to greatly improve the information circulation, security, and energy saving of the system. In addition, this paper improves the wolf pack algorithm, and applies the wolf pack algorithm to the logistics and distribution link, and combines the actual application scenarios to further optimize the wandering, calling, and siege behavior of the wolf pack in the original algorithm. Finally, this paper analyzes the performance of the model through experimental research. The research results verify the effectiveness of the model proposed in this paper. Keywords Internet of things · Cloud computing · Intelligent logistics · System construction

1 Introduction Since entering the twenty-first century, the development of information technology has reached a new level. The traditional logistics industry that is constantly under impact has exposed more and more problems. The emergence of cloud computing technology has greatly promoted the development of the logistics industry. It can not only reduce the daily operating expenses of logistics enterprises, but also improve service quality. Cloud computing is the integration and redistribution of highquality resources in the logistics industry. Cloud computing virtualizes the original computing and storage resources to the cloud. Through the networked logistics information management system, users can store, calculate, process and analyze logistics data information conveniently and quickly. At the same time, processing logistics Z. Wu (B) Wuhan DongHu University, Wuhan, Hubei 430212, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_218

1643

1644

Z. Wu

data in the cloud can improve fault tolerance and make data more reliable and safer [1]. In the increasingly fierce market competition, the competition of logistics enterprises in the field of information technology is becoming more and more fierce, and the logistics information management system plays an increasingly important role. The traditional logistics system has a single business model, the quality of user services cannot be guaranteed, and the inability of systems to work together makes efficiency low. However, the business modules of the modern logistics information management system can meet the diverse needs of users, handle logistics-related businesses efficiently and conveniently, and enable logistics companies to occupy a place in the industry. In addition, with the deep integration of information technology, under the background of economic globalization, large logistics companies in various countries want to use the Internet to realize the internationalization, globalization and integration of e-commerce. The research of logistics information management system in my country started late. Inability to fully meet user needs, large energy consumption, low system configuration, etc. are common problems in my country’s logistics system. Speeding up the informatization process of my country’s logistics industry and improving the information service level of the logistics industry are the urgent tasks of current logistics practitioners [2].

2 Logistics Model Algorithm We assume that the hunting range of wolves is in a European space of N × M, where N represents the total number of wolves and M is the number of cities. The position of the artificial wolf i is defined as X i = {xi1 , X i2 , . . . , X im }, and the odor concentration of the prey smelled by the artificial wolf is Z = f (X ). X i corresponds to a path code in the TSP problem, Z corresponds to the path length, and xi j is the delivery location of the j-th code position of the i-th scientific path code. Based on the above, it can be seen that in fact, in an Euclidean space, according to the objective function fIX) to solve the objective function value, the optimal objective function value Z can be obtained, that is, the shortest path [3]. In the modeling process, a large number of documents were referred to. It is found that the shortest path graph to solve the TSP problem has two basic characteristics: (1) The optimal path does not cross; (2) In the optimal path, the next traversed city of each destination is always the neighboring city that is closer. Based on this, some definitions need to be elaborated, which helps to find the optimal solution. Definition 1 (Proximity): Near (a— > b) = k means that location a is the kth closest location to city b. near(5–,3) = 2 means that city 5 is the second closest city to city 3. Definition 2 (Probability of Proximity): P (a— > b) indicates the probability of taking b as the next destination when determining the next traversal location [4]. Definition 3 (Reverse): Reverse a certain path. Reverse Re(X i , a, b) indicates that all cities between a and b in path X i are arranged in reverse order. If X i = [3, 5, 7, 4, 2, 6, 8] a = 5, b = 6, then Re(X i , 2, 6) = [3, 6, 2, 4, 7, 5, 8].

Intelligent Logistics Based on the Internet of Things …

1645

After understanding the problem to be solved, in order to achieve the establishment of a mathematical model, it is also necessary to link the behavior of the algorithm with the problem to be solved, and improve it on this basis. The following will elaborate on the three improved intelligent behaviors of wolves and their representative meanings, as well as the method of algorithm modeling. (1) Improve the wandering behavior: the behavior of artificial wolves searching for prey in the solution space. The ultimate goal is to find areas with higher prey odor in the hunting ground space. We assume that Z i and Z lead are the odor concentration perceived by the detective wolf and the lead wolf, respectively. If Z i > Z lead , the detective wolf initiates a summoning behavior. If Z i < Z lead , the detective wolf searches the surrounding for higher prey odor concentration. Specifically, the detective wolf i goes to the surroundings to search for a random city X i j in its code X i ={xi1 , X i2 , . . . , X im }. Then, the next city X ik is determined according to the probability of the neighbor matrix and the neighbor matrix, and then the two cities in the original code are reversed. This is a wandering process. After that, according to the new location, the relationship between the odor concentration and the lead wolf odor concentration is determined, and the next activity is determined until the maximum number of wanderings Tmax is reached. (2) Improve the summoning behavior: the lead wolf in the original summoning behavior initiates the summoning behavior is that the fierce wolf quickly advances to the position of the lead wolf with a fixed striding step. In the process of fierce wolf i rushing towards the lead wolf according to formula (1), the position in the M-dimensional space is [5]:    k  k+1 k k k  /gd − X id = X id + stepb ∗ gdk + X id X id

(1)

k+1 Among them, X id is the position of fierce wolf in the M-dimensional space at k is the position of fierce wolf in the t-dimensional the k + 1-th iteration, and X id space at the k-th iteration. stepb is the raid step length, and gdk is the position of the lead wolf in the M-dimensional space in the k-th generation. In this way, the raid process can be regarded as an open loop. If feedback is added during the raid, the communication between fierce wolf and lead wolf is increased, and the step size is automatically adjusted. When the odor concentration felt by the detective wolf is close to the odor concentration felt by the lead wolf, its step size becomes smaller and gradually approaches the lead wolf. If the odor concentration felt by the detective wolf is far from the odor concentration felt by the lead wolf, it will quickly raid to the lead wolf position with a larger step. The formula (1) is improved to obtain the formula (2) [6].

 k+1 stepbid

k+1 k k = X id + step X id bid    k k  /gdk − X id = w ∗ gdk + X id

(2)

According to formula (2), the calling behavior is initiated. Among them, W is the weight of prey smell, and the value range is [0, 1]. According to the odor concentration, the value of w is adaptively changed, and the calculation formula of w is as follows [7]:

1646

Z. Wu

 w=

wmin −

k (wmax −wmin )∗( F k −Fmin ) k −F k ( Favg min )

wmax , F > Favg

, F ≤ Favg

(3)

The fierce wolf will approach the lead wolf from various positions. If the smell concentration perceived by fierce wolf is greater than that of lead wolf, that is, at Z i > Z lead , fierce wolf will replace lead wolf and continue to initiate the call. Otherwise, Fierce Wolf continues to raid until the distance between Fierce Wolf and Lead Wolf is d ≤ dnear . When d ≤ dnear , the algorithm enters the siege behavior. The calculation method of dnear is shown in the formula [8]:  D   1   max −mi xd  dnear = D ∗ W d=1  d

(4)

Among them, dnear is the distance between fierce wolf and lead wolf when the siege is initiated. W is the distance judgment factor, and the size of W directly determines whether it enters the siege behavior. The larger the W, the faster the convergence speed. However, if it is too large, the calling behavior will remain unchanged. (3) Improve the siege behavior: When the fierce wolf is very close to the lead wolf, it means that the prey is not far away, and the prey needs to be captured through a close siege. It can be considered that the lead wolf with the largest prey odor concentration is the prey direction. The artificial wolf needs to move forward with a small step length and carefully search for the nearby prey odor concentration, which is the value of the fitness function. Formula (5) is used to express the siege behavior of wolves.   k+1 k k  =X id + ξ k ∗λ ∗ stepc ∗ G kd − xid X id

(5)

k Among them, X id is the position of the K-th artificial wolf in the D-dimensional space, stepc is the siege step length, and G kd is the position of the lead wolf in the K-th generation in the M-dimensional space. λ g is a uniformly distributed random number between [−1, 1], and ξ k is the siege adjustment value. The setting method is as follows [9]:



ξ0 = M C ∈ [0.9, 0.999], M = 1 ξ = c ∗ ξ k−1 k

(6)

During the siege, if the odor concentration perceived by an artificial wolf is greater than the target odor concentration, the position of the artificial wolf is replaced with the new target position, otherwise the target position remains unchanged. Wolves update mechanism: Since only capable creatures can continue to survive, some weaker wolves will starve to death. In order to avoid falling into a local optimal solution, K new artificial wolves are randomly generated to replace the artificial wolves with the worst K in the population. The larger the K value, the better the

Intelligent Logistics Based on the Internet of Things …

1647

Fig. 1 Flow chart of improved wolf pack algorithm

diversity of the new population and increase the vitality of the wolves. However, if K is too large, the algorithm will bias towards random search. If the K value is too small, it will easily lead to local optimum. Therefore, the K value should be an integer between [N/2*β,N/β], and β is the population update factor [10] (Fig. 1).

3 Construction of Logistics Model The main work of this paper is to build a logistics information management system architecture based on cloud computing, and design the distribution management module and warehouse management module in detail. The logistics information management system built under the cloud computing environment can be operated by both enterprises and users on the PC side. In addition, a large amount of logistics supply and demand information is stored in the cloud, and the reasonable allocation of resources is realized through virtualization and other technologies, thereby eliminating the need to access new hardware devices. At the same time, the concept of cloud computing is introduced into the logistics management system, which makes the system more efficient and convenient, and provides users with great convenience. With the development and progress of society, traditional logistics companies have transformed and upgraded to modern logistics companies, and carried out vehicle

1648

Z. Wu

cargo transshipment, freight forwarding and other businesses. This shows the importance of transportation in the logistics link. Distribution management includes two aspects, one is to carry out unified dispatch management for vehicles, and the other is to carry out monitoring and management during the transportation of goods. The cloud computing-based logistics information management system applies advanced cloud computing technology to the logistics system. The use of cloud computing technology in the distribution management link can make more efficient use of existing resources, improve distribution efficiency, and maximize corporate benefits. The distribution management business flowchart is shown in Fig. 2. After the logistics company receives the logistics order on the platform, the order enters the corresponding operation process and begins to process the order. When the platform receives the order, it first checks the customer information, then checks the customer order quantity, and finally checks the customer order status. Only by optimizing the order management service in the above process can customer satisfaction be improved. The following steps are the main operations performed by the logistics company after receiving the order: (A) order review: it checks the integrity and validity of the order; (b) credit inquiry: it transmits customer information to the customer management system to verify the customer’s credit rating; (C) order processing: It processes orders according to the credit rating feedback from the customer management system; (d) order services: It designs services to meet individual needs according to the specific needs of customers. The order management business flowchart is shown in Fig. 3:

Fig. 2 Flow chart of distribution management business

Intelligent Logistics Based on the Internet of Things …

1649

Fig. 3 Flow chart of order management business

4 Logistics Model Test Based on the construction of the above logistics system, this paper verifies the performance of the model. This paper mainly studies the efficiency of intelligent logistics, that is, analyzes the satisfaction of the system model. The results obtained by investigating the use of experience personnel are shown in Table 1 and Fig. 4. As shown in Fig. 4 and Table 1, the model constructed in this paper has a high level of satisfaction among the experiencer group, which shows that the logistics model constructed in this paper has a certain effect.

5 Conclusion The combination of cloud computing technology and logistics information management system is a hot issue for future research. This paper builds a logistics information management system based on cloud computing. The system uses sensors and other equipment to collect logistics information in real time and upload it to the cloud platform for data analysis and processing to provide a full range of logistics services. In addition, it uses the cloud computing platform and web to provide logistics services that meet the diverse needs of users, and build a logistics information management system that integrates warehouse management, distribution management, order management, and customer relationship management.

1650

Z. Wu

Table 1 Statistical table of satisfaction survey NO

Satisfaction

NO

Satisfaction

NO

Satisfaction

NO

Satisfaction

1

92

22

79

42

82

62

92

2

91

23

93

43

81

63

80

3

84

24

84

44

82

64

84

4

82

25

91

45

83

65

91

5

88

26

88

46

88

66

87

6

87

27

85

47

92

67

79

7

86

28

87

48

83

68

79

8

93

29

88

49

83

69

91

9

81

30

94

50

91

70

90

10

82

31

88

51

89

71

86

11

81

32

90

52

84

72

91

12

79

33

81

53

83

73

91

13

80

34

78

54

85

74

82

14

93

35

91

55

84

75

88

15

78

36

89

56

86

76

83

16

80

37

82

57

84

77

80

17

88

38

83

58

92

78

93

18

90

39

83

59

93

79

91

19

89

40

88

60

90

80

93

20

84

41

92

61

87

81

89

Fig. 4 Statistical graph of satisfaction survey

100 90 80 70 60 50 40 30 20 10 0

1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77

Intelligent Logistics Based on the Internet of Things …

1651

References 1. Carbone, V., Rouquet, A., Roussat, C.: The rise of crowd logistics: a new way to co-create logistics value[J]. J. Bus. Logistics 38(4), 238–252 (2017) 2. Govindan, K., Soleimani, H., Kannan, D.: Reverse logistics and closed-loop supply chain: a comprehensive review to explore the future[J]. Eur. J. Oper. Res. 240(3), 603–626 (2015) 3. Winkelhaus, S., Grosse, E.H.: Logistics 4.0: a systematic review towards a new logistics system[J]. Int. J. Prod. Res. 58(1), 18–43 (2020) 4. Özdamar, L., Ertem, M.A.: Models, solutions and enabling technologies in humanitarian logistics[J]. Eur. J. Oper. Res. 244(1), 55–65 (2015) 5. Savelsbergh, M., Van Woensel, T.: 50th anniversary invited article—city logistics: challenges and opportunities [J]. Transp. Sci. 50(2), 579–590 (2016) 6. Tofighi, S., Torabi, S.A., Mansouri, S.A.: Humanitarian logistics network design under mixed uncertainty[J]. Eur. J. Oper. Res. 250(1), 239–250 (2016) 7. Cattaruzza, D., Absi, N., Feillet, D., et al.: Vehicle routing problems for city logistics[J]. EURO J. Transp. Logistics 6(1), 51–79 (2017) 8. Grabara, J., Kolcun, M., Kot, S.: The role of information systems in transport logistics[J]. Int. J. Educ. Res. 2(2), 1–8 (2014) 9. Taniguchi, E., Thompson, R.G., Yamada, T.: Recent trends and innovations in modelling city logistics[J]. Proc. Soc. Behav. Sci. 2014(125), 4–14 (2014) 10. Carlsson, J.G., Song, S.: Coordinated logistics with a truck and a drone[J]. Manage. Sci. 64(9), 4052–4069 (2018)

Design of Horse Health Management System Based on Wireless Network and Simulation System Shuang Zhang

and Mairu Liu

Abstract The focus of horse epidemic prevention and health supervision in my country has gradually begun to shift to management and organization. Doing a good job in the grassroots work of animal epidemic prevention and sanitation supervision is the most fundamental work for the construction of the entire animal health supervision system, and it is the cornerstone of doing a good job in animal health supervision, and is of great significance to the development of animal health supervision. In this paper, a horse health management system is constructed based on wireless network and simulation theory, and a smart mobile platform for horse health management and health supervision is studied. Moreover, this paper designs the platform’s system architecture, database server, and Web server, and realizes the development of an intelligent mobile terminal application system and a background basic data management system. Finally, this paper designs experiments to verify and analyze the system performance. The test results prove that the performance of the system constructed in this paper is good. Keywords Wireless network · Simulation system · Horses · Health management

1 Introduction In countries where the horse industry is popular, such as the United States, the United Kingdom, Australia, etc., in the long-term development process, they know the importance of horse disease prevention for the development of the entire horse industry. Therefore, a relatively complete horse training and feeding system has been established according to the domestic horse breeding and the overall situation of the industry, which greatly ensures the safety of the housing, diet and training of the horses, and effectively prevents the occurrence of various diseases. S. Zhang Wuhan Business University, Wuhan 430065, Hubei, China M. Liu (B) Central China Normal University, Wuhan 430079, Hubei, China © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_219

1653

1654

S. Zhang and M. Liu

However, my country’s horse disease prevention and control work not only faces a shortage of professional talents in terms of high-quality coaches and stable management personnel, but also has certain problems in the construction of stables and the professional skills of medical staff. This has laid hidden dangers for the occurrence of various diseases. In particular, the polyculture of different breeds of horses has increased the incidence of various infectious diseases [1]. Horse health management needs to have a certain degree of effectiveness to obtain various information about horses at the first time, and to predict the problems that horses may encounter in real time, so as to prepare for emergencies. This paper combines the wireless network to construct a horse health management and simulation system, and conducts a scientific analysis on the horse health management.

2 System Construction After understanding the current situation of horse epidemic prevention and sanitation supervision, it can be found that traditional working methods have problems such as slow speed, low efficiency, error-proneness, and inability to form historical data. At the same time, there are problems such as inconvenience for users to declare, untimely work assignment, and untimely quarantine work. Today, with the rapid development of information technology, the past methods have obviously not been able to meet the current development and needs of horse epidemic prevention work [2]. With the rapid popularization of mobile smart terminals, the use of informationbased methods for the declaration, distribution, quarantine, and transportation of harmless treatment can greatly improve the efficiency of horse epidemic prevention and health supervision, and it is beneficial to the collection and storage of data, and accumulates certain conditions for future data analysis. In recent years, with the rapid development of my country’s fifth-generation mobile network (5G), smart phones have also been rapidly popularized, especially smart phones with IOS and Android platforms. If the staff’s mobile phones can be used to develop a horse epidemic prevention and health supervision system based on a mobile platform, not only can the staff’s hardware and equipment problems be solved, but also the grassroots staff can report, assign and view tasks anytime and anywhere, thereby improving work efficiency [3]. In this research, a detailed demand analysis will be conducted on the horse epidemic prevention and horse hygiene supervision platform based on the smart mobile terminal, and the system architecture, database structure, system modules of mobile terminal applications, and user authority modules will be analyzed and designed. (1) Performance requirements: Under the minimum hardware configuration conditions that meet the requirements, at least 200 users are supported at the same time, and the system response time is within 2 s. (2) Security: This platform adopts the B/S structure. In addition to achieving system stability, it must also ensure data security to avoid data loss and theft. Therefore, the system should avoid the following possible problems: (1) Malicious attacks on the web server and database server on

Design of Horse Health Management System …

1655

the external network, such as SQL injection total, etc.; (2) Eavesdropping on the external network, such as stealing data from the database server [4]; (3) The virus program of the intranet affects the service program of this system; (4) The misoperation of the intranet affects the network service of this system. (3) Standardized development: The interface style of the software should be unified and beautiful, so that the user’s operation mode is consistent in each interface, and has a good user experience, which is convenient for users to operate. Moreover, the data format should be standardized and unified, and the database table design follows a unified relational database naming and format standard. In addition, the code style is unified, the identifier naming convention is unified, and the main code needs to have certain comments to facilitate the reading and understanding of the code and subsequent maintenance [5]. After detailed investigation and analysis, there are four main steps in the business processing of horse epidemic prevention and sanitation supervision: application for harmlessness, task allocation, inspection processing, transportation processing, etc. In order to show the progress of the business processing, the harmless processing should be carried out at different stages of the inspection work, with clear status indications. The business process of horse epidemic prevention and sanitation supervision is as follows [6]: (1) The user of the farm declares harmless treatment. After the declaration is submitted successfully, the status is “Pending Assignment”. (2) The task assigner assigns the task to the quarantine officer. After the assignment is successful, the status is “Pending Quarantine”. (3) The quarantine officer shall accept the task or cancel the declaration according to the actual situation. If the quarantine officer accepts the task, he shall register for quarantine, select the handling method, and upload the quarantine photos. If transportation is required after the quarantine is completed, the status is “to be transported”; if no transportation is required, the status is “closed”; if the declaration is cancelled, the processing ends and the status is “revoked”. (4) After the quarantine is completed, transportation is required. After the transporter accepts the task, he shall register for transportation and unloading, upload the photos of transportation and unloading, and complete the processing of this declaration. At this time, the status is “closed”. The business processing flow chart of horse epidemic prevention and health supervision is shown in Fig. 1 [7]. System architecture design is an important stage of the system development process. Whether the system architecture design is reasonable determines the development efficiency and operating efficiency of the system. In this phase, the overall design of the system is based on the results of the requirements analysis phase. The purpose is to customize the framework for the system, integrate various resources in the implementation of various technologies, select the most reasonable and least costly solution, and design the final overall solution of the system to lay a good foundation for the detailed design later. In order to meet the needs of grassroots horse epidemic prevention and sanitation supervision, and to improve the data processing efficiency of the system platform, in this platform, the database management system uses an Oracle database. Oracle database is a mature large-scale relational database developed by Oracle. It has a complete authority management and data backup mechanism to ensure data security from the database level. When users use the system,

1656

S. Zhang and M. Liu

Fig. 1 Horses’ epidemic prevention and sanitation supervision process

users must be strictly authenticated to prevent illegal users from logging in. In reality, the intelligent mobile system platforms used by the staff are not necessarily the same. In order to avoid developing different versions of application systems for different platforms, it is necessary for the development of this platform to have considerable flexibility and strong cross-platform capabilities [8]. According to the above-mentioned system design principles, the horse epidemic prevention and horse hygiene supervision platform based on smart mobile terminals (which is referred to as this platform) is mainly composed of four parts: (1) Database server. (2) Html5Web server. (3) Mobile client application system. (4) Background basic data management system. In this platform, each component is organically combined to work together. Grassroots staff access the Html5Web server by using the mobile terminal APP to report or obtain data. When data is reported, the data is stored in the data server. After that, the managers will maintain and manage the

Design of Horse Health Management System …

1657

Fig. 2 Platform network structure diagram

basic data of the platform through the background management system. The network structure design of this platform is shown in Fig. 2.

3 Horse Epidemic Prevention and Health Supervision Application Platform The horse epidemic prevention and health supervision management platform is an information system that integrates horse epidemic prevention and health supervision business management and data collection into an information management platform, and provides users with a unified user interface. The mobile terminal APP is the core part of this platform, a tool for business processing and data collection. The farm users use this APP to complete the harmless declaration. The distributor assigns the declaration items to the corresponding inspection staff. After the inspection staff completes the inspection, the transporter is notified for transportation processing. Therefore, when designing a mobile terminal APP, in addition to meeting business needs, it must be as easy to use, simple to operate and easy to use as possible [9]. After passing a detailed analysis of business requirements, the horse epidemic prevention and horse hygiene supervision platform mainly includes two parts: the front-end business system and the back-end data management system. The mobile

1658

S. Zhang and M. Liu

Fig. 3 Platform network structure diagram

terminal application system includes five functional modules: user login, harmless declaration, task assignment, quarantine registration, and transportation registration. The background basic data management system includes modules such as user management, farm management, and supervision statistics. Figure 3 shows the structure diagram design of the horse epidemic prevention and sanitation supervision platform system.

4 Performance Test In the performance test of this platform, the WAS application load test tool of Microsoft is used. This tool provides a simple method of simulating a large number of users to visit the target website, and can provide the hardware and software usage of the Web application program. When using this tool for performance testing, we first write the corresponding script to simulate multiple users for operation. In this test, 650 users are simulated using the tool to perform operations. The test results are shown in Table 1. Table 1 System performance test statistics table

Numbering Test content

Test results

1

Number of concurrent users

1300

2

Proportion of correct data collection ≥99.9%

3

User login response time

≤1.1 s

4

Information accuracy

≥99.9%

5

Network response time

≤45 s

6

Database server stability

Very stable

7

Web server stability

Very stable

Design of Horse Health Management System …

1659

Table 2 Statistical table of system simulation effect No.

Accuracy (%)

No.

Accuracy (%)

No.

Accuracy (%)

1

65.4

11

66.5

21

68.6

2

58.6

12

60.9

22

69.3

3

65.9

13

60.3

23

73.6

4

73.2

14

63.8

24

64.7

5

59.8

15

66.7

25

68.6

6

62.2

16

69.0

26

69.9

7

63.9

17

58.0

27

70.3

8

67.5

18

68.4

28

60.3

9

64.7

19

65.8

29

60.8

10

66.7

20

71.4

30

64.3

80 70 60 50 40 30 20 10 0 29

27

25

23

21

19

17

15

13

11

9

7

5

3

1

Fig. 4 Statistical graph of system simulation effect

Next, we count the health of a horse farm in the past five years and set preconditions, simulate the health management of horses in the past five years, and simulate possible diseases. A total of 30 sets of data are obtained, and the results are compared with the actual situation. The results are shown in Table 2 and Fig. 4. From the above analysis, we can see that the model constructed in this paper meets the expected effect.

5 Conclusion In many places, the application and approval of horse epidemic prevention and health supervision are still carried out using traditional paper reporting methods. When

1660

S. Zhang and M. Liu

using traditional methods, horses’ epidemic prevention and sanitation supervision work needs to go through the process of filling in applications, leadership approval, task assignment, and quarantine personnel submitting quarantine results. There are many links, information feedback is slow, and efficiency is low. Moreover, traditional working methods are difficult to form electronic data and cannot effectively perform data statistics, which will cause difficulties for subsequent data analysis. In order to solve the various problems caused by the harmless treatment of sick and dead animals in the traditional way of work, this paper studies the intelligent mobile platform for animal epidemic prevention and sanitation supervision. In addition, this paper designs the platform’s system architecture, database server, Web server, and realizes the development of smart mobile terminal application systems and background basic data management systems. Acknowledgements This work was supported by This work was supported by The Wuhan Equine Industry Development and Horse Racing Event Transformation and Upgrading Project , Project Number: WHSM-2019122401.

References 1. Fu, T., Wang, C.: A hybrid wind speed forecasting method and wind energy resource analysis based on a swarm intelligence optimization algorithm and an artificial intelligence model. Sustainability 10(11), 3913 (2018) 2. Bui, X.N., Nguyen, H., Choi, Y., et al.: Prediction of slope failure in open-pit mines using a novel hybrid artificial intelligence model based on decision tree and evolution algorithm. Sci. Rep. 10(1), 1–17 (2020) 3. Laird, J.E., Lebiere, C., Rosenbloom, P.S.: A standard model of the mind: toward a common computational framework across artificial intelligence, cognitive science, neuroscience, and robotics. AI Mag. 38(4), 13–26 (2017) 4. Hashemi, M.R., Spaulding, M.L., Shaw, A., et al.: An efficient artificial intelligence model for prediction of tropical storm surge. Nat. Hazards 82(1), 471–491 (2016) 5. Sustrova, T.: A suitable artificial intelligence model for inventory level optimization. Trends Econ. Manage. 10(25), 48–55 (2016) 6. Pham, B.T., Nguyen, M.D., Van Dao, D., et al.: Development of artificial intelligence models for the prediction of compression coefficient of soil: an application of Monte Carlo sensitivity analysis. Sci. Total Environ. 679, 172–184 (2019) 7. Enshaei, A., Robson, C.N., Edmondson, R.J.: Artificial intelligence systems as prognostic and predictive tools in ovarian cancer. Ann. Surg. Oncol. 22(12), 3970–3975 (2015) 8. Chou, J.S., Bui, D.K.: Modeling heating and cooling loads by artificial intelligence for energyefficient building design. Energy Build. 82, 437–446 (2014) 9. Ghahramani, Z.: Probabilistic machine learning and artificial intelligence. Nature 521(7553), 452–459 (2015)

Design of Horse Race Registration System Based on Wireless Network and Simulation System Shuang Zhang and Mairu Liu

Abstract This paper mainly studies the design and implementation of the horse racing registration system, how to build a convenient, interactive, and complete network, and which network language is used to design an easy-to-maintain examination registration information filling system. This paper analyzes design methods from process characteristics, system architecture, etc., and analyzes requirements from improving efficiency, information interaction, and functional modules, and finally realizes the application of the horse racing registration system. Moreover, in view of the shortcomings and deficiencies of the online registration system based on the three-tier architecture, this paper optimizes the structure of the entire online registration system, divides specific functional modules, and defines the corresponding module functions. The online registration system implemented in the paper still uses a three-tier B/S structure, namely the browser layer, the server layer and the data access layer. In addition, this paper highlights the precise analysis of application logic in the overall system, and describes specific solutions and implementation methods. Keywords Wireless network · Simulation system · Horse racing · Competition registration

1 Introduction With the improvement of the national economy, people’s pursuit of spiritual food has become higher and higher, and the ways of entertainment have become diverse. Horse riding, an interesting entertainment project, has gradually entered everyone’s eyes [1]. However, it is difficult to drive the development of the horse industry just to use horses for riding and play. The reason is that its economic benefits are limited. S. Zhang Wuhan Business University, Wuhan 430065, Hubei, China M. Liu (B) Central China Normal University, Wuhan 430079, Hubei, China e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 C. Huang et al. (eds.), 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing 1379, https://doi.org/10.1007/978-981-16-1726-3_220

1661

1662

S. Zhang and M. Liu

Strictly speaking, in horse racing events, the competition registration system works before the registration system. The reason is that the race registration system mainly runs before the race, mainly responsible for the registration of riders, referees, etc. before the race, and it is an entry system for comprehensive processing and information release. Modern information technology plays a huge role in promoting the development of sports. The advancement of science and technology not only promotes the advanced nature of sports, but also has higher requirements for the whole process management of sports events. As a kind of sports events, horse racing events are also highly dependent on the application and support of information technology. If the personnel management, race schedule management, performance management, information statistics query and other affairs management in horse racing events are not supported by information technology, their accuracy and realtime cannot be guaranteed [2]. The main function of the horse racing management system is to apply information technology when holding horse racing events to realize the full management and accurate services of the participating riders, trainers, horse owners and other event participants from the scene of the competition, the release of results, and even the on-site command. By learning from the experience of other developed countries or regions, it can be observed that the development of horse racing is the key to driving the development of the horse industry. The developed horse racing industry can not only drive the development of the horse industry, but also bring huge economic benefits.

2 Registration System Process The research goal of this paper is to build a set of horse racing contest participants registration management system to realize the relevant processes at all stages of the horse racing registration process, including user registration on the client, login, upload data, information maintenance, registration information import and export, etc. Through the client and server, the system can systematically manage the registration information, and can easily reflect the processing of the registration information in each link. For the analysis of the business process of the horse race participant registration management system, this paper firstly uses an abstract method to individually display the operation of the data in the entire system. Through this method, the business processes in the entry system for horse race participants can be effectively distinguished [3]. The registration management system for horse race participants mainly includes two parts: client and server. Through detailed analysis of business processes, system developers can effectively distinguish the interrelationships and structures between various modules, thereby greatly optimizing and designing related processes. Figure 1 shows the client flow chart of the horse race participant registration system. For the business process of the horse race participant registration management system, the user first inputs his registration information on the client. After completing the login in the system by entering the account and password, the user

Design of Horse Race Registration System …

1663

Fig. 1 Flow chart of registration management client

fills in his registration information in the registration form provided by the system according to the prompts given in the system. During the filling process, the system will determine whether the input content is valid according to the matching comparison between the required filling content and the actual filling content. After the user fills in all the information, the system will display the filled content in a unified and integrated manner. After the user confirms that his registration information is correct, it will wait for manual review. If the user’s registration information passes the manual review, the registration information will be saved in the system’s database [4]. Figure 2 shows the data flow diagram of the management server of the horse race participants. The main function of the system administrator in the horse race participant registration system is to allow the system to operate normally and safely. When encountering problems and related failures, the functions such as login, data backup, password retrieval, and data management can be realized by setting permissions. Therefore, the main work of system administrators is shown in Fig. 3 [5]. The management module of the system is composed of some functions such as user management data recovery and password retrieval. In the management module of the system, all users have the authority to log in, log out and retrieve a series of related operations. At the same time, managers have full authority of these modules. The use case diagram of the system management module obtained from the above analysis is shown in Fig. 4 [6].

1664

S. Zhang and M. Liu

Fig. 2 Flow chart of registration management server

Fig. 3 Use case diagram of system administrators

3 System Architecture Design The main task of the horse race participant registration system involved in this paper is to enter and summarize the current participant information in a unified manner. This information includes the user’s personal information before participating in the competition and information about the ability of the competition, and the above-mentioned information must be managed online. Therefore, the registration system for horse race participants in this paper should be designed and developed in the B/S mode, so that different types of users can complete corresponding tasks online through this system. With the above-mentioned related requirements, from

Design of Horse Race Registration System …

1665

Fig. 4 Use case diagram of system management module

the network level, the corresponding local area network can be established first, and then the local area network can be connected through the Internet. In this way, a system for the registration of horse race participants is formed. The specific form of the above-mentioned related design scheme for the system network structure is shown in Fig. 5 [7]. Therefore, in any place with a network, users can carry out tasks within their authority through the network and the browser client. After completing the corresponding work, the relevant information can be effectively entered in the department, so that the above information can be safely stored in the database. As described in

Fig. 5 System network topology structure diagram

1666

S. Zhang and M. Liu

Fig. 6 Software architecture design

Fig. 5, the Internet is used as a channel for unified exchange of the above-mentioned information, and all the information contained in the registration of horse race participants is stored. In terms of security, in order to realize the security of the abovementioned information during transmission, it is necessary to introduce firewalls and other security measures to protect it [8]. In addition to the above reasons, the system has tens of thousands of user information and other related services. Once data loss occurs during system operation, it takes a lot of resources to recover the lost data completely. Based on the above situation, in order to improve the reliability of the user registration system, it is necessary to introduce a backup server here to back up related data. The registration system for horse race participants is mainly composed of four levels: page display layer, service layer, and business logic layer. Among these four components, the page display layer, service layer and business logic layer can carry out complete interactive operations. Among them, specific operations mainly include requests for new creation, update, and deletion. When the business logic layer receives the related request, it should perform related operations in accordance with the required requirements. In this way, the complete interaction between the above two levels is realized, and the relevant information of the database is also updated. The main technical methods and related framework of the system involved in this paper are shown in Fig. 6 [9].

4 System Performance Test Software testing is an important part of the software development model before the system is finally delivered to users. The reliable software testing system of the system

Design of Horse Race Registration System …

1667

is a reliable and powerful guarantee to realize the final needs of users. Through the software testing link, developers can clearly understand whether the software product meets the relevant requirements of the initial demand analysis, whether it meets the basic needs of users, and whether it can achieve modular control and logical business processes. Through the introduction of software testing, software development work has a clearer goal and direction. That is, based on the needs of the software, the software is designed and coded in detail, and finally a set of well-used information management system based on software test conclusions is realized. In the registration system constructed in this paper, software development engineers formulate and control test cases related to the quality of each key link based on the actual experience of daily work, so as to better realize the search for BUG errors in the daily operation of the system and reduce the probability of failure after delivery to users. The performance of the system in this paper needs to be stable, that is, the data transmission speed is stable and timely, so this paper mainly tests the data transmission speed. The results are shown in Table 1 and Fig. 7. As shown in Fig. 7 and Table 1, the test results of the system constructed in this paper are in line with expectations, that is, the model constructed in this paper meets the actual requirements of horse racing registration and can be applied to practice. Table 1 Statistical table of system performance test No.

Transfer speed (ms)

No.

Transfer speed (ms)

No.

Transfer speed (ms)

1

91.2

18

137.5

35

82.5

2

121.5

19

86.2

36

122.5

3

142.3

20

112.3

37

132.7

4

94.3

21

108.4

38

110.8

5

110.6

22

126.7

39

83.0

6

87.3

23

146.2

40

81.2

7

113.9

24

105.0

41

124.7

8

83.8

25

81.7

42

149.4

9

100.9

26

91.9

43

141.8

10

122.9

27

134.6

44

141.1

11

127.2

28

115.4

45

123.9

12

86.4

29

84.0

46

94.4

13

130.8

30

95.6

47

90.3

14

94.8

31

81.6

48

118.9

15

119.8

32

85.2

49

91.9

16

135.5

33

117.6

50

118.5

17

132.5

34

120.8

1668

S. Zhang and M. Liu

Fig. 7 Statistical graph of system performance test

5 Conclusion Through the overall construction and standardization of the system, the final realization of the horse racing registration system is of great significance. This paper systematically divides the main process of horse racing registration management and operation into multiple independent sub-function module structures, and realizes the correlation between the function modules through business logic flow, so that the system operation is more stable and usable. It not only enables the stable and good operation of each independent module, but also makes the overall system more robust. In addition, this paper adopts the current popular B/S model organization structure to realize a complete online examination registration system. In the development process, this paper effectively analyzes and designs the system, refers to a number of related key technologies, removes the dross and selects the essence, and scientifically divides it into several subsystems for R&D and design. This method can not only reduce the time of system development, but also ensure the update of system functions, and also transform a single system application into a service system. At the same time, this method optimizes the processing speed of the database, finally completes the test, and realizes the characteristics of efficient operation of the system, fast use, convenient maintenance, easy expansion, and distinctive service. Acknowledgements This work was supported by The Wuhan Equine Industry Development and Horse Racing Event Transformation and Upgrading Project , Project Number: WHSM-2019122401.

Design of Horse Race Registration System …

1669

References 1. Laird, J.E., Lebiere, C., Rosenbloom, P.S.: A standard model of the mind: toward a common computational framework across artificial intelligence, cognitive science, neuroscience, and robotics. AI Mag. 38(4), 13–26 (2017) 2. Hashemi, M.R., Spaulding, M.L., Shaw, A., et al.: An efficient artificial intelligence model for prediction of tropical storm surge. Nat. Hazards 82(1), 471–491 (2016) 3. Sustrova, T.: A suitable artificial intelligence model for inventory level optimization. Trends Econ. Manage. 10(25), 48–55 (2016) 4. Enshaei, A., Robson, C.N., Edmondson, R.J.: Artificial intelligence systems as prognostic and predictive tools in ovarian cancer. Ann. Surg. Oncol. 22(12), 3970–3975 (2015) 5. Chou, J.S., Bui, D.K.: Modeling heating and cooling loads by artificial intelligence for energyefficient building design. Energy Build. 82, 437–446 (2014) 6. Ghahramani, Z.: Probabilistic machine learning and artificial intelligence. Nature 521(7553), 452–459 (2015) 7. Zappone, A., Di Renzo, M., Debbah, M., et al.: Model-aided wireless artificial intelligence: embedding expert knowledge in deep neural networks for wireless system optimization. IEEE Veh. Technol. Mag. 14(3), 60–69 (2019) 8. Bui, D.T., Pradhan, B., Nampak, H., et al.: Hybrid artificial intelligence approach based on neural fuzzy inference model and metaheuristic optimization for flood susceptibilitgy modeling in a high-frequency tropical cyclone area using GIS. J. Hydrol. 540, 317–330 (2016) 9. Keel, S., Lee, P.Y., Scheetz, J., et al.: Feasibility and patient acceptability of a novel artificial intelligence-based screening model for diabetic retinopathy at endocrinology outpatient services: a pilot study. Sci. Rep. 8(1), 1–6 (2018)